Gentoo Archives: gentoo-commits

From: Jason Zaman <perfinion@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: doc/, policy/modules/kernel/, policy/
Date: Mon, 01 Feb 2021 02:10:39
Message-Id: 1612144502.16e654bd62891f7f1f0466ef9d341e562a038dc0.perfinion@gentoo
1 commit: 16e654bd62891f7f1f0466ef9d341e562a038dc0
2 Author: Jason Zaman <perfinion <AT> gentoo <DOT> org>
3 AuthorDate: Mon Feb 1 01:55:02 2021 +0000
4 Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org>
5 CommitDate: Mon Feb 1 01:55:02 2021 +0000
6 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=16e654bd
7
8 Update generated policy and doc files
9
10 Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org>
11
12 doc/global_tunables.xml | 10 +
13 doc/policy.xml | 20618 ++++++++++++++++++---------------
14 policy/booleans.conf | 91 +-
15 policy/modules.conf | 197 +-
16 policy/modules/kernel/corenetwork.if | 421 -
17 policy/modules/kernel/corenetwork.te | 9 +-
18 6 files changed, 11149 insertions(+), 10197 deletions(-)
19
20 diff --git a/doc/global_tunables.xml b/doc/global_tunables.xml
21 index 9049a3cd..b05f9818 100644
22 --- a/doc/global_tunables.xml
23 +++ b/doc/global_tunables.xml
24 @@ -26,6 +26,16 @@ Allow unconfined executables to make their stack executable. This should never,
25 </p>
26 </desc>
27 </tunable>
28 +<tunable name="allow_raw_memory_access" dftval="false">
29 +<desc>
30 +<p>
31 +Allow raw memory device (/dev/mem, /dev/kmem, /dev/mergemem,
32 +dev/oldmem, /dev/port) access for confined executables. This is
33 +extremely dangerous as it can bypass the SELinux protections, and
34 +should only be used by trusted domains.
35 +</p>
36 +</desc>
37 +</tunable>
38 <tunable name="allow_polyinstantiation" dftval="false">
39 <desc>
40 <p>
41
42 diff --git a/doc/policy.xml b/doc/policy.xml
43 index cfdf3253..0537d461 100644
44 --- a/doc/policy.xml
45 +++ b/doc/policy.xml
46 @@ -1169,17 +1169,7 @@ Role allowed access.
47 </module>
48 <module name="dphysswapfile" filename="policy/modules/admin/dphysswapfile.if">
49 <summary>Set up, mount/unmount, and delete an swap file.</summary>
50 -<interface name="dphysswapfile_dontaudit_read_swap" lineno="13">
51 -<summary>
52 -Dontaudit acces to the swap file.
53 -</summary>
54 -<param name="domain">
55 -<summary>
56 -Domain to not audit.
57 -</summary>
58 -</param>
59 -</interface>
60 -<interface name="dphysswapfile_admin" lineno="40">
61 +<interface name="dphysswapfile_admin" lineno="20">
62 <summary>
63 All of the rules required to
64 administrate an dphys-swapfile environment.
65 @@ -1395,34 +1385,7 @@ Domain allowed access.
66 </module>
67 <module name="fakehwclock" filename="policy/modules/admin/fakehwclock.if">
68 <summary>fake-hwclock - Control fake hardware clock.</summary>
69 -<interface name="fakehwclock_domtrans" lineno="13">
70 -<summary>
71 -Execute a domain transition to run fake-hwclock.
72 -</summary>
73 -<param name="domain">
74 -<summary>
75 -Domain allowed to transition.
76 -</summary>
77 -</param>
78 -</interface>
79 -<interface name="fakehwclock_run" lineno="41">
80 -<summary>
81 -Execute fake-hwclock in the fake-hwclock domain,
82 -and allow the specified role
83 -the fake-hwclock domain.
84 -</summary>
85 -<param name="domain">
86 -<summary>
87 -Domain allowed to transition.
88 -</summary>
89 -</param>
90 -<param name="role">
91 -<summary>
92 -Role allowed access.
93 -</summary>
94 -</param>
95 -</interface>
96 -<interface name="fakehwclock_admin" lineno="68">
97 +<interface name="fakehwclock_admin" lineno="19">
98 <summary>
99 All the rules required to
100 administrate an fake-hwclock environment.
101 @@ -1511,7 +1474,7 @@ Domain allowed access.
102 </interface>
103 <interface name="firstboot_dontaudit_rw_pipes" lineno="132">
104 <summary>
105 -Do not audit attemps to read and
106 +Do not audit attempts to read and
107 write firstboot unnamed pipes.
108 </summary>
109 <param name="domain">
110 @@ -1522,7 +1485,7 @@ Domain to not audit.
111 </interface>
112 <interface name="firstboot_dontaudit_rw_stream_sockets" lineno="152">
113 <summary>
114 -Do not audit attemps to read and
115 +Do not audit attempts to read and
116 write firstboot unix domain
117 stream sockets.
118 </summary>
119 @@ -1685,9 +1648,6 @@ Role allowed access.
120 <rolecap/>
121 </interface>
122 </module>
123 -<module name="kdumpgui" filename="policy/modules/admin/kdumpgui.if">
124 -<summary>System-config-kdump GUI.</summary>
125 -</module>
126 <module name="kismet" filename="policy/modules/admin/kismet.if">
127 <summary>IEEE 802.11 wireless LAN sniffer.</summary>
128 <template name="kismet_role" lineno="18">
129 @@ -1733,7 +1693,7 @@ Role allowed access.
130 </interface>
131 <interface name="kismet_read_pid_files" lineno="95">
132 <summary>
133 -Read kismet pid files.
134 +Read kismet pid files. (Deprecated)
135 </summary>
136 <param name="domain">
137 <summary>
138 @@ -1741,10 +1701,10 @@ Domain allowed access.
139 </summary>
140 </param>
141 </interface>
142 -<interface name="kismet_manage_pid_files" lineno="115">
143 +<interface name="kismet_manage_pid_files" lineno="111">
144 <summary>
145 Create, read, write, and delete
146 -kismet pid files.
147 +kismet pid files. (Deprecated)
148 </summary>
149 <param name="domain">
150 <summary>
151 @@ -1752,9 +1712,9 @@ Domain allowed access.
152 </summary>
153 </param>
154 </interface>
155 -<interface name="kismet_search_lib" lineno="134">
156 +<interface name="kismet_read_runtime_files" lineno="126">
157 <summary>
158 -Search kismet lib directories.
159 +Read kismet runtime files.
160 </summary>
161 <param name="domain">
162 <summary>
163 @@ -1762,20 +1722,10 @@ Domain allowed access.
164 </summary>
165 </param>
166 </interface>
167 -<interface name="kismet_read_lib_files" lineno="153">
168 -<summary>
169 -Read kismet lib files.
170 -</summary>
171 -<param name="domain">
172 -<summary>
173 -Domain allowed access.
174 -</summary>
175 -</param>
176 -</interface>
177 -<interface name="kismet_manage_lib_files" lineno="174">
178 +<interface name="kismet_manage_runtime_files" lineno="146">
179 <summary>
180 Create, read, write, and delete
181 -kismet lib files.
182 +kismet runtime files.
183 </summary>
184 <param name="domain">
185 <summary>
186 @@ -1783,10 +1733,9 @@ Domain allowed access.
187 </summary>
188 </param>
189 </interface>
190 -<interface name="kismet_manage_lib" lineno="194">
191 +<interface name="kismet_search_lib" lineno="165">
192 <summary>
193 -Create, read, write, and delete
194 -kismet lib content.
195 +Search kismet lib directories.
196 </summary>
197 <param name="domain">
198 <summary>
199 @@ -1794,20 +1743,20 @@ Domain allowed access.
200 </summary>
201 </param>
202 </interface>
203 -<interface name="kismet_read_log" lineno="216">
204 +<interface name="kismet_read_lib_files" lineno="184">
205 <summary>
206 -Read kismet log files.
207 +Read kismet lib files.
208 </summary>
209 <param name="domain">
210 <summary>
211 Domain allowed access.
212 </summary>
213 </param>
214 -<rolecap/>
215 </interface>
216 -<interface name="kismet_append_log" lineno="235">
217 +<interface name="kismet_manage_lib_files" lineno="205">
218 <summary>
219 -Append kismet log files.
220 +Create, read, write, and delete
221 +kismet lib files.
222 </summary>
223 <param name="domain">
224 <summary>
225 @@ -1815,10 +1764,10 @@ Domain allowed access.
226 </summary>
227 </param>
228 </interface>
229 -<interface name="kismet_manage_log" lineno="255">
230 +<interface name="kismet_manage_lib" lineno="225">
231 <summary>
232 Create, read, write, and delete
233 -kismet log content.
234 +kismet lib content.
235 </summary>
236 <param name="domain">
237 <summary>
238 @@ -1826,56 +1775,31 @@ Domain allowed access.
239 </summary>
240 </param>
241 </interface>
242 -<interface name="kismet_admin" lineno="283">
243 +<interface name="kismet_read_log" lineno="247">
244 <summary>
245 -All of the rules required to
246 -administrate an kismet environment.
247 +Read kismet log files.
248 </summary>
249 <param name="domain">
250 <summary>
251 Domain allowed access.
252 </summary>
253 </param>
254 -<param name="role">
255 -<summary>
256 -Role allowed access.
257 -</summary>
258 -</param>
259 <rolecap/>
260 </interface>
261 -</module>
262 -<module name="kudzu" filename="policy/modules/admin/kudzu.if">
263 -<summary>Hardware detection and configuration tools.</summary>
264 -<interface name="kudzu_domtrans" lineno="13">
265 -<summary>
266 -Execute kudzu in the kudzu domain.
267 -</summary>
268 -<param name="domain">
269 +<interface name="kismet_append_log" lineno="266">
270 <summary>
271 -Domain allowed to transition.
272 -</summary>
273 -</param>
274 -</interface>
275 -<interface name="kudzu_run" lineno="39">
276 -<summary>
277 -Execute kudzu in the kudzu domain, and
278 -allow the specified role the kudzu domain.
279 +Append kismet log files.
280 </summary>
281 <param name="domain">
282 <summary>
283 -Domain allowed to transition.
284 -</summary>
285 -</param>
286 -<param name="role">
287 -<summary>
288 -Role allowed access.
289 +Domain allowed access.
290 </summary>
291 </param>
292 -<rolecap/>
293 </interface>
294 -<interface name="kudzu_getattr_exec_files" lineno="58">
295 +<interface name="kismet_manage_log" lineno="286">
296 <summary>
297 -Get attributes of kudzu executable files.
298 +Create, read, write, and delete
299 +kismet log content.
300 </summary>
301 <param name="domain">
302 <summary>
303 @@ -1883,10 +1807,10 @@ Domain allowed access.
304 </summary>
305 </param>
306 </interface>
307 -<interface name="kudzu_admin" lineno="83">
308 +<interface name="kismet_admin" lineno="314">
309 <summary>
310 All of the rules required to
311 -administrate an kudzu environment.
312 +administrate an kismet environment.
313 </summary>
314 <param name="domain">
315 <summary>
316 @@ -2406,7 +2330,7 @@ Domain Allowed Access
317 </summary>
318 </param>
319 </interface>
320 -<interface name="portage_domtrans_fetch" lineno="233">
321 +<interface name="portage_domtrans_fetch" lineno="224">
322 <summary>
323 Execute tree management functions
324 (fetching, layman, ...) in the
325 @@ -2418,7 +2342,7 @@ Domain allowed to transition.
326 </summary>
327 </param>
328 </interface>
329 -<interface name="portage_run_fetch" lineno="262">
330 +<interface name="portage_run_fetch" lineno="253">
331 <summary>
332 Execute tree management functions
333 (fetching, layman, ...) in the
334 @@ -2438,7 +2362,7 @@ Role allowed access.
335 </param>
336 <rolecap/>
337 </interface>
338 -<interface name="portage_domtrans_gcc_config" lineno="281">
339 +<interface name="portage_domtrans_gcc_config" lineno="272">
340 <summary>
341 Execute gcc-config in the gcc config domain.
342 </summary>
343 @@ -2448,7 +2372,7 @@ Domain allowed to transition.
344 </summary>
345 </param>
346 </interface>
347 -<interface name="portage_run_gcc_config" lineno="308">
348 +<interface name="portage_run_gcc_config" lineno="299">
349 <summary>
350 Execute gcc-config in the gcc config
351 domain, and allow the specified role
352 @@ -2466,7 +2390,7 @@ Role allowed access.
353 </param>
354 <rolecap/>
355 </interface>
356 -<interface name="portage_dontaudit_use_fds" lineno="328">
357 +<interface name="portage_dontaudit_use_fds" lineno="319">
358 <summary>
359 Do not audit attempts to use
360 portage file descriptors.
361 @@ -2477,7 +2401,7 @@ Domain to not audit.
362 </summary>
363 </param>
364 </interface>
365 -<interface name="portage_dontaudit_search_tmp" lineno="347">
366 +<interface name="portage_dontaudit_search_tmp" lineno="338">
367 <summary>
368 Do not audit attempts to search the
369 portage temporary directories.
370 @@ -2488,7 +2412,7 @@ Domain to not audit.
371 </summary>
372 </param>
373 </interface>
374 -<interface name="portage_dontaudit_rw_tmp_files" lineno="366">
375 +<interface name="portage_dontaudit_rw_tmp_files" lineno="357">
376 <summary>
377 Do not audit attempts to read and write
378 the portage temporary files.
379 @@ -2499,7 +2423,7 @@ Domain to not audit.
380 </summary>
381 </param>
382 </interface>
383 -<interface name="portage_eselect_module" lineno="391">
384 +<interface name="portage_eselect_module" lineno="382">
385 <summary>
386 Allow the domain to run within an eselect module script.
387 </summary>
388 @@ -2509,7 +2433,7 @@ Domain to allow within an eselect module
389 </summary>
390 </param>
391 </interface>
392 -<interface name="portage_ro_role" lineno="414">
393 +<interface name="portage_ro_role" lineno="405">
394 <summary>
395 Read all portage files
396 </summary>
397 @@ -2524,7 +2448,7 @@ Domain allowed access
398 </summary>
399 </param>
400 </interface>
401 -<interface name="portage_read_db" lineno="434">
402 +<interface name="portage_read_db" lineno="425">
403 <summary>
404 Read portage db files
405 </summary>
406 @@ -2534,7 +2458,7 @@ Domain allowed access
407 </summary>
408 </param>
409 </interface>
410 -<interface name="portage_read_cache" lineno="454">
411 +<interface name="portage_read_cache" lineno="445">
412 <summary>
413 Read portage cache files
414 </summary>
415 @@ -2544,7 +2468,7 @@ Domain allowed access
416 </summary>
417 </param>
418 </interface>
419 -<interface name="portage_read_config" lineno="475">
420 +<interface name="portage_read_config" lineno="466">
421 <summary>
422 Read portage configuration files
423 </summary>
424 @@ -2554,7 +2478,7 @@ Domain allowed access
425 </summary>
426 </param>
427 </interface>
428 -<interface name="portage_read_ebuild" lineno="497">
429 +<interface name="portage_read_ebuild" lineno="488">
430 <summary>
431 Read portage ebuild files
432 </summary>
433 @@ -2564,7 +2488,7 @@ Domain allowed access
434 </summary>
435 </param>
436 </interface>
437 -<interface name="portage_read_log" lineno="519">
438 +<interface name="portage_read_log" lineno="510">
439 <summary>
440 Read portage log files
441 </summary>
442 @@ -2574,7 +2498,7 @@ Domain allowed access
443 </summary>
444 </param>
445 </interface>
446 -<interface name="portage_read_srcrepo" lineno="538">
447 +<interface name="portage_read_srcrepo" lineno="529">
448 <summary>
449 Read portage src repository files
450 </summary>
451 @@ -2584,7 +2508,7 @@ Domain allowed access
452 </summary>
453 </param>
454 </interface>
455 -<interface name="portage_dontaudit_write_cache" lineno="560">
456 +<interface name="portage_dontaudit_write_cache" lineno="551">
457 <summary>
458 Do not audit writing portage cache files
459 </summary>
460 @@ -2984,20 +2908,6 @@ Role allowed access.
461 <rolecap/>
462 </interface>
463 </module>
464 -<module name="readahead" filename="policy/modules/admin/readahead.if">
465 -<summary>Read files into page cache for improved performance.</summary>
466 -<interface name="readahead_domtrans" lineno="14">
467 -<summary>
468 -Execute a domain transition
469 -to run readahead.
470 -</summary>
471 -<param name="domain">
472 -<summary>
473 -Domain allowed to transition.
474 -</summary>
475 -</param>
476 -</interface>
477 -</module>
478 <module name="rkhunter" filename="policy/modules/admin/rkhunter.if">
479 <summary>rkhunter - rootkit checker.</summary>
480 <interface name="rkhunter_domtrans" lineno="13">
481 @@ -3319,7 +3229,7 @@ Domain to not audit.
482 </interface>
483 <interface name="rpm_read_pid_files" lineno="538">
484 <summary>
485 -Read rpm pid files.
486 +Read rpm pid files. (Deprecated)
487 </summary>
488 <param name="domain">
489 <summary>
490 @@ -3327,10 +3237,10 @@ Domain allowed access.
491 </summary>
492 </param>
493 </interface>
494 -<interface name="rpm_manage_pid_files" lineno="558">
495 +<interface name="rpm_manage_pid_files" lineno="553">
496 <summary>
497 Create, read, write, and delete
498 -rpm pid files.
499 +rpm pid files. (Deprecated)
500 </summary>
501 <param name="domain">
502 <summary>
503 @@ -3338,10 +3248,10 @@ Domain allowed access.
504 </summary>
505 </param>
506 </interface>
507 -<interface name="rpm_pid_filetrans_rpm_pid" lineno="588">
508 +<interface name="rpm_pid_filetrans_rpm_pid" lineno="579">
509 <summary>
510 Create specified objects in pid directories
511 -with the rpm pid file type.
512 +with the rpm pid file type. (Deprecated)
513 </summary>
514 <param name="domain">
515 <summary>
516 @@ -3359,7 +3269,18 @@ The name of the object being created.
517 </summary>
518 </param>
519 </interface>
520 -<interface name="rpm_admin" lineno="613">
521 +<interface name="rpm_manage_runtime_files" lineno="594">
522 +<summary>
523 +Create, read, write, and delete
524 +rpm runtime files.
525 +</summary>
526 +<param name="domain">
527 +<summary>
528 +Domain allowed access.
529 +</summary>
530 +</param>
531 +</interface>
532 +<interface name="rpm_admin" lineno="620">
533 <summary>
534 All of the rules required to
535 administrate an rpm environment.
536 @@ -3481,7 +3402,7 @@ Domain allowed access.
537 <interface name="samhain_manage_pid_files" lineno="187">
538 <summary>
539 Create, read, write, and delete
540 -samhain pid files.
541 +samhain pid files. (Deprecated)
542 </summary>
543 <param name="domain">
544 <summary>
545 @@ -3489,7 +3410,7 @@ Domain allowed access.
546 </summary>
547 </param>
548 </interface>
549 -<interface name="samhain_admin" lineno="213">
550 +<interface name="samhain_admin" lineno="208">
551 <summary>
552 All of the rules required to
553 administrate the samhain environment.
554 @@ -3521,7 +3442,7 @@ Domain allowed to transition.
555 </interface>
556 <interface name="sblim_read_pid_files" lineno="32">
557 <summary>
558 -Read gatherd pid files.
559 +Read gatherd pid files. (Deprecated)
560 </summary>
561 <param name="domain">
562 <summary>
563 @@ -3529,7 +3450,7 @@ Domain allowed access.
564 </summary>
565 </param>
566 </interface>
567 -<interface name="sblim_admin" lineno="58">
568 +<interface name="sblim_admin" lineno="53">
569 <summary>
570 All of the rules required to
571 administrate an sblim environment.
572 @@ -3547,24 +3468,6 @@ Role allowed access.
573 <rolecap/>
574 </interface>
575 </module>
576 -<module name="sectoolm" filename="policy/modules/admin/sectoolm.if">
577 -<summary>Sectool security audit tool.</summary>
578 -<interface name="sectoolm_role" lineno="18">
579 -<summary>
580 -Role access for sectoolm.
581 -</summary>
582 -<param name="role" unused="true">
583 -<summary>
584 -Role allowed access.
585 -</summary>
586 -</param>
587 -<param name="domain">
588 -<summary>
589 -User domain for the role.
590 -</summary>
591 -</param>
592 -</interface>
593 -</module>
594 <module name="shorewall" filename="policy/modules/admin/shorewall.if">
595 <summary>Shoreline Firewall high-level tool for configuring netfilter.</summary>
596 <interface name="shorewall_domtrans" lineno="13">
597 @@ -3598,27 +3501,7 @@ Domain allowed access.
598 </summary>
599 </param>
600 </interface>
601 -<interface name="shorewall_read_pid_files" lineno="71">
602 -<summary>
603 -Read shorewall pid files.
604 -</summary>
605 -<param name="domain" unused="true">
606 -<summary>
607 -Domain allowed access.
608 -</summary>
609 -</param>
610 -</interface>
611 -<interface name="shorewall_rw_pid_files" lineno="85">
612 -<summary>
613 -Read and write shorewall pid files.
614 -</summary>
615 -<param name="domain" unused="true">
616 -<summary>
617 -Domain allowed access.
618 -</summary>
619 -</param>
620 -</interface>
621 -<interface name="shorewall_read_lib_files" lineno="99">
622 +<interface name="shorewall_read_lib_files" lineno="71">
623 <summary>
624 Read shorewall lib files.
625 </summary>
626 @@ -3628,7 +3511,7 @@ Domain allowed access.
627 </summary>
628 </param>
629 </interface>
630 -<interface name="shorewall_rw_lib_files" lineno="118">
631 +<interface name="shorewall_rw_lib_files" lineno="90">
632 <summary>
633 Read and write shorewall lib files.
634 </summary>
635 @@ -3638,7 +3521,7 @@ Domain allowed access.
636 </summary>
637 </param>
638 </interface>
639 -<interface name="shorewall_read_tmp_files" lineno="137">
640 +<interface name="shorewall_read_tmp_files" lineno="109">
641 <summary>
642 Read shorewall temporary files.
643 </summary>
644 @@ -3648,7 +3531,7 @@ Domain allowed access.
645 </summary>
646 </param>
647 </interface>
648 -<interface name="shorewall_admin" lineno="163">
649 +<interface name="shorewall_admin" lineno="135">
650 <summary>
651 All of the rules required to
652 administrate an shorewall environment.
653 @@ -3741,9 +3624,6 @@ Domain allowed access.
654 </param>
655 </interface>
656 </module>
657 -<module name="smoltclient" filename="policy/modules/admin/smoltclient.if">
658 -<summary>The Fedora hardware profiler client.</summary>
659 -</module>
660 <module name="sosreport" filename="policy/modules/admin/sosreport.if">
661 <summary>Generate debugging information for system.</summary>
662 <interface name="sosreport_domtrans" lineno="13">
663 @@ -3911,7 +3791,7 @@ The user domain associated with the role.
664 </summary>
665 </param>
666 </template>
667 -<interface name="sudo_sigchld" lineno="189">
668 +<interface name="sudo_sigchld" lineno="190">
669 <summary>
670 Send a SIGCHLD signal to the sudo domain.
671 </summary>
672 @@ -3921,6 +3801,17 @@ Domain allowed access.
673 </summary>
674 </param>
675 </interface>
676 +<tunable name="sudo_all_tcp_connect_http_port" dftval="false">
677 +<desc>
678 +<p>
679 +Determine whether all sudo domains
680 +can connect to TCP HTTP ports. This
681 +is needed if an additional authentication
682 +mechanism via an HTTP server is
683 +required for users to use sudo.
684 +</p>
685 +</desc>
686 +</tunable>
687 </module>
688 <module name="sxid" filename="policy/modules/admin/sxid.if">
689 <summary>SUID/SGID program monitoring.</summary>
690 @@ -4137,6 +4028,31 @@ Domain allowed to transition.
691 </param>
692 </interface>
693 </module>
694 +<module name="usbguard" filename="policy/modules/admin/usbguard.if">
695 +<summary>
696 +Usbguard enforces the USB device authorization policy for all USB
697 +devices.
698 +</summary>
699 +<interface name="usbguard_stream_connect" lineno="16">
700 +<summary>
701 +Connect to usbguard with a unix domain stream socket.
702 +</summary>
703 +<param name="domain">
704 +<summary>
705 +Domain allowed access.
706 +</summary>
707 +</param>
708 +</interface>
709 +<tunable name="usbguard_user_modify_rule_files" dftval="false">
710 +<desc>
711 +<p>
712 +Determine whether authorized users can control the daemon,
713 +which requires usbguard-daemon to be able modify its rules in
714 +/etc/usbguard.
715 +</p>
716 +</desc>
717 +</tunable>
718 +</module>
719 <module name="usbmodules" filename="policy/modules/admin/usbmodules.if">
720 <summary>List kernel modules of USB devices.</summary>
721 <interface name="usbmodules_domtrans" lineno="13">
722 @@ -4480,35 +4396,6 @@ Domain allowed access.
723 </layer>
724 <layer name="apps">
725 <summary>Policy modules for applications</summary>
726 -<module name="ada" filename="policy/modules/apps/ada.if">
727 -<summary>GNAT Ada95 compiler.</summary>
728 -<interface name="ada_domtrans" lineno="13">
729 -<summary>
730 -Execute the ada program in the ada domain.
731 -</summary>
732 -<param name="domain">
733 -<summary>
734 -Domain allowed to transition.
735 -</summary>
736 -</param>
737 -</interface>
738 -<interface name="ada_run" lineno="38">
739 -<summary>
740 -Execute ada in the ada domain, and
741 -allow the specified role the ada domain.
742 -</summary>
743 -<param name="domain">
744 -<summary>
745 -Domain allowed to transition.
746 -</summary>
747 -</param>
748 -<param name="role">
749 -<summary>
750 -Role allowed access.
751 -</summary>
752 -</param>
753 -</interface>
754 -</module>
755 <module name="awstats" filename="policy/modules/apps/awstats.if">
756 <summary>Log file analyzer for advanced statistics.</summary>
757 <interface name="awstats_domtrans" lineno="14">
758 @@ -4654,7 +4541,7 @@ User domain for the role
759 </summary>
760 </param>
761 </interface>
762 -<interface name="chromium_rw_tmp_pipes" lineno="60">
763 +<interface name="chromium_rw_tmp_pipes" lineno="67">
764 <summary>
765 Read-write access to Chromiums' temporary fifo files
766 </summary>
767 @@ -4664,7 +4551,7 @@ Domain allowed access
768 </summary>
769 </param>
770 </interface>
771 -<interface name="chromium_tmp_filetrans" lineno="89">
772 +<interface name="chromium_tmp_filetrans" lineno="96">
773 <summary>
774 Automatically use the specified type for resources created in chromium's
775 temporary locations
776 @@ -4685,7 +4572,7 @@ The name of the resource being created
777 </summary>
778 </param>
779 </interface>
780 -<interface name="chromium_domtrans" lineno="108">
781 +<interface name="chromium_domtrans" lineno="115">
782 <summary>
783 Execute a domain transition to the chromium domain (chromium_t)
784 </summary>
785 @@ -4695,7 +4582,7 @@ Domain allowed access
786 </summary>
787 </param>
788 </interface>
789 -<interface name="chromium_run" lineno="133">
790 +<interface name="chromium_run" lineno="141">
791 <summary>
792 Execute chromium in the chromium domain and allow the specified role to access the chromium domain
793 </summary>
794 @@ -4710,6 +4597,16 @@ Role allowed access
795 </summary>
796 </param>
797 </interface>
798 +<tunable name="chromium_dri" dftval="true">
799 +<desc>
800 +<p>
801 +Allow chromium to access direct rendering interface
802 +</p>
803 +<p>
804 +Needed for good performance on complex sites
805 +</p>
806 +</desc>
807 +</tunable>
808 <tunable name="chromium_read_system_info" dftval="false">
809 <desc>
810 <p>
811 @@ -4979,31 +4876,6 @@ Grant the evolution domains manage rights on all user content
812 </desc>
813 </tunable>
814 </module>
815 -<module name="firewallgui" filename="policy/modules/apps/firewallgui.if">
816 -<summary>system-config-firewall dbus system service.</summary>
817 -<interface name="firewallgui_dbus_chat" lineno="14">
818 -<summary>
819 -Send and receive messages from
820 -firewallgui over dbus.
821 -</summary>
822 -<param name="domain">
823 -<summary>
824 -Domain allowed access.
825 -</summary>
826 -</param>
827 -</interface>
828 -<interface name="firewallgui_dontaudit_rw_pipes" lineno="35">
829 -<summary>
830 -Do not audit attempts to read and
831 -write firewallgui unnamed pipes.
832 -</summary>
833 -<param name="domain">
834 -<summary>
835 -Domain to not audit.
836 -</summary>
837 -</param>
838 -</interface>
839 -</module>
840 <module name="games" filename="policy/modules/apps/games.if">
841 <summary>Various games.</summary>
842 <interface name="games_role" lineno="18">
843 @@ -5053,24 +4925,6 @@ Domain allowed access.
844 </param>
845 </interface>
846 </module>
847 -<module name="gift" filename="policy/modules/apps/gift.if">
848 -<summary>Peer to peer file sharing tool.</summary>
849 -<interface name="gift_role" lineno="18">
850 -<summary>
851 -Role access for gift.
852 -</summary>
853 -<param name="role">
854 -<summary>
855 -Role allowed access.
856 -</summary>
857 -</param>
858 -<param name="domain">
859 -<summary>
860 -User domain for the role.
861 -</summary>
862 -</param>
863 -</interface>
864 -</module>
865 <module name="gitosis" filename="policy/modules/apps/gitosis.if">
866 <summary>Tools for managing and hosting git repositories.</summary>
867 <interface name="gitosis_domtrans" lineno="13">
868 @@ -5884,7 +5738,7 @@ The type of the user domain.
869 </summary>
870 </param>
871 </template>
872 -<template name="java_domtrans" lineno="148">
873 +<interface name="java_domtrans" lineno="148">
874 <summary>
875 Execute the java program in the java domain.
876 </summary>
877 @@ -5893,7 +5747,7 @@ Execute the java program in the java domain.
878 Domain allowed to transition.
879 </summary>
880 </param>
881 -</template>
882 +</interface>
883 <interface name="java_run" lineno="178">
884 <summary>
885 Execute java in the java domain, and
886 @@ -7037,76 +6891,6 @@ Grant the openoffice domains manage rights on all user content
887 </desc>
888 </tunable>
889 </module>
890 -<module name="podsleuth" filename="policy/modules/apps/podsleuth.if">
891 -<summary>Podsleuth is a tool to get information about an Apple (TM) iPod (TM).</summary>
892 -<interface name="podsleuth_domtrans" lineno="13">
893 -<summary>
894 -Execute a domain transition to run podsleuth.
895 -</summary>
896 -<param name="domain">
897 -<summary>
898 -Domain allowed to transition.
899 -</summary>
900 -</param>
901 -</interface>
902 -<interface name="podsleuth_run" lineno="39">
903 -<summary>
904 -Execute podsleuth in the podsleuth
905 -domain, and allow the specified role
906 -the podsleuth domain.
907 -</summary>
908 -<param name="domain">
909 -<summary>
910 -Domain allowed to transition.
911 -</summary>
912 -</param>
913 -<param name="role">
914 -<summary>
915 -Role allowed access.
916 -</summary>
917 -</param>
918 -</interface>
919 -</module>
920 -<module name="ptchown" filename="policy/modules/apps/ptchown.if">
921 -<summary>helper function for grantpt(3), changes ownship and permissions of pseudotty.</summary>
922 -<interface name="ptchown_domtrans" lineno="13">
923 -<summary>
924 -Execute a domain transition to run ptchown.
925 -</summary>
926 -<param name="domain">
927 -<summary>
928 -Domain allowed to transition.
929 -</summary>
930 -</param>
931 -</interface>
932 -<interface name="ptchown_exec" lineno="32">
933 -<summary>
934 -Execute ptchown in the caller domain.
935 -</summary>
936 -<param name="domain">
937 -<summary>
938 -Domain allowed access.
939 -</summary>
940 -</param>
941 -</interface>
942 -<interface name="ptchown_run" lineno="58">
943 -<summary>
944 -Execute ptchown in the ptchown
945 -domain, and allow the specified
946 -role the ptchown domain.
947 -</summary>
948 -<param name="domain">
949 -<summary>
950 -Domain allowed to transition.
951 -</summary>
952 -</param>
953 -<param name="role">
954 -<summary>
955 -Role allowed access.
956 -</summary>
957 -</param>
958 -</interface>
959 -</module>
960 <module name="pulseaudio" filename="policy/modules/apps/pulseaudio.if">
961 <summary>Pulseaudio network sound server.</summary>
962 <interface name="pulseaudio_role" lineno="18">
963 @@ -7359,7 +7143,7 @@ Domain prefix to be used.
964 </summary>
965 </param>
966 </template>
967 -<template name="qemu_role" lineno="113">
968 +<template name="qemu_role" lineno="112">
969 <summary>
970 Role access for qemu.
971 </summary>
972 @@ -7374,7 +7158,7 @@ User domain for the role.
973 </summary>
974 </param>
975 </template>
976 -<interface name="qemu_domtrans" lineno="134">
977 +<interface name="qemu_domtrans" lineno="133">
978 <summary>
979 Execute a domain transition to run qemu.
980 </summary>
981 @@ -7384,7 +7168,7 @@ Domain allowed to transition.
982 </summary>
983 </param>
984 </interface>
985 -<interface name="qemu_exec" lineno="153">
986 +<interface name="qemu_exec" lineno="152">
987 <summary>
988 Execute a qemu in the caller domain.
989 </summary>
990 @@ -7394,7 +7178,7 @@ Domain allowed access.
991 </summary>
992 </param>
993 </interface>
994 -<interface name="qemu_run" lineno="180">
995 +<interface name="qemu_run" lineno="179">
996 <summary>
997 Execute qemu in the qemu domain,
998 and allow the specified role the
999 @@ -7412,7 +7196,7 @@ Role allowed access.
1000 </param>
1001 <rolecap/>
1002 </interface>
1003 -<interface name="qemu_read_state" lineno="199">
1004 +<interface name="qemu_read_state" lineno="198">
1005 <summary>
1006 Read qemu process state files.
1007 </summary>
1008 @@ -7422,7 +7206,7 @@ Domain to allow access.
1009 </summary>
1010 </param>
1011 </interface>
1012 -<interface name="qemu_setsched" lineno="220">
1013 +<interface name="qemu_setsched" lineno="219">
1014 <summary>
1015 Set qemu scheduler.
1016 </summary>
1017 @@ -7432,7 +7216,7 @@ Domain allowed access.
1018 </summary>
1019 </param>
1020 </interface>
1021 -<interface name="qemu_signal" lineno="238">
1022 +<interface name="qemu_signal" lineno="237">
1023 <summary>
1024 Send generic signals to qemu.
1025 </summary>
1026 @@ -7442,7 +7226,7 @@ Domain allowed access.
1027 </summary>
1028 </param>
1029 </interface>
1030 -<interface name="qemu_kill" lineno="256">
1031 +<interface name="qemu_kill" lineno="255">
1032 <summary>
1033 Send kill signals to qemu.
1034 </summary>
1035 @@ -7452,7 +7236,7 @@ Domain allowed access.
1036 </summary>
1037 </param>
1038 </interface>
1039 -<interface name="qemu_stream_connect" lineno="275">
1040 +<interface name="qemu_stream_connect" lineno="274">
1041 <summary>
1042 Connect to qemu with a unix
1043 domain stream socket.
1044 @@ -7463,9 +7247,9 @@ Domain allowed access.
1045 </summary>
1046 </param>
1047 </interface>
1048 -<interface name="qemu_delete_pid_sock_file" lineno="294">
1049 +<interface name="qemu_delete_pid_sock_file" lineno="293">
1050 <summary>
1051 -Unlink qemu socket
1052 +Unlink qemu socket (Deprecated)
1053 </summary>
1054 <param name="domain">
1055 <summary>
1056 @@ -7473,7 +7257,17 @@ Domain allowed access.
1057 </summary>
1058 </param>
1059 </interface>
1060 -<interface name="qemu_domtrans_unconfined" lineno="313">
1061 +<interface name="qemu_delete_runtime_sock_files" lineno="308">
1062 +<summary>
1063 +Unlink qemu runtime sockets.
1064 +</summary>
1065 +<param name="domain">
1066 +<summary>
1067 +Domain allowed access.
1068 +</summary>
1069 +</param>
1070 +</interface>
1071 +<interface name="qemu_domtrans_unconfined" lineno="327">
1072 <summary>
1073 Execute a domain transition to
1074 run qemu unconfined.
1075 @@ -7484,7 +7278,7 @@ Domain allowed to transition.
1076 </summary>
1077 </param>
1078 </interface>
1079 -<interface name="qemu_manage_tmp_dirs" lineno="333">
1080 +<interface name="qemu_manage_tmp_dirs" lineno="347">
1081 <summary>
1082 Create, read, write, and delete
1083 qemu temporary directories.
1084 @@ -7495,7 +7289,7 @@ Domain allowed access.
1085 </summary>
1086 </param>
1087 </interface>
1088 -<interface name="qemu_manage_tmp_files" lineno="353">
1089 +<interface name="qemu_manage_tmp_files" lineno="367">
1090 <summary>
1091 Create, read, write, and delete
1092 qemu temporary files.
1093 @@ -7506,7 +7300,7 @@ Domain allowed access.
1094 </summary>
1095 </param>
1096 </interface>
1097 -<interface name="qemu_spec_domtrans" lineno="387">
1098 +<interface name="qemu_spec_domtrans" lineno="401">
1099 <summary>
1100 Execute qemu in a specified domain.
1101 </summary>
1102 @@ -7531,7 +7325,7 @@ Domain to transition to.
1103 </summary>
1104 </param>
1105 </interface>
1106 -<interface name="qemu_entry_type" lineno="407">
1107 +<interface name="qemu_entry_type" lineno="421">
1108 <summary>
1109 Make qemu executable files an
1110 entrypoint for the specified domain.
1111 @@ -7542,7 +7336,7 @@ The domain for which qemu_exec_t is an entrypoint.
1112 </summary>
1113 </param>
1114 </interface>
1115 -<interface name="qemu_rw_pid_sock_files" lineno="427">
1116 +<interface name="qemu_rw_pid_sock_files" lineno="441">
1117 <summary>
1118 Read/write to qemu socket files in /var/run
1119 </summary>
1120 @@ -7621,9 +7415,6 @@ Domain allowed access.
1121 </param>
1122 </interface>
1123 </module>
1124 -<module name="sambagui" filename="policy/modules/apps/sambagui.if">
1125 -<summary>system-config-samba dbus service.</summary>
1126 -</module>
1127 <module name="screen" filename="policy/modules/apps/screen.if">
1128 <summary>GNU terminal multiplexer.</summary>
1129 <template name="screen_role_template" lineno="24">
1130 @@ -8449,7 +8240,7 @@ The type of the user domain.
1131 </summary>
1132 </param>
1133 </template>
1134 -<interface name="wm_exec" lineno="112">
1135 +<interface name="wm_exec" lineno="116">
1136 <summary>
1137 Execute wm in the caller domain.
1138 </summary>
1139 @@ -8459,7 +8250,7 @@ Domain allowed access.
1140 </summary>
1141 </param>
1142 </interface>
1143 -<interface name="wm_dbus_chat" lineno="138">
1144 +<interface name="wm_dbus_chat" lineno="142">
1145 <summary>
1146 Send and receive messages from
1147 specified wm over dbus.
1148 @@ -8476,7 +8267,7 @@ Domain allowed access.
1149 </summary>
1150 </param>
1151 </interface>
1152 -<interface name="wm_dontaudit_exec_tmp_files" lineno="159">
1153 +<interface name="wm_dontaudit_exec_tmp_files" lineno="163">
1154 <summary>
1155 Do not audit attempts to execute
1156 files in temporary directories.
1157 @@ -8487,7 +8278,7 @@ Domain to not audit.
1158 </summary>
1159 </param>
1160 </interface>
1161 -<interface name="wm_dontaudit_exec_tmpfs_files" lineno="178">
1162 +<interface name="wm_dontaudit_exec_tmpfs_files" lineno="182">
1163 <summary>
1164 Do not audit attempts to execute
1165 files in temporary filesystems.
1166 @@ -8498,7 +8289,7 @@ Domain to not audit.
1167 </summary>
1168 </param>
1169 </interface>
1170 -<interface name="wm_application_domain" lineno="221">
1171 +<interface name="wm_application_domain" lineno="225">
1172 <summary>
1173 Create a domain for applications
1174 that are launched by the window
1175 @@ -8533,7 +8324,7 @@ Type to be used as the source window manager domain.
1176 </param>
1177 <infoflow type="none"/>
1178 </interface>
1179 -<interface name="wm_write_pipes" lineno="246">
1180 +<interface name="wm_write_pipes" lineno="250">
1181 <summary>
1182 Write wm unnamed pipes.
1183 </summary>
1184 @@ -8575,46 +8366,6 @@ Grant the xscreensaver domains read access to generic user content
1185 </desc>
1186 </tunable>
1187 </module>
1188 -<module name="yam" filename="policy/modules/apps/yam.if">
1189 -<summary>Yum/Apt Mirroring.</summary>
1190 -<interface name="yam_domtrans" lineno="13">
1191 -<summary>
1192 -Execute yam in the yam domain.
1193 -</summary>
1194 -<param name="domain">
1195 -<summary>
1196 -Domain allowed to transition.
1197 -</summary>
1198 -</param>
1199 -</interface>
1200 -<interface name="yam_run" lineno="39">
1201 -<summary>
1202 -Execute yam in the yam domain, and
1203 -allow the specified role the yam domain.
1204 -</summary>
1205 -<param name="domain">
1206 -<summary>
1207 -Domain allowed to transition.
1208 -</summary>
1209 -</param>
1210 -<param name="role">
1211 -<summary>
1212 -Role allowed access.
1213 -</summary>
1214 -</param>
1215 -<rolecap/>
1216 -</interface>
1217 -<interface name="yam_read_content" lineno="58">
1218 -<summary>
1219 -Read yam content.
1220 -</summary>
1221 -<param name="domain">
1222 -<summary>
1223 -Domain allowed access.
1224 -</summary>
1225 -</param>
1226 -</interface>
1227 -</module>
1228 </layer>
1229 <layer name="contrib">
1230 <summary>Gentoo-specific policy modules</summary>
1231 @@ -8910,7 +8661,7 @@ The user domain.
1232 </summary>
1233 </param>
1234 </interface>
1235 -<interface name="dropbox_dbus_chat" lineno="66">
1236 +<interface name="dropbox_dbus_chat" lineno="67">
1237 <summary>
1238 Send and receive messages from the dropbox daemon
1239 over dbus.
1240 @@ -8921,7 +8672,7 @@ Domain allowed access.
1241 </summary>
1242 </param>
1243 </interface>
1244 -<interface name="dropbox_read_content" lineno="86">
1245 +<interface name="dropbox_read_content" lineno="87">
1246 <summary>
1247 Allow other domains to read dropbox's content files
1248 </summary>
1249 @@ -8931,7 +8682,7 @@ The domain that is allowed read access to the dropbox_content_t files
1250 </summary>
1251 </param>
1252 </interface>
1253 -<interface name="dropbox_manage_content" lineno="105">
1254 +<interface name="dropbox_manage_content" lineno="106">
1255 <summary>
1256 Allow other domains to manage dropbox's content files
1257 </summary>
1258 @@ -9704,7 +9455,7 @@ Domain allowed access.
1259 </param>
1260 <rolecap/>
1261 </interface>
1262 -<interface name="vde_connect" lineno="50">
1263 +<interface name="vde_connect" lineno="49">
1264 <summary>
1265 </summary>
1266 <param name="domain">
1267 @@ -9731,7 +9482,7 @@ run init.
1268 <interface name="corecmd_executable_file" lineno="23">
1269 <summary>
1270 Make the specified type usable for files
1271 -that are exectuables, such as binary programs.
1272 +that are executables, such as binary programs.
1273 This does not include shared libraries.
1274 </summary>
1275 <param name="type">
1276 @@ -9742,7 +9493,7 @@ Type to be used for files.
1277 </interface>
1278 <interface name="corecmd_bin_entry_type" lineno="44">
1279 <summary>
1280 -Make general progams in bin an entrypoint for
1281 +Make general programs in bin an entrypoint for
1282 the specified domain.
1283 </summary>
1284 <param name="domain">
1285 @@ -9852,17 +9603,7 @@ Domain to not audit.
1286 </summary>
1287 </param>
1288 </interface>
1289 -<interface name="corecmd_read_bin_symlinks" lineno="249">
1290 -<summary>
1291 -Read symbolic links in bin directories.
1292 -</summary>
1293 -<param name="domain">
1294 -<summary>
1295 -Domain allowed access.
1296 -</summary>
1297 -</param>
1298 -</interface>
1299 -<interface name="corecmd_read_bin_pipes" lineno="265">
1300 +<interface name="corecmd_read_bin_pipes" lineno="249">
1301 <summary>
1302 Read pipes in bin directories.
1303 </summary>
1304 @@ -9872,7 +9613,7 @@ Domain allowed access.
1305 </summary>
1306 </param>
1307 </interface>
1308 -<interface name="corecmd_read_bin_sockets" lineno="284">
1309 +<interface name="corecmd_read_bin_sockets" lineno="268">
1310 <summary>
1311 Read named sockets in bin directories.
1312 </summary>
1313 @@ -9882,7 +9623,7 @@ Domain allowed access.
1314 </summary>
1315 </param>
1316 </interface>
1317 -<interface name="corecmd_exec_bin" lineno="324">
1318 +<interface name="corecmd_exec_bin" lineno="308">
1319 <summary>
1320 Execute generic programs in bin directories,
1321 in the caller domain.
1322 @@ -9895,7 +9636,7 @@ in system bin directories (/bin, /sbin, /usr/bin,
1323 </p>
1324 <p>
1325 Typically, this interface should be used when the domain
1326 -executes general system progams within the privileges
1327 +executes general system programs within the privileges
1328 of the source domain. Some examples of these programs
1329 are ls, cp, sed, python, and tar. This does not include
1330 shells, such as bash.
1331 @@ -9913,7 +9654,7 @@ Domain allowed access.
1332 </summary>
1333 </param>
1334 </interface>
1335 -<interface name="corecmd_manage_bin_files" lineno="343">
1336 +<interface name="corecmd_manage_bin_files" lineno="327">
1337 <summary>
1338 Create, read, write, and delete bin files.
1339 </summary>
1340 @@ -9923,7 +9664,7 @@ Domain allowed access.
1341 </summary>
1342 </param>
1343 </interface>
1344 -<interface name="corecmd_relabel_bin_files" lineno="362">
1345 +<interface name="corecmd_relabel_bin_files" lineno="346">
1346 <summary>
1347 Relabel to and from the bin type.
1348 </summary>
1349 @@ -9933,7 +9674,7 @@ Domain allowed access.
1350 </summary>
1351 </param>
1352 </interface>
1353 -<interface name="corecmd_mmap_bin_files" lineno="381">
1354 +<interface name="corecmd_mmap_bin_files" lineno="365">
1355 <summary>
1356 Mmap a bin file as executable.
1357 </summary>
1358 @@ -9943,7 +9684,7 @@ Domain allowed access.
1359 </summary>
1360 </param>
1361 </interface>
1362 -<interface name="corecmd_bin_spec_domtrans" lineno="426">
1363 +<interface name="corecmd_bin_spec_domtrans" lineno="410">
1364 <summary>
1365 Execute a file in a bin directory
1366 in the specified domain but do not
1367 @@ -9979,7 +9720,7 @@ The type of the new process.
1368 </summary>
1369 </param>
1370 </interface>
1371 -<interface name="corecmd_bin_domtrans" lineno="469">
1372 +<interface name="corecmd_bin_domtrans" lineno="453">
1373 <summary>
1374 Execute a file in a bin directory
1375 in the specified domain.
1376 @@ -10013,7 +9754,7 @@ The type of the new process.
1377 </summary>
1378 </param>
1379 </interface>
1380 -<interface name="corecmd_check_exec_shell" lineno="488">
1381 +<interface name="corecmd_check_exec_shell" lineno="472">
1382 <summary>
1383 Check if a shell is executable (DAC-wise).
1384 </summary>
1385 @@ -10023,7 +9764,7 @@ Domain allowed access.
1386 </summary>
1387 </param>
1388 </interface>
1389 -<interface name="corecmd_exec_shell" lineno="525">
1390 +<interface name="corecmd_exec_shell" lineno="509">
1391 <summary>
1392 Execute shells in the caller domain.
1393 </summary>
1394 @@ -10051,7 +9792,7 @@ Domain allowed access.
1395 </summary>
1396 </param>
1397 </interface>
1398 -<interface name="corecmd_shell_spec_domtrans" lineno="563">
1399 +<interface name="corecmd_shell_spec_domtrans" lineno="547">
1400 <summary>
1401 Execute a shell in the target domain. This
1402 is an explicit transition, requiring the
1403 @@ -10080,7 +9821,7 @@ The type of the shell process.
1404 </summary>
1405 </param>
1406 </interface>
1407 -<interface name="corecmd_shell_domtrans" lineno="597">
1408 +<interface name="corecmd_shell_domtrans" lineno="581">
1409 <summary>
1410 Execute a shell in the specified domain.
1411 </summary>
1412 @@ -10105,7 +9846,7 @@ The type of the shell process.
1413 </summary>
1414 </param>
1415 </interface>
1416 -<interface name="corecmd_exec_chroot" lineno="616">
1417 +<interface name="corecmd_exec_chroot" lineno="600">
1418 <summary>
1419 Execute chroot in the caller domain.
1420 </summary>
1421 @@ -10115,7 +9856,7 @@ Domain allowed access.
1422 </summary>
1423 </param>
1424 </interface>
1425 -<interface name="corecmd_getattr_all_executables" lineno="637">
1426 +<interface name="corecmd_getattr_all_executables" lineno="621">
1427 <summary>
1428 Get the attributes of all executable files.
1429 </summary>
1430 @@ -10126,7 +9867,7 @@ Domain allowed access.
1431 </param>
1432 <rolecap/>
1433 </interface>
1434 -<interface name="corecmd_read_all_executables" lineno="658">
1435 +<interface name="corecmd_read_all_executables" lineno="642">
1436 <summary>
1437 Read all executable files.
1438 </summary>
1439 @@ -10137,7 +9878,7 @@ Domain allowed access.
1440 </param>
1441 <rolecap/>
1442 </interface>
1443 -<interface name="corecmd_exec_all_executables" lineno="678">
1444 +<interface name="corecmd_exec_all_executables" lineno="662">
1445 <summary>
1446 Execute all executable files.
1447 </summary>
1448 @@ -10148,7 +9889,7 @@ Domain allowed access.
1449 </param>
1450 <rolecap/>
1451 </interface>
1452 -<interface name="corecmd_dontaudit_exec_all_executables" lineno="699">
1453 +<interface name="corecmd_dontaudit_exec_all_executables" lineno="683">
1454 <summary>
1455 Do not audit attempts to execute all executables.
1456 </summary>
1457 @@ -10158,7 +9899,7 @@ Domain to not audit.
1458 </summary>
1459 </param>
1460 </interface>
1461 -<interface name="corecmd_manage_all_executables" lineno="718">
1462 +<interface name="corecmd_manage_all_executables" lineno="702">
1463 <summary>
1464 Create, read, write, and all executable files.
1465 </summary>
1466 @@ -10169,7 +9910,7 @@ Domain allowed access.
1467 </param>
1468 <rolecap/>
1469 </interface>
1470 -<interface name="corecmd_relabel_all_executables" lineno="740">
1471 +<interface name="corecmd_relabel_all_executables" lineno="724">
1472 <summary>
1473 Relabel to and from the bin type.
1474 </summary>
1475 @@ -10180,7 +9921,7 @@ Domain allowed access.
1476 </param>
1477 <rolecap/>
1478 </interface>
1479 -<interface name="corecmd_mmap_all_executables" lineno="760">
1480 +<interface name="corecmd_mmap_all_executables" lineno="744">
1481 <summary>
1482 Mmap all executables as executable.
1483 </summary>
1484 @@ -10190,7 +9931,7 @@ Domain allowed access.
1485 </summary>
1486 </param>
1487 </interface>
1488 -<interface name="corecmd_relabel_bin_dirs" lineno="782">
1489 +<interface name="corecmd_relabel_bin_dirs" lineno="766">
1490 <summary>
1491 Relabel to and from the bin type.
1492 </summary>
1493 @@ -10200,7 +9941,7 @@ Domain allowed access.
1494 </summary>
1495 </param>
1496 </interface>
1497 -<interface name="corecmd_relabel_bin_lnk_files" lineno="800">
1498 +<interface name="corecmd_relabel_bin_lnk_files" lineno="784">
1499 <summary>
1500 Relabel to and from the bin type.
1501 </summary>
1502 @@ -11928,7 +11669,7 @@ Receive packets from an unlabeled connection.
1503 Allow the specified domain to receive packets from an
1504 unlabeled connection. On machines that do not utilize
1505 labeled networking, this will be required on all
1506 -networking domains. On machines tha do utilize
1507 +networking domains. On machines that do utilize
1508 labeled networking, this will be required for any
1509 networking domain that is allowed to receive
1510 network traffic that does not have a label.
1511 @@ -12279,7 +12020,7 @@ Domain allowed access.
1512 </summary>
1513 </param>
1514 </interface>
1515 -<interface name="corenet_send_all_packets" lineno="3362">
1516 +<interface name="corenet_send_all_packets" lineno="3356">
1517 <summary>
1518 Send all packets.
1519 </summary>
1520 @@ -12289,7 +12030,7 @@ Domain allowed access.
1521 </summary>
1522 </param>
1523 </interface>
1524 -<interface name="corenet_receive_all_packets" lineno="3380">
1525 +<interface name="corenet_receive_all_packets" lineno="3374">
1526 <summary>
1527 Receive all packets.
1528 </summary>
1529 @@ -12299,7 +12040,7 @@ Domain allowed access.
1530 </summary>
1531 </param>
1532 </interface>
1533 -<interface name="corenet_sendrecv_all_packets" lineno="3398">
1534 +<interface name="corenet_sendrecv_all_packets" lineno="3392">
1535 <summary>
1536 Send and receive all packets.
1537 </summary>
1538 @@ -12309,7 +12050,7 @@ Domain allowed access.
1539 </summary>
1540 </param>
1541 </interface>
1542 -<interface name="corenet_relabelto_all_packets" lineno="3413">
1543 +<interface name="corenet_relabelto_all_packets" lineno="3407">
1544 <summary>
1545 Relabel packets to any packet type.
1546 </summary>
1547 @@ -12319,7 +12060,7 @@ Domain allowed access.
1548 </summary>
1549 </param>
1550 </interface>
1551 -<interface name="corenet_ib_access_unlabeled_pkeys" lineno="3431">
1552 +<interface name="corenet_ib_access_unlabeled_pkeys" lineno="3425">
1553 <summary>
1554 Access unlabeled infiniband pkeys.
1555 </summary>
1556 @@ -12329,7 +12070,7 @@ Domain allowed access.
1557 </summary>
1558 </param>
1559 </interface>
1560 -<interface name="corenet_ib_access_all_pkeys" lineno="3445">
1561 +<interface name="corenet_ib_access_all_pkeys" lineno="3439">
1562 <summary>
1563 Access all labeled infiniband pkeys.
1564 </summary>
1565 @@ -12339,7 +12080,7 @@ Domain allowed access.
1566 </summary>
1567 </param>
1568 </interface>
1569 -<interface name="corenet_ib_manage_subnet_all_endports" lineno="3463">
1570 +<interface name="corenet_ib_manage_subnet_all_endports" lineno="3457">
1571 <summary>
1572 Manage subnets on all labeled Infiniband endports
1573 </summary>
1574 @@ -12349,7 +12090,7 @@ Domain allowed access.
1575 </summary>
1576 </param>
1577 </interface>
1578 -<interface name="corenet_ib_manage_subnet_unlabeled_endports" lineno="3481">
1579 +<interface name="corenet_ib_manage_subnet_unlabeled_endports" lineno="3475">
1580 <summary>
1581 Manage subnet on all unlabeled Infiniband endports
1582 </summary>
1583 @@ -12359,7 +12100,7 @@ Domain allowed access.
1584 </summary>
1585 </param>
1586 </interface>
1587 -<interface name="corenet_sctp_recvfrom_labeled" lineno="3500">
1588 +<interface name="corenet_sctp_recvfrom_labeled" lineno="3494">
1589 <summary>
1590 Rules for receiving labeled SCTP packets.
1591 </summary>
1592 @@ -12374,7 +12115,7 @@ Peer domain.
1593 </summary>
1594 </param>
1595 </interface>
1596 -<interface name="corenet_unconfined" lineno="3523">
1597 +<interface name="corenet_unconfined" lineno="3517">
1598 <summary>
1599 Unconfined access to network objects.
1600 </summary>
1601 @@ -12384,7 +12125,83 @@ The domain allowed access.
1602 </summary>
1603 </param>
1604 </interface>
1605 -<interface name="corenet_tcp_sendrecv_adb_port" lineno="3543">
1606 +<interface name="corenet_send_icmp_packets" lineno="3537">
1607 +<summary>
1608 +Send icmp packets.
1609 +</summary>
1610 +<param name="domain">
1611 +<summary>
1612 +Domain allowed access.
1613 +</summary>
1614 +</param>
1615 +<infoflow type="write" weight="10"/>
1616 +</interface>
1617 +<interface name="corenet_dontaudit_send_icmp_packets" lineno="3556">
1618 +<summary>
1619 +Do not audit attempts to send icmp packets.
1620 +</summary>
1621 +<param name="domain">
1622 +<summary>
1623 +Domain to not audit.
1624 +</summary>
1625 +</param>
1626 +<infoflow type="none"/>
1627 +</interface>
1628 +<interface name="corenet_receive_icmp_packets" lineno="3575">
1629 +<summary>
1630 +Receive icmp packets.
1631 +</summary>
1632 +<param name="domain">
1633 +<summary>
1634 +Domain allowed access.
1635 +</summary>
1636 +</param>
1637 +<infoflow type="read" weight="10"/>
1638 +</interface>
1639 +<interface name="corenet_dontaudit_receive_icmp_packets" lineno="3594">
1640 +<summary>
1641 +Do not audit attempts to receive icmp packets.
1642 +</summary>
1643 +<param name="domain">
1644 +<summary>
1645 +Domain allowed access.
1646 +</summary>
1647 +</param>
1648 +<infoflow type="none"/>
1649 +</interface>
1650 +<interface name="corenet_sendrecv_icmp_packets" lineno="3613">
1651 +<summary>
1652 +Send and receive icmp packets.
1653 +</summary>
1654 +<param name="domain">
1655 +<summary>
1656 +Domain allowed access.
1657 +</summary>
1658 +</param>
1659 +<infoflow type="both" weight="10"/>
1660 +</interface>
1661 +<interface name="corenet_dontaudit_sendrecv_icmp_packets" lineno="3629">
1662 +<summary>
1663 +Do not audit attempts to send and receive icmp packets.
1664 +</summary>
1665 +<param name="domain">
1666 +<summary>
1667 +Domain to not audit.
1668 +</summary>
1669 +</param>
1670 +<infoflow type="none"/>
1671 +</interface>
1672 +<interface name="corenet_relabelto_icmp_packets" lineno="3644">
1673 +<summary>
1674 +Relabel packets to icmp the packet type.
1675 +</summary>
1676 +<param name="domain">
1677 +<summary>
1678 +Domain allowed access.
1679 +</summary>
1680 +</param>
1681 +</interface>
1682 +<interface name="corenet_tcp_sendrecv_adb_port" lineno="3666">
1683 <summary>
1684 Send and receive TCP traffic on the adb port.
1685 </summary>
1686 @@ -12395,7 +12212,7 @@ Domain allowed access.
1687 </param>
1688 <infoflow type="both" weight="10"/>
1689 </interface>
1690 -<interface name="corenet_udp_send_adb_port" lineno="3558">
1691 +<interface name="corenet_udp_send_adb_port" lineno="3681">
1692 <summary>
1693 Send UDP traffic on the adb port.
1694 </summary>
1695 @@ -12406,7 +12223,7 @@ Domain allowed access.
1696 </param>
1697 <infoflow type="write" weight="10"/>
1698 </interface>
1699 -<interface name="corenet_dontaudit_udp_send_adb_port" lineno="3573">
1700 +<interface name="corenet_dontaudit_udp_send_adb_port" lineno="3696">
1701 <summary>
1702 Do not audit attempts to send UDP traffic on the adb port.
1703 </summary>
1704 @@ -12417,7 +12234,7 @@ Domain to not audit.
1705 </param>
1706 <infoflow type="none"/>
1707 </interface>
1708 -<interface name="corenet_udp_receive_adb_port" lineno="3588">
1709 +<interface name="corenet_udp_receive_adb_port" lineno="3711">
1710 <summary>
1711 Receive UDP traffic on the adb port.
1712 </summary>
1713 @@ -12428,7 +12245,7 @@ Domain allowed access.
1714 </param>
1715 <infoflow type="read" weight="10"/>
1716 </interface>
1717 -<interface name="corenet_dontaudit_udp_receive_adb_port" lineno="3603">
1718 +<interface name="corenet_dontaudit_udp_receive_adb_port" lineno="3726">
1719 <summary>
1720 Do not audit attempts to receive UDP traffic on the adb port.
1721 </summary>
1722 @@ -12439,7 +12256,7 @@ Domain to not audit.
1723 </param>
1724 <infoflow type="none"/>
1725 </interface>
1726 -<interface name="corenet_udp_sendrecv_adb_port" lineno="3618">
1727 +<interface name="corenet_udp_sendrecv_adb_port" lineno="3741">
1728 <summary>
1729 Send and receive UDP traffic on the adb port.
1730 </summary>
1731 @@ -12450,7 +12267,7 @@ Domain allowed access.
1732 </param>
1733 <infoflow type="both" weight="10"/>
1734 </interface>
1735 -<interface name="corenet_dontaudit_udp_sendrecv_adb_port" lineno="3634">
1736 +<interface name="corenet_dontaudit_udp_sendrecv_adb_port" lineno="3757">
1737 <summary>
1738 Do not audit attempts to send and receive
1739 UDP traffic on the adb port.
1740 @@ -12462,7 +12279,7 @@ Domain to not audit.
1741 </param>
1742 <infoflow type="none"/>
1743 </interface>
1744 -<interface name="corenet_tcp_bind_adb_port" lineno="3649">
1745 +<interface name="corenet_tcp_bind_adb_port" lineno="3772">
1746 <summary>
1747 Bind TCP sockets to the adb port.
1748 </summary>
1749 @@ -12473,7 +12290,7 @@ Domain allowed access.
1750 </param>
1751 <infoflow type="none"/>
1752 </interface>
1753 -<interface name="corenet_udp_bind_adb_port" lineno="3669">
1754 +<interface name="corenet_udp_bind_adb_port" lineno="3792">
1755 <summary>
1756 Bind UDP sockets to the adb port.
1757 </summary>
1758 @@ -12484,7 +12301,7 @@ Domain allowed access.
1759 </param>
1760 <infoflow type="none"/>
1761 </interface>
1762 -<interface name="corenet_tcp_connect_adb_port" lineno="3688">
1763 +<interface name="corenet_tcp_connect_adb_port" lineno="3811">
1764 <summary>
1765 Make a TCP connection to the adb port.
1766 </summary>
1767 @@ -12494,7 +12311,7 @@ Domain allowed access.
1768 </summary>
1769 </param>
1770 </interface>
1771 -<interface name="corenet_send_adb_client_packets" lineno="3708">
1772 +<interface name="corenet_send_adb_client_packets" lineno="3831">
1773 <summary>
1774 Send adb_client packets.
1775 </summary>
1776 @@ -12505,7 +12322,7 @@ Domain allowed access.
1777 </param>
1778 <infoflow type="write" weight="10"/>
1779 </interface>
1780 -<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3727">
1781 +<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3850">
1782 <summary>
1783 Do not audit attempts to send adb_client packets.
1784 </summary>
1785 @@ -12516,7 +12333,7 @@ Domain to not audit.
1786 </param>
1787 <infoflow type="none"/>
1788 </interface>
1789 -<interface name="corenet_receive_adb_client_packets" lineno="3746">
1790 +<interface name="corenet_receive_adb_client_packets" lineno="3869">
1791 <summary>
1792 Receive adb_client packets.
1793 </summary>
1794 @@ -12527,7 +12344,7 @@ Domain allowed access.
1795 </param>
1796 <infoflow type="read" weight="10"/>
1797 </interface>
1798 -<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3765">
1799 +<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3888">
1800 <summary>
1801 Do not audit attempts to receive adb_client packets.
1802 </summary>
1803 @@ -12538,7 +12355,7 @@ Domain allowed access.
1804 </param>
1805 <infoflow type="none"/>
1806 </interface>
1807 -<interface name="corenet_sendrecv_adb_client_packets" lineno="3784">
1808 +<interface name="corenet_sendrecv_adb_client_packets" lineno="3907">
1809 <summary>
1810 Send and receive adb_client packets.
1811 </summary>
1812 @@ -12549,7 +12366,7 @@ Domain allowed access.
1813 </param>
1814 <infoflow type="both" weight="10"/>
1815 </interface>
1816 -<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3800">
1817 +<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3923">
1818 <summary>
1819 Do not audit attempts to send and receive adb_client packets.
1820 </summary>
1821 @@ -12560,7 +12377,7 @@ Domain to not audit.
1822 </param>
1823 <infoflow type="none"/>
1824 </interface>
1825 -<interface name="corenet_relabelto_adb_client_packets" lineno="3815">
1826 +<interface name="corenet_relabelto_adb_client_packets" lineno="3938">
1827 <summary>
1828 Relabel packets to adb_client the packet type.
1829 </summary>
1830 @@ -12570,7 +12387,7 @@ Domain allowed access.
1831 </summary>
1832 </param>
1833 </interface>
1834 -<interface name="corenet_send_adb_server_packets" lineno="3835">
1835 +<interface name="corenet_send_adb_server_packets" lineno="3958">
1836 <summary>
1837 Send adb_server packets.
1838 </summary>
1839 @@ -12581,7 +12398,7 @@ Domain allowed access.
1840 </param>
1841 <infoflow type="write" weight="10"/>
1842 </interface>
1843 -<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3854">
1844 +<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3977">
1845 <summary>
1846 Do not audit attempts to send adb_server packets.
1847 </summary>
1848 @@ -12592,7 +12409,7 @@ Domain to not audit.
1849 </param>
1850 <infoflow type="none"/>
1851 </interface>
1852 -<interface name="corenet_receive_adb_server_packets" lineno="3873">
1853 +<interface name="corenet_receive_adb_server_packets" lineno="3996">
1854 <summary>
1855 Receive adb_server packets.
1856 </summary>
1857 @@ -12603,7 +12420,7 @@ Domain allowed access.
1858 </param>
1859 <infoflow type="read" weight="10"/>
1860 </interface>
1861 -<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="3892">
1862 +<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="4015">
1863 <summary>
1864 Do not audit attempts to receive adb_server packets.
1865 </summary>
1866 @@ -12614,7 +12431,7 @@ Domain allowed access.
1867 </param>
1868 <infoflow type="none"/>
1869 </interface>
1870 -<interface name="corenet_sendrecv_adb_server_packets" lineno="3911">
1871 +<interface name="corenet_sendrecv_adb_server_packets" lineno="4034">
1872 <summary>
1873 Send and receive adb_server packets.
1874 </summary>
1875 @@ -12625,7 +12442,7 @@ Domain allowed access.
1876 </param>
1877 <infoflow type="both" weight="10"/>
1878 </interface>
1879 -<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="3927">
1880 +<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="4050">
1881 <summary>
1882 Do not audit attempts to send and receive adb_server packets.
1883 </summary>
1884 @@ -12636,7 +12453,7 @@ Domain to not audit.
1885 </param>
1886 <infoflow type="none"/>
1887 </interface>
1888 -<interface name="corenet_relabelto_adb_server_packets" lineno="3942">
1889 +<interface name="corenet_relabelto_adb_server_packets" lineno="4065">
1890 <summary>
1891 Relabel packets to adb_server the packet type.
1892 </summary>
1893 @@ -12646,7 +12463,7 @@ Domain allowed access.
1894 </summary>
1895 </param>
1896 </interface>
1897 -<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="3964">
1898 +<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="4087">
1899 <summary>
1900 Send and receive TCP traffic on the afs_bos port.
1901 </summary>
1902 @@ -12657,7 +12474,7 @@ Domain allowed access.
1903 </param>
1904 <infoflow type="both" weight="10"/>
1905 </interface>
1906 -<interface name="corenet_udp_send_afs_bos_port" lineno="3979">
1907 +<interface name="corenet_udp_send_afs_bos_port" lineno="4102">
1908 <summary>
1909 Send UDP traffic on the afs_bos port.
1910 </summary>
1911 @@ -12668,7 +12485,7 @@ Domain allowed access.
1912 </param>
1913 <infoflow type="write" weight="10"/>
1914 </interface>
1915 -<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="3994">
1916 +<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="4117">
1917 <summary>
1918 Do not audit attempts to send UDP traffic on the afs_bos port.
1919 </summary>
1920 @@ -12679,7 +12496,7 @@ Domain to not audit.
1921 </param>
1922 <infoflow type="none"/>
1923 </interface>
1924 -<interface name="corenet_udp_receive_afs_bos_port" lineno="4009">
1925 +<interface name="corenet_udp_receive_afs_bos_port" lineno="4132">
1926 <summary>
1927 Receive UDP traffic on the afs_bos port.
1928 </summary>
1929 @@ -12690,7 +12507,7 @@ Domain allowed access.
1930 </param>
1931 <infoflow type="read" weight="10"/>
1932 </interface>
1933 -<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="4024">
1934 +<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="4147">
1935 <summary>
1936 Do not audit attempts to receive UDP traffic on the afs_bos port.
1937 </summary>
1938 @@ -12701,7 +12518,7 @@ Domain to not audit.
1939 </param>
1940 <infoflow type="none"/>
1941 </interface>
1942 -<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="4039">
1943 +<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="4162">
1944 <summary>
1945 Send and receive UDP traffic on the afs_bos port.
1946 </summary>
1947 @@ -12712,7 +12529,7 @@ Domain allowed access.
1948 </param>
1949 <infoflow type="both" weight="10"/>
1950 </interface>
1951 -<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="4055">
1952 +<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="4178">
1953 <summary>
1954 Do not audit attempts to send and receive
1955 UDP traffic on the afs_bos port.
1956 @@ -12724,7 +12541,7 @@ Domain to not audit.
1957 </param>
1958 <infoflow type="none"/>
1959 </interface>
1960 -<interface name="corenet_tcp_bind_afs_bos_port" lineno="4070">
1961 +<interface name="corenet_tcp_bind_afs_bos_port" lineno="4193">
1962 <summary>
1963 Bind TCP sockets to the afs_bos port.
1964 </summary>
1965 @@ -12735,7 +12552,7 @@ Domain allowed access.
1966 </param>
1967 <infoflow type="none"/>
1968 </interface>
1969 -<interface name="corenet_udp_bind_afs_bos_port" lineno="4090">
1970 +<interface name="corenet_udp_bind_afs_bos_port" lineno="4213">
1971 <summary>
1972 Bind UDP sockets to the afs_bos port.
1973 </summary>
1974 @@ -12746,7 +12563,7 @@ Domain allowed access.
1975 </param>
1976 <infoflow type="none"/>
1977 </interface>
1978 -<interface name="corenet_tcp_connect_afs_bos_port" lineno="4109">
1979 +<interface name="corenet_tcp_connect_afs_bos_port" lineno="4232">
1980 <summary>
1981 Make a TCP connection to the afs_bos port.
1982 </summary>
1983 @@ -12756,7 +12573,7 @@ Domain allowed access.
1984 </summary>
1985 </param>
1986 </interface>
1987 -<interface name="corenet_send_afs_bos_client_packets" lineno="4129">
1988 +<interface name="corenet_send_afs_bos_client_packets" lineno="4252">
1989 <summary>
1990 Send afs_bos_client packets.
1991 </summary>
1992 @@ -12767,7 +12584,7 @@ Domain allowed access.
1993 </param>
1994 <infoflow type="write" weight="10"/>
1995 </interface>
1996 -<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4148">
1997 +<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4271">
1998 <summary>
1999 Do not audit attempts to send afs_bos_client packets.
2000 </summary>
2001 @@ -12778,7 +12595,7 @@ Domain to not audit.
2002 </param>
2003 <infoflow type="none"/>
2004 </interface>
2005 -<interface name="corenet_receive_afs_bos_client_packets" lineno="4167">
2006 +<interface name="corenet_receive_afs_bos_client_packets" lineno="4290">
2007 <summary>
2008 Receive afs_bos_client packets.
2009 </summary>
2010 @@ -12789,7 +12606,7 @@ Domain allowed access.
2011 </param>
2012 <infoflow type="read" weight="10"/>
2013 </interface>
2014 -<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4186">
2015 +<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4309">
2016 <summary>
2017 Do not audit attempts to receive afs_bos_client packets.
2018 </summary>
2019 @@ -12800,7 +12617,7 @@ Domain allowed access.
2020 </param>
2021 <infoflow type="none"/>
2022 </interface>
2023 -<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4205">
2024 +<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4328">
2025 <summary>
2026 Send and receive afs_bos_client packets.
2027 </summary>
2028 @@ -12811,7 +12628,7 @@ Domain allowed access.
2029 </param>
2030 <infoflow type="both" weight="10"/>
2031 </interface>
2032 -<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4221">
2033 +<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4344">
2034 <summary>
2035 Do not audit attempts to send and receive afs_bos_client packets.
2036 </summary>
2037 @@ -12822,7 +12639,7 @@ Domain to not audit.
2038 </param>
2039 <infoflow type="none"/>
2040 </interface>
2041 -<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4236">
2042 +<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4359">
2043 <summary>
2044 Relabel packets to afs_bos_client the packet type.
2045 </summary>
2046 @@ -12832,7 +12649,7 @@ Domain allowed access.
2047 </summary>
2048 </param>
2049 </interface>
2050 -<interface name="corenet_send_afs_bos_server_packets" lineno="4256">
2051 +<interface name="corenet_send_afs_bos_server_packets" lineno="4379">
2052 <summary>
2053 Send afs_bos_server packets.
2054 </summary>
2055 @@ -12843,7 +12660,7 @@ Domain allowed access.
2056 </param>
2057 <infoflow type="write" weight="10"/>
2058 </interface>
2059 -<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4275">
2060 +<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4398">
2061 <summary>
2062 Do not audit attempts to send afs_bos_server packets.
2063 </summary>
2064 @@ -12854,7 +12671,7 @@ Domain to not audit.
2065 </param>
2066 <infoflow type="none"/>
2067 </interface>
2068 -<interface name="corenet_receive_afs_bos_server_packets" lineno="4294">
2069 +<interface name="corenet_receive_afs_bos_server_packets" lineno="4417">
2070 <summary>
2071 Receive afs_bos_server packets.
2072 </summary>
2073 @@ -12865,7 +12682,7 @@ Domain allowed access.
2074 </param>
2075 <infoflow type="read" weight="10"/>
2076 </interface>
2077 -<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4313">
2078 +<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4436">
2079 <summary>
2080 Do not audit attempts to receive afs_bos_server packets.
2081 </summary>
2082 @@ -12876,7 +12693,7 @@ Domain allowed access.
2083 </param>
2084 <infoflow type="none"/>
2085 </interface>
2086 -<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4332">
2087 +<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4455">
2088 <summary>
2089 Send and receive afs_bos_server packets.
2090 </summary>
2091 @@ -12887,7 +12704,7 @@ Domain allowed access.
2092 </param>
2093 <infoflow type="both" weight="10"/>
2094 </interface>
2095 -<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4348">
2096 +<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4471">
2097 <summary>
2098 Do not audit attempts to send and receive afs_bos_server packets.
2099 </summary>
2100 @@ -12898,7 +12715,7 @@ Domain to not audit.
2101 </param>
2102 <infoflow type="none"/>
2103 </interface>
2104 -<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4363">
2105 +<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4486">
2106 <summary>
2107 Relabel packets to afs_bos_server the packet type.
2108 </summary>
2109 @@ -12908,7 +12725,7 @@ Domain allowed access.
2110 </summary>
2111 </param>
2112 </interface>
2113 -<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="4385">
2114 +<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="4508">
2115 <summary>
2116 Send and receive TCP traffic on the afs_fs port.
2117 </summary>
2118 @@ -12919,7 +12736,7 @@ Domain allowed access.
2119 </param>
2120 <infoflow type="both" weight="10"/>
2121 </interface>
2122 -<interface name="corenet_udp_send_afs_fs_port" lineno="4400">
2123 +<interface name="corenet_udp_send_afs_fs_port" lineno="4523">
2124 <summary>
2125 Send UDP traffic on the afs_fs port.
2126 </summary>
2127 @@ -12930,7 +12747,7 @@ Domain allowed access.
2128 </param>
2129 <infoflow type="write" weight="10"/>
2130 </interface>
2131 -<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="4415">
2132 +<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="4538">
2133 <summary>
2134 Do not audit attempts to send UDP traffic on the afs_fs port.
2135 </summary>
2136 @@ -12941,7 +12758,7 @@ Domain to not audit.
2137 </param>
2138 <infoflow type="none"/>
2139 </interface>
2140 -<interface name="corenet_udp_receive_afs_fs_port" lineno="4430">
2141 +<interface name="corenet_udp_receive_afs_fs_port" lineno="4553">
2142 <summary>
2143 Receive UDP traffic on the afs_fs port.
2144 </summary>
2145 @@ -12952,7 +12769,7 @@ Domain allowed access.
2146 </param>
2147 <infoflow type="read" weight="10"/>
2148 </interface>
2149 -<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="4445">
2150 +<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="4568">
2151 <summary>
2152 Do not audit attempts to receive UDP traffic on the afs_fs port.
2153 </summary>
2154 @@ -12963,7 +12780,7 @@ Domain to not audit.
2155 </param>
2156 <infoflow type="none"/>
2157 </interface>
2158 -<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="4460">
2159 +<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="4583">
2160 <summary>
2161 Send and receive UDP traffic on the afs_fs port.
2162 </summary>
2163 @@ -12974,7 +12791,7 @@ Domain allowed access.
2164 </param>
2165 <infoflow type="both" weight="10"/>
2166 </interface>
2167 -<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="4476">
2168 +<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="4599">
2169 <summary>
2170 Do not audit attempts to send and receive
2171 UDP traffic on the afs_fs port.
2172 @@ -12986,7 +12803,7 @@ Domain to not audit.
2173 </param>
2174 <infoflow type="none"/>
2175 </interface>
2176 -<interface name="corenet_tcp_bind_afs_fs_port" lineno="4491">
2177 +<interface name="corenet_tcp_bind_afs_fs_port" lineno="4614">
2178 <summary>
2179 Bind TCP sockets to the afs_fs port.
2180 </summary>
2181 @@ -12997,7 +12814,7 @@ Domain allowed access.
2182 </param>
2183 <infoflow type="none"/>
2184 </interface>
2185 -<interface name="corenet_udp_bind_afs_fs_port" lineno="4511">
2186 +<interface name="corenet_udp_bind_afs_fs_port" lineno="4634">
2187 <summary>
2188 Bind UDP sockets to the afs_fs port.
2189 </summary>
2190 @@ -13008,7 +12825,7 @@ Domain allowed access.
2191 </param>
2192 <infoflow type="none"/>
2193 </interface>
2194 -<interface name="corenet_tcp_connect_afs_fs_port" lineno="4530">
2195 +<interface name="corenet_tcp_connect_afs_fs_port" lineno="4653">
2196 <summary>
2197 Make a TCP connection to the afs_fs port.
2198 </summary>
2199 @@ -13018,7 +12835,7 @@ Domain allowed access.
2200 </summary>
2201 </param>
2202 </interface>
2203 -<interface name="corenet_send_afs_fs_client_packets" lineno="4550">
2204 +<interface name="corenet_send_afs_fs_client_packets" lineno="4673">
2205 <summary>
2206 Send afs_fs_client packets.
2207 </summary>
2208 @@ -13029,7 +12846,7 @@ Domain allowed access.
2209 </param>
2210 <infoflow type="write" weight="10"/>
2211 </interface>
2212 -<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4569">
2213 +<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4692">
2214 <summary>
2215 Do not audit attempts to send afs_fs_client packets.
2216 </summary>
2217 @@ -13040,7 +12857,7 @@ Domain to not audit.
2218 </param>
2219 <infoflow type="none"/>
2220 </interface>
2221 -<interface name="corenet_receive_afs_fs_client_packets" lineno="4588">
2222 +<interface name="corenet_receive_afs_fs_client_packets" lineno="4711">
2223 <summary>
2224 Receive afs_fs_client packets.
2225 </summary>
2226 @@ -13051,7 +12868,7 @@ Domain allowed access.
2227 </param>
2228 <infoflow type="read" weight="10"/>
2229 </interface>
2230 -<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4607">
2231 +<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4730">
2232 <summary>
2233 Do not audit attempts to receive afs_fs_client packets.
2234 </summary>
2235 @@ -13062,7 +12879,7 @@ Domain allowed access.
2236 </param>
2237 <infoflow type="none"/>
2238 </interface>
2239 -<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4626">
2240 +<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4749">
2241 <summary>
2242 Send and receive afs_fs_client packets.
2243 </summary>
2244 @@ -13073,7 +12890,7 @@ Domain allowed access.
2245 </param>
2246 <infoflow type="both" weight="10"/>
2247 </interface>
2248 -<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4642">
2249 +<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4765">
2250 <summary>
2251 Do not audit attempts to send and receive afs_fs_client packets.
2252 </summary>
2253 @@ -13084,7 +12901,7 @@ Domain to not audit.
2254 </param>
2255 <infoflow type="none"/>
2256 </interface>
2257 -<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4657">
2258 +<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4780">
2259 <summary>
2260 Relabel packets to afs_fs_client the packet type.
2261 </summary>
2262 @@ -13094,7 +12911,7 @@ Domain allowed access.
2263 </summary>
2264 </param>
2265 </interface>
2266 -<interface name="corenet_send_afs_fs_server_packets" lineno="4677">
2267 +<interface name="corenet_send_afs_fs_server_packets" lineno="4800">
2268 <summary>
2269 Send afs_fs_server packets.
2270 </summary>
2271 @@ -13105,7 +12922,7 @@ Domain allowed access.
2272 </param>
2273 <infoflow type="write" weight="10"/>
2274 </interface>
2275 -<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4696">
2276 +<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4819">
2277 <summary>
2278 Do not audit attempts to send afs_fs_server packets.
2279 </summary>
2280 @@ -13116,7 +12933,7 @@ Domain to not audit.
2281 </param>
2282 <infoflow type="none"/>
2283 </interface>
2284 -<interface name="corenet_receive_afs_fs_server_packets" lineno="4715">
2285 +<interface name="corenet_receive_afs_fs_server_packets" lineno="4838">
2286 <summary>
2287 Receive afs_fs_server packets.
2288 </summary>
2289 @@ -13127,7 +12944,7 @@ Domain allowed access.
2290 </param>
2291 <infoflow type="read" weight="10"/>
2292 </interface>
2293 -<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4734">
2294 +<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4857">
2295 <summary>
2296 Do not audit attempts to receive afs_fs_server packets.
2297 </summary>
2298 @@ -13138,7 +12955,7 @@ Domain allowed access.
2299 </param>
2300 <infoflow type="none"/>
2301 </interface>
2302 -<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4753">
2303 +<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4876">
2304 <summary>
2305 Send and receive afs_fs_server packets.
2306 </summary>
2307 @@ -13149,7 +12966,7 @@ Domain allowed access.
2308 </param>
2309 <infoflow type="both" weight="10"/>
2310 </interface>
2311 -<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4769">
2312 +<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4892">
2313 <summary>
2314 Do not audit attempts to send and receive afs_fs_server packets.
2315 </summary>
2316 @@ -13160,7 +12977,7 @@ Domain to not audit.
2317 </param>
2318 <infoflow type="none"/>
2319 </interface>
2320 -<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4784">
2321 +<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4907">
2322 <summary>
2323 Relabel packets to afs_fs_server the packet type.
2324 </summary>
2325 @@ -13170,7 +12987,7 @@ Domain allowed access.
2326 </summary>
2327 </param>
2328 </interface>
2329 -<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4806">
2330 +<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4929">
2331 <summary>
2332 Send and receive TCP traffic on the afs_ka port.
2333 </summary>
2334 @@ -13181,7 +12998,7 @@ Domain allowed access.
2335 </param>
2336 <infoflow type="both" weight="10"/>
2337 </interface>
2338 -<interface name="corenet_udp_send_afs_ka_port" lineno="4821">
2339 +<interface name="corenet_udp_send_afs_ka_port" lineno="4944">
2340 <summary>
2341 Send UDP traffic on the afs_ka port.
2342 </summary>
2343 @@ -13192,7 +13009,7 @@ Domain allowed access.
2344 </param>
2345 <infoflow type="write" weight="10"/>
2346 </interface>
2347 -<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4836">
2348 +<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4959">
2349 <summary>
2350 Do not audit attempts to send UDP traffic on the afs_ka port.
2351 </summary>
2352 @@ -13203,7 +13020,7 @@ Domain to not audit.
2353 </param>
2354 <infoflow type="none"/>
2355 </interface>
2356 -<interface name="corenet_udp_receive_afs_ka_port" lineno="4851">
2357 +<interface name="corenet_udp_receive_afs_ka_port" lineno="4974">
2358 <summary>
2359 Receive UDP traffic on the afs_ka port.
2360 </summary>
2361 @@ -13214,7 +13031,7 @@ Domain allowed access.
2362 </param>
2363 <infoflow type="read" weight="10"/>
2364 </interface>
2365 -<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="4866">
2366 +<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="4989">
2367 <summary>
2368 Do not audit attempts to receive UDP traffic on the afs_ka port.
2369 </summary>
2370 @@ -13225,7 +13042,7 @@ Domain to not audit.
2371 </param>
2372 <infoflow type="none"/>
2373 </interface>
2374 -<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="4881">
2375 +<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="5004">
2376 <summary>
2377 Send and receive UDP traffic on the afs_ka port.
2378 </summary>
2379 @@ -13236,7 +13053,7 @@ Domain allowed access.
2380 </param>
2381 <infoflow type="both" weight="10"/>
2382 </interface>
2383 -<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="4897">
2384 +<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="5020">
2385 <summary>
2386 Do not audit attempts to send and receive
2387 UDP traffic on the afs_ka port.
2388 @@ -13248,7 +13065,7 @@ Domain to not audit.
2389 </param>
2390 <infoflow type="none"/>
2391 </interface>
2392 -<interface name="corenet_tcp_bind_afs_ka_port" lineno="4912">
2393 +<interface name="corenet_tcp_bind_afs_ka_port" lineno="5035">
2394 <summary>
2395 Bind TCP sockets to the afs_ka port.
2396 </summary>
2397 @@ -13259,7 +13076,7 @@ Domain allowed access.
2398 </param>
2399 <infoflow type="none"/>
2400 </interface>
2401 -<interface name="corenet_udp_bind_afs_ka_port" lineno="4932">
2402 +<interface name="corenet_udp_bind_afs_ka_port" lineno="5055">
2403 <summary>
2404 Bind UDP sockets to the afs_ka port.
2405 </summary>
2406 @@ -13270,7 +13087,7 @@ Domain allowed access.
2407 </param>
2408 <infoflow type="none"/>
2409 </interface>
2410 -<interface name="corenet_tcp_connect_afs_ka_port" lineno="4951">
2411 +<interface name="corenet_tcp_connect_afs_ka_port" lineno="5074">
2412 <summary>
2413 Make a TCP connection to the afs_ka port.
2414 </summary>
2415 @@ -13280,7 +13097,7 @@ Domain allowed access.
2416 </summary>
2417 </param>
2418 </interface>
2419 -<interface name="corenet_send_afs_ka_client_packets" lineno="4971">
2420 +<interface name="corenet_send_afs_ka_client_packets" lineno="5094">
2421 <summary>
2422 Send afs_ka_client packets.
2423 </summary>
2424 @@ -13291,7 +13108,7 @@ Domain allowed access.
2425 </param>
2426 <infoflow type="write" weight="10"/>
2427 </interface>
2428 -<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="4990">
2429 +<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="5113">
2430 <summary>
2431 Do not audit attempts to send afs_ka_client packets.
2432 </summary>
2433 @@ -13302,7 +13119,7 @@ Domain to not audit.
2434 </param>
2435 <infoflow type="none"/>
2436 </interface>
2437 -<interface name="corenet_receive_afs_ka_client_packets" lineno="5009">
2438 +<interface name="corenet_receive_afs_ka_client_packets" lineno="5132">
2439 <summary>
2440 Receive afs_ka_client packets.
2441 </summary>
2442 @@ -13313,7 +13130,7 @@ Domain allowed access.
2443 </param>
2444 <infoflow type="read" weight="10"/>
2445 </interface>
2446 -<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="5028">
2447 +<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="5151">
2448 <summary>
2449 Do not audit attempts to receive afs_ka_client packets.
2450 </summary>
2451 @@ -13324,7 +13141,7 @@ Domain allowed access.
2452 </param>
2453 <infoflow type="none"/>
2454 </interface>
2455 -<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="5047">
2456 +<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="5170">
2457 <summary>
2458 Send and receive afs_ka_client packets.
2459 </summary>
2460 @@ -13335,7 +13152,7 @@ Domain allowed access.
2461 </param>
2462 <infoflow type="both" weight="10"/>
2463 </interface>
2464 -<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="5063">
2465 +<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="5186">
2466 <summary>
2467 Do not audit attempts to send and receive afs_ka_client packets.
2468 </summary>
2469 @@ -13346,7 +13163,7 @@ Domain to not audit.
2470 </param>
2471 <infoflow type="none"/>
2472 </interface>
2473 -<interface name="corenet_relabelto_afs_ka_client_packets" lineno="5078">
2474 +<interface name="corenet_relabelto_afs_ka_client_packets" lineno="5201">
2475 <summary>
2476 Relabel packets to afs_ka_client the packet type.
2477 </summary>
2478 @@ -13356,7 +13173,7 @@ Domain allowed access.
2479 </summary>
2480 </param>
2481 </interface>
2482 -<interface name="corenet_send_afs_ka_server_packets" lineno="5098">
2483 +<interface name="corenet_send_afs_ka_server_packets" lineno="5221">
2484 <summary>
2485 Send afs_ka_server packets.
2486 </summary>
2487 @@ -13367,7 +13184,7 @@ Domain allowed access.
2488 </param>
2489 <infoflow type="write" weight="10"/>
2490 </interface>
2491 -<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="5117">
2492 +<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="5240">
2493 <summary>
2494 Do not audit attempts to send afs_ka_server packets.
2495 </summary>
2496 @@ -13378,7 +13195,7 @@ Domain to not audit.
2497 </param>
2498 <infoflow type="none"/>
2499 </interface>
2500 -<interface name="corenet_receive_afs_ka_server_packets" lineno="5136">
2501 +<interface name="corenet_receive_afs_ka_server_packets" lineno="5259">
2502 <summary>
2503 Receive afs_ka_server packets.
2504 </summary>
2505 @@ -13389,7 +13206,7 @@ Domain allowed access.
2506 </param>
2507 <infoflow type="read" weight="10"/>
2508 </interface>
2509 -<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="5155">
2510 +<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="5278">
2511 <summary>
2512 Do not audit attempts to receive afs_ka_server packets.
2513 </summary>
2514 @@ -13400,7 +13217,7 @@ Domain allowed access.
2515 </param>
2516 <infoflow type="none"/>
2517 </interface>
2518 -<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="5174">
2519 +<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="5297">
2520 <summary>
2521 Send and receive afs_ka_server packets.
2522 </summary>
2523 @@ -13411,7 +13228,7 @@ Domain allowed access.
2524 </param>
2525 <infoflow type="both" weight="10"/>
2526 </interface>
2527 -<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="5190">
2528 +<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="5313">
2529 <summary>
2530 Do not audit attempts to send and receive afs_ka_server packets.
2531 </summary>
2532 @@ -13422,7 +13239,7 @@ Domain to not audit.
2533 </param>
2534 <infoflow type="none"/>
2535 </interface>
2536 -<interface name="corenet_relabelto_afs_ka_server_packets" lineno="5205">
2537 +<interface name="corenet_relabelto_afs_ka_server_packets" lineno="5328">
2538 <summary>
2539 Relabel packets to afs_ka_server the packet type.
2540 </summary>
2541 @@ -13432,7 +13249,7 @@ Domain allowed access.
2542 </summary>
2543 </param>
2544 </interface>
2545 -<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="5227">
2546 +<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="5350">
2547 <summary>
2548 Send and receive TCP traffic on the afs_pt port.
2549 </summary>
2550 @@ -13443,7 +13260,7 @@ Domain allowed access.
2551 </param>
2552 <infoflow type="both" weight="10"/>
2553 </interface>
2554 -<interface name="corenet_udp_send_afs_pt_port" lineno="5242">
2555 +<interface name="corenet_udp_send_afs_pt_port" lineno="5365">
2556 <summary>
2557 Send UDP traffic on the afs_pt port.
2558 </summary>
2559 @@ -13454,7 +13271,7 @@ Domain allowed access.
2560 </param>
2561 <infoflow type="write" weight="10"/>
2562 </interface>
2563 -<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="5257">
2564 +<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="5380">
2565 <summary>
2566 Do not audit attempts to send UDP traffic on the afs_pt port.
2567 </summary>
2568 @@ -13465,7 +13282,7 @@ Domain to not audit.
2569 </param>
2570 <infoflow type="none"/>
2571 </interface>
2572 -<interface name="corenet_udp_receive_afs_pt_port" lineno="5272">
2573 +<interface name="corenet_udp_receive_afs_pt_port" lineno="5395">
2574 <summary>
2575 Receive UDP traffic on the afs_pt port.
2576 </summary>
2577 @@ -13476,7 +13293,7 @@ Domain allowed access.
2578 </param>
2579 <infoflow type="read" weight="10"/>
2580 </interface>
2581 -<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="5287">
2582 +<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="5410">
2583 <summary>
2584 Do not audit attempts to receive UDP traffic on the afs_pt port.
2585 </summary>
2586 @@ -13487,7 +13304,7 @@ Domain to not audit.
2587 </param>
2588 <infoflow type="none"/>
2589 </interface>
2590 -<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="5302">
2591 +<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="5425">
2592 <summary>
2593 Send and receive UDP traffic on the afs_pt port.
2594 </summary>
2595 @@ -13498,7 +13315,7 @@ Domain allowed access.
2596 </param>
2597 <infoflow type="both" weight="10"/>
2598 </interface>
2599 -<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="5318">
2600 +<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="5441">
2601 <summary>
2602 Do not audit attempts to send and receive
2603 UDP traffic on the afs_pt port.
2604 @@ -13510,7 +13327,7 @@ Domain to not audit.
2605 </param>
2606 <infoflow type="none"/>
2607 </interface>
2608 -<interface name="corenet_tcp_bind_afs_pt_port" lineno="5333">
2609 +<interface name="corenet_tcp_bind_afs_pt_port" lineno="5456">
2610 <summary>
2611 Bind TCP sockets to the afs_pt port.
2612 </summary>
2613 @@ -13521,7 +13338,7 @@ Domain allowed access.
2614 </param>
2615 <infoflow type="none"/>
2616 </interface>
2617 -<interface name="corenet_udp_bind_afs_pt_port" lineno="5353">
2618 +<interface name="corenet_udp_bind_afs_pt_port" lineno="5476">
2619 <summary>
2620 Bind UDP sockets to the afs_pt port.
2621 </summary>
2622 @@ -13532,7 +13349,7 @@ Domain allowed access.
2623 </param>
2624 <infoflow type="none"/>
2625 </interface>
2626 -<interface name="corenet_tcp_connect_afs_pt_port" lineno="5372">
2627 +<interface name="corenet_tcp_connect_afs_pt_port" lineno="5495">
2628 <summary>
2629 Make a TCP connection to the afs_pt port.
2630 </summary>
2631 @@ -13542,7 +13359,7 @@ Domain allowed access.
2632 </summary>
2633 </param>
2634 </interface>
2635 -<interface name="corenet_send_afs_pt_client_packets" lineno="5392">
2636 +<interface name="corenet_send_afs_pt_client_packets" lineno="5515">
2637 <summary>
2638 Send afs_pt_client packets.
2639 </summary>
2640 @@ -13553,7 +13370,7 @@ Domain allowed access.
2641 </param>
2642 <infoflow type="write" weight="10"/>
2643 </interface>
2644 -<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5411">
2645 +<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5534">
2646 <summary>
2647 Do not audit attempts to send afs_pt_client packets.
2648 </summary>
2649 @@ -13564,7 +13381,7 @@ Domain to not audit.
2650 </param>
2651 <infoflow type="none"/>
2652 </interface>
2653 -<interface name="corenet_receive_afs_pt_client_packets" lineno="5430">
2654 +<interface name="corenet_receive_afs_pt_client_packets" lineno="5553">
2655 <summary>
2656 Receive afs_pt_client packets.
2657 </summary>
2658 @@ -13575,7 +13392,7 @@ Domain allowed access.
2659 </param>
2660 <infoflow type="read" weight="10"/>
2661 </interface>
2662 -<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5449">
2663 +<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5572">
2664 <summary>
2665 Do not audit attempts to receive afs_pt_client packets.
2666 </summary>
2667 @@ -13586,7 +13403,7 @@ Domain allowed access.
2668 </param>
2669 <infoflow type="none"/>
2670 </interface>
2671 -<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5468">
2672 +<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5591">
2673 <summary>
2674 Send and receive afs_pt_client packets.
2675 </summary>
2676 @@ -13597,7 +13414,7 @@ Domain allowed access.
2677 </param>
2678 <infoflow type="both" weight="10"/>
2679 </interface>
2680 -<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5484">
2681 +<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5607">
2682 <summary>
2683 Do not audit attempts to send and receive afs_pt_client packets.
2684 </summary>
2685 @@ -13608,7 +13425,7 @@ Domain to not audit.
2686 </param>
2687 <infoflow type="none"/>
2688 </interface>
2689 -<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5499">
2690 +<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5622">
2691 <summary>
2692 Relabel packets to afs_pt_client the packet type.
2693 </summary>
2694 @@ -13618,7 +13435,7 @@ Domain allowed access.
2695 </summary>
2696 </param>
2697 </interface>
2698 -<interface name="corenet_send_afs_pt_server_packets" lineno="5519">
2699 +<interface name="corenet_send_afs_pt_server_packets" lineno="5642">
2700 <summary>
2701 Send afs_pt_server packets.
2702 </summary>
2703 @@ -13629,7 +13446,7 @@ Domain allowed access.
2704 </param>
2705 <infoflow type="write" weight="10"/>
2706 </interface>
2707 -<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5538">
2708 +<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5661">
2709 <summary>
2710 Do not audit attempts to send afs_pt_server packets.
2711 </summary>
2712 @@ -13640,7 +13457,7 @@ Domain to not audit.
2713 </param>
2714 <infoflow type="none"/>
2715 </interface>
2716 -<interface name="corenet_receive_afs_pt_server_packets" lineno="5557">
2717 +<interface name="corenet_receive_afs_pt_server_packets" lineno="5680">
2718 <summary>
2719 Receive afs_pt_server packets.
2720 </summary>
2721 @@ -13651,7 +13468,7 @@ Domain allowed access.
2722 </param>
2723 <infoflow type="read" weight="10"/>
2724 </interface>
2725 -<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5576">
2726 +<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5699">
2727 <summary>
2728 Do not audit attempts to receive afs_pt_server packets.
2729 </summary>
2730 @@ -13662,7 +13479,7 @@ Domain allowed access.
2731 </param>
2732 <infoflow type="none"/>
2733 </interface>
2734 -<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5595">
2735 +<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5718">
2736 <summary>
2737 Send and receive afs_pt_server packets.
2738 </summary>
2739 @@ -13673,7 +13490,7 @@ Domain allowed access.
2740 </param>
2741 <infoflow type="both" weight="10"/>
2742 </interface>
2743 -<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5611">
2744 +<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5734">
2745 <summary>
2746 Do not audit attempts to send and receive afs_pt_server packets.
2747 </summary>
2748 @@ -13684,7 +13501,7 @@ Domain to not audit.
2749 </param>
2750 <infoflow type="none"/>
2751 </interface>
2752 -<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5626">
2753 +<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5749">
2754 <summary>
2755 Relabel packets to afs_pt_server the packet type.
2756 </summary>
2757 @@ -13694,7 +13511,7 @@ Domain allowed access.
2758 </summary>
2759 </param>
2760 </interface>
2761 -<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="5648">
2762 +<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="5771">
2763 <summary>
2764 Send and receive TCP traffic on the afs_vl port.
2765 </summary>
2766 @@ -13705,7 +13522,7 @@ Domain allowed access.
2767 </param>
2768 <infoflow type="both" weight="10"/>
2769 </interface>
2770 -<interface name="corenet_udp_send_afs_vl_port" lineno="5663">
2771 +<interface name="corenet_udp_send_afs_vl_port" lineno="5786">
2772 <summary>
2773 Send UDP traffic on the afs_vl port.
2774 </summary>
2775 @@ -13716,7 +13533,7 @@ Domain allowed access.
2776 </param>
2777 <infoflow type="write" weight="10"/>
2778 </interface>
2779 -<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="5678">
2780 +<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="5801">
2781 <summary>
2782 Do not audit attempts to send UDP traffic on the afs_vl port.
2783 </summary>
2784 @@ -13727,7 +13544,7 @@ Domain to not audit.
2785 </param>
2786 <infoflow type="none"/>
2787 </interface>
2788 -<interface name="corenet_udp_receive_afs_vl_port" lineno="5693">
2789 +<interface name="corenet_udp_receive_afs_vl_port" lineno="5816">
2790 <summary>
2791 Receive UDP traffic on the afs_vl port.
2792 </summary>
2793 @@ -13738,7 +13555,7 @@ Domain allowed access.
2794 </param>
2795 <infoflow type="read" weight="10"/>
2796 </interface>
2797 -<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5708">
2798 +<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5831">
2799 <summary>
2800 Do not audit attempts to receive UDP traffic on the afs_vl port.
2801 </summary>
2802 @@ -13749,7 +13566,7 @@ Domain to not audit.
2803 </param>
2804 <infoflow type="none"/>
2805 </interface>
2806 -<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5723">
2807 +<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5846">
2808 <summary>
2809 Send and receive UDP traffic on the afs_vl port.
2810 </summary>
2811 @@ -13760,7 +13577,7 @@ Domain allowed access.
2812 </param>
2813 <infoflow type="both" weight="10"/>
2814 </interface>
2815 -<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5739">
2816 +<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5862">
2817 <summary>
2818 Do not audit attempts to send and receive
2819 UDP traffic on the afs_vl port.
2820 @@ -13772,7 +13589,7 @@ Domain to not audit.
2821 </param>
2822 <infoflow type="none"/>
2823 </interface>
2824 -<interface name="corenet_tcp_bind_afs_vl_port" lineno="5754">
2825 +<interface name="corenet_tcp_bind_afs_vl_port" lineno="5877">
2826 <summary>
2827 Bind TCP sockets to the afs_vl port.
2828 </summary>
2829 @@ -13783,7 +13600,7 @@ Domain allowed access.
2830 </param>
2831 <infoflow type="none"/>
2832 </interface>
2833 -<interface name="corenet_udp_bind_afs_vl_port" lineno="5774">
2834 +<interface name="corenet_udp_bind_afs_vl_port" lineno="5897">
2835 <summary>
2836 Bind UDP sockets to the afs_vl port.
2837 </summary>
2838 @@ -13794,7 +13611,7 @@ Domain allowed access.
2839 </param>
2840 <infoflow type="none"/>
2841 </interface>
2842 -<interface name="corenet_tcp_connect_afs_vl_port" lineno="5793">
2843 +<interface name="corenet_tcp_connect_afs_vl_port" lineno="5916">
2844 <summary>
2845 Make a TCP connection to the afs_vl port.
2846 </summary>
2847 @@ -13804,7 +13621,7 @@ Domain allowed access.
2848 </summary>
2849 </param>
2850 </interface>
2851 -<interface name="corenet_send_afs_vl_client_packets" lineno="5813">
2852 +<interface name="corenet_send_afs_vl_client_packets" lineno="5936">
2853 <summary>
2854 Send afs_vl_client packets.
2855 </summary>
2856 @@ -13815,7 +13632,7 @@ Domain allowed access.
2857 </param>
2858 <infoflow type="write" weight="10"/>
2859 </interface>
2860 -<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5832">
2861 +<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5955">
2862 <summary>
2863 Do not audit attempts to send afs_vl_client packets.
2864 </summary>
2865 @@ -13826,7 +13643,7 @@ Domain to not audit.
2866 </param>
2867 <infoflow type="none"/>
2868 </interface>
2869 -<interface name="corenet_receive_afs_vl_client_packets" lineno="5851">
2870 +<interface name="corenet_receive_afs_vl_client_packets" lineno="5974">
2871 <summary>
2872 Receive afs_vl_client packets.
2873 </summary>
2874 @@ -13837,7 +13654,7 @@ Domain allowed access.
2875 </param>
2876 <infoflow type="read" weight="10"/>
2877 </interface>
2878 -<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="5870">
2879 +<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="5993">
2880 <summary>
2881 Do not audit attempts to receive afs_vl_client packets.
2882 </summary>
2883 @@ -13848,7 +13665,7 @@ Domain allowed access.
2884 </param>
2885 <infoflow type="none"/>
2886 </interface>
2887 -<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="5889">
2888 +<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="6012">
2889 <summary>
2890 Send and receive afs_vl_client packets.
2891 </summary>
2892 @@ -13859,7 +13676,7 @@ Domain allowed access.
2893 </param>
2894 <infoflow type="both" weight="10"/>
2895 </interface>
2896 -<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="5905">
2897 +<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="6028">
2898 <summary>
2899 Do not audit attempts to send and receive afs_vl_client packets.
2900 </summary>
2901 @@ -13870,7 +13687,7 @@ Domain to not audit.
2902 </param>
2903 <infoflow type="none"/>
2904 </interface>
2905 -<interface name="corenet_relabelto_afs_vl_client_packets" lineno="5920">
2906 +<interface name="corenet_relabelto_afs_vl_client_packets" lineno="6043">
2907 <summary>
2908 Relabel packets to afs_vl_client the packet type.
2909 </summary>
2910 @@ -13880,7 +13697,7 @@ Domain allowed access.
2911 </summary>
2912 </param>
2913 </interface>
2914 -<interface name="corenet_send_afs_vl_server_packets" lineno="5940">
2915 +<interface name="corenet_send_afs_vl_server_packets" lineno="6063">
2916 <summary>
2917 Send afs_vl_server packets.
2918 </summary>
2919 @@ -13891,7 +13708,7 @@ Domain allowed access.
2920 </param>
2921 <infoflow type="write" weight="10"/>
2922 </interface>
2923 -<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="5959">
2924 +<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="6082">
2925 <summary>
2926 Do not audit attempts to send afs_vl_server packets.
2927 </summary>
2928 @@ -13902,7 +13719,7 @@ Domain to not audit.
2929 </param>
2930 <infoflow type="none"/>
2931 </interface>
2932 -<interface name="corenet_receive_afs_vl_server_packets" lineno="5978">
2933 +<interface name="corenet_receive_afs_vl_server_packets" lineno="6101">
2934 <summary>
2935 Receive afs_vl_server packets.
2936 </summary>
2937 @@ -13913,7 +13730,7 @@ Domain allowed access.
2938 </param>
2939 <infoflow type="read" weight="10"/>
2940 </interface>
2941 -<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="5997">
2942 +<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="6120">
2943 <summary>
2944 Do not audit attempts to receive afs_vl_server packets.
2945 </summary>
2946 @@ -13924,7 +13741,7 @@ Domain allowed access.
2947 </param>
2948 <infoflow type="none"/>
2949 </interface>
2950 -<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="6016">
2951 +<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="6139">
2952 <summary>
2953 Send and receive afs_vl_server packets.
2954 </summary>
2955 @@ -13935,7 +13752,7 @@ Domain allowed access.
2956 </param>
2957 <infoflow type="both" weight="10"/>
2958 </interface>
2959 -<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="6032">
2960 +<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="6155">
2961 <summary>
2962 Do not audit attempts to send and receive afs_vl_server packets.
2963 </summary>
2964 @@ -13946,7 +13763,7 @@ Domain to not audit.
2965 </param>
2966 <infoflow type="none"/>
2967 </interface>
2968 -<interface name="corenet_relabelto_afs_vl_server_packets" lineno="6047">
2969 +<interface name="corenet_relabelto_afs_vl_server_packets" lineno="6170">
2970 <summary>
2971 Relabel packets to afs_vl_server the packet type.
2972 </summary>
2973 @@ -13956,7 +13773,7 @@ Domain allowed access.
2974 </summary>
2975 </param>
2976 </interface>
2977 -<interface name="corenet_tcp_sendrecv_afs3_callback_port" lineno="6069">
2978 +<interface name="corenet_tcp_sendrecv_afs3_callback_port" lineno="6192">
2979 <summary>
2980 Send and receive TCP traffic on the afs3_callback port.
2981 </summary>
2982 @@ -13967,7 +13784,7 @@ Domain allowed access.
2983 </param>
2984 <infoflow type="both" weight="10"/>
2985 </interface>
2986 -<interface name="corenet_udp_send_afs3_callback_port" lineno="6084">
2987 +<interface name="corenet_udp_send_afs3_callback_port" lineno="6207">
2988 <summary>
2989 Send UDP traffic on the afs3_callback port.
2990 </summary>
2991 @@ -13978,7 +13795,7 @@ Domain allowed access.
2992 </param>
2993 <infoflow type="write" weight="10"/>
2994 </interface>
2995 -<interface name="corenet_dontaudit_udp_send_afs3_callback_port" lineno="6099">
2996 +<interface name="corenet_dontaudit_udp_send_afs3_callback_port" lineno="6222">
2997 <summary>
2998 Do not audit attempts to send UDP traffic on the afs3_callback port.
2999 </summary>
3000 @@ -13989,7 +13806,7 @@ Domain to not audit.
3001 </param>
3002 <infoflow type="none"/>
3003 </interface>
3004 -<interface name="corenet_udp_receive_afs3_callback_port" lineno="6114">
3005 +<interface name="corenet_udp_receive_afs3_callback_port" lineno="6237">
3006 <summary>
3007 Receive UDP traffic on the afs3_callback port.
3008 </summary>
3009 @@ -14000,7 +13817,7 @@ Domain allowed access.
3010 </param>
3011 <infoflow type="read" weight="10"/>
3012 </interface>
3013 -<interface name="corenet_dontaudit_udp_receive_afs3_callback_port" lineno="6129">
3014 +<interface name="corenet_dontaudit_udp_receive_afs3_callback_port" lineno="6252">
3015 <summary>
3016 Do not audit attempts to receive UDP traffic on the afs3_callback port.
3017 </summary>
3018 @@ -14011,7 +13828,7 @@ Domain to not audit.
3019 </param>
3020 <infoflow type="none"/>
3021 </interface>
3022 -<interface name="corenet_udp_sendrecv_afs3_callback_port" lineno="6144">
3023 +<interface name="corenet_udp_sendrecv_afs3_callback_port" lineno="6267">
3024 <summary>
3025 Send and receive UDP traffic on the afs3_callback port.
3026 </summary>
3027 @@ -14022,7 +13839,7 @@ Domain allowed access.
3028 </param>
3029 <infoflow type="both" weight="10"/>
3030 </interface>
3031 -<interface name="corenet_dontaudit_udp_sendrecv_afs3_callback_port" lineno="6160">
3032 +<interface name="corenet_dontaudit_udp_sendrecv_afs3_callback_port" lineno="6283">
3033 <summary>
3034 Do not audit attempts to send and receive
3035 UDP traffic on the afs3_callback port.
3036 @@ -14034,7 +13851,7 @@ Domain to not audit.
3037 </param>
3038 <infoflow type="none"/>
3039 </interface>
3040 -<interface name="corenet_tcp_bind_afs3_callback_port" lineno="6175">
3041 +<interface name="corenet_tcp_bind_afs3_callback_port" lineno="6298">
3042 <summary>
3043 Bind TCP sockets to the afs3_callback port.
3044 </summary>
3045 @@ -14045,7 +13862,7 @@ Domain allowed access.
3046 </param>
3047 <infoflow type="none"/>
3048 </interface>
3049 -<interface name="corenet_udp_bind_afs3_callback_port" lineno="6195">
3050 +<interface name="corenet_udp_bind_afs3_callback_port" lineno="6318">
3051 <summary>
3052 Bind UDP sockets to the afs3_callback port.
3053 </summary>
3054 @@ -14056,7 +13873,7 @@ Domain allowed access.
3055 </param>
3056 <infoflow type="none"/>
3057 </interface>
3058 -<interface name="corenet_tcp_connect_afs3_callback_port" lineno="6214">
3059 +<interface name="corenet_tcp_connect_afs3_callback_port" lineno="6337">
3060 <summary>
3061 Make a TCP connection to the afs3_callback port.
3062 </summary>
3063 @@ -14066,7 +13883,7 @@ Domain allowed access.
3064 </summary>
3065 </param>
3066 </interface>
3067 -<interface name="corenet_send_afs3_callback_client_packets" lineno="6234">
3068 +<interface name="corenet_send_afs3_callback_client_packets" lineno="6357">
3069 <summary>
3070 Send afs3_callback_client packets.
3071 </summary>
3072 @@ -14077,7 +13894,7 @@ Domain allowed access.
3073 </param>
3074 <infoflow type="write" weight="10"/>
3075 </interface>
3076 -<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="6253">
3077 +<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="6376">
3078 <summary>
3079 Do not audit attempts to send afs3_callback_client packets.
3080 </summary>
3081 @@ -14088,7 +13905,7 @@ Domain to not audit.
3082 </param>
3083 <infoflow type="none"/>
3084 </interface>
3085 -<interface name="corenet_receive_afs3_callback_client_packets" lineno="6272">
3086 +<interface name="corenet_receive_afs3_callback_client_packets" lineno="6395">
3087 <summary>
3088 Receive afs3_callback_client packets.
3089 </summary>
3090 @@ -14099,7 +13916,7 @@ Domain allowed access.
3091 </param>
3092 <infoflow type="read" weight="10"/>
3093 </interface>
3094 -<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="6291">
3095 +<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="6414">
3096 <summary>
3097 Do not audit attempts to receive afs3_callback_client packets.
3098 </summary>
3099 @@ -14110,7 +13927,7 @@ Domain allowed access.
3100 </param>
3101 <infoflow type="none"/>
3102 </interface>
3103 -<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="6310">
3104 +<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="6433">
3105 <summary>
3106 Send and receive afs3_callback_client packets.
3107 </summary>
3108 @@ -14121,7 +13938,7 @@ Domain allowed access.
3109 </param>
3110 <infoflow type="both" weight="10"/>
3111 </interface>
3112 -<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="6326">
3113 +<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="6449">
3114 <summary>
3115 Do not audit attempts to send and receive afs3_callback_client packets.
3116 </summary>
3117 @@ -14132,7 +13949,7 @@ Domain to not audit.
3118 </param>
3119 <infoflow type="none"/>
3120 </interface>
3121 -<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="6341">
3122 +<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="6464">
3123 <summary>
3124 Relabel packets to afs3_callback_client the packet type.
3125 </summary>
3126 @@ -14142,7 +13959,7 @@ Domain allowed access.
3127 </summary>
3128 </param>
3129 </interface>
3130 -<interface name="corenet_send_afs3_callback_server_packets" lineno="6361">
3131 +<interface name="corenet_send_afs3_callback_server_packets" lineno="6484">
3132 <summary>
3133 Send afs3_callback_server packets.
3134 </summary>
3135 @@ -14153,7 +13970,7 @@ Domain allowed access.
3136 </param>
3137 <infoflow type="write" weight="10"/>
3138 </interface>
3139 -<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="6380">
3140 +<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="6503">
3141 <summary>
3142 Do not audit attempts to send afs3_callback_server packets.
3143 </summary>
3144 @@ -14164,7 +13981,7 @@ Domain to not audit.
3145 </param>
3146 <infoflow type="none"/>
3147 </interface>
3148 -<interface name="corenet_receive_afs3_callback_server_packets" lineno="6399">
3149 +<interface name="corenet_receive_afs3_callback_server_packets" lineno="6522">
3150 <summary>
3151 Receive afs3_callback_server packets.
3152 </summary>
3153 @@ -14175,7 +13992,7 @@ Domain allowed access.
3154 </param>
3155 <infoflow type="read" weight="10"/>
3156 </interface>
3157 -<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="6418">
3158 +<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="6541">
3159 <summary>
3160 Do not audit attempts to receive afs3_callback_server packets.
3161 </summary>
3162 @@ -14186,7 +14003,7 @@ Domain allowed access.
3163 </param>
3164 <infoflow type="none"/>
3165 </interface>
3166 -<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="6437">
3167 +<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="6560">
3168 <summary>
3169 Send and receive afs3_callback_server packets.
3170 </summary>
3171 @@ -14197,7 +14014,7 @@ Domain allowed access.
3172 </param>
3173 <infoflow type="both" weight="10"/>
3174 </interface>
3175 -<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="6453">
3176 +<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="6576">
3177 <summary>
3178 Do not audit attempts to send and receive afs3_callback_server packets.
3179 </summary>
3180 @@ -14208,7 +14025,7 @@ Domain to not audit.
3181 </param>
3182 <infoflow type="none"/>
3183 </interface>
3184 -<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="6468">
3185 +<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="6591">
3186 <summary>
3187 Relabel packets to afs3_callback_server the packet type.
3188 </summary>
3189 @@ -14218,7 +14035,7 @@ Domain allowed access.
3190 </summary>
3191 </param>
3192 </interface>
3193 -<interface name="corenet_tcp_sendrecv_agentx_port" lineno="6490">
3194 +<interface name="corenet_tcp_sendrecv_agentx_port" lineno="6613">
3195 <summary>
3196 Send and receive TCP traffic on the agentx port.
3197 </summary>
3198 @@ -14229,7 +14046,7 @@ Domain allowed access.
3199 </param>
3200 <infoflow type="both" weight="10"/>
3201 </interface>
3202 -<interface name="corenet_udp_send_agentx_port" lineno="6505">
3203 +<interface name="corenet_udp_send_agentx_port" lineno="6628">
3204 <summary>
3205 Send UDP traffic on the agentx port.
3206 </summary>
3207 @@ -14240,7 +14057,7 @@ Domain allowed access.
3208 </param>
3209 <infoflow type="write" weight="10"/>
3210 </interface>
3211 -<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="6520">
3212 +<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="6643">
3213 <summary>
3214 Do not audit attempts to send UDP traffic on the agentx port.
3215 </summary>
3216 @@ -14251,7 +14068,7 @@ Domain to not audit.
3217 </param>
3218 <infoflow type="none"/>
3219 </interface>
3220 -<interface name="corenet_udp_receive_agentx_port" lineno="6535">
3221 +<interface name="corenet_udp_receive_agentx_port" lineno="6658">
3222 <summary>
3223 Receive UDP traffic on the agentx port.
3224 </summary>
3225 @@ -14262,7 +14079,7 @@ Domain allowed access.
3226 </param>
3227 <infoflow type="read" weight="10"/>
3228 </interface>
3229 -<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="6550">
3230 +<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="6673">
3231 <summary>
3232 Do not audit attempts to receive UDP traffic on the agentx port.
3233 </summary>
3234 @@ -14273,7 +14090,7 @@ Domain to not audit.
3235 </param>
3236 <infoflow type="none"/>
3237 </interface>
3238 -<interface name="corenet_udp_sendrecv_agentx_port" lineno="6565">
3239 +<interface name="corenet_udp_sendrecv_agentx_port" lineno="6688">
3240 <summary>
3241 Send and receive UDP traffic on the agentx port.
3242 </summary>
3243 @@ -14284,7 +14101,7 @@ Domain allowed access.
3244 </param>
3245 <infoflow type="both" weight="10"/>
3246 </interface>
3247 -<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="6581">
3248 +<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="6704">
3249 <summary>
3250 Do not audit attempts to send and receive
3251 UDP traffic on the agentx port.
3252 @@ -14296,7 +14113,7 @@ Domain to not audit.
3253 </param>
3254 <infoflow type="none"/>
3255 </interface>
3256 -<interface name="corenet_tcp_bind_agentx_port" lineno="6596">
3257 +<interface name="corenet_tcp_bind_agentx_port" lineno="6719">
3258 <summary>
3259 Bind TCP sockets to the agentx port.
3260 </summary>
3261 @@ -14307,7 +14124,7 @@ Domain allowed access.
3262 </param>
3263 <infoflow type="none"/>
3264 </interface>
3265 -<interface name="corenet_udp_bind_agentx_port" lineno="6616">
3266 +<interface name="corenet_udp_bind_agentx_port" lineno="6739">
3267 <summary>
3268 Bind UDP sockets to the agentx port.
3269 </summary>
3270 @@ -14318,7 +14135,7 @@ Domain allowed access.
3271 </param>
3272 <infoflow type="none"/>
3273 </interface>
3274 -<interface name="corenet_tcp_connect_agentx_port" lineno="6635">
3275 +<interface name="corenet_tcp_connect_agentx_port" lineno="6758">
3276 <summary>
3277 Make a TCP connection to the agentx port.
3278 </summary>
3279 @@ -14328,7 +14145,7 @@ Domain allowed access.
3280 </summary>
3281 </param>
3282 </interface>
3283 -<interface name="corenet_send_agentx_client_packets" lineno="6655">
3284 +<interface name="corenet_send_agentx_client_packets" lineno="6778">
3285 <summary>
3286 Send agentx_client packets.
3287 </summary>
3288 @@ -14339,7 +14156,7 @@ Domain allowed access.
3289 </param>
3290 <infoflow type="write" weight="10"/>
3291 </interface>
3292 -<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="6674">
3293 +<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="6797">
3294 <summary>
3295 Do not audit attempts to send agentx_client packets.
3296 </summary>
3297 @@ -14350,7 +14167,7 @@ Domain to not audit.
3298 </param>
3299 <infoflow type="none"/>
3300 </interface>
3301 -<interface name="corenet_receive_agentx_client_packets" lineno="6693">
3302 +<interface name="corenet_receive_agentx_client_packets" lineno="6816">
3303 <summary>
3304 Receive agentx_client packets.
3305 </summary>
3306 @@ -14361,7 +14178,7 @@ Domain allowed access.
3307 </param>
3308 <infoflow type="read" weight="10"/>
3309 </interface>
3310 -<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6712">
3311 +<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6835">
3312 <summary>
3313 Do not audit attempts to receive agentx_client packets.
3314 </summary>
3315 @@ -14372,7 +14189,7 @@ Domain allowed access.
3316 </param>
3317 <infoflow type="none"/>
3318 </interface>
3319 -<interface name="corenet_sendrecv_agentx_client_packets" lineno="6731">
3320 +<interface name="corenet_sendrecv_agentx_client_packets" lineno="6854">
3321 <summary>
3322 Send and receive agentx_client packets.
3323 </summary>
3324 @@ -14383,7 +14200,7 @@ Domain allowed access.
3325 </param>
3326 <infoflow type="both" weight="10"/>
3327 </interface>
3328 -<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6747">
3329 +<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6870">
3330 <summary>
3331 Do not audit attempts to send and receive agentx_client packets.
3332 </summary>
3333 @@ -14394,7 +14211,7 @@ Domain to not audit.
3334 </param>
3335 <infoflow type="none"/>
3336 </interface>
3337 -<interface name="corenet_relabelto_agentx_client_packets" lineno="6762">
3338 +<interface name="corenet_relabelto_agentx_client_packets" lineno="6885">
3339 <summary>
3340 Relabel packets to agentx_client the packet type.
3341 </summary>
3342 @@ -14404,7 +14221,7 @@ Domain allowed access.
3343 </summary>
3344 </param>
3345 </interface>
3346 -<interface name="corenet_send_agentx_server_packets" lineno="6782">
3347 +<interface name="corenet_send_agentx_server_packets" lineno="6905">
3348 <summary>
3349 Send agentx_server packets.
3350 </summary>
3351 @@ -14415,7 +14232,7 @@ Domain allowed access.
3352 </param>
3353 <infoflow type="write" weight="10"/>
3354 </interface>
3355 -<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6801">
3356 +<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6924">
3357 <summary>
3358 Do not audit attempts to send agentx_server packets.
3359 </summary>
3360 @@ -14426,7 +14243,7 @@ Domain to not audit.
3361 </param>
3362 <infoflow type="none"/>
3363 </interface>
3364 -<interface name="corenet_receive_agentx_server_packets" lineno="6820">
3365 +<interface name="corenet_receive_agentx_server_packets" lineno="6943">
3366 <summary>
3367 Receive agentx_server packets.
3368 </summary>
3369 @@ -14437,7 +14254,7 @@ Domain allowed access.
3370 </param>
3371 <infoflow type="read" weight="10"/>
3372 </interface>
3373 -<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6839">
3374 +<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6962">
3375 <summary>
3376 Do not audit attempts to receive agentx_server packets.
3377 </summary>
3378 @@ -14448,7 +14265,7 @@ Domain allowed access.
3379 </param>
3380 <infoflow type="none"/>
3381 </interface>
3382 -<interface name="corenet_sendrecv_agentx_server_packets" lineno="6858">
3383 +<interface name="corenet_sendrecv_agentx_server_packets" lineno="6981">
3384 <summary>
3385 Send and receive agentx_server packets.
3386 </summary>
3387 @@ -14459,7 +14276,7 @@ Domain allowed access.
3388 </param>
3389 <infoflow type="both" weight="10"/>
3390 </interface>
3391 -<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="6874">
3392 +<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="6997">
3393 <summary>
3394 Do not audit attempts to send and receive agentx_server packets.
3395 </summary>
3396 @@ -14470,7 +14287,7 @@ Domain to not audit.
3397 </param>
3398 <infoflow type="none"/>
3399 </interface>
3400 -<interface name="corenet_relabelto_agentx_server_packets" lineno="6889">
3401 +<interface name="corenet_relabelto_agentx_server_packets" lineno="7012">
3402 <summary>
3403 Relabel packets to agentx_server the packet type.
3404 </summary>
3405 @@ -14480,7 +14297,7 @@ Domain allowed access.
3406 </summary>
3407 </param>
3408 </interface>
3409 -<interface name="corenet_tcp_sendrecv_amanda_port" lineno="6911">
3410 +<interface name="corenet_tcp_sendrecv_amanda_port" lineno="7034">
3411 <summary>
3412 Send and receive TCP traffic on the amanda port.
3413 </summary>
3414 @@ -14491,7 +14308,7 @@ Domain allowed access.
3415 </param>
3416 <infoflow type="both" weight="10"/>
3417 </interface>
3418 -<interface name="corenet_udp_send_amanda_port" lineno="6926">
3419 +<interface name="corenet_udp_send_amanda_port" lineno="7049">
3420 <summary>
3421 Send UDP traffic on the amanda port.
3422 </summary>
3423 @@ -14502,7 +14319,7 @@ Domain allowed access.
3424 </param>
3425 <infoflow type="write" weight="10"/>
3426 </interface>
3427 -<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="6941">
3428 +<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="7064">
3429 <summary>
3430 Do not audit attempts to send UDP traffic on the amanda port.
3431 </summary>
3432 @@ -14513,7 +14330,7 @@ Domain to not audit.
3433 </param>
3434 <infoflow type="none"/>
3435 </interface>
3436 -<interface name="corenet_udp_receive_amanda_port" lineno="6956">
3437 +<interface name="corenet_udp_receive_amanda_port" lineno="7079">
3438 <summary>
3439 Receive UDP traffic on the amanda port.
3440 </summary>
3441 @@ -14524,7 +14341,7 @@ Domain allowed access.
3442 </param>
3443 <infoflow type="read" weight="10"/>
3444 </interface>
3445 -<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="6971">
3446 +<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="7094">
3447 <summary>
3448 Do not audit attempts to receive UDP traffic on the amanda port.
3449 </summary>
3450 @@ -14535,7 +14352,7 @@ Domain to not audit.
3451 </param>
3452 <infoflow type="none"/>
3453 </interface>
3454 -<interface name="corenet_udp_sendrecv_amanda_port" lineno="6986">
3455 +<interface name="corenet_udp_sendrecv_amanda_port" lineno="7109">
3456 <summary>
3457 Send and receive UDP traffic on the amanda port.
3458 </summary>
3459 @@ -14546,7 +14363,7 @@ Domain allowed access.
3460 </param>
3461 <infoflow type="both" weight="10"/>
3462 </interface>
3463 -<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="7002">
3464 +<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="7125">
3465 <summary>
3466 Do not audit attempts to send and receive
3467 UDP traffic on the amanda port.
3468 @@ -14558,7 +14375,7 @@ Domain to not audit.
3469 </param>
3470 <infoflow type="none"/>
3471 </interface>
3472 -<interface name="corenet_tcp_bind_amanda_port" lineno="7017">
3473 +<interface name="corenet_tcp_bind_amanda_port" lineno="7140">
3474 <summary>
3475 Bind TCP sockets to the amanda port.
3476 </summary>
3477 @@ -14569,7 +14386,7 @@ Domain allowed access.
3478 </param>
3479 <infoflow type="none"/>
3480 </interface>
3481 -<interface name="corenet_udp_bind_amanda_port" lineno="7037">
3482 +<interface name="corenet_udp_bind_amanda_port" lineno="7160">
3483 <summary>
3484 Bind UDP sockets to the amanda port.
3485 </summary>
3486 @@ -14580,7 +14397,7 @@ Domain allowed access.
3487 </param>
3488 <infoflow type="none"/>
3489 </interface>
3490 -<interface name="corenet_tcp_connect_amanda_port" lineno="7056">
3491 +<interface name="corenet_tcp_connect_amanda_port" lineno="7179">
3492 <summary>
3493 Make a TCP connection to the amanda port.
3494 </summary>
3495 @@ -14590,7 +14407,7 @@ Domain allowed access.
3496 </summary>
3497 </param>
3498 </interface>
3499 -<interface name="corenet_send_amanda_client_packets" lineno="7076">
3500 +<interface name="corenet_send_amanda_client_packets" lineno="7199">
3501 <summary>
3502 Send amanda_client packets.
3503 </summary>
3504 @@ -14601,7 +14418,7 @@ Domain allowed access.
3505 </param>
3506 <infoflow type="write" weight="10"/>
3507 </interface>
3508 -<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="7095">
3509 +<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="7218">
3510 <summary>
3511 Do not audit attempts to send amanda_client packets.
3512 </summary>
3513 @@ -14612,7 +14429,7 @@ Domain to not audit.
3514 </param>
3515 <infoflow type="none"/>
3516 </interface>
3517 -<interface name="corenet_receive_amanda_client_packets" lineno="7114">
3518 +<interface name="corenet_receive_amanda_client_packets" lineno="7237">
3519 <summary>
3520 Receive amanda_client packets.
3521 </summary>
3522 @@ -14623,7 +14440,7 @@ Domain allowed access.
3523 </param>
3524 <infoflow type="read" weight="10"/>
3525 </interface>
3526 -<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="7133">
3527 +<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="7256">
3528 <summary>
3529 Do not audit attempts to receive amanda_client packets.
3530 </summary>
3531 @@ -14634,7 +14451,7 @@ Domain allowed access.
3532 </param>
3533 <infoflow type="none"/>
3534 </interface>
3535 -<interface name="corenet_sendrecv_amanda_client_packets" lineno="7152">
3536 +<interface name="corenet_sendrecv_amanda_client_packets" lineno="7275">
3537 <summary>
3538 Send and receive amanda_client packets.
3539 </summary>
3540 @@ -14645,7 +14462,7 @@ Domain allowed access.
3541 </param>
3542 <infoflow type="both" weight="10"/>
3543 </interface>
3544 -<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="7168">
3545 +<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="7291">
3546 <summary>
3547 Do not audit attempts to send and receive amanda_client packets.
3548 </summary>
3549 @@ -14656,7 +14473,7 @@ Domain to not audit.
3550 </param>
3551 <infoflow type="none"/>
3552 </interface>
3553 -<interface name="corenet_relabelto_amanda_client_packets" lineno="7183">
3554 +<interface name="corenet_relabelto_amanda_client_packets" lineno="7306">
3555 <summary>
3556 Relabel packets to amanda_client the packet type.
3557 </summary>
3558 @@ -14666,7 +14483,7 @@ Domain allowed access.
3559 </summary>
3560 </param>
3561 </interface>
3562 -<interface name="corenet_send_amanda_server_packets" lineno="7203">
3563 +<interface name="corenet_send_amanda_server_packets" lineno="7326">
3564 <summary>
3565 Send amanda_server packets.
3566 </summary>
3567 @@ -14677,7 +14494,7 @@ Domain allowed access.
3568 </param>
3569 <infoflow type="write" weight="10"/>
3570 </interface>
3571 -<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="7222">
3572 +<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="7345">
3573 <summary>
3574 Do not audit attempts to send amanda_server packets.
3575 </summary>
3576 @@ -14688,7 +14505,7 @@ Domain to not audit.
3577 </param>
3578 <infoflow type="none"/>
3579 </interface>
3580 -<interface name="corenet_receive_amanda_server_packets" lineno="7241">
3581 +<interface name="corenet_receive_amanda_server_packets" lineno="7364">
3582 <summary>
3583 Receive amanda_server packets.
3584 </summary>
3585 @@ -14699,7 +14516,7 @@ Domain allowed access.
3586 </param>
3587 <infoflow type="read" weight="10"/>
3588 </interface>
3589 -<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="7260">
3590 +<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="7383">
3591 <summary>
3592 Do not audit attempts to receive amanda_server packets.
3593 </summary>
3594 @@ -14710,7 +14527,7 @@ Domain allowed access.
3595 </param>
3596 <infoflow type="none"/>
3597 </interface>
3598 -<interface name="corenet_sendrecv_amanda_server_packets" lineno="7279">
3599 +<interface name="corenet_sendrecv_amanda_server_packets" lineno="7402">
3600 <summary>
3601 Send and receive amanda_server packets.
3602 </summary>
3603 @@ -14721,7 +14538,7 @@ Domain allowed access.
3604 </param>
3605 <infoflow type="both" weight="10"/>
3606 </interface>
3607 -<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="7295">
3608 +<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="7418">
3609 <summary>
3610 Do not audit attempts to send and receive amanda_server packets.
3611 </summary>
3612 @@ -14732,7 +14549,7 @@ Domain to not audit.
3613 </param>
3614 <infoflow type="none"/>
3615 </interface>
3616 -<interface name="corenet_relabelto_amanda_server_packets" lineno="7310">
3617 +<interface name="corenet_relabelto_amanda_server_packets" lineno="7433">
3618 <summary>
3619 Relabel packets to amanda_server the packet type.
3620 </summary>
3621 @@ -14742,7 +14559,7 @@ Domain allowed access.
3622 </summary>
3623 </param>
3624 </interface>
3625 -<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="7332">
3626 +<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="7455">
3627 <summary>
3628 Send and receive TCP traffic on the amavisd_recv port.
3629 </summary>
3630 @@ -14753,7 +14570,7 @@ Domain allowed access.
3631 </param>
3632 <infoflow type="both" weight="10"/>
3633 </interface>
3634 -<interface name="corenet_udp_send_amavisd_recv_port" lineno="7347">
3635 +<interface name="corenet_udp_send_amavisd_recv_port" lineno="7470">
3636 <summary>
3637 Send UDP traffic on the amavisd_recv port.
3638 </summary>
3639 @@ -14764,7 +14581,7 @@ Domain allowed access.
3640 </param>
3641 <infoflow type="write" weight="10"/>
3642 </interface>
3643 -<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="7362">
3644 +<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="7485">
3645 <summary>
3646 Do not audit attempts to send UDP traffic on the amavisd_recv port.
3647 </summary>
3648 @@ -14775,7 +14592,7 @@ Domain to not audit.
3649 </param>
3650 <infoflow type="none"/>
3651 </interface>
3652 -<interface name="corenet_udp_receive_amavisd_recv_port" lineno="7377">
3653 +<interface name="corenet_udp_receive_amavisd_recv_port" lineno="7500">
3654 <summary>
3655 Receive UDP traffic on the amavisd_recv port.
3656 </summary>
3657 @@ -14786,7 +14603,7 @@ Domain allowed access.
3658 </param>
3659 <infoflow type="read" weight="10"/>
3660 </interface>
3661 -<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="7392">
3662 +<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="7515">
3663 <summary>
3664 Do not audit attempts to receive UDP traffic on the amavisd_recv port.
3665 </summary>
3666 @@ -14797,7 +14614,7 @@ Domain to not audit.
3667 </param>
3668 <infoflow type="none"/>
3669 </interface>
3670 -<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="7407">
3671 +<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="7530">
3672 <summary>
3673 Send and receive UDP traffic on the amavisd_recv port.
3674 </summary>
3675 @@ -14808,7 +14625,7 @@ Domain allowed access.
3676 </param>
3677 <infoflow type="both" weight="10"/>
3678 </interface>
3679 -<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="7423">
3680 +<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="7546">
3681 <summary>
3682 Do not audit attempts to send and receive
3683 UDP traffic on the amavisd_recv port.
3684 @@ -14820,7 +14637,7 @@ Domain to not audit.
3685 </param>
3686 <infoflow type="none"/>
3687 </interface>
3688 -<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="7438">
3689 +<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="7561">
3690 <summary>
3691 Bind TCP sockets to the amavisd_recv port.
3692 </summary>
3693 @@ -14831,7 +14648,7 @@ Domain allowed access.
3694 </param>
3695 <infoflow type="none"/>
3696 </interface>
3697 -<interface name="corenet_udp_bind_amavisd_recv_port" lineno="7458">
3698 +<interface name="corenet_udp_bind_amavisd_recv_port" lineno="7581">
3699 <summary>
3700 Bind UDP sockets to the amavisd_recv port.
3701 </summary>
3702 @@ -14842,7 +14659,7 @@ Domain allowed access.
3703 </param>
3704 <infoflow type="none"/>
3705 </interface>
3706 -<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="7477">
3707 +<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="7600">
3708 <summary>
3709 Make a TCP connection to the amavisd_recv port.
3710 </summary>
3711 @@ -14852,7 +14669,7 @@ Domain allowed access.
3712 </summary>
3713 </param>
3714 </interface>
3715 -<interface name="corenet_send_amavisd_recv_client_packets" lineno="7497">
3716 +<interface name="corenet_send_amavisd_recv_client_packets" lineno="7620">
3717 <summary>
3718 Send amavisd_recv_client packets.
3719 </summary>
3720 @@ -14863,7 +14680,7 @@ Domain allowed access.
3721 </param>
3722 <infoflow type="write" weight="10"/>
3723 </interface>
3724 -<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="7516">
3725 +<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="7639">
3726 <summary>
3727 Do not audit attempts to send amavisd_recv_client packets.
3728 </summary>
3729 @@ -14874,7 +14691,7 @@ Domain to not audit.
3730 </param>
3731 <infoflow type="none"/>
3732 </interface>
3733 -<interface name="corenet_receive_amavisd_recv_client_packets" lineno="7535">
3734 +<interface name="corenet_receive_amavisd_recv_client_packets" lineno="7658">
3735 <summary>
3736 Receive amavisd_recv_client packets.
3737 </summary>
3738 @@ -14885,7 +14702,7 @@ Domain allowed access.
3739 </param>
3740 <infoflow type="read" weight="10"/>
3741 </interface>
3742 -<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="7554">
3743 +<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="7677">
3744 <summary>
3745 Do not audit attempts to receive amavisd_recv_client packets.
3746 </summary>
3747 @@ -14896,7 +14713,7 @@ Domain allowed access.
3748 </param>
3749 <infoflow type="none"/>
3750 </interface>
3751 -<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="7573">
3752 +<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="7696">
3753 <summary>
3754 Send and receive amavisd_recv_client packets.
3755 </summary>
3756 @@ -14907,7 +14724,7 @@ Domain allowed access.
3757 </param>
3758 <infoflow type="both" weight="10"/>
3759 </interface>
3760 -<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="7589">
3761 +<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="7712">
3762 <summary>
3763 Do not audit attempts to send and receive amavisd_recv_client packets.
3764 </summary>
3765 @@ -14918,7 +14735,7 @@ Domain to not audit.
3766 </param>
3767 <infoflow type="none"/>
3768 </interface>
3769 -<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="7604">
3770 +<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="7727">
3771 <summary>
3772 Relabel packets to amavisd_recv_client the packet type.
3773 </summary>
3774 @@ -14928,7 +14745,7 @@ Domain allowed access.
3775 </summary>
3776 </param>
3777 </interface>
3778 -<interface name="corenet_send_amavisd_recv_server_packets" lineno="7624">
3779 +<interface name="corenet_send_amavisd_recv_server_packets" lineno="7747">
3780 <summary>
3781 Send amavisd_recv_server packets.
3782 </summary>
3783 @@ -14939,7 +14756,7 @@ Domain allowed access.
3784 </param>
3785 <infoflow type="write" weight="10"/>
3786 </interface>
3787 -<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="7643">
3788 +<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="7766">
3789 <summary>
3790 Do not audit attempts to send amavisd_recv_server packets.
3791 </summary>
3792 @@ -14950,7 +14767,7 @@ Domain to not audit.
3793 </param>
3794 <infoflow type="none"/>
3795 </interface>
3796 -<interface name="corenet_receive_amavisd_recv_server_packets" lineno="7662">
3797 +<interface name="corenet_receive_amavisd_recv_server_packets" lineno="7785">
3798 <summary>
3799 Receive amavisd_recv_server packets.
3800 </summary>
3801 @@ -14961,7 +14778,7 @@ Domain allowed access.
3802 </param>
3803 <infoflow type="read" weight="10"/>
3804 </interface>
3805 -<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="7681">
3806 +<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="7804">
3807 <summary>
3808 Do not audit attempts to receive amavisd_recv_server packets.
3809 </summary>
3810 @@ -14972,7 +14789,7 @@ Domain allowed access.
3811 </param>
3812 <infoflow type="none"/>
3813 </interface>
3814 -<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="7700">
3815 +<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="7823">
3816 <summary>
3817 Send and receive amavisd_recv_server packets.
3818 </summary>
3819 @@ -14983,7 +14800,7 @@ Domain allowed access.
3820 </param>
3821 <infoflow type="both" weight="10"/>
3822 </interface>
3823 -<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="7716">
3824 +<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="7839">
3825 <summary>
3826 Do not audit attempts to send and receive amavisd_recv_server packets.
3827 </summary>
3828 @@ -14994,7 +14811,7 @@ Domain to not audit.
3829 </param>
3830 <infoflow type="none"/>
3831 </interface>
3832 -<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="7731">
3833 +<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="7854">
3834 <summary>
3835 Relabel packets to amavisd_recv_server the packet type.
3836 </summary>
3837 @@ -15004,7 +14821,7 @@ Domain allowed access.
3838 </summary>
3839 </param>
3840 </interface>
3841 -<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="7753">
3842 +<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="7876">
3843 <summary>
3844 Send and receive TCP traffic on the amavisd_send port.
3845 </summary>
3846 @@ -15015,7 +14832,7 @@ Domain allowed access.
3847 </param>
3848 <infoflow type="both" weight="10"/>
3849 </interface>
3850 -<interface name="corenet_udp_send_amavisd_send_port" lineno="7768">
3851 +<interface name="corenet_udp_send_amavisd_send_port" lineno="7891">
3852 <summary>
3853 Send UDP traffic on the amavisd_send port.
3854 </summary>
3855 @@ -15026,7 +14843,7 @@ Domain allowed access.
3856 </param>
3857 <infoflow type="write" weight="10"/>
3858 </interface>
3859 -<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="7783">
3860 +<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="7906">
3861 <summary>
3862 Do not audit attempts to send UDP traffic on the amavisd_send port.
3863 </summary>
3864 @@ -15037,7 +14854,7 @@ Domain to not audit.
3865 </param>
3866 <infoflow type="none"/>
3867 </interface>
3868 -<interface name="corenet_udp_receive_amavisd_send_port" lineno="7798">
3869 +<interface name="corenet_udp_receive_amavisd_send_port" lineno="7921">
3870 <summary>
3871 Receive UDP traffic on the amavisd_send port.
3872 </summary>
3873 @@ -15048,7 +14865,7 @@ Domain allowed access.
3874 </param>
3875 <infoflow type="read" weight="10"/>
3876 </interface>
3877 -<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="7813">
3878 +<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="7936">
3879 <summary>
3880 Do not audit attempts to receive UDP traffic on the amavisd_send port.
3881 </summary>
3882 @@ -15059,7 +14876,7 @@ Domain to not audit.
3883 </param>
3884 <infoflow type="none"/>
3885 </interface>
3886 -<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="7828">
3887 +<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="7951">
3888 <summary>
3889 Send and receive UDP traffic on the amavisd_send port.
3890 </summary>
3891 @@ -15070,7 +14887,7 @@ Domain allowed access.
3892 </param>
3893 <infoflow type="both" weight="10"/>
3894 </interface>
3895 -<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="7844">
3896 +<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="7967">
3897 <summary>
3898 Do not audit attempts to send and receive
3899 UDP traffic on the amavisd_send port.
3900 @@ -15082,7 +14899,7 @@ Domain to not audit.
3901 </param>
3902 <infoflow type="none"/>
3903 </interface>
3904 -<interface name="corenet_tcp_bind_amavisd_send_port" lineno="7859">
3905 +<interface name="corenet_tcp_bind_amavisd_send_port" lineno="7982">
3906 <summary>
3907 Bind TCP sockets to the amavisd_send port.
3908 </summary>
3909 @@ -15093,7 +14910,7 @@ Domain allowed access.
3910 </param>
3911 <infoflow type="none"/>
3912 </interface>
3913 -<interface name="corenet_udp_bind_amavisd_send_port" lineno="7879">
3914 +<interface name="corenet_udp_bind_amavisd_send_port" lineno="8002">
3915 <summary>
3916 Bind UDP sockets to the amavisd_send port.
3917 </summary>
3918 @@ -15104,7 +14921,7 @@ Domain allowed access.
3919 </param>
3920 <infoflow type="none"/>
3921 </interface>
3922 -<interface name="corenet_tcp_connect_amavisd_send_port" lineno="7898">
3923 +<interface name="corenet_tcp_connect_amavisd_send_port" lineno="8021">
3924 <summary>
3925 Make a TCP connection to the amavisd_send port.
3926 </summary>
3927 @@ -15114,7 +14931,7 @@ Domain allowed access.
3928 </summary>
3929 </param>
3930 </interface>
3931 -<interface name="corenet_send_amavisd_send_client_packets" lineno="7918">
3932 +<interface name="corenet_send_amavisd_send_client_packets" lineno="8041">
3933 <summary>
3934 Send amavisd_send_client packets.
3935 </summary>
3936 @@ -15125,7 +14942,7 @@ Domain allowed access.
3937 </param>
3938 <infoflow type="write" weight="10"/>
3939 </interface>
3940 -<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="7937">
3941 +<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="8060">
3942 <summary>
3943 Do not audit attempts to send amavisd_send_client packets.
3944 </summary>
3945 @@ -15136,7 +14953,7 @@ Domain to not audit.
3946 </param>
3947 <infoflow type="none"/>
3948 </interface>
3949 -<interface name="corenet_receive_amavisd_send_client_packets" lineno="7956">
3950 +<interface name="corenet_receive_amavisd_send_client_packets" lineno="8079">
3951 <summary>
3952 Receive amavisd_send_client packets.
3953 </summary>
3954 @@ -15147,7 +14964,7 @@ Domain allowed access.
3955 </param>
3956 <infoflow type="read" weight="10"/>
3957 </interface>
3958 -<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="7975">
3959 +<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="8098">
3960 <summary>
3961 Do not audit attempts to receive amavisd_send_client packets.
3962 </summary>
3963 @@ -15158,7 +14975,7 @@ Domain allowed access.
3964 </param>
3965 <infoflow type="none"/>
3966 </interface>
3967 -<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="7994">
3968 +<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="8117">
3969 <summary>
3970 Send and receive amavisd_send_client packets.
3971 </summary>
3972 @@ -15169,7 +14986,7 @@ Domain allowed access.
3973 </param>
3974 <infoflow type="both" weight="10"/>
3975 </interface>
3976 -<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="8010">
3977 +<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="8133">
3978 <summary>
3979 Do not audit attempts to send and receive amavisd_send_client packets.
3980 </summary>
3981 @@ -15180,7 +14997,7 @@ Domain to not audit.
3982 </param>
3983 <infoflow type="none"/>
3984 </interface>
3985 -<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="8025">
3986 +<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="8148">
3987 <summary>
3988 Relabel packets to amavisd_send_client the packet type.
3989 </summary>
3990 @@ -15190,7 +15007,7 @@ Domain allowed access.
3991 </summary>
3992 </param>
3993 </interface>
3994 -<interface name="corenet_send_amavisd_send_server_packets" lineno="8045">
3995 +<interface name="corenet_send_amavisd_send_server_packets" lineno="8168">
3996 <summary>
3997 Send amavisd_send_server packets.
3998 </summary>
3999 @@ -15201,7 +15018,7 @@ Domain allowed access.
4000 </param>
4001 <infoflow type="write" weight="10"/>
4002 </interface>
4003 -<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="8064">
4004 +<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="8187">
4005 <summary>
4006 Do not audit attempts to send amavisd_send_server packets.
4007 </summary>
4008 @@ -15212,7 +15029,7 @@ Domain to not audit.
4009 </param>
4010 <infoflow type="none"/>
4011 </interface>
4012 -<interface name="corenet_receive_amavisd_send_server_packets" lineno="8083">
4013 +<interface name="corenet_receive_amavisd_send_server_packets" lineno="8206">
4014 <summary>
4015 Receive amavisd_send_server packets.
4016 </summary>
4017 @@ -15223,7 +15040,7 @@ Domain allowed access.
4018 </param>
4019 <infoflow type="read" weight="10"/>
4020 </interface>
4021 -<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="8102">
4022 +<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="8225">
4023 <summary>
4024 Do not audit attempts to receive amavisd_send_server packets.
4025 </summary>
4026 @@ -15234,7 +15051,7 @@ Domain allowed access.
4027 </param>
4028 <infoflow type="none"/>
4029 </interface>
4030 -<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="8121">
4031 +<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="8244">
4032 <summary>
4033 Send and receive amavisd_send_server packets.
4034 </summary>
4035 @@ -15245,7 +15062,7 @@ Domain allowed access.
4036 </param>
4037 <infoflow type="both" weight="10"/>
4038 </interface>
4039 -<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="8137">
4040 +<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="8260">
4041 <summary>
4042 Do not audit attempts to send and receive amavisd_send_server packets.
4043 </summary>
4044 @@ -15256,7 +15073,7 @@ Domain to not audit.
4045 </param>
4046 <infoflow type="none"/>
4047 </interface>
4048 -<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="8152">
4049 +<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="8275">
4050 <summary>
4051 Relabel packets to amavisd_send_server the packet type.
4052 </summary>
4053 @@ -15266,7 +15083,7 @@ Domain allowed access.
4054 </summary>
4055 </param>
4056 </interface>
4057 -<interface name="corenet_tcp_sendrecv_amqp_port" lineno="8174">
4058 +<interface name="corenet_tcp_sendrecv_amqp_port" lineno="8297">
4059 <summary>
4060 Send and receive TCP traffic on the amqp port.
4061 </summary>
4062 @@ -15277,7 +15094,7 @@ Domain allowed access.
4063 </param>
4064 <infoflow type="both" weight="10"/>
4065 </interface>
4066 -<interface name="corenet_udp_send_amqp_port" lineno="8189">
4067 +<interface name="corenet_udp_send_amqp_port" lineno="8312">
4068 <summary>
4069 Send UDP traffic on the amqp port.
4070 </summary>
4071 @@ -15288,7 +15105,7 @@ Domain allowed access.
4072 </param>
4073 <infoflow type="write" weight="10"/>
4074 </interface>
4075 -<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="8204">
4076 +<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="8327">
4077 <summary>
4078 Do not audit attempts to send UDP traffic on the amqp port.
4079 </summary>
4080 @@ -15299,7 +15116,7 @@ Domain to not audit.
4081 </param>
4082 <infoflow type="none"/>
4083 </interface>
4084 -<interface name="corenet_udp_receive_amqp_port" lineno="8219">
4085 +<interface name="corenet_udp_receive_amqp_port" lineno="8342">
4086 <summary>
4087 Receive UDP traffic on the amqp port.
4088 </summary>
4089 @@ -15310,7 +15127,7 @@ Domain allowed access.
4090 </param>
4091 <infoflow type="read" weight="10"/>
4092 </interface>
4093 -<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="8234">
4094 +<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="8357">
4095 <summary>
4096 Do not audit attempts to receive UDP traffic on the amqp port.
4097 </summary>
4098 @@ -15321,7 +15138,7 @@ Domain to not audit.
4099 </param>
4100 <infoflow type="none"/>
4101 </interface>
4102 -<interface name="corenet_udp_sendrecv_amqp_port" lineno="8249">
4103 +<interface name="corenet_udp_sendrecv_amqp_port" lineno="8372">
4104 <summary>
4105 Send and receive UDP traffic on the amqp port.
4106 </summary>
4107 @@ -15332,7 +15149,7 @@ Domain allowed access.
4108 </param>
4109 <infoflow type="both" weight="10"/>
4110 </interface>
4111 -<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="8265">
4112 +<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="8388">
4113 <summary>
4114 Do not audit attempts to send and receive
4115 UDP traffic on the amqp port.
4116 @@ -15344,7 +15161,7 @@ Domain to not audit.
4117 </param>
4118 <infoflow type="none"/>
4119 </interface>
4120 -<interface name="corenet_tcp_bind_amqp_port" lineno="8280">
4121 +<interface name="corenet_tcp_bind_amqp_port" lineno="8403">
4122 <summary>
4123 Bind TCP sockets to the amqp port.
4124 </summary>
4125 @@ -15355,7 +15172,7 @@ Domain allowed access.
4126 </param>
4127 <infoflow type="none"/>
4128 </interface>
4129 -<interface name="corenet_udp_bind_amqp_port" lineno="8300">
4130 +<interface name="corenet_udp_bind_amqp_port" lineno="8423">
4131 <summary>
4132 Bind UDP sockets to the amqp port.
4133 </summary>
4134 @@ -15366,7 +15183,7 @@ Domain allowed access.
4135 </param>
4136 <infoflow type="none"/>
4137 </interface>
4138 -<interface name="corenet_tcp_connect_amqp_port" lineno="8319">
4139 +<interface name="corenet_tcp_connect_amqp_port" lineno="8442">
4140 <summary>
4141 Make a TCP connection to the amqp port.
4142 </summary>
4143 @@ -15376,7 +15193,7 @@ Domain allowed access.
4144 </summary>
4145 </param>
4146 </interface>
4147 -<interface name="corenet_send_amqp_client_packets" lineno="8339">
4148 +<interface name="corenet_send_amqp_client_packets" lineno="8462">
4149 <summary>
4150 Send amqp_client packets.
4151 </summary>
4152 @@ -15387,7 +15204,7 @@ Domain allowed access.
4153 </param>
4154 <infoflow type="write" weight="10"/>
4155 </interface>
4156 -<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="8358">
4157 +<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="8481">
4158 <summary>
4159 Do not audit attempts to send amqp_client packets.
4160 </summary>
4161 @@ -15398,7 +15215,7 @@ Domain to not audit.
4162 </param>
4163 <infoflow type="none"/>
4164 </interface>
4165 -<interface name="corenet_receive_amqp_client_packets" lineno="8377">
4166 +<interface name="corenet_receive_amqp_client_packets" lineno="8500">
4167 <summary>
4168 Receive amqp_client packets.
4169 </summary>
4170 @@ -15409,7 +15226,7 @@ Domain allowed access.
4171 </param>
4172 <infoflow type="read" weight="10"/>
4173 </interface>
4174 -<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="8396">
4175 +<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="8519">
4176 <summary>
4177 Do not audit attempts to receive amqp_client packets.
4178 </summary>
4179 @@ -15420,7 +15237,7 @@ Domain allowed access.
4180 </param>
4181 <infoflow type="none"/>
4182 </interface>
4183 -<interface name="corenet_sendrecv_amqp_client_packets" lineno="8415">
4184 +<interface name="corenet_sendrecv_amqp_client_packets" lineno="8538">
4185 <summary>
4186 Send and receive amqp_client packets.
4187 </summary>
4188 @@ -15431,7 +15248,7 @@ Domain allowed access.
4189 </param>
4190 <infoflow type="both" weight="10"/>
4191 </interface>
4192 -<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="8431">
4193 +<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="8554">
4194 <summary>
4195 Do not audit attempts to send and receive amqp_client packets.
4196 </summary>
4197 @@ -15442,7 +15259,7 @@ Domain to not audit.
4198 </param>
4199 <infoflow type="none"/>
4200 </interface>
4201 -<interface name="corenet_relabelto_amqp_client_packets" lineno="8446">
4202 +<interface name="corenet_relabelto_amqp_client_packets" lineno="8569">
4203 <summary>
4204 Relabel packets to amqp_client the packet type.
4205 </summary>
4206 @@ -15452,7 +15269,7 @@ Domain allowed access.
4207 </summary>
4208 </param>
4209 </interface>
4210 -<interface name="corenet_send_amqp_server_packets" lineno="8466">
4211 +<interface name="corenet_send_amqp_server_packets" lineno="8589">
4212 <summary>
4213 Send amqp_server packets.
4214 </summary>
4215 @@ -15463,7 +15280,7 @@ Domain allowed access.
4216 </param>
4217 <infoflow type="write" weight="10"/>
4218 </interface>
4219 -<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="8485">
4220 +<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="8608">
4221 <summary>
4222 Do not audit attempts to send amqp_server packets.
4223 </summary>
4224 @@ -15474,7 +15291,7 @@ Domain to not audit.
4225 </param>
4226 <infoflow type="none"/>
4227 </interface>
4228 -<interface name="corenet_receive_amqp_server_packets" lineno="8504">
4229 +<interface name="corenet_receive_amqp_server_packets" lineno="8627">
4230 <summary>
4231 Receive amqp_server packets.
4232 </summary>
4233 @@ -15485,7 +15302,7 @@ Domain allowed access.
4234 </param>
4235 <infoflow type="read" weight="10"/>
4236 </interface>
4237 -<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="8523">
4238 +<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="8646">
4239 <summary>
4240 Do not audit attempts to receive amqp_server packets.
4241 </summary>
4242 @@ -15496,7 +15313,7 @@ Domain allowed access.
4243 </param>
4244 <infoflow type="none"/>
4245 </interface>
4246 -<interface name="corenet_sendrecv_amqp_server_packets" lineno="8542">
4247 +<interface name="corenet_sendrecv_amqp_server_packets" lineno="8665">
4248 <summary>
4249 Send and receive amqp_server packets.
4250 </summary>
4251 @@ -15507,7 +15324,7 @@ Domain allowed access.
4252 </param>
4253 <infoflow type="both" weight="10"/>
4254 </interface>
4255 -<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="8558">
4256 +<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="8681">
4257 <summary>
4258 Do not audit attempts to send and receive amqp_server packets.
4259 </summary>
4260 @@ -15518,7 +15335,7 @@ Domain to not audit.
4261 </param>
4262 <infoflow type="none"/>
4263 </interface>
4264 -<interface name="corenet_relabelto_amqp_server_packets" lineno="8573">
4265 +<interface name="corenet_relabelto_amqp_server_packets" lineno="8696">
4266 <summary>
4267 Relabel packets to amqp_server the packet type.
4268 </summary>
4269 @@ -15528,7 +15345,7 @@ Domain allowed access.
4270 </summary>
4271 </param>
4272 </interface>
4273 -<interface name="corenet_tcp_sendrecv_aol_port" lineno="8595">
4274 +<interface name="corenet_tcp_sendrecv_aol_port" lineno="8718">
4275 <summary>
4276 Send and receive TCP traffic on the aol port.
4277 </summary>
4278 @@ -15539,7 +15356,7 @@ Domain allowed access.
4279 </param>
4280 <infoflow type="both" weight="10"/>
4281 </interface>
4282 -<interface name="corenet_udp_send_aol_port" lineno="8610">
4283 +<interface name="corenet_udp_send_aol_port" lineno="8733">
4284 <summary>
4285 Send UDP traffic on the aol port.
4286 </summary>
4287 @@ -15550,7 +15367,7 @@ Domain allowed access.
4288 </param>
4289 <infoflow type="write" weight="10"/>
4290 </interface>
4291 -<interface name="corenet_dontaudit_udp_send_aol_port" lineno="8625">
4292 +<interface name="corenet_dontaudit_udp_send_aol_port" lineno="8748">
4293 <summary>
4294 Do not audit attempts to send UDP traffic on the aol port.
4295 </summary>
4296 @@ -15561,7 +15378,7 @@ Domain to not audit.
4297 </param>
4298 <infoflow type="none"/>
4299 </interface>
4300 -<interface name="corenet_udp_receive_aol_port" lineno="8640">
4301 +<interface name="corenet_udp_receive_aol_port" lineno="8763">
4302 <summary>
4303 Receive UDP traffic on the aol port.
4304 </summary>
4305 @@ -15572,7 +15389,7 @@ Domain allowed access.
4306 </param>
4307 <infoflow type="read" weight="10"/>
4308 </interface>
4309 -<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="8655">
4310 +<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="8778">
4311 <summary>
4312 Do not audit attempts to receive UDP traffic on the aol port.
4313 </summary>
4314 @@ -15583,7 +15400,7 @@ Domain to not audit.
4315 </param>
4316 <infoflow type="none"/>
4317 </interface>
4318 -<interface name="corenet_udp_sendrecv_aol_port" lineno="8670">
4319 +<interface name="corenet_udp_sendrecv_aol_port" lineno="8793">
4320 <summary>
4321 Send and receive UDP traffic on the aol port.
4322 </summary>
4323 @@ -15594,7 +15411,7 @@ Domain allowed access.
4324 </param>
4325 <infoflow type="both" weight="10"/>
4326 </interface>
4327 -<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="8686">
4328 +<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="8809">
4329 <summary>
4330 Do not audit attempts to send and receive
4331 UDP traffic on the aol port.
4332 @@ -15606,7 +15423,7 @@ Domain to not audit.
4333 </param>
4334 <infoflow type="none"/>
4335 </interface>
4336 -<interface name="corenet_tcp_bind_aol_port" lineno="8701">
4337 +<interface name="corenet_tcp_bind_aol_port" lineno="8824">
4338 <summary>
4339 Bind TCP sockets to the aol port.
4340 </summary>
4341 @@ -15617,7 +15434,7 @@ Domain allowed access.
4342 </param>
4343 <infoflow type="none"/>
4344 </interface>
4345 -<interface name="corenet_udp_bind_aol_port" lineno="8721">
4346 +<interface name="corenet_udp_bind_aol_port" lineno="8844">
4347 <summary>
4348 Bind UDP sockets to the aol port.
4349 </summary>
4350 @@ -15628,7 +15445,7 @@ Domain allowed access.
4351 </param>
4352 <infoflow type="none"/>
4353 </interface>
4354 -<interface name="corenet_tcp_connect_aol_port" lineno="8740">
4355 +<interface name="corenet_tcp_connect_aol_port" lineno="8863">
4356 <summary>
4357 Make a TCP connection to the aol port.
4358 </summary>
4359 @@ -15638,7 +15455,7 @@ Domain allowed access.
4360 </summary>
4361 </param>
4362 </interface>
4363 -<interface name="corenet_send_aol_client_packets" lineno="8760">
4364 +<interface name="corenet_send_aol_client_packets" lineno="8883">
4365 <summary>
4366 Send aol_client packets.
4367 </summary>
4368 @@ -15649,7 +15466,7 @@ Domain allowed access.
4369 </param>
4370 <infoflow type="write" weight="10"/>
4371 </interface>
4372 -<interface name="corenet_dontaudit_send_aol_client_packets" lineno="8779">
4373 +<interface name="corenet_dontaudit_send_aol_client_packets" lineno="8902">
4374 <summary>
4375 Do not audit attempts to send aol_client packets.
4376 </summary>
4377 @@ -15660,7 +15477,7 @@ Domain to not audit.
4378 </param>
4379 <infoflow type="none"/>
4380 </interface>
4381 -<interface name="corenet_receive_aol_client_packets" lineno="8798">
4382 +<interface name="corenet_receive_aol_client_packets" lineno="8921">
4383 <summary>
4384 Receive aol_client packets.
4385 </summary>
4386 @@ -15671,7 +15488,7 @@ Domain allowed access.
4387 </param>
4388 <infoflow type="read" weight="10"/>
4389 </interface>
4390 -<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="8817">
4391 +<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="8940">
4392 <summary>
4393 Do not audit attempts to receive aol_client packets.
4394 </summary>
4395 @@ -15682,7 +15499,7 @@ Domain allowed access.
4396 </param>
4397 <infoflow type="none"/>
4398 </interface>
4399 -<interface name="corenet_sendrecv_aol_client_packets" lineno="8836">
4400 +<interface name="corenet_sendrecv_aol_client_packets" lineno="8959">
4401 <summary>
4402 Send and receive aol_client packets.
4403 </summary>
4404 @@ -15693,7 +15510,7 @@ Domain allowed access.
4405 </param>
4406 <infoflow type="both" weight="10"/>
4407 </interface>
4408 -<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="8852">
4409 +<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="8975">
4410 <summary>
4411 Do not audit attempts to send and receive aol_client packets.
4412 </summary>
4413 @@ -15704,7 +15521,7 @@ Domain to not audit.
4414 </param>
4415 <infoflow type="none"/>
4416 </interface>
4417 -<interface name="corenet_relabelto_aol_client_packets" lineno="8867">
4418 +<interface name="corenet_relabelto_aol_client_packets" lineno="8990">
4419 <summary>
4420 Relabel packets to aol_client the packet type.
4421 </summary>
4422 @@ -15714,7 +15531,7 @@ Domain allowed access.
4423 </summary>
4424 </param>
4425 </interface>
4426 -<interface name="corenet_send_aol_server_packets" lineno="8887">
4427 +<interface name="corenet_send_aol_server_packets" lineno="9010">
4428 <summary>
4429 Send aol_server packets.
4430 </summary>
4431 @@ -15725,7 +15542,7 @@ Domain allowed access.
4432 </param>
4433 <infoflow type="write" weight="10"/>
4434 </interface>
4435 -<interface name="corenet_dontaudit_send_aol_server_packets" lineno="8906">
4436 +<interface name="corenet_dontaudit_send_aol_server_packets" lineno="9029">
4437 <summary>
4438 Do not audit attempts to send aol_server packets.
4439 </summary>
4440 @@ -15736,7 +15553,7 @@ Domain to not audit.
4441 </param>
4442 <infoflow type="none"/>
4443 </interface>
4444 -<interface name="corenet_receive_aol_server_packets" lineno="8925">
4445 +<interface name="corenet_receive_aol_server_packets" lineno="9048">
4446 <summary>
4447 Receive aol_server packets.
4448 </summary>
4449 @@ -15747,7 +15564,7 @@ Domain allowed access.
4450 </param>
4451 <infoflow type="read" weight="10"/>
4452 </interface>
4453 -<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="8944">
4454 +<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="9067">
4455 <summary>
4456 Do not audit attempts to receive aol_server packets.
4457 </summary>
4458 @@ -15758,7 +15575,7 @@ Domain allowed access.
4459 </param>
4460 <infoflow type="none"/>
4461 </interface>
4462 -<interface name="corenet_sendrecv_aol_server_packets" lineno="8963">
4463 +<interface name="corenet_sendrecv_aol_server_packets" lineno="9086">
4464 <summary>
4465 Send and receive aol_server packets.
4466 </summary>
4467 @@ -15769,7 +15586,7 @@ Domain allowed access.
4468 </param>
4469 <infoflow type="both" weight="10"/>
4470 </interface>
4471 -<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="8979">
4472 +<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="9102">
4473 <summary>
4474 Do not audit attempts to send and receive aol_server packets.
4475 </summary>
4476 @@ -15780,7 +15597,7 @@ Domain to not audit.
4477 </param>
4478 <infoflow type="none"/>
4479 </interface>
4480 -<interface name="corenet_relabelto_aol_server_packets" lineno="8994">
4481 +<interface name="corenet_relabelto_aol_server_packets" lineno="9117">
4482 <summary>
4483 Relabel packets to aol_server the packet type.
4484 </summary>
4485 @@ -15790,7 +15607,7 @@ Domain allowed access.
4486 </summary>
4487 </param>
4488 </interface>
4489 -<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="9016">
4490 +<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="9139">
4491 <summary>
4492 Send and receive TCP traffic on the apcupsd port.
4493 </summary>
4494 @@ -15801,7 +15618,7 @@ Domain allowed access.
4495 </param>
4496 <infoflow type="both" weight="10"/>
4497 </interface>
4498 -<interface name="corenet_udp_send_apcupsd_port" lineno="9031">
4499 +<interface name="corenet_udp_send_apcupsd_port" lineno="9154">
4500 <summary>
4501 Send UDP traffic on the apcupsd port.
4502 </summary>
4503 @@ -15812,7 +15629,7 @@ Domain allowed access.
4504 </param>
4505 <infoflow type="write" weight="10"/>
4506 </interface>
4507 -<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="9046">
4508 +<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="9169">
4509 <summary>
4510 Do not audit attempts to send UDP traffic on the apcupsd port.
4511 </summary>
4512 @@ -15823,7 +15640,7 @@ Domain to not audit.
4513 </param>
4514 <infoflow type="none"/>
4515 </interface>
4516 -<interface name="corenet_udp_receive_apcupsd_port" lineno="9061">
4517 +<interface name="corenet_udp_receive_apcupsd_port" lineno="9184">
4518 <summary>
4519 Receive UDP traffic on the apcupsd port.
4520 </summary>
4521 @@ -15834,7 +15651,7 @@ Domain allowed access.
4522 </param>
4523 <infoflow type="read" weight="10"/>
4524 </interface>
4525 -<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="9076">
4526 +<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="9199">
4527 <summary>
4528 Do not audit attempts to receive UDP traffic on the apcupsd port.
4529 </summary>
4530 @@ -15845,7 +15662,7 @@ Domain to not audit.
4531 </param>
4532 <infoflow type="none"/>
4533 </interface>
4534 -<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="9091">
4535 +<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="9214">
4536 <summary>
4537 Send and receive UDP traffic on the apcupsd port.
4538 </summary>
4539 @@ -15856,7 +15673,7 @@ Domain allowed access.
4540 </param>
4541 <infoflow type="both" weight="10"/>
4542 </interface>
4543 -<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="9107">
4544 +<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="9230">
4545 <summary>
4546 Do not audit attempts to send and receive
4547 UDP traffic on the apcupsd port.
4548 @@ -15868,7 +15685,7 @@ Domain to not audit.
4549 </param>
4550 <infoflow type="none"/>
4551 </interface>
4552 -<interface name="corenet_tcp_bind_apcupsd_port" lineno="9122">
4553 +<interface name="corenet_tcp_bind_apcupsd_port" lineno="9245">
4554 <summary>
4555 Bind TCP sockets to the apcupsd port.
4556 </summary>
4557 @@ -15879,7 +15696,7 @@ Domain allowed access.
4558 </param>
4559 <infoflow type="none"/>
4560 </interface>
4561 -<interface name="corenet_udp_bind_apcupsd_port" lineno="9142">
4562 +<interface name="corenet_udp_bind_apcupsd_port" lineno="9265">
4563 <summary>
4564 Bind UDP sockets to the apcupsd port.
4565 </summary>
4566 @@ -15890,7 +15707,7 @@ Domain allowed access.
4567 </param>
4568 <infoflow type="none"/>
4569 </interface>
4570 -<interface name="corenet_tcp_connect_apcupsd_port" lineno="9161">
4571 +<interface name="corenet_tcp_connect_apcupsd_port" lineno="9284">
4572 <summary>
4573 Make a TCP connection to the apcupsd port.
4574 </summary>
4575 @@ -15900,7 +15717,7 @@ Domain allowed access.
4576 </summary>
4577 </param>
4578 </interface>
4579 -<interface name="corenet_send_apcupsd_client_packets" lineno="9181">
4580 +<interface name="corenet_send_apcupsd_client_packets" lineno="9304">
4581 <summary>
4582 Send apcupsd_client packets.
4583 </summary>
4584 @@ -15911,7 +15728,7 @@ Domain allowed access.
4585 </param>
4586 <infoflow type="write" weight="10"/>
4587 </interface>
4588 -<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="9200">
4589 +<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="9323">
4590 <summary>
4591 Do not audit attempts to send apcupsd_client packets.
4592 </summary>
4593 @@ -15922,7 +15739,7 @@ Domain to not audit.
4594 </param>
4595 <infoflow type="none"/>
4596 </interface>
4597 -<interface name="corenet_receive_apcupsd_client_packets" lineno="9219">
4598 +<interface name="corenet_receive_apcupsd_client_packets" lineno="9342">
4599 <summary>
4600 Receive apcupsd_client packets.
4601 </summary>
4602 @@ -15933,7 +15750,7 @@ Domain allowed access.
4603 </param>
4604 <infoflow type="read" weight="10"/>
4605 </interface>
4606 -<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="9238">
4607 +<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="9361">
4608 <summary>
4609 Do not audit attempts to receive apcupsd_client packets.
4610 </summary>
4611 @@ -15944,7 +15761,7 @@ Domain allowed access.
4612 </param>
4613 <infoflow type="none"/>
4614 </interface>
4615 -<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="9257">
4616 +<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="9380">
4617 <summary>
4618 Send and receive apcupsd_client packets.
4619 </summary>
4620 @@ -15955,7 +15772,7 @@ Domain allowed access.
4621 </param>
4622 <infoflow type="both" weight="10"/>
4623 </interface>
4624 -<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="9273">
4625 +<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="9396">
4626 <summary>
4627 Do not audit attempts to send and receive apcupsd_client packets.
4628 </summary>
4629 @@ -15966,7 +15783,7 @@ Domain to not audit.
4630 </param>
4631 <infoflow type="none"/>
4632 </interface>
4633 -<interface name="corenet_relabelto_apcupsd_client_packets" lineno="9288">
4634 +<interface name="corenet_relabelto_apcupsd_client_packets" lineno="9411">
4635 <summary>
4636 Relabel packets to apcupsd_client the packet type.
4637 </summary>
4638 @@ -15976,7 +15793,7 @@ Domain allowed access.
4639 </summary>
4640 </param>
4641 </interface>
4642 -<interface name="corenet_send_apcupsd_server_packets" lineno="9308">
4643 +<interface name="corenet_send_apcupsd_server_packets" lineno="9431">
4644 <summary>
4645 Send apcupsd_server packets.
4646 </summary>
4647 @@ -15987,7 +15804,7 @@ Domain allowed access.
4648 </param>
4649 <infoflow type="write" weight="10"/>
4650 </interface>
4651 -<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="9327">
4652 +<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="9450">
4653 <summary>
4654 Do not audit attempts to send apcupsd_server packets.
4655 </summary>
4656 @@ -15998,7 +15815,7 @@ Domain to not audit.
4657 </param>
4658 <infoflow type="none"/>
4659 </interface>
4660 -<interface name="corenet_receive_apcupsd_server_packets" lineno="9346">
4661 +<interface name="corenet_receive_apcupsd_server_packets" lineno="9469">
4662 <summary>
4663 Receive apcupsd_server packets.
4664 </summary>
4665 @@ -16009,7 +15826,7 @@ Domain allowed access.
4666 </param>
4667 <infoflow type="read" weight="10"/>
4668 </interface>
4669 -<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="9365">
4670 +<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="9488">
4671 <summary>
4672 Do not audit attempts to receive apcupsd_server packets.
4673 </summary>
4674 @@ -16020,7 +15837,7 @@ Domain allowed access.
4675 </param>
4676 <infoflow type="none"/>
4677 </interface>
4678 -<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="9384">
4679 +<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="9507">
4680 <summary>
4681 Send and receive apcupsd_server packets.
4682 </summary>
4683 @@ -16031,7 +15848,7 @@ Domain allowed access.
4684 </param>
4685 <infoflow type="both" weight="10"/>
4686 </interface>
4687 -<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="9400">
4688 +<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="9523">
4689 <summary>
4690 Do not audit attempts to send and receive apcupsd_server packets.
4691 </summary>
4692 @@ -16042,7 +15859,7 @@ Domain to not audit.
4693 </param>
4694 <infoflow type="none"/>
4695 </interface>
4696 -<interface name="corenet_relabelto_apcupsd_server_packets" lineno="9415">
4697 +<interface name="corenet_relabelto_apcupsd_server_packets" lineno="9538">
4698 <summary>
4699 Relabel packets to apcupsd_server the packet type.
4700 </summary>
4701 @@ -16052,7 +15869,7 @@ Domain allowed access.
4702 </summary>
4703 </param>
4704 </interface>
4705 -<interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="9437">
4706 +<interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="9560">
4707 <summary>
4708 Send and receive TCP traffic on the apertus_ldp port.
4709 </summary>
4710 @@ -16063,7 +15880,7 @@ Domain allowed access.
4711 </param>
4712 <infoflow type="both" weight="10"/>
4713 </interface>
4714 -<interface name="corenet_udp_send_apertus_ldp_port" lineno="9452">
4715 +<interface name="corenet_udp_send_apertus_ldp_port" lineno="9575">
4716 <summary>
4717 Send UDP traffic on the apertus_ldp port.
4718 </summary>
4719 @@ -16074,7 +15891,7 @@ Domain allowed access.
4720 </param>
4721 <infoflow type="write" weight="10"/>
4722 </interface>
4723 -<interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="9467">
4724 +<interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="9590">
4725 <summary>
4726 Do not audit attempts to send UDP traffic on the apertus_ldp port.
4727 </summary>
4728 @@ -16085,7 +15902,7 @@ Domain to not audit.
4729 </param>
4730 <infoflow type="none"/>
4731 </interface>
4732 -<interface name="corenet_udp_receive_apertus_ldp_port" lineno="9482">
4733 +<interface name="corenet_udp_receive_apertus_ldp_port" lineno="9605">
4734 <summary>
4735 Receive UDP traffic on the apertus_ldp port.
4736 </summary>
4737 @@ -16096,7 +15913,7 @@ Domain allowed access.
4738 </param>
4739 <infoflow type="read" weight="10"/>
4740 </interface>
4741 -<interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="9497">
4742 +<interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="9620">
4743 <summary>
4744 Do not audit attempts to receive UDP traffic on the apertus_ldp port.
4745 </summary>
4746 @@ -16107,7 +15924,7 @@ Domain to not audit.
4747 </param>
4748 <infoflow type="none"/>
4749 </interface>
4750 -<interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="9512">
4751 +<interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="9635">
4752 <summary>
4753 Send and receive UDP traffic on the apertus_ldp port.
4754 </summary>
4755 @@ -16118,7 +15935,7 @@ Domain allowed access.
4756 </param>
4757 <infoflow type="both" weight="10"/>
4758 </interface>
4759 -<interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="9528">
4760 +<interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="9651">
4761 <summary>
4762 Do not audit attempts to send and receive
4763 UDP traffic on the apertus_ldp port.
4764 @@ -16130,7 +15947,7 @@ Domain to not audit.
4765 </param>
4766 <infoflow type="none"/>
4767 </interface>
4768 -<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="9543">
4769 +<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="9666">
4770 <summary>
4771 Bind TCP sockets to the apertus_ldp port.
4772 </summary>
4773 @@ -16141,7 +15958,7 @@ Domain allowed access.
4774 </param>
4775 <infoflow type="none"/>
4776 </interface>
4777 -<interface name="corenet_udp_bind_apertus_ldp_port" lineno="9563">
4778 +<interface name="corenet_udp_bind_apertus_ldp_port" lineno="9686">
4779 <summary>
4780 Bind UDP sockets to the apertus_ldp port.
4781 </summary>
4782 @@ -16152,7 +15969,7 @@ Domain allowed access.
4783 </param>
4784 <infoflow type="none"/>
4785 </interface>
4786 -<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="9582">
4787 +<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="9705">
4788 <summary>
4789 Make a TCP connection to the apertus_ldp port.
4790 </summary>
4791 @@ -16162,7 +15979,7 @@ Domain allowed access.
4792 </summary>
4793 </param>
4794 </interface>
4795 -<interface name="corenet_send_apertus_ldp_client_packets" lineno="9602">
4796 +<interface name="corenet_send_apertus_ldp_client_packets" lineno="9725">
4797 <summary>
4798 Send apertus_ldp_client packets.
4799 </summary>
4800 @@ -16173,7 +15990,7 @@ Domain allowed access.
4801 </param>
4802 <infoflow type="write" weight="10"/>
4803 </interface>
4804 -<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="9621">
4805 +<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="9744">
4806 <summary>
4807 Do not audit attempts to send apertus_ldp_client packets.
4808 </summary>
4809 @@ -16184,7 +16001,7 @@ Domain to not audit.
4810 </param>
4811 <infoflow type="none"/>
4812 </interface>
4813 -<interface name="corenet_receive_apertus_ldp_client_packets" lineno="9640">
4814 +<interface name="corenet_receive_apertus_ldp_client_packets" lineno="9763">
4815 <summary>
4816 Receive apertus_ldp_client packets.
4817 </summary>
4818 @@ -16195,7 +16012,7 @@ Domain allowed access.
4819 </param>
4820 <infoflow type="read" weight="10"/>
4821 </interface>
4822 -<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="9659">
4823 +<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="9782">
4824 <summary>
4825 Do not audit attempts to receive apertus_ldp_client packets.
4826 </summary>
4827 @@ -16206,7 +16023,7 @@ Domain allowed access.
4828 </param>
4829 <infoflow type="none"/>
4830 </interface>
4831 -<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="9678">
4832 +<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="9801">
4833 <summary>
4834 Send and receive apertus_ldp_client packets.
4835 </summary>
4836 @@ -16217,7 +16034,7 @@ Domain allowed access.
4837 </param>
4838 <infoflow type="both" weight="10"/>
4839 </interface>
4840 -<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="9694">
4841 +<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="9817">
4842 <summary>
4843 Do not audit attempts to send and receive apertus_ldp_client packets.
4844 </summary>
4845 @@ -16228,7 +16045,7 @@ Domain to not audit.
4846 </param>
4847 <infoflow type="none"/>
4848 </interface>
4849 -<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="9709">
4850 +<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="9832">
4851 <summary>
4852 Relabel packets to apertus_ldp_client the packet type.
4853 </summary>
4854 @@ -16238,7 +16055,7 @@ Domain allowed access.
4855 </summary>
4856 </param>
4857 </interface>
4858 -<interface name="corenet_send_apertus_ldp_server_packets" lineno="9729">
4859 +<interface name="corenet_send_apertus_ldp_server_packets" lineno="9852">
4860 <summary>
4861 Send apertus_ldp_server packets.
4862 </summary>
4863 @@ -16249,7 +16066,7 @@ Domain allowed access.
4864 </param>
4865 <infoflow type="write" weight="10"/>
4866 </interface>
4867 -<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="9748">
4868 +<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="9871">
4869 <summary>
4870 Do not audit attempts to send apertus_ldp_server packets.
4871 </summary>
4872 @@ -16260,7 +16077,7 @@ Domain to not audit.
4873 </param>
4874 <infoflow type="none"/>
4875 </interface>
4876 -<interface name="corenet_receive_apertus_ldp_server_packets" lineno="9767">
4877 +<interface name="corenet_receive_apertus_ldp_server_packets" lineno="9890">
4878 <summary>
4879 Receive apertus_ldp_server packets.
4880 </summary>
4881 @@ -16271,7 +16088,7 @@ Domain allowed access.
4882 </param>
4883 <infoflow type="read" weight="10"/>
4884 </interface>
4885 -<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="9786">
4886 +<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="9909">
4887 <summary>
4888 Do not audit attempts to receive apertus_ldp_server packets.
4889 </summary>
4890 @@ -16282,7 +16099,7 @@ Domain allowed access.
4891 </param>
4892 <infoflow type="none"/>
4893 </interface>
4894 -<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="9805">
4895 +<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="9928">
4896 <summary>
4897 Send and receive apertus_ldp_server packets.
4898 </summary>
4899 @@ -16293,7 +16110,7 @@ Domain allowed access.
4900 </param>
4901 <infoflow type="both" weight="10"/>
4902 </interface>
4903 -<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="9821">
4904 +<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="9944">
4905 <summary>
4906 Do not audit attempts to send and receive apertus_ldp_server packets.
4907 </summary>
4908 @@ -16304,7 +16121,7 @@ Domain to not audit.
4909 </param>
4910 <infoflow type="none"/>
4911 </interface>
4912 -<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="9836">
4913 +<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="9959">
4914 <summary>
4915 Relabel packets to apertus_ldp_server the packet type.
4916 </summary>
4917 @@ -16314,7 +16131,269 @@ Domain allowed access.
4918 </summary>
4919 </param>
4920 </interface>
4921 -<interface name="corenet_tcp_sendrecv_armtechdaemon_port" lineno="9858">
4922 +<interface name="corenet_tcp_sendrecv_aptcacher_port" lineno="9981">
4923 +<summary>
4924 +Send and receive TCP traffic on the aptcacher port.
4925 +</summary>
4926 +<param name="domain">
4927 +<summary>
4928 +Domain allowed access.
4929 +</summary>
4930 +</param>
4931 +<infoflow type="both" weight="10"/>
4932 +</interface>
4933 +<interface name="corenet_udp_send_aptcacher_port" lineno="9996">
4934 +<summary>
4935 +Send UDP traffic on the aptcacher port.
4936 +</summary>
4937 +<param name="domain">
4938 +<summary>
4939 +Domain allowed access.
4940 +</summary>
4941 +</param>
4942 +<infoflow type="write" weight="10"/>
4943 +</interface>
4944 +<interface name="corenet_dontaudit_udp_send_aptcacher_port" lineno="10011">
4945 +<summary>
4946 +Do not audit attempts to send UDP traffic on the aptcacher port.
4947 +</summary>
4948 +<param name="domain">
4949 +<summary>
4950 +Domain to not audit.
4951 +</summary>
4952 +</param>
4953 +<infoflow type="none"/>
4954 +</interface>
4955 +<interface name="corenet_udp_receive_aptcacher_port" lineno="10026">
4956 +<summary>
4957 +Receive UDP traffic on the aptcacher port.
4958 +</summary>
4959 +<param name="domain">
4960 +<summary>
4961 +Domain allowed access.
4962 +</summary>
4963 +</param>
4964 +<infoflow type="read" weight="10"/>
4965 +</interface>
4966 +<interface name="corenet_dontaudit_udp_receive_aptcacher_port" lineno="10041">
4967 +<summary>
4968 +Do not audit attempts to receive UDP traffic on the aptcacher port.
4969 +</summary>
4970 +<param name="domain">
4971 +<summary>
4972 +Domain to not audit.
4973 +</summary>
4974 +</param>
4975 +<infoflow type="none"/>
4976 +</interface>
4977 +<interface name="corenet_udp_sendrecv_aptcacher_port" lineno="10056">
4978 +<summary>
4979 +Send and receive UDP traffic on the aptcacher port.
4980 +</summary>
4981 +<param name="domain">
4982 +<summary>
4983 +Domain allowed access.
4984 +</summary>
4985 +</param>
4986 +<infoflow type="both" weight="10"/>
4987 +</interface>
4988 +<interface name="corenet_dontaudit_udp_sendrecv_aptcacher_port" lineno="10072">
4989 +<summary>
4990 +Do not audit attempts to send and receive
4991 +UDP traffic on the aptcacher port.
4992 +</summary>
4993 +<param name="domain">
4994 +<summary>
4995 +Domain to not audit.
4996 +</summary>
4997 +</param>
4998 +<infoflow type="none"/>
4999 +</interface>
5000 +<interface name="corenet_tcp_bind_aptcacher_port" lineno="10087">
5001 +<summary>
5002 +Bind TCP sockets to the aptcacher port.
5003 +</summary>
5004 +<param name="domain">
5005 +<summary>
5006 +Domain allowed access.
5007 +</summary>
5008 +</param>
5009 +<infoflow type="none"/>
5010 +</interface>
5011 +<interface name="corenet_udp_bind_aptcacher_port" lineno="10107">
5012 +<summary>
5013 +Bind UDP sockets to the aptcacher port.
5014 +</summary>
5015 +<param name="domain">
5016 +<summary>
5017 +Domain allowed access.
5018 +</summary>
5019 +</param>
5020 +<infoflow type="none"/>
5021 +</interface>
5022 +<interface name="corenet_tcp_connect_aptcacher_port" lineno="10126">
5023 +<summary>
5024 +Make a TCP connection to the aptcacher port.
5025 +</summary>
5026 +<param name="domain">
5027 +<summary>
5028 +Domain allowed access.
5029 +</summary>
5030 +</param>
5031 +</interface>
5032 +<interface name="corenet_send_aptcacher_client_packets" lineno="10146">
5033 +<summary>
5034 +Send aptcacher_client packets.
5035 +</summary>
5036 +<param name="domain">
5037 +<summary>
5038 +Domain allowed access.
5039 +</summary>
5040 +</param>
5041 +<infoflow type="write" weight="10"/>
5042 +</interface>
5043 +<interface name="corenet_dontaudit_send_aptcacher_client_packets" lineno="10165">
5044 +<summary>
5045 +Do not audit attempts to send aptcacher_client packets.
5046 +</summary>
5047 +<param name="domain">
5048 +<summary>
5049 +Domain to not audit.
5050 +</summary>
5051 +</param>
5052 +<infoflow type="none"/>
5053 +</interface>
5054 +<interface name="corenet_receive_aptcacher_client_packets" lineno="10184">
5055 +<summary>
5056 +Receive aptcacher_client packets.
5057 +</summary>
5058 +<param name="domain">
5059 +<summary>
5060 +Domain allowed access.
5061 +</summary>
5062 +</param>
5063 +<infoflow type="read" weight="10"/>
5064 +</interface>
5065 +<interface name="corenet_dontaudit_receive_aptcacher_client_packets" lineno="10203">
5066 +<summary>
5067 +Do not audit attempts to receive aptcacher_client packets.
5068 +</summary>
5069 +<param name="domain">
5070 +<summary>
5071 +Domain allowed access.
5072 +</summary>
5073 +</param>
5074 +<infoflow type="none"/>
5075 +</interface>
5076 +<interface name="corenet_sendrecv_aptcacher_client_packets" lineno="10222">
5077 +<summary>
5078 +Send and receive aptcacher_client packets.
5079 +</summary>
5080 +<param name="domain">
5081 +<summary>
5082 +Domain allowed access.
5083 +</summary>
5084 +</param>
5085 +<infoflow type="both" weight="10"/>
5086 +</interface>
5087 +<interface name="corenet_dontaudit_sendrecv_aptcacher_client_packets" lineno="10238">
5088 +<summary>
5089 +Do not audit attempts to send and receive aptcacher_client packets.
5090 +</summary>
5091 +<param name="domain">
5092 +<summary>
5093 +Domain to not audit.
5094 +</summary>
5095 +</param>
5096 +<infoflow type="none"/>
5097 +</interface>
5098 +<interface name="corenet_relabelto_aptcacher_client_packets" lineno="10253">
5099 +<summary>
5100 +Relabel packets to aptcacher_client the packet type.
5101 +</summary>
5102 +<param name="domain">
5103 +<summary>
5104 +Domain allowed access.
5105 +</summary>
5106 +</param>
5107 +</interface>
5108 +<interface name="corenet_send_aptcacher_server_packets" lineno="10273">
5109 +<summary>
5110 +Send aptcacher_server packets.
5111 +</summary>
5112 +<param name="domain">
5113 +<summary>
5114 +Domain allowed access.
5115 +</summary>
5116 +</param>
5117 +<infoflow type="write" weight="10"/>
5118 +</interface>
5119 +<interface name="corenet_dontaudit_send_aptcacher_server_packets" lineno="10292">
5120 +<summary>
5121 +Do not audit attempts to send aptcacher_server packets.
5122 +</summary>
5123 +<param name="domain">
5124 +<summary>
5125 +Domain to not audit.
5126 +</summary>
5127 +</param>
5128 +<infoflow type="none"/>
5129 +</interface>
5130 +<interface name="corenet_receive_aptcacher_server_packets" lineno="10311">
5131 +<summary>
5132 +Receive aptcacher_server packets.
5133 +</summary>
5134 +<param name="domain">
5135 +<summary>
5136 +Domain allowed access.
5137 +</summary>
5138 +</param>
5139 +<infoflow type="read" weight="10"/>
5140 +</interface>
5141 +<interface name="corenet_dontaudit_receive_aptcacher_server_packets" lineno="10330">
5142 +<summary>
5143 +Do not audit attempts to receive aptcacher_server packets.
5144 +</summary>
5145 +<param name="domain">
5146 +<summary>
5147 +Domain allowed access.
5148 +</summary>
5149 +</param>
5150 +<infoflow type="none"/>
5151 +</interface>
5152 +<interface name="corenet_sendrecv_aptcacher_server_packets" lineno="10349">
5153 +<summary>
5154 +Send and receive aptcacher_server packets.
5155 +</summary>
5156 +<param name="domain">
5157 +<summary>
5158 +Domain allowed access.
5159 +</summary>
5160 +</param>
5161 +<infoflow type="both" weight="10"/>
5162 +</interface>
5163 +<interface name="corenet_dontaudit_sendrecv_aptcacher_server_packets" lineno="10365">
5164 +<summary>
5165 +Do not audit attempts to send and receive aptcacher_server packets.
5166 +</summary>
5167 +<param name="domain">
5168 +<summary>
5169 +Domain to not audit.
5170 +</summary>
5171 +</param>
5172 +<infoflow type="none"/>
5173 +</interface>
5174 +<interface name="corenet_relabelto_aptcacher_server_packets" lineno="10380">
5175 +<summary>
5176 +Relabel packets to aptcacher_server the packet type.
5177 +</summary>
5178 +<param name="domain">
5179 +<summary>
5180 +Domain allowed access.
5181 +</summary>
5182 +</param>
5183 +</interface>
5184 +<interface name="corenet_tcp_sendrecv_armtechdaemon_port" lineno="10402">
5185 <summary>
5186 Send and receive TCP traffic on the armtechdaemon port.
5187 </summary>
5188 @@ -16325,7 +16404,7 @@ Domain allowed access.
5189 </param>
5190 <infoflow type="both" weight="10"/>
5191 </interface>
5192 -<interface name="corenet_udp_send_armtechdaemon_port" lineno="9873">
5193 +<interface name="corenet_udp_send_armtechdaemon_port" lineno="10417">
5194 <summary>
5195 Send UDP traffic on the armtechdaemon port.
5196 </summary>
5197 @@ -16336,7 +16415,7 @@ Domain allowed access.
5198 </param>
5199 <infoflow type="write" weight="10"/>
5200 </interface>
5201 -<interface name="corenet_dontaudit_udp_send_armtechdaemon_port" lineno="9888">
5202 +<interface name="corenet_dontaudit_udp_send_armtechdaemon_port" lineno="10432">
5203 <summary>
5204 Do not audit attempts to send UDP traffic on the armtechdaemon port.
5205 </summary>
5206 @@ -16347,7 +16426,7 @@ Domain to not audit.
5207 </param>
5208 <infoflow type="none"/>
5209 </interface>
5210 -<interface name="corenet_udp_receive_armtechdaemon_port" lineno="9903">
5211 +<interface name="corenet_udp_receive_armtechdaemon_port" lineno="10447">
5212 <summary>
5213 Receive UDP traffic on the armtechdaemon port.
5214 </summary>
5215 @@ -16358,7 +16437,7 @@ Domain allowed access.
5216 </param>
5217 <infoflow type="read" weight="10"/>
5218 </interface>
5219 -<interface name="corenet_dontaudit_udp_receive_armtechdaemon_port" lineno="9918">
5220 +<interface name="corenet_dontaudit_udp_receive_armtechdaemon_port" lineno="10462">
5221 <summary>
5222 Do not audit attempts to receive UDP traffic on the armtechdaemon port.
5223 </summary>
5224 @@ -16369,7 +16448,7 @@ Domain to not audit.
5225 </param>
5226 <infoflow type="none"/>
5227 </interface>
5228 -<interface name="corenet_udp_sendrecv_armtechdaemon_port" lineno="9933">
5229 +<interface name="corenet_udp_sendrecv_armtechdaemon_port" lineno="10477">
5230 <summary>
5231 Send and receive UDP traffic on the armtechdaemon port.
5232 </summary>
5233 @@ -16380,7 +16459,7 @@ Domain allowed access.
5234 </param>
5235 <infoflow type="both" weight="10"/>
5236 </interface>
5237 -<interface name="corenet_dontaudit_udp_sendrecv_armtechdaemon_port" lineno="9949">
5238 +<interface name="corenet_dontaudit_udp_sendrecv_armtechdaemon_port" lineno="10493">
5239 <summary>
5240 Do not audit attempts to send and receive
5241 UDP traffic on the armtechdaemon port.
5242 @@ -16392,7 +16471,7 @@ Domain to not audit.
5243 </param>
5244 <infoflow type="none"/>
5245 </interface>
5246 -<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="9964">
5247 +<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="10508">
5248 <summary>
5249 Bind TCP sockets to the armtechdaemon port.
5250 </summary>
5251 @@ -16403,7 +16482,7 @@ Domain allowed access.
5252 </param>
5253 <infoflow type="none"/>
5254 </interface>
5255 -<interface name="corenet_udp_bind_armtechdaemon_port" lineno="9984">
5256 +<interface name="corenet_udp_bind_armtechdaemon_port" lineno="10528">
5257 <summary>
5258 Bind UDP sockets to the armtechdaemon port.
5259 </summary>
5260 @@ -16414,7 +16493,7 @@ Domain allowed access.
5261 </param>
5262 <infoflow type="none"/>
5263 </interface>
5264 -<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="10003">
5265 +<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="10547">
5266 <summary>
5267 Make a TCP connection to the armtechdaemon port.
5268 </summary>
5269 @@ -16424,7 +16503,7 @@ Domain allowed access.
5270 </summary>
5271 </param>
5272 </interface>
5273 -<interface name="corenet_send_armtechdaemon_client_packets" lineno="10023">
5274 +<interface name="corenet_send_armtechdaemon_client_packets" lineno="10567">
5275 <summary>
5276 Send armtechdaemon_client packets.
5277 </summary>
5278 @@ -16435,7 +16514,7 @@ Domain allowed access.
5279 </param>
5280 <infoflow type="write" weight="10"/>
5281 </interface>
5282 -<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="10042">
5283 +<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="10586">
5284 <summary>
5285 Do not audit attempts to send armtechdaemon_client packets.
5286 </summary>
5287 @@ -16446,7 +16525,7 @@ Domain to not audit.
5288 </param>
5289 <infoflow type="none"/>
5290 </interface>
5291 -<interface name="corenet_receive_armtechdaemon_client_packets" lineno="10061">
5292 +<interface name="corenet_receive_armtechdaemon_client_packets" lineno="10605">
5293 <summary>
5294 Receive armtechdaemon_client packets.
5295 </summary>
5296 @@ -16457,7 +16536,7 @@ Domain allowed access.
5297 </param>
5298 <infoflow type="read" weight="10"/>
5299 </interface>
5300 -<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="10080">
5301 +<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="10624">
5302 <summary>
5303 Do not audit attempts to receive armtechdaemon_client packets.
5304 </summary>
5305 @@ -16468,7 +16547,7 @@ Domain allowed access.
5306 </param>
5307 <infoflow type="none"/>
5308 </interface>
5309 -<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="10099">
5310 +<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="10643">
5311 <summary>
5312 Send and receive armtechdaemon_client packets.
5313 </summary>
5314 @@ -16479,7 +16558,7 @@ Domain allowed access.
5315 </param>
5316 <infoflow type="both" weight="10"/>
5317 </interface>
5318 -<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="10115">
5319 +<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="10659">
5320 <summary>
5321 Do not audit attempts to send and receive armtechdaemon_client packets.
5322 </summary>
5323 @@ -16490,7 +16569,7 @@ Domain to not audit.
5324 </param>
5325 <infoflow type="none"/>
5326 </interface>
5327 -<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="10130">
5328 +<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="10674">
5329 <summary>
5330 Relabel packets to armtechdaemon_client the packet type.
5331 </summary>
5332 @@ -16500,7 +16579,7 @@ Domain allowed access.
5333 </summary>
5334 </param>
5335 </interface>
5336 -<interface name="corenet_send_armtechdaemon_server_packets" lineno="10150">
5337 +<interface name="corenet_send_armtechdaemon_server_packets" lineno="10694">
5338 <summary>
5339 Send armtechdaemon_server packets.
5340 </summary>
5341 @@ -16511,7 +16590,7 @@ Domain allowed access.
5342 </param>
5343 <infoflow type="write" weight="10"/>
5344 </interface>
5345 -<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="10169">
5346 +<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="10713">
5347 <summary>
5348 Do not audit attempts to send armtechdaemon_server packets.
5349 </summary>
5350 @@ -16522,7 +16601,7 @@ Domain to not audit.
5351 </param>
5352 <infoflow type="none"/>
5353 </interface>
5354 -<interface name="corenet_receive_armtechdaemon_server_packets" lineno="10188">
5355 +<interface name="corenet_receive_armtechdaemon_server_packets" lineno="10732">
5356 <summary>
5357 Receive armtechdaemon_server packets.
5358 </summary>
5359 @@ -16533,7 +16612,7 @@ Domain allowed access.
5360 </param>
5361 <infoflow type="read" weight="10"/>
5362 </interface>
5363 -<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="10207">
5364 +<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="10751">
5365 <summary>
5366 Do not audit attempts to receive armtechdaemon_server packets.
5367 </summary>
5368 @@ -16544,7 +16623,7 @@ Domain allowed access.
5369 </param>
5370 <infoflow type="none"/>
5371 </interface>
5372 -<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="10226">
5373 +<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="10770">
5374 <summary>
5375 Send and receive armtechdaemon_server packets.
5376 </summary>
5377 @@ -16555,7 +16634,7 @@ Domain allowed access.
5378 </param>
5379 <infoflow type="both" weight="10"/>
5380 </interface>
5381 -<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="10242">
5382 +<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="10786">
5383 <summary>
5384 Do not audit attempts to send and receive armtechdaemon_server packets.
5385 </summary>
5386 @@ -16566,7 +16645,7 @@ Domain to not audit.
5387 </param>
5388 <infoflow type="none"/>
5389 </interface>
5390 -<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="10257">
5391 +<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="10801">
5392 <summary>
5393 Relabel packets to armtechdaemon_server the packet type.
5394 </summary>
5395 @@ -16576,7 +16655,7 @@ Domain allowed access.
5396 </summary>
5397 </param>
5398 </interface>
5399 -<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="10279">
5400 +<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="10823">
5401 <summary>
5402 Send and receive TCP traffic on the asterisk port.
5403 </summary>
5404 @@ -16587,7 +16666,7 @@ Domain allowed access.
5405 </param>
5406 <infoflow type="both" weight="10"/>
5407 </interface>
5408 -<interface name="corenet_udp_send_asterisk_port" lineno="10294">
5409 +<interface name="corenet_udp_send_asterisk_port" lineno="10838">
5410 <summary>
5411 Send UDP traffic on the asterisk port.
5412 </summary>
5413 @@ -16598,7 +16677,7 @@ Domain allowed access.
5414 </param>
5415 <infoflow type="write" weight="10"/>
5416 </interface>
5417 -<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="10309">
5418 +<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="10853">
5419 <summary>
5420 Do not audit attempts to send UDP traffic on the asterisk port.
5421 </summary>
5422 @@ -16609,7 +16688,7 @@ Domain to not audit.
5423 </param>
5424 <infoflow type="none"/>
5425 </interface>
5426 -<interface name="corenet_udp_receive_asterisk_port" lineno="10324">
5427 +<interface name="corenet_udp_receive_asterisk_port" lineno="10868">
5428 <summary>
5429 Receive UDP traffic on the asterisk port.
5430 </summary>
5431 @@ -16620,7 +16699,7 @@ Domain allowed access.
5432 </param>
5433 <infoflow type="read" weight="10"/>
5434 </interface>
5435 -<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="10339">
5436 +<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="10883">
5437 <summary>
5438 Do not audit attempts to receive UDP traffic on the asterisk port.
5439 </summary>
5440 @@ -16631,7 +16710,7 @@ Domain to not audit.
5441 </param>
5442 <infoflow type="none"/>
5443 </interface>
5444 -<interface name="corenet_udp_sendrecv_asterisk_port" lineno="10354">
5445 +<interface name="corenet_udp_sendrecv_asterisk_port" lineno="10898">
5446 <summary>
5447 Send and receive UDP traffic on the asterisk port.
5448 </summary>
5449 @@ -16642,7 +16721,7 @@ Domain allowed access.
5450 </param>
5451 <infoflow type="both" weight="10"/>
5452 </interface>
5453 -<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="10370">
5454 +<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="10914">
5455 <summary>
5456 Do not audit attempts to send and receive
5457 UDP traffic on the asterisk port.
5458 @@ -16654,7 +16733,7 @@ Domain to not audit.
5459 </param>
5460 <infoflow type="none"/>
5461 </interface>
5462 -<interface name="corenet_tcp_bind_asterisk_port" lineno="10385">
5463 +<interface name="corenet_tcp_bind_asterisk_port" lineno="10929">
5464 <summary>
5465 Bind TCP sockets to the asterisk port.
5466 </summary>
5467 @@ -16665,7 +16744,7 @@ Domain allowed access.
5468 </param>
5469 <infoflow type="none"/>
5470 </interface>
5471 -<interface name="corenet_udp_bind_asterisk_port" lineno="10405">
5472 +<interface name="corenet_udp_bind_asterisk_port" lineno="10949">
5473 <summary>
5474 Bind UDP sockets to the asterisk port.
5475 </summary>
5476 @@ -16676,7 +16755,7 @@ Domain allowed access.
5477 </param>
5478 <infoflow type="none"/>
5479 </interface>
5480 -<interface name="corenet_tcp_connect_asterisk_port" lineno="10424">
5481 +<interface name="corenet_tcp_connect_asterisk_port" lineno="10968">
5482 <summary>
5483 Make a TCP connection to the asterisk port.
5484 </summary>
5485 @@ -16686,7 +16765,7 @@ Domain allowed access.
5486 </summary>
5487 </param>
5488 </interface>
5489 -<interface name="corenet_send_asterisk_client_packets" lineno="10444">
5490 +<interface name="corenet_send_asterisk_client_packets" lineno="10988">
5491 <summary>
5492 Send asterisk_client packets.
5493 </summary>
5494 @@ -16697,7 +16776,7 @@ Domain allowed access.
5495 </param>
5496 <infoflow type="write" weight="10"/>
5497 </interface>
5498 -<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="10463">
5499 +<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="11007">
5500 <summary>
5501 Do not audit attempts to send asterisk_client packets.
5502 </summary>
5503 @@ -16708,7 +16787,7 @@ Domain to not audit.
5504 </param>
5505 <infoflow type="none"/>
5506 </interface>
5507 -<interface name="corenet_receive_asterisk_client_packets" lineno="10482">
5508 +<interface name="corenet_receive_asterisk_client_packets" lineno="11026">
5509 <summary>
5510 Receive asterisk_client packets.
5511 </summary>
5512 @@ -16719,7 +16798,7 @@ Domain allowed access.
5513 </param>
5514 <infoflow type="read" weight="10"/>
5515 </interface>
5516 -<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="10501">
5517 +<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="11045">
5518 <summary>
5519 Do not audit attempts to receive asterisk_client packets.
5520 </summary>
5521 @@ -16730,7 +16809,7 @@ Domain allowed access.
5522 </param>
5523 <infoflow type="none"/>
5524 </interface>
5525 -<interface name="corenet_sendrecv_asterisk_client_packets" lineno="10520">
5526 +<interface name="corenet_sendrecv_asterisk_client_packets" lineno="11064">
5527 <summary>
5528 Send and receive asterisk_client packets.
5529 </summary>
5530 @@ -16741,7 +16820,7 @@ Domain allowed access.
5531 </param>
5532 <infoflow type="both" weight="10"/>
5533 </interface>
5534 -<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="10536">
5535 +<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="11080">
5536 <summary>
5537 Do not audit attempts to send and receive asterisk_client packets.
5538 </summary>
5539 @@ -16752,7 +16831,7 @@ Domain to not audit.
5540 </param>
5541 <infoflow type="none"/>
5542 </interface>
5543 -<interface name="corenet_relabelto_asterisk_client_packets" lineno="10551">
5544 +<interface name="corenet_relabelto_asterisk_client_packets" lineno="11095">
5545 <summary>
5546 Relabel packets to asterisk_client the packet type.
5547 </summary>
5548 @@ -16762,7 +16841,7 @@ Domain allowed access.
5549 </summary>
5550 </param>
5551 </interface>
5552 -<interface name="corenet_send_asterisk_server_packets" lineno="10571">
5553 +<interface name="corenet_send_asterisk_server_packets" lineno="11115">
5554 <summary>
5555 Send asterisk_server packets.
5556 </summary>
5557 @@ -16773,7 +16852,7 @@ Domain allowed access.
5558 </param>
5559 <infoflow type="write" weight="10"/>
5560 </interface>
5561 -<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="10590">
5562 +<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="11134">
5563 <summary>
5564 Do not audit attempts to send asterisk_server packets.
5565 </summary>
5566 @@ -16784,7 +16863,7 @@ Domain to not audit.
5567 </param>
5568 <infoflow type="none"/>
5569 </interface>
5570 -<interface name="corenet_receive_asterisk_server_packets" lineno="10609">
5571 +<interface name="corenet_receive_asterisk_server_packets" lineno="11153">
5572 <summary>
5573 Receive asterisk_server packets.
5574 </summary>
5575 @@ -16795,7 +16874,7 @@ Domain allowed access.
5576 </param>
5577 <infoflow type="read" weight="10"/>
5578 </interface>
5579 -<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="10628">
5580 +<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="11172">
5581 <summary>
5582 Do not audit attempts to receive asterisk_server packets.
5583 </summary>
5584 @@ -16806,7 +16885,7 @@ Domain allowed access.
5585 </param>
5586 <infoflow type="none"/>
5587 </interface>
5588 -<interface name="corenet_sendrecv_asterisk_server_packets" lineno="10647">
5589 +<interface name="corenet_sendrecv_asterisk_server_packets" lineno="11191">
5590 <summary>
5591 Send and receive asterisk_server packets.
5592 </summary>
5593 @@ -16817,7 +16896,7 @@ Domain allowed access.
5594 </param>
5595 <infoflow type="both" weight="10"/>
5596 </interface>
5597 -<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="10663">
5598 +<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="11207">
5599 <summary>
5600 Do not audit attempts to send and receive asterisk_server packets.
5601 </summary>
5602 @@ -16828,7 +16907,7 @@ Domain to not audit.
5603 </param>
5604 <infoflow type="none"/>
5605 </interface>
5606 -<interface name="corenet_relabelto_asterisk_server_packets" lineno="10678">
5607 +<interface name="corenet_relabelto_asterisk_server_packets" lineno="11222">
5608 <summary>
5609 Relabel packets to asterisk_server the packet type.
5610 </summary>
5611 @@ -16838,7 +16917,7 @@ Domain allowed access.
5612 </summary>
5613 </param>
5614 </interface>
5615 -<interface name="corenet_tcp_sendrecv_audit_port" lineno="10700">
5616 +<interface name="corenet_tcp_sendrecv_audit_port" lineno="11244">
5617 <summary>
5618 Send and receive TCP traffic on the audit port.
5619 </summary>
5620 @@ -16849,7 +16928,7 @@ Domain allowed access.
5621 </param>
5622 <infoflow type="both" weight="10"/>
5623 </interface>
5624 -<interface name="corenet_udp_send_audit_port" lineno="10715">
5625 +<interface name="corenet_udp_send_audit_port" lineno="11259">
5626 <summary>
5627 Send UDP traffic on the audit port.
5628 </summary>
5629 @@ -16860,7 +16939,7 @@ Domain allowed access.
5630 </param>
5631 <infoflow type="write" weight="10"/>
5632 </interface>
5633 -<interface name="corenet_dontaudit_udp_send_audit_port" lineno="10730">
5634 +<interface name="corenet_dontaudit_udp_send_audit_port" lineno="11274">
5635 <summary>
5636 Do not audit attempts to send UDP traffic on the audit port.
5637 </summary>
5638 @@ -16871,7 +16950,7 @@ Domain to not audit.
5639 </param>
5640 <infoflow type="none"/>
5641 </interface>
5642 -<interface name="corenet_udp_receive_audit_port" lineno="10745">
5643 +<interface name="corenet_udp_receive_audit_port" lineno="11289">
5644 <summary>
5645 Receive UDP traffic on the audit port.
5646 </summary>
5647 @@ -16882,7 +16961,7 @@ Domain allowed access.
5648 </param>
5649 <infoflow type="read" weight="10"/>
5650 </interface>
5651 -<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="10760">
5652 +<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="11304">
5653 <summary>
5654 Do not audit attempts to receive UDP traffic on the audit port.
5655 </summary>
5656 @@ -16893,7 +16972,7 @@ Domain to not audit.
5657 </param>
5658 <infoflow type="none"/>
5659 </interface>
5660 -<interface name="corenet_udp_sendrecv_audit_port" lineno="10775">
5661 +<interface name="corenet_udp_sendrecv_audit_port" lineno="11319">
5662 <summary>
5663 Send and receive UDP traffic on the audit port.
5664 </summary>
5665 @@ -16904,7 +16983,7 @@ Domain allowed access.
5666 </param>
5667 <infoflow type="both" weight="10"/>
5668 </interface>
5669 -<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="10791">
5670 +<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="11335">
5671 <summary>
5672 Do not audit attempts to send and receive
5673 UDP traffic on the audit port.
5674 @@ -16916,7 +16995,7 @@ Domain to not audit.
5675 </param>
5676 <infoflow type="none"/>
5677 </interface>
5678 -<interface name="corenet_tcp_bind_audit_port" lineno="10806">
5679 +<interface name="corenet_tcp_bind_audit_port" lineno="11350">
5680 <summary>
5681 Bind TCP sockets to the audit port.
5682 </summary>
5683 @@ -16927,7 +17006,7 @@ Domain allowed access.
5684 </param>
5685 <infoflow type="none"/>
5686 </interface>
5687 -<interface name="corenet_udp_bind_audit_port" lineno="10826">
5688 +<interface name="corenet_udp_bind_audit_port" lineno="11370">
5689 <summary>
5690 Bind UDP sockets to the audit port.
5691 </summary>
5692 @@ -16938,7 +17017,7 @@ Domain allowed access.
5693 </param>
5694 <infoflow type="none"/>
5695 </interface>
5696 -<interface name="corenet_tcp_connect_audit_port" lineno="10845">
5697 +<interface name="corenet_tcp_connect_audit_port" lineno="11389">
5698 <summary>
5699 Make a TCP connection to the audit port.
5700 </summary>
5701 @@ -16948,7 +17027,7 @@ Domain allowed access.
5702 </summary>
5703 </param>
5704 </interface>
5705 -<interface name="corenet_send_audit_client_packets" lineno="10865">
5706 +<interface name="corenet_send_audit_client_packets" lineno="11409">
5707 <summary>
5708 Send audit_client packets.
5709 </summary>
5710 @@ -16959,7 +17038,7 @@ Domain allowed access.
5711 </param>
5712 <infoflow type="write" weight="10"/>
5713 </interface>
5714 -<interface name="corenet_dontaudit_send_audit_client_packets" lineno="10884">
5715 +<interface name="corenet_dontaudit_send_audit_client_packets" lineno="11428">
5716 <summary>
5717 Do not audit attempts to send audit_client packets.
5718 </summary>
5719 @@ -16970,7 +17049,7 @@ Domain to not audit.
5720 </param>
5721 <infoflow type="none"/>
5722 </interface>
5723 -<interface name="corenet_receive_audit_client_packets" lineno="10903">
5724 +<interface name="corenet_receive_audit_client_packets" lineno="11447">
5725 <summary>
5726 Receive audit_client packets.
5727 </summary>
5728 @@ -16981,7 +17060,7 @@ Domain allowed access.
5729 </param>
5730 <infoflow type="read" weight="10"/>
5731 </interface>
5732 -<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="10922">
5733 +<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="11466">
5734 <summary>
5735 Do not audit attempts to receive audit_client packets.
5736 </summary>
5737 @@ -16992,7 +17071,7 @@ Domain allowed access.
5738 </param>
5739 <infoflow type="none"/>
5740 </interface>
5741 -<interface name="corenet_sendrecv_audit_client_packets" lineno="10941">
5742 +<interface name="corenet_sendrecv_audit_client_packets" lineno="11485">
5743 <summary>
5744 Send and receive audit_client packets.
5745 </summary>
5746 @@ -17003,7 +17082,7 @@ Domain allowed access.
5747 </param>
5748 <infoflow type="both" weight="10"/>
5749 </interface>
5750 -<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="10957">
5751 +<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="11501">
5752 <summary>
5753 Do not audit attempts to send and receive audit_client packets.
5754 </summary>
5755 @@ -17014,7 +17093,7 @@ Domain to not audit.
5756 </param>
5757 <infoflow type="none"/>
5758 </interface>
5759 -<interface name="corenet_relabelto_audit_client_packets" lineno="10972">
5760 +<interface name="corenet_relabelto_audit_client_packets" lineno="11516">
5761 <summary>
5762 Relabel packets to audit_client the packet type.
5763 </summary>
5764 @@ -17024,7 +17103,7 @@ Domain allowed access.
5765 </summary>
5766 </param>
5767 </interface>
5768 -<interface name="corenet_send_audit_server_packets" lineno="10992">
5769 +<interface name="corenet_send_audit_server_packets" lineno="11536">
5770 <summary>
5771 Send audit_server packets.
5772 </summary>
5773 @@ -17035,7 +17114,7 @@ Domain allowed access.
5774 </param>
5775 <infoflow type="write" weight="10"/>
5776 </interface>
5777 -<interface name="corenet_dontaudit_send_audit_server_packets" lineno="11011">
5778 +<interface name="corenet_dontaudit_send_audit_server_packets" lineno="11555">
5779 <summary>
5780 Do not audit attempts to send audit_server packets.
5781 </summary>
5782 @@ -17046,7 +17125,7 @@ Domain to not audit.
5783 </param>
5784 <infoflow type="none"/>
5785 </interface>
5786 -<interface name="corenet_receive_audit_server_packets" lineno="11030">
5787 +<interface name="corenet_receive_audit_server_packets" lineno="11574">
5788 <summary>
5789 Receive audit_server packets.
5790 </summary>
5791 @@ -17057,7 +17136,7 @@ Domain allowed access.
5792 </param>
5793 <infoflow type="read" weight="10"/>
5794 </interface>
5795 -<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="11049">
5796 +<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="11593">
5797 <summary>
5798 Do not audit attempts to receive audit_server packets.
5799 </summary>
5800 @@ -17068,7 +17147,7 @@ Domain allowed access.
5801 </param>
5802 <infoflow type="none"/>
5803 </interface>
5804 -<interface name="corenet_sendrecv_audit_server_packets" lineno="11068">
5805 +<interface name="corenet_sendrecv_audit_server_packets" lineno="11612">
5806 <summary>
5807 Send and receive audit_server packets.
5808 </summary>
5809 @@ -17079,7 +17158,7 @@ Domain allowed access.
5810 </param>
5811 <infoflow type="both" weight="10"/>
5812 </interface>
5813 -<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="11084">
5814 +<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="11628">
5815 <summary>
5816 Do not audit attempts to send and receive audit_server packets.
5817 </summary>
5818 @@ -17090,7 +17169,7 @@ Domain to not audit.
5819 </param>
5820 <infoflow type="none"/>
5821 </interface>
5822 -<interface name="corenet_relabelto_audit_server_packets" lineno="11099">
5823 +<interface name="corenet_relabelto_audit_server_packets" lineno="11643">
5824 <summary>
5825 Relabel packets to audit_server the packet type.
5826 </summary>
5827 @@ -17100,7 +17179,7 @@ Domain allowed access.
5828 </summary>
5829 </param>
5830 </interface>
5831 -<interface name="corenet_tcp_sendrecv_auth_port" lineno="11121">
5832 +<interface name="corenet_tcp_sendrecv_auth_port" lineno="11665">
5833 <summary>
5834 Send and receive TCP traffic on the auth port.
5835 </summary>
5836 @@ -17111,7 +17190,7 @@ Domain allowed access.
5837 </param>
5838 <infoflow type="both" weight="10"/>
5839 </interface>
5840 -<interface name="corenet_udp_send_auth_port" lineno="11136">
5841 +<interface name="corenet_udp_send_auth_port" lineno="11680">
5842 <summary>
5843 Send UDP traffic on the auth port.
5844 </summary>
5845 @@ -17122,7 +17201,7 @@ Domain allowed access.
5846 </param>
5847 <infoflow type="write" weight="10"/>
5848 </interface>
5849 -<interface name="corenet_dontaudit_udp_send_auth_port" lineno="11151">
5850 +<interface name="corenet_dontaudit_udp_send_auth_port" lineno="11695">
5851 <summary>
5852 Do not audit attempts to send UDP traffic on the auth port.
5853 </summary>
5854 @@ -17133,7 +17212,7 @@ Domain to not audit.
5855 </param>
5856 <infoflow type="none"/>
5857 </interface>
5858 -<interface name="corenet_udp_receive_auth_port" lineno="11166">
5859 +<interface name="corenet_udp_receive_auth_port" lineno="11710">
5860 <summary>
5861 Receive UDP traffic on the auth port.
5862 </summary>
5863 @@ -17144,7 +17223,7 @@ Domain allowed access.
5864 </param>
5865 <infoflow type="read" weight="10"/>
5866 </interface>
5867 -<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="11181">
5868 +<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="11725">
5869 <summary>
5870 Do not audit attempts to receive UDP traffic on the auth port.
5871 </summary>
5872 @@ -17155,7 +17234,7 @@ Domain to not audit.
5873 </param>
5874 <infoflow type="none"/>
5875 </interface>
5876 -<interface name="corenet_udp_sendrecv_auth_port" lineno="11196">
5877 +<interface name="corenet_udp_sendrecv_auth_port" lineno="11740">
5878 <summary>
5879 Send and receive UDP traffic on the auth port.
5880 </summary>
5881 @@ -17166,7 +17245,7 @@ Domain allowed access.
5882 </param>
5883 <infoflow type="both" weight="10"/>
5884 </interface>
5885 -<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="11212">
5886 +<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="11756">
5887 <summary>
5888 Do not audit attempts to send and receive
5889 UDP traffic on the auth port.
5890 @@ -17178,7 +17257,7 @@ Domain to not audit.
5891 </param>
5892 <infoflow type="none"/>
5893 </interface>
5894 -<interface name="corenet_tcp_bind_auth_port" lineno="11227">
5895 +<interface name="corenet_tcp_bind_auth_port" lineno="11771">
5896 <summary>
5897 Bind TCP sockets to the auth port.
5898 </summary>
5899 @@ -17189,7 +17268,7 @@ Domain allowed access.
5900 </param>
5901 <infoflow type="none"/>
5902 </interface>
5903 -<interface name="corenet_udp_bind_auth_port" lineno="11247">
5904 +<interface name="corenet_udp_bind_auth_port" lineno="11791">
5905 <summary>
5906 Bind UDP sockets to the auth port.
5907 </summary>
5908 @@ -17200,7 +17279,7 @@ Domain allowed access.
5909 </param>
5910 <infoflow type="none"/>
5911 </interface>
5912 -<interface name="corenet_tcp_connect_auth_port" lineno="11266">
5913 +<interface name="corenet_tcp_connect_auth_port" lineno="11810">
5914 <summary>
5915 Make a TCP connection to the auth port.
5916 </summary>
5917 @@ -17210,7 +17289,7 @@ Domain allowed access.
5918 </summary>
5919 </param>
5920 </interface>
5921 -<interface name="corenet_send_auth_client_packets" lineno="11286">
5922 +<interface name="corenet_send_auth_client_packets" lineno="11830">
5923 <summary>
5924 Send auth_client packets.
5925 </summary>
5926 @@ -17221,7 +17300,7 @@ Domain allowed access.
5927 </param>
5928 <infoflow type="write" weight="10"/>
5929 </interface>
5930 -<interface name="corenet_dontaudit_send_auth_client_packets" lineno="11305">
5931 +<interface name="corenet_dontaudit_send_auth_client_packets" lineno="11849">
5932 <summary>
5933 Do not audit attempts to send auth_client packets.
5934 </summary>
5935 @@ -17232,7 +17311,7 @@ Domain to not audit.
5936 </param>
5937 <infoflow type="none"/>
5938 </interface>
5939 -<interface name="corenet_receive_auth_client_packets" lineno="11324">
5940 +<interface name="corenet_receive_auth_client_packets" lineno="11868">
5941 <summary>
5942 Receive auth_client packets.
5943 </summary>
5944 @@ -17243,7 +17322,7 @@ Domain allowed access.
5945 </param>
5946 <infoflow type="read" weight="10"/>
5947 </interface>
5948 -<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="11343">
5949 +<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="11887">
5950 <summary>
5951 Do not audit attempts to receive auth_client packets.
5952 </summary>
5953 @@ -17254,7 +17333,7 @@ Domain allowed access.
5954 </param>
5955 <infoflow type="none"/>
5956 </interface>
5957 -<interface name="corenet_sendrecv_auth_client_packets" lineno="11362">
5958 +<interface name="corenet_sendrecv_auth_client_packets" lineno="11906">
5959 <summary>
5960 Send and receive auth_client packets.
5961 </summary>
5962 @@ -17265,7 +17344,7 @@ Domain allowed access.
5963 </param>
5964 <infoflow type="both" weight="10"/>
5965 </interface>
5966 -<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="11378">
5967 +<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="11922">
5968 <summary>
5969 Do not audit attempts to send and receive auth_client packets.
5970 </summary>
5971 @@ -17276,7 +17355,7 @@ Domain to not audit.
5972 </param>
5973 <infoflow type="none"/>
5974 </interface>
5975 -<interface name="corenet_relabelto_auth_client_packets" lineno="11393">
5976 +<interface name="corenet_relabelto_auth_client_packets" lineno="11937">
5977 <summary>
5978 Relabel packets to auth_client the packet type.
5979 </summary>
5980 @@ -17286,7 +17365,7 @@ Domain allowed access.
5981 </summary>
5982 </param>
5983 </interface>
5984 -<interface name="corenet_send_auth_server_packets" lineno="11413">
5985 +<interface name="corenet_send_auth_server_packets" lineno="11957">
5986 <summary>
5987 Send auth_server packets.
5988 </summary>
5989 @@ -17297,7 +17376,7 @@ Domain allowed access.
5990 </param>
5991 <infoflow type="write" weight="10"/>
5992 </interface>
5993 -<interface name="corenet_dontaudit_send_auth_server_packets" lineno="11432">
5994 +<interface name="corenet_dontaudit_send_auth_server_packets" lineno="11976">
5995 <summary>
5996 Do not audit attempts to send auth_server packets.
5997 </summary>
5998 @@ -17308,7 +17387,7 @@ Domain to not audit.
5999 </param>
6000 <infoflow type="none"/>
6001 </interface>
6002 -<interface name="corenet_receive_auth_server_packets" lineno="11451">
6003 +<interface name="corenet_receive_auth_server_packets" lineno="11995">
6004 <summary>
6005 Receive auth_server packets.
6006 </summary>
6007 @@ -17319,7 +17398,7 @@ Domain allowed access.
6008 </param>
6009 <infoflow type="read" weight="10"/>
6010 </interface>
6011 -<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="11470">
6012 +<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="12014">
6013 <summary>
6014 Do not audit attempts to receive auth_server packets.
6015 </summary>
6016 @@ -17330,7 +17409,7 @@ Domain allowed access.
6017 </param>
6018 <infoflow type="none"/>
6019 </interface>
6020 -<interface name="corenet_sendrecv_auth_server_packets" lineno="11489">
6021 +<interface name="corenet_sendrecv_auth_server_packets" lineno="12033">
6022 <summary>
6023 Send and receive auth_server packets.
6024 </summary>
6025 @@ -17341,7 +17420,7 @@ Domain allowed access.
6026 </param>
6027 <infoflow type="both" weight="10"/>
6028 </interface>
6029 -<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="11505">
6030 +<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="12049">
6031 <summary>
6032 Do not audit attempts to send and receive auth_server packets.
6033 </summary>
6034 @@ -17352,7 +17431,7 @@ Domain to not audit.
6035 </param>
6036 <infoflow type="none"/>
6037 </interface>
6038 -<interface name="corenet_relabelto_auth_server_packets" lineno="11520">
6039 +<interface name="corenet_relabelto_auth_server_packets" lineno="12064">
6040 <summary>
6041 Relabel packets to auth_server the packet type.
6042 </summary>
6043 @@ -17362,7 +17441,7 @@ Domain allowed access.
6044 </summary>
6045 </param>
6046 </interface>
6047 -<interface name="corenet_tcp_sendrecv_bgp_port" lineno="11542">
6048 +<interface name="corenet_tcp_sendrecv_bgp_port" lineno="12086">
6049 <summary>
6050 Send and receive TCP traffic on the bgp port.
6051 </summary>
6052 @@ -17373,7 +17452,7 @@ Domain allowed access.
6053 </param>
6054 <infoflow type="both" weight="10"/>
6055 </interface>
6056 -<interface name="corenet_udp_send_bgp_port" lineno="11557">
6057 +<interface name="corenet_udp_send_bgp_port" lineno="12101">
6058 <summary>
6059 Send UDP traffic on the bgp port.
6060 </summary>
6061 @@ -17384,7 +17463,7 @@ Domain allowed access.
6062 </param>
6063 <infoflow type="write" weight="10"/>
6064 </interface>
6065 -<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="11572">
6066 +<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="12116">
6067 <summary>
6068 Do not audit attempts to send UDP traffic on the bgp port.
6069 </summary>
6070 @@ -17395,7 +17474,7 @@ Domain to not audit.
6071 </param>
6072 <infoflow type="none"/>
6073 </interface>
6074 -<interface name="corenet_udp_receive_bgp_port" lineno="11587">
6075 +<interface name="corenet_udp_receive_bgp_port" lineno="12131">
6076 <summary>
6077 Receive UDP traffic on the bgp port.
6078 </summary>
6079 @@ -17406,7 +17485,7 @@ Domain allowed access.
6080 </param>
6081 <infoflow type="read" weight="10"/>
6082 </interface>
6083 -<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="11602">
6084 +<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="12146">
6085 <summary>
6086 Do not audit attempts to receive UDP traffic on the bgp port.
6087 </summary>
6088 @@ -17417,7 +17496,7 @@ Domain to not audit.
6089 </param>
6090 <infoflow type="none"/>
6091 </interface>
6092 -<interface name="corenet_udp_sendrecv_bgp_port" lineno="11617">
6093 +<interface name="corenet_udp_sendrecv_bgp_port" lineno="12161">
6094 <summary>
6095 Send and receive UDP traffic on the bgp port.
6096 </summary>
6097 @@ -17428,7 +17507,7 @@ Domain allowed access.
6098 </param>
6099 <infoflow type="both" weight="10"/>
6100 </interface>
6101 -<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="11633">
6102 +<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="12177">
6103 <summary>
6104 Do not audit attempts to send and receive
6105 UDP traffic on the bgp port.
6106 @@ -17440,7 +17519,7 @@ Domain to not audit.
6107 </param>
6108 <infoflow type="none"/>
6109 </interface>
6110 -<interface name="corenet_tcp_bind_bgp_port" lineno="11648">
6111 +<interface name="corenet_tcp_bind_bgp_port" lineno="12192">
6112 <summary>
6113 Bind TCP sockets to the bgp port.
6114 </summary>
6115 @@ -17451,7 +17530,7 @@ Domain allowed access.
6116 </param>
6117 <infoflow type="none"/>
6118 </interface>
6119 -<interface name="corenet_udp_bind_bgp_port" lineno="11668">
6120 +<interface name="corenet_udp_bind_bgp_port" lineno="12212">
6121 <summary>
6122 Bind UDP sockets to the bgp port.
6123 </summary>
6124 @@ -17462,7 +17541,7 @@ Domain allowed access.
6125 </param>
6126 <infoflow type="none"/>
6127 </interface>
6128 -<interface name="corenet_tcp_connect_bgp_port" lineno="11687">
6129 +<interface name="corenet_tcp_connect_bgp_port" lineno="12231">
6130 <summary>
6131 Make a TCP connection to the bgp port.
6132 </summary>
6133 @@ -17472,7 +17551,7 @@ Domain allowed access.
6134 </summary>
6135 </param>
6136 </interface>
6137 -<interface name="corenet_send_bgp_client_packets" lineno="11707">
6138 +<interface name="corenet_send_bgp_client_packets" lineno="12251">
6139 <summary>
6140 Send bgp_client packets.
6141 </summary>
6142 @@ -17483,7 +17562,7 @@ Domain allowed access.
6143 </param>
6144 <infoflow type="write" weight="10"/>
6145 </interface>
6146 -<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="11726">
6147 +<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="12270">
6148 <summary>
6149 Do not audit attempts to send bgp_client packets.
6150 </summary>
6151 @@ -17494,7 +17573,7 @@ Domain to not audit.
6152 </param>
6153 <infoflow type="none"/>
6154 </interface>
6155 -<interface name="corenet_receive_bgp_client_packets" lineno="11745">
6156 +<interface name="corenet_receive_bgp_client_packets" lineno="12289">
6157 <summary>
6158 Receive bgp_client packets.
6159 </summary>
6160 @@ -17505,7 +17584,7 @@ Domain allowed access.
6161 </param>
6162 <infoflow type="read" weight="10"/>
6163 </interface>
6164 -<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="11764">
6165 +<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="12308">
6166 <summary>
6167 Do not audit attempts to receive bgp_client packets.
6168 </summary>
6169 @@ -17516,7 +17595,7 @@ Domain allowed access.
6170 </param>
6171 <infoflow type="none"/>
6172 </interface>
6173 -<interface name="corenet_sendrecv_bgp_client_packets" lineno="11783">
6174 +<interface name="corenet_sendrecv_bgp_client_packets" lineno="12327">
6175 <summary>
6176 Send and receive bgp_client packets.
6177 </summary>
6178 @@ -17527,7 +17606,7 @@ Domain allowed access.
6179 </param>
6180 <infoflow type="both" weight="10"/>
6181 </interface>
6182 -<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="11799">
6183 +<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="12343">
6184 <summary>
6185 Do not audit attempts to send and receive bgp_client packets.
6186 </summary>
6187 @@ -17538,7 +17617,7 @@ Domain to not audit.
6188 </param>
6189 <infoflow type="none"/>
6190 </interface>
6191 -<interface name="corenet_relabelto_bgp_client_packets" lineno="11814">
6192 +<interface name="corenet_relabelto_bgp_client_packets" lineno="12358">
6193 <summary>
6194 Relabel packets to bgp_client the packet type.
6195 </summary>
6196 @@ -17548,7 +17627,7 @@ Domain allowed access.
6197 </summary>
6198 </param>
6199 </interface>
6200 -<interface name="corenet_send_bgp_server_packets" lineno="11834">
6201 +<interface name="corenet_send_bgp_server_packets" lineno="12378">
6202 <summary>
6203 Send bgp_server packets.
6204 </summary>
6205 @@ -17559,7 +17638,7 @@ Domain allowed access.
6206 </param>
6207 <infoflow type="write" weight="10"/>
6208 </interface>
6209 -<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="11853">
6210 +<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="12397">
6211 <summary>
6212 Do not audit attempts to send bgp_server packets.
6213 </summary>
6214 @@ -17570,7 +17649,7 @@ Domain to not audit.
6215 </param>
6216 <infoflow type="none"/>
6217 </interface>
6218 -<interface name="corenet_receive_bgp_server_packets" lineno="11872">
6219 +<interface name="corenet_receive_bgp_server_packets" lineno="12416">
6220 <summary>
6221 Receive bgp_server packets.
6222 </summary>
6223 @@ -17581,7 +17660,7 @@ Domain allowed access.
6224 </param>
6225 <infoflow type="read" weight="10"/>
6226 </interface>
6227 -<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="11891">
6228 +<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="12435">
6229 <summary>
6230 Do not audit attempts to receive bgp_server packets.
6231 </summary>
6232 @@ -17592,7 +17671,7 @@ Domain allowed access.
6233 </param>
6234 <infoflow type="none"/>
6235 </interface>
6236 -<interface name="corenet_sendrecv_bgp_server_packets" lineno="11910">
6237 +<interface name="corenet_sendrecv_bgp_server_packets" lineno="12454">
6238 <summary>
6239 Send and receive bgp_server packets.
6240 </summary>
6241 @@ -17603,7 +17682,7 @@ Domain allowed access.
6242 </param>
6243 <infoflow type="both" weight="10"/>
6244 </interface>
6245 -<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="11926">
6246 +<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="12470">
6247 <summary>
6248 Do not audit attempts to send and receive bgp_server packets.
6249 </summary>
6250 @@ -17614,7 +17693,7 @@ Domain to not audit.
6251 </param>
6252 <infoflow type="none"/>
6253 </interface>
6254 -<interface name="corenet_relabelto_bgp_server_packets" lineno="11941">
6255 +<interface name="corenet_relabelto_bgp_server_packets" lineno="12485">
6256 <summary>
6257 Relabel packets to bgp_server the packet type.
6258 </summary>
6259 @@ -17624,7 +17703,7 @@ Domain allowed access.
6260 </summary>
6261 </param>
6262 </interface>
6263 -<interface name="corenet_tcp_sendrecv_bitcoin_port" lineno="11963">
6264 +<interface name="corenet_tcp_sendrecv_bitcoin_port" lineno="12507">
6265 <summary>
6266 Send and receive TCP traffic on the bitcoin port.
6267 </summary>
6268 @@ -17635,7 +17714,7 @@ Domain allowed access.
6269 </param>
6270 <infoflow type="both" weight="10"/>
6271 </interface>
6272 -<interface name="corenet_udp_send_bitcoin_port" lineno="11978">
6273 +<interface name="corenet_udp_send_bitcoin_port" lineno="12522">
6274 <summary>
6275 Send UDP traffic on the bitcoin port.
6276 </summary>
6277 @@ -17646,7 +17725,7 @@ Domain allowed access.
6278 </param>
6279 <infoflow type="write" weight="10"/>
6280 </interface>
6281 -<interface name="corenet_dontaudit_udp_send_bitcoin_port" lineno="11993">
6282 +<interface name="corenet_dontaudit_udp_send_bitcoin_port" lineno="12537">
6283 <summary>
6284 Do not audit attempts to send UDP traffic on the bitcoin port.
6285 </summary>
6286 @@ -17657,7 +17736,7 @@ Domain to not audit.
6287 </param>
6288 <infoflow type="none"/>
6289 </interface>
6290 -<interface name="corenet_udp_receive_bitcoin_port" lineno="12008">
6291 +<interface name="corenet_udp_receive_bitcoin_port" lineno="12552">
6292 <summary>
6293 Receive UDP traffic on the bitcoin port.
6294 </summary>
6295 @@ -17668,7 +17747,7 @@ Domain allowed access.
6296 </param>
6297 <infoflow type="read" weight="10"/>
6298 </interface>
6299 -<interface name="corenet_dontaudit_udp_receive_bitcoin_port" lineno="12023">
6300 +<interface name="corenet_dontaudit_udp_receive_bitcoin_port" lineno="12567">
6301 <summary>
6302 Do not audit attempts to receive UDP traffic on the bitcoin port.
6303 </summary>
6304 @@ -17679,7 +17758,7 @@ Domain to not audit.
6305 </param>
6306 <infoflow type="none"/>
6307 </interface>
6308 -<interface name="corenet_udp_sendrecv_bitcoin_port" lineno="12038">
6309 +<interface name="corenet_udp_sendrecv_bitcoin_port" lineno="12582">
6310 <summary>
6311 Send and receive UDP traffic on the bitcoin port.
6312 </summary>
6313 @@ -17690,7 +17769,7 @@ Domain allowed access.
6314 </param>
6315 <infoflow type="both" weight="10"/>
6316 </interface>
6317 -<interface name="corenet_dontaudit_udp_sendrecv_bitcoin_port" lineno="12054">
6318 +<interface name="corenet_dontaudit_udp_sendrecv_bitcoin_port" lineno="12598">
6319 <summary>
6320 Do not audit attempts to send and receive
6321 UDP traffic on the bitcoin port.
6322 @@ -17702,7 +17781,7 @@ Domain to not audit.
6323 </param>
6324 <infoflow type="none"/>
6325 </interface>
6326 -<interface name="corenet_tcp_bind_bitcoin_port" lineno="12069">
6327 +<interface name="corenet_tcp_bind_bitcoin_port" lineno="12613">
6328 <summary>
6329 Bind TCP sockets to the bitcoin port.
6330 </summary>
6331 @@ -17713,7 +17792,7 @@ Domain allowed access.
6332 </param>
6333 <infoflow type="none"/>
6334 </interface>
6335 -<interface name="corenet_udp_bind_bitcoin_port" lineno="12089">
6336 +<interface name="corenet_udp_bind_bitcoin_port" lineno="12633">
6337 <summary>
6338 Bind UDP sockets to the bitcoin port.
6339 </summary>
6340 @@ -17724,7 +17803,7 @@ Domain allowed access.
6341 </param>
6342 <infoflow type="none"/>
6343 </interface>
6344 -<interface name="corenet_tcp_connect_bitcoin_port" lineno="12108">
6345 +<interface name="corenet_tcp_connect_bitcoin_port" lineno="12652">
6346 <summary>
6347 Make a TCP connection to the bitcoin port.
6348 </summary>
6349 @@ -17734,7 +17813,7 @@ Domain allowed access.
6350 </summary>
6351 </param>
6352 </interface>
6353 -<interface name="corenet_send_bitcoin_client_packets" lineno="12128">
6354 +<interface name="corenet_send_bitcoin_client_packets" lineno="12672">
6355 <summary>
6356 Send bitcoin_client packets.
6357 </summary>
6358 @@ -17745,7 +17824,7 @@ Domain allowed access.
6359 </param>
6360 <infoflow type="write" weight="10"/>
6361 </interface>
6362 -<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="12147">
6363 +<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="12691">
6364 <summary>
6365 Do not audit attempts to send bitcoin_client packets.
6366 </summary>
6367 @@ -17756,7 +17835,7 @@ Domain to not audit.
6368 </param>
6369 <infoflow type="none"/>
6370 </interface>
6371 -<interface name="corenet_receive_bitcoin_client_packets" lineno="12166">
6372 +<interface name="corenet_receive_bitcoin_client_packets" lineno="12710">
6373 <summary>
6374 Receive bitcoin_client packets.
6375 </summary>
6376 @@ -17767,7 +17846,7 @@ Domain allowed access.
6377 </param>
6378 <infoflow type="read" weight="10"/>
6379 </interface>
6380 -<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="12185">
6381 +<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="12729">
6382 <summary>
6383 Do not audit attempts to receive bitcoin_client packets.
6384 </summary>
6385 @@ -17778,7 +17857,7 @@ Domain allowed access.
6386 </param>
6387 <infoflow type="none"/>
6388 </interface>
6389 -<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="12204">
6390 +<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="12748">
6391 <summary>
6392 Send and receive bitcoin_client packets.
6393 </summary>
6394 @@ -17789,7 +17868,7 @@ Domain allowed access.
6395 </param>
6396 <infoflow type="both" weight="10"/>
6397 </interface>
6398 -<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="12220">
6399 +<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="12764">
6400 <summary>
6401 Do not audit attempts to send and receive bitcoin_client packets.
6402 </summary>
6403 @@ -17800,7 +17879,7 @@ Domain to not audit.
6404 </param>
6405 <infoflow type="none"/>
6406 </interface>
6407 -<interface name="corenet_relabelto_bitcoin_client_packets" lineno="12235">
6408 +<interface name="corenet_relabelto_bitcoin_client_packets" lineno="12779">
6409 <summary>
6410 Relabel packets to bitcoin_client the packet type.
6411 </summary>
6412 @@ -17810,7 +17889,7 @@ Domain allowed access.
6413 </summary>
6414 </param>
6415 </interface>
6416 -<interface name="corenet_send_bitcoin_server_packets" lineno="12255">
6417 +<interface name="corenet_send_bitcoin_server_packets" lineno="12799">
6418 <summary>
6419 Send bitcoin_server packets.
6420 </summary>
6421 @@ -17821,7 +17900,7 @@ Domain allowed access.
6422 </param>
6423 <infoflow type="write" weight="10"/>
6424 </interface>
6425 -<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="12274">
6426 +<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="12818">
6427 <summary>
6428 Do not audit attempts to send bitcoin_server packets.
6429 </summary>
6430 @@ -17832,7 +17911,7 @@ Domain to not audit.
6431 </param>
6432 <infoflow type="none"/>
6433 </interface>
6434 -<interface name="corenet_receive_bitcoin_server_packets" lineno="12293">
6435 +<interface name="corenet_receive_bitcoin_server_packets" lineno="12837">
6436 <summary>
6437 Receive bitcoin_server packets.
6438 </summary>
6439 @@ -17843,7 +17922,7 @@ Domain allowed access.
6440 </param>
6441 <infoflow type="read" weight="10"/>
6442 </interface>
6443 -<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="12312">
6444 +<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="12856">
6445 <summary>
6446 Do not audit attempts to receive bitcoin_server packets.
6447 </summary>
6448 @@ -17854,7 +17933,7 @@ Domain allowed access.
6449 </param>
6450 <infoflow type="none"/>
6451 </interface>
6452 -<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="12331">
6453 +<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="12875">
6454 <summary>
6455 Send and receive bitcoin_server packets.
6456 </summary>
6457 @@ -17865,7 +17944,7 @@ Domain allowed access.
6458 </param>
6459 <infoflow type="both" weight="10"/>
6460 </interface>
6461 -<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="12347">
6462 +<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="12891">
6463 <summary>
6464 Do not audit attempts to send and receive bitcoin_server packets.
6465 </summary>
6466 @@ -17876,7 +17955,7 @@ Domain to not audit.
6467 </param>
6468 <infoflow type="none"/>
6469 </interface>
6470 -<interface name="corenet_relabelto_bitcoin_server_packets" lineno="12362">
6471 +<interface name="corenet_relabelto_bitcoin_server_packets" lineno="12906">
6472 <summary>
6473 Relabel packets to bitcoin_server the packet type.
6474 </summary>
6475 @@ -17886,7 +17965,7 @@ Domain allowed access.
6476 </summary>
6477 </param>
6478 </interface>
6479 -<interface name="corenet_tcp_sendrecv_boinc_port" lineno="12384">
6480 +<interface name="corenet_tcp_sendrecv_boinc_port" lineno="12928">
6481 <summary>
6482 Send and receive TCP traffic on the boinc port.
6483 </summary>
6484 @@ -17897,7 +17976,7 @@ Domain allowed access.
6485 </param>
6486 <infoflow type="both" weight="10"/>
6487 </interface>
6488 -<interface name="corenet_udp_send_boinc_port" lineno="12399">
6489 +<interface name="corenet_udp_send_boinc_port" lineno="12943">
6490 <summary>
6491 Send UDP traffic on the boinc port.
6492 </summary>
6493 @@ -17908,7 +17987,7 @@ Domain allowed access.
6494 </param>
6495 <infoflow type="write" weight="10"/>
6496 </interface>
6497 -<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="12414">
6498 +<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="12958">
6499 <summary>
6500 Do not audit attempts to send UDP traffic on the boinc port.
6501 </summary>
6502 @@ -17919,7 +17998,7 @@ Domain to not audit.
6503 </param>
6504 <infoflow type="none"/>
6505 </interface>
6506 -<interface name="corenet_udp_receive_boinc_port" lineno="12429">
6507 +<interface name="corenet_udp_receive_boinc_port" lineno="12973">
6508 <summary>
6509 Receive UDP traffic on the boinc port.
6510 </summary>
6511 @@ -17930,7 +18009,7 @@ Domain allowed access.
6512 </param>
6513 <infoflow type="read" weight="10"/>
6514 </interface>
6515 -<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="12444">
6516 +<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="12988">
6517 <summary>
6518 Do not audit attempts to receive UDP traffic on the boinc port.
6519 </summary>
6520 @@ -17941,7 +18020,7 @@ Domain to not audit.
6521 </param>
6522 <infoflow type="none"/>
6523 </interface>
6524 -<interface name="corenet_udp_sendrecv_boinc_port" lineno="12459">
6525 +<interface name="corenet_udp_sendrecv_boinc_port" lineno="13003">
6526 <summary>
6527 Send and receive UDP traffic on the boinc port.
6528 </summary>
6529 @@ -17952,7 +18031,7 @@ Domain allowed access.
6530 </param>
6531 <infoflow type="both" weight="10"/>
6532 </interface>
6533 -<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="12475">
6534 +<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="13019">
6535 <summary>
6536 Do not audit attempts to send and receive
6537 UDP traffic on the boinc port.
6538 @@ -17964,7 +18043,7 @@ Domain to not audit.
6539 </param>
6540 <infoflow type="none"/>
6541 </interface>
6542 -<interface name="corenet_tcp_bind_boinc_port" lineno="12490">
6543 +<interface name="corenet_tcp_bind_boinc_port" lineno="13034">
6544 <summary>
6545 Bind TCP sockets to the boinc port.
6546 </summary>
6547 @@ -17975,7 +18054,7 @@ Domain allowed access.
6548 </param>
6549 <infoflow type="none"/>
6550 </interface>
6551 -<interface name="corenet_udp_bind_boinc_port" lineno="12510">
6552 +<interface name="corenet_udp_bind_boinc_port" lineno="13054">
6553 <summary>
6554 Bind UDP sockets to the boinc port.
6555 </summary>
6556 @@ -17986,7 +18065,7 @@ Domain allowed access.
6557 </param>
6558 <infoflow type="none"/>
6559 </interface>
6560 -<interface name="corenet_tcp_connect_boinc_port" lineno="12529">
6561 +<interface name="corenet_tcp_connect_boinc_port" lineno="13073">
6562 <summary>
6563 Make a TCP connection to the boinc port.
6564 </summary>
6565 @@ -17996,7 +18075,7 @@ Domain allowed access.
6566 </summary>
6567 </param>
6568 </interface>
6569 -<interface name="corenet_send_boinc_client_packets" lineno="12549">
6570 +<interface name="corenet_send_boinc_client_packets" lineno="13093">
6571 <summary>
6572 Send boinc_client packets.
6573 </summary>
6574 @@ -18007,7 +18086,7 @@ Domain allowed access.
6575 </param>
6576 <infoflow type="write" weight="10"/>
6577 </interface>
6578 -<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="12568">
6579 +<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="13112">
6580 <summary>
6581 Do not audit attempts to send boinc_client packets.
6582 </summary>
6583 @@ -18018,7 +18097,7 @@ Domain to not audit.
6584 </param>
6585 <infoflow type="none"/>
6586 </interface>
6587 -<interface name="corenet_receive_boinc_client_packets" lineno="12587">
6588 +<interface name="corenet_receive_boinc_client_packets" lineno="13131">
6589 <summary>
6590 Receive boinc_client packets.
6591 </summary>
6592 @@ -18029,7 +18108,7 @@ Domain allowed access.
6593 </param>
6594 <infoflow type="read" weight="10"/>
6595 </interface>
6596 -<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="12606">
6597 +<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="13150">
6598 <summary>
6599 Do not audit attempts to receive boinc_client packets.
6600 </summary>
6601 @@ -18040,7 +18119,7 @@ Domain allowed access.
6602 </param>
6603 <infoflow type="none"/>
6604 </interface>
6605 -<interface name="corenet_sendrecv_boinc_client_packets" lineno="12625">
6606 +<interface name="corenet_sendrecv_boinc_client_packets" lineno="13169">
6607 <summary>
6608 Send and receive boinc_client packets.
6609 </summary>
6610 @@ -18051,7 +18130,7 @@ Domain allowed access.
6611 </param>
6612 <infoflow type="both" weight="10"/>
6613 </interface>
6614 -<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="12641">
6615 +<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="13185">
6616 <summary>
6617 Do not audit attempts to send and receive boinc_client packets.
6618 </summary>
6619 @@ -18062,7 +18141,7 @@ Domain to not audit.
6620 </param>
6621 <infoflow type="none"/>
6622 </interface>
6623 -<interface name="corenet_relabelto_boinc_client_packets" lineno="12656">
6624 +<interface name="corenet_relabelto_boinc_client_packets" lineno="13200">
6625 <summary>
6626 Relabel packets to boinc_client the packet type.
6627 </summary>
6628 @@ -18072,7 +18151,7 @@ Domain allowed access.
6629 </summary>
6630 </param>
6631 </interface>
6632 -<interface name="corenet_send_boinc_server_packets" lineno="12676">
6633 +<interface name="corenet_send_boinc_server_packets" lineno="13220">
6634 <summary>
6635 Send boinc_server packets.
6636 </summary>
6637 @@ -18083,7 +18162,7 @@ Domain allowed access.
6638 </param>
6639 <infoflow type="write" weight="10"/>
6640 </interface>
6641 -<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="12695">
6642 +<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="13239">
6643 <summary>
6644 Do not audit attempts to send boinc_server packets.
6645 </summary>
6646 @@ -18094,7 +18173,7 @@ Domain to not audit.
6647 </param>
6648 <infoflow type="none"/>
6649 </interface>
6650 -<interface name="corenet_receive_boinc_server_packets" lineno="12714">
6651 +<interface name="corenet_receive_boinc_server_packets" lineno="13258">
6652 <summary>
6653 Receive boinc_server packets.
6654 </summary>
6655 @@ -18105,7 +18184,7 @@ Domain allowed access.
6656 </param>
6657 <infoflow type="read" weight="10"/>
6658 </interface>
6659 -<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="12733">
6660 +<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="13277">
6661 <summary>
6662 Do not audit attempts to receive boinc_server packets.
6663 </summary>
6664 @@ -18116,7 +18195,7 @@ Domain allowed access.
6665 </param>
6666 <infoflow type="none"/>
6667 </interface>
6668 -<interface name="corenet_sendrecv_boinc_server_packets" lineno="12752">
6669 +<interface name="corenet_sendrecv_boinc_server_packets" lineno="13296">
6670 <summary>
6671 Send and receive boinc_server packets.
6672 </summary>
6673 @@ -18127,7 +18206,7 @@ Domain allowed access.
6674 </param>
6675 <infoflow type="both" weight="10"/>
6676 </interface>
6677 -<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="12768">
6678 +<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="13312">
6679 <summary>
6680 Do not audit attempts to send and receive boinc_server packets.
6681 </summary>
6682 @@ -18138,7 +18217,7 @@ Domain to not audit.
6683 </param>
6684 <infoflow type="none"/>
6685 </interface>
6686 -<interface name="corenet_relabelto_boinc_server_packets" lineno="12783">
6687 +<interface name="corenet_relabelto_boinc_server_packets" lineno="13327">
6688 <summary>
6689 Relabel packets to boinc_server the packet type.
6690 </summary>
6691 @@ -18148,7 +18227,7 @@ Domain allowed access.
6692 </summary>
6693 </param>
6694 </interface>
6695 -<interface name="corenet_tcp_sendrecv_boinc_client_port" lineno="12805">
6696 +<interface name="corenet_tcp_sendrecv_boinc_client_port" lineno="13349">
6697 <summary>
6698 Send and receive TCP traffic on the boinc_client port.
6699 </summary>
6700 @@ -18159,7 +18238,7 @@ Domain allowed access.
6701 </param>
6702 <infoflow type="both" weight="10"/>
6703 </interface>
6704 -<interface name="corenet_udp_send_boinc_client_port" lineno="12820">
6705 +<interface name="corenet_udp_send_boinc_client_port" lineno="13364">
6706 <summary>
6707 Send UDP traffic on the boinc_client port.
6708 </summary>
6709 @@ -18170,7 +18249,7 @@ Domain allowed access.
6710 </param>
6711 <infoflow type="write" weight="10"/>
6712 </interface>
6713 -<interface name="corenet_dontaudit_udp_send_boinc_client_port" lineno="12835">
6714 +<interface name="corenet_dontaudit_udp_send_boinc_client_port" lineno="13379">
6715 <summary>
6716 Do not audit attempts to send UDP traffic on the boinc_client port.
6717 </summary>
6718 @@ -18181,7 +18260,7 @@ Domain to not audit.
6719 </param>
6720 <infoflow type="none"/>
6721 </interface>
6722 -<interface name="corenet_udp_receive_boinc_client_port" lineno="12850">
6723 +<interface name="corenet_udp_receive_boinc_client_port" lineno="13394">
6724 <summary>
6725 Receive UDP traffic on the boinc_client port.
6726 </summary>
6727 @@ -18192,7 +18271,7 @@ Domain allowed access.
6728 </param>
6729 <infoflow type="read" weight="10"/>
6730 </interface>
6731 -<interface name="corenet_dontaudit_udp_receive_boinc_client_port" lineno="12865">
6732 +<interface name="corenet_dontaudit_udp_receive_boinc_client_port" lineno="13409">
6733 <summary>
6734 Do not audit attempts to receive UDP traffic on the boinc_client port.
6735 </summary>
6736 @@ -18203,7 +18282,7 @@ Domain to not audit.
6737 </param>
6738 <infoflow type="none"/>
6739 </interface>
6740 -<interface name="corenet_udp_sendrecv_boinc_client_port" lineno="12880">
6741 +<interface name="corenet_udp_sendrecv_boinc_client_port" lineno="13424">
6742 <summary>
6743 Send and receive UDP traffic on the boinc_client port.
6744 </summary>
6745 @@ -18214,7 +18293,7 @@ Domain allowed access.
6746 </param>
6747 <infoflow type="both" weight="10"/>
6748 </interface>
6749 -<interface name="corenet_dontaudit_udp_sendrecv_boinc_client_port" lineno="12896">
6750 +<interface name="corenet_dontaudit_udp_sendrecv_boinc_client_port" lineno="13440">
6751 <summary>
6752 Do not audit attempts to send and receive
6753 UDP traffic on the boinc_client port.
6754 @@ -18226,7 +18305,7 @@ Domain to not audit.
6755 </param>
6756 <infoflow type="none"/>
6757 </interface>
6758 -<interface name="corenet_tcp_bind_boinc_client_port" lineno="12911">
6759 +<interface name="corenet_tcp_bind_boinc_client_port" lineno="13455">
6760 <summary>
6761 Bind TCP sockets to the boinc_client port.
6762 </summary>
6763 @@ -18237,7 +18316,7 @@ Domain allowed access.
6764 </param>
6765 <infoflow type="none"/>
6766 </interface>
6767 -<interface name="corenet_udp_bind_boinc_client_port" lineno="12931">
6768 +<interface name="corenet_udp_bind_boinc_client_port" lineno="13475">
6769 <summary>
6770 Bind UDP sockets to the boinc_client port.
6771 </summary>
6772 @@ -18248,7 +18327,7 @@ Domain allowed access.
6773 </param>
6774 <infoflow type="none"/>
6775 </interface>
6776 -<interface name="corenet_tcp_connect_boinc_client_port" lineno="12950">
6777 +<interface name="corenet_tcp_connect_boinc_client_port" lineno="13494">
6778 <summary>
6779 Make a TCP connection to the boinc_client port.
6780 </summary>
6781 @@ -18258,7 +18337,7 @@ Domain allowed access.
6782 </summary>
6783 </param>
6784 </interface>
6785 -<interface name="corenet_send_boinc_client_client_packets" lineno="12970">
6786 +<interface name="corenet_send_boinc_client_client_packets" lineno="13514">
6787 <summary>
6788 Send boinc_client_client packets.
6789 </summary>
6790 @@ -18269,7 +18348,7 @@ Domain allowed access.
6791 </param>
6792 <infoflow type="write" weight="10"/>
6793 </interface>
6794 -<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="12989">
6795 +<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="13533">
6796 <summary>
6797 Do not audit attempts to send boinc_client_client packets.
6798 </summary>
6799 @@ -18280,7 +18359,7 @@ Domain to not audit.
6800 </param>
6801 <infoflow type="none"/>
6802 </interface>
6803 -<interface name="corenet_receive_boinc_client_client_packets" lineno="13008">
6804 +<interface name="corenet_receive_boinc_client_client_packets" lineno="13552">
6805 <summary>
6806 Receive boinc_client_client packets.
6807 </summary>
6808 @@ -18291,7 +18370,7 @@ Domain allowed access.
6809 </param>
6810 <infoflow type="read" weight="10"/>
6811 </interface>
6812 -<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="13027">
6813 +<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="13571">
6814 <summary>
6815 Do not audit attempts to receive boinc_client_client packets.
6816 </summary>
6817 @@ -18302,7 +18381,7 @@ Domain allowed access.
6818 </param>
6819 <infoflow type="none"/>
6820 </interface>
6821 -<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="13046">
6822 +<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="13590">
6823 <summary>
6824 Send and receive boinc_client_client packets.
6825 </summary>
6826 @@ -18313,7 +18392,7 @@ Domain allowed access.
6827 </param>
6828 <infoflow type="both" weight="10"/>
6829 </interface>
6830 -<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="13062">
6831 +<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="13606">
6832 <summary>
6833 Do not audit attempts to send and receive boinc_client_client packets.
6834 </summary>
6835 @@ -18324,7 +18403,7 @@ Domain to not audit.
6836 </param>
6837 <infoflow type="none"/>
6838 </interface>
6839 -<interface name="corenet_relabelto_boinc_client_client_packets" lineno="13077">
6840 +<interface name="corenet_relabelto_boinc_client_client_packets" lineno="13621">
6841 <summary>
6842 Relabel packets to boinc_client_client the packet type.
6843 </summary>
6844 @@ -18334,7 +18413,7 @@ Domain allowed access.
6845 </summary>
6846 </param>
6847 </interface>
6848 -<interface name="corenet_send_boinc_client_server_packets" lineno="13097">
6849 +<interface name="corenet_send_boinc_client_server_packets" lineno="13641">
6850 <summary>
6851 Send boinc_client_server packets.
6852 </summary>
6853 @@ -18345,7 +18424,7 @@ Domain allowed access.
6854 </param>
6855 <infoflow type="write" weight="10"/>
6856 </interface>
6857 -<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="13116">
6858 +<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="13660">
6859 <summary>
6860 Do not audit attempts to send boinc_client_server packets.
6861 </summary>
6862 @@ -18356,7 +18435,7 @@ Domain to not audit.
6863 </param>
6864 <infoflow type="none"/>
6865 </interface>
6866 -<interface name="corenet_receive_boinc_client_server_packets" lineno="13135">
6867 +<interface name="corenet_receive_boinc_client_server_packets" lineno="13679">
6868 <summary>
6869 Receive boinc_client_server packets.
6870 </summary>
6871 @@ -18367,7 +18446,7 @@ Domain allowed access.
6872 </param>
6873 <infoflow type="read" weight="10"/>
6874 </interface>
6875 -<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="13154">
6876 +<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="13698">
6877 <summary>
6878 Do not audit attempts to receive boinc_client_server packets.
6879 </summary>
6880 @@ -18378,7 +18457,7 @@ Domain allowed access.
6881 </param>
6882 <infoflow type="none"/>
6883 </interface>
6884 -<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="13173">
6885 +<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="13717">
6886 <summary>
6887 Send and receive boinc_client_server packets.
6888 </summary>
6889 @@ -18389,7 +18468,7 @@ Domain allowed access.
6890 </param>
6891 <infoflow type="both" weight="10"/>
6892 </interface>
6893 -<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="13189">
6894 +<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="13733">
6895 <summary>
6896 Do not audit attempts to send and receive boinc_client_server packets.
6897 </summary>
6898 @@ -18400,7 +18479,7 @@ Domain to not audit.
6899 </param>
6900 <infoflow type="none"/>
6901 </interface>
6902 -<interface name="corenet_relabelto_boinc_client_server_packets" lineno="13204">
6903 +<interface name="corenet_relabelto_boinc_client_server_packets" lineno="13748">
6904 <summary>
6905 Relabel packets to boinc_client_server the packet type.
6906 </summary>
6907 @@ -18410,7 +18489,7 @@ Domain allowed access.
6908 </summary>
6909 </param>
6910 </interface>
6911 -<interface name="corenet_tcp_sendrecv_biff_port" lineno="13226">
6912 +<interface name="corenet_tcp_sendrecv_biff_port" lineno="13770">
6913 <summary>
6914 Send and receive TCP traffic on the biff port.
6915 </summary>
6916 @@ -18421,7 +18500,7 @@ Domain allowed access.
6917 </param>
6918 <infoflow type="both" weight="10"/>
6919 </interface>
6920 -<interface name="corenet_udp_send_biff_port" lineno="13241">
6921 +<interface name="corenet_udp_send_biff_port" lineno="13785">
6922 <summary>
6923 Send UDP traffic on the biff port.
6924 </summary>
6925 @@ -18432,7 +18511,7 @@ Domain allowed access.
6926 </param>
6927 <infoflow type="write" weight="10"/>
6928 </interface>
6929 -<interface name="corenet_dontaudit_udp_send_biff_port" lineno="13256">
6930 +<interface name="corenet_dontaudit_udp_send_biff_port" lineno="13800">
6931 <summary>
6932 Do not audit attempts to send UDP traffic on the biff port.
6933 </summary>
6934 @@ -18443,7 +18522,7 @@ Domain to not audit.
6935 </param>
6936 <infoflow type="none"/>
6937 </interface>
6938 -<interface name="corenet_udp_receive_biff_port" lineno="13271">
6939 +<interface name="corenet_udp_receive_biff_port" lineno="13815">
6940 <summary>
6941 Receive UDP traffic on the biff port.
6942 </summary>
6943 @@ -18454,7 +18533,7 @@ Domain allowed access.
6944 </param>
6945 <infoflow type="read" weight="10"/>
6946 </interface>
6947 -<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="13286">
6948 +<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="13830">
6949 <summary>
6950 Do not audit attempts to receive UDP traffic on the biff port.
6951 </summary>
6952 @@ -18465,7 +18544,7 @@ Domain to not audit.
6953 </param>
6954 <infoflow type="none"/>
6955 </interface>
6956 -<interface name="corenet_udp_sendrecv_biff_port" lineno="13301">
6957 +<interface name="corenet_udp_sendrecv_biff_port" lineno="13845">
6958 <summary>
6959 Send and receive UDP traffic on the biff port.
6960 </summary>
6961 @@ -18476,7 +18555,7 @@ Domain allowed access.
6962 </param>
6963 <infoflow type="both" weight="10"/>
6964 </interface>
6965 -<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="13317">
6966 +<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="13861">
6967 <summary>
6968 Do not audit attempts to send and receive
6969 UDP traffic on the biff port.
6970 @@ -18488,7 +18567,7 @@ Domain to not audit.
6971 </param>
6972 <infoflow type="none"/>
6973 </interface>
6974 -<interface name="corenet_tcp_bind_biff_port" lineno="13332">
6975 +<interface name="corenet_tcp_bind_biff_port" lineno="13876">
6976 <summary>
6977 Bind TCP sockets to the biff port.
6978 </summary>
6979 @@ -18499,7 +18578,7 @@ Domain allowed access.
6980 </param>
6981 <infoflow type="none"/>
6982 </interface>
6983 -<interface name="corenet_udp_bind_biff_port" lineno="13352">
6984 +<interface name="corenet_udp_bind_biff_port" lineno="13896">
6985 <summary>
6986 Bind UDP sockets to the biff port.
6987 </summary>
6988 @@ -18510,7 +18589,7 @@ Domain allowed access.
6989 </param>
6990 <infoflow type="none"/>
6991 </interface>
6992 -<interface name="corenet_tcp_connect_biff_port" lineno="13371">
6993 +<interface name="corenet_tcp_connect_biff_port" lineno="13915">
6994 <summary>
6995 Make a TCP connection to the biff port.
6996 </summary>
6997 @@ -18520,7 +18599,7 @@ Domain allowed access.
6998 </summary>
6999 </param>
7000 </interface>
7001 -<interface name="corenet_send_biff_client_packets" lineno="13391">
7002 +<interface name="corenet_send_biff_client_packets" lineno="13935">
7003 <summary>
7004 Send biff_client packets.
7005 </summary>
7006 @@ -18531,7 +18610,7 @@ Domain allowed access.
7007 </param>
7008 <infoflow type="write" weight="10"/>
7009 </interface>
7010 -<interface name="corenet_dontaudit_send_biff_client_packets" lineno="13410">
7011 +<interface name="corenet_dontaudit_send_biff_client_packets" lineno="13954">
7012 <summary>
7013 Do not audit attempts to send biff_client packets.
7014 </summary>
7015 @@ -18542,7 +18621,7 @@ Domain to not audit.
7016 </param>
7017 <infoflow type="none"/>
7018 </interface>
7019 -<interface name="corenet_receive_biff_client_packets" lineno="13429">
7020 +<interface name="corenet_receive_biff_client_packets" lineno="13973">
7021 <summary>
7022 Receive biff_client packets.
7023 </summary>
7024 @@ -18553,7 +18632,7 @@ Domain allowed access.
7025 </param>
7026 <infoflow type="read" weight="10"/>
7027 </interface>
7028 -<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="13448">
7029 +<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="13992">
7030 <summary>
7031 Do not audit attempts to receive biff_client packets.
7032 </summary>
7033 @@ -18564,7 +18643,7 @@ Domain allowed access.
7034 </param>
7035 <infoflow type="none"/>
7036 </interface>
7037 -<interface name="corenet_sendrecv_biff_client_packets" lineno="13467">
7038 +<interface name="corenet_sendrecv_biff_client_packets" lineno="14011">
7039 <summary>
7040 Send and receive biff_client packets.
7041 </summary>
7042 @@ -18575,7 +18654,7 @@ Domain allowed access.
7043 </param>
7044 <infoflow type="both" weight="10"/>
7045 </interface>
7046 -<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="13483">
7047 +<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="14027">
7048 <summary>
7049 Do not audit attempts to send and receive biff_client packets.
7050 </summary>
7051 @@ -18586,7 +18665,7 @@ Domain to not audit.
7052 </param>
7053 <infoflow type="none"/>
7054 </interface>
7055 -<interface name="corenet_relabelto_biff_client_packets" lineno="13498">
7056 +<interface name="corenet_relabelto_biff_client_packets" lineno="14042">
7057 <summary>
7058 Relabel packets to biff_client the packet type.
7059 </summary>
7060 @@ -18596,7 +18675,7 @@ Domain allowed access.
7061 </summary>
7062 </param>
7063 </interface>
7064 -<interface name="corenet_send_biff_server_packets" lineno="13518">
7065 +<interface name="corenet_send_biff_server_packets" lineno="14062">
7066 <summary>
7067 Send biff_server packets.
7068 </summary>
7069 @@ -18607,7 +18686,7 @@ Domain allowed access.
7070 </param>
7071 <infoflow type="write" weight="10"/>
7072 </interface>
7073 -<interface name="corenet_dontaudit_send_biff_server_packets" lineno="13537">
7074 +<interface name="corenet_dontaudit_send_biff_server_packets" lineno="14081">
7075 <summary>
7076 Do not audit attempts to send biff_server packets.
7077 </summary>
7078 @@ -18618,7 +18697,7 @@ Domain to not audit.
7079 </param>
7080 <infoflow type="none"/>
7081 </interface>
7082 -<interface name="corenet_receive_biff_server_packets" lineno="13556">
7083 +<interface name="corenet_receive_biff_server_packets" lineno="14100">
7084 <summary>
7085 Receive biff_server packets.
7086 </summary>
7087 @@ -18629,7 +18708,7 @@ Domain allowed access.
7088 </param>
7089 <infoflow type="read" weight="10"/>
7090 </interface>
7091 -<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="13575">
7092 +<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="14119">
7093 <summary>
7094 Do not audit attempts to receive biff_server packets.
7095 </summary>
7096 @@ -18640,7 +18719,7 @@ Domain allowed access.
7097 </param>
7098 <infoflow type="none"/>
7099 </interface>
7100 -<interface name="corenet_sendrecv_biff_server_packets" lineno="13594">
7101 +<interface name="corenet_sendrecv_biff_server_packets" lineno="14138">
7102 <summary>
7103 Send and receive biff_server packets.
7104 </summary>
7105 @@ -18651,7 +18730,7 @@ Domain allowed access.
7106 </param>
7107 <infoflow type="both" weight="10"/>
7108 </interface>
7109 -<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="13610">
7110 +<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="14154">
7111 <summary>
7112 Do not audit attempts to send and receive biff_server packets.
7113 </summary>
7114 @@ -18662,7 +18741,7 @@ Domain to not audit.
7115 </param>
7116 <infoflow type="none"/>
7117 </interface>
7118 -<interface name="corenet_relabelto_biff_server_packets" lineno="13625">
7119 +<interface name="corenet_relabelto_biff_server_packets" lineno="14169">
7120 <summary>
7121 Relabel packets to biff_server the packet type.
7122 </summary>
7123 @@ -18672,7 +18751,7 @@ Domain allowed access.
7124 </summary>
7125 </param>
7126 </interface>
7127 -<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="13647">
7128 +<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="14191">
7129 <summary>
7130 Send and receive TCP traffic on the certmaster port.
7131 </summary>
7132 @@ -18683,7 +18762,7 @@ Domain allowed access.
7133 </param>
7134 <infoflow type="both" weight="10"/>
7135 </interface>
7136 -<interface name="corenet_udp_send_certmaster_port" lineno="13662">
7137 +<interface name="corenet_udp_send_certmaster_port" lineno="14206">
7138 <summary>
7139 Send UDP traffic on the certmaster port.
7140 </summary>
7141 @@ -18694,7 +18773,7 @@ Domain allowed access.
7142 </param>
7143 <infoflow type="write" weight="10"/>
7144 </interface>
7145 -<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="13677">
7146 +<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="14221">
7147 <summary>
7148 Do not audit attempts to send UDP traffic on the certmaster port.
7149 </summary>
7150 @@ -18705,7 +18784,7 @@ Domain to not audit.
7151 </param>
7152 <infoflow type="none"/>
7153 </interface>
7154 -<interface name="corenet_udp_receive_certmaster_port" lineno="13692">
7155 +<interface name="corenet_udp_receive_certmaster_port" lineno="14236">
7156 <summary>
7157 Receive UDP traffic on the certmaster port.
7158 </summary>
7159 @@ -18716,7 +18795,7 @@ Domain allowed access.
7160 </param>
7161 <infoflow type="read" weight="10"/>
7162 </interface>
7163 -<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="13707">
7164 +<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="14251">
7165 <summary>
7166 Do not audit attempts to receive UDP traffic on the certmaster port.
7167 </summary>
7168 @@ -18727,7 +18806,7 @@ Domain to not audit.
7169 </param>
7170 <infoflow type="none"/>
7171 </interface>
7172 -<interface name="corenet_udp_sendrecv_certmaster_port" lineno="13722">
7173 +<interface name="corenet_udp_sendrecv_certmaster_port" lineno="14266">
7174 <summary>
7175 Send and receive UDP traffic on the certmaster port.
7176 </summary>
7177 @@ -18738,7 +18817,7 @@ Domain allowed access.
7178 </param>
7179 <infoflow type="both" weight="10"/>
7180 </interface>
7181 -<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="13738">
7182 +<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="14282">
7183 <summary>
7184 Do not audit attempts to send and receive
7185 UDP traffic on the certmaster port.
7186 @@ -18750,7 +18829,7 @@ Domain to not audit.
7187 </param>
7188 <infoflow type="none"/>
7189 </interface>
7190 -<interface name="corenet_tcp_bind_certmaster_port" lineno="13753">
7191 +<interface name="corenet_tcp_bind_certmaster_port" lineno="14297">
7192 <summary>
7193 Bind TCP sockets to the certmaster port.
7194 </summary>
7195 @@ -18761,7 +18840,7 @@ Domain allowed access.
7196 </param>
7197 <infoflow type="none"/>
7198 </interface>
7199 -<interface name="corenet_udp_bind_certmaster_port" lineno="13773">
7200 +<interface name="corenet_udp_bind_certmaster_port" lineno="14317">
7201 <summary>
7202 Bind UDP sockets to the certmaster port.
7203 </summary>
7204 @@ -18772,7 +18851,7 @@ Domain allowed access.
7205 </param>
7206 <infoflow type="none"/>
7207 </interface>
7208 -<interface name="corenet_tcp_connect_certmaster_port" lineno="13792">
7209 +<interface name="corenet_tcp_connect_certmaster_port" lineno="14336">
7210 <summary>
7211 Make a TCP connection to the certmaster port.
7212 </summary>
7213 @@ -18782,7 +18861,7 @@ Domain allowed access.
7214 </summary>
7215 </param>
7216 </interface>
7217 -<interface name="corenet_send_certmaster_client_packets" lineno="13812">
7218 +<interface name="corenet_send_certmaster_client_packets" lineno="14356">
7219 <summary>
7220 Send certmaster_client packets.
7221 </summary>
7222 @@ -18793,7 +18872,7 @@ Domain allowed access.
7223 </param>
7224 <infoflow type="write" weight="10"/>
7225 </interface>
7226 -<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="13831">
7227 +<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="14375">
7228 <summary>
7229 Do not audit attempts to send certmaster_client packets.
7230 </summary>
7231 @@ -18804,7 +18883,7 @@ Domain to not audit.
7232 </param>
7233 <infoflow type="none"/>
7234 </interface>
7235 -<interface name="corenet_receive_certmaster_client_packets" lineno="13850">
7236 +<interface name="corenet_receive_certmaster_client_packets" lineno="14394">
7237 <summary>
7238 Receive certmaster_client packets.
7239 </summary>
7240 @@ -18815,7 +18894,7 @@ Domain allowed access.
7241 </param>
7242 <infoflow type="read" weight="10"/>
7243 </interface>
7244 -<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="13869">
7245 +<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="14413">
7246 <summary>
7247 Do not audit attempts to receive certmaster_client packets.
7248 </summary>
7249 @@ -18826,7 +18905,7 @@ Domain allowed access.
7250 </param>
7251 <infoflow type="none"/>
7252 </interface>
7253 -<interface name="corenet_sendrecv_certmaster_client_packets" lineno="13888">
7254 +<interface name="corenet_sendrecv_certmaster_client_packets" lineno="14432">
7255 <summary>
7256 Send and receive certmaster_client packets.
7257 </summary>
7258 @@ -18837,7 +18916,7 @@ Domain allowed access.
7259 </param>
7260 <infoflow type="both" weight="10"/>
7261 </interface>
7262 -<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="13904">
7263 +<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="14448">
7264 <summary>
7265 Do not audit attempts to send and receive certmaster_client packets.
7266 </summary>
7267 @@ -18848,7 +18927,7 @@ Domain to not audit.
7268 </param>
7269 <infoflow type="none"/>
7270 </interface>
7271 -<interface name="corenet_relabelto_certmaster_client_packets" lineno="13919">
7272 +<interface name="corenet_relabelto_certmaster_client_packets" lineno="14463">
7273 <summary>
7274 Relabel packets to certmaster_client the packet type.
7275 </summary>
7276 @@ -18858,7 +18937,7 @@ Domain allowed access.
7277 </summary>
7278 </param>
7279 </interface>
7280 -<interface name="corenet_send_certmaster_server_packets" lineno="13939">
7281 +<interface name="corenet_send_certmaster_server_packets" lineno="14483">
7282 <summary>
7283 Send certmaster_server packets.
7284 </summary>
7285 @@ -18869,7 +18948,7 @@ Domain allowed access.
7286 </param>
7287 <infoflow type="write" weight="10"/>
7288 </interface>
7289 -<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="13958">
7290 +<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="14502">
7291 <summary>
7292 Do not audit attempts to send certmaster_server packets.
7293 </summary>
7294 @@ -18880,7 +18959,7 @@ Domain to not audit.
7295 </param>
7296 <infoflow type="none"/>
7297 </interface>
7298 -<interface name="corenet_receive_certmaster_server_packets" lineno="13977">
7299 +<interface name="corenet_receive_certmaster_server_packets" lineno="14521">
7300 <summary>
7301 Receive certmaster_server packets.
7302 </summary>
7303 @@ -18891,7 +18970,7 @@ Domain allowed access.
7304 </param>
7305 <infoflow type="read" weight="10"/>
7306 </interface>
7307 -<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="13996">
7308 +<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="14540">
7309 <summary>
7310 Do not audit attempts to receive certmaster_server packets.
7311 </summary>
7312 @@ -18902,7 +18981,7 @@ Domain allowed access.
7313 </param>
7314 <infoflow type="none"/>
7315 </interface>
7316 -<interface name="corenet_sendrecv_certmaster_server_packets" lineno="14015">
7317 +<interface name="corenet_sendrecv_certmaster_server_packets" lineno="14559">
7318 <summary>
7319 Send and receive certmaster_server packets.
7320 </summary>
7321 @@ -18913,7 +18992,7 @@ Domain allowed access.
7322 </param>
7323 <infoflow type="both" weight="10"/>
7324 </interface>
7325 -<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="14031">
7326 +<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="14575">
7327 <summary>
7328 Do not audit attempts to send and receive certmaster_server packets.
7329 </summary>
7330 @@ -18924,7 +19003,7 @@ Domain to not audit.
7331 </param>
7332 <infoflow type="none"/>
7333 </interface>
7334 -<interface name="corenet_relabelto_certmaster_server_packets" lineno="14046">
7335 +<interface name="corenet_relabelto_certmaster_server_packets" lineno="14590">
7336 <summary>
7337 Relabel packets to certmaster_server the packet type.
7338 </summary>
7339 @@ -18934,7 +19013,7 @@ Domain allowed access.
7340 </summary>
7341 </param>
7342 </interface>
7343 -<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="14068">
7344 +<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="14612">
7345 <summary>
7346 Send and receive TCP traffic on the chronyd port.
7347 </summary>
7348 @@ -18945,7 +19024,7 @@ Domain allowed access.
7349 </param>
7350 <infoflow type="both" weight="10"/>
7351 </interface>
7352 -<interface name="corenet_udp_send_chronyd_port" lineno="14083">
7353 +<interface name="corenet_udp_send_chronyd_port" lineno="14627">
7354 <summary>
7355 Send UDP traffic on the chronyd port.
7356 </summary>
7357 @@ -18956,7 +19035,7 @@ Domain allowed access.
7358 </param>
7359 <infoflow type="write" weight="10"/>
7360 </interface>
7361 -<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="14098">
7362 +<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="14642">
7363 <summary>
7364 Do not audit attempts to send UDP traffic on the chronyd port.
7365 </summary>
7366 @@ -18967,7 +19046,7 @@ Domain to not audit.
7367 </param>
7368 <infoflow type="none"/>
7369 </interface>
7370 -<interface name="corenet_udp_receive_chronyd_port" lineno="14113">
7371 +<interface name="corenet_udp_receive_chronyd_port" lineno="14657">
7372 <summary>
7373 Receive UDP traffic on the chronyd port.
7374 </summary>
7375 @@ -18978,7 +19057,7 @@ Domain allowed access.
7376 </param>
7377 <infoflow type="read" weight="10"/>
7378 </interface>
7379 -<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="14128">
7380 +<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="14672">
7381 <summary>
7382 Do not audit attempts to receive UDP traffic on the chronyd port.
7383 </summary>
7384 @@ -18989,7 +19068,7 @@ Domain to not audit.
7385 </param>
7386 <infoflow type="none"/>
7387 </interface>
7388 -<interface name="corenet_udp_sendrecv_chronyd_port" lineno="14143">
7389 +<interface name="corenet_udp_sendrecv_chronyd_port" lineno="14687">
7390 <summary>
7391 Send and receive UDP traffic on the chronyd port.
7392 </summary>
7393 @@ -19000,7 +19079,7 @@ Domain allowed access.
7394 </param>
7395 <infoflow type="both" weight="10"/>
7396 </interface>
7397 -<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="14159">
7398 +<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="14703">
7399 <summary>
7400 Do not audit attempts to send and receive
7401 UDP traffic on the chronyd port.
7402 @@ -19012,7 +19091,7 @@ Domain to not audit.
7403 </param>
7404 <infoflow type="none"/>
7405 </interface>
7406 -<interface name="corenet_tcp_bind_chronyd_port" lineno="14174">
7407 +<interface name="corenet_tcp_bind_chronyd_port" lineno="14718">
7408 <summary>
7409 Bind TCP sockets to the chronyd port.
7410 </summary>
7411 @@ -19023,7 +19102,7 @@ Domain allowed access.
7412 </param>
7413 <infoflow type="none"/>
7414 </interface>
7415 -<interface name="corenet_udp_bind_chronyd_port" lineno="14194">
7416 +<interface name="corenet_udp_bind_chronyd_port" lineno="14738">
7417 <summary>
7418 Bind UDP sockets to the chronyd port.
7419 </summary>
7420 @@ -19034,7 +19113,7 @@ Domain allowed access.
7421 </param>
7422 <infoflow type="none"/>
7423 </interface>
7424 -<interface name="corenet_tcp_connect_chronyd_port" lineno="14213">
7425 +<interface name="corenet_tcp_connect_chronyd_port" lineno="14757">
7426 <summary>
7427 Make a TCP connection to the chronyd port.
7428 </summary>
7429 @@ -19044,7 +19123,7 @@ Domain allowed access.
7430 </summary>
7431 </param>
7432 </interface>
7433 -<interface name="corenet_send_chronyd_client_packets" lineno="14233">
7434 +<interface name="corenet_send_chronyd_client_packets" lineno="14777">
7435 <summary>
7436 Send chronyd_client packets.
7437 </summary>
7438 @@ -19055,7 +19134,7 @@ Domain allowed access.
7439 </param>
7440 <infoflow type="write" weight="10"/>
7441 </interface>
7442 -<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="14252">
7443 +<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="14796">
7444 <summary>
7445 Do not audit attempts to send chronyd_client packets.
7446 </summary>
7447 @@ -19066,7 +19145,7 @@ Domain to not audit.
7448 </param>
7449 <infoflow type="none"/>
7450 </interface>
7451 -<interface name="corenet_receive_chronyd_client_packets" lineno="14271">
7452 +<interface name="corenet_receive_chronyd_client_packets" lineno="14815">
7453 <summary>
7454 Receive chronyd_client packets.
7455 </summary>
7456 @@ -19077,7 +19156,7 @@ Domain allowed access.
7457 </param>
7458 <infoflow type="read" weight="10"/>
7459 </interface>
7460 -<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="14290">
7461 +<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="14834">
7462 <summary>
7463 Do not audit attempts to receive chronyd_client packets.
7464 </summary>
7465 @@ -19088,7 +19167,7 @@ Domain allowed access.
7466 </param>
7467 <infoflow type="none"/>
7468 </interface>
7469 -<interface name="corenet_sendrecv_chronyd_client_packets" lineno="14309">
7470 +<interface name="corenet_sendrecv_chronyd_client_packets" lineno="14853">
7471 <summary>
7472 Send and receive chronyd_client packets.
7473 </summary>
7474 @@ -19099,7 +19178,7 @@ Domain allowed access.
7475 </param>
7476 <infoflow type="both" weight="10"/>
7477 </interface>
7478 -<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="14325">
7479 +<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="14869">
7480 <summary>
7481 Do not audit attempts to send and receive chronyd_client packets.
7482 </summary>
7483 @@ -19110,7 +19189,7 @@ Domain to not audit.
7484 </param>
7485 <infoflow type="none"/>
7486 </interface>
7487 -<interface name="corenet_relabelto_chronyd_client_packets" lineno="14340">
7488 +<interface name="corenet_relabelto_chronyd_client_packets" lineno="14884">
7489 <summary>
7490 Relabel packets to chronyd_client the packet type.
7491 </summary>
7492 @@ -19120,7 +19199,7 @@ Domain allowed access.
7493 </summary>
7494 </param>
7495 </interface>
7496 -<interface name="corenet_send_chronyd_server_packets" lineno="14360">
7497 +<interface name="corenet_send_chronyd_server_packets" lineno="14904">
7498 <summary>
7499 Send chronyd_server packets.
7500 </summary>
7501 @@ -19131,7 +19210,7 @@ Domain allowed access.
7502 </param>
7503 <infoflow type="write" weight="10"/>
7504 </interface>
7505 -<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="14379">
7506 +<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="14923">
7507 <summary>
7508 Do not audit attempts to send chronyd_server packets.
7509 </summary>
7510 @@ -19142,7 +19221,7 @@ Domain to not audit.
7511 </param>
7512 <infoflow type="none"/>
7513 </interface>
7514 -<interface name="corenet_receive_chronyd_server_packets" lineno="14398">
7515 +<interface name="corenet_receive_chronyd_server_packets" lineno="14942">
7516 <summary>
7517 Receive chronyd_server packets.
7518 </summary>
7519 @@ -19153,7 +19232,7 @@ Domain allowed access.
7520 </param>
7521 <infoflow type="read" weight="10"/>
7522 </interface>
7523 -<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="14417">
7524 +<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="14961">
7525 <summary>
7526 Do not audit attempts to receive chronyd_server packets.
7527 </summary>
7528 @@ -19164,7 +19243,7 @@ Domain allowed access.
7529 </param>
7530 <infoflow type="none"/>
7531 </interface>
7532 -<interface name="corenet_sendrecv_chronyd_server_packets" lineno="14436">
7533 +<interface name="corenet_sendrecv_chronyd_server_packets" lineno="14980">
7534 <summary>
7535 Send and receive chronyd_server packets.
7536 </summary>
7537 @@ -19175,7 +19254,7 @@ Domain allowed access.
7538 </param>
7539 <infoflow type="both" weight="10"/>
7540 </interface>
7541 -<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="14452">
7542 +<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="14996">
7543 <summary>
7544 Do not audit attempts to send and receive chronyd_server packets.
7545 </summary>
7546 @@ -19186,7 +19265,7 @@ Domain to not audit.
7547 </param>
7548 <infoflow type="none"/>
7549 </interface>
7550 -<interface name="corenet_relabelto_chronyd_server_packets" lineno="14467">
7551 +<interface name="corenet_relabelto_chronyd_server_packets" lineno="15011">
7552 <summary>
7553 Relabel packets to chronyd_server the packet type.
7554 </summary>
7555 @@ -19196,7 +19275,7 @@ Domain allowed access.
7556 </summary>
7557 </param>
7558 </interface>
7559 -<interface name="corenet_tcp_sendrecv_clamd_port" lineno="14489">
7560 +<interface name="corenet_tcp_sendrecv_clamd_port" lineno="15033">
7561 <summary>
7562 Send and receive TCP traffic on the clamd port.
7563 </summary>
7564 @@ -19207,7 +19286,7 @@ Domain allowed access.
7565 </param>
7566 <infoflow type="both" weight="10"/>
7567 </interface>
7568 -<interface name="corenet_udp_send_clamd_port" lineno="14504">
7569 +<interface name="corenet_udp_send_clamd_port" lineno="15048">
7570 <summary>
7571 Send UDP traffic on the clamd port.
7572 </summary>
7573 @@ -19218,7 +19297,7 @@ Domain allowed access.
7574 </param>
7575 <infoflow type="write" weight="10"/>
7576 </interface>
7577 -<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="14519">
7578 +<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="15063">
7579 <summary>
7580 Do not audit attempts to send UDP traffic on the clamd port.
7581 </summary>
7582 @@ -19229,7 +19308,7 @@ Domain to not audit.
7583 </param>
7584 <infoflow type="none"/>
7585 </interface>
7586 -<interface name="corenet_udp_receive_clamd_port" lineno="14534">
7587 +<interface name="corenet_udp_receive_clamd_port" lineno="15078">
7588 <summary>
7589 Receive UDP traffic on the clamd port.
7590 </summary>
7591 @@ -19240,7 +19319,7 @@ Domain allowed access.
7592 </param>
7593 <infoflow type="read" weight="10"/>
7594 </interface>
7595 -<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="14549">
7596 +<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="15093">
7597 <summary>
7598 Do not audit attempts to receive UDP traffic on the clamd port.
7599 </summary>
7600 @@ -19251,7 +19330,7 @@ Domain to not audit.
7601 </param>
7602 <infoflow type="none"/>
7603 </interface>
7604 -<interface name="corenet_udp_sendrecv_clamd_port" lineno="14564">
7605 +<interface name="corenet_udp_sendrecv_clamd_port" lineno="15108">
7606 <summary>
7607 Send and receive UDP traffic on the clamd port.
7608 </summary>
7609 @@ -19262,7 +19341,7 @@ Domain allowed access.
7610 </param>
7611 <infoflow type="both" weight="10"/>
7612 </interface>
7613 -<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="14580">
7614 +<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="15124">
7615 <summary>
7616 Do not audit attempts to send and receive
7617 UDP traffic on the clamd port.
7618 @@ -19274,7 +19353,7 @@ Domain to not audit.
7619 </param>
7620 <infoflow type="none"/>
7621 </interface>
7622 -<interface name="corenet_tcp_bind_clamd_port" lineno="14595">
7623 +<interface name="corenet_tcp_bind_clamd_port" lineno="15139">
7624 <summary>
7625 Bind TCP sockets to the clamd port.
7626 </summary>
7627 @@ -19285,7 +19364,7 @@ Domain allowed access.
7628 </param>
7629 <infoflow type="none"/>
7630 </interface>
7631 -<interface name="corenet_udp_bind_clamd_port" lineno="14615">
7632 +<interface name="corenet_udp_bind_clamd_port" lineno="15159">
7633 <summary>
7634 Bind UDP sockets to the clamd port.
7635 </summary>
7636 @@ -19296,7 +19375,7 @@ Domain allowed access.
7637 </param>
7638 <infoflow type="none"/>
7639 </interface>
7640 -<interface name="corenet_tcp_connect_clamd_port" lineno="14634">
7641 +<interface name="corenet_tcp_connect_clamd_port" lineno="15178">
7642 <summary>
7643 Make a TCP connection to the clamd port.
7644 </summary>
7645 @@ -19306,7 +19385,7 @@ Domain allowed access.
7646 </summary>
7647 </param>
7648 </interface>
7649 -<interface name="corenet_send_clamd_client_packets" lineno="14654">
7650 +<interface name="corenet_send_clamd_client_packets" lineno="15198">
7651 <summary>
7652 Send clamd_client packets.
7653 </summary>
7654 @@ -19317,7 +19396,7 @@ Domain allowed access.
7655 </param>
7656 <infoflow type="write" weight="10"/>
7657 </interface>
7658 -<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="14673">
7659 +<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="15217">
7660 <summary>
7661 Do not audit attempts to send clamd_client packets.
7662 </summary>
7663 @@ -19328,7 +19407,7 @@ Domain to not audit.
7664 </param>
7665 <infoflow type="none"/>
7666 </interface>
7667 -<interface name="corenet_receive_clamd_client_packets" lineno="14692">
7668 +<interface name="corenet_receive_clamd_client_packets" lineno="15236">
7669 <summary>
7670 Receive clamd_client packets.
7671 </summary>
7672 @@ -19339,7 +19418,7 @@ Domain allowed access.
7673 </param>
7674 <infoflow type="read" weight="10"/>
7675 </interface>
7676 -<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="14711">
7677 +<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="15255">
7678 <summary>
7679 Do not audit attempts to receive clamd_client packets.
7680 </summary>
7681 @@ -19350,7 +19429,7 @@ Domain allowed access.
7682 </param>
7683 <infoflow type="none"/>
7684 </interface>
7685 -<interface name="corenet_sendrecv_clamd_client_packets" lineno="14730">
7686 +<interface name="corenet_sendrecv_clamd_client_packets" lineno="15274">
7687 <summary>
7688 Send and receive clamd_client packets.
7689 </summary>
7690 @@ -19361,7 +19440,7 @@ Domain allowed access.
7691 </param>
7692 <infoflow type="both" weight="10"/>
7693 </interface>
7694 -<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="14746">
7695 +<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="15290">
7696 <summary>
7697 Do not audit attempts to send and receive clamd_client packets.
7698 </summary>
7699 @@ -19372,7 +19451,7 @@ Domain to not audit.
7700 </param>
7701 <infoflow type="none"/>
7702 </interface>
7703 -<interface name="corenet_relabelto_clamd_client_packets" lineno="14761">
7704 +<interface name="corenet_relabelto_clamd_client_packets" lineno="15305">
7705 <summary>
7706 Relabel packets to clamd_client the packet type.
7707 </summary>
7708 @@ -19382,7 +19461,7 @@ Domain allowed access.
7709 </summary>
7710 </param>
7711 </interface>
7712 -<interface name="corenet_send_clamd_server_packets" lineno="14781">
7713 +<interface name="corenet_send_clamd_server_packets" lineno="15325">
7714 <summary>
7715 Send clamd_server packets.
7716 </summary>
7717 @@ -19393,7 +19472,7 @@ Domain allowed access.
7718 </param>
7719 <infoflow type="write" weight="10"/>
7720 </interface>
7721 -<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="14800">
7722 +<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="15344">
7723 <summary>
7724 Do not audit attempts to send clamd_server packets.
7725 </summary>
7726 @@ -19404,7 +19483,7 @@ Domain to not audit.
7727 </param>
7728 <infoflow type="none"/>
7729 </interface>
7730 -<interface name="corenet_receive_clamd_server_packets" lineno="14819">
7731 +<interface name="corenet_receive_clamd_server_packets" lineno="15363">
7732 <summary>
7733 Receive clamd_server packets.
7734 </summary>
7735 @@ -19415,7 +19494,7 @@ Domain allowed access.
7736 </param>
7737 <infoflow type="read" weight="10"/>
7738 </interface>
7739 -<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="14838">
7740 +<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="15382">
7741 <summary>
7742 Do not audit attempts to receive clamd_server packets.
7743 </summary>
7744 @@ -19426,7 +19505,7 @@ Domain allowed access.
7745 </param>
7746 <infoflow type="none"/>
7747 </interface>
7748 -<interface name="corenet_sendrecv_clamd_server_packets" lineno="14857">
7749 +<interface name="corenet_sendrecv_clamd_server_packets" lineno="15401">
7750 <summary>
7751 Send and receive clamd_server packets.
7752 </summary>
7753 @@ -19437,7 +19516,7 @@ Domain allowed access.
7754 </param>
7755 <infoflow type="both" weight="10"/>
7756 </interface>
7757 -<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="14873">
7758 +<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="15417">
7759 <summary>
7760 Do not audit attempts to send and receive clamd_server packets.
7761 </summary>
7762 @@ -19448,7 +19527,7 @@ Domain to not audit.
7763 </param>
7764 <infoflow type="none"/>
7765 </interface>
7766 -<interface name="corenet_relabelto_clamd_server_packets" lineno="14888">
7767 +<interface name="corenet_relabelto_clamd_server_packets" lineno="15432">
7768 <summary>
7769 Relabel packets to clamd_server the packet type.
7770 </summary>
7771 @@ -19458,7 +19537,7 @@ Domain allowed access.
7772 </summary>
7773 </param>
7774 </interface>
7775 -<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="14910">
7776 +<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="15454">
7777 <summary>
7778 Send and receive TCP traffic on the clockspeed port.
7779 </summary>
7780 @@ -19469,7 +19548,7 @@ Domain allowed access.
7781 </param>
7782 <infoflow type="both" weight="10"/>
7783 </interface>
7784 -<interface name="corenet_udp_send_clockspeed_port" lineno="14925">
7785 +<interface name="corenet_udp_send_clockspeed_port" lineno="15469">
7786 <summary>
7787 Send UDP traffic on the clockspeed port.
7788 </summary>
7789 @@ -19480,7 +19559,7 @@ Domain allowed access.
7790 </param>
7791 <infoflow type="write" weight="10"/>
7792 </interface>
7793 -<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="14940">
7794 +<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="15484">
7795 <summary>
7796 Do not audit attempts to send UDP traffic on the clockspeed port.
7797 </summary>
7798 @@ -19491,7 +19570,7 @@ Domain to not audit.
7799 </param>
7800 <infoflow type="none"/>
7801 </interface>
7802 -<interface name="corenet_udp_receive_clockspeed_port" lineno="14955">
7803 +<interface name="corenet_udp_receive_clockspeed_port" lineno="15499">
7804 <summary>
7805 Receive UDP traffic on the clockspeed port.
7806 </summary>
7807 @@ -19502,7 +19581,7 @@ Domain allowed access.
7808 </param>
7809 <infoflow type="read" weight="10"/>
7810 </interface>
7811 -<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="14970">
7812 +<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="15514">
7813 <summary>
7814 Do not audit attempts to receive UDP traffic on the clockspeed port.
7815 </summary>
7816 @@ -19513,7 +19592,7 @@ Domain to not audit.
7817 </param>
7818 <infoflow type="none"/>
7819 </interface>
7820 -<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="14985">
7821 +<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="15529">
7822 <summary>
7823 Send and receive UDP traffic on the clockspeed port.
7824 </summary>
7825 @@ -19524,7 +19603,7 @@ Domain allowed access.
7826 </param>
7827 <infoflow type="both" weight="10"/>
7828 </interface>
7829 -<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="15001">
7830 +<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="15545">
7831 <summary>
7832 Do not audit attempts to send and receive
7833 UDP traffic on the clockspeed port.
7834 @@ -19536,7 +19615,7 @@ Domain to not audit.
7835 </param>
7836 <infoflow type="none"/>
7837 </interface>
7838 -<interface name="corenet_tcp_bind_clockspeed_port" lineno="15016">
7839 +<interface name="corenet_tcp_bind_clockspeed_port" lineno="15560">
7840 <summary>
7841 Bind TCP sockets to the clockspeed port.
7842 </summary>
7843 @@ -19547,7 +19626,7 @@ Domain allowed access.
7844 </param>
7845 <infoflow type="none"/>
7846 </interface>
7847 -<interface name="corenet_udp_bind_clockspeed_port" lineno="15036">
7848 +<interface name="corenet_udp_bind_clockspeed_port" lineno="15580">
7849 <summary>
7850 Bind UDP sockets to the clockspeed port.
7851 </summary>
7852 @@ -19558,7 +19637,7 @@ Domain allowed access.
7853 </param>
7854 <infoflow type="none"/>
7855 </interface>
7856 -<interface name="corenet_tcp_connect_clockspeed_port" lineno="15055">
7857 +<interface name="corenet_tcp_connect_clockspeed_port" lineno="15599">
7858 <summary>
7859 Make a TCP connection to the clockspeed port.
7860 </summary>
7861 @@ -19568,7 +19647,7 @@ Domain allowed access.
7862 </summary>
7863 </param>
7864 </interface>
7865 -<interface name="corenet_send_clockspeed_client_packets" lineno="15075">
7866 +<interface name="corenet_send_clockspeed_client_packets" lineno="15619">
7867 <summary>
7868 Send clockspeed_client packets.
7869 </summary>
7870 @@ -19579,7 +19658,7 @@ Domain allowed access.
7871 </param>
7872 <infoflow type="write" weight="10"/>
7873 </interface>
7874 -<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="15094">
7875 +<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="15638">
7876 <summary>
7877 Do not audit attempts to send clockspeed_client packets.
7878 </summary>
7879 @@ -19590,7 +19669,7 @@ Domain to not audit.
7880 </param>
7881 <infoflow type="none"/>
7882 </interface>
7883 -<interface name="corenet_receive_clockspeed_client_packets" lineno="15113">
7884 +<interface name="corenet_receive_clockspeed_client_packets" lineno="15657">
7885 <summary>
7886 Receive clockspeed_client packets.
7887 </summary>
7888 @@ -19601,7 +19680,7 @@ Domain allowed access.
7889 </param>
7890 <infoflow type="read" weight="10"/>
7891 </interface>
7892 -<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="15132">
7893 +<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="15676">
7894 <summary>
7895 Do not audit attempts to receive clockspeed_client packets.
7896 </summary>
7897 @@ -19612,7 +19691,7 @@ Domain allowed access.
7898 </param>
7899 <infoflow type="none"/>
7900 </interface>
7901 -<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="15151">
7902 +<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="15695">
7903 <summary>
7904 Send and receive clockspeed_client packets.
7905 </summary>
7906 @@ -19623,7 +19702,7 @@ Domain allowed access.
7907 </param>
7908 <infoflow type="both" weight="10"/>
7909 </interface>
7910 -<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="15167">
7911 +<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="15711">
7912 <summary>
7913 Do not audit attempts to send and receive clockspeed_client packets.
7914 </summary>
7915 @@ -19634,7 +19713,7 @@ Domain to not audit.
7916 </param>
7917 <infoflow type="none"/>
7918 </interface>
7919 -<interface name="corenet_relabelto_clockspeed_client_packets" lineno="15182">
7920 +<interface name="corenet_relabelto_clockspeed_client_packets" lineno="15726">
7921 <summary>
7922 Relabel packets to clockspeed_client the packet type.
7923 </summary>
7924 @@ -19644,7 +19723,7 @@ Domain allowed access.
7925 </summary>
7926 </param>
7927 </interface>
7928 -<interface name="corenet_send_clockspeed_server_packets" lineno="15202">
7929 +<interface name="corenet_send_clockspeed_server_packets" lineno="15746">
7930 <summary>
7931 Send clockspeed_server packets.
7932 </summary>
7933 @@ -19655,7 +19734,7 @@ Domain allowed access.
7934 </param>
7935 <infoflow type="write" weight="10"/>
7936 </interface>
7937 -<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="15221">
7938 +<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="15765">
7939 <summary>
7940 Do not audit attempts to send clockspeed_server packets.
7941 </summary>
7942 @@ -19666,7 +19745,7 @@ Domain to not audit.
7943 </param>
7944 <infoflow type="none"/>
7945 </interface>
7946 -<interface name="corenet_receive_clockspeed_server_packets" lineno="15240">
7947 +<interface name="corenet_receive_clockspeed_server_packets" lineno="15784">
7948 <summary>
7949 Receive clockspeed_server packets.
7950 </summary>
7951 @@ -19677,7 +19756,7 @@ Domain allowed access.
7952 </param>
7953 <infoflow type="read" weight="10"/>
7954 </interface>
7955 -<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="15259">
7956 +<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="15803">
7957 <summary>
7958 Do not audit attempts to receive clockspeed_server packets.
7959 </summary>
7960 @@ -19688,7 +19767,7 @@ Domain allowed access.
7961 </param>
7962 <infoflow type="none"/>
7963 </interface>
7964 -<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="15278">
7965 +<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="15822">
7966 <summary>
7967 Send and receive clockspeed_server packets.
7968 </summary>
7969 @@ -19699,7 +19778,7 @@ Domain allowed access.
7970 </param>
7971 <infoflow type="both" weight="10"/>
7972 </interface>
7973 -<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="15294">
7974 +<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="15838">
7975 <summary>
7976 Do not audit attempts to send and receive clockspeed_server packets.
7977 </summary>
7978 @@ -19710,7 +19789,7 @@ Domain to not audit.
7979 </param>
7980 <infoflow type="none"/>
7981 </interface>
7982 -<interface name="corenet_relabelto_clockspeed_server_packets" lineno="15309">
7983 +<interface name="corenet_relabelto_clockspeed_server_packets" lineno="15853">
7984 <summary>
7985 Relabel packets to clockspeed_server the packet type.
7986 </summary>
7987 @@ -19720,7 +19799,7 @@ Domain allowed access.
7988 </summary>
7989 </param>
7990 </interface>
7991 -<interface name="corenet_tcp_sendrecv_cluster_port" lineno="15331">
7992 +<interface name="corenet_tcp_sendrecv_cluster_port" lineno="15875">
7993 <summary>
7994 Send and receive TCP traffic on the cluster port.
7995 </summary>
7996 @@ -19731,7 +19810,7 @@ Domain allowed access.
7997 </param>
7998 <infoflow type="both" weight="10"/>
7999 </interface>
8000 -<interface name="corenet_udp_send_cluster_port" lineno="15346">
8001 +<interface name="corenet_udp_send_cluster_port" lineno="15890">
8002 <summary>
8003 Send UDP traffic on the cluster port.
8004 </summary>
8005 @@ -19742,7 +19821,7 @@ Domain allowed access.
8006 </param>
8007 <infoflow type="write" weight="10"/>
8008 </interface>
8009 -<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="15361">
8010 +<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="15905">
8011 <summary>
8012 Do not audit attempts to send UDP traffic on the cluster port.
8013 </summary>
8014 @@ -19753,7 +19832,7 @@ Domain to not audit.
8015 </param>
8016 <infoflow type="none"/>
8017 </interface>
8018 -<interface name="corenet_udp_receive_cluster_port" lineno="15376">
8019 +<interface name="corenet_udp_receive_cluster_port" lineno="15920">
8020 <summary>
8021 Receive UDP traffic on the cluster port.
8022 </summary>
8023 @@ -19764,7 +19843,7 @@ Domain allowed access.
8024 </param>
8025 <infoflow type="read" weight="10"/>
8026 </interface>
8027 -<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="15391">
8028 +<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="15935">
8029 <summary>
8030 Do not audit attempts to receive UDP traffic on the cluster port.
8031 </summary>
8032 @@ -19775,7 +19854,7 @@ Domain to not audit.
8033 </param>
8034 <infoflow type="none"/>
8035 </interface>
8036 -<interface name="corenet_udp_sendrecv_cluster_port" lineno="15406">
8037 +<interface name="corenet_udp_sendrecv_cluster_port" lineno="15950">
8038 <summary>
8039 Send and receive UDP traffic on the cluster port.
8040 </summary>
8041 @@ -19786,7 +19865,7 @@ Domain allowed access.
8042 </param>
8043 <infoflow type="both" weight="10"/>
8044 </interface>
8045 -<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="15422">
8046 +<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="15966">
8047 <summary>
8048 Do not audit attempts to send and receive
8049 UDP traffic on the cluster port.
8050 @@ -19798,7 +19877,7 @@ Domain to not audit.
8051 </param>
8052 <infoflow type="none"/>
8053 </interface>
8054 -<interface name="corenet_tcp_bind_cluster_port" lineno="15437">
8055 +<interface name="corenet_tcp_bind_cluster_port" lineno="15981">
8056 <summary>
8057 Bind TCP sockets to the cluster port.
8058 </summary>
8059 @@ -19809,7 +19888,7 @@ Domain allowed access.
8060 </param>
8061 <infoflow type="none"/>
8062 </interface>
8063 -<interface name="corenet_udp_bind_cluster_port" lineno="15457">
8064 +<interface name="corenet_udp_bind_cluster_port" lineno="16001">
8065 <summary>
8066 Bind UDP sockets to the cluster port.
8067 </summary>
8068 @@ -19820,7 +19899,7 @@ Domain allowed access.
8069 </param>
8070 <infoflow type="none"/>
8071 </interface>
8072 -<interface name="corenet_tcp_connect_cluster_port" lineno="15476">
8073 +<interface name="corenet_tcp_connect_cluster_port" lineno="16020">
8074 <summary>
8075 Make a TCP connection to the cluster port.
8076 </summary>
8077 @@ -19830,7 +19909,7 @@ Domain allowed access.
8078 </summary>
8079 </param>
8080 </interface>
8081 -<interface name="corenet_send_cluster_client_packets" lineno="15496">
8082 +<interface name="corenet_send_cluster_client_packets" lineno="16040">
8083 <summary>
8084 Send cluster_client packets.
8085 </summary>
8086 @@ -19841,7 +19920,7 @@ Domain allowed access.
8087 </param>
8088 <infoflow type="write" weight="10"/>
8089 </interface>
8090 -<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="15515">
8091 +<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="16059">
8092 <summary>
8093 Do not audit attempts to send cluster_client packets.
8094 </summary>
8095 @@ -19852,7 +19931,7 @@ Domain to not audit.
8096 </param>
8097 <infoflow type="none"/>
8098 </interface>
8099 -<interface name="corenet_receive_cluster_client_packets" lineno="15534">
8100 +<interface name="corenet_receive_cluster_client_packets" lineno="16078">
8101 <summary>
8102 Receive cluster_client packets.
8103 </summary>
8104 @@ -19863,7 +19942,7 @@ Domain allowed access.
8105 </param>
8106 <infoflow type="read" weight="10"/>
8107 </interface>
8108 -<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="15553">
8109 +<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="16097">
8110 <summary>
8111 Do not audit attempts to receive cluster_client packets.
8112 </summary>
8113 @@ -19874,7 +19953,7 @@ Domain allowed access.
8114 </param>
8115 <infoflow type="none"/>
8116 </interface>
8117 -<interface name="corenet_sendrecv_cluster_client_packets" lineno="15572">
8118 +<interface name="corenet_sendrecv_cluster_client_packets" lineno="16116">
8119 <summary>
8120 Send and receive cluster_client packets.
8121 </summary>
8122 @@ -19885,7 +19964,7 @@ Domain allowed access.
8123 </param>
8124 <infoflow type="both" weight="10"/>
8125 </interface>
8126 -<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="15588">
8127 +<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="16132">
8128 <summary>
8129 Do not audit attempts to send and receive cluster_client packets.
8130 </summary>
8131 @@ -19896,7 +19975,7 @@ Domain to not audit.
8132 </param>
8133 <infoflow type="none"/>
8134 </interface>
8135 -<interface name="corenet_relabelto_cluster_client_packets" lineno="15603">
8136 +<interface name="corenet_relabelto_cluster_client_packets" lineno="16147">
8137 <summary>
8138 Relabel packets to cluster_client the packet type.
8139 </summary>
8140 @@ -19906,7 +19985,7 @@ Domain allowed access.
8141 </summary>
8142 </param>
8143 </interface>
8144 -<interface name="corenet_send_cluster_server_packets" lineno="15623">
8145 +<interface name="corenet_send_cluster_server_packets" lineno="16167">
8146 <summary>
8147 Send cluster_server packets.
8148 </summary>
8149 @@ -19917,7 +19996,7 @@ Domain allowed access.
8150 </param>
8151 <infoflow type="write" weight="10"/>
8152 </interface>
8153 -<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="15642">
8154 +<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="16186">
8155 <summary>
8156 Do not audit attempts to send cluster_server packets.
8157 </summary>
8158 @@ -19928,7 +20007,7 @@ Domain to not audit.
8159 </param>
8160 <infoflow type="none"/>
8161 </interface>
8162 -<interface name="corenet_receive_cluster_server_packets" lineno="15661">
8163 +<interface name="corenet_receive_cluster_server_packets" lineno="16205">
8164 <summary>
8165 Receive cluster_server packets.
8166 </summary>
8167 @@ -19939,7 +20018,7 @@ Domain allowed access.
8168 </param>
8169 <infoflow type="read" weight="10"/>
8170 </interface>
8171 -<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="15680">
8172 +<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="16224">
8173 <summary>
8174 Do not audit attempts to receive cluster_server packets.
8175 </summary>
8176 @@ -19950,7 +20029,7 @@ Domain allowed access.
8177 </param>
8178 <infoflow type="none"/>
8179 </interface>
8180 -<interface name="corenet_sendrecv_cluster_server_packets" lineno="15699">
8181 +<interface name="corenet_sendrecv_cluster_server_packets" lineno="16243">
8182 <summary>
8183 Send and receive cluster_server packets.
8184 </summary>
8185 @@ -19961,7 +20040,7 @@ Domain allowed access.
8186 </param>
8187 <infoflow type="both" weight="10"/>
8188 </interface>
8189 -<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="15715">
8190 +<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="16259">
8191 <summary>
8192 Do not audit attempts to send and receive cluster_server packets.
8193 </summary>
8194 @@ -19972,7 +20051,7 @@ Domain to not audit.
8195 </param>
8196 <infoflow type="none"/>
8197 </interface>
8198 -<interface name="corenet_relabelto_cluster_server_packets" lineno="15730">
8199 +<interface name="corenet_relabelto_cluster_server_packets" lineno="16274">
8200 <summary>
8201 Relabel packets to cluster_server the packet type.
8202 </summary>
8203 @@ -19982,7 +20061,7 @@ Domain allowed access.
8204 </summary>
8205 </param>
8206 </interface>
8207 -<interface name="corenet_tcp_sendrecv_cma_port" lineno="15752">
8208 +<interface name="corenet_tcp_sendrecv_cma_port" lineno="16296">
8209 <summary>
8210 Send and receive TCP traffic on the cma port.
8211 </summary>
8212 @@ -19993,7 +20072,7 @@ Domain allowed access.
8213 </param>
8214 <infoflow type="both" weight="10"/>
8215 </interface>
8216 -<interface name="corenet_udp_send_cma_port" lineno="15767">
8217 +<interface name="corenet_udp_send_cma_port" lineno="16311">
8218 <summary>
8219 Send UDP traffic on the cma port.
8220 </summary>
8221 @@ -20004,7 +20083,7 @@ Domain allowed access.
8222 </param>
8223 <infoflow type="write" weight="10"/>
8224 </interface>
8225 -<interface name="corenet_dontaudit_udp_send_cma_port" lineno="15782">
8226 +<interface name="corenet_dontaudit_udp_send_cma_port" lineno="16326">
8227 <summary>
8228 Do not audit attempts to send UDP traffic on the cma port.
8229 </summary>
8230 @@ -20015,7 +20094,7 @@ Domain to not audit.
8231 </param>
8232 <infoflow type="none"/>
8233 </interface>
8234 -<interface name="corenet_udp_receive_cma_port" lineno="15797">
8235 +<interface name="corenet_udp_receive_cma_port" lineno="16341">
8236 <summary>
8237 Receive UDP traffic on the cma port.
8238 </summary>
8239 @@ -20026,7 +20105,7 @@ Domain allowed access.
8240 </param>
8241 <infoflow type="read" weight="10"/>
8242 </interface>
8243 -<interface name="corenet_dontaudit_udp_receive_cma_port" lineno="15812">
8244 +<interface name="corenet_dontaudit_udp_receive_cma_port" lineno="16356">
8245 <summary>
8246 Do not audit attempts to receive UDP traffic on the cma port.
8247 </summary>
8248 @@ -20037,7 +20116,7 @@ Domain to not audit.
8249 </param>
8250 <infoflow type="none"/>
8251 </interface>
8252 -<interface name="corenet_udp_sendrecv_cma_port" lineno="15827">
8253 +<interface name="corenet_udp_sendrecv_cma_port" lineno="16371">
8254 <summary>
8255 Send and receive UDP traffic on the cma port.
8256 </summary>
8257 @@ -20048,7 +20127,7 @@ Domain allowed access.
8258 </param>
8259 <infoflow type="both" weight="10"/>
8260 </interface>
8261 -<interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="15843">
8262 +<interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="16387">
8263 <summary>
8264 Do not audit attempts to send and receive
8265 UDP traffic on the cma port.
8266 @@ -20060,7 +20139,7 @@ Domain to not audit.
8267 </param>
8268 <infoflow type="none"/>
8269 </interface>
8270 -<interface name="corenet_tcp_bind_cma_port" lineno="15858">
8271 +<interface name="corenet_tcp_bind_cma_port" lineno="16402">
8272 <summary>
8273 Bind TCP sockets to the cma port.
8274 </summary>
8275 @@ -20071,7 +20150,7 @@ Domain allowed access.
8276 </param>
8277 <infoflow type="none"/>
8278 </interface>
8279 -<interface name="corenet_udp_bind_cma_port" lineno="15878">
8280 +<interface name="corenet_udp_bind_cma_port" lineno="16422">
8281 <summary>
8282 Bind UDP sockets to the cma port.
8283 </summary>
8284 @@ -20082,7 +20161,7 @@ Domain allowed access.
8285 </param>
8286 <infoflow type="none"/>
8287 </interface>
8288 -<interface name="corenet_tcp_connect_cma_port" lineno="15897">
8289 +<interface name="corenet_tcp_connect_cma_port" lineno="16441">
8290 <summary>
8291 Make a TCP connection to the cma port.
8292 </summary>
8293 @@ -20092,7 +20171,7 @@ Domain allowed access.
8294 </summary>
8295 </param>
8296 </interface>
8297 -<interface name="corenet_send_cma_client_packets" lineno="15917">
8298 +<interface name="corenet_send_cma_client_packets" lineno="16461">
8299 <summary>
8300 Send cma_client packets.
8301 </summary>
8302 @@ -20103,7 +20182,7 @@ Domain allowed access.
8303 </param>
8304 <infoflow type="write" weight="10"/>
8305 </interface>
8306 -<interface name="corenet_dontaudit_send_cma_client_packets" lineno="15936">
8307 +<interface name="corenet_dontaudit_send_cma_client_packets" lineno="16480">
8308 <summary>
8309 Do not audit attempts to send cma_client packets.
8310 </summary>
8311 @@ -20114,7 +20193,7 @@ Domain to not audit.
8312 </param>
8313 <infoflow type="none"/>
8314 </interface>
8315 -<interface name="corenet_receive_cma_client_packets" lineno="15955">
8316 +<interface name="corenet_receive_cma_client_packets" lineno="16499">
8317 <summary>
8318 Receive cma_client packets.
8319 </summary>
8320 @@ -20125,7 +20204,7 @@ Domain allowed access.
8321 </param>
8322 <infoflow type="read" weight="10"/>
8323 </interface>
8324 -<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="15974">
8325 +<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="16518">
8326 <summary>
8327 Do not audit attempts to receive cma_client packets.
8328 </summary>
8329 @@ -20136,7 +20215,7 @@ Domain allowed access.
8330 </param>
8331 <infoflow type="none"/>
8332 </interface>
8333 -<interface name="corenet_sendrecv_cma_client_packets" lineno="15993">
8334 +<interface name="corenet_sendrecv_cma_client_packets" lineno="16537">
8335 <summary>
8336 Send and receive cma_client packets.
8337 </summary>
8338 @@ -20147,7 +20226,7 @@ Domain allowed access.
8339 </param>
8340 <infoflow type="both" weight="10"/>
8341 </interface>
8342 -<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="16009">
8343 +<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="16553">
8344 <summary>
8345 Do not audit attempts to send and receive cma_client packets.
8346 </summary>
8347 @@ -20158,7 +20237,7 @@ Domain to not audit.
8348 </param>
8349 <infoflow type="none"/>
8350 </interface>
8351 -<interface name="corenet_relabelto_cma_client_packets" lineno="16024">
8352 +<interface name="corenet_relabelto_cma_client_packets" lineno="16568">
8353 <summary>
8354 Relabel packets to cma_client the packet type.
8355 </summary>
8356 @@ -20168,7 +20247,7 @@ Domain allowed access.
8357 </summary>
8358 </param>
8359 </interface>
8360 -<interface name="corenet_send_cma_server_packets" lineno="16044">
8361 +<interface name="corenet_send_cma_server_packets" lineno="16588">
8362 <summary>
8363 Send cma_server packets.
8364 </summary>
8365 @@ -20179,7 +20258,7 @@ Domain allowed access.
8366 </param>
8367 <infoflow type="write" weight="10"/>
8368 </interface>
8369 -<interface name="corenet_dontaudit_send_cma_server_packets" lineno="16063">
8370 +<interface name="corenet_dontaudit_send_cma_server_packets" lineno="16607">
8371 <summary>
8372 Do not audit attempts to send cma_server packets.
8373 </summary>
8374 @@ -20190,7 +20269,7 @@ Domain to not audit.
8375 </param>
8376 <infoflow type="none"/>
8377 </interface>
8378 -<interface name="corenet_receive_cma_server_packets" lineno="16082">
8379 +<interface name="corenet_receive_cma_server_packets" lineno="16626">
8380 <summary>
8381 Receive cma_server packets.
8382 </summary>
8383 @@ -20201,7 +20280,7 @@ Domain allowed access.
8384 </param>
8385 <infoflow type="read" weight="10"/>
8386 </interface>
8387 -<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="16101">
8388 +<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="16645">
8389 <summary>
8390 Do not audit attempts to receive cma_server packets.
8391 </summary>
8392 @@ -20212,7 +20291,7 @@ Domain allowed access.
8393 </param>
8394 <infoflow type="none"/>
8395 </interface>
8396 -<interface name="corenet_sendrecv_cma_server_packets" lineno="16120">
8397 +<interface name="corenet_sendrecv_cma_server_packets" lineno="16664">
8398 <summary>
8399 Send and receive cma_server packets.
8400 </summary>
8401 @@ -20223,7 +20302,7 @@ Domain allowed access.
8402 </param>
8403 <infoflow type="both" weight="10"/>
8404 </interface>
8405 -<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="16136">
8406 +<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="16680">
8407 <summary>
8408 Do not audit attempts to send and receive cma_server packets.
8409 </summary>
8410 @@ -20234,7 +20313,7 @@ Domain to not audit.
8411 </param>
8412 <infoflow type="none"/>
8413 </interface>
8414 -<interface name="corenet_relabelto_cma_server_packets" lineno="16151">
8415 +<interface name="corenet_relabelto_cma_server_packets" lineno="16695">
8416 <summary>
8417 Relabel packets to cma_server the packet type.
8418 </summary>
8419 @@ -20244,7 +20323,7 @@ Domain allowed access.
8420 </summary>
8421 </param>
8422 </interface>
8423 -<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="16173">
8424 +<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="16717">
8425 <summary>
8426 Send and receive TCP traffic on the cobbler port.
8427 </summary>
8428 @@ -20255,7 +20334,7 @@ Domain allowed access.
8429 </param>
8430 <infoflow type="both" weight="10"/>
8431 </interface>
8432 -<interface name="corenet_udp_send_cobbler_port" lineno="16188">
8433 +<interface name="corenet_udp_send_cobbler_port" lineno="16732">
8434 <summary>
8435 Send UDP traffic on the cobbler port.
8436 </summary>
8437 @@ -20266,7 +20345,7 @@ Domain allowed access.
8438 </param>
8439 <infoflow type="write" weight="10"/>
8440 </interface>
8441 -<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="16203">
8442 +<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="16747">
8443 <summary>
8444 Do not audit attempts to send UDP traffic on the cobbler port.
8445 </summary>
8446 @@ -20277,7 +20356,7 @@ Domain to not audit.
8447 </param>
8448 <infoflow type="none"/>
8449 </interface>
8450 -<interface name="corenet_udp_receive_cobbler_port" lineno="16218">
8451 +<interface name="corenet_udp_receive_cobbler_port" lineno="16762">
8452 <summary>
8453 Receive UDP traffic on the cobbler port.
8454 </summary>
8455 @@ -20288,7 +20367,7 @@ Domain allowed access.
8456 </param>
8457 <infoflow type="read" weight="10"/>
8458 </interface>
8459 -<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="16233">
8460 +<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="16777">
8461 <summary>
8462 Do not audit attempts to receive UDP traffic on the cobbler port.
8463 </summary>
8464 @@ -20299,7 +20378,7 @@ Domain to not audit.
8465 </param>
8466 <infoflow type="none"/>
8467 </interface>
8468 -<interface name="corenet_udp_sendrecv_cobbler_port" lineno="16248">
8469 +<interface name="corenet_udp_sendrecv_cobbler_port" lineno="16792">
8470 <summary>
8471 Send and receive UDP traffic on the cobbler port.
8472 </summary>
8473 @@ -20310,7 +20389,7 @@ Domain allowed access.
8474 </param>
8475 <infoflow type="both" weight="10"/>
8476 </interface>
8477 -<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="16264">
8478 +<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="16808">
8479 <summary>
8480 Do not audit attempts to send and receive
8481 UDP traffic on the cobbler port.
8482 @@ -20322,7 +20401,7 @@ Domain to not audit.
8483 </param>
8484 <infoflow type="none"/>
8485 </interface>
8486 -<interface name="corenet_tcp_bind_cobbler_port" lineno="16279">
8487 +<interface name="corenet_tcp_bind_cobbler_port" lineno="16823">
8488 <summary>
8489 Bind TCP sockets to the cobbler port.
8490 </summary>
8491 @@ -20333,7 +20412,7 @@ Domain allowed access.
8492 </param>
8493 <infoflow type="none"/>
8494 </interface>
8495 -<interface name="corenet_udp_bind_cobbler_port" lineno="16299">
8496 +<interface name="corenet_udp_bind_cobbler_port" lineno="16843">
8497 <summary>
8498 Bind UDP sockets to the cobbler port.
8499 </summary>
8500 @@ -20344,7 +20423,7 @@ Domain allowed access.
8501 </param>
8502 <infoflow type="none"/>
8503 </interface>
8504 -<interface name="corenet_tcp_connect_cobbler_port" lineno="16318">
8505 +<interface name="corenet_tcp_connect_cobbler_port" lineno="16862">
8506 <summary>
8507 Make a TCP connection to the cobbler port.
8508 </summary>
8509 @@ -20354,7 +20433,7 @@ Domain allowed access.
8510 </summary>
8511 </param>
8512 </interface>
8513 -<interface name="corenet_send_cobbler_client_packets" lineno="16338">
8514 +<interface name="corenet_send_cobbler_client_packets" lineno="16882">
8515 <summary>
8516 Send cobbler_client packets.
8517 </summary>
8518 @@ -20365,7 +20444,7 @@ Domain allowed access.
8519 </param>
8520 <infoflow type="write" weight="10"/>
8521 </interface>
8522 -<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="16357">
8523 +<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="16901">
8524 <summary>
8525 Do not audit attempts to send cobbler_client packets.
8526 </summary>
8527 @@ -20376,7 +20455,7 @@ Domain to not audit.
8528 </param>
8529 <infoflow type="none"/>
8530 </interface>
8531 -<interface name="corenet_receive_cobbler_client_packets" lineno="16376">
8532 +<interface name="corenet_receive_cobbler_client_packets" lineno="16920">
8533 <summary>
8534 Receive cobbler_client packets.
8535 </summary>
8536 @@ -20387,7 +20466,7 @@ Domain allowed access.
8537 </param>
8538 <infoflow type="read" weight="10"/>
8539 </interface>
8540 -<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="16395">
8541 +<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="16939">
8542 <summary>
8543 Do not audit attempts to receive cobbler_client packets.
8544 </summary>
8545 @@ -20398,7 +20477,7 @@ Domain allowed access.
8546 </param>
8547 <infoflow type="none"/>
8548 </interface>
8549 -<interface name="corenet_sendrecv_cobbler_client_packets" lineno="16414">
8550 +<interface name="corenet_sendrecv_cobbler_client_packets" lineno="16958">
8551 <summary>
8552 Send and receive cobbler_client packets.
8553 </summary>
8554 @@ -20409,7 +20488,7 @@ Domain allowed access.
8555 </param>
8556 <infoflow type="both" weight="10"/>
8557 </interface>
8558 -<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="16430">
8559 +<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="16974">
8560 <summary>
8561 Do not audit attempts to send and receive cobbler_client packets.
8562 </summary>
8563 @@ -20420,7 +20499,7 @@ Domain to not audit.
8564 </param>
8565 <infoflow type="none"/>
8566 </interface>
8567 -<interface name="corenet_relabelto_cobbler_client_packets" lineno="16445">
8568 +<interface name="corenet_relabelto_cobbler_client_packets" lineno="16989">
8569 <summary>
8570 Relabel packets to cobbler_client the packet type.
8571 </summary>
8572 @@ -20430,7 +20509,7 @@ Domain allowed access.
8573 </summary>
8574 </param>
8575 </interface>
8576 -<interface name="corenet_send_cobbler_server_packets" lineno="16465">
8577 +<interface name="corenet_send_cobbler_server_packets" lineno="17009">
8578 <summary>
8579 Send cobbler_server packets.
8580 </summary>
8581 @@ -20441,7 +20520,7 @@ Domain allowed access.
8582 </param>
8583 <infoflow type="write" weight="10"/>
8584 </interface>
8585 -<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="16484">
8586 +<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="17028">
8587 <summary>
8588 Do not audit attempts to send cobbler_server packets.
8589 </summary>
8590 @@ -20452,7 +20531,7 @@ Domain to not audit.
8591 </param>
8592 <infoflow type="none"/>
8593 </interface>
8594 -<interface name="corenet_receive_cobbler_server_packets" lineno="16503">
8595 +<interface name="corenet_receive_cobbler_server_packets" lineno="17047">
8596 <summary>
8597 Receive cobbler_server packets.
8598 </summary>
8599 @@ -20463,7 +20542,7 @@ Domain allowed access.
8600 </param>
8601 <infoflow type="read" weight="10"/>
8602 </interface>
8603 -<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="16522">
8604 +<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="17066">
8605 <summary>
8606 Do not audit attempts to receive cobbler_server packets.
8607 </summary>
8608 @@ -20474,7 +20553,7 @@ Domain allowed access.
8609 </param>
8610 <infoflow type="none"/>
8611 </interface>
8612 -<interface name="corenet_sendrecv_cobbler_server_packets" lineno="16541">
8613 +<interface name="corenet_sendrecv_cobbler_server_packets" lineno="17085">
8614 <summary>
8615 Send and receive cobbler_server packets.
8616 </summary>
8617 @@ -20485,7 +20564,7 @@ Domain allowed access.
8618 </param>
8619 <infoflow type="both" weight="10"/>
8620 </interface>
8621 -<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="16557">
8622 +<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="17101">
8623 <summary>
8624 Do not audit attempts to send and receive cobbler_server packets.
8625 </summary>
8626 @@ -20496,7 +20575,7 @@ Domain to not audit.
8627 </param>
8628 <infoflow type="none"/>
8629 </interface>
8630 -<interface name="corenet_relabelto_cobbler_server_packets" lineno="16572">
8631 +<interface name="corenet_relabelto_cobbler_server_packets" lineno="17116">
8632 <summary>
8633 Relabel packets to cobbler_server the packet type.
8634 </summary>
8635 @@ -20506,7 +20585,7 @@ Domain allowed access.
8636 </summary>
8637 </param>
8638 </interface>
8639 -<interface name="corenet_tcp_sendrecv_commplex_link_port" lineno="16594">
8640 +<interface name="corenet_tcp_sendrecv_commplex_link_port" lineno="17138">
8641 <summary>
8642 Send and receive TCP traffic on the commplex_link port.
8643 </summary>
8644 @@ -20517,7 +20596,7 @@ Domain allowed access.
8645 </param>
8646 <infoflow type="both" weight="10"/>
8647 </interface>
8648 -<interface name="corenet_udp_send_commplex_link_port" lineno="16609">
8649 +<interface name="corenet_udp_send_commplex_link_port" lineno="17153">
8650 <summary>
8651 Send UDP traffic on the commplex_link port.
8652 </summary>
8653 @@ -20528,7 +20607,7 @@ Domain allowed access.
8654 </param>
8655 <infoflow type="write" weight="10"/>
8656 </interface>
8657 -<interface name="corenet_dontaudit_udp_send_commplex_link_port" lineno="16624">
8658 +<interface name="corenet_dontaudit_udp_send_commplex_link_port" lineno="17168">
8659 <summary>
8660 Do not audit attempts to send UDP traffic on the commplex_link port.
8661 </summary>
8662 @@ -20539,7 +20618,7 @@ Domain to not audit.
8663 </param>
8664 <infoflow type="none"/>
8665 </interface>
8666 -<interface name="corenet_udp_receive_commplex_link_port" lineno="16639">
8667 +<interface name="corenet_udp_receive_commplex_link_port" lineno="17183">
8668 <summary>
8669 Receive UDP traffic on the commplex_link port.
8670 </summary>
8671 @@ -20550,7 +20629,7 @@ Domain allowed access.
8672 </param>
8673 <infoflow type="read" weight="10"/>
8674 </interface>
8675 -<interface name="corenet_dontaudit_udp_receive_commplex_link_port" lineno="16654">
8676 +<interface name="corenet_dontaudit_udp_receive_commplex_link_port" lineno="17198">
8677 <summary>
8678 Do not audit attempts to receive UDP traffic on the commplex_link port.
8679 </summary>
8680 @@ -20561,7 +20640,7 @@ Domain to not audit.
8681 </param>
8682 <infoflow type="none"/>
8683 </interface>
8684 -<interface name="corenet_udp_sendrecv_commplex_link_port" lineno="16669">
8685 +<interface name="corenet_udp_sendrecv_commplex_link_port" lineno="17213">
8686 <summary>
8687 Send and receive UDP traffic on the commplex_link port.
8688 </summary>
8689 @@ -20572,7 +20651,7 @@ Domain allowed access.
8690 </param>
8691 <infoflow type="both" weight="10"/>
8692 </interface>
8693 -<interface name="corenet_dontaudit_udp_sendrecv_commplex_link_port" lineno="16685">
8694 +<interface name="corenet_dontaudit_udp_sendrecv_commplex_link_port" lineno="17229">
8695 <summary>
8696 Do not audit attempts to send and receive
8697 UDP traffic on the commplex_link port.
8698 @@ -20584,7 +20663,7 @@ Domain to not audit.
8699 </param>
8700 <infoflow type="none"/>
8701 </interface>
8702 -<interface name="corenet_tcp_bind_commplex_link_port" lineno="16700">
8703 +<interface name="corenet_tcp_bind_commplex_link_port" lineno="17244">
8704 <summary>
8705 Bind TCP sockets to the commplex_link port.
8706 </summary>
8707 @@ -20595,7 +20674,7 @@ Domain allowed access.
8708 </param>
8709 <infoflow type="none"/>
8710 </interface>
8711 -<interface name="corenet_udp_bind_commplex_link_port" lineno="16720">
8712 +<interface name="corenet_udp_bind_commplex_link_port" lineno="17264">
8713 <summary>
8714 Bind UDP sockets to the commplex_link port.
8715 </summary>
8716 @@ -20606,7 +20685,7 @@ Domain allowed access.
8717 </param>
8718 <infoflow type="none"/>
8719 </interface>
8720 -<interface name="corenet_tcp_connect_commplex_link_port" lineno="16739">
8721 +<interface name="corenet_tcp_connect_commplex_link_port" lineno="17283">
8722 <summary>
8723 Make a TCP connection to the commplex_link port.
8724 </summary>
8725 @@ -20616,7 +20695,7 @@ Domain allowed access.
8726 </summary>
8727 </param>
8728 </interface>
8729 -<interface name="corenet_send_commplex_link_client_packets" lineno="16759">
8730 +<interface name="corenet_send_commplex_link_client_packets" lineno="17303">
8731 <summary>
8732 Send commplex_link_client packets.
8733 </summary>
8734 @@ -20627,7 +20706,7 @@ Domain allowed access.
8735 </param>
8736 <infoflow type="write" weight="10"/>
8737 </interface>
8738 -<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="16778">
8739 +<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="17322">
8740 <summary>
8741 Do not audit attempts to send commplex_link_client packets.
8742 </summary>
8743 @@ -20638,7 +20717,7 @@ Domain to not audit.
8744 </param>
8745 <infoflow type="none"/>
8746 </interface>
8747 -<interface name="corenet_receive_commplex_link_client_packets" lineno="16797">
8748 +<interface name="corenet_receive_commplex_link_client_packets" lineno="17341">
8749 <summary>
8750 Receive commplex_link_client packets.
8751 </summary>
8752 @@ -20649,7 +20728,7 @@ Domain allowed access.
8753 </param>
8754 <infoflow type="read" weight="10"/>
8755 </interface>
8756 -<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="16816">
8757 +<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="17360">
8758 <summary>
8759 Do not audit attempts to receive commplex_link_client packets.
8760 </summary>
8761 @@ -20660,7 +20739,7 @@ Domain allowed access.
8762 </param>
8763 <infoflow type="none"/>
8764 </interface>
8765 -<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="16835">
8766 +<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="17379">
8767 <summary>
8768 Send and receive commplex_link_client packets.
8769 </summary>
8770 @@ -20671,7 +20750,7 @@ Domain allowed access.
8771 </param>
8772 <infoflow type="both" weight="10"/>
8773 </interface>
8774 -<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="16851">
8775 +<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="17395">
8776 <summary>
8777 Do not audit attempts to send and receive commplex_link_client packets.
8778 </summary>
8779 @@ -20682,7 +20761,7 @@ Domain to not audit.
8780 </param>
8781 <infoflow type="none"/>
8782 </interface>
8783 -<interface name="corenet_relabelto_commplex_link_client_packets" lineno="16866">
8784 +<interface name="corenet_relabelto_commplex_link_client_packets" lineno="17410">
8785 <summary>
8786 Relabel packets to commplex_link_client the packet type.
8787 </summary>
8788 @@ -20692,7 +20771,7 @@ Domain allowed access.
8789 </summary>
8790 </param>
8791 </interface>
8792 -<interface name="corenet_send_commplex_link_server_packets" lineno="16886">
8793 +<interface name="corenet_send_commplex_link_server_packets" lineno="17430">
8794 <summary>
8795 Send commplex_link_server packets.
8796 </summary>
8797 @@ -20703,7 +20782,7 @@ Domain allowed access.
8798 </param>
8799 <infoflow type="write" weight="10"/>
8800 </interface>
8801 -<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="16905">
8802 +<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="17449">
8803 <summary>
8804 Do not audit attempts to send commplex_link_server packets.
8805 </summary>
8806 @@ -20714,7 +20793,7 @@ Domain to not audit.
8807 </param>
8808 <infoflow type="none"/>
8809 </interface>
8810 -<interface name="corenet_receive_commplex_link_server_packets" lineno="16924">
8811 +<interface name="corenet_receive_commplex_link_server_packets" lineno="17468">
8812 <summary>
8813 Receive commplex_link_server packets.
8814 </summary>
8815 @@ -20725,7 +20804,7 @@ Domain allowed access.
8816 </param>
8817 <infoflow type="read" weight="10"/>
8818 </interface>
8819 -<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="16943">
8820 +<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="17487">
8821 <summary>
8822 Do not audit attempts to receive commplex_link_server packets.
8823 </summary>
8824 @@ -20736,7 +20815,7 @@ Domain allowed access.
8825 </param>
8826 <infoflow type="none"/>
8827 </interface>
8828 -<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="16962">
8829 +<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="17506">
8830 <summary>
8831 Send and receive commplex_link_server packets.
8832 </summary>
8833 @@ -20747,7 +20826,7 @@ Domain allowed access.
8834 </param>
8835 <infoflow type="both" weight="10"/>
8836 </interface>
8837 -<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="16978">
8838 +<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="17522">
8839 <summary>
8840 Do not audit attempts to send and receive commplex_link_server packets.
8841 </summary>
8842 @@ -20758,7 +20837,7 @@ Domain to not audit.
8843 </param>
8844 <infoflow type="none"/>
8845 </interface>
8846 -<interface name="corenet_relabelto_commplex_link_server_packets" lineno="16993">
8847 +<interface name="corenet_relabelto_commplex_link_server_packets" lineno="17537">
8848 <summary>
8849 Relabel packets to commplex_link_server the packet type.
8850 </summary>
8851 @@ -20768,7 +20847,7 @@ Domain allowed access.
8852 </summary>
8853 </param>
8854 </interface>
8855 -<interface name="corenet_tcp_sendrecv_commplex_main_port" lineno="17015">
8856 +<interface name="corenet_tcp_sendrecv_commplex_main_port" lineno="17559">
8857 <summary>
8858 Send and receive TCP traffic on the commplex_main port.
8859 </summary>
8860 @@ -20779,7 +20858,7 @@ Domain allowed access.
8861 </param>
8862 <infoflow type="both" weight="10"/>
8863 </interface>
8864 -<interface name="corenet_udp_send_commplex_main_port" lineno="17030">
8865 +<interface name="corenet_udp_send_commplex_main_port" lineno="17574">
8866 <summary>
8867 Send UDP traffic on the commplex_main port.
8868 </summary>
8869 @@ -20790,7 +20869,7 @@ Domain allowed access.
8870 </param>
8871 <infoflow type="write" weight="10"/>
8872 </interface>
8873 -<interface name="corenet_dontaudit_udp_send_commplex_main_port" lineno="17045">
8874 +<interface name="corenet_dontaudit_udp_send_commplex_main_port" lineno="17589">
8875 <summary>
8876 Do not audit attempts to send UDP traffic on the commplex_main port.
8877 </summary>
8878 @@ -20801,7 +20880,7 @@ Domain to not audit.
8879 </param>
8880 <infoflow type="none"/>
8881 </interface>
8882 -<interface name="corenet_udp_receive_commplex_main_port" lineno="17060">
8883 +<interface name="corenet_udp_receive_commplex_main_port" lineno="17604">
8884 <summary>
8885 Receive UDP traffic on the commplex_main port.
8886 </summary>
8887 @@ -20812,7 +20891,7 @@ Domain allowed access.
8888 </param>
8889 <infoflow type="read" weight="10"/>
8890 </interface>
8891 -<interface name="corenet_dontaudit_udp_receive_commplex_main_port" lineno="17075">
8892 +<interface name="corenet_dontaudit_udp_receive_commplex_main_port" lineno="17619">
8893 <summary>
8894 Do not audit attempts to receive UDP traffic on the commplex_main port.
8895 </summary>
8896 @@ -20823,7 +20902,7 @@ Domain to not audit.
8897 </param>
8898 <infoflow type="none"/>
8899 </interface>
8900 -<interface name="corenet_udp_sendrecv_commplex_main_port" lineno="17090">
8901 +<interface name="corenet_udp_sendrecv_commplex_main_port" lineno="17634">
8902 <summary>
8903 Send and receive UDP traffic on the commplex_main port.
8904 </summary>
8905 @@ -20834,7 +20913,7 @@ Domain allowed access.
8906 </param>
8907 <infoflow type="both" weight="10"/>
8908 </interface>
8909 -<interface name="corenet_dontaudit_udp_sendrecv_commplex_main_port" lineno="17106">
8910 +<interface name="corenet_dontaudit_udp_sendrecv_commplex_main_port" lineno="17650">
8911 <summary>
8912 Do not audit attempts to send and receive
8913 UDP traffic on the commplex_main port.
8914 @@ -20846,7 +20925,7 @@ Domain to not audit.
8915 </param>
8916 <infoflow type="none"/>
8917 </interface>
8918 -<interface name="corenet_tcp_bind_commplex_main_port" lineno="17121">
8919 +<interface name="corenet_tcp_bind_commplex_main_port" lineno="17665">
8920 <summary>
8921 Bind TCP sockets to the commplex_main port.
8922 </summary>
8923 @@ -20857,7 +20936,7 @@ Domain allowed access.
8924 </param>
8925 <infoflow type="none"/>
8926 </interface>
8927 -<interface name="corenet_udp_bind_commplex_main_port" lineno="17141">
8928 +<interface name="corenet_udp_bind_commplex_main_port" lineno="17685">
8929 <summary>
8930 Bind UDP sockets to the commplex_main port.
8931 </summary>
8932 @@ -20868,7 +20947,7 @@ Domain allowed access.
8933 </param>
8934 <infoflow type="none"/>
8935 </interface>
8936 -<interface name="corenet_tcp_connect_commplex_main_port" lineno="17160">
8937 +<interface name="corenet_tcp_connect_commplex_main_port" lineno="17704">
8938 <summary>
8939 Make a TCP connection to the commplex_main port.
8940 </summary>
8941 @@ -20878,7 +20957,7 @@ Domain allowed access.
8942 </summary>
8943 </param>
8944 </interface>
8945 -<interface name="corenet_send_commplex_main_client_packets" lineno="17180">
8946 +<interface name="corenet_send_commplex_main_client_packets" lineno="17724">
8947 <summary>
8948 Send commplex_main_client packets.
8949 </summary>
8950 @@ -20889,7 +20968,7 @@ Domain allowed access.
8951 </param>
8952 <infoflow type="write" weight="10"/>
8953 </interface>
8954 -<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="17199">
8955 +<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="17743">
8956 <summary>
8957 Do not audit attempts to send commplex_main_client packets.
8958 </summary>
8959 @@ -20900,7 +20979,7 @@ Domain to not audit.
8960 </param>
8961 <infoflow type="none"/>
8962 </interface>
8963 -<interface name="corenet_receive_commplex_main_client_packets" lineno="17218">
8964 +<interface name="corenet_receive_commplex_main_client_packets" lineno="17762">
8965 <summary>
8966 Receive commplex_main_client packets.
8967 </summary>
8968 @@ -20911,7 +20990,7 @@ Domain allowed access.
8969 </param>
8970 <infoflow type="read" weight="10"/>
8971 </interface>
8972 -<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="17237">
8973 +<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="17781">
8974 <summary>
8975 Do not audit attempts to receive commplex_main_client packets.
8976 </summary>
8977 @@ -20922,7 +21001,7 @@ Domain allowed access.
8978 </param>
8979 <infoflow type="none"/>
8980 </interface>
8981 -<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="17256">
8982 +<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="17800">
8983 <summary>
8984 Send and receive commplex_main_client packets.
8985 </summary>
8986 @@ -20933,7 +21012,7 @@ Domain allowed access.
8987 </param>
8988 <infoflow type="both" weight="10"/>
8989 </interface>
8990 -<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="17272">
8991 +<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="17816">
8992 <summary>
8993 Do not audit attempts to send and receive commplex_main_client packets.
8994 </summary>
8995 @@ -20944,7 +21023,7 @@ Domain to not audit.
8996 </param>
8997 <infoflow type="none"/>
8998 </interface>
8999 -<interface name="corenet_relabelto_commplex_main_client_packets" lineno="17287">
9000 +<interface name="corenet_relabelto_commplex_main_client_packets" lineno="17831">
9001 <summary>
9002 Relabel packets to commplex_main_client the packet type.
9003 </summary>
9004 @@ -20954,7 +21033,7 @@ Domain allowed access.
9005 </summary>
9006 </param>
9007 </interface>
9008 -<interface name="corenet_send_commplex_main_server_packets" lineno="17307">
9009 +<interface name="corenet_send_commplex_main_server_packets" lineno="17851">
9010 <summary>
9011 Send commplex_main_server packets.
9012 </summary>
9013 @@ -20965,7 +21044,7 @@ Domain allowed access.
9014 </param>
9015 <infoflow type="write" weight="10"/>
9016 </interface>
9017 -<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="17326">
9018 +<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="17870">
9019 <summary>
9020 Do not audit attempts to send commplex_main_server packets.
9021 </summary>
9022 @@ -20976,7 +21055,7 @@ Domain to not audit.
9023 </param>
9024 <infoflow type="none"/>
9025 </interface>
9026 -<interface name="corenet_receive_commplex_main_server_packets" lineno="17345">
9027 +<interface name="corenet_receive_commplex_main_server_packets" lineno="17889">
9028 <summary>
9029 Receive commplex_main_server packets.
9030 </summary>
9031 @@ -20987,7 +21066,7 @@ Domain allowed access.
9032 </param>
9033 <infoflow type="read" weight="10"/>
9034 </interface>
9035 -<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="17364">
9036 +<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="17908">
9037 <summary>
9038 Do not audit attempts to receive commplex_main_server packets.
9039 </summary>
9040 @@ -20998,7 +21077,7 @@ Domain allowed access.
9041 </param>
9042 <infoflow type="none"/>
9043 </interface>
9044 -<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="17383">
9045 +<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="17927">
9046 <summary>
9047 Send and receive commplex_main_server packets.
9048 </summary>
9049 @@ -21009,7 +21088,7 @@ Domain allowed access.
9050 </param>
9051 <infoflow type="both" weight="10"/>
9052 </interface>
9053 -<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="17399">
9054 +<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="17943">
9055 <summary>
9056 Do not audit attempts to send and receive commplex_main_server packets.
9057 </summary>
9058 @@ -21020,7 +21099,7 @@ Domain to not audit.
9059 </param>
9060 <infoflow type="none"/>
9061 </interface>
9062 -<interface name="corenet_relabelto_commplex_main_server_packets" lineno="17414">
9063 +<interface name="corenet_relabelto_commplex_main_server_packets" lineno="17958">
9064 <summary>
9065 Relabel packets to commplex_main_server the packet type.
9066 </summary>
9067 @@ -21030,7 +21109,7 @@ Domain allowed access.
9068 </summary>
9069 </param>
9070 </interface>
9071 -<interface name="corenet_tcp_sendrecv_comsat_port" lineno="17436">
9072 +<interface name="corenet_tcp_sendrecv_comsat_port" lineno="17980">
9073 <summary>
9074 Send and receive TCP traffic on the comsat port.
9075 </summary>
9076 @@ -21041,7 +21120,7 @@ Domain allowed access.
9077 </param>
9078 <infoflow type="both" weight="10"/>
9079 </interface>
9080 -<interface name="corenet_udp_send_comsat_port" lineno="17451">
9081 +<interface name="corenet_udp_send_comsat_port" lineno="17995">
9082 <summary>
9083 Send UDP traffic on the comsat port.
9084 </summary>
9085 @@ -21052,7 +21131,7 @@ Domain allowed access.
9086 </param>
9087 <infoflow type="write" weight="10"/>
9088 </interface>
9089 -<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="17466">
9090 +<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="18010">
9091 <summary>
9092 Do not audit attempts to send UDP traffic on the comsat port.
9093 </summary>
9094 @@ -21063,7 +21142,7 @@ Domain to not audit.
9095 </param>
9096 <infoflow type="none"/>
9097 </interface>
9098 -<interface name="corenet_udp_receive_comsat_port" lineno="17481">
9099 +<interface name="corenet_udp_receive_comsat_port" lineno="18025">
9100 <summary>
9101 Receive UDP traffic on the comsat port.
9102 </summary>
9103 @@ -21074,7 +21153,7 @@ Domain allowed access.
9104 </param>
9105 <infoflow type="read" weight="10"/>
9106 </interface>
9107 -<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="17496">
9108 +<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="18040">
9109 <summary>
9110 Do not audit attempts to receive UDP traffic on the comsat port.
9111 </summary>
9112 @@ -21085,7 +21164,7 @@ Domain to not audit.
9113 </param>
9114 <infoflow type="none"/>
9115 </interface>
9116 -<interface name="corenet_udp_sendrecv_comsat_port" lineno="17511">
9117 +<interface name="corenet_udp_sendrecv_comsat_port" lineno="18055">
9118 <summary>
9119 Send and receive UDP traffic on the comsat port.
9120 </summary>
9121 @@ -21096,7 +21175,7 @@ Domain allowed access.
9122 </param>
9123 <infoflow type="both" weight="10"/>
9124 </interface>
9125 -<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="17527">
9126 +<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="18071">
9127 <summary>
9128 Do not audit attempts to send and receive
9129 UDP traffic on the comsat port.
9130 @@ -21108,7 +21187,7 @@ Domain to not audit.
9131 </param>
9132 <infoflow type="none"/>
9133 </interface>
9134 -<interface name="corenet_tcp_bind_comsat_port" lineno="17542">
9135 +<interface name="corenet_tcp_bind_comsat_port" lineno="18086">
9136 <summary>
9137 Bind TCP sockets to the comsat port.
9138 </summary>
9139 @@ -21119,7 +21198,7 @@ Domain allowed access.
9140 </param>
9141 <infoflow type="none"/>
9142 </interface>
9143 -<interface name="corenet_udp_bind_comsat_port" lineno="17562">
9144 +<interface name="corenet_udp_bind_comsat_port" lineno="18106">
9145 <summary>
9146 Bind UDP sockets to the comsat port.
9147 </summary>
9148 @@ -21130,7 +21209,7 @@ Domain allowed access.
9149 </param>
9150 <infoflow type="none"/>
9151 </interface>
9152 -<interface name="corenet_tcp_connect_comsat_port" lineno="17581">
9153 +<interface name="corenet_tcp_connect_comsat_port" lineno="18125">
9154 <summary>
9155 Make a TCP connection to the comsat port.
9156 </summary>
9157 @@ -21140,7 +21219,7 @@ Domain allowed access.
9158 </summary>
9159 </param>
9160 </interface>
9161 -<interface name="corenet_send_comsat_client_packets" lineno="17601">
9162 +<interface name="corenet_send_comsat_client_packets" lineno="18145">
9163 <summary>
9164 Send comsat_client packets.
9165 </summary>
9166 @@ -21151,7 +21230,7 @@ Domain allowed access.
9167 </param>
9168 <infoflow type="write" weight="10"/>
9169 </interface>
9170 -<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="17620">
9171 +<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="18164">
9172 <summary>
9173 Do not audit attempts to send comsat_client packets.
9174 </summary>
9175 @@ -21162,7 +21241,7 @@ Domain to not audit.
9176 </param>
9177 <infoflow type="none"/>
9178 </interface>
9179 -<interface name="corenet_receive_comsat_client_packets" lineno="17639">
9180 +<interface name="corenet_receive_comsat_client_packets" lineno="18183">
9181 <summary>
9182 Receive comsat_client packets.
9183 </summary>
9184 @@ -21173,7 +21252,7 @@ Domain allowed access.
9185 </param>
9186 <infoflow type="read" weight="10"/>
9187 </interface>
9188 -<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="17658">
9189 +<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="18202">
9190 <summary>
9191 Do not audit attempts to receive comsat_client packets.
9192 </summary>
9193 @@ -21184,7 +21263,7 @@ Domain allowed access.
9194 </param>
9195 <infoflow type="none"/>
9196 </interface>
9197 -<interface name="corenet_sendrecv_comsat_client_packets" lineno="17677">
9198 +<interface name="corenet_sendrecv_comsat_client_packets" lineno="18221">
9199 <summary>
9200 Send and receive comsat_client packets.
9201 </summary>
9202 @@ -21195,7 +21274,7 @@ Domain allowed access.
9203 </param>
9204 <infoflow type="both" weight="10"/>
9205 </interface>
9206 -<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="17693">
9207 +<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="18237">
9208 <summary>
9209 Do not audit attempts to send and receive comsat_client packets.
9210 </summary>
9211 @@ -21206,7 +21285,7 @@ Domain to not audit.
9212 </param>
9213 <infoflow type="none"/>
9214 </interface>
9215 -<interface name="corenet_relabelto_comsat_client_packets" lineno="17708">
9216 +<interface name="corenet_relabelto_comsat_client_packets" lineno="18252">
9217 <summary>
9218 Relabel packets to comsat_client the packet type.
9219 </summary>
9220 @@ -21216,7 +21295,7 @@ Domain allowed access.
9221 </summary>
9222 </param>
9223 </interface>
9224 -<interface name="corenet_send_comsat_server_packets" lineno="17728">
9225 +<interface name="corenet_send_comsat_server_packets" lineno="18272">
9226 <summary>
9227 Send comsat_server packets.
9228 </summary>
9229 @@ -21227,7 +21306,7 @@ Domain allowed access.
9230 </param>
9231 <infoflow type="write" weight="10"/>
9232 </interface>
9233 -<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="17747">
9234 +<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="18291">
9235 <summary>
9236 Do not audit attempts to send comsat_server packets.
9237 </summary>
9238 @@ -21238,7 +21317,7 @@ Domain to not audit.
9239 </param>
9240 <infoflow type="none"/>
9241 </interface>
9242 -<interface name="corenet_receive_comsat_server_packets" lineno="17766">
9243 +<interface name="corenet_receive_comsat_server_packets" lineno="18310">
9244 <summary>
9245 Receive comsat_server packets.
9246 </summary>
9247 @@ -21249,7 +21328,7 @@ Domain allowed access.
9248 </param>
9249 <infoflow type="read" weight="10"/>
9250 </interface>
9251 -<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="17785">
9252 +<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="18329">
9253 <summary>
9254 Do not audit attempts to receive comsat_server packets.
9255 </summary>
9256 @@ -21260,7 +21339,7 @@ Domain allowed access.
9257 </param>
9258 <infoflow type="none"/>
9259 </interface>
9260 -<interface name="corenet_sendrecv_comsat_server_packets" lineno="17804">
9261 +<interface name="corenet_sendrecv_comsat_server_packets" lineno="18348">
9262 <summary>
9263 Send and receive comsat_server packets.
9264 </summary>
9265 @@ -21271,7 +21350,7 @@ Domain allowed access.
9266 </param>
9267 <infoflow type="both" weight="10"/>
9268 </interface>
9269 -<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="17820">
9270 +<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="18364">
9271 <summary>
9272 Do not audit attempts to send and receive comsat_server packets.
9273 </summary>
9274 @@ -21282,7 +21361,7 @@ Domain to not audit.
9275 </param>
9276 <infoflow type="none"/>
9277 </interface>
9278 -<interface name="corenet_relabelto_comsat_server_packets" lineno="17835">
9279 +<interface name="corenet_relabelto_comsat_server_packets" lineno="18379">
9280 <summary>
9281 Relabel packets to comsat_server the packet type.
9282 </summary>
9283 @@ -21292,7 +21371,7 @@ Domain allowed access.
9284 </summary>
9285 </param>
9286 </interface>
9287 -<interface name="corenet_tcp_sendrecv_condor_port" lineno="17857">
9288 +<interface name="corenet_tcp_sendrecv_condor_port" lineno="18401">
9289 <summary>
9290 Send and receive TCP traffic on the condor port.
9291 </summary>
9292 @@ -21303,7 +21382,7 @@ Domain allowed access.
9293 </param>
9294 <infoflow type="both" weight="10"/>
9295 </interface>
9296 -<interface name="corenet_udp_send_condor_port" lineno="17872">
9297 +<interface name="corenet_udp_send_condor_port" lineno="18416">
9298 <summary>
9299 Send UDP traffic on the condor port.
9300 </summary>
9301 @@ -21314,7 +21393,7 @@ Domain allowed access.
9302 </param>
9303 <infoflow type="write" weight="10"/>
9304 </interface>
9305 -<interface name="corenet_dontaudit_udp_send_condor_port" lineno="17887">
9306 +<interface name="corenet_dontaudit_udp_send_condor_port" lineno="18431">
9307 <summary>
9308 Do not audit attempts to send UDP traffic on the condor port.
9309 </summary>
9310 @@ -21325,7 +21404,7 @@ Domain to not audit.
9311 </param>
9312 <infoflow type="none"/>
9313 </interface>
9314 -<interface name="corenet_udp_receive_condor_port" lineno="17902">
9315 +<interface name="corenet_udp_receive_condor_port" lineno="18446">
9316 <summary>
9317 Receive UDP traffic on the condor port.
9318 </summary>
9319 @@ -21336,7 +21415,7 @@ Domain allowed access.
9320 </param>
9321 <infoflow type="read" weight="10"/>
9322 </interface>
9323 -<interface name="corenet_dontaudit_udp_receive_condor_port" lineno="17917">
9324 +<interface name="corenet_dontaudit_udp_receive_condor_port" lineno="18461">
9325 <summary>
9326 Do not audit attempts to receive UDP traffic on the condor port.
9327 </summary>
9328 @@ -21347,7 +21426,7 @@ Domain to not audit.
9329 </param>
9330 <infoflow type="none"/>
9331 </interface>
9332 -<interface name="corenet_udp_sendrecv_condor_port" lineno="17932">
9333 +<interface name="corenet_udp_sendrecv_condor_port" lineno="18476">
9334 <summary>
9335 Send and receive UDP traffic on the condor port.
9336 </summary>
9337 @@ -21358,7 +21437,7 @@ Domain allowed access.
9338 </param>
9339 <infoflow type="both" weight="10"/>
9340 </interface>
9341 -<interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="17948">
9342 +<interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="18492">
9343 <summary>
9344 Do not audit attempts to send and receive
9345 UDP traffic on the condor port.
9346 @@ -21370,7 +21449,7 @@ Domain to not audit.
9347 </param>
9348 <infoflow type="none"/>
9349 </interface>
9350 -<interface name="corenet_tcp_bind_condor_port" lineno="17963">
9351 +<interface name="corenet_tcp_bind_condor_port" lineno="18507">
9352 <summary>
9353 Bind TCP sockets to the condor port.
9354 </summary>
9355 @@ -21381,7 +21460,7 @@ Domain allowed access.
9356 </param>
9357 <infoflow type="none"/>
9358 </interface>
9359 -<interface name="corenet_udp_bind_condor_port" lineno="17983">
9360 +<interface name="corenet_udp_bind_condor_port" lineno="18527">
9361 <summary>
9362 Bind UDP sockets to the condor port.
9363 </summary>
9364 @@ -21392,7 +21471,7 @@ Domain allowed access.
9365 </param>
9366 <infoflow type="none"/>
9367 </interface>
9368 -<interface name="corenet_tcp_connect_condor_port" lineno="18002">
9369 +<interface name="corenet_tcp_connect_condor_port" lineno="18546">
9370 <summary>
9371 Make a TCP connection to the condor port.
9372 </summary>
9373 @@ -21402,7 +21481,7 @@ Domain allowed access.
9374 </summary>
9375 </param>
9376 </interface>
9377 -<interface name="corenet_send_condor_client_packets" lineno="18022">
9378 +<interface name="corenet_send_condor_client_packets" lineno="18566">
9379 <summary>
9380 Send condor_client packets.
9381 </summary>
9382 @@ -21413,7 +21492,7 @@ Domain allowed access.
9383 </param>
9384 <infoflow type="write" weight="10"/>
9385 </interface>
9386 -<interface name="corenet_dontaudit_send_condor_client_packets" lineno="18041">
9387 +<interface name="corenet_dontaudit_send_condor_client_packets" lineno="18585">
9388 <summary>
9389 Do not audit attempts to send condor_client packets.
9390 </summary>
9391 @@ -21424,7 +21503,7 @@ Domain to not audit.
9392 </param>
9393 <infoflow type="none"/>
9394 </interface>
9395 -<interface name="corenet_receive_condor_client_packets" lineno="18060">
9396 +<interface name="corenet_receive_condor_client_packets" lineno="18604">
9397 <summary>
9398 Receive condor_client packets.
9399 </summary>
9400 @@ -21435,7 +21514,7 @@ Domain allowed access.
9401 </param>
9402 <infoflow type="read" weight="10"/>
9403 </interface>
9404 -<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="18079">
9405 +<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="18623">
9406 <summary>
9407 Do not audit attempts to receive condor_client packets.
9408 </summary>
9409 @@ -21446,7 +21525,7 @@ Domain allowed access.
9410 </param>
9411 <infoflow type="none"/>
9412 </interface>
9413 -<interface name="corenet_sendrecv_condor_client_packets" lineno="18098">
9414 +<interface name="corenet_sendrecv_condor_client_packets" lineno="18642">
9415 <summary>
9416 Send and receive condor_client packets.
9417 </summary>
9418 @@ -21457,7 +21536,7 @@ Domain allowed access.
9419 </param>
9420 <infoflow type="both" weight="10"/>
9421 </interface>
9422 -<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="18114">
9423 +<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="18658">
9424 <summary>
9425 Do not audit attempts to send and receive condor_client packets.
9426 </summary>
9427 @@ -21468,7 +21547,7 @@ Domain to not audit.
9428 </param>
9429 <infoflow type="none"/>
9430 </interface>
9431 -<interface name="corenet_relabelto_condor_client_packets" lineno="18129">
9432 +<interface name="corenet_relabelto_condor_client_packets" lineno="18673">
9433 <summary>
9434 Relabel packets to condor_client the packet type.
9435 </summary>
9436 @@ -21478,7 +21557,7 @@ Domain allowed access.
9437 </summary>
9438 </param>
9439 </interface>
9440 -<interface name="corenet_send_condor_server_packets" lineno="18149">
9441 +<interface name="corenet_send_condor_server_packets" lineno="18693">
9442 <summary>
9443 Send condor_server packets.
9444 </summary>
9445 @@ -21489,7 +21568,7 @@ Domain allowed access.
9446 </param>
9447 <infoflow type="write" weight="10"/>
9448 </interface>
9449 -<interface name="corenet_dontaudit_send_condor_server_packets" lineno="18168">
9450 +<interface name="corenet_dontaudit_send_condor_server_packets" lineno="18712">
9451 <summary>
9452 Do not audit attempts to send condor_server packets.
9453 </summary>
9454 @@ -21500,7 +21579,7 @@ Domain to not audit.
9455 </param>
9456 <infoflow type="none"/>
9457 </interface>
9458 -<interface name="corenet_receive_condor_server_packets" lineno="18187">
9459 +<interface name="corenet_receive_condor_server_packets" lineno="18731">
9460 <summary>
9461 Receive condor_server packets.
9462 </summary>
9463 @@ -21511,7 +21590,7 @@ Domain allowed access.
9464 </param>
9465 <infoflow type="read" weight="10"/>
9466 </interface>
9467 -<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="18206">
9468 +<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="18750">
9469 <summary>
9470 Do not audit attempts to receive condor_server packets.
9471 </summary>
9472 @@ -21522,7 +21601,7 @@ Domain allowed access.
9473 </param>
9474 <infoflow type="none"/>
9475 </interface>
9476 -<interface name="corenet_sendrecv_condor_server_packets" lineno="18225">
9477 +<interface name="corenet_sendrecv_condor_server_packets" lineno="18769">
9478 <summary>
9479 Send and receive condor_server packets.
9480 </summary>
9481 @@ -21533,7 +21612,7 @@ Domain allowed access.
9482 </param>
9483 <infoflow type="both" weight="10"/>
9484 </interface>
9485 -<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="18241">
9486 +<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="18785">
9487 <summary>
9488 Do not audit attempts to send and receive condor_server packets.
9489 </summary>
9490 @@ -21544,7 +21623,7 @@ Domain to not audit.
9491 </param>
9492 <infoflow type="none"/>
9493 </interface>
9494 -<interface name="corenet_relabelto_condor_server_packets" lineno="18256">
9495 +<interface name="corenet_relabelto_condor_server_packets" lineno="18800">
9496 <summary>
9497 Relabel packets to condor_server the packet type.
9498 </summary>
9499 @@ -21554,7 +21633,7 @@ Domain allowed access.
9500 </summary>
9501 </param>
9502 </interface>
9503 -<interface name="corenet_tcp_sendrecv_couchdb_port" lineno="18278">
9504 +<interface name="corenet_tcp_sendrecv_couchdb_port" lineno="18822">
9505 <summary>
9506 Send and receive TCP traffic on the couchdb port.
9507 </summary>
9508 @@ -21565,7 +21644,7 @@ Domain allowed access.
9509 </param>
9510 <infoflow type="both" weight="10"/>
9511 </interface>
9512 -<interface name="corenet_udp_send_couchdb_port" lineno="18293">
9513 +<interface name="corenet_udp_send_couchdb_port" lineno="18837">
9514 <summary>
9515 Send UDP traffic on the couchdb port.
9516 </summary>
9517 @@ -21576,7 +21655,7 @@ Domain allowed access.
9518 </param>
9519 <infoflow type="write" weight="10"/>
9520 </interface>
9521 -<interface name="corenet_dontaudit_udp_send_couchdb_port" lineno="18308">
9522 +<interface name="corenet_dontaudit_udp_send_couchdb_port" lineno="18852">
9523 <summary>
9524 Do not audit attempts to send UDP traffic on the couchdb port.
9525 </summary>
9526 @@ -21587,7 +21666,7 @@ Domain to not audit.
9527 </param>
9528 <infoflow type="none"/>
9529 </interface>
9530 -<interface name="corenet_udp_receive_couchdb_port" lineno="18323">
9531 +<interface name="corenet_udp_receive_couchdb_port" lineno="18867">
9532 <summary>
9533 Receive UDP traffic on the couchdb port.
9534 </summary>
9535 @@ -21598,7 +21677,7 @@ Domain allowed access.
9536 </param>
9537 <infoflow type="read" weight="10"/>
9538 </interface>
9539 -<interface name="corenet_dontaudit_udp_receive_couchdb_port" lineno="18338">
9540 +<interface name="corenet_dontaudit_udp_receive_couchdb_port" lineno="18882">
9541 <summary>
9542 Do not audit attempts to receive UDP traffic on the couchdb port.
9543 </summary>
9544 @@ -21609,7 +21688,7 @@ Domain to not audit.
9545 </param>
9546 <infoflow type="none"/>
9547 </interface>
9548 -<interface name="corenet_udp_sendrecv_couchdb_port" lineno="18353">
9549 +<interface name="corenet_udp_sendrecv_couchdb_port" lineno="18897">
9550 <summary>
9551 Send and receive UDP traffic on the couchdb port.
9552 </summary>
9553 @@ -21620,7 +21699,7 @@ Domain allowed access.
9554 </param>
9555 <infoflow type="both" weight="10"/>
9556 </interface>
9557 -<interface name="corenet_dontaudit_udp_sendrecv_couchdb_port" lineno="18369">
9558 +<interface name="corenet_dontaudit_udp_sendrecv_couchdb_port" lineno="18913">
9559 <summary>
9560 Do not audit attempts to send and receive
9561 UDP traffic on the couchdb port.
9562 @@ -21632,7 +21711,7 @@ Domain to not audit.
9563 </param>
9564 <infoflow type="none"/>
9565 </interface>
9566 -<interface name="corenet_tcp_bind_couchdb_port" lineno="18384">
9567 +<interface name="corenet_tcp_bind_couchdb_port" lineno="18928">
9568 <summary>
9569 Bind TCP sockets to the couchdb port.
9570 </summary>
9571 @@ -21643,7 +21722,7 @@ Domain allowed access.
9572 </param>
9573 <infoflow type="none"/>
9574 </interface>
9575 -<interface name="corenet_udp_bind_couchdb_port" lineno="18404">
9576 +<interface name="corenet_udp_bind_couchdb_port" lineno="18948">
9577 <summary>
9578 Bind UDP sockets to the couchdb port.
9579 </summary>
9580 @@ -21654,7 +21733,7 @@ Domain allowed access.
9581 </param>
9582 <infoflow type="none"/>
9583 </interface>
9584 -<interface name="corenet_tcp_connect_couchdb_port" lineno="18423">
9585 +<interface name="corenet_tcp_connect_couchdb_port" lineno="18967">
9586 <summary>
9587 Make a TCP connection to the couchdb port.
9588 </summary>
9589 @@ -21664,7 +21743,7 @@ Domain allowed access.
9590 </summary>
9591 </param>
9592 </interface>
9593 -<interface name="corenet_send_couchdb_client_packets" lineno="18443">
9594 +<interface name="corenet_send_couchdb_client_packets" lineno="18987">
9595 <summary>
9596 Send couchdb_client packets.
9597 </summary>
9598 @@ -21675,7 +21754,7 @@ Domain allowed access.
9599 </param>
9600 <infoflow type="write" weight="10"/>
9601 </interface>
9602 -<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="18462">
9603 +<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="19006">
9604 <summary>
9605 Do not audit attempts to send couchdb_client packets.
9606 </summary>
9607 @@ -21686,7 +21765,7 @@ Domain to not audit.
9608 </param>
9609 <infoflow type="none"/>
9610 </interface>
9611 -<interface name="corenet_receive_couchdb_client_packets" lineno="18481">
9612 +<interface name="corenet_receive_couchdb_client_packets" lineno="19025">
9613 <summary>
9614 Receive couchdb_client packets.
9615 </summary>
9616 @@ -21697,7 +21776,7 @@ Domain allowed access.
9617 </param>
9618 <infoflow type="read" weight="10"/>
9619 </interface>
9620 -<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="18500">
9621 +<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="19044">
9622 <summary>
9623 Do not audit attempts to receive couchdb_client packets.
9624 </summary>
9625 @@ -21708,7 +21787,7 @@ Domain allowed access.
9626 </param>
9627 <infoflow type="none"/>
9628 </interface>
9629 -<interface name="corenet_sendrecv_couchdb_client_packets" lineno="18519">
9630 +<interface name="corenet_sendrecv_couchdb_client_packets" lineno="19063">
9631 <summary>
9632 Send and receive couchdb_client packets.
9633 </summary>
9634 @@ -21719,7 +21798,7 @@ Domain allowed access.
9635 </param>
9636 <infoflow type="both" weight="10"/>
9637 </interface>
9638 -<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="18535">
9639 +<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="19079">
9640 <summary>
9641 Do not audit attempts to send and receive couchdb_client packets.
9642 </summary>
9643 @@ -21730,7 +21809,7 @@ Domain to not audit.
9644 </param>
9645 <infoflow type="none"/>
9646 </interface>
9647 -<interface name="corenet_relabelto_couchdb_client_packets" lineno="18550">
9648 +<interface name="corenet_relabelto_couchdb_client_packets" lineno="19094">
9649 <summary>
9650 Relabel packets to couchdb_client the packet type.
9651 </summary>
9652 @@ -21740,7 +21819,7 @@ Domain allowed access.
9653 </summary>
9654 </param>
9655 </interface>
9656 -<interface name="corenet_send_couchdb_server_packets" lineno="18570">
9657 +<interface name="corenet_send_couchdb_server_packets" lineno="19114">
9658 <summary>
9659 Send couchdb_server packets.
9660 </summary>
9661 @@ -21751,7 +21830,7 @@ Domain allowed access.
9662 </param>
9663 <infoflow type="write" weight="10"/>
9664 </interface>
9665 -<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="18589">
9666 +<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="19133">
9667 <summary>
9668 Do not audit attempts to send couchdb_server packets.
9669 </summary>
9670 @@ -21762,7 +21841,7 @@ Domain to not audit.
9671 </param>
9672 <infoflow type="none"/>
9673 </interface>
9674 -<interface name="corenet_receive_couchdb_server_packets" lineno="18608">
9675 +<interface name="corenet_receive_couchdb_server_packets" lineno="19152">
9676 <summary>
9677 Receive couchdb_server packets.
9678 </summary>
9679 @@ -21773,7 +21852,7 @@ Domain allowed access.
9680 </param>
9681 <infoflow type="read" weight="10"/>
9682 </interface>
9683 -<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="18627">
9684 +<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="19171">
9685 <summary>
9686 Do not audit attempts to receive couchdb_server packets.
9687 </summary>
9688 @@ -21784,7 +21863,7 @@ Domain allowed access.
9689 </param>
9690 <infoflow type="none"/>
9691 </interface>
9692 -<interface name="corenet_sendrecv_couchdb_server_packets" lineno="18646">
9693 +<interface name="corenet_sendrecv_couchdb_server_packets" lineno="19190">
9694 <summary>
9695 Send and receive couchdb_server packets.
9696 </summary>
9697 @@ -21795,7 +21874,7 @@ Domain allowed access.
9698 </param>
9699 <infoflow type="both" weight="10"/>
9700 </interface>
9701 -<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="18662">
9702 +<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="19206">
9703 <summary>
9704 Do not audit attempts to send and receive couchdb_server packets.
9705 </summary>
9706 @@ -21806,7 +21885,7 @@ Domain to not audit.
9707 </param>
9708 <infoflow type="none"/>
9709 </interface>
9710 -<interface name="corenet_relabelto_couchdb_server_packets" lineno="18677">
9711 +<interface name="corenet_relabelto_couchdb_server_packets" lineno="19221">
9712 <summary>
9713 Relabel packets to couchdb_server the packet type.
9714 </summary>
9715 @@ -21816,7 +21895,7 @@ Domain allowed access.
9716 </summary>
9717 </param>
9718 </interface>
9719 -<interface name="corenet_tcp_sendrecv_cslistener_port" lineno="18699">
9720 +<interface name="corenet_tcp_sendrecv_cslistener_port" lineno="19243">
9721 <summary>
9722 Send and receive TCP traffic on the cslistener port.
9723 </summary>
9724 @@ -21827,7 +21906,7 @@ Domain allowed access.
9725 </param>
9726 <infoflow type="both" weight="10"/>
9727 </interface>
9728 -<interface name="corenet_udp_send_cslistener_port" lineno="18714">
9729 +<interface name="corenet_udp_send_cslistener_port" lineno="19258">
9730 <summary>
9731 Send UDP traffic on the cslistener port.
9732 </summary>
9733 @@ -21838,7 +21917,7 @@ Domain allowed access.
9734 </param>
9735 <infoflow type="write" weight="10"/>
9736 </interface>
9737 -<interface name="corenet_dontaudit_udp_send_cslistener_port" lineno="18729">
9738 +<interface name="corenet_dontaudit_udp_send_cslistener_port" lineno="19273">
9739 <summary>
9740 Do not audit attempts to send UDP traffic on the cslistener port.
9741 </summary>
9742 @@ -21849,7 +21928,7 @@ Domain to not audit.
9743 </param>
9744 <infoflow type="none"/>
9745 </interface>
9746 -<interface name="corenet_udp_receive_cslistener_port" lineno="18744">
9747 +<interface name="corenet_udp_receive_cslistener_port" lineno="19288">
9748 <summary>
9749 Receive UDP traffic on the cslistener port.
9750 </summary>
9751 @@ -21860,7 +21939,7 @@ Domain allowed access.
9752 </param>
9753 <infoflow type="read" weight="10"/>
9754 </interface>
9755 -<interface name="corenet_dontaudit_udp_receive_cslistener_port" lineno="18759">
9756 +<interface name="corenet_dontaudit_udp_receive_cslistener_port" lineno="19303">
9757 <summary>
9758 Do not audit attempts to receive UDP traffic on the cslistener port.
9759 </summary>
9760 @@ -21871,7 +21950,7 @@ Domain to not audit.
9761 </param>
9762 <infoflow type="none"/>
9763 </interface>
9764 -<interface name="corenet_udp_sendrecv_cslistener_port" lineno="18774">
9765 +<interface name="corenet_udp_sendrecv_cslistener_port" lineno="19318">
9766 <summary>
9767 Send and receive UDP traffic on the cslistener port.
9768 </summary>
9769 @@ -21882,7 +21961,7 @@ Domain allowed access.
9770 </param>
9771 <infoflow type="both" weight="10"/>
9772 </interface>
9773 -<interface name="corenet_dontaudit_udp_sendrecv_cslistener_port" lineno="18790">
9774 +<interface name="corenet_dontaudit_udp_sendrecv_cslistener_port" lineno="19334">
9775 <summary>
9776 Do not audit attempts to send and receive
9777 UDP traffic on the cslistener port.
9778 @@ -21894,7 +21973,7 @@ Domain to not audit.
9779 </param>
9780 <infoflow type="none"/>
9781 </interface>
9782 -<interface name="corenet_tcp_bind_cslistener_port" lineno="18805">
9783 +<interface name="corenet_tcp_bind_cslistener_port" lineno="19349">
9784 <summary>
9785 Bind TCP sockets to the cslistener port.
9786 </summary>
9787 @@ -21905,7 +21984,7 @@ Domain allowed access.
9788 </param>
9789 <infoflow type="none"/>
9790 </interface>
9791 -<interface name="corenet_udp_bind_cslistener_port" lineno="18825">
9792 +<interface name="corenet_udp_bind_cslistener_port" lineno="19369">
9793 <summary>
9794 Bind UDP sockets to the cslistener port.
9795 </summary>
9796 @@ -21916,7 +21995,7 @@ Domain allowed access.
9797 </param>
9798 <infoflow type="none"/>
9799 </interface>
9800 -<interface name="corenet_tcp_connect_cslistener_port" lineno="18844">
9801 +<interface name="corenet_tcp_connect_cslistener_port" lineno="19388">
9802 <summary>
9803 Make a TCP connection to the cslistener port.
9804 </summary>
9805 @@ -21926,7 +22005,7 @@ Domain allowed access.
9806 </summary>
9807 </param>
9808 </interface>
9809 -<interface name="corenet_send_cslistener_client_packets" lineno="18864">
9810 +<interface name="corenet_send_cslistener_client_packets" lineno="19408">
9811 <summary>
9812 Send cslistener_client packets.
9813 </summary>
9814 @@ -21937,7 +22016,7 @@ Domain allowed access.
9815 </param>
9816 <infoflow type="write" weight="10"/>
9817 </interface>
9818 -<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="18883">
9819 +<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="19427">
9820 <summary>
9821 Do not audit attempts to send cslistener_client packets.
9822 </summary>
9823 @@ -21948,7 +22027,7 @@ Domain to not audit.
9824 </param>
9825 <infoflow type="none"/>
9826 </interface>
9827 -<interface name="corenet_receive_cslistener_client_packets" lineno="18902">
9828 +<interface name="corenet_receive_cslistener_client_packets" lineno="19446">
9829 <summary>
9830 Receive cslistener_client packets.
9831 </summary>
9832 @@ -21959,7 +22038,7 @@ Domain allowed access.
9833 </param>
9834 <infoflow type="read" weight="10"/>
9835 </interface>
9836 -<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="18921">
9837 +<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="19465">
9838 <summary>
9839 Do not audit attempts to receive cslistener_client packets.
9840 </summary>
9841 @@ -21970,7 +22049,7 @@ Domain allowed access.
9842 </param>
9843 <infoflow type="none"/>
9844 </interface>
9845 -<interface name="corenet_sendrecv_cslistener_client_packets" lineno="18940">
9846 +<interface name="corenet_sendrecv_cslistener_client_packets" lineno="19484">
9847 <summary>
9848 Send and receive cslistener_client packets.
9849 </summary>
9850 @@ -21981,7 +22060,7 @@ Domain allowed access.
9851 </param>
9852 <infoflow type="both" weight="10"/>
9853 </interface>
9854 -<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="18956">
9855 +<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="19500">
9856 <summary>
9857 Do not audit attempts to send and receive cslistener_client packets.
9858 </summary>
9859 @@ -21992,7 +22071,7 @@ Domain to not audit.
9860 </param>
9861 <infoflow type="none"/>
9862 </interface>
9863 -<interface name="corenet_relabelto_cslistener_client_packets" lineno="18971">
9864 +<interface name="corenet_relabelto_cslistener_client_packets" lineno="19515">
9865 <summary>
9866 Relabel packets to cslistener_client the packet type.
9867 </summary>
9868 @@ -22002,7 +22081,7 @@ Domain allowed access.
9869 </summary>
9870 </param>
9871 </interface>
9872 -<interface name="corenet_send_cslistener_server_packets" lineno="18991">
9873 +<interface name="corenet_send_cslistener_server_packets" lineno="19535">
9874 <summary>
9875 Send cslistener_server packets.
9876 </summary>
9877 @@ -22013,7 +22092,7 @@ Domain allowed access.
9878 </param>
9879 <infoflow type="write" weight="10"/>
9880 </interface>
9881 -<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="19010">
9882 +<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="19554">
9883 <summary>
9884 Do not audit attempts to send cslistener_server packets.
9885 </summary>
9886 @@ -22024,7 +22103,7 @@ Domain to not audit.
9887 </param>
9888 <infoflow type="none"/>
9889 </interface>
9890 -<interface name="corenet_receive_cslistener_server_packets" lineno="19029">
9891 +<interface name="corenet_receive_cslistener_server_packets" lineno="19573">
9892 <summary>
9893 Receive cslistener_server packets.
9894 </summary>
9895 @@ -22035,7 +22114,7 @@ Domain allowed access.
9896 </param>
9897 <infoflow type="read" weight="10"/>
9898 </interface>
9899 -<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="19048">
9900 +<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="19592">
9901 <summary>
9902 Do not audit attempts to receive cslistener_server packets.
9903 </summary>
9904 @@ -22046,7 +22125,7 @@ Domain allowed access.
9905 </param>
9906 <infoflow type="none"/>
9907 </interface>
9908 -<interface name="corenet_sendrecv_cslistener_server_packets" lineno="19067">
9909 +<interface name="corenet_sendrecv_cslistener_server_packets" lineno="19611">
9910 <summary>
9911 Send and receive cslistener_server packets.
9912 </summary>
9913 @@ -22057,7 +22136,7 @@ Domain allowed access.
9914 </param>
9915 <infoflow type="both" weight="10"/>
9916 </interface>
9917 -<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="19083">
9918 +<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="19627">
9919 <summary>
9920 Do not audit attempts to send and receive cslistener_server packets.
9921 </summary>
9922 @@ -22068,7 +22147,7 @@ Domain to not audit.
9923 </param>
9924 <infoflow type="none"/>
9925 </interface>
9926 -<interface name="corenet_relabelto_cslistener_server_packets" lineno="19098">
9927 +<interface name="corenet_relabelto_cslistener_server_packets" lineno="19642">
9928 <summary>
9929 Relabel packets to cslistener_server the packet type.
9930 </summary>
9931 @@ -22078,7 +22157,7 @@ Domain allowed access.
9932 </summary>
9933 </param>
9934 </interface>
9935 -<interface name="corenet_tcp_sendrecv_ctdb_port" lineno="19120">
9936 +<interface name="corenet_tcp_sendrecv_ctdb_port" lineno="19664">
9937 <summary>
9938 Send and receive TCP traffic on the ctdb port.
9939 </summary>
9940 @@ -22089,7 +22168,7 @@ Domain allowed access.
9941 </param>
9942 <infoflow type="both" weight="10"/>
9943 </interface>
9944 -<interface name="corenet_udp_send_ctdb_port" lineno="19135">
9945 +<interface name="corenet_udp_send_ctdb_port" lineno="19679">
9946 <summary>
9947 Send UDP traffic on the ctdb port.
9948 </summary>
9949 @@ -22100,7 +22179,7 @@ Domain allowed access.
9950 </param>
9951 <infoflow type="write" weight="10"/>
9952 </interface>
9953 -<interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="19150">
9954 +<interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="19694">
9955 <summary>
9956 Do not audit attempts to send UDP traffic on the ctdb port.
9957 </summary>
9958 @@ -22111,7 +22190,7 @@ Domain to not audit.
9959 </param>
9960 <infoflow type="none"/>
9961 </interface>
9962 -<interface name="corenet_udp_receive_ctdb_port" lineno="19165">
9963 +<interface name="corenet_udp_receive_ctdb_port" lineno="19709">
9964 <summary>
9965 Receive UDP traffic on the ctdb port.
9966 </summary>
9967 @@ -22122,7 +22201,7 @@ Domain allowed access.
9968 </param>
9969 <infoflow type="read" weight="10"/>
9970 </interface>
9971 -<interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="19180">
9972 +<interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="19724">
9973 <summary>
9974 Do not audit attempts to receive UDP traffic on the ctdb port.
9975 </summary>
9976 @@ -22133,7 +22212,7 @@ Domain to not audit.
9977 </param>
9978 <infoflow type="none"/>
9979 </interface>
9980 -<interface name="corenet_udp_sendrecv_ctdb_port" lineno="19195">
9981 +<interface name="corenet_udp_sendrecv_ctdb_port" lineno="19739">
9982 <summary>
9983 Send and receive UDP traffic on the ctdb port.
9984 </summary>
9985 @@ -22144,7 +22223,7 @@ Domain allowed access.
9986 </param>
9987 <infoflow type="both" weight="10"/>
9988 </interface>
9989 -<interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="19211">
9990 +<interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="19755">
9991 <summary>
9992 Do not audit attempts to send and receive
9993 UDP traffic on the ctdb port.
9994 @@ -22156,7 +22235,7 @@ Domain to not audit.
9995 </param>
9996 <infoflow type="none"/>
9997 </interface>
9998 -<interface name="corenet_tcp_bind_ctdb_port" lineno="19226">
9999 +<interface name="corenet_tcp_bind_ctdb_port" lineno="19770">
10000 <summary>
10001 Bind TCP sockets to the ctdb port.
10002 </summary>
10003 @@ -22167,7 +22246,7 @@ Domain allowed access.
10004 </param>
10005 <infoflow type="none"/>
10006 </interface>
10007 -<interface name="corenet_udp_bind_ctdb_port" lineno="19246">
10008 +<interface name="corenet_udp_bind_ctdb_port" lineno="19790">
10009 <summary>
10010 Bind UDP sockets to the ctdb port.
10011 </summary>
10012 @@ -22178,7 +22257,7 @@ Domain allowed access.
10013 </param>
10014 <infoflow type="none"/>
10015 </interface>
10016 -<interface name="corenet_tcp_connect_ctdb_port" lineno="19265">
10017 +<interface name="corenet_tcp_connect_ctdb_port" lineno="19809">
10018 <summary>
10019 Make a TCP connection to the ctdb port.
10020 </summary>
10021 @@ -22188,7 +22267,7 @@ Domain allowed access.
10022 </summary>
10023 </param>
10024 </interface>
10025 -<interface name="corenet_send_ctdb_client_packets" lineno="19285">
10026 +<interface name="corenet_send_ctdb_client_packets" lineno="19829">
10027 <summary>
10028 Send ctdb_client packets.
10029 </summary>
10030 @@ -22199,7 +22278,7 @@ Domain allowed access.
10031 </param>
10032 <infoflow type="write" weight="10"/>
10033 </interface>
10034 -<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="19304">
10035 +<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="19848">
10036 <summary>
10037 Do not audit attempts to send ctdb_client packets.
10038 </summary>
10039 @@ -22210,7 +22289,7 @@ Domain to not audit.
10040 </param>
10041 <infoflow type="none"/>
10042 </interface>
10043 -<interface name="corenet_receive_ctdb_client_packets" lineno="19323">
10044 +<interface name="corenet_receive_ctdb_client_packets" lineno="19867">
10045 <summary>
10046 Receive ctdb_client packets.
10047 </summary>
10048 @@ -22221,7 +22300,7 @@ Domain allowed access.
10049 </param>
10050 <infoflow type="read" weight="10"/>
10051 </interface>
10052 -<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="19342">
10053 +<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="19886">
10054 <summary>
10055 Do not audit attempts to receive ctdb_client packets.
10056 </summary>
10057 @@ -22232,7 +22311,7 @@ Domain allowed access.
10058 </param>
10059 <infoflow type="none"/>
10060 </interface>
10061 -<interface name="corenet_sendrecv_ctdb_client_packets" lineno="19361">
10062 +<interface name="corenet_sendrecv_ctdb_client_packets" lineno="19905">
10063 <summary>
10064 Send and receive ctdb_client packets.
10065 </summary>
10066 @@ -22243,7 +22322,7 @@ Domain allowed access.
10067 </param>
10068 <infoflow type="both" weight="10"/>
10069 </interface>
10070 -<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="19377">
10071 +<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="19921">
10072 <summary>
10073 Do not audit attempts to send and receive ctdb_client packets.
10074 </summary>
10075 @@ -22254,7 +22333,7 @@ Domain to not audit.
10076 </param>
10077 <infoflow type="none"/>
10078 </interface>
10079 -<interface name="corenet_relabelto_ctdb_client_packets" lineno="19392">
10080 +<interface name="corenet_relabelto_ctdb_client_packets" lineno="19936">
10081 <summary>
10082 Relabel packets to ctdb_client the packet type.
10083 </summary>
10084 @@ -22264,7 +22343,7 @@ Domain allowed access.
10085 </summary>
10086 </param>
10087 </interface>
10088 -<interface name="corenet_send_ctdb_server_packets" lineno="19412">
10089 +<interface name="corenet_send_ctdb_server_packets" lineno="19956">
10090 <summary>
10091 Send ctdb_server packets.
10092 </summary>
10093 @@ -22275,7 +22354,7 @@ Domain allowed access.
10094 </param>
10095 <infoflow type="write" weight="10"/>
10096 </interface>
10097 -<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="19431">
10098 +<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="19975">
10099 <summary>
10100 Do not audit attempts to send ctdb_server packets.
10101 </summary>
10102 @@ -22286,7 +22365,7 @@ Domain to not audit.
10103 </param>
10104 <infoflow type="none"/>
10105 </interface>
10106 -<interface name="corenet_receive_ctdb_server_packets" lineno="19450">
10107 +<interface name="corenet_receive_ctdb_server_packets" lineno="19994">
10108 <summary>
10109 Receive ctdb_server packets.
10110 </summary>
10111 @@ -22297,7 +22376,7 @@ Domain allowed access.
10112 </param>
10113 <infoflow type="read" weight="10"/>
10114 </interface>
10115 -<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="19469">
10116 +<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="20013">
10117 <summary>
10118 Do not audit attempts to receive ctdb_server packets.
10119 </summary>
10120 @@ -22308,7 +22387,7 @@ Domain allowed access.
10121 </param>
10122 <infoflow type="none"/>
10123 </interface>
10124 -<interface name="corenet_sendrecv_ctdb_server_packets" lineno="19488">
10125 +<interface name="corenet_sendrecv_ctdb_server_packets" lineno="20032">
10126 <summary>
10127 Send and receive ctdb_server packets.
10128 </summary>
10129 @@ -22319,7 +22398,7 @@ Domain allowed access.
10130 </param>
10131 <infoflow type="both" weight="10"/>
10132 </interface>
10133 -<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="19504">
10134 +<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="20048">
10135 <summary>
10136 Do not audit attempts to send and receive ctdb_server packets.
10137 </summary>
10138 @@ -22330,7 +22409,7 @@ Domain to not audit.
10139 </param>
10140 <infoflow type="none"/>
10141 </interface>
10142 -<interface name="corenet_relabelto_ctdb_server_packets" lineno="19519">
10143 +<interface name="corenet_relabelto_ctdb_server_packets" lineno="20063">
10144 <summary>
10145 Relabel packets to ctdb_server the packet type.
10146 </summary>
10147 @@ -22340,7 +22419,7 @@ Domain allowed access.
10148 </summary>
10149 </param>
10150 </interface>
10151 -<interface name="corenet_tcp_sendrecv_cvs_port" lineno="19541">
10152 +<interface name="corenet_tcp_sendrecv_cvs_port" lineno="20085">
10153 <summary>
10154 Send and receive TCP traffic on the cvs port.
10155 </summary>
10156 @@ -22351,7 +22430,7 @@ Domain allowed access.
10157 </param>
10158 <infoflow type="both" weight="10"/>
10159 </interface>
10160 -<interface name="corenet_udp_send_cvs_port" lineno="19556">
10161 +<interface name="corenet_udp_send_cvs_port" lineno="20100">
10162 <summary>
10163 Send UDP traffic on the cvs port.
10164 </summary>
10165 @@ -22362,7 +22441,7 @@ Domain allowed access.
10166 </param>
10167 <infoflow type="write" weight="10"/>
10168 </interface>
10169 -<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="19571">
10170 +<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="20115">
10171 <summary>
10172 Do not audit attempts to send UDP traffic on the cvs port.
10173 </summary>
10174 @@ -22373,7 +22452,7 @@ Domain to not audit.
10175 </param>
10176 <infoflow type="none"/>
10177 </interface>
10178 -<interface name="corenet_udp_receive_cvs_port" lineno="19586">
10179 +<interface name="corenet_udp_receive_cvs_port" lineno="20130">
10180 <summary>
10181 Receive UDP traffic on the cvs port.
10182 </summary>
10183 @@ -22384,7 +22463,7 @@ Domain allowed access.
10184 </param>
10185 <infoflow type="read" weight="10"/>
10186 </interface>
10187 -<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="19601">
10188 +<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="20145">
10189 <summary>
10190 Do not audit attempts to receive UDP traffic on the cvs port.
10191 </summary>
10192 @@ -22395,7 +22474,7 @@ Domain to not audit.
10193 </param>
10194 <infoflow type="none"/>
10195 </interface>
10196 -<interface name="corenet_udp_sendrecv_cvs_port" lineno="19616">
10197 +<interface name="corenet_udp_sendrecv_cvs_port" lineno="20160">
10198 <summary>
10199 Send and receive UDP traffic on the cvs port.
10200 </summary>
10201 @@ -22406,7 +22485,7 @@ Domain allowed access.
10202 </param>
10203 <infoflow type="both" weight="10"/>
10204 </interface>
10205 -<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="19632">
10206 +<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="20176">
10207 <summary>
10208 Do not audit attempts to send and receive
10209 UDP traffic on the cvs port.
10210 @@ -22418,7 +22497,7 @@ Domain to not audit.
10211 </param>
10212 <infoflow type="none"/>
10213 </interface>
10214 -<interface name="corenet_tcp_bind_cvs_port" lineno="19647">
10215 +<interface name="corenet_tcp_bind_cvs_port" lineno="20191">
10216 <summary>
10217 Bind TCP sockets to the cvs port.
10218 </summary>
10219 @@ -22429,7 +22508,7 @@ Domain allowed access.
10220 </param>
10221 <infoflow type="none"/>
10222 </interface>
10223 -<interface name="corenet_udp_bind_cvs_port" lineno="19667">
10224 +<interface name="corenet_udp_bind_cvs_port" lineno="20211">
10225 <summary>
10226 Bind UDP sockets to the cvs port.
10227 </summary>
10228 @@ -22440,7 +22519,7 @@ Domain allowed access.
10229 </param>
10230 <infoflow type="none"/>
10231 </interface>
10232 -<interface name="corenet_tcp_connect_cvs_port" lineno="19686">
10233 +<interface name="corenet_tcp_connect_cvs_port" lineno="20230">
10234 <summary>
10235 Make a TCP connection to the cvs port.
10236 </summary>
10237 @@ -22450,7 +22529,7 @@ Domain allowed access.
10238 </summary>
10239 </param>
10240 </interface>
10241 -<interface name="corenet_send_cvs_client_packets" lineno="19706">
10242 +<interface name="corenet_send_cvs_client_packets" lineno="20250">
10243 <summary>
10244 Send cvs_client packets.
10245 </summary>
10246 @@ -22461,7 +22540,7 @@ Domain allowed access.
10247 </param>
10248 <infoflow type="write" weight="10"/>
10249 </interface>
10250 -<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="19725">
10251 +<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="20269">
10252 <summary>
10253 Do not audit attempts to send cvs_client packets.
10254 </summary>
10255 @@ -22472,7 +22551,7 @@ Domain to not audit.
10256 </param>
10257 <infoflow type="none"/>
10258 </interface>
10259 -<interface name="corenet_receive_cvs_client_packets" lineno="19744">
10260 +<interface name="corenet_receive_cvs_client_packets" lineno="20288">
10261 <summary>
10262 Receive cvs_client packets.
10263 </summary>
10264 @@ -22483,7 +22562,7 @@ Domain allowed access.
10265 </param>
10266 <infoflow type="read" weight="10"/>
10267 </interface>
10268 -<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="19763">
10269 +<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="20307">
10270 <summary>
10271 Do not audit attempts to receive cvs_client packets.
10272 </summary>
10273 @@ -22494,7 +22573,7 @@ Domain allowed access.
10274 </param>
10275 <infoflow type="none"/>
10276 </interface>
10277 -<interface name="corenet_sendrecv_cvs_client_packets" lineno="19782">
10278 +<interface name="corenet_sendrecv_cvs_client_packets" lineno="20326">
10279 <summary>
10280 Send and receive cvs_client packets.
10281 </summary>
10282 @@ -22505,7 +22584,7 @@ Domain allowed access.
10283 </param>
10284 <infoflow type="both" weight="10"/>
10285 </interface>
10286 -<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="19798">
10287 +<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="20342">
10288 <summary>
10289 Do not audit attempts to send and receive cvs_client packets.
10290 </summary>
10291 @@ -22516,7 +22595,7 @@ Domain to not audit.
10292 </param>
10293 <infoflow type="none"/>
10294 </interface>
10295 -<interface name="corenet_relabelto_cvs_client_packets" lineno="19813">
10296 +<interface name="corenet_relabelto_cvs_client_packets" lineno="20357">
10297 <summary>
10298 Relabel packets to cvs_client the packet type.
10299 </summary>
10300 @@ -22526,7 +22605,7 @@ Domain allowed access.
10301 </summary>
10302 </param>
10303 </interface>
10304 -<interface name="corenet_send_cvs_server_packets" lineno="19833">
10305 +<interface name="corenet_send_cvs_server_packets" lineno="20377">
10306 <summary>
10307 Send cvs_server packets.
10308 </summary>
10309 @@ -22537,7 +22616,7 @@ Domain allowed access.
10310 </param>
10311 <infoflow type="write" weight="10"/>
10312 </interface>
10313 -<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="19852">
10314 +<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="20396">
10315 <summary>
10316 Do not audit attempts to send cvs_server packets.
10317 </summary>
10318 @@ -22548,7 +22627,7 @@ Domain to not audit.
10319 </param>
10320 <infoflow type="none"/>
10321 </interface>
10322 -<interface name="corenet_receive_cvs_server_packets" lineno="19871">
10323 +<interface name="corenet_receive_cvs_server_packets" lineno="20415">
10324 <summary>
10325 Receive cvs_server packets.
10326 </summary>
10327 @@ -22559,7 +22638,7 @@ Domain allowed access.
10328 </param>
10329 <infoflow type="read" weight="10"/>
10330 </interface>
10331 -<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="19890">
10332 +<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="20434">
10333 <summary>
10334 Do not audit attempts to receive cvs_server packets.
10335 </summary>
10336 @@ -22570,7 +22649,7 @@ Domain allowed access.
10337 </param>
10338 <infoflow type="none"/>
10339 </interface>
10340 -<interface name="corenet_sendrecv_cvs_server_packets" lineno="19909">
10341 +<interface name="corenet_sendrecv_cvs_server_packets" lineno="20453">
10342 <summary>
10343 Send and receive cvs_server packets.
10344 </summary>
10345 @@ -22581,7 +22660,7 @@ Domain allowed access.
10346 </param>
10347 <infoflow type="both" weight="10"/>
10348 </interface>
10349 -<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="19925">
10350 +<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="20469">
10351 <summary>
10352 Do not audit attempts to send and receive cvs_server packets.
10353 </summary>
10354 @@ -22592,7 +22671,7 @@ Domain to not audit.
10355 </param>
10356 <infoflow type="none"/>
10357 </interface>
10358 -<interface name="corenet_relabelto_cvs_server_packets" lineno="19940">
10359 +<interface name="corenet_relabelto_cvs_server_packets" lineno="20484">
10360 <summary>
10361 Relabel packets to cvs_server the packet type.
10362 </summary>
10363 @@ -22602,7 +22681,7 @@ Domain allowed access.
10364 </summary>
10365 </param>
10366 </interface>
10367 -<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="19962">
10368 +<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="20506">
10369 <summary>
10370 Send and receive TCP traffic on the cyphesis port.
10371 </summary>
10372 @@ -22613,7 +22692,7 @@ Domain allowed access.
10373 </param>
10374 <infoflow type="both" weight="10"/>
10375 </interface>
10376 -<interface name="corenet_udp_send_cyphesis_port" lineno="19977">
10377 +<interface name="corenet_udp_send_cyphesis_port" lineno="20521">
10378 <summary>
10379 Send UDP traffic on the cyphesis port.
10380 </summary>
10381 @@ -22624,7 +22703,7 @@ Domain allowed access.
10382 </param>
10383 <infoflow type="write" weight="10"/>
10384 </interface>
10385 -<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="19992">
10386 +<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="20536">
10387 <summary>
10388 Do not audit attempts to send UDP traffic on the cyphesis port.
10389 </summary>
10390 @@ -22635,7 +22714,7 @@ Domain to not audit.
10391 </param>
10392 <infoflow type="none"/>
10393 </interface>
10394 -<interface name="corenet_udp_receive_cyphesis_port" lineno="20007">
10395 +<interface name="corenet_udp_receive_cyphesis_port" lineno="20551">
10396 <summary>
10397 Receive UDP traffic on the cyphesis port.
10398 </summary>
10399 @@ -22646,7 +22725,7 @@ Domain allowed access.
10400 </param>
10401 <infoflow type="read" weight="10"/>
10402 </interface>
10403 -<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="20022">
10404 +<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="20566">
10405 <summary>
10406 Do not audit attempts to receive UDP traffic on the cyphesis port.
10407 </summary>
10408 @@ -22657,7 +22736,7 @@ Domain to not audit.
10409 </param>
10410 <infoflow type="none"/>
10411 </interface>
10412 -<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="20037">
10413 +<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="20581">
10414 <summary>
10415 Send and receive UDP traffic on the cyphesis port.
10416 </summary>
10417 @@ -22668,7 +22747,7 @@ Domain allowed access.
10418 </param>
10419 <infoflow type="both" weight="10"/>
10420 </interface>
10421 -<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="20053">
10422 +<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="20597">
10423 <summary>
10424 Do not audit attempts to send and receive
10425 UDP traffic on the cyphesis port.
10426 @@ -22680,7 +22759,7 @@ Domain to not audit.
10427 </param>
10428 <infoflow type="none"/>
10429 </interface>
10430 -<interface name="corenet_tcp_bind_cyphesis_port" lineno="20068">
10431 +<interface name="corenet_tcp_bind_cyphesis_port" lineno="20612">
10432 <summary>
10433 Bind TCP sockets to the cyphesis port.
10434 </summary>
10435 @@ -22691,7 +22770,7 @@ Domain allowed access.
10436 </param>
10437 <infoflow type="none"/>
10438 </interface>
10439 -<interface name="corenet_udp_bind_cyphesis_port" lineno="20088">
10440 +<interface name="corenet_udp_bind_cyphesis_port" lineno="20632">
10441 <summary>
10442 Bind UDP sockets to the cyphesis port.
10443 </summary>
10444 @@ -22702,7 +22781,7 @@ Domain allowed access.
10445 </param>
10446 <infoflow type="none"/>
10447 </interface>
10448 -<interface name="corenet_tcp_connect_cyphesis_port" lineno="20107">
10449 +<interface name="corenet_tcp_connect_cyphesis_port" lineno="20651">
10450 <summary>
10451 Make a TCP connection to the cyphesis port.
10452 </summary>
10453 @@ -22712,7 +22791,7 @@ Domain allowed access.
10454 </summary>
10455 </param>
10456 </interface>
10457 -<interface name="corenet_send_cyphesis_client_packets" lineno="20127">
10458 +<interface name="corenet_send_cyphesis_client_packets" lineno="20671">
10459 <summary>
10460 Send cyphesis_client packets.
10461 </summary>
10462 @@ -22723,7 +22802,7 @@ Domain allowed access.
10463 </param>
10464 <infoflow type="write" weight="10"/>
10465 </interface>
10466 -<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="20146">
10467 +<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="20690">
10468 <summary>
10469 Do not audit attempts to send cyphesis_client packets.
10470 </summary>
10471 @@ -22734,7 +22813,7 @@ Domain to not audit.
10472 </param>
10473 <infoflow type="none"/>
10474 </interface>
10475 -<interface name="corenet_receive_cyphesis_client_packets" lineno="20165">
10476 +<interface name="corenet_receive_cyphesis_client_packets" lineno="20709">
10477 <summary>
10478 Receive cyphesis_client packets.
10479 </summary>
10480 @@ -22745,7 +22824,7 @@ Domain allowed access.
10481 </param>
10482 <infoflow type="read" weight="10"/>
10483 </interface>
10484 -<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="20184">
10485 +<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="20728">
10486 <summary>
10487 Do not audit attempts to receive cyphesis_client packets.
10488 </summary>
10489 @@ -22756,7 +22835,7 @@ Domain allowed access.
10490 </param>
10491 <infoflow type="none"/>
10492 </interface>
10493 -<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="20203">
10494 +<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="20747">
10495 <summary>
10496 Send and receive cyphesis_client packets.
10497 </summary>
10498 @@ -22767,7 +22846,7 @@ Domain allowed access.
10499 </param>
10500 <infoflow type="both" weight="10"/>
10501 </interface>
10502 -<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="20219">
10503 +<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="20763">
10504 <summary>
10505 Do not audit attempts to send and receive cyphesis_client packets.
10506 </summary>
10507 @@ -22778,7 +22857,7 @@ Domain to not audit.
10508 </param>
10509 <infoflow type="none"/>
10510 </interface>
10511 -<interface name="corenet_relabelto_cyphesis_client_packets" lineno="20234">
10512 +<interface name="corenet_relabelto_cyphesis_client_packets" lineno="20778">
10513 <summary>
10514 Relabel packets to cyphesis_client the packet type.
10515 </summary>
10516 @@ -22788,7 +22867,7 @@ Domain allowed access.
10517 </summary>
10518 </param>
10519 </interface>
10520 -<interface name="corenet_send_cyphesis_server_packets" lineno="20254">
10521 +<interface name="corenet_send_cyphesis_server_packets" lineno="20798">
10522 <summary>
10523 Send cyphesis_server packets.
10524 </summary>
10525 @@ -22799,7 +22878,7 @@ Domain allowed access.
10526 </param>
10527 <infoflow type="write" weight="10"/>
10528 </interface>
10529 -<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="20273">
10530 +<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="20817">
10531 <summary>
10532 Do not audit attempts to send cyphesis_server packets.
10533 </summary>
10534 @@ -22810,7 +22889,7 @@ Domain to not audit.
10535 </param>
10536 <infoflow type="none"/>
10537 </interface>
10538 -<interface name="corenet_receive_cyphesis_server_packets" lineno="20292">
10539 +<interface name="corenet_receive_cyphesis_server_packets" lineno="20836">
10540 <summary>
10541 Receive cyphesis_server packets.
10542 </summary>
10543 @@ -22821,7 +22900,7 @@ Domain allowed access.
10544 </param>
10545 <infoflow type="read" weight="10"/>
10546 </interface>
10547 -<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="20311">
10548 +<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="20855">
10549 <summary>
10550 Do not audit attempts to receive cyphesis_server packets.
10551 </summary>
10552 @@ -22832,7 +22911,7 @@ Domain allowed access.
10553 </param>
10554 <infoflow type="none"/>
10555 </interface>
10556 -<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="20330">
10557 +<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="20874">
10558 <summary>
10559 Send and receive cyphesis_server packets.
10560 </summary>
10561 @@ -22843,7 +22922,7 @@ Domain allowed access.
10562 </param>
10563 <infoflow type="both" weight="10"/>
10564 </interface>
10565 -<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="20346">
10566 +<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="20890">
10567 <summary>
10568 Do not audit attempts to send and receive cyphesis_server packets.
10569 </summary>
10570 @@ -22854,7 +22933,7 @@ Domain to not audit.
10571 </param>
10572 <infoflow type="none"/>
10573 </interface>
10574 -<interface name="corenet_relabelto_cyphesis_server_packets" lineno="20361">
10575 +<interface name="corenet_relabelto_cyphesis_server_packets" lineno="20905">
10576 <summary>
10577 Relabel packets to cyphesis_server the packet type.
10578 </summary>
10579 @@ -22864,7 +22943,7 @@ Domain allowed access.
10580 </summary>
10581 </param>
10582 </interface>
10583 -<interface name="corenet_tcp_sendrecv_daap_port" lineno="20383">
10584 +<interface name="corenet_tcp_sendrecv_daap_port" lineno="20927">
10585 <summary>
10586 Send and receive TCP traffic on the daap port.
10587 </summary>
10588 @@ -22875,7 +22954,7 @@ Domain allowed access.
10589 </param>
10590 <infoflow type="both" weight="10"/>
10591 </interface>
10592 -<interface name="corenet_udp_send_daap_port" lineno="20398">
10593 +<interface name="corenet_udp_send_daap_port" lineno="20942">
10594 <summary>
10595 Send UDP traffic on the daap port.
10596 </summary>
10597 @@ -22886,7 +22965,7 @@ Domain allowed access.
10598 </param>
10599 <infoflow type="write" weight="10"/>
10600 </interface>
10601 -<interface name="corenet_dontaudit_udp_send_daap_port" lineno="20413">
10602 +<interface name="corenet_dontaudit_udp_send_daap_port" lineno="20957">
10603 <summary>
10604 Do not audit attempts to send UDP traffic on the daap port.
10605 </summary>
10606 @@ -22897,7 +22976,7 @@ Domain to not audit.
10607 </param>
10608 <infoflow type="none"/>
10609 </interface>
10610 -<interface name="corenet_udp_receive_daap_port" lineno="20428">
10611 +<interface name="corenet_udp_receive_daap_port" lineno="20972">
10612 <summary>
10613 Receive UDP traffic on the daap port.
10614 </summary>
10615 @@ -22908,7 +22987,7 @@ Domain allowed access.
10616 </param>
10617 <infoflow type="read" weight="10"/>
10618 </interface>
10619 -<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="20443">
10620 +<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="20987">
10621 <summary>
10622 Do not audit attempts to receive UDP traffic on the daap port.
10623 </summary>
10624 @@ -22919,7 +22998,7 @@ Domain to not audit.
10625 </param>
10626 <infoflow type="none"/>
10627 </interface>
10628 -<interface name="corenet_udp_sendrecv_daap_port" lineno="20458">
10629 +<interface name="corenet_udp_sendrecv_daap_port" lineno="21002">
10630 <summary>
10631 Send and receive UDP traffic on the daap port.
10632 </summary>
10633 @@ -22930,7 +23009,7 @@ Domain allowed access.
10634 </param>
10635 <infoflow type="both" weight="10"/>
10636 </interface>
10637 -<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="20474">
10638 +<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="21018">
10639 <summary>
10640 Do not audit attempts to send and receive
10641 UDP traffic on the daap port.
10642 @@ -22942,7 +23021,7 @@ Domain to not audit.
10643 </param>
10644 <infoflow type="none"/>
10645 </interface>
10646 -<interface name="corenet_tcp_bind_daap_port" lineno="20489">
10647 +<interface name="corenet_tcp_bind_daap_port" lineno="21033">
10648 <summary>
10649 Bind TCP sockets to the daap port.
10650 </summary>
10651 @@ -22953,7 +23032,7 @@ Domain allowed access.
10652 </param>
10653 <infoflow type="none"/>
10654 </interface>
10655 -<interface name="corenet_udp_bind_daap_port" lineno="20509">
10656 +<interface name="corenet_udp_bind_daap_port" lineno="21053">
10657 <summary>
10658 Bind UDP sockets to the daap port.
10659 </summary>
10660 @@ -22964,7 +23043,7 @@ Domain allowed access.
10661 </param>
10662 <infoflow type="none"/>
10663 </interface>
10664 -<interface name="corenet_tcp_connect_daap_port" lineno="20528">
10665 +<interface name="corenet_tcp_connect_daap_port" lineno="21072">
10666 <summary>
10667 Make a TCP connection to the daap port.
10668 </summary>
10669 @@ -22974,7 +23053,7 @@ Domain allowed access.
10670 </summary>
10671 </param>
10672 </interface>
10673 -<interface name="corenet_send_daap_client_packets" lineno="20548">
10674 +<interface name="corenet_send_daap_client_packets" lineno="21092">
10675 <summary>
10676 Send daap_client packets.
10677 </summary>
10678 @@ -22985,7 +23064,7 @@ Domain allowed access.
10679 </param>
10680 <infoflow type="write" weight="10"/>
10681 </interface>
10682 -<interface name="corenet_dontaudit_send_daap_client_packets" lineno="20567">
10683 +<interface name="corenet_dontaudit_send_daap_client_packets" lineno="21111">
10684 <summary>
10685 Do not audit attempts to send daap_client packets.
10686 </summary>
10687 @@ -22996,7 +23075,7 @@ Domain to not audit.
10688 </param>
10689 <infoflow type="none"/>
10690 </interface>
10691 -<interface name="corenet_receive_daap_client_packets" lineno="20586">
10692 +<interface name="corenet_receive_daap_client_packets" lineno="21130">
10693 <summary>
10694 Receive daap_client packets.
10695 </summary>
10696 @@ -23007,7 +23086,7 @@ Domain allowed access.
10697 </param>
10698 <infoflow type="read" weight="10"/>
10699 </interface>
10700 -<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="20605">
10701 +<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="21149">
10702 <summary>
10703 Do not audit attempts to receive daap_client packets.
10704 </summary>
10705 @@ -23018,7 +23097,7 @@ Domain allowed access.
10706 </param>
10707 <infoflow type="none"/>
10708 </interface>
10709 -<interface name="corenet_sendrecv_daap_client_packets" lineno="20624">
10710 +<interface name="corenet_sendrecv_daap_client_packets" lineno="21168">
10711 <summary>
10712 Send and receive daap_client packets.
10713 </summary>
10714 @@ -23029,7 +23108,7 @@ Domain allowed access.
10715 </param>
10716 <infoflow type="both" weight="10"/>
10717 </interface>
10718 -<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="20640">
10719 +<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="21184">
10720 <summary>
10721 Do not audit attempts to send and receive daap_client packets.
10722 </summary>
10723 @@ -23040,7 +23119,7 @@ Domain to not audit.
10724 </param>
10725 <infoflow type="none"/>
10726 </interface>
10727 -<interface name="corenet_relabelto_daap_client_packets" lineno="20655">
10728 +<interface name="corenet_relabelto_daap_client_packets" lineno="21199">
10729 <summary>
10730 Relabel packets to daap_client the packet type.
10731 </summary>
10732 @@ -23050,7 +23129,7 @@ Domain allowed access.
10733 </summary>
10734 </param>
10735 </interface>
10736 -<interface name="corenet_send_daap_server_packets" lineno="20675">
10737 +<interface name="corenet_send_daap_server_packets" lineno="21219">
10738 <summary>
10739 Send daap_server packets.
10740 </summary>
10741 @@ -23061,7 +23140,7 @@ Domain allowed access.
10742 </param>
10743 <infoflow type="write" weight="10"/>
10744 </interface>
10745 -<interface name="corenet_dontaudit_send_daap_server_packets" lineno="20694">
10746 +<interface name="corenet_dontaudit_send_daap_server_packets" lineno="21238">
10747 <summary>
10748 Do not audit attempts to send daap_server packets.
10749 </summary>
10750 @@ -23072,7 +23151,7 @@ Domain to not audit.
10751 </param>
10752 <infoflow type="none"/>
10753 </interface>
10754 -<interface name="corenet_receive_daap_server_packets" lineno="20713">
10755 +<interface name="corenet_receive_daap_server_packets" lineno="21257">
10756 <summary>
10757 Receive daap_server packets.
10758 </summary>
10759 @@ -23083,7 +23162,7 @@ Domain allowed access.
10760 </param>
10761 <infoflow type="read" weight="10"/>
10762 </interface>
10763 -<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="20732">
10764 +<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="21276">
10765 <summary>
10766 Do not audit attempts to receive daap_server packets.
10767 </summary>
10768 @@ -23094,7 +23173,7 @@ Domain allowed access.
10769 </param>
10770 <infoflow type="none"/>
10771 </interface>
10772 -<interface name="corenet_sendrecv_daap_server_packets" lineno="20751">
10773 +<interface name="corenet_sendrecv_daap_server_packets" lineno="21295">
10774 <summary>
10775 Send and receive daap_server packets.
10776 </summary>
10777 @@ -23105,7 +23184,7 @@ Domain allowed access.
10778 </param>
10779 <infoflow type="both" weight="10"/>
10780 </interface>
10781 -<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="20767">
10782 +<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="21311">
10783 <summary>
10784 Do not audit attempts to send and receive daap_server packets.
10785 </summary>
10786 @@ -23116,7 +23195,7 @@ Domain to not audit.
10787 </param>
10788 <infoflow type="none"/>
10789 </interface>
10790 -<interface name="corenet_relabelto_daap_server_packets" lineno="20782">
10791 +<interface name="corenet_relabelto_daap_server_packets" lineno="21326">
10792 <summary>
10793 Relabel packets to daap_server the packet type.
10794 </summary>
10795 @@ -23126,7 +23205,7 @@ Domain allowed access.
10796 </summary>
10797 </param>
10798 </interface>
10799 -<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="20804">
10800 +<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="21348">
10801 <summary>
10802 Send and receive TCP traffic on the dbskkd port.
10803 </summary>
10804 @@ -23137,7 +23216,7 @@ Domain allowed access.
10805 </param>
10806 <infoflow type="both" weight="10"/>
10807 </interface>
10808 -<interface name="corenet_udp_send_dbskkd_port" lineno="20819">
10809 +<interface name="corenet_udp_send_dbskkd_port" lineno="21363">
10810 <summary>
10811 Send UDP traffic on the dbskkd port.
10812 </summary>
10813 @@ -23148,7 +23227,7 @@ Domain allowed access.
10814 </param>
10815 <infoflow type="write" weight="10"/>
10816 </interface>
10817 -<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="20834">
10818 +<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="21378">
10819 <summary>
10820 Do not audit attempts to send UDP traffic on the dbskkd port.
10821 </summary>
10822 @@ -23159,7 +23238,7 @@ Domain to not audit.
10823 </param>
10824 <infoflow type="none"/>
10825 </interface>
10826 -<interface name="corenet_udp_receive_dbskkd_port" lineno="20849">
10827 +<interface name="corenet_udp_receive_dbskkd_port" lineno="21393">
10828 <summary>
10829 Receive UDP traffic on the dbskkd port.
10830 </summary>
10831 @@ -23170,7 +23249,7 @@ Domain allowed access.
10832 </param>
10833 <infoflow type="read" weight="10"/>
10834 </interface>
10835 -<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="20864">
10836 +<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="21408">
10837 <summary>
10838 Do not audit attempts to receive UDP traffic on the dbskkd port.
10839 </summary>
10840 @@ -23181,7 +23260,7 @@ Domain to not audit.
10841 </param>
10842 <infoflow type="none"/>
10843 </interface>
10844 -<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="20879">
10845 +<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="21423">
10846 <summary>
10847 Send and receive UDP traffic on the dbskkd port.
10848 </summary>
10849 @@ -23192,7 +23271,7 @@ Domain allowed access.
10850 </param>
10851 <infoflow type="both" weight="10"/>
10852 </interface>
10853 -<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="20895">
10854 +<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="21439">
10855 <summary>
10856 Do not audit attempts to send and receive
10857 UDP traffic on the dbskkd port.
10858 @@ -23204,7 +23283,7 @@ Domain to not audit.
10859 </param>
10860 <infoflow type="none"/>
10861 </interface>
10862 -<interface name="corenet_tcp_bind_dbskkd_port" lineno="20910">
10863 +<interface name="corenet_tcp_bind_dbskkd_port" lineno="21454">
10864 <summary>
10865 Bind TCP sockets to the dbskkd port.
10866 </summary>
10867 @@ -23215,7 +23294,7 @@ Domain allowed access.
10868 </param>
10869 <infoflow type="none"/>
10870 </interface>
10871 -<interface name="corenet_udp_bind_dbskkd_port" lineno="20930">
10872 +<interface name="corenet_udp_bind_dbskkd_port" lineno="21474">
10873 <summary>
10874 Bind UDP sockets to the dbskkd port.
10875 </summary>
10876 @@ -23226,7 +23305,7 @@ Domain allowed access.
10877 </param>
10878 <infoflow type="none"/>
10879 </interface>
10880 -<interface name="corenet_tcp_connect_dbskkd_port" lineno="20949">
10881 +<interface name="corenet_tcp_connect_dbskkd_port" lineno="21493">
10882 <summary>
10883 Make a TCP connection to the dbskkd port.
10884 </summary>
10885 @@ -23236,7 +23315,7 @@ Domain allowed access.
10886 </summary>
10887 </param>
10888 </interface>
10889 -<interface name="corenet_send_dbskkd_client_packets" lineno="20969">
10890 +<interface name="corenet_send_dbskkd_client_packets" lineno="21513">
10891 <summary>
10892 Send dbskkd_client packets.
10893 </summary>
10894 @@ -23247,7 +23326,7 @@ Domain allowed access.
10895 </param>
10896 <infoflow type="write" weight="10"/>
10897 </interface>
10898 -<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="20988">
10899 +<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="21532">
10900 <summary>
10901 Do not audit attempts to send dbskkd_client packets.
10902 </summary>
10903 @@ -23258,7 +23337,7 @@ Domain to not audit.
10904 </param>
10905 <infoflow type="none"/>
10906 </interface>
10907 -<interface name="corenet_receive_dbskkd_client_packets" lineno="21007">
10908 +<interface name="corenet_receive_dbskkd_client_packets" lineno="21551">
10909 <summary>
10910 Receive dbskkd_client packets.
10911 </summary>
10912 @@ -23269,7 +23348,7 @@ Domain allowed access.
10913 </param>
10914 <infoflow type="read" weight="10"/>
10915 </interface>
10916 -<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="21026">
10917 +<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="21570">
10918 <summary>
10919 Do not audit attempts to receive dbskkd_client packets.
10920 </summary>
10921 @@ -23280,7 +23359,7 @@ Domain allowed access.
10922 </param>
10923 <infoflow type="none"/>
10924 </interface>
10925 -<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="21045">
10926 +<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="21589">
10927 <summary>
10928 Send and receive dbskkd_client packets.
10929 </summary>
10930 @@ -23291,7 +23370,7 @@ Domain allowed access.
10931 </param>
10932 <infoflow type="both" weight="10"/>
10933 </interface>
10934 -<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="21061">
10935 +<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="21605">
10936 <summary>
10937 Do not audit attempts to send and receive dbskkd_client packets.
10938 </summary>
10939 @@ -23302,7 +23381,7 @@ Domain to not audit.
10940 </param>
10941 <infoflow type="none"/>
10942 </interface>
10943 -<interface name="corenet_relabelto_dbskkd_client_packets" lineno="21076">
10944 +<interface name="corenet_relabelto_dbskkd_client_packets" lineno="21620">
10945 <summary>
10946 Relabel packets to dbskkd_client the packet type.
10947 </summary>
10948 @@ -23312,7 +23391,7 @@ Domain allowed access.
10949 </summary>
10950 </param>
10951 </interface>
10952 -<interface name="corenet_send_dbskkd_server_packets" lineno="21096">
10953 +<interface name="corenet_send_dbskkd_server_packets" lineno="21640">
10954 <summary>
10955 Send dbskkd_server packets.
10956 </summary>
10957 @@ -23323,7 +23402,7 @@ Domain allowed access.
10958 </param>
10959 <infoflow type="write" weight="10"/>
10960 </interface>
10961 -<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="21115">
10962 +<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="21659">
10963 <summary>
10964 Do not audit attempts to send dbskkd_server packets.
10965 </summary>
10966 @@ -23334,7 +23413,7 @@ Domain to not audit.
10967 </param>
10968 <infoflow type="none"/>
10969 </interface>
10970 -<interface name="corenet_receive_dbskkd_server_packets" lineno="21134">
10971 +<interface name="corenet_receive_dbskkd_server_packets" lineno="21678">
10972 <summary>
10973 Receive dbskkd_server packets.
10974 </summary>
10975 @@ -23345,7 +23424,7 @@ Domain allowed access.
10976 </param>
10977 <infoflow type="read" weight="10"/>
10978 </interface>
10979 -<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="21153">
10980 +<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="21697">
10981 <summary>
10982 Do not audit attempts to receive dbskkd_server packets.
10983 </summary>
10984 @@ -23356,7 +23435,7 @@ Domain allowed access.
10985 </param>
10986 <infoflow type="none"/>
10987 </interface>
10988 -<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="21172">
10989 +<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="21716">
10990 <summary>
10991 Send and receive dbskkd_server packets.
10992 </summary>
10993 @@ -23367,7 +23446,7 @@ Domain allowed access.
10994 </param>
10995 <infoflow type="both" weight="10"/>
10996 </interface>
10997 -<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="21188">
10998 +<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="21732">
10999 <summary>
11000 Do not audit attempts to send and receive dbskkd_server packets.
11001 </summary>
11002 @@ -23378,7 +23457,7 @@ Domain to not audit.
11003 </param>
11004 <infoflow type="none"/>
11005 </interface>
11006 -<interface name="corenet_relabelto_dbskkd_server_packets" lineno="21203">
11007 +<interface name="corenet_relabelto_dbskkd_server_packets" lineno="21747">
11008 <summary>
11009 Relabel packets to dbskkd_server the packet type.
11010 </summary>
11011 @@ -23388,7 +23467,7 @@ Domain allowed access.
11012 </summary>
11013 </param>
11014 </interface>
11015 -<interface name="corenet_tcp_sendrecv_dcc_port" lineno="21225">
11016 +<interface name="corenet_tcp_sendrecv_dcc_port" lineno="21769">
11017 <summary>
11018 Send and receive TCP traffic on the dcc port.
11019 </summary>
11020 @@ -23399,7 +23478,7 @@ Domain allowed access.
11021 </param>
11022 <infoflow type="both" weight="10"/>
11023 </interface>
11024 -<interface name="corenet_udp_send_dcc_port" lineno="21240">
11025 +<interface name="corenet_udp_send_dcc_port" lineno="21784">
11026 <summary>
11027 Send UDP traffic on the dcc port.
11028 </summary>
11029 @@ -23410,7 +23489,7 @@ Domain allowed access.
11030 </param>
11031 <infoflow type="write" weight="10"/>
11032 </interface>
11033 -<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="21255">
11034 +<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="21799">
11035 <summary>
11036 Do not audit attempts to send UDP traffic on the dcc port.
11037 </summary>
11038 @@ -23421,7 +23500,7 @@ Domain to not audit.
11039 </param>
11040 <infoflow type="none"/>
11041 </interface>
11042 -<interface name="corenet_udp_receive_dcc_port" lineno="21270">
11043 +<interface name="corenet_udp_receive_dcc_port" lineno="21814">
11044 <summary>
11045 Receive UDP traffic on the dcc port.
11046 </summary>
11047 @@ -23432,7 +23511,7 @@ Domain allowed access.
11048 </param>
11049 <infoflow type="read" weight="10"/>
11050 </interface>
11051 -<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="21285">
11052 +<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="21829">
11053 <summary>
11054 Do not audit attempts to receive UDP traffic on the dcc port.
11055 </summary>
11056 @@ -23443,7 +23522,7 @@ Domain to not audit.
11057 </param>
11058 <infoflow type="none"/>
11059 </interface>
11060 -<interface name="corenet_udp_sendrecv_dcc_port" lineno="21300">
11061 +<interface name="corenet_udp_sendrecv_dcc_port" lineno="21844">
11062 <summary>
11063 Send and receive UDP traffic on the dcc port.
11064 </summary>
11065 @@ -23454,7 +23533,7 @@ Domain allowed access.
11066 </param>
11067 <infoflow type="both" weight="10"/>
11068 </interface>
11069 -<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="21316">
11070 +<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="21860">
11071 <summary>
11072 Do not audit attempts to send and receive
11073 UDP traffic on the dcc port.
11074 @@ -23466,7 +23545,7 @@ Domain to not audit.
11075 </param>
11076 <infoflow type="none"/>
11077 </interface>
11078 -<interface name="corenet_tcp_bind_dcc_port" lineno="21331">
11079 +<interface name="corenet_tcp_bind_dcc_port" lineno="21875">
11080 <summary>
11081 Bind TCP sockets to the dcc port.
11082 </summary>
11083 @@ -23477,7 +23556,7 @@ Domain allowed access.
11084 </param>
11085 <infoflow type="none"/>
11086 </interface>
11087 -<interface name="corenet_udp_bind_dcc_port" lineno="21351">
11088 +<interface name="corenet_udp_bind_dcc_port" lineno="21895">
11089 <summary>
11090 Bind UDP sockets to the dcc port.
11091 </summary>
11092 @@ -23488,7 +23567,7 @@ Domain allowed access.
11093 </param>
11094 <infoflow type="none"/>
11095 </interface>
11096 -<interface name="corenet_tcp_connect_dcc_port" lineno="21370">
11097 +<interface name="corenet_tcp_connect_dcc_port" lineno="21914">
11098 <summary>
11099 Make a TCP connection to the dcc port.
11100 </summary>
11101 @@ -23498,7 +23577,7 @@ Domain allowed access.
11102 </summary>
11103 </param>
11104 </interface>
11105 -<interface name="corenet_send_dcc_client_packets" lineno="21390">
11106 +<interface name="corenet_send_dcc_client_packets" lineno="21934">
11107 <summary>
11108 Send dcc_client packets.
11109 </summary>
11110 @@ -23509,7 +23588,7 @@ Domain allowed access.
11111 </param>
11112 <infoflow type="write" weight="10"/>
11113 </interface>
11114 -<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="21409">
11115 +<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="21953">
11116 <summary>
11117 Do not audit attempts to send dcc_client packets.
11118 </summary>
11119 @@ -23520,7 +23599,7 @@ Domain to not audit.
11120 </param>
11121 <infoflow type="none"/>
11122 </interface>
11123 -<interface name="corenet_receive_dcc_client_packets" lineno="21428">
11124 +<interface name="corenet_receive_dcc_client_packets" lineno="21972">
11125 <summary>
11126 Receive dcc_client packets.
11127 </summary>
11128 @@ -23531,7 +23610,7 @@ Domain allowed access.
11129 </param>
11130 <infoflow type="read" weight="10"/>
11131 </interface>
11132 -<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="21447">
11133 +<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="21991">
11134 <summary>
11135 Do not audit attempts to receive dcc_client packets.
11136 </summary>
11137 @@ -23542,7 +23621,7 @@ Domain allowed access.
11138 </param>
11139 <infoflow type="none"/>
11140 </interface>
11141 -<interface name="corenet_sendrecv_dcc_client_packets" lineno="21466">
11142 +<interface name="corenet_sendrecv_dcc_client_packets" lineno="22010">
11143 <summary>
11144 Send and receive dcc_client packets.
11145 </summary>
11146 @@ -23553,7 +23632,7 @@ Domain allowed access.
11147 </param>
11148 <infoflow type="both" weight="10"/>
11149 </interface>
11150 -<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="21482">
11151 +<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="22026">
11152 <summary>
11153 Do not audit attempts to send and receive dcc_client packets.
11154 </summary>
11155 @@ -23564,7 +23643,7 @@ Domain to not audit.
11156 </param>
11157 <infoflow type="none"/>
11158 </interface>
11159 -<interface name="corenet_relabelto_dcc_client_packets" lineno="21497">
11160 +<interface name="corenet_relabelto_dcc_client_packets" lineno="22041">
11161 <summary>
11162 Relabel packets to dcc_client the packet type.
11163 </summary>
11164 @@ -23574,7 +23653,7 @@ Domain allowed access.
11165 </summary>
11166 </param>
11167 </interface>
11168 -<interface name="corenet_send_dcc_server_packets" lineno="21517">
11169 +<interface name="corenet_send_dcc_server_packets" lineno="22061">
11170 <summary>
11171 Send dcc_server packets.
11172 </summary>
11173 @@ -23585,7 +23664,7 @@ Domain allowed access.
11174 </param>
11175 <infoflow type="write" weight="10"/>
11176 </interface>
11177 -<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="21536">
11178 +<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="22080">
11179 <summary>
11180 Do not audit attempts to send dcc_server packets.
11181 </summary>
11182 @@ -23596,7 +23675,7 @@ Domain to not audit.
11183 </param>
11184 <infoflow type="none"/>
11185 </interface>
11186 -<interface name="corenet_receive_dcc_server_packets" lineno="21555">
11187 +<interface name="corenet_receive_dcc_server_packets" lineno="22099">
11188 <summary>
11189 Receive dcc_server packets.
11190 </summary>
11191 @@ -23607,7 +23686,7 @@ Domain allowed access.
11192 </param>
11193 <infoflow type="read" weight="10"/>
11194 </interface>
11195 -<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="21574">
11196 +<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="22118">
11197 <summary>
11198 Do not audit attempts to receive dcc_server packets.
11199 </summary>
11200 @@ -23618,7 +23697,7 @@ Domain allowed access.
11201 </param>
11202 <infoflow type="none"/>
11203 </interface>
11204 -<interface name="corenet_sendrecv_dcc_server_packets" lineno="21593">
11205 +<interface name="corenet_sendrecv_dcc_server_packets" lineno="22137">
11206 <summary>
11207 Send and receive dcc_server packets.
11208 </summary>
11209 @@ -23629,7 +23708,7 @@ Domain allowed access.
11210 </param>
11211 <infoflow type="both" weight="10"/>
11212 </interface>
11213 -<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="21609">
11214 +<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="22153">
11215 <summary>
11216 Do not audit attempts to send and receive dcc_server packets.
11217 </summary>
11218 @@ -23640,7 +23719,7 @@ Domain to not audit.
11219 </param>
11220 <infoflow type="none"/>
11221 </interface>
11222 -<interface name="corenet_relabelto_dcc_server_packets" lineno="21624">
11223 +<interface name="corenet_relabelto_dcc_server_packets" lineno="22168">
11224 <summary>
11225 Relabel packets to dcc_server the packet type.
11226 </summary>
11227 @@ -23650,7 +23729,7 @@ Domain allowed access.
11228 </summary>
11229 </param>
11230 </interface>
11231 -<interface name="corenet_tcp_sendrecv_dccm_port" lineno="21646">
11232 +<interface name="corenet_tcp_sendrecv_dccm_port" lineno="22190">
11233 <summary>
11234 Send and receive TCP traffic on the dccm port.
11235 </summary>
11236 @@ -23661,7 +23740,7 @@ Domain allowed access.
11237 </param>
11238 <infoflow type="both" weight="10"/>
11239 </interface>
11240 -<interface name="corenet_udp_send_dccm_port" lineno="21661">
11241 +<interface name="corenet_udp_send_dccm_port" lineno="22205">
11242 <summary>
11243 Send UDP traffic on the dccm port.
11244 </summary>
11245 @@ -23672,7 +23751,7 @@ Domain allowed access.
11246 </param>
11247 <infoflow type="write" weight="10"/>
11248 </interface>
11249 -<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="21676">
11250 +<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="22220">
11251 <summary>
11252 Do not audit attempts to send UDP traffic on the dccm port.
11253 </summary>
11254 @@ -23683,7 +23762,7 @@ Domain to not audit.
11255 </param>
11256 <infoflow type="none"/>
11257 </interface>
11258 -<interface name="corenet_udp_receive_dccm_port" lineno="21691">
11259 +<interface name="corenet_udp_receive_dccm_port" lineno="22235">
11260 <summary>
11261 Receive UDP traffic on the dccm port.
11262 </summary>
11263 @@ -23694,7 +23773,7 @@ Domain allowed access.
11264 </param>
11265 <infoflow type="read" weight="10"/>
11266 </interface>
11267 -<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="21706">
11268 +<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="22250">
11269 <summary>
11270 Do not audit attempts to receive UDP traffic on the dccm port.
11271 </summary>
11272 @@ -23705,7 +23784,7 @@ Domain to not audit.
11273 </param>
11274 <infoflow type="none"/>
11275 </interface>
11276 -<interface name="corenet_udp_sendrecv_dccm_port" lineno="21721">
11277 +<interface name="corenet_udp_sendrecv_dccm_port" lineno="22265">
11278 <summary>
11279 Send and receive UDP traffic on the dccm port.
11280 </summary>
11281 @@ -23716,7 +23795,7 @@ Domain allowed access.
11282 </param>
11283 <infoflow type="both" weight="10"/>
11284 </interface>
11285 -<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="21737">
11286 +<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="22281">
11287 <summary>
11288 Do not audit attempts to send and receive
11289 UDP traffic on the dccm port.
11290 @@ -23728,7 +23807,7 @@ Domain to not audit.
11291 </param>
11292 <infoflow type="none"/>
11293 </interface>
11294 -<interface name="corenet_tcp_bind_dccm_port" lineno="21752">
11295 +<interface name="corenet_tcp_bind_dccm_port" lineno="22296">
11296 <summary>
11297 Bind TCP sockets to the dccm port.
11298 </summary>
11299 @@ -23739,7 +23818,7 @@ Domain allowed access.
11300 </param>
11301 <infoflow type="none"/>
11302 </interface>
11303 -<interface name="corenet_udp_bind_dccm_port" lineno="21772">
11304 +<interface name="corenet_udp_bind_dccm_port" lineno="22316">
11305 <summary>
11306 Bind UDP sockets to the dccm port.
11307 </summary>
11308 @@ -23750,7 +23829,7 @@ Domain allowed access.
11309 </param>
11310 <infoflow type="none"/>
11311 </interface>
11312 -<interface name="corenet_tcp_connect_dccm_port" lineno="21791">
11313 +<interface name="corenet_tcp_connect_dccm_port" lineno="22335">
11314 <summary>
11315 Make a TCP connection to the dccm port.
11316 </summary>
11317 @@ -23760,7 +23839,7 @@ Domain allowed access.
11318 </summary>
11319 </param>
11320 </interface>
11321 -<interface name="corenet_send_dccm_client_packets" lineno="21811">
11322 +<interface name="corenet_send_dccm_client_packets" lineno="22355">
11323 <summary>
11324 Send dccm_client packets.
11325 </summary>
11326 @@ -23771,7 +23850,7 @@ Domain allowed access.
11327 </param>
11328 <infoflow type="write" weight="10"/>
11329 </interface>
11330 -<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="21830">
11331 +<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="22374">
11332 <summary>
11333 Do not audit attempts to send dccm_client packets.
11334 </summary>
11335 @@ -23782,7 +23861,7 @@ Domain to not audit.
11336 </param>
11337 <infoflow type="none"/>
11338 </interface>
11339 -<interface name="corenet_receive_dccm_client_packets" lineno="21849">
11340 +<interface name="corenet_receive_dccm_client_packets" lineno="22393">
11341 <summary>
11342 Receive dccm_client packets.
11343 </summary>
11344 @@ -23793,7 +23872,7 @@ Domain allowed access.
11345 </param>
11346 <infoflow type="read" weight="10"/>
11347 </interface>
11348 -<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="21868">
11349 +<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="22412">
11350 <summary>
11351 Do not audit attempts to receive dccm_client packets.
11352 </summary>
11353 @@ -23804,7 +23883,7 @@ Domain allowed access.
11354 </param>
11355 <infoflow type="none"/>
11356 </interface>
11357 -<interface name="corenet_sendrecv_dccm_client_packets" lineno="21887">
11358 +<interface name="corenet_sendrecv_dccm_client_packets" lineno="22431">
11359 <summary>
11360 Send and receive dccm_client packets.
11361 </summary>
11362 @@ -23815,7 +23894,7 @@ Domain allowed access.
11363 </param>
11364 <infoflow type="both" weight="10"/>
11365 </interface>
11366 -<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="21903">
11367 +<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="22447">
11368 <summary>
11369 Do not audit attempts to send and receive dccm_client packets.
11370 </summary>
11371 @@ -23826,7 +23905,7 @@ Domain to not audit.
11372 </param>
11373 <infoflow type="none"/>
11374 </interface>
11375 -<interface name="corenet_relabelto_dccm_client_packets" lineno="21918">
11376 +<interface name="corenet_relabelto_dccm_client_packets" lineno="22462">
11377 <summary>
11378 Relabel packets to dccm_client the packet type.
11379 </summary>
11380 @@ -23836,7 +23915,7 @@ Domain allowed access.
11381 </summary>
11382 </param>
11383 </interface>
11384 -<interface name="corenet_send_dccm_server_packets" lineno="21938">
11385 +<interface name="corenet_send_dccm_server_packets" lineno="22482">
11386 <summary>
11387 Send dccm_server packets.
11388 </summary>
11389 @@ -23847,7 +23926,7 @@ Domain allowed access.
11390 </param>
11391 <infoflow type="write" weight="10"/>
11392 </interface>
11393 -<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="21957">
11394 +<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="22501">
11395 <summary>
11396 Do not audit attempts to send dccm_server packets.
11397 </summary>
11398 @@ -23858,7 +23937,7 @@ Domain to not audit.
11399 </param>
11400 <infoflow type="none"/>
11401 </interface>
11402 -<interface name="corenet_receive_dccm_server_packets" lineno="21976">
11403 +<interface name="corenet_receive_dccm_server_packets" lineno="22520">
11404 <summary>
11405 Receive dccm_server packets.
11406 </summary>
11407 @@ -23869,7 +23948,7 @@ Domain allowed access.
11408 </param>
11409 <infoflow type="read" weight="10"/>
11410 </interface>
11411 -<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="21995">
11412 +<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="22539">
11413 <summary>
11414 Do not audit attempts to receive dccm_server packets.
11415 </summary>
11416 @@ -23880,7 +23959,7 @@ Domain allowed access.
11417 </param>
11418 <infoflow type="none"/>
11419 </interface>
11420 -<interface name="corenet_sendrecv_dccm_server_packets" lineno="22014">
11421 +<interface name="corenet_sendrecv_dccm_server_packets" lineno="22558">
11422 <summary>
11423 Send and receive dccm_server packets.
11424 </summary>
11425 @@ -23891,7 +23970,7 @@ Domain allowed access.
11426 </param>
11427 <infoflow type="both" weight="10"/>
11428 </interface>
11429 -<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="22030">
11430 +<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="22574">
11431 <summary>
11432 Do not audit attempts to send and receive dccm_server packets.
11433 </summary>
11434 @@ -23902,7 +23981,7 @@ Domain to not audit.
11435 </param>
11436 <infoflow type="none"/>
11437 </interface>
11438 -<interface name="corenet_relabelto_dccm_server_packets" lineno="22045">
11439 +<interface name="corenet_relabelto_dccm_server_packets" lineno="22589">
11440 <summary>
11441 Relabel packets to dccm_server the packet type.
11442 </summary>
11443 @@ -23912,7 +23991,7 @@ Domain allowed access.
11444 </summary>
11445 </param>
11446 </interface>
11447 -<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="22067">
11448 +<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="22611">
11449 <summary>
11450 Send and receive TCP traffic on the dhcpc port.
11451 </summary>
11452 @@ -23923,7 +24002,7 @@ Domain allowed access.
11453 </param>
11454 <infoflow type="both" weight="10"/>
11455 </interface>
11456 -<interface name="corenet_udp_send_dhcpc_port" lineno="22082">
11457 +<interface name="corenet_udp_send_dhcpc_port" lineno="22626">
11458 <summary>
11459 Send UDP traffic on the dhcpc port.
11460 </summary>
11461 @@ -23934,7 +24013,7 @@ Domain allowed access.
11462 </param>
11463 <infoflow type="write" weight="10"/>
11464 </interface>
11465 -<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="22097">
11466 +<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="22641">
11467 <summary>
11468 Do not audit attempts to send UDP traffic on the dhcpc port.
11469 </summary>
11470 @@ -23945,7 +24024,7 @@ Domain to not audit.
11471 </param>
11472 <infoflow type="none"/>
11473 </interface>
11474 -<interface name="corenet_udp_receive_dhcpc_port" lineno="22112">
11475 +<interface name="corenet_udp_receive_dhcpc_port" lineno="22656">
11476 <summary>
11477 Receive UDP traffic on the dhcpc port.
11478 </summary>
11479 @@ -23956,7 +24035,7 @@ Domain allowed access.
11480 </param>
11481 <infoflow type="read" weight="10"/>
11482 </interface>
11483 -<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="22127">
11484 +<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="22671">
11485 <summary>
11486 Do not audit attempts to receive UDP traffic on the dhcpc port.
11487 </summary>
11488 @@ -23967,7 +24046,7 @@ Domain to not audit.
11489 </param>
11490 <infoflow type="none"/>
11491 </interface>
11492 -<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="22142">
11493 +<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="22686">
11494 <summary>
11495 Send and receive UDP traffic on the dhcpc port.
11496 </summary>
11497 @@ -23978,7 +24057,7 @@ Domain allowed access.
11498 </param>
11499 <infoflow type="both" weight="10"/>
11500 </interface>
11501 -<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="22158">
11502 +<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="22702">
11503 <summary>
11504 Do not audit attempts to send and receive
11505 UDP traffic on the dhcpc port.
11506 @@ -23990,7 +24069,7 @@ Domain to not audit.
11507 </param>
11508 <infoflow type="none"/>
11509 </interface>
11510 -<interface name="corenet_tcp_bind_dhcpc_port" lineno="22173">
11511 +<interface name="corenet_tcp_bind_dhcpc_port" lineno="22717">
11512 <summary>
11513 Bind TCP sockets to the dhcpc port.
11514 </summary>
11515 @@ -24001,7 +24080,7 @@ Domain allowed access.
11516 </param>
11517 <infoflow type="none"/>
11518 </interface>
11519 -<interface name="corenet_udp_bind_dhcpc_port" lineno="22193">
11520 +<interface name="corenet_udp_bind_dhcpc_port" lineno="22737">
11521 <summary>
11522 Bind UDP sockets to the dhcpc port.
11523 </summary>
11524 @@ -24012,7 +24091,7 @@ Domain allowed access.
11525 </param>
11526 <infoflow type="none"/>
11527 </interface>
11528 -<interface name="corenet_tcp_connect_dhcpc_port" lineno="22212">
11529 +<interface name="corenet_tcp_connect_dhcpc_port" lineno="22756">
11530 <summary>
11531 Make a TCP connection to the dhcpc port.
11532 </summary>
11533 @@ -24022,7 +24101,7 @@ Domain allowed access.
11534 </summary>
11535 </param>
11536 </interface>
11537 -<interface name="corenet_send_dhcpc_client_packets" lineno="22232">
11538 +<interface name="corenet_send_dhcpc_client_packets" lineno="22776">
11539 <summary>
11540 Send dhcpc_client packets.
11541 </summary>
11542 @@ -24033,7 +24112,7 @@ Domain allowed access.
11543 </param>
11544 <infoflow type="write" weight="10"/>
11545 </interface>
11546 -<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="22251">
11547 +<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="22795">
11548 <summary>
11549 Do not audit attempts to send dhcpc_client packets.
11550 </summary>
11551 @@ -24044,7 +24123,7 @@ Domain to not audit.
11552 </param>
11553 <infoflow type="none"/>
11554 </interface>
11555 -<interface name="corenet_receive_dhcpc_client_packets" lineno="22270">
11556 +<interface name="corenet_receive_dhcpc_client_packets" lineno="22814">
11557 <summary>
11558 Receive dhcpc_client packets.
11559 </summary>
11560 @@ -24055,7 +24134,7 @@ Domain allowed access.
11561 </param>
11562 <infoflow type="read" weight="10"/>
11563 </interface>
11564 -<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="22289">
11565 +<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="22833">
11566 <summary>
11567 Do not audit attempts to receive dhcpc_client packets.
11568 </summary>
11569 @@ -24066,7 +24145,7 @@ Domain allowed access.
11570 </param>
11571 <infoflow type="none"/>
11572 </interface>
11573 -<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="22308">
11574 +<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="22852">
11575 <summary>
11576 Send and receive dhcpc_client packets.
11577 </summary>
11578 @@ -24077,7 +24156,7 @@ Domain allowed access.
11579 </param>
11580 <infoflow type="both" weight="10"/>
11581 </interface>
11582 -<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="22324">
11583 +<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="22868">
11584 <summary>
11585 Do not audit attempts to send and receive dhcpc_client packets.
11586 </summary>
11587 @@ -24088,7 +24167,7 @@ Domain to not audit.
11588 </param>
11589 <infoflow type="none"/>
11590 </interface>
11591 -<interface name="corenet_relabelto_dhcpc_client_packets" lineno="22339">
11592 +<interface name="corenet_relabelto_dhcpc_client_packets" lineno="22883">
11593 <summary>
11594 Relabel packets to dhcpc_client the packet type.
11595 </summary>
11596 @@ -24098,7 +24177,7 @@ Domain allowed access.
11597 </summary>
11598 </param>
11599 </interface>
11600 -<interface name="corenet_send_dhcpc_server_packets" lineno="22359">
11601 +<interface name="corenet_send_dhcpc_server_packets" lineno="22903">
11602 <summary>
11603 Send dhcpc_server packets.
11604 </summary>
11605 @@ -24109,7 +24188,7 @@ Domain allowed access.
11606 </param>
11607 <infoflow type="write" weight="10"/>
11608 </interface>
11609 -<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="22378">
11610 +<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="22922">
11611 <summary>
11612 Do not audit attempts to send dhcpc_server packets.
11613 </summary>
11614 @@ -24120,7 +24199,7 @@ Domain to not audit.
11615 </param>
11616 <infoflow type="none"/>
11617 </interface>
11618 -<interface name="corenet_receive_dhcpc_server_packets" lineno="22397">
11619 +<interface name="corenet_receive_dhcpc_server_packets" lineno="22941">
11620 <summary>
11621 Receive dhcpc_server packets.
11622 </summary>
11623 @@ -24131,7 +24210,7 @@ Domain allowed access.
11624 </param>
11625 <infoflow type="read" weight="10"/>
11626 </interface>
11627 -<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="22416">
11628 +<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="22960">
11629 <summary>
11630 Do not audit attempts to receive dhcpc_server packets.
11631 </summary>
11632 @@ -24142,7 +24221,7 @@ Domain allowed access.
11633 </param>
11634 <infoflow type="none"/>
11635 </interface>
11636 -<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="22435">
11637 +<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="22979">
11638 <summary>
11639 Send and receive dhcpc_server packets.
11640 </summary>
11641 @@ -24153,7 +24232,7 @@ Domain allowed access.
11642 </param>
11643 <infoflow type="both" weight="10"/>
11644 </interface>
11645 -<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="22451">
11646 +<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="22995">
11647 <summary>
11648 Do not audit attempts to send and receive dhcpc_server packets.
11649 </summary>
11650 @@ -24164,7 +24243,7 @@ Domain to not audit.
11651 </param>
11652 <infoflow type="none"/>
11653 </interface>
11654 -<interface name="corenet_relabelto_dhcpc_server_packets" lineno="22466">
11655 +<interface name="corenet_relabelto_dhcpc_server_packets" lineno="23010">
11656 <summary>
11657 Relabel packets to dhcpc_server the packet type.
11658 </summary>
11659 @@ -24174,7 +24253,7 @@ Domain allowed access.
11660 </summary>
11661 </param>
11662 </interface>
11663 -<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="22488">
11664 +<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="23032">
11665 <summary>
11666 Send and receive TCP traffic on the dhcpd port.
11667 </summary>
11668 @@ -24185,7 +24264,7 @@ Domain allowed access.
11669 </param>
11670 <infoflow type="both" weight="10"/>
11671 </interface>
11672 -<interface name="corenet_udp_send_dhcpd_port" lineno="22503">
11673 +<interface name="corenet_udp_send_dhcpd_port" lineno="23047">
11674 <summary>
11675 Send UDP traffic on the dhcpd port.
11676 </summary>
11677 @@ -24196,7 +24275,7 @@ Domain allowed access.
11678 </param>
11679 <infoflow type="write" weight="10"/>
11680 </interface>
11681 -<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="22518">
11682 +<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="23062">
11683 <summary>
11684 Do not audit attempts to send UDP traffic on the dhcpd port.
11685 </summary>
11686 @@ -24207,7 +24286,7 @@ Domain to not audit.
11687 </param>
11688 <infoflow type="none"/>
11689 </interface>
11690 -<interface name="corenet_udp_receive_dhcpd_port" lineno="22533">
11691 +<interface name="corenet_udp_receive_dhcpd_port" lineno="23077">
11692 <summary>
11693 Receive UDP traffic on the dhcpd port.
11694 </summary>
11695 @@ -24218,7 +24297,7 @@ Domain allowed access.
11696 </param>
11697 <infoflow type="read" weight="10"/>
11698 </interface>
11699 -<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="22548">
11700 +<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="23092">
11701 <summary>
11702 Do not audit attempts to receive UDP traffic on the dhcpd port.
11703 </summary>
11704 @@ -24229,7 +24308,7 @@ Domain to not audit.
11705 </param>
11706 <infoflow type="none"/>
11707 </interface>
11708 -<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="22563">
11709 +<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="23107">
11710 <summary>
11711 Send and receive UDP traffic on the dhcpd port.
11712 </summary>
11713 @@ -24240,7 +24319,7 @@ Domain allowed access.
11714 </param>
11715 <infoflow type="both" weight="10"/>
11716 </interface>
11717 -<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="22579">
11718 +<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="23123">
11719 <summary>
11720 Do not audit attempts to send and receive
11721 UDP traffic on the dhcpd port.
11722 @@ -24252,7 +24331,7 @@ Domain to not audit.
11723 </param>
11724 <infoflow type="none"/>
11725 </interface>
11726 -<interface name="corenet_tcp_bind_dhcpd_port" lineno="22594">
11727 +<interface name="corenet_tcp_bind_dhcpd_port" lineno="23138">
11728 <summary>
11729 Bind TCP sockets to the dhcpd port.
11730 </summary>
11731 @@ -24263,7 +24342,7 @@ Domain allowed access.
11732 </param>
11733 <infoflow type="none"/>
11734 </interface>
11735 -<interface name="corenet_udp_bind_dhcpd_port" lineno="22614">
11736 +<interface name="corenet_udp_bind_dhcpd_port" lineno="23158">
11737 <summary>
11738 Bind UDP sockets to the dhcpd port.
11739 </summary>
11740 @@ -24274,7 +24353,7 @@ Domain allowed access.
11741 </param>
11742 <infoflow type="none"/>
11743 </interface>
11744 -<interface name="corenet_tcp_connect_dhcpd_port" lineno="22633">
11745 +<interface name="corenet_tcp_connect_dhcpd_port" lineno="23177">
11746 <summary>
11747 Make a TCP connection to the dhcpd port.
11748 </summary>
11749 @@ -24284,7 +24363,7 @@ Domain allowed access.
11750 </summary>
11751 </param>
11752 </interface>
11753 -<interface name="corenet_send_dhcpd_client_packets" lineno="22653">
11754 +<interface name="corenet_send_dhcpd_client_packets" lineno="23197">
11755 <summary>
11756 Send dhcpd_client packets.
11757 </summary>
11758 @@ -24295,7 +24374,7 @@ Domain allowed access.
11759 </param>
11760 <infoflow type="write" weight="10"/>
11761 </interface>
11762 -<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="22672">
11763 +<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="23216">
11764 <summary>
11765 Do not audit attempts to send dhcpd_client packets.
11766 </summary>
11767 @@ -24306,7 +24385,7 @@ Domain to not audit.
11768 </param>
11769 <infoflow type="none"/>
11770 </interface>
11771 -<interface name="corenet_receive_dhcpd_client_packets" lineno="22691">
11772 +<interface name="corenet_receive_dhcpd_client_packets" lineno="23235">
11773 <summary>
11774 Receive dhcpd_client packets.
11775 </summary>
11776 @@ -24317,7 +24396,7 @@ Domain allowed access.
11777 </param>
11778 <infoflow type="read" weight="10"/>
11779 </interface>
11780 -<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="22710">
11781 +<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="23254">
11782 <summary>
11783 Do not audit attempts to receive dhcpd_client packets.
11784 </summary>
11785 @@ -24328,7 +24407,7 @@ Domain allowed access.
11786 </param>
11787 <infoflow type="none"/>
11788 </interface>
11789 -<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="22729">
11790 +<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="23273">
11791 <summary>
11792 Send and receive dhcpd_client packets.
11793 </summary>
11794 @@ -24339,7 +24418,7 @@ Domain allowed access.
11795 </param>
11796 <infoflow type="both" weight="10"/>
11797 </interface>
11798 -<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="22745">
11799 +<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="23289">
11800 <summary>
11801 Do not audit attempts to send and receive dhcpd_client packets.
11802 </summary>
11803 @@ -24350,7 +24429,7 @@ Domain to not audit.
11804 </param>
11805 <infoflow type="none"/>
11806 </interface>
11807 -<interface name="corenet_relabelto_dhcpd_client_packets" lineno="22760">
11808 +<interface name="corenet_relabelto_dhcpd_client_packets" lineno="23304">
11809 <summary>
11810 Relabel packets to dhcpd_client the packet type.
11811 </summary>
11812 @@ -24360,7 +24439,7 @@ Domain allowed access.
11813 </summary>
11814 </param>
11815 </interface>
11816 -<interface name="corenet_send_dhcpd_server_packets" lineno="22780">
11817 +<interface name="corenet_send_dhcpd_server_packets" lineno="23324">
11818 <summary>
11819 Send dhcpd_server packets.
11820 </summary>
11821 @@ -24371,7 +24450,7 @@ Domain allowed access.
11822 </param>
11823 <infoflow type="write" weight="10"/>
11824 </interface>
11825 -<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="22799">
11826 +<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="23343">
11827 <summary>
11828 Do not audit attempts to send dhcpd_server packets.
11829 </summary>
11830 @@ -24382,7 +24461,7 @@ Domain to not audit.
11831 </param>
11832 <infoflow type="none"/>
11833 </interface>
11834 -<interface name="corenet_receive_dhcpd_server_packets" lineno="22818">
11835 +<interface name="corenet_receive_dhcpd_server_packets" lineno="23362">
11836 <summary>
11837 Receive dhcpd_server packets.
11838 </summary>
11839 @@ -24393,7 +24472,7 @@ Domain allowed access.
11840 </param>
11841 <infoflow type="read" weight="10"/>
11842 </interface>
11843 -<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="22837">
11844 +<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="23381">
11845 <summary>
11846 Do not audit attempts to receive dhcpd_server packets.
11847 </summary>
11848 @@ -24404,7 +24483,7 @@ Domain allowed access.
11849 </param>
11850 <infoflow type="none"/>
11851 </interface>
11852 -<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="22856">
11853 +<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="23400">
11854 <summary>
11855 Send and receive dhcpd_server packets.
11856 </summary>
11857 @@ -24415,7 +24494,7 @@ Domain allowed access.
11858 </param>
11859 <infoflow type="both" weight="10"/>
11860 </interface>
11861 -<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="22872">
11862 +<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="23416">
11863 <summary>
11864 Do not audit attempts to send and receive dhcpd_server packets.
11865 </summary>
11866 @@ -24426,7 +24505,7 @@ Domain to not audit.
11867 </param>
11868 <infoflow type="none"/>
11869 </interface>
11870 -<interface name="corenet_relabelto_dhcpd_server_packets" lineno="22887">
11871 +<interface name="corenet_relabelto_dhcpd_server_packets" lineno="23431">
11872 <summary>
11873 Relabel packets to dhcpd_server the packet type.
11874 </summary>
11875 @@ -24436,7 +24515,7 @@ Domain allowed access.
11876 </summary>
11877 </param>
11878 </interface>
11879 -<interface name="corenet_tcp_sendrecv_dict_port" lineno="22909">
11880 +<interface name="corenet_tcp_sendrecv_dict_port" lineno="23453">
11881 <summary>
11882 Send and receive TCP traffic on the dict port.
11883 </summary>
11884 @@ -24447,7 +24526,7 @@ Domain allowed access.
11885 </param>
11886 <infoflow type="both" weight="10"/>
11887 </interface>
11888 -<interface name="corenet_udp_send_dict_port" lineno="22924">
11889 +<interface name="corenet_udp_send_dict_port" lineno="23468">
11890 <summary>
11891 Send UDP traffic on the dict port.
11892 </summary>
11893 @@ -24458,7 +24537,7 @@ Domain allowed access.
11894 </param>
11895 <infoflow type="write" weight="10"/>
11896 </interface>
11897 -<interface name="corenet_dontaudit_udp_send_dict_port" lineno="22939">
11898 +<interface name="corenet_dontaudit_udp_send_dict_port" lineno="23483">
11899 <summary>
11900 Do not audit attempts to send UDP traffic on the dict port.
11901 </summary>
11902 @@ -24469,7 +24548,7 @@ Domain to not audit.
11903 </param>
11904 <infoflow type="none"/>
11905 </interface>
11906 -<interface name="corenet_udp_receive_dict_port" lineno="22954">
11907 +<interface name="corenet_udp_receive_dict_port" lineno="23498">
11908 <summary>
11909 Receive UDP traffic on the dict port.
11910 </summary>
11911 @@ -24480,7 +24559,7 @@ Domain allowed access.
11912 </param>
11913 <infoflow type="read" weight="10"/>
11914 </interface>
11915 -<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="22969">
11916 +<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="23513">
11917 <summary>
11918 Do not audit attempts to receive UDP traffic on the dict port.
11919 </summary>
11920 @@ -24491,7 +24570,7 @@ Domain to not audit.
11921 </param>
11922 <infoflow type="none"/>
11923 </interface>
11924 -<interface name="corenet_udp_sendrecv_dict_port" lineno="22984">
11925 +<interface name="corenet_udp_sendrecv_dict_port" lineno="23528">
11926 <summary>
11927 Send and receive UDP traffic on the dict port.
11928 </summary>
11929 @@ -24502,7 +24581,7 @@ Domain allowed access.
11930 </param>
11931 <infoflow type="both" weight="10"/>
11932 </interface>
11933 -<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="23000">
11934 +<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="23544">
11935 <summary>
11936 Do not audit attempts to send and receive
11937 UDP traffic on the dict port.
11938 @@ -24514,7 +24593,7 @@ Domain to not audit.
11939 </param>
11940 <infoflow type="none"/>
11941 </interface>
11942 -<interface name="corenet_tcp_bind_dict_port" lineno="23015">
11943 +<interface name="corenet_tcp_bind_dict_port" lineno="23559">
11944 <summary>
11945 Bind TCP sockets to the dict port.
11946 </summary>
11947 @@ -24525,7 +24604,7 @@ Domain allowed access.
11948 </param>
11949 <infoflow type="none"/>
11950 </interface>
11951 -<interface name="corenet_udp_bind_dict_port" lineno="23035">
11952 +<interface name="corenet_udp_bind_dict_port" lineno="23579">
11953 <summary>
11954 Bind UDP sockets to the dict port.
11955 </summary>
11956 @@ -24536,7 +24615,7 @@ Domain allowed access.
11957 </param>
11958 <infoflow type="none"/>
11959 </interface>
11960 -<interface name="corenet_tcp_connect_dict_port" lineno="23054">
11961 +<interface name="corenet_tcp_connect_dict_port" lineno="23598">
11962 <summary>
11963 Make a TCP connection to the dict port.
11964 </summary>
11965 @@ -24546,7 +24625,7 @@ Domain allowed access.
11966 </summary>
11967 </param>
11968 </interface>
11969 -<interface name="corenet_send_dict_client_packets" lineno="23074">
11970 +<interface name="corenet_send_dict_client_packets" lineno="23618">
11971 <summary>
11972 Send dict_client packets.
11973 </summary>
11974 @@ -24557,7 +24636,7 @@ Domain allowed access.
11975 </param>
11976 <infoflow type="write" weight="10"/>
11977 </interface>
11978 -<interface name="corenet_dontaudit_send_dict_client_packets" lineno="23093">
11979 +<interface name="corenet_dontaudit_send_dict_client_packets" lineno="23637">
11980 <summary>
11981 Do not audit attempts to send dict_client packets.
11982 </summary>
11983 @@ -24568,7 +24647,7 @@ Domain to not audit.
11984 </param>
11985 <infoflow type="none"/>
11986 </interface>
11987 -<interface name="corenet_receive_dict_client_packets" lineno="23112">
11988 +<interface name="corenet_receive_dict_client_packets" lineno="23656">
11989 <summary>
11990 Receive dict_client packets.
11991 </summary>
11992 @@ -24579,7 +24658,7 @@ Domain allowed access.
11993 </param>
11994 <infoflow type="read" weight="10"/>
11995 </interface>
11996 -<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="23131">
11997 +<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="23675">
11998 <summary>
11999 Do not audit attempts to receive dict_client packets.
12000 </summary>
12001 @@ -24590,7 +24669,7 @@ Domain allowed access.
12002 </param>
12003 <infoflow type="none"/>
12004 </interface>
12005 -<interface name="corenet_sendrecv_dict_client_packets" lineno="23150">
12006 +<interface name="corenet_sendrecv_dict_client_packets" lineno="23694">
12007 <summary>
12008 Send and receive dict_client packets.
12009 </summary>
12010 @@ -24601,7 +24680,7 @@ Domain allowed access.
12011 </param>
12012 <infoflow type="both" weight="10"/>
12013 </interface>
12014 -<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="23166">
12015 +<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="23710">
12016 <summary>
12017 Do not audit attempts to send and receive dict_client packets.
12018 </summary>
12019 @@ -24612,7 +24691,7 @@ Domain to not audit.
12020 </param>
12021 <infoflow type="none"/>
12022 </interface>
12023 -<interface name="corenet_relabelto_dict_client_packets" lineno="23181">
12024 +<interface name="corenet_relabelto_dict_client_packets" lineno="23725">
12025 <summary>
12026 Relabel packets to dict_client the packet type.
12027 </summary>
12028 @@ -24622,7 +24701,7 @@ Domain allowed access.
12029 </summary>
12030 </param>
12031 </interface>
12032 -<interface name="corenet_send_dict_server_packets" lineno="23201">
12033 +<interface name="corenet_send_dict_server_packets" lineno="23745">
12034 <summary>
12035 Send dict_server packets.
12036 </summary>
12037 @@ -24633,7 +24712,7 @@ Domain allowed access.
12038 </param>
12039 <infoflow type="write" weight="10"/>
12040 </interface>
12041 -<interface name="corenet_dontaudit_send_dict_server_packets" lineno="23220">
12042 +<interface name="corenet_dontaudit_send_dict_server_packets" lineno="23764">
12043 <summary>
12044 Do not audit attempts to send dict_server packets.
12045 </summary>
12046 @@ -24644,7 +24723,7 @@ Domain to not audit.
12047 </param>
12048 <infoflow type="none"/>
12049 </interface>
12050 -<interface name="corenet_receive_dict_server_packets" lineno="23239">
12051 +<interface name="corenet_receive_dict_server_packets" lineno="23783">
12052 <summary>
12053 Receive dict_server packets.
12054 </summary>
12055 @@ -24655,7 +24734,7 @@ Domain allowed access.
12056 </param>
12057 <infoflow type="read" weight="10"/>
12058 </interface>
12059 -<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="23258">
12060 +<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="23802">
12061 <summary>
12062 Do not audit attempts to receive dict_server packets.
12063 </summary>
12064 @@ -24666,7 +24745,7 @@ Domain allowed access.
12065 </param>
12066 <infoflow type="none"/>
12067 </interface>
12068 -<interface name="corenet_sendrecv_dict_server_packets" lineno="23277">
12069 +<interface name="corenet_sendrecv_dict_server_packets" lineno="23821">
12070 <summary>
12071 Send and receive dict_server packets.
12072 </summary>
12073 @@ -24677,7 +24756,7 @@ Domain allowed access.
12074 </param>
12075 <infoflow type="both" weight="10"/>
12076 </interface>
12077 -<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="23293">
12078 +<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="23837">
12079 <summary>
12080 Do not audit attempts to send and receive dict_server packets.
12081 </summary>
12082 @@ -24688,7 +24767,7 @@ Domain to not audit.
12083 </param>
12084 <infoflow type="none"/>
12085 </interface>
12086 -<interface name="corenet_relabelto_dict_server_packets" lineno="23308">
12087 +<interface name="corenet_relabelto_dict_server_packets" lineno="23852">
12088 <summary>
12089 Relabel packets to dict_server the packet type.
12090 </summary>
12091 @@ -24698,7 +24777,7 @@ Domain allowed access.
12092 </summary>
12093 </param>
12094 </interface>
12095 -<interface name="corenet_tcp_sendrecv_distccd_port" lineno="23330">
12096 +<interface name="corenet_tcp_sendrecv_distccd_port" lineno="23874">
12097 <summary>
12098 Send and receive TCP traffic on the distccd port.
12099 </summary>
12100 @@ -24709,7 +24788,7 @@ Domain allowed access.
12101 </param>
12102 <infoflow type="both" weight="10"/>
12103 </interface>
12104 -<interface name="corenet_udp_send_distccd_port" lineno="23345">
12105 +<interface name="corenet_udp_send_distccd_port" lineno="23889">
12106 <summary>
12107 Send UDP traffic on the distccd port.
12108 </summary>
12109 @@ -24720,7 +24799,7 @@ Domain allowed access.
12110 </param>
12111 <infoflow type="write" weight="10"/>
12112 </interface>
12113 -<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="23360">
12114 +<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="23904">
12115 <summary>
12116 Do not audit attempts to send UDP traffic on the distccd port.
12117 </summary>
12118 @@ -24731,7 +24810,7 @@ Domain to not audit.
12119 </param>
12120 <infoflow type="none"/>
12121 </interface>
12122 -<interface name="corenet_udp_receive_distccd_port" lineno="23375">
12123 +<interface name="corenet_udp_receive_distccd_port" lineno="23919">
12124 <summary>
12125 Receive UDP traffic on the distccd port.
12126 </summary>
12127 @@ -24742,7 +24821,7 @@ Domain allowed access.
12128 </param>
12129 <infoflow type="read" weight="10"/>
12130 </interface>
12131 -<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="23390">
12132 +<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="23934">
12133 <summary>
12134 Do not audit attempts to receive UDP traffic on the distccd port.
12135 </summary>
12136 @@ -24753,7 +24832,7 @@ Domain to not audit.
12137 </param>
12138 <infoflow type="none"/>
12139 </interface>
12140 -<interface name="corenet_udp_sendrecv_distccd_port" lineno="23405">
12141 +<interface name="corenet_udp_sendrecv_distccd_port" lineno="23949">
12142 <summary>
12143 Send and receive UDP traffic on the distccd port.
12144 </summary>
12145 @@ -24764,7 +24843,7 @@ Domain allowed access.
12146 </param>
12147 <infoflow type="both" weight="10"/>
12148 </interface>
12149 -<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="23421">
12150 +<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="23965">
12151 <summary>
12152 Do not audit attempts to send and receive
12153 UDP traffic on the distccd port.
12154 @@ -24776,7 +24855,7 @@ Domain to not audit.
12155 </param>
12156 <infoflow type="none"/>
12157 </interface>
12158 -<interface name="corenet_tcp_bind_distccd_port" lineno="23436">
12159 +<interface name="corenet_tcp_bind_distccd_port" lineno="23980">
12160 <summary>
12161 Bind TCP sockets to the distccd port.
12162 </summary>
12163 @@ -24787,7 +24866,7 @@ Domain allowed access.
12164 </param>
12165 <infoflow type="none"/>
12166 </interface>
12167 -<interface name="corenet_udp_bind_distccd_port" lineno="23456">
12168 +<interface name="corenet_udp_bind_distccd_port" lineno="24000">
12169 <summary>
12170 Bind UDP sockets to the distccd port.
12171 </summary>
12172 @@ -24798,7 +24877,7 @@ Domain allowed access.
12173 </param>
12174 <infoflow type="none"/>
12175 </interface>
12176 -<interface name="corenet_tcp_connect_distccd_port" lineno="23475">
12177 +<interface name="corenet_tcp_connect_distccd_port" lineno="24019">
12178 <summary>
12179 Make a TCP connection to the distccd port.
12180 </summary>
12181 @@ -24808,7 +24887,7 @@ Domain allowed access.
12182 </summary>
12183 </param>
12184 </interface>
12185 -<interface name="corenet_send_distccd_client_packets" lineno="23495">
12186 +<interface name="corenet_send_distccd_client_packets" lineno="24039">
12187 <summary>
12188 Send distccd_client packets.
12189 </summary>
12190 @@ -24819,7 +24898,7 @@ Domain allowed access.
12191 </param>
12192 <infoflow type="write" weight="10"/>
12193 </interface>
12194 -<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="23514">
12195 +<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="24058">
12196 <summary>
12197 Do not audit attempts to send distccd_client packets.
12198 </summary>
12199 @@ -24830,7 +24909,7 @@ Domain to not audit.
12200 </param>
12201 <infoflow type="none"/>
12202 </interface>
12203 -<interface name="corenet_receive_distccd_client_packets" lineno="23533">
12204 +<interface name="corenet_receive_distccd_client_packets" lineno="24077">
12205 <summary>
12206 Receive distccd_client packets.
12207 </summary>
12208 @@ -24841,7 +24920,7 @@ Domain allowed access.
12209 </param>
12210 <infoflow type="read" weight="10"/>
12211 </interface>
12212 -<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="23552">
12213 +<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="24096">
12214 <summary>
12215 Do not audit attempts to receive distccd_client packets.
12216 </summary>
12217 @@ -24852,7 +24931,7 @@ Domain allowed access.
12218 </param>
12219 <infoflow type="none"/>
12220 </interface>
12221 -<interface name="corenet_sendrecv_distccd_client_packets" lineno="23571">
12222 +<interface name="corenet_sendrecv_distccd_client_packets" lineno="24115">
12223 <summary>
12224 Send and receive distccd_client packets.
12225 </summary>
12226 @@ -24863,7 +24942,7 @@ Domain allowed access.
12227 </param>
12228 <infoflow type="both" weight="10"/>
12229 </interface>
12230 -<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="23587">
12231 +<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="24131">
12232 <summary>
12233 Do not audit attempts to send and receive distccd_client packets.
12234 </summary>
12235 @@ -24874,7 +24953,7 @@ Domain to not audit.
12236 </param>
12237 <infoflow type="none"/>
12238 </interface>
12239 -<interface name="corenet_relabelto_distccd_client_packets" lineno="23602">
12240 +<interface name="corenet_relabelto_distccd_client_packets" lineno="24146">
12241 <summary>
12242 Relabel packets to distccd_client the packet type.
12243 </summary>
12244 @@ -24884,7 +24963,7 @@ Domain allowed access.
12245 </summary>
12246 </param>
12247 </interface>
12248 -<interface name="corenet_send_distccd_server_packets" lineno="23622">
12249 +<interface name="corenet_send_distccd_server_packets" lineno="24166">
12250 <summary>
12251 Send distccd_server packets.
12252 </summary>
12253 @@ -24895,7 +24974,7 @@ Domain allowed access.
12254 </param>
12255 <infoflow type="write" weight="10"/>
12256 </interface>
12257 -<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="23641">
12258 +<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="24185">
12259 <summary>
12260 Do not audit attempts to send distccd_server packets.
12261 </summary>
12262 @@ -24906,7 +24985,7 @@ Domain to not audit.
12263 </param>
12264 <infoflow type="none"/>
12265 </interface>
12266 -<interface name="corenet_receive_distccd_server_packets" lineno="23660">
12267 +<interface name="corenet_receive_distccd_server_packets" lineno="24204">
12268 <summary>
12269 Receive distccd_server packets.
12270 </summary>
12271 @@ -24917,7 +24996,7 @@ Domain allowed access.
12272 </param>
12273 <infoflow type="read" weight="10"/>
12274 </interface>
12275 -<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="23679">
12276 +<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="24223">
12277 <summary>
12278 Do not audit attempts to receive distccd_server packets.
12279 </summary>
12280 @@ -24928,7 +25007,7 @@ Domain allowed access.
12281 </param>
12282 <infoflow type="none"/>
12283 </interface>
12284 -<interface name="corenet_sendrecv_distccd_server_packets" lineno="23698">
12285 +<interface name="corenet_sendrecv_distccd_server_packets" lineno="24242">
12286 <summary>
12287 Send and receive distccd_server packets.
12288 </summary>
12289 @@ -24939,7 +25018,7 @@ Domain allowed access.
12290 </param>
12291 <infoflow type="both" weight="10"/>
12292 </interface>
12293 -<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="23714">
12294 +<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="24258">
12295 <summary>
12296 Do not audit attempts to send and receive distccd_server packets.
12297 </summary>
12298 @@ -24950,7 +25029,7 @@ Domain to not audit.
12299 </param>
12300 <infoflow type="none"/>
12301 </interface>
12302 -<interface name="corenet_relabelto_distccd_server_packets" lineno="23729">
12303 +<interface name="corenet_relabelto_distccd_server_packets" lineno="24273">
12304 <summary>
12305 Relabel packets to distccd_server the packet type.
12306 </summary>
12307 @@ -24960,7 +25039,7 @@ Domain allowed access.
12308 </summary>
12309 </param>
12310 </interface>
12311 -<interface name="corenet_tcp_sendrecv_dns_port" lineno="23751">
12312 +<interface name="corenet_tcp_sendrecv_dns_port" lineno="24295">
12313 <summary>
12314 Send and receive TCP traffic on the dns port.
12315 </summary>
12316 @@ -24971,7 +25050,7 @@ Domain allowed access.
12317 </param>
12318 <infoflow type="both" weight="10"/>
12319 </interface>
12320 -<interface name="corenet_udp_send_dns_port" lineno="23766">
12321 +<interface name="corenet_udp_send_dns_port" lineno="24310">
12322 <summary>
12323 Send UDP traffic on the dns port.
12324 </summary>
12325 @@ -24982,7 +25061,7 @@ Domain allowed access.
12326 </param>
12327 <infoflow type="write" weight="10"/>
12328 </interface>
12329 -<interface name="corenet_dontaudit_udp_send_dns_port" lineno="23781">
12330 +<interface name="corenet_dontaudit_udp_send_dns_port" lineno="24325">
12331 <summary>
12332 Do not audit attempts to send UDP traffic on the dns port.
12333 </summary>
12334 @@ -24993,7 +25072,7 @@ Domain to not audit.
12335 </param>
12336 <infoflow type="none"/>
12337 </interface>
12338 -<interface name="corenet_udp_receive_dns_port" lineno="23796">
12339 +<interface name="corenet_udp_receive_dns_port" lineno="24340">
12340 <summary>
12341 Receive UDP traffic on the dns port.
12342 </summary>
12343 @@ -25004,7 +25083,7 @@ Domain allowed access.
12344 </param>
12345 <infoflow type="read" weight="10"/>
12346 </interface>
12347 -<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="23811">
12348 +<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="24355">
12349 <summary>
12350 Do not audit attempts to receive UDP traffic on the dns port.
12351 </summary>
12352 @@ -25015,7 +25094,7 @@ Domain to not audit.
12353 </param>
12354 <infoflow type="none"/>
12355 </interface>
12356 -<interface name="corenet_udp_sendrecv_dns_port" lineno="23826">
12357 +<interface name="corenet_udp_sendrecv_dns_port" lineno="24370">
12358 <summary>
12359 Send and receive UDP traffic on the dns port.
12360 </summary>
12361 @@ -25026,7 +25105,7 @@ Domain allowed access.
12362 </param>
12363 <infoflow type="both" weight="10"/>
12364 </interface>
12365 -<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="23842">
12366 +<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="24386">
12367 <summary>
12368 Do not audit attempts to send and receive
12369 UDP traffic on the dns port.
12370 @@ -25038,7 +25117,7 @@ Domain to not audit.
12371 </param>
12372 <infoflow type="none"/>
12373 </interface>
12374 -<interface name="corenet_tcp_bind_dns_port" lineno="23857">
12375 +<interface name="corenet_tcp_bind_dns_port" lineno="24401">
12376 <summary>
12377 Bind TCP sockets to the dns port.
12378 </summary>
12379 @@ -25049,7 +25128,7 @@ Domain allowed access.
12380 </param>
12381 <infoflow type="none"/>
12382 </interface>
12383 -<interface name="corenet_udp_bind_dns_port" lineno="23877">
12384 +<interface name="corenet_udp_bind_dns_port" lineno="24421">
12385 <summary>
12386 Bind UDP sockets to the dns port.
12387 </summary>
12388 @@ -25060,7 +25139,7 @@ Domain allowed access.
12389 </param>
12390 <infoflow type="none"/>
12391 </interface>
12392 -<interface name="corenet_tcp_connect_dns_port" lineno="23896">
12393 +<interface name="corenet_tcp_connect_dns_port" lineno="24440">
12394 <summary>
12395 Make a TCP connection to the dns port.
12396 </summary>
12397 @@ -25070,7 +25149,7 @@ Domain allowed access.
12398 </summary>
12399 </param>
12400 </interface>
12401 -<interface name="corenet_send_dns_client_packets" lineno="23916">
12402 +<interface name="corenet_send_dns_client_packets" lineno="24460">
12403 <summary>
12404 Send dns_client packets.
12405 </summary>
12406 @@ -25081,7 +25160,7 @@ Domain allowed access.
12407 </param>
12408 <infoflow type="write" weight="10"/>
12409 </interface>
12410 -<interface name="corenet_dontaudit_send_dns_client_packets" lineno="23935">
12411 +<interface name="corenet_dontaudit_send_dns_client_packets" lineno="24479">
12412 <summary>
12413 Do not audit attempts to send dns_client packets.
12414 </summary>
12415 @@ -25092,7 +25171,7 @@ Domain to not audit.
12416 </param>
12417 <infoflow type="none"/>
12418 </interface>
12419 -<interface name="corenet_receive_dns_client_packets" lineno="23954">
12420 +<interface name="corenet_receive_dns_client_packets" lineno="24498">
12421 <summary>
12422 Receive dns_client packets.
12423 </summary>
12424 @@ -25103,7 +25182,7 @@ Domain allowed access.
12425 </param>
12426 <infoflow type="read" weight="10"/>
12427 </interface>
12428 -<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="23973">
12429 +<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="24517">
12430 <summary>
12431 Do not audit attempts to receive dns_client packets.
12432 </summary>
12433 @@ -25114,7 +25193,7 @@ Domain allowed access.
12434 </param>
12435 <infoflow type="none"/>
12436 </interface>
12437 -<interface name="corenet_sendrecv_dns_client_packets" lineno="23992">
12438 +<interface name="corenet_sendrecv_dns_client_packets" lineno="24536">
12439 <summary>
12440 Send and receive dns_client packets.
12441 </summary>
12442 @@ -25125,7 +25204,7 @@ Domain allowed access.
12443 </param>
12444 <infoflow type="both" weight="10"/>
12445 </interface>
12446 -<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="24008">
12447 +<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="24552">
12448 <summary>
12449 Do not audit attempts to send and receive dns_client packets.
12450 </summary>
12451 @@ -25136,7 +25215,7 @@ Domain to not audit.
12452 </param>
12453 <infoflow type="none"/>
12454 </interface>
12455 -<interface name="corenet_relabelto_dns_client_packets" lineno="24023">
12456 +<interface name="corenet_relabelto_dns_client_packets" lineno="24567">
12457 <summary>
12458 Relabel packets to dns_client the packet type.
12459 </summary>
12460 @@ -25146,7 +25225,7 @@ Domain allowed access.
12461 </summary>
12462 </param>
12463 </interface>
12464 -<interface name="corenet_send_dns_server_packets" lineno="24043">
12465 +<interface name="corenet_send_dns_server_packets" lineno="24587">
12466 <summary>
12467 Send dns_server packets.
12468 </summary>
12469 @@ -25157,7 +25236,7 @@ Domain allowed access.
12470 </param>
12471 <infoflow type="write" weight="10"/>
12472 </interface>
12473 -<interface name="corenet_dontaudit_send_dns_server_packets" lineno="24062">
12474 +<interface name="corenet_dontaudit_send_dns_server_packets" lineno="24606">
12475 <summary>
12476 Do not audit attempts to send dns_server packets.
12477 </summary>
12478 @@ -25168,7 +25247,7 @@ Domain to not audit.
12479 </param>
12480 <infoflow type="none"/>
12481 </interface>
12482 -<interface name="corenet_receive_dns_server_packets" lineno="24081">
12483 +<interface name="corenet_receive_dns_server_packets" lineno="24625">
12484 <summary>
12485 Receive dns_server packets.
12486 </summary>
12487 @@ -25179,7 +25258,7 @@ Domain allowed access.
12488 </param>
12489 <infoflow type="read" weight="10"/>
12490 </interface>
12491 -<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="24100">
12492 +<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="24644">
12493 <summary>
12494 Do not audit attempts to receive dns_server packets.
12495 </summary>
12496 @@ -25190,7 +25269,7 @@ Domain allowed access.
12497 </param>
12498 <infoflow type="none"/>
12499 </interface>
12500 -<interface name="corenet_sendrecv_dns_server_packets" lineno="24119">
12501 +<interface name="corenet_sendrecv_dns_server_packets" lineno="24663">
12502 <summary>
12503 Send and receive dns_server packets.
12504 </summary>
12505 @@ -25201,7 +25280,7 @@ Domain allowed access.
12506 </param>
12507 <infoflow type="both" weight="10"/>
12508 </interface>
12509 -<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="24135">
12510 +<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="24679">
12511 <summary>
12512 Do not audit attempts to send and receive dns_server packets.
12513 </summary>
12514 @@ -25212,7 +25291,7 @@ Domain to not audit.
12515 </param>
12516 <infoflow type="none"/>
12517 </interface>
12518 -<interface name="corenet_relabelto_dns_server_packets" lineno="24150">
12519 +<interface name="corenet_relabelto_dns_server_packets" lineno="24694">
12520 <summary>
12521 Relabel packets to dns_server the packet type.
12522 </summary>
12523 @@ -25222,7 +25301,7 @@ Domain allowed access.
12524 </summary>
12525 </param>
12526 </interface>
12527 -<interface name="corenet_tcp_sendrecv_dropbox_port" lineno="24172">
12528 +<interface name="corenet_tcp_sendrecv_dropbox_port" lineno="24716">
12529 <summary>
12530 Send and receive TCP traffic on the dropbox port.
12531 </summary>
12532 @@ -25233,7 +25312,7 @@ Domain allowed access.
12533 </param>
12534 <infoflow type="both" weight="10"/>
12535 </interface>
12536 -<interface name="corenet_udp_send_dropbox_port" lineno="24187">
12537 +<interface name="corenet_udp_send_dropbox_port" lineno="24731">
12538 <summary>
12539 Send UDP traffic on the dropbox port.
12540 </summary>
12541 @@ -25244,7 +25323,7 @@ Domain allowed access.
12542 </param>
12543 <infoflow type="write" weight="10"/>
12544 </interface>
12545 -<interface name="corenet_dontaudit_udp_send_dropbox_port" lineno="24202">
12546 +<interface name="corenet_dontaudit_udp_send_dropbox_port" lineno="24746">
12547 <summary>
12548 Do not audit attempts to send UDP traffic on the dropbox port.
12549 </summary>
12550 @@ -25255,7 +25334,7 @@ Domain to not audit.
12551 </param>
12552 <infoflow type="none"/>
12553 </interface>
12554 -<interface name="corenet_udp_receive_dropbox_port" lineno="24217">
12555 +<interface name="corenet_udp_receive_dropbox_port" lineno="24761">
12556 <summary>
12557 Receive UDP traffic on the dropbox port.
12558 </summary>
12559 @@ -25266,7 +25345,7 @@ Domain allowed access.
12560 </param>
12561 <infoflow type="read" weight="10"/>
12562 </interface>
12563 -<interface name="corenet_dontaudit_udp_receive_dropbox_port" lineno="24232">
12564 +<interface name="corenet_dontaudit_udp_receive_dropbox_port" lineno="24776">
12565 <summary>
12566 Do not audit attempts to receive UDP traffic on the dropbox port.
12567 </summary>
12568 @@ -25277,7 +25356,7 @@ Domain to not audit.
12569 </param>
12570 <infoflow type="none"/>
12571 </interface>
12572 -<interface name="corenet_udp_sendrecv_dropbox_port" lineno="24247">
12573 +<interface name="corenet_udp_sendrecv_dropbox_port" lineno="24791">
12574 <summary>
12575 Send and receive UDP traffic on the dropbox port.
12576 </summary>
12577 @@ -25288,7 +25367,7 @@ Domain allowed access.
12578 </param>
12579 <infoflow type="both" weight="10"/>
12580 </interface>
12581 -<interface name="corenet_dontaudit_udp_sendrecv_dropbox_port" lineno="24263">
12582 +<interface name="corenet_dontaudit_udp_sendrecv_dropbox_port" lineno="24807">
12583 <summary>
12584 Do not audit attempts to send and receive
12585 UDP traffic on the dropbox port.
12586 @@ -25300,7 +25379,7 @@ Domain to not audit.
12587 </param>
12588 <infoflow type="none"/>
12589 </interface>
12590 -<interface name="corenet_tcp_bind_dropbox_port" lineno="24278">
12591 +<interface name="corenet_tcp_bind_dropbox_port" lineno="24822">
12592 <summary>
12593 Bind TCP sockets to the dropbox port.
12594 </summary>
12595 @@ -25311,7 +25390,7 @@ Domain allowed access.
12596 </param>
12597 <infoflow type="none"/>
12598 </interface>
12599 -<interface name="corenet_udp_bind_dropbox_port" lineno="24298">
12600 +<interface name="corenet_udp_bind_dropbox_port" lineno="24842">
12601 <summary>
12602 Bind UDP sockets to the dropbox port.
12603 </summary>
12604 @@ -25322,7 +25401,7 @@ Domain allowed access.
12605 </param>
12606 <infoflow type="none"/>
12607 </interface>
12608 -<interface name="corenet_tcp_connect_dropbox_port" lineno="24317">
12609 +<interface name="corenet_tcp_connect_dropbox_port" lineno="24861">
12610 <summary>
12611 Make a TCP connection to the dropbox port.
12612 </summary>
12613 @@ -25332,7 +25411,7 @@ Domain allowed access.
12614 </summary>
12615 </param>
12616 </interface>
12617 -<interface name="corenet_send_dropbox_client_packets" lineno="24337">
12618 +<interface name="corenet_send_dropbox_client_packets" lineno="24881">
12619 <summary>
12620 Send dropbox_client packets.
12621 </summary>
12622 @@ -25343,7 +25422,7 @@ Domain allowed access.
12623 </param>
12624 <infoflow type="write" weight="10"/>
12625 </interface>
12626 -<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="24356">
12627 +<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="24900">
12628 <summary>
12629 Do not audit attempts to send dropbox_client packets.
12630 </summary>
12631 @@ -25354,7 +25433,7 @@ Domain to not audit.
12632 </param>
12633 <infoflow type="none"/>
12634 </interface>
12635 -<interface name="corenet_receive_dropbox_client_packets" lineno="24375">
12636 +<interface name="corenet_receive_dropbox_client_packets" lineno="24919">
12637 <summary>
12638 Receive dropbox_client packets.
12639 </summary>
12640 @@ -25365,7 +25444,7 @@ Domain allowed access.
12641 </param>
12642 <infoflow type="read" weight="10"/>
12643 </interface>
12644 -<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="24394">
12645 +<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="24938">
12646 <summary>
12647 Do not audit attempts to receive dropbox_client packets.
12648 </summary>
12649 @@ -25376,7 +25455,7 @@ Domain allowed access.
12650 </param>
12651 <infoflow type="none"/>
12652 </interface>
12653 -<interface name="corenet_sendrecv_dropbox_client_packets" lineno="24413">
12654 +<interface name="corenet_sendrecv_dropbox_client_packets" lineno="24957">
12655 <summary>
12656 Send and receive dropbox_client packets.
12657 </summary>
12658 @@ -25387,7 +25466,7 @@ Domain allowed access.
12659 </param>
12660 <infoflow type="both" weight="10"/>
12661 </interface>
12662 -<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="24429">
12663 +<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="24973">
12664 <summary>
12665 Do not audit attempts to send and receive dropbox_client packets.
12666 </summary>
12667 @@ -25398,7 +25477,7 @@ Domain to not audit.
12668 </param>
12669 <infoflow type="none"/>
12670 </interface>
12671 -<interface name="corenet_relabelto_dropbox_client_packets" lineno="24444">
12672 +<interface name="corenet_relabelto_dropbox_client_packets" lineno="24988">
12673 <summary>
12674 Relabel packets to dropbox_client the packet type.
12675 </summary>
12676 @@ -25408,7 +25487,7 @@ Domain allowed access.
12677 </summary>
12678 </param>
12679 </interface>
12680 -<interface name="corenet_send_dropbox_server_packets" lineno="24464">
12681 +<interface name="corenet_send_dropbox_server_packets" lineno="25008">
12682 <summary>
12683 Send dropbox_server packets.
12684 </summary>
12685 @@ -25419,7 +25498,7 @@ Domain allowed access.
12686 </param>
12687 <infoflow type="write" weight="10"/>
12688 </interface>
12689 -<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="24483">
12690 +<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="25027">
12691 <summary>
12692 Do not audit attempts to send dropbox_server packets.
12693 </summary>
12694 @@ -25430,7 +25509,7 @@ Domain to not audit.
12695 </param>
12696 <infoflow type="none"/>
12697 </interface>
12698 -<interface name="corenet_receive_dropbox_server_packets" lineno="24502">
12699 +<interface name="corenet_receive_dropbox_server_packets" lineno="25046">
12700 <summary>
12701 Receive dropbox_server packets.
12702 </summary>
12703 @@ -25441,7 +25520,7 @@ Domain allowed access.
12704 </param>
12705 <infoflow type="read" weight="10"/>
12706 </interface>
12707 -<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="24521">
12708 +<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="25065">
12709 <summary>
12710 Do not audit attempts to receive dropbox_server packets.
12711 </summary>
12712 @@ -25452,7 +25531,7 @@ Domain allowed access.
12713 </param>
12714 <infoflow type="none"/>
12715 </interface>
12716 -<interface name="corenet_sendrecv_dropbox_server_packets" lineno="24540">
12717 +<interface name="corenet_sendrecv_dropbox_server_packets" lineno="25084">
12718 <summary>
12719 Send and receive dropbox_server packets.
12720 </summary>
12721 @@ -25463,7 +25542,7 @@ Domain allowed access.
12722 </param>
12723 <infoflow type="both" weight="10"/>
12724 </interface>
12725 -<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="24556">
12726 +<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="25100">
12727 <summary>
12728 Do not audit attempts to send and receive dropbox_server packets.
12729 </summary>
12730 @@ -25474,7 +25553,7 @@ Domain to not audit.
12731 </param>
12732 <infoflow type="none"/>
12733 </interface>
12734 -<interface name="corenet_relabelto_dropbox_server_packets" lineno="24571">
12735 +<interface name="corenet_relabelto_dropbox_server_packets" lineno="25115">
12736 <summary>
12737 Relabel packets to dropbox_server the packet type.
12738 </summary>
12739 @@ -25484,7 +25563,7 @@ Domain allowed access.
12740 </summary>
12741 </param>
12742 </interface>
12743 -<interface name="corenet_tcp_sendrecv_efs_port" lineno="24593">
12744 +<interface name="corenet_tcp_sendrecv_efs_port" lineno="25137">
12745 <summary>
12746 Send and receive TCP traffic on the efs port.
12747 </summary>
12748 @@ -25495,7 +25574,7 @@ Domain allowed access.
12749 </param>
12750 <infoflow type="both" weight="10"/>
12751 </interface>
12752 -<interface name="corenet_udp_send_efs_port" lineno="24608">
12753 +<interface name="corenet_udp_send_efs_port" lineno="25152">
12754 <summary>
12755 Send UDP traffic on the efs port.
12756 </summary>
12757 @@ -25506,7 +25585,7 @@ Domain allowed access.
12758 </param>
12759 <infoflow type="write" weight="10"/>
12760 </interface>
12761 -<interface name="corenet_dontaudit_udp_send_efs_port" lineno="24623">
12762 +<interface name="corenet_dontaudit_udp_send_efs_port" lineno="25167">
12763 <summary>
12764 Do not audit attempts to send UDP traffic on the efs port.
12765 </summary>
12766 @@ -25517,7 +25596,7 @@ Domain to not audit.
12767 </param>
12768 <infoflow type="none"/>
12769 </interface>
12770 -<interface name="corenet_udp_receive_efs_port" lineno="24638">
12771 +<interface name="corenet_udp_receive_efs_port" lineno="25182">
12772 <summary>
12773 Receive UDP traffic on the efs port.
12774 </summary>
12775 @@ -25528,7 +25607,7 @@ Domain allowed access.
12776 </param>
12777 <infoflow type="read" weight="10"/>
12778 </interface>
12779 -<interface name="corenet_dontaudit_udp_receive_efs_port" lineno="24653">
12780 +<interface name="corenet_dontaudit_udp_receive_efs_port" lineno="25197">
12781 <summary>
12782 Do not audit attempts to receive UDP traffic on the efs port.
12783 </summary>
12784 @@ -25539,7 +25618,7 @@ Domain to not audit.
12785 </param>
12786 <infoflow type="none"/>
12787 </interface>
12788 -<interface name="corenet_udp_sendrecv_efs_port" lineno="24668">
12789 +<interface name="corenet_udp_sendrecv_efs_port" lineno="25212">
12790 <summary>
12791 Send and receive UDP traffic on the efs port.
12792 </summary>
12793 @@ -25550,7 +25629,7 @@ Domain allowed access.
12794 </param>
12795 <infoflow type="both" weight="10"/>
12796 </interface>
12797 -<interface name="corenet_dontaudit_udp_sendrecv_efs_port" lineno="24684">
12798 +<interface name="corenet_dontaudit_udp_sendrecv_efs_port" lineno="25228">
12799 <summary>
12800 Do not audit attempts to send and receive
12801 UDP traffic on the efs port.
12802 @@ -25562,7 +25641,7 @@ Domain to not audit.
12803 </param>
12804 <infoflow type="none"/>
12805 </interface>
12806 -<interface name="corenet_tcp_bind_efs_port" lineno="24699">
12807 +<interface name="corenet_tcp_bind_efs_port" lineno="25243">
12808 <summary>
12809 Bind TCP sockets to the efs port.
12810 </summary>
12811 @@ -25573,7 +25652,7 @@ Domain allowed access.
12812 </param>
12813 <infoflow type="none"/>
12814 </interface>
12815 -<interface name="corenet_udp_bind_efs_port" lineno="24719">
12816 +<interface name="corenet_udp_bind_efs_port" lineno="25263">
12817 <summary>
12818 Bind UDP sockets to the efs port.
12819 </summary>
12820 @@ -25584,7 +25663,7 @@ Domain allowed access.
12821 </param>
12822 <infoflow type="none"/>
12823 </interface>
12824 -<interface name="corenet_tcp_connect_efs_port" lineno="24738">
12825 +<interface name="corenet_tcp_connect_efs_port" lineno="25282">
12826 <summary>
12827 Make a TCP connection to the efs port.
12828 </summary>
12829 @@ -25594,7 +25673,7 @@ Domain allowed access.
12830 </summary>
12831 </param>
12832 </interface>
12833 -<interface name="corenet_send_efs_client_packets" lineno="24758">
12834 +<interface name="corenet_send_efs_client_packets" lineno="25302">
12835 <summary>
12836 Send efs_client packets.
12837 </summary>
12838 @@ -25605,7 +25684,7 @@ Domain allowed access.
12839 </param>
12840 <infoflow type="write" weight="10"/>
12841 </interface>
12842 -<interface name="corenet_dontaudit_send_efs_client_packets" lineno="24777">
12843 +<interface name="corenet_dontaudit_send_efs_client_packets" lineno="25321">
12844 <summary>
12845 Do not audit attempts to send efs_client packets.
12846 </summary>
12847 @@ -25616,7 +25695,7 @@ Domain to not audit.
12848 </param>
12849 <infoflow type="none"/>
12850 </interface>
12851 -<interface name="corenet_receive_efs_client_packets" lineno="24796">
12852 +<interface name="corenet_receive_efs_client_packets" lineno="25340">
12853 <summary>
12854 Receive efs_client packets.
12855 </summary>
12856 @@ -25627,7 +25706,7 @@ Domain allowed access.
12857 </param>
12858 <infoflow type="read" weight="10"/>
12859 </interface>
12860 -<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="24815">
12861 +<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="25359">
12862 <summary>
12863 Do not audit attempts to receive efs_client packets.
12864 </summary>
12865 @@ -25638,7 +25717,7 @@ Domain allowed access.
12866 </param>
12867 <infoflow type="none"/>
12868 </interface>
12869 -<interface name="corenet_sendrecv_efs_client_packets" lineno="24834">
12870 +<interface name="corenet_sendrecv_efs_client_packets" lineno="25378">
12871 <summary>
12872 Send and receive efs_client packets.
12873 </summary>
12874 @@ -25649,7 +25728,7 @@ Domain allowed access.
12875 </param>
12876 <infoflow type="both" weight="10"/>
12877 </interface>
12878 -<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="24850">
12879 +<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="25394">
12880 <summary>
12881 Do not audit attempts to send and receive efs_client packets.
12882 </summary>
12883 @@ -25660,7 +25739,7 @@ Domain to not audit.
12884 </param>
12885 <infoflow type="none"/>
12886 </interface>
12887 -<interface name="corenet_relabelto_efs_client_packets" lineno="24865">
12888 +<interface name="corenet_relabelto_efs_client_packets" lineno="25409">
12889 <summary>
12890 Relabel packets to efs_client the packet type.
12891 </summary>
12892 @@ -25670,7 +25749,7 @@ Domain allowed access.
12893 </summary>
12894 </param>
12895 </interface>
12896 -<interface name="corenet_send_efs_server_packets" lineno="24885">
12897 +<interface name="corenet_send_efs_server_packets" lineno="25429">
12898 <summary>
12899 Send efs_server packets.
12900 </summary>
12901 @@ -25681,7 +25760,7 @@ Domain allowed access.
12902 </param>
12903 <infoflow type="write" weight="10"/>
12904 </interface>
12905 -<interface name="corenet_dontaudit_send_efs_server_packets" lineno="24904">
12906 +<interface name="corenet_dontaudit_send_efs_server_packets" lineno="25448">
12907 <summary>
12908 Do not audit attempts to send efs_server packets.
12909 </summary>
12910 @@ -25692,7 +25771,7 @@ Domain to not audit.
12911 </param>
12912 <infoflow type="none"/>
12913 </interface>
12914 -<interface name="corenet_receive_efs_server_packets" lineno="24923">
12915 +<interface name="corenet_receive_efs_server_packets" lineno="25467">
12916 <summary>
12917 Receive efs_server packets.
12918 </summary>
12919 @@ -25703,7 +25782,7 @@ Domain allowed access.
12920 </param>
12921 <infoflow type="read" weight="10"/>
12922 </interface>
12923 -<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="24942">
12924 +<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="25486">
12925 <summary>
12926 Do not audit attempts to receive efs_server packets.
12927 </summary>
12928 @@ -25714,7 +25793,7 @@ Domain allowed access.
12929 </param>
12930 <infoflow type="none"/>
12931 </interface>
12932 -<interface name="corenet_sendrecv_efs_server_packets" lineno="24961">
12933 +<interface name="corenet_sendrecv_efs_server_packets" lineno="25505">
12934 <summary>
12935 Send and receive efs_server packets.
12936 </summary>
12937 @@ -25725,7 +25804,7 @@ Domain allowed access.
12938 </param>
12939 <infoflow type="both" weight="10"/>
12940 </interface>
12941 -<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="24977">
12942 +<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="25521">
12943 <summary>
12944 Do not audit attempts to send and receive efs_server packets.
12945 </summary>
12946 @@ -25736,7 +25815,7 @@ Domain to not audit.
12947 </param>
12948 <infoflow type="none"/>
12949 </interface>
12950 -<interface name="corenet_relabelto_efs_server_packets" lineno="24992">
12951 +<interface name="corenet_relabelto_efs_server_packets" lineno="25536">
12952 <summary>
12953 Relabel packets to efs_server the packet type.
12954 </summary>
12955 @@ -25746,7 +25825,7 @@ Domain allowed access.
12956 </summary>
12957 </param>
12958 </interface>
12959 -<interface name="corenet_tcp_sendrecv_embrace_dp_c_port" lineno="25014">
12960 +<interface name="corenet_tcp_sendrecv_embrace_dp_c_port" lineno="25558">
12961 <summary>
12962 Send and receive TCP traffic on the embrace_dp_c port.
12963 </summary>
12964 @@ -25757,7 +25836,7 @@ Domain allowed access.
12965 </param>
12966 <infoflow type="both" weight="10"/>
12967 </interface>
12968 -<interface name="corenet_udp_send_embrace_dp_c_port" lineno="25029">
12969 +<interface name="corenet_udp_send_embrace_dp_c_port" lineno="25573">
12970 <summary>
12971 Send UDP traffic on the embrace_dp_c port.
12972 </summary>
12973 @@ -25768,7 +25847,7 @@ Domain allowed access.
12974 </param>
12975 <infoflow type="write" weight="10"/>
12976 </interface>
12977 -<interface name="corenet_dontaudit_udp_send_embrace_dp_c_port" lineno="25044">
12978 +<interface name="corenet_dontaudit_udp_send_embrace_dp_c_port" lineno="25588">
12979 <summary>
12980 Do not audit attempts to send UDP traffic on the embrace_dp_c port.
12981 </summary>
12982 @@ -25779,7 +25858,7 @@ Domain to not audit.
12983 </param>
12984 <infoflow type="none"/>
12985 </interface>
12986 -<interface name="corenet_udp_receive_embrace_dp_c_port" lineno="25059">
12987 +<interface name="corenet_udp_receive_embrace_dp_c_port" lineno="25603">
12988 <summary>
12989 Receive UDP traffic on the embrace_dp_c port.
12990 </summary>
12991 @@ -25790,7 +25869,7 @@ Domain allowed access.
12992 </param>
12993 <infoflow type="read" weight="10"/>
12994 </interface>
12995 -<interface name="corenet_dontaudit_udp_receive_embrace_dp_c_port" lineno="25074">
12996 +<interface name="corenet_dontaudit_udp_receive_embrace_dp_c_port" lineno="25618">
12997 <summary>
12998 Do not audit attempts to receive UDP traffic on the embrace_dp_c port.
12999 </summary>
13000 @@ -25801,7 +25880,7 @@ Domain to not audit.
13001 </param>
13002 <infoflow type="none"/>
13003 </interface>
13004 -<interface name="corenet_udp_sendrecv_embrace_dp_c_port" lineno="25089">
13005 +<interface name="corenet_udp_sendrecv_embrace_dp_c_port" lineno="25633">
13006 <summary>
13007 Send and receive UDP traffic on the embrace_dp_c port.
13008 </summary>
13009 @@ -25812,7 +25891,7 @@ Domain allowed access.
13010 </param>
13011 <infoflow type="both" weight="10"/>
13012 </interface>
13013 -<interface name="corenet_dontaudit_udp_sendrecv_embrace_dp_c_port" lineno="25105">
13014 +<interface name="corenet_dontaudit_udp_sendrecv_embrace_dp_c_port" lineno="25649">
13015 <summary>
13016 Do not audit attempts to send and receive
13017 UDP traffic on the embrace_dp_c port.
13018 @@ -25824,7 +25903,7 @@ Domain to not audit.
13019 </param>
13020 <infoflow type="none"/>
13021 </interface>
13022 -<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="25120">
13023 +<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="25664">
13024 <summary>
13025 Bind TCP sockets to the embrace_dp_c port.
13026 </summary>
13027 @@ -25835,7 +25914,7 @@ Domain allowed access.
13028 </param>
13029 <infoflow type="none"/>
13030 </interface>
13031 -<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="25140">
13032 +<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="25684">
13033 <summary>
13034 Bind UDP sockets to the embrace_dp_c port.
13035 </summary>
13036 @@ -25846,7 +25925,7 @@ Domain allowed access.
13037 </param>
13038 <infoflow type="none"/>
13039 </interface>
13040 -<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="25159">
13041 +<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="25703">
13042 <summary>
13043 Make a TCP connection to the embrace_dp_c port.
13044 </summary>
13045 @@ -25856,7 +25935,7 @@ Domain allowed access.
13046 </summary>
13047 </param>
13048 </interface>
13049 -<interface name="corenet_send_embrace_dp_c_client_packets" lineno="25179">
13050 +<interface name="corenet_send_embrace_dp_c_client_packets" lineno="25723">
13051 <summary>
13052 Send embrace_dp_c_client packets.
13053 </summary>
13054 @@ -25867,7 +25946,7 @@ Domain allowed access.
13055 </param>
13056 <infoflow type="write" weight="10"/>
13057 </interface>
13058 -<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="25198">
13059 +<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="25742">
13060 <summary>
13061 Do not audit attempts to send embrace_dp_c_client packets.
13062 </summary>
13063 @@ -25878,7 +25957,7 @@ Domain to not audit.
13064 </param>
13065 <infoflow type="none"/>
13066 </interface>
13067 -<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="25217">
13068 +<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="25761">
13069 <summary>
13070 Receive embrace_dp_c_client packets.
13071 </summary>
13072 @@ -25889,7 +25968,7 @@ Domain allowed access.
13073 </param>
13074 <infoflow type="read" weight="10"/>
13075 </interface>
13076 -<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="25236">
13077 +<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="25780">
13078 <summary>
13079 Do not audit attempts to receive embrace_dp_c_client packets.
13080 </summary>
13081 @@ -25900,7 +25979,7 @@ Domain allowed access.
13082 </param>
13083 <infoflow type="none"/>
13084 </interface>
13085 -<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="25255">
13086 +<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="25799">
13087 <summary>
13088 Send and receive embrace_dp_c_client packets.
13089 </summary>
13090 @@ -25911,7 +25990,7 @@ Domain allowed access.
13091 </param>
13092 <infoflow type="both" weight="10"/>
13093 </interface>
13094 -<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="25271">
13095 +<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="25815">
13096 <summary>
13097 Do not audit attempts to send and receive embrace_dp_c_client packets.
13098 </summary>
13099 @@ -25922,7 +26001,7 @@ Domain to not audit.
13100 </param>
13101 <infoflow type="none"/>
13102 </interface>
13103 -<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="25286">
13104 +<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="25830">
13105 <summary>
13106 Relabel packets to embrace_dp_c_client the packet type.
13107 </summary>
13108 @@ -25932,7 +26011,7 @@ Domain allowed access.
13109 </summary>
13110 </param>
13111 </interface>
13112 -<interface name="corenet_send_embrace_dp_c_server_packets" lineno="25306">
13113 +<interface name="corenet_send_embrace_dp_c_server_packets" lineno="25850">
13114 <summary>
13115 Send embrace_dp_c_server packets.
13116 </summary>
13117 @@ -25943,7 +26022,7 @@ Domain allowed access.
13118 </param>
13119 <infoflow type="write" weight="10"/>
13120 </interface>
13121 -<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="25325">
13122 +<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="25869">
13123 <summary>
13124 Do not audit attempts to send embrace_dp_c_server packets.
13125 </summary>
13126 @@ -25954,7 +26033,7 @@ Domain to not audit.
13127 </param>
13128 <infoflow type="none"/>
13129 </interface>
13130 -<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="25344">
13131 +<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="25888">
13132 <summary>
13133 Receive embrace_dp_c_server packets.
13134 </summary>
13135 @@ -25965,7 +26044,7 @@ Domain allowed access.
13136 </param>
13137 <infoflow type="read" weight="10"/>
13138 </interface>
13139 -<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="25363">
13140 +<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="25907">
13141 <summary>
13142 Do not audit attempts to receive embrace_dp_c_server packets.
13143 </summary>
13144 @@ -25976,7 +26055,7 @@ Domain allowed access.
13145 </param>
13146 <infoflow type="none"/>
13147 </interface>
13148 -<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="25382">
13149 +<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="25926">
13150 <summary>
13151 Send and receive embrace_dp_c_server packets.
13152 </summary>
13153 @@ -25987,7 +26066,7 @@ Domain allowed access.
13154 </param>
13155 <infoflow type="both" weight="10"/>
13156 </interface>
13157 -<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="25398">
13158 +<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="25942">
13159 <summary>
13160 Do not audit attempts to send and receive embrace_dp_c_server packets.
13161 </summary>
13162 @@ -25998,7 +26077,7 @@ Domain to not audit.
13163 </param>
13164 <infoflow type="none"/>
13165 </interface>
13166 -<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="25413">
13167 +<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="25957">
13168 <summary>
13169 Relabel packets to embrace_dp_c_server the packet type.
13170 </summary>
13171 @@ -26008,7 +26087,7 @@ Domain allowed access.
13172 </summary>
13173 </param>
13174 </interface>
13175 -<interface name="corenet_tcp_sendrecv_epmap_port" lineno="25435">
13176 +<interface name="corenet_tcp_sendrecv_epmap_port" lineno="25979">
13177 <summary>
13178 Send and receive TCP traffic on the epmap port.
13179 </summary>
13180 @@ -26019,7 +26098,7 @@ Domain allowed access.
13181 </param>
13182 <infoflow type="both" weight="10"/>
13183 </interface>
13184 -<interface name="corenet_udp_send_epmap_port" lineno="25450">
13185 +<interface name="corenet_udp_send_epmap_port" lineno="25994">
13186 <summary>
13187 Send UDP traffic on the epmap port.
13188 </summary>
13189 @@ -26030,7 +26109,7 @@ Domain allowed access.
13190 </param>
13191 <infoflow type="write" weight="10"/>
13192 </interface>
13193 -<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="25465">
13194 +<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="26009">
13195 <summary>
13196 Do not audit attempts to send UDP traffic on the epmap port.
13197 </summary>
13198 @@ -26041,7 +26120,7 @@ Domain to not audit.
13199 </param>
13200 <infoflow type="none"/>
13201 </interface>
13202 -<interface name="corenet_udp_receive_epmap_port" lineno="25480">
13203 +<interface name="corenet_udp_receive_epmap_port" lineno="26024">
13204 <summary>
13205 Receive UDP traffic on the epmap port.
13206 </summary>
13207 @@ -26052,7 +26131,7 @@ Domain allowed access.
13208 </param>
13209 <infoflow type="read" weight="10"/>
13210 </interface>
13211 -<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="25495">
13212 +<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="26039">
13213 <summary>
13214 Do not audit attempts to receive UDP traffic on the epmap port.
13215 </summary>
13216 @@ -26063,7 +26142,7 @@ Domain to not audit.
13217 </param>
13218 <infoflow type="none"/>
13219 </interface>
13220 -<interface name="corenet_udp_sendrecv_epmap_port" lineno="25510">
13221 +<interface name="corenet_udp_sendrecv_epmap_port" lineno="26054">
13222 <summary>
13223 Send and receive UDP traffic on the epmap port.
13224 </summary>
13225 @@ -26074,7 +26153,7 @@ Domain allowed access.
13226 </param>
13227 <infoflow type="both" weight="10"/>
13228 </interface>
13229 -<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="25526">
13230 +<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="26070">
13231 <summary>
13232 Do not audit attempts to send and receive
13233 UDP traffic on the epmap port.
13234 @@ -26086,7 +26165,7 @@ Domain to not audit.
13235 </param>
13236 <infoflow type="none"/>
13237 </interface>
13238 -<interface name="corenet_tcp_bind_epmap_port" lineno="25541">
13239 +<interface name="corenet_tcp_bind_epmap_port" lineno="26085">
13240 <summary>
13241 Bind TCP sockets to the epmap port.
13242 </summary>
13243 @@ -26097,7 +26176,7 @@ Domain allowed access.
13244 </param>
13245 <infoflow type="none"/>
13246 </interface>
13247 -<interface name="corenet_udp_bind_epmap_port" lineno="25561">
13248 +<interface name="corenet_udp_bind_epmap_port" lineno="26105">
13249 <summary>
13250 Bind UDP sockets to the epmap port.
13251 </summary>
13252 @@ -26108,7 +26187,7 @@ Domain allowed access.
13253 </param>
13254 <infoflow type="none"/>
13255 </interface>
13256 -<interface name="corenet_tcp_connect_epmap_port" lineno="25580">
13257 +<interface name="corenet_tcp_connect_epmap_port" lineno="26124">
13258 <summary>
13259 Make a TCP connection to the epmap port.
13260 </summary>
13261 @@ -26118,7 +26197,7 @@ Domain allowed access.
13262 </summary>
13263 </param>
13264 </interface>
13265 -<interface name="corenet_send_epmap_client_packets" lineno="25600">
13266 +<interface name="corenet_send_epmap_client_packets" lineno="26144">
13267 <summary>
13268 Send epmap_client packets.
13269 </summary>
13270 @@ -26129,7 +26208,7 @@ Domain allowed access.
13271 </param>
13272 <infoflow type="write" weight="10"/>
13273 </interface>
13274 -<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="25619">
13275 +<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="26163">
13276 <summary>
13277 Do not audit attempts to send epmap_client packets.
13278 </summary>
13279 @@ -26140,7 +26219,7 @@ Domain to not audit.
13280 </param>
13281 <infoflow type="none"/>
13282 </interface>
13283 -<interface name="corenet_receive_epmap_client_packets" lineno="25638">
13284 +<interface name="corenet_receive_epmap_client_packets" lineno="26182">
13285 <summary>
13286 Receive epmap_client packets.
13287 </summary>
13288 @@ -26151,7 +26230,7 @@ Domain allowed access.
13289 </param>
13290 <infoflow type="read" weight="10"/>
13291 </interface>
13292 -<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="25657">
13293 +<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="26201">
13294 <summary>
13295 Do not audit attempts to receive epmap_client packets.
13296 </summary>
13297 @@ -26162,7 +26241,7 @@ Domain allowed access.
13298 </param>
13299 <infoflow type="none"/>
13300 </interface>
13301 -<interface name="corenet_sendrecv_epmap_client_packets" lineno="25676">
13302 +<interface name="corenet_sendrecv_epmap_client_packets" lineno="26220">
13303 <summary>
13304 Send and receive epmap_client packets.
13305 </summary>
13306 @@ -26173,7 +26252,7 @@ Domain allowed access.
13307 </param>
13308 <infoflow type="both" weight="10"/>
13309 </interface>
13310 -<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="25692">
13311 +<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="26236">
13312 <summary>
13313 Do not audit attempts to send and receive epmap_client packets.
13314 </summary>
13315 @@ -26184,7 +26263,7 @@ Domain to not audit.
13316 </param>
13317 <infoflow type="none"/>
13318 </interface>
13319 -<interface name="corenet_relabelto_epmap_client_packets" lineno="25707">
13320 +<interface name="corenet_relabelto_epmap_client_packets" lineno="26251">
13321 <summary>
13322 Relabel packets to epmap_client the packet type.
13323 </summary>
13324 @@ -26194,7 +26273,7 @@ Domain allowed access.
13325 </summary>
13326 </param>
13327 </interface>
13328 -<interface name="corenet_send_epmap_server_packets" lineno="25727">
13329 +<interface name="corenet_send_epmap_server_packets" lineno="26271">
13330 <summary>
13331 Send epmap_server packets.
13332 </summary>
13333 @@ -26205,7 +26284,7 @@ Domain allowed access.
13334 </param>
13335 <infoflow type="write" weight="10"/>
13336 </interface>
13337 -<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="25746">
13338 +<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="26290">
13339 <summary>
13340 Do not audit attempts to send epmap_server packets.
13341 </summary>
13342 @@ -26216,7 +26295,7 @@ Domain to not audit.
13343 </param>
13344 <infoflow type="none"/>
13345 </interface>
13346 -<interface name="corenet_receive_epmap_server_packets" lineno="25765">
13347 +<interface name="corenet_receive_epmap_server_packets" lineno="26309">
13348 <summary>
13349 Receive epmap_server packets.
13350 </summary>
13351 @@ -26227,7 +26306,7 @@ Domain allowed access.
13352 </param>
13353 <infoflow type="read" weight="10"/>
13354 </interface>
13355 -<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="25784">
13356 +<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="26328">
13357 <summary>
13358 Do not audit attempts to receive epmap_server packets.
13359 </summary>
13360 @@ -26238,7 +26317,7 @@ Domain allowed access.
13361 </param>
13362 <infoflow type="none"/>
13363 </interface>
13364 -<interface name="corenet_sendrecv_epmap_server_packets" lineno="25803">
13365 +<interface name="corenet_sendrecv_epmap_server_packets" lineno="26347">
13366 <summary>
13367 Send and receive epmap_server packets.
13368 </summary>
13369 @@ -26249,7 +26328,7 @@ Domain allowed access.
13370 </param>
13371 <infoflow type="both" weight="10"/>
13372 </interface>
13373 -<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="25819">
13374 +<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="26363">
13375 <summary>
13376 Do not audit attempts to send and receive epmap_server packets.
13377 </summary>
13378 @@ -26260,7 +26339,7 @@ Domain to not audit.
13379 </param>
13380 <infoflow type="none"/>
13381 </interface>
13382 -<interface name="corenet_relabelto_epmap_server_packets" lineno="25834">
13383 +<interface name="corenet_relabelto_epmap_server_packets" lineno="26378">
13384 <summary>
13385 Relabel packets to epmap_server the packet type.
13386 </summary>
13387 @@ -26270,7 +26349,7 @@ Domain allowed access.
13388 </summary>
13389 </param>
13390 </interface>
13391 -<interface name="corenet_tcp_sendrecv_epmd_port" lineno="25856">
13392 +<interface name="corenet_tcp_sendrecv_epmd_port" lineno="26400">
13393 <summary>
13394 Send and receive TCP traffic on the epmd port.
13395 </summary>
13396 @@ -26281,7 +26360,7 @@ Domain allowed access.
13397 </param>
13398 <infoflow type="both" weight="10"/>
13399 </interface>
13400 -<interface name="corenet_udp_send_epmd_port" lineno="25871">
13401 +<interface name="corenet_udp_send_epmd_port" lineno="26415">
13402 <summary>
13403 Send UDP traffic on the epmd port.
13404 </summary>
13405 @@ -26292,7 +26371,7 @@ Domain allowed access.
13406 </param>
13407 <infoflow type="write" weight="10"/>
13408 </interface>
13409 -<interface name="corenet_dontaudit_udp_send_epmd_port" lineno="25886">
13410 +<interface name="corenet_dontaudit_udp_send_epmd_port" lineno="26430">
13411 <summary>
13412 Do not audit attempts to send UDP traffic on the epmd port.
13413 </summary>
13414 @@ -26303,7 +26382,7 @@ Domain to not audit.
13415 </param>
13416 <infoflow type="none"/>
13417 </interface>
13418 -<interface name="corenet_udp_receive_epmd_port" lineno="25901">
13419 +<interface name="corenet_udp_receive_epmd_port" lineno="26445">
13420 <summary>
13421 Receive UDP traffic on the epmd port.
13422 </summary>
13423 @@ -26314,7 +26393,7 @@ Domain allowed access.
13424 </param>
13425 <infoflow type="read" weight="10"/>
13426 </interface>
13427 -<interface name="corenet_dontaudit_udp_receive_epmd_port" lineno="25916">
13428 +<interface name="corenet_dontaudit_udp_receive_epmd_port" lineno="26460">
13429 <summary>
13430 Do not audit attempts to receive UDP traffic on the epmd port.
13431 </summary>
13432 @@ -26325,7 +26404,7 @@ Domain to not audit.
13433 </param>
13434 <infoflow type="none"/>
13435 </interface>
13436 -<interface name="corenet_udp_sendrecv_epmd_port" lineno="25931">
13437 +<interface name="corenet_udp_sendrecv_epmd_port" lineno="26475">
13438 <summary>
13439 Send and receive UDP traffic on the epmd port.
13440 </summary>
13441 @@ -26336,7 +26415,7 @@ Domain allowed access.
13442 </param>
13443 <infoflow type="both" weight="10"/>
13444 </interface>
13445 -<interface name="corenet_dontaudit_udp_sendrecv_epmd_port" lineno="25947">
13446 +<interface name="corenet_dontaudit_udp_sendrecv_epmd_port" lineno="26491">
13447 <summary>
13448 Do not audit attempts to send and receive
13449 UDP traffic on the epmd port.
13450 @@ -26348,7 +26427,7 @@ Domain to not audit.
13451 </param>
13452 <infoflow type="none"/>
13453 </interface>
13454 -<interface name="corenet_tcp_bind_epmd_port" lineno="25962">
13455 +<interface name="corenet_tcp_bind_epmd_port" lineno="26506">
13456 <summary>
13457 Bind TCP sockets to the epmd port.
13458 </summary>
13459 @@ -26359,7 +26438,7 @@ Domain allowed access.
13460 </param>
13461 <infoflow type="none"/>
13462 </interface>
13463 -<interface name="corenet_udp_bind_epmd_port" lineno="25982">
13464 +<interface name="corenet_udp_bind_epmd_port" lineno="26526">
13465 <summary>
13466 Bind UDP sockets to the epmd port.
13467 </summary>
13468 @@ -26370,7 +26449,7 @@ Domain allowed access.
13469 </param>
13470 <infoflow type="none"/>
13471 </interface>
13472 -<interface name="corenet_tcp_connect_epmd_port" lineno="26001">
13473 +<interface name="corenet_tcp_connect_epmd_port" lineno="26545">
13474 <summary>
13475 Make a TCP connection to the epmd port.
13476 </summary>
13477 @@ -26380,7 +26459,7 @@ Domain allowed access.
13478 </summary>
13479 </param>
13480 </interface>
13481 -<interface name="corenet_send_epmd_client_packets" lineno="26021">
13482 +<interface name="corenet_send_epmd_client_packets" lineno="26565">
13483 <summary>
13484 Send epmd_client packets.
13485 </summary>
13486 @@ -26391,7 +26470,7 @@ Domain allowed access.
13487 </param>
13488 <infoflow type="write" weight="10"/>
13489 </interface>
13490 -<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="26040">
13491 +<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="26584">
13492 <summary>
13493 Do not audit attempts to send epmd_client packets.
13494 </summary>
13495 @@ -26402,7 +26481,7 @@ Domain to not audit.
13496 </param>
13497 <infoflow type="none"/>
13498 </interface>
13499 -<interface name="corenet_receive_epmd_client_packets" lineno="26059">
13500 +<interface name="corenet_receive_epmd_client_packets" lineno="26603">
13501 <summary>
13502 Receive epmd_client packets.
13503 </summary>
13504 @@ -26413,7 +26492,7 @@ Domain allowed access.
13505 </param>
13506 <infoflow type="read" weight="10"/>
13507 </interface>
13508 -<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="26078">
13509 +<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="26622">
13510 <summary>
13511 Do not audit attempts to receive epmd_client packets.
13512 </summary>
13513 @@ -26424,7 +26503,7 @@ Domain allowed access.
13514 </param>
13515 <infoflow type="none"/>
13516 </interface>
13517 -<interface name="corenet_sendrecv_epmd_client_packets" lineno="26097">
13518 +<interface name="corenet_sendrecv_epmd_client_packets" lineno="26641">
13519 <summary>
13520 Send and receive epmd_client packets.
13521 </summary>
13522 @@ -26435,7 +26514,7 @@ Domain allowed access.
13523 </param>
13524 <infoflow type="both" weight="10"/>
13525 </interface>
13526 -<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="26113">
13527 +<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="26657">
13528 <summary>
13529 Do not audit attempts to send and receive epmd_client packets.
13530 </summary>
13531 @@ -26446,7 +26525,7 @@ Domain to not audit.
13532 </param>
13533 <infoflow type="none"/>
13534 </interface>
13535 -<interface name="corenet_relabelto_epmd_client_packets" lineno="26128">
13536 +<interface name="corenet_relabelto_epmd_client_packets" lineno="26672">
13537 <summary>
13538 Relabel packets to epmd_client the packet type.
13539 </summary>
13540 @@ -26456,7 +26535,7 @@ Domain allowed access.
13541 </summary>
13542 </param>
13543 </interface>
13544 -<interface name="corenet_send_epmd_server_packets" lineno="26148">
13545 +<interface name="corenet_send_epmd_server_packets" lineno="26692">
13546 <summary>
13547 Send epmd_server packets.
13548 </summary>
13549 @@ -26467,7 +26546,7 @@ Domain allowed access.
13550 </param>
13551 <infoflow type="write" weight="10"/>
13552 </interface>
13553 -<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="26167">
13554 +<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="26711">
13555 <summary>
13556 Do not audit attempts to send epmd_server packets.
13557 </summary>
13558 @@ -26478,7 +26557,7 @@ Domain to not audit.
13559 </param>
13560 <infoflow type="none"/>
13561 </interface>
13562 -<interface name="corenet_receive_epmd_server_packets" lineno="26186">
13563 +<interface name="corenet_receive_epmd_server_packets" lineno="26730">
13564 <summary>
13565 Receive epmd_server packets.
13566 </summary>
13567 @@ -26489,7 +26568,7 @@ Domain allowed access.
13568 </param>
13569 <infoflow type="read" weight="10"/>
13570 </interface>
13571 -<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="26205">
13572 +<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="26749">
13573 <summary>
13574 Do not audit attempts to receive epmd_server packets.
13575 </summary>
13576 @@ -26500,7 +26579,7 @@ Domain allowed access.
13577 </param>
13578 <infoflow type="none"/>
13579 </interface>
13580 -<interface name="corenet_sendrecv_epmd_server_packets" lineno="26224">
13581 +<interface name="corenet_sendrecv_epmd_server_packets" lineno="26768">
13582 <summary>
13583 Send and receive epmd_server packets.
13584 </summary>
13585 @@ -26511,7 +26590,7 @@ Domain allowed access.
13586 </param>
13587 <infoflow type="both" weight="10"/>
13588 </interface>
13589 -<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="26240">
13590 +<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="26784">
13591 <summary>
13592 Do not audit attempts to send and receive epmd_server packets.
13593 </summary>
13594 @@ -26522,7 +26601,7 @@ Domain to not audit.
13595 </param>
13596 <infoflow type="none"/>
13597 </interface>
13598 -<interface name="corenet_relabelto_epmd_server_packets" lineno="26255">
13599 +<interface name="corenet_relabelto_epmd_server_packets" lineno="26799">
13600 <summary>
13601 Relabel packets to epmd_server the packet type.
13602 </summary>
13603 @@ -26532,7 +26611,7 @@ Domain allowed access.
13604 </summary>
13605 </param>
13606 </interface>
13607 -<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="26277">
13608 +<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="26821">
13609 <summary>
13610 Send and receive TCP traffic on the fingerd port.
13611 </summary>
13612 @@ -26543,7 +26622,7 @@ Domain allowed access.
13613 </param>
13614 <infoflow type="both" weight="10"/>
13615 </interface>
13616 -<interface name="corenet_udp_send_fingerd_port" lineno="26292">
13617 +<interface name="corenet_udp_send_fingerd_port" lineno="26836">
13618 <summary>
13619 Send UDP traffic on the fingerd port.
13620 </summary>
13621 @@ -26554,7 +26633,7 @@ Domain allowed access.
13622 </param>
13623 <infoflow type="write" weight="10"/>
13624 </interface>
13625 -<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="26307">
13626 +<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="26851">
13627 <summary>
13628 Do not audit attempts to send UDP traffic on the fingerd port.
13629 </summary>
13630 @@ -26565,7 +26644,7 @@ Domain to not audit.
13631 </param>
13632 <infoflow type="none"/>
13633 </interface>
13634 -<interface name="corenet_udp_receive_fingerd_port" lineno="26322">
13635 +<interface name="corenet_udp_receive_fingerd_port" lineno="26866">
13636 <summary>
13637 Receive UDP traffic on the fingerd port.
13638 </summary>
13639 @@ -26576,7 +26655,7 @@ Domain allowed access.
13640 </param>
13641 <infoflow type="read" weight="10"/>
13642 </interface>
13643 -<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="26337">
13644 +<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="26881">
13645 <summary>
13646 Do not audit attempts to receive UDP traffic on the fingerd port.
13647 </summary>
13648 @@ -26587,7 +26666,7 @@ Domain to not audit.
13649 </param>
13650 <infoflow type="none"/>
13651 </interface>
13652 -<interface name="corenet_udp_sendrecv_fingerd_port" lineno="26352">
13653 +<interface name="corenet_udp_sendrecv_fingerd_port" lineno="26896">
13654 <summary>
13655 Send and receive UDP traffic on the fingerd port.
13656 </summary>
13657 @@ -26598,7 +26677,7 @@ Domain allowed access.
13658 </param>
13659 <infoflow type="both" weight="10"/>
13660 </interface>
13661 -<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="26368">
13662 +<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="26912">
13663 <summary>
13664 Do not audit attempts to send and receive
13665 UDP traffic on the fingerd port.
13666 @@ -26610,7 +26689,7 @@ Domain to not audit.
13667 </param>
13668 <infoflow type="none"/>
13669 </interface>
13670 -<interface name="corenet_tcp_bind_fingerd_port" lineno="26383">
13671 +<interface name="corenet_tcp_bind_fingerd_port" lineno="26927">
13672 <summary>
13673 Bind TCP sockets to the fingerd port.
13674 </summary>
13675 @@ -26621,7 +26700,7 @@ Domain allowed access.
13676 </param>
13677 <infoflow type="none"/>
13678 </interface>
13679 -<interface name="corenet_udp_bind_fingerd_port" lineno="26403">
13680 +<interface name="corenet_udp_bind_fingerd_port" lineno="26947">
13681 <summary>
13682 Bind UDP sockets to the fingerd port.
13683 </summary>
13684 @@ -26632,7 +26711,7 @@ Domain allowed access.
13685 </param>
13686 <infoflow type="none"/>
13687 </interface>
13688 -<interface name="corenet_tcp_connect_fingerd_port" lineno="26422">
13689 +<interface name="corenet_tcp_connect_fingerd_port" lineno="26966">
13690 <summary>
13691 Make a TCP connection to the fingerd port.
13692 </summary>
13693 @@ -26642,7 +26721,7 @@ Domain allowed access.
13694 </summary>
13695 </param>
13696 </interface>
13697 -<interface name="corenet_send_fingerd_client_packets" lineno="26442">
13698 +<interface name="corenet_send_fingerd_client_packets" lineno="26986">
13699 <summary>
13700 Send fingerd_client packets.
13701 </summary>
13702 @@ -26653,7 +26732,7 @@ Domain allowed access.
13703 </param>
13704 <infoflow type="write" weight="10"/>
13705 </interface>
13706 -<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="26461">
13707 +<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="27005">
13708 <summary>
13709 Do not audit attempts to send fingerd_client packets.
13710 </summary>
13711 @@ -26664,7 +26743,7 @@ Domain to not audit.
13712 </param>
13713 <infoflow type="none"/>
13714 </interface>
13715 -<interface name="corenet_receive_fingerd_client_packets" lineno="26480">
13716 +<interface name="corenet_receive_fingerd_client_packets" lineno="27024">
13717 <summary>
13718 Receive fingerd_client packets.
13719 </summary>
13720 @@ -26675,7 +26754,7 @@ Domain allowed access.
13721 </param>
13722 <infoflow type="read" weight="10"/>
13723 </interface>
13724 -<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="26499">
13725 +<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="27043">
13726 <summary>
13727 Do not audit attempts to receive fingerd_client packets.
13728 </summary>
13729 @@ -26686,7 +26765,7 @@ Domain allowed access.
13730 </param>
13731 <infoflow type="none"/>
13732 </interface>
13733 -<interface name="corenet_sendrecv_fingerd_client_packets" lineno="26518">
13734 +<interface name="corenet_sendrecv_fingerd_client_packets" lineno="27062">
13735 <summary>
13736 Send and receive fingerd_client packets.
13737 </summary>
13738 @@ -26697,7 +26776,7 @@ Domain allowed access.
13739 </param>
13740 <infoflow type="both" weight="10"/>
13741 </interface>
13742 -<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="26534">
13743 +<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="27078">
13744 <summary>
13745 Do not audit attempts to send and receive fingerd_client packets.
13746 </summary>
13747 @@ -26708,7 +26787,7 @@ Domain to not audit.
13748 </param>
13749 <infoflow type="none"/>
13750 </interface>
13751 -<interface name="corenet_relabelto_fingerd_client_packets" lineno="26549">
13752 +<interface name="corenet_relabelto_fingerd_client_packets" lineno="27093">
13753 <summary>
13754 Relabel packets to fingerd_client the packet type.
13755 </summary>
13756 @@ -26718,7 +26797,7 @@ Domain allowed access.
13757 </summary>
13758 </param>
13759 </interface>
13760 -<interface name="corenet_send_fingerd_server_packets" lineno="26569">
13761 +<interface name="corenet_send_fingerd_server_packets" lineno="27113">
13762 <summary>
13763 Send fingerd_server packets.
13764 </summary>
13765 @@ -26729,7 +26808,7 @@ Domain allowed access.
13766 </param>
13767 <infoflow type="write" weight="10"/>
13768 </interface>
13769 -<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="26588">
13770 +<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="27132">
13771 <summary>
13772 Do not audit attempts to send fingerd_server packets.
13773 </summary>
13774 @@ -26740,7 +26819,7 @@ Domain to not audit.
13775 </param>
13776 <infoflow type="none"/>
13777 </interface>
13778 -<interface name="corenet_receive_fingerd_server_packets" lineno="26607">
13779 +<interface name="corenet_receive_fingerd_server_packets" lineno="27151">
13780 <summary>
13781 Receive fingerd_server packets.
13782 </summary>
13783 @@ -26751,7 +26830,7 @@ Domain allowed access.
13784 </param>
13785 <infoflow type="read" weight="10"/>
13786 </interface>
13787 -<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="26626">
13788 +<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="27170">
13789 <summary>
13790 Do not audit attempts to receive fingerd_server packets.
13791 </summary>
13792 @@ -26762,7 +26841,7 @@ Domain allowed access.
13793 </param>
13794 <infoflow type="none"/>
13795 </interface>
13796 -<interface name="corenet_sendrecv_fingerd_server_packets" lineno="26645">
13797 +<interface name="corenet_sendrecv_fingerd_server_packets" lineno="27189">
13798 <summary>
13799 Send and receive fingerd_server packets.
13800 </summary>
13801 @@ -26773,7 +26852,7 @@ Domain allowed access.
13802 </param>
13803 <infoflow type="both" weight="10"/>
13804 </interface>
13805 -<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="26661">
13806 +<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="27205">
13807 <summary>
13808 Do not audit attempts to send and receive fingerd_server packets.
13809 </summary>
13810 @@ -26784,7 +26863,7 @@ Domain to not audit.
13811 </param>
13812 <infoflow type="none"/>
13813 </interface>
13814 -<interface name="corenet_relabelto_fingerd_server_packets" lineno="26676">
13815 +<interface name="corenet_relabelto_fingerd_server_packets" lineno="27220">
13816 <summary>
13817 Relabel packets to fingerd_server the packet type.
13818 </summary>
13819 @@ -26794,7 +26873,7 @@ Domain allowed access.
13820 </summary>
13821 </param>
13822 </interface>
13823 -<interface name="corenet_tcp_sendrecv_ftp_port" lineno="26698">
13824 +<interface name="corenet_tcp_sendrecv_ftp_port" lineno="27242">
13825 <summary>
13826 Send and receive TCP traffic on the ftp port.
13827 </summary>
13828 @@ -26805,7 +26884,7 @@ Domain allowed access.
13829 </param>
13830 <infoflow type="both" weight="10"/>
13831 </interface>
13832 -<interface name="corenet_udp_send_ftp_port" lineno="26713">
13833 +<interface name="corenet_udp_send_ftp_port" lineno="27257">
13834 <summary>
13835 Send UDP traffic on the ftp port.
13836 </summary>
13837 @@ -26816,7 +26895,7 @@ Domain allowed access.
13838 </param>
13839 <infoflow type="write" weight="10"/>
13840 </interface>
13841 -<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="26728">
13842 +<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="27272">
13843 <summary>
13844 Do not audit attempts to send UDP traffic on the ftp port.
13845 </summary>
13846 @@ -26827,7 +26906,7 @@ Domain to not audit.
13847 </param>
13848 <infoflow type="none"/>
13849 </interface>
13850 -<interface name="corenet_udp_receive_ftp_port" lineno="26743">
13851 +<interface name="corenet_udp_receive_ftp_port" lineno="27287">
13852 <summary>
13853 Receive UDP traffic on the ftp port.
13854 </summary>
13855 @@ -26838,7 +26917,7 @@ Domain allowed access.
13856 </param>
13857 <infoflow type="read" weight="10"/>
13858 </interface>
13859 -<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="26758">
13860 +<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="27302">
13861 <summary>
13862 Do not audit attempts to receive UDP traffic on the ftp port.
13863 </summary>
13864 @@ -26849,7 +26928,7 @@ Domain to not audit.
13865 </param>
13866 <infoflow type="none"/>
13867 </interface>
13868 -<interface name="corenet_udp_sendrecv_ftp_port" lineno="26773">
13869 +<interface name="corenet_udp_sendrecv_ftp_port" lineno="27317">
13870 <summary>
13871 Send and receive UDP traffic on the ftp port.
13872 </summary>
13873 @@ -26860,7 +26939,7 @@ Domain allowed access.
13874 </param>
13875 <infoflow type="both" weight="10"/>
13876 </interface>
13877 -<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="26789">
13878 +<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="27333">
13879 <summary>
13880 Do not audit attempts to send and receive
13881 UDP traffic on the ftp port.
13882 @@ -26872,7 +26951,7 @@ Domain to not audit.
13883 </param>
13884 <infoflow type="none"/>
13885 </interface>
13886 -<interface name="corenet_tcp_bind_ftp_port" lineno="26804">
13887 +<interface name="corenet_tcp_bind_ftp_port" lineno="27348">
13888 <summary>
13889 Bind TCP sockets to the ftp port.
13890 </summary>
13891 @@ -26883,7 +26962,7 @@ Domain allowed access.
13892 </param>
13893 <infoflow type="none"/>
13894 </interface>
13895 -<interface name="corenet_udp_bind_ftp_port" lineno="26824">
13896 +<interface name="corenet_udp_bind_ftp_port" lineno="27368">
13897 <summary>
13898 Bind UDP sockets to the ftp port.
13899 </summary>
13900 @@ -26894,7 +26973,7 @@ Domain allowed access.
13901 </param>
13902 <infoflow type="none"/>
13903 </interface>
13904 -<interface name="corenet_tcp_connect_ftp_port" lineno="26843">
13905 +<interface name="corenet_tcp_connect_ftp_port" lineno="27387">
13906 <summary>
13907 Make a TCP connection to the ftp port.
13908 </summary>
13909 @@ -26904,7 +26983,7 @@ Domain allowed access.
13910 </summary>
13911 </param>
13912 </interface>
13913 -<interface name="corenet_send_ftp_client_packets" lineno="26863">
13914 +<interface name="corenet_send_ftp_client_packets" lineno="27407">
13915 <summary>
13916 Send ftp_client packets.
13917 </summary>
13918 @@ -26915,7 +26994,7 @@ Domain allowed access.
13919 </param>
13920 <infoflow type="write" weight="10"/>
13921 </interface>
13922 -<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="26882">
13923 +<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="27426">
13924 <summary>
13925 Do not audit attempts to send ftp_client packets.
13926 </summary>
13927 @@ -26926,7 +27005,7 @@ Domain to not audit.
13928 </param>
13929 <infoflow type="none"/>
13930 </interface>
13931 -<interface name="corenet_receive_ftp_client_packets" lineno="26901">
13932 +<interface name="corenet_receive_ftp_client_packets" lineno="27445">
13933 <summary>
13934 Receive ftp_client packets.
13935 </summary>
13936 @@ -26937,7 +27016,7 @@ Domain allowed access.
13937 </param>
13938 <infoflow type="read" weight="10"/>
13939 </interface>
13940 -<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="26920">
13941 +<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="27464">
13942 <summary>
13943 Do not audit attempts to receive ftp_client packets.
13944 </summary>
13945 @@ -26948,7 +27027,7 @@ Domain allowed access.
13946 </param>
13947 <infoflow type="none"/>
13948 </interface>
13949 -<interface name="corenet_sendrecv_ftp_client_packets" lineno="26939">
13950 +<interface name="corenet_sendrecv_ftp_client_packets" lineno="27483">
13951 <summary>
13952 Send and receive ftp_client packets.
13953 </summary>
13954 @@ -26959,7 +27038,7 @@ Domain allowed access.
13955 </param>
13956 <infoflow type="both" weight="10"/>
13957 </interface>
13958 -<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="26955">
13959 +<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="27499">
13960 <summary>
13961 Do not audit attempts to send and receive ftp_client packets.
13962 </summary>
13963 @@ -26970,7 +27049,7 @@ Domain to not audit.
13964 </param>
13965 <infoflow type="none"/>
13966 </interface>
13967 -<interface name="corenet_relabelto_ftp_client_packets" lineno="26970">
13968 +<interface name="corenet_relabelto_ftp_client_packets" lineno="27514">
13969 <summary>
13970 Relabel packets to ftp_client the packet type.
13971 </summary>
13972 @@ -26980,7 +27059,7 @@ Domain allowed access.
13973 </summary>
13974 </param>
13975 </interface>
13976 -<interface name="corenet_send_ftp_server_packets" lineno="26990">
13977 +<interface name="corenet_send_ftp_server_packets" lineno="27534">
13978 <summary>
13979 Send ftp_server packets.
13980 </summary>
13981 @@ -26991,7 +27070,7 @@ Domain allowed access.
13982 </param>
13983 <infoflow type="write" weight="10"/>
13984 </interface>
13985 -<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="27009">
13986 +<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="27553">
13987 <summary>
13988 Do not audit attempts to send ftp_server packets.
13989 </summary>
13990 @@ -27002,7 +27081,7 @@ Domain to not audit.
13991 </param>
13992 <infoflow type="none"/>
13993 </interface>
13994 -<interface name="corenet_receive_ftp_server_packets" lineno="27028">
13995 +<interface name="corenet_receive_ftp_server_packets" lineno="27572">
13996 <summary>
13997 Receive ftp_server packets.
13998 </summary>
13999 @@ -27013,7 +27092,7 @@ Domain allowed access.
14000 </param>
14001 <infoflow type="read" weight="10"/>
14002 </interface>
14003 -<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="27047">
14004 +<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="27591">
14005 <summary>
14006 Do not audit attempts to receive ftp_server packets.
14007 </summary>
14008 @@ -27024,7 +27103,7 @@ Domain allowed access.
14009 </param>
14010 <infoflow type="none"/>
14011 </interface>
14012 -<interface name="corenet_sendrecv_ftp_server_packets" lineno="27066">
14013 +<interface name="corenet_sendrecv_ftp_server_packets" lineno="27610">
14014 <summary>
14015 Send and receive ftp_server packets.
14016 </summary>
14017 @@ -27035,7 +27114,7 @@ Domain allowed access.
14018 </param>
14019 <infoflow type="both" weight="10"/>
14020 </interface>
14021 -<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="27082">
14022 +<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="27626">
14023 <summary>
14024 Do not audit attempts to send and receive ftp_server packets.
14025 </summary>
14026 @@ -27046,7 +27125,7 @@ Domain to not audit.
14027 </param>
14028 <infoflow type="none"/>
14029 </interface>
14030 -<interface name="corenet_relabelto_ftp_server_packets" lineno="27097">
14031 +<interface name="corenet_relabelto_ftp_server_packets" lineno="27641">
14032 <summary>
14033 Relabel packets to ftp_server the packet type.
14034 </summary>
14035 @@ -27056,7 +27135,7 @@ Domain allowed access.
14036 </summary>
14037 </param>
14038 </interface>
14039 -<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="27119">
14040 +<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="27663">
14041 <summary>
14042 Send and receive TCP traffic on the ftp_data port.
14043 </summary>
14044 @@ -27067,7 +27146,7 @@ Domain allowed access.
14045 </param>
14046 <infoflow type="both" weight="10"/>
14047 </interface>
14048 -<interface name="corenet_udp_send_ftp_data_port" lineno="27134">
14049 +<interface name="corenet_udp_send_ftp_data_port" lineno="27678">
14050 <summary>
14051 Send UDP traffic on the ftp_data port.
14052 </summary>
14053 @@ -27078,7 +27157,7 @@ Domain allowed access.
14054 </param>
14055 <infoflow type="write" weight="10"/>
14056 </interface>
14057 -<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="27149">
14058 +<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="27693">
14059 <summary>
14060 Do not audit attempts to send UDP traffic on the ftp_data port.
14061 </summary>
14062 @@ -27089,7 +27168,7 @@ Domain to not audit.
14063 </param>
14064 <infoflow type="none"/>
14065 </interface>
14066 -<interface name="corenet_udp_receive_ftp_data_port" lineno="27164">
14067 +<interface name="corenet_udp_receive_ftp_data_port" lineno="27708">
14068 <summary>
14069 Receive UDP traffic on the ftp_data port.
14070 </summary>
14071 @@ -27100,7 +27179,7 @@ Domain allowed access.
14072 </param>
14073 <infoflow type="read" weight="10"/>
14074 </interface>
14075 -<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="27179">
14076 +<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="27723">
14077 <summary>
14078 Do not audit attempts to receive UDP traffic on the ftp_data port.
14079 </summary>
14080 @@ -27111,7 +27190,7 @@ Domain to not audit.
14081 </param>
14082 <infoflow type="none"/>
14083 </interface>
14084 -<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="27194">
14085 +<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="27738">
14086 <summary>
14087 Send and receive UDP traffic on the ftp_data port.
14088 </summary>
14089 @@ -27122,7 +27201,7 @@ Domain allowed access.
14090 </param>
14091 <infoflow type="both" weight="10"/>
14092 </interface>
14093 -<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="27210">
14094 +<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="27754">
14095 <summary>
14096 Do not audit attempts to send and receive
14097 UDP traffic on the ftp_data port.
14098 @@ -27134,7 +27213,7 @@ Domain to not audit.
14099 </param>
14100 <infoflow type="none"/>
14101 </interface>
14102 -<interface name="corenet_tcp_bind_ftp_data_port" lineno="27225">
14103 +<interface name="corenet_tcp_bind_ftp_data_port" lineno="27769">
14104 <summary>
14105 Bind TCP sockets to the ftp_data port.
14106 </summary>
14107 @@ -27145,7 +27224,7 @@ Domain allowed access.
14108 </param>
14109 <infoflow type="none"/>
14110 </interface>
14111 -<interface name="corenet_udp_bind_ftp_data_port" lineno="27245">
14112 +<interface name="corenet_udp_bind_ftp_data_port" lineno="27789">
14113 <summary>
14114 Bind UDP sockets to the ftp_data port.
14115 </summary>
14116 @@ -27156,7 +27235,7 @@ Domain allowed access.
14117 </param>
14118 <infoflow type="none"/>
14119 </interface>
14120 -<interface name="corenet_tcp_connect_ftp_data_port" lineno="27264">
14121 +<interface name="corenet_tcp_connect_ftp_data_port" lineno="27808">
14122 <summary>
14123 Make a TCP connection to the ftp_data port.
14124 </summary>
14125 @@ -27166,7 +27245,7 @@ Domain allowed access.
14126 </summary>
14127 </param>
14128 </interface>
14129 -<interface name="corenet_send_ftp_data_client_packets" lineno="27284">
14130 +<interface name="corenet_send_ftp_data_client_packets" lineno="27828">
14131 <summary>
14132 Send ftp_data_client packets.
14133 </summary>
14134 @@ -27177,7 +27256,7 @@ Domain allowed access.
14135 </param>
14136 <infoflow type="write" weight="10"/>
14137 </interface>
14138 -<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="27303">
14139 +<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="27847">
14140 <summary>
14141 Do not audit attempts to send ftp_data_client packets.
14142 </summary>
14143 @@ -27188,7 +27267,7 @@ Domain to not audit.
14144 </param>
14145 <infoflow type="none"/>
14146 </interface>
14147 -<interface name="corenet_receive_ftp_data_client_packets" lineno="27322">
14148 +<interface name="corenet_receive_ftp_data_client_packets" lineno="27866">
14149 <summary>
14150 Receive ftp_data_client packets.
14151 </summary>
14152 @@ -27199,7 +27278,7 @@ Domain allowed access.
14153 </param>
14154 <infoflow type="read" weight="10"/>
14155 </interface>
14156 -<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="27341">
14157 +<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="27885">
14158 <summary>
14159 Do not audit attempts to receive ftp_data_client packets.
14160 </summary>
14161 @@ -27210,7 +27289,7 @@ Domain allowed access.
14162 </param>
14163 <infoflow type="none"/>
14164 </interface>
14165 -<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="27360">
14166 +<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="27904">
14167 <summary>
14168 Send and receive ftp_data_client packets.
14169 </summary>
14170 @@ -27221,7 +27300,7 @@ Domain allowed access.
14171 </param>
14172 <infoflow type="both" weight="10"/>
14173 </interface>
14174 -<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="27376">
14175 +<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="27920">
14176 <summary>
14177 Do not audit attempts to send and receive ftp_data_client packets.
14178 </summary>
14179 @@ -27232,7 +27311,7 @@ Domain to not audit.
14180 </param>
14181 <infoflow type="none"/>
14182 </interface>
14183 -<interface name="corenet_relabelto_ftp_data_client_packets" lineno="27391">
14184 +<interface name="corenet_relabelto_ftp_data_client_packets" lineno="27935">
14185 <summary>
14186 Relabel packets to ftp_data_client the packet type.
14187 </summary>
14188 @@ -27242,7 +27321,7 @@ Domain allowed access.
14189 </summary>
14190 </param>
14191 </interface>
14192 -<interface name="corenet_send_ftp_data_server_packets" lineno="27411">
14193 +<interface name="corenet_send_ftp_data_server_packets" lineno="27955">
14194 <summary>
14195 Send ftp_data_server packets.
14196 </summary>
14197 @@ -27253,7 +27332,7 @@ Domain allowed access.
14198 </param>
14199 <infoflow type="write" weight="10"/>
14200 </interface>
14201 -<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="27430">
14202 +<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="27974">
14203 <summary>
14204 Do not audit attempts to send ftp_data_server packets.
14205 </summary>
14206 @@ -27264,7 +27343,7 @@ Domain to not audit.
14207 </param>
14208 <infoflow type="none"/>
14209 </interface>
14210 -<interface name="corenet_receive_ftp_data_server_packets" lineno="27449">
14211 +<interface name="corenet_receive_ftp_data_server_packets" lineno="27993">
14212 <summary>
14213 Receive ftp_data_server packets.
14214 </summary>
14215 @@ -27275,7 +27354,7 @@ Domain allowed access.
14216 </param>
14217 <infoflow type="read" weight="10"/>
14218 </interface>
14219 -<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="27468">
14220 +<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="28012">
14221 <summary>
14222 Do not audit attempts to receive ftp_data_server packets.
14223 </summary>
14224 @@ -27286,7 +27365,7 @@ Domain allowed access.
14225 </param>
14226 <infoflow type="none"/>
14227 </interface>
14228 -<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="27487">
14229 +<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="28031">
14230 <summary>
14231 Send and receive ftp_data_server packets.
14232 </summary>
14233 @@ -27297,7 +27376,7 @@ Domain allowed access.
14234 </param>
14235 <infoflow type="both" weight="10"/>
14236 </interface>
14237 -<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="27503">
14238 +<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="28047">
14239 <summary>
14240 Do not audit attempts to send and receive ftp_data_server packets.
14241 </summary>
14242 @@ -27308,7 +27387,7 @@ Domain to not audit.
14243 </param>
14244 <infoflow type="none"/>
14245 </interface>
14246 -<interface name="corenet_relabelto_ftp_data_server_packets" lineno="27518">
14247 +<interface name="corenet_relabelto_ftp_data_server_packets" lineno="28062">
14248 <summary>
14249 Relabel packets to ftp_data_server the packet type.
14250 </summary>
14251 @@ -27318,7 +27397,7 @@ Domain allowed access.
14252 </summary>
14253 </param>
14254 </interface>
14255 -<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="27540">
14256 +<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="28084">
14257 <summary>
14258 Send and receive TCP traffic on the gatekeeper port.
14259 </summary>
14260 @@ -27329,7 +27408,7 @@ Domain allowed access.
14261 </param>
14262 <infoflow type="both" weight="10"/>
14263 </interface>
14264 -<interface name="corenet_udp_send_gatekeeper_port" lineno="27555">
14265 +<interface name="corenet_udp_send_gatekeeper_port" lineno="28099">
14266 <summary>
14267 Send UDP traffic on the gatekeeper port.
14268 </summary>
14269 @@ -27340,7 +27419,7 @@ Domain allowed access.
14270 </param>
14271 <infoflow type="write" weight="10"/>
14272 </interface>
14273 -<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="27570">
14274 +<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="28114">
14275 <summary>
14276 Do not audit attempts to send UDP traffic on the gatekeeper port.
14277 </summary>
14278 @@ -27351,7 +27430,7 @@ Domain to not audit.
14279 </param>
14280 <infoflow type="none"/>
14281 </interface>
14282 -<interface name="corenet_udp_receive_gatekeeper_port" lineno="27585">
14283 +<interface name="corenet_udp_receive_gatekeeper_port" lineno="28129">
14284 <summary>
14285 Receive UDP traffic on the gatekeeper port.
14286 </summary>
14287 @@ -27362,7 +27441,7 @@ Domain allowed access.
14288 </param>
14289 <infoflow type="read" weight="10"/>
14290 </interface>
14291 -<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="27600">
14292 +<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="28144">
14293 <summary>
14294 Do not audit attempts to receive UDP traffic on the gatekeeper port.
14295 </summary>
14296 @@ -27373,7 +27452,7 @@ Domain to not audit.
14297 </param>
14298 <infoflow type="none"/>
14299 </interface>
14300 -<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="27615">
14301 +<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="28159">
14302 <summary>
14303 Send and receive UDP traffic on the gatekeeper port.
14304 </summary>
14305 @@ -27384,7 +27463,7 @@ Domain allowed access.
14306 </param>
14307 <infoflow type="both" weight="10"/>
14308 </interface>
14309 -<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="27631">
14310 +<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="28175">
14311 <summary>
14312 Do not audit attempts to send and receive
14313 UDP traffic on the gatekeeper port.
14314 @@ -27396,7 +27475,7 @@ Domain to not audit.
14315 </param>
14316 <infoflow type="none"/>
14317 </interface>
14318 -<interface name="corenet_tcp_bind_gatekeeper_port" lineno="27646">
14319 +<interface name="corenet_tcp_bind_gatekeeper_port" lineno="28190">
14320 <summary>
14321 Bind TCP sockets to the gatekeeper port.
14322 </summary>
14323 @@ -27407,7 +27486,7 @@ Domain allowed access.
14324 </param>
14325 <infoflow type="none"/>
14326 </interface>
14327 -<interface name="corenet_udp_bind_gatekeeper_port" lineno="27666">
14328 +<interface name="corenet_udp_bind_gatekeeper_port" lineno="28210">
14329 <summary>
14330 Bind UDP sockets to the gatekeeper port.
14331 </summary>
14332 @@ -27418,7 +27497,7 @@ Domain allowed access.
14333 </param>
14334 <infoflow type="none"/>
14335 </interface>
14336 -<interface name="corenet_tcp_connect_gatekeeper_port" lineno="27685">
14337 +<interface name="corenet_tcp_connect_gatekeeper_port" lineno="28229">
14338 <summary>
14339 Make a TCP connection to the gatekeeper port.
14340 </summary>
14341 @@ -27428,7 +27507,7 @@ Domain allowed access.
14342 </summary>
14343 </param>
14344 </interface>
14345 -<interface name="corenet_send_gatekeeper_client_packets" lineno="27705">
14346 +<interface name="corenet_send_gatekeeper_client_packets" lineno="28249">
14347 <summary>
14348 Send gatekeeper_client packets.
14349 </summary>
14350 @@ -27439,7 +27518,7 @@ Domain allowed access.
14351 </param>
14352 <infoflow type="write" weight="10"/>
14353 </interface>
14354 -<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="27724">
14355 +<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="28268">
14356 <summary>
14357 Do not audit attempts to send gatekeeper_client packets.
14358 </summary>
14359 @@ -27450,7 +27529,7 @@ Domain to not audit.
14360 </param>
14361 <infoflow type="none"/>
14362 </interface>
14363 -<interface name="corenet_receive_gatekeeper_client_packets" lineno="27743">
14364 +<interface name="corenet_receive_gatekeeper_client_packets" lineno="28287">
14365 <summary>
14366 Receive gatekeeper_client packets.
14367 </summary>
14368 @@ -27461,7 +27540,7 @@ Domain allowed access.
14369 </param>
14370 <infoflow type="read" weight="10"/>
14371 </interface>
14372 -<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="27762">
14373 +<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="28306">
14374 <summary>
14375 Do not audit attempts to receive gatekeeper_client packets.
14376 </summary>
14377 @@ -27472,7 +27551,7 @@ Domain allowed access.
14378 </param>
14379 <infoflow type="none"/>
14380 </interface>
14381 -<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="27781">
14382 +<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="28325">
14383 <summary>
14384 Send and receive gatekeeper_client packets.
14385 </summary>
14386 @@ -27483,7 +27562,7 @@ Domain allowed access.
14387 </param>
14388 <infoflow type="both" weight="10"/>
14389 </interface>
14390 -<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="27797">
14391 +<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="28341">
14392 <summary>
14393 Do not audit attempts to send and receive gatekeeper_client packets.
14394 </summary>
14395 @@ -27494,7 +27573,7 @@ Domain to not audit.
14396 </param>
14397 <infoflow type="none"/>
14398 </interface>
14399 -<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="27812">
14400 +<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="28356">
14401 <summary>
14402 Relabel packets to gatekeeper_client the packet type.
14403 </summary>
14404 @@ -27504,7 +27583,7 @@ Domain allowed access.
14405 </summary>
14406 </param>
14407 </interface>
14408 -<interface name="corenet_send_gatekeeper_server_packets" lineno="27832">
14409 +<interface name="corenet_send_gatekeeper_server_packets" lineno="28376">
14410 <summary>
14411 Send gatekeeper_server packets.
14412 </summary>
14413 @@ -27515,7 +27594,7 @@ Domain allowed access.
14414 </param>
14415 <infoflow type="write" weight="10"/>
14416 </interface>
14417 -<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="27851">
14418 +<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="28395">
14419 <summary>
14420 Do not audit attempts to send gatekeeper_server packets.
14421 </summary>
14422 @@ -27526,7 +27605,7 @@ Domain to not audit.
14423 </param>
14424 <infoflow type="none"/>
14425 </interface>
14426 -<interface name="corenet_receive_gatekeeper_server_packets" lineno="27870">
14427 +<interface name="corenet_receive_gatekeeper_server_packets" lineno="28414">
14428 <summary>
14429 Receive gatekeeper_server packets.
14430 </summary>
14431 @@ -27537,7 +27616,7 @@ Domain allowed access.
14432 </param>
14433 <infoflow type="read" weight="10"/>
14434 </interface>
14435 -<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="27889">
14436 +<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="28433">
14437 <summary>
14438 Do not audit attempts to receive gatekeeper_server packets.
14439 </summary>
14440 @@ -27548,7 +27627,7 @@ Domain allowed access.
14441 </param>
14442 <infoflow type="none"/>
14443 </interface>
14444 -<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="27908">
14445 +<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="28452">
14446 <summary>
14447 Send and receive gatekeeper_server packets.
14448 </summary>
14449 @@ -27559,7 +27638,7 @@ Domain allowed access.
14450 </param>
14451 <infoflow type="both" weight="10"/>
14452 </interface>
14453 -<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="27924">
14454 +<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="28468">
14455 <summary>
14456 Do not audit attempts to send and receive gatekeeper_server packets.
14457 </summary>
14458 @@ -27570,7 +27649,7 @@ Domain to not audit.
14459 </param>
14460 <infoflow type="none"/>
14461 </interface>
14462 -<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="27939">
14463 +<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="28483">
14464 <summary>
14465 Relabel packets to gatekeeper_server the packet type.
14466 </summary>
14467 @@ -27580,7 +27659,7 @@ Domain allowed access.
14468 </summary>
14469 </param>
14470 </interface>
14471 -<interface name="corenet_tcp_sendrecv_gdomap_port" lineno="27961">
14472 +<interface name="corenet_tcp_sendrecv_gdomap_port" lineno="28505">
14473 <summary>
14474 Send and receive TCP traffic on the gdomap port.
14475 </summary>
14476 @@ -27591,7 +27670,7 @@ Domain allowed access.
14477 </param>
14478 <infoflow type="both" weight="10"/>
14479 </interface>
14480 -<interface name="corenet_udp_send_gdomap_port" lineno="27976">
14481 +<interface name="corenet_udp_send_gdomap_port" lineno="28520">
14482 <summary>
14483 Send UDP traffic on the gdomap port.
14484 </summary>
14485 @@ -27602,7 +27681,7 @@ Domain allowed access.
14486 </param>
14487 <infoflow type="write" weight="10"/>
14488 </interface>
14489 -<interface name="corenet_dontaudit_udp_send_gdomap_port" lineno="27991">
14490 +<interface name="corenet_dontaudit_udp_send_gdomap_port" lineno="28535">
14491 <summary>
14492 Do not audit attempts to send UDP traffic on the gdomap port.
14493 </summary>
14494 @@ -27613,7 +27692,7 @@ Domain to not audit.
14495 </param>
14496 <infoflow type="none"/>
14497 </interface>
14498 -<interface name="corenet_udp_receive_gdomap_port" lineno="28006">
14499 +<interface name="corenet_udp_receive_gdomap_port" lineno="28550">
14500 <summary>
14501 Receive UDP traffic on the gdomap port.
14502 </summary>
14503 @@ -27624,7 +27703,7 @@ Domain allowed access.
14504 </param>
14505 <infoflow type="read" weight="10"/>
14506 </interface>
14507 -<interface name="corenet_dontaudit_udp_receive_gdomap_port" lineno="28021">
14508 +<interface name="corenet_dontaudit_udp_receive_gdomap_port" lineno="28565">
14509 <summary>
14510 Do not audit attempts to receive UDP traffic on the gdomap port.
14511 </summary>
14512 @@ -27635,7 +27714,7 @@ Domain to not audit.
14513 </param>
14514 <infoflow type="none"/>
14515 </interface>
14516 -<interface name="corenet_udp_sendrecv_gdomap_port" lineno="28036">
14517 +<interface name="corenet_udp_sendrecv_gdomap_port" lineno="28580">
14518 <summary>
14519 Send and receive UDP traffic on the gdomap port.
14520 </summary>
14521 @@ -27646,7 +27725,7 @@ Domain allowed access.
14522 </param>
14523 <infoflow type="both" weight="10"/>
14524 </interface>
14525 -<interface name="corenet_dontaudit_udp_sendrecv_gdomap_port" lineno="28052">
14526 +<interface name="corenet_dontaudit_udp_sendrecv_gdomap_port" lineno="28596">
14527 <summary>
14528 Do not audit attempts to send and receive
14529 UDP traffic on the gdomap port.
14530 @@ -27658,7 +27737,7 @@ Domain to not audit.
14531 </param>
14532 <infoflow type="none"/>
14533 </interface>
14534 -<interface name="corenet_tcp_bind_gdomap_port" lineno="28067">
14535 +<interface name="corenet_tcp_bind_gdomap_port" lineno="28611">
14536 <summary>
14537 Bind TCP sockets to the gdomap port.
14538 </summary>
14539 @@ -27669,7 +27748,7 @@ Domain allowed access.
14540 </param>
14541 <infoflow type="none"/>
14542 </interface>
14543 -<interface name="corenet_udp_bind_gdomap_port" lineno="28087">
14544 +<interface name="corenet_udp_bind_gdomap_port" lineno="28631">
14545 <summary>
14546 Bind UDP sockets to the gdomap port.
14547 </summary>
14548 @@ -27680,7 +27759,7 @@ Domain allowed access.
14549 </param>
14550 <infoflow type="none"/>
14551 </interface>
14552 -<interface name="corenet_tcp_connect_gdomap_port" lineno="28106">
14553 +<interface name="corenet_tcp_connect_gdomap_port" lineno="28650">
14554 <summary>
14555 Make a TCP connection to the gdomap port.
14556 </summary>
14557 @@ -27690,7 +27769,7 @@ Domain allowed access.
14558 </summary>
14559 </param>
14560 </interface>
14561 -<interface name="corenet_send_gdomap_client_packets" lineno="28126">
14562 +<interface name="corenet_send_gdomap_client_packets" lineno="28670">
14563 <summary>
14564 Send gdomap_client packets.
14565 </summary>
14566 @@ -27701,7 +27780,7 @@ Domain allowed access.
14567 </param>
14568 <infoflow type="write" weight="10"/>
14569 </interface>
14570 -<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="28145">
14571 +<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="28689">
14572 <summary>
14573 Do not audit attempts to send gdomap_client packets.
14574 </summary>
14575 @@ -27712,7 +27791,7 @@ Domain to not audit.
14576 </param>
14577 <infoflow type="none"/>
14578 </interface>
14579 -<interface name="corenet_receive_gdomap_client_packets" lineno="28164">
14580 +<interface name="corenet_receive_gdomap_client_packets" lineno="28708">
14581 <summary>
14582 Receive gdomap_client packets.
14583 </summary>
14584 @@ -27723,7 +27802,7 @@ Domain allowed access.
14585 </param>
14586 <infoflow type="read" weight="10"/>
14587 </interface>
14588 -<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="28183">
14589 +<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="28727">
14590 <summary>
14591 Do not audit attempts to receive gdomap_client packets.
14592 </summary>
14593 @@ -27734,7 +27813,7 @@ Domain allowed access.
14594 </param>
14595 <infoflow type="none"/>
14596 </interface>
14597 -<interface name="corenet_sendrecv_gdomap_client_packets" lineno="28202">
14598 +<interface name="corenet_sendrecv_gdomap_client_packets" lineno="28746">
14599 <summary>
14600 Send and receive gdomap_client packets.
14601 </summary>
14602 @@ -27745,7 +27824,7 @@ Domain allowed access.
14603 </param>
14604 <infoflow type="both" weight="10"/>
14605 </interface>
14606 -<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="28218">
14607 +<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="28762">
14608 <summary>
14609 Do not audit attempts to send and receive gdomap_client packets.
14610 </summary>
14611 @@ -27756,7 +27835,7 @@ Domain to not audit.
14612 </param>
14613 <infoflow type="none"/>
14614 </interface>
14615 -<interface name="corenet_relabelto_gdomap_client_packets" lineno="28233">
14616 +<interface name="corenet_relabelto_gdomap_client_packets" lineno="28777">
14617 <summary>
14618 Relabel packets to gdomap_client the packet type.
14619 </summary>
14620 @@ -27766,7 +27845,7 @@ Domain allowed access.
14621 </summary>
14622 </param>
14623 </interface>
14624 -<interface name="corenet_send_gdomap_server_packets" lineno="28253">
14625 +<interface name="corenet_send_gdomap_server_packets" lineno="28797">
14626 <summary>
14627 Send gdomap_server packets.
14628 </summary>
14629 @@ -27777,7 +27856,7 @@ Domain allowed access.
14630 </param>
14631 <infoflow type="write" weight="10"/>
14632 </interface>
14633 -<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="28272">
14634 +<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="28816">
14635 <summary>
14636 Do not audit attempts to send gdomap_server packets.
14637 </summary>
14638 @@ -27788,7 +27867,7 @@ Domain to not audit.
14639 </param>
14640 <infoflow type="none"/>
14641 </interface>
14642 -<interface name="corenet_receive_gdomap_server_packets" lineno="28291">
14643 +<interface name="corenet_receive_gdomap_server_packets" lineno="28835">
14644 <summary>
14645 Receive gdomap_server packets.
14646 </summary>
14647 @@ -27799,7 +27878,7 @@ Domain allowed access.
14648 </param>
14649 <infoflow type="read" weight="10"/>
14650 </interface>
14651 -<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="28310">
14652 +<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="28854">
14653 <summary>
14654 Do not audit attempts to receive gdomap_server packets.
14655 </summary>
14656 @@ -27810,7 +27889,7 @@ Domain allowed access.
14657 </param>
14658 <infoflow type="none"/>
14659 </interface>
14660 -<interface name="corenet_sendrecv_gdomap_server_packets" lineno="28329">
14661 +<interface name="corenet_sendrecv_gdomap_server_packets" lineno="28873">
14662 <summary>
14663 Send and receive gdomap_server packets.
14664 </summary>
14665 @@ -27821,7 +27900,7 @@ Domain allowed access.
14666 </param>
14667 <infoflow type="both" weight="10"/>
14668 </interface>
14669 -<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="28345">
14670 +<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="28889">
14671 <summary>
14672 Do not audit attempts to send and receive gdomap_server packets.
14673 </summary>
14674 @@ -27832,7 +27911,7 @@ Domain to not audit.
14675 </param>
14676 <infoflow type="none"/>
14677 </interface>
14678 -<interface name="corenet_relabelto_gdomap_server_packets" lineno="28360">
14679 +<interface name="corenet_relabelto_gdomap_server_packets" lineno="28904">
14680 <summary>
14681 Relabel packets to gdomap_server the packet type.
14682 </summary>
14683 @@ -27842,7 +27921,7 @@ Domain allowed access.
14684 </summary>
14685 </param>
14686 </interface>
14687 -<interface name="corenet_tcp_sendrecv_gds_db_port" lineno="28382">
14688 +<interface name="corenet_tcp_sendrecv_gds_db_port" lineno="28926">
14689 <summary>
14690 Send and receive TCP traffic on the gds_db port.
14691 </summary>
14692 @@ -27853,7 +27932,7 @@ Domain allowed access.
14693 </param>
14694 <infoflow type="both" weight="10"/>
14695 </interface>
14696 -<interface name="corenet_udp_send_gds_db_port" lineno="28397">
14697 +<interface name="corenet_udp_send_gds_db_port" lineno="28941">
14698 <summary>
14699 Send UDP traffic on the gds_db port.
14700 </summary>
14701 @@ -27864,7 +27943,7 @@ Domain allowed access.
14702 </param>
14703 <infoflow type="write" weight="10"/>
14704 </interface>
14705 -<interface name="corenet_dontaudit_udp_send_gds_db_port" lineno="28412">
14706 +<interface name="corenet_dontaudit_udp_send_gds_db_port" lineno="28956">
14707 <summary>
14708 Do not audit attempts to send UDP traffic on the gds_db port.
14709 </summary>
14710 @@ -27875,7 +27954,7 @@ Domain to not audit.
14711 </param>
14712 <infoflow type="none"/>
14713 </interface>
14714 -<interface name="corenet_udp_receive_gds_db_port" lineno="28427">
14715 +<interface name="corenet_udp_receive_gds_db_port" lineno="28971">
14716 <summary>
14717 Receive UDP traffic on the gds_db port.
14718 </summary>
14719 @@ -27886,7 +27965,7 @@ Domain allowed access.
14720 </param>
14721 <infoflow type="read" weight="10"/>
14722 </interface>
14723 -<interface name="corenet_dontaudit_udp_receive_gds_db_port" lineno="28442">
14724 +<interface name="corenet_dontaudit_udp_receive_gds_db_port" lineno="28986">
14725 <summary>
14726 Do not audit attempts to receive UDP traffic on the gds_db port.
14727 </summary>
14728 @@ -27897,7 +27976,7 @@ Domain to not audit.
14729 </param>
14730 <infoflow type="none"/>
14731 </interface>
14732 -<interface name="corenet_udp_sendrecv_gds_db_port" lineno="28457">
14733 +<interface name="corenet_udp_sendrecv_gds_db_port" lineno="29001">
14734 <summary>
14735 Send and receive UDP traffic on the gds_db port.
14736 </summary>
14737 @@ -27908,7 +27987,7 @@ Domain allowed access.
14738 </param>
14739 <infoflow type="both" weight="10"/>
14740 </interface>
14741 -<interface name="corenet_dontaudit_udp_sendrecv_gds_db_port" lineno="28473">
14742 +<interface name="corenet_dontaudit_udp_sendrecv_gds_db_port" lineno="29017">
14743 <summary>
14744 Do not audit attempts to send and receive
14745 UDP traffic on the gds_db port.
14746 @@ -27920,7 +27999,7 @@ Domain to not audit.
14747 </param>
14748 <infoflow type="none"/>
14749 </interface>
14750 -<interface name="corenet_tcp_bind_gds_db_port" lineno="28488">
14751 +<interface name="corenet_tcp_bind_gds_db_port" lineno="29032">
14752 <summary>
14753 Bind TCP sockets to the gds_db port.
14754 </summary>
14755 @@ -27931,7 +28010,7 @@ Domain allowed access.
14756 </param>
14757 <infoflow type="none"/>
14758 </interface>
14759 -<interface name="corenet_udp_bind_gds_db_port" lineno="28508">
14760 +<interface name="corenet_udp_bind_gds_db_port" lineno="29052">
14761 <summary>
14762 Bind UDP sockets to the gds_db port.
14763 </summary>
14764 @@ -27942,7 +28021,7 @@ Domain allowed access.
14765 </param>
14766 <infoflow type="none"/>
14767 </interface>
14768 -<interface name="corenet_tcp_connect_gds_db_port" lineno="28527">
14769 +<interface name="corenet_tcp_connect_gds_db_port" lineno="29071">
14770 <summary>
14771 Make a TCP connection to the gds_db port.
14772 </summary>
14773 @@ -27952,7 +28031,7 @@ Domain allowed access.
14774 </summary>
14775 </param>
14776 </interface>
14777 -<interface name="corenet_send_gds_db_client_packets" lineno="28547">
14778 +<interface name="corenet_send_gds_db_client_packets" lineno="29091">
14779 <summary>
14780 Send gds_db_client packets.
14781 </summary>
14782 @@ -27963,7 +28042,7 @@ Domain allowed access.
14783 </param>
14784 <infoflow type="write" weight="10"/>
14785 </interface>
14786 -<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="28566">
14787 +<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="29110">
14788 <summary>
14789 Do not audit attempts to send gds_db_client packets.
14790 </summary>
14791 @@ -27974,7 +28053,7 @@ Domain to not audit.
14792 </param>
14793 <infoflow type="none"/>
14794 </interface>
14795 -<interface name="corenet_receive_gds_db_client_packets" lineno="28585">
14796 +<interface name="corenet_receive_gds_db_client_packets" lineno="29129">
14797 <summary>
14798 Receive gds_db_client packets.
14799 </summary>
14800 @@ -27985,7 +28064,7 @@ Domain allowed access.
14801 </param>
14802 <infoflow type="read" weight="10"/>
14803 </interface>
14804 -<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="28604">
14805 +<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="29148">
14806 <summary>
14807 Do not audit attempts to receive gds_db_client packets.
14808 </summary>
14809 @@ -27996,7 +28075,7 @@ Domain allowed access.
14810 </param>
14811 <infoflow type="none"/>
14812 </interface>
14813 -<interface name="corenet_sendrecv_gds_db_client_packets" lineno="28623">
14814 +<interface name="corenet_sendrecv_gds_db_client_packets" lineno="29167">
14815 <summary>
14816 Send and receive gds_db_client packets.
14817 </summary>
14818 @@ -28007,7 +28086,7 @@ Domain allowed access.
14819 </param>
14820 <infoflow type="both" weight="10"/>
14821 </interface>
14822 -<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="28639">
14823 +<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="29183">
14824 <summary>
14825 Do not audit attempts to send and receive gds_db_client packets.
14826 </summary>
14827 @@ -28018,7 +28097,7 @@ Domain to not audit.
14828 </param>
14829 <infoflow type="none"/>
14830 </interface>
14831 -<interface name="corenet_relabelto_gds_db_client_packets" lineno="28654">
14832 +<interface name="corenet_relabelto_gds_db_client_packets" lineno="29198">
14833 <summary>
14834 Relabel packets to gds_db_client the packet type.
14835 </summary>
14836 @@ -28028,7 +28107,7 @@ Domain allowed access.
14837 </summary>
14838 </param>
14839 </interface>
14840 -<interface name="corenet_send_gds_db_server_packets" lineno="28674">
14841 +<interface name="corenet_send_gds_db_server_packets" lineno="29218">
14842 <summary>
14843 Send gds_db_server packets.
14844 </summary>
14845 @@ -28039,7 +28118,7 @@ Domain allowed access.
14846 </param>
14847 <infoflow type="write" weight="10"/>
14848 </interface>
14849 -<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="28693">
14850 +<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="29237">
14851 <summary>
14852 Do not audit attempts to send gds_db_server packets.
14853 </summary>
14854 @@ -28050,7 +28129,7 @@ Domain to not audit.
14855 </param>
14856 <infoflow type="none"/>
14857 </interface>
14858 -<interface name="corenet_receive_gds_db_server_packets" lineno="28712">
14859 +<interface name="corenet_receive_gds_db_server_packets" lineno="29256">
14860 <summary>
14861 Receive gds_db_server packets.
14862 </summary>
14863 @@ -28061,7 +28140,7 @@ Domain allowed access.
14864 </param>
14865 <infoflow type="read" weight="10"/>
14866 </interface>
14867 -<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="28731">
14868 +<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="29275">
14869 <summary>
14870 Do not audit attempts to receive gds_db_server packets.
14871 </summary>
14872 @@ -28072,7 +28151,7 @@ Domain allowed access.
14873 </param>
14874 <infoflow type="none"/>
14875 </interface>
14876 -<interface name="corenet_sendrecv_gds_db_server_packets" lineno="28750">
14877 +<interface name="corenet_sendrecv_gds_db_server_packets" lineno="29294">
14878 <summary>
14879 Send and receive gds_db_server packets.
14880 </summary>
14881 @@ -28083,7 +28162,7 @@ Domain allowed access.
14882 </param>
14883 <infoflow type="both" weight="10"/>
14884 </interface>
14885 -<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="28766">
14886 +<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="29310">
14887 <summary>
14888 Do not audit attempts to send and receive gds_db_server packets.
14889 </summary>
14890 @@ -28094,7 +28173,7 @@ Domain to not audit.
14891 </param>
14892 <infoflow type="none"/>
14893 </interface>
14894 -<interface name="corenet_relabelto_gds_db_server_packets" lineno="28781">
14895 +<interface name="corenet_relabelto_gds_db_server_packets" lineno="29325">
14896 <summary>
14897 Relabel packets to gds_db_server the packet type.
14898 </summary>
14899 @@ -28104,269 +28183,7 @@ Domain allowed access.
14900 </summary>
14901 </param>
14902 </interface>
14903 -<interface name="corenet_tcp_sendrecv_giftd_port" lineno="28803">
14904 -<summary>
14905 -Send and receive TCP traffic on the giftd port.
14906 -</summary>
14907 -<param name="domain">
14908 -<summary>
14909 -Domain allowed access.
14910 -</summary>
14911 -</param>
14912 -<infoflow type="both" weight="10"/>
14913 -</interface>
14914 -<interface name="corenet_udp_send_giftd_port" lineno="28818">
14915 -<summary>
14916 -Send UDP traffic on the giftd port.
14917 -</summary>
14918 -<param name="domain">
14919 -<summary>
14920 -Domain allowed access.
14921 -</summary>
14922 -</param>
14923 -<infoflow type="write" weight="10"/>
14924 -</interface>
14925 -<interface name="corenet_dontaudit_udp_send_giftd_port" lineno="28833">
14926 -<summary>
14927 -Do not audit attempts to send UDP traffic on the giftd port.
14928 -</summary>
14929 -<param name="domain">
14930 -<summary>
14931 -Domain to not audit.
14932 -</summary>
14933 -</param>
14934 -<infoflow type="none"/>
14935 -</interface>
14936 -<interface name="corenet_udp_receive_giftd_port" lineno="28848">
14937 -<summary>
14938 -Receive UDP traffic on the giftd port.
14939 -</summary>
14940 -<param name="domain">
14941 -<summary>
14942 -Domain allowed access.
14943 -</summary>
14944 -</param>
14945 -<infoflow type="read" weight="10"/>
14946 -</interface>
14947 -<interface name="corenet_dontaudit_udp_receive_giftd_port" lineno="28863">
14948 -<summary>
14949 -Do not audit attempts to receive UDP traffic on the giftd port.
14950 -</summary>
14951 -<param name="domain">
14952 -<summary>
14953 -Domain to not audit.
14954 -</summary>
14955 -</param>
14956 -<infoflow type="none"/>
14957 -</interface>
14958 -<interface name="corenet_udp_sendrecv_giftd_port" lineno="28878">
14959 -<summary>
14960 -Send and receive UDP traffic on the giftd port.
14961 -</summary>
14962 -<param name="domain">
14963 -<summary>
14964 -Domain allowed access.
14965 -</summary>
14966 -</param>
14967 -<infoflow type="both" weight="10"/>
14968 -</interface>
14969 -<interface name="corenet_dontaudit_udp_sendrecv_giftd_port" lineno="28894">
14970 -<summary>
14971 -Do not audit attempts to send and receive
14972 -UDP traffic on the giftd port.
14973 -</summary>
14974 -<param name="domain">
14975 -<summary>
14976 -Domain to not audit.
14977 -</summary>
14978 -</param>
14979 -<infoflow type="none"/>
14980 -</interface>
14981 -<interface name="corenet_tcp_bind_giftd_port" lineno="28909">
14982 -<summary>
14983 -Bind TCP sockets to the giftd port.
14984 -</summary>
14985 -<param name="domain">
14986 -<summary>
14987 -Domain allowed access.
14988 -</summary>
14989 -</param>
14990 -<infoflow type="none"/>
14991 -</interface>
14992 -<interface name="corenet_udp_bind_giftd_port" lineno="28929">
14993 -<summary>
14994 -Bind UDP sockets to the giftd port.
14995 -</summary>
14996 -<param name="domain">
14997 -<summary>
14998 -Domain allowed access.
14999 -</summary>
15000 -</param>
15001 -<infoflow type="none"/>
15002 -</interface>
15003 -<interface name="corenet_tcp_connect_giftd_port" lineno="28948">
15004 -<summary>
15005 -Make a TCP connection to the giftd port.
15006 -</summary>
15007 -<param name="domain">
15008 -<summary>
15009 -Domain allowed access.
15010 -</summary>
15011 -</param>
15012 -</interface>
15013 -<interface name="corenet_send_giftd_client_packets" lineno="28968">
15014 -<summary>
15015 -Send giftd_client packets.
15016 -</summary>
15017 -<param name="domain">
15018 -<summary>
15019 -Domain allowed access.
15020 -</summary>
15021 -</param>
15022 -<infoflow type="write" weight="10"/>
15023 -</interface>
15024 -<interface name="corenet_dontaudit_send_giftd_client_packets" lineno="28987">
15025 -<summary>
15026 -Do not audit attempts to send giftd_client packets.
15027 -</summary>
15028 -<param name="domain">
15029 -<summary>
15030 -Domain to not audit.
15031 -</summary>
15032 -</param>
15033 -<infoflow type="none"/>
15034 -</interface>
15035 -<interface name="corenet_receive_giftd_client_packets" lineno="29006">
15036 -<summary>
15037 -Receive giftd_client packets.
15038 -</summary>
15039 -<param name="domain">
15040 -<summary>
15041 -Domain allowed access.
15042 -</summary>
15043 -</param>
15044 -<infoflow type="read" weight="10"/>
15045 -</interface>
15046 -<interface name="corenet_dontaudit_receive_giftd_client_packets" lineno="29025">
15047 -<summary>
15048 -Do not audit attempts to receive giftd_client packets.
15049 -</summary>
15050 -<param name="domain">
15051 -<summary>
15052 -Domain allowed access.
15053 -</summary>
15054 -</param>
15055 -<infoflow type="none"/>
15056 -</interface>
15057 -<interface name="corenet_sendrecv_giftd_client_packets" lineno="29044">
15058 -<summary>
15059 -Send and receive giftd_client packets.
15060 -</summary>
15061 -<param name="domain">
15062 -<summary>
15063 -Domain allowed access.
15064 -</summary>
15065 -</param>
15066 -<infoflow type="both" weight="10"/>
15067 -</interface>
15068 -<interface name="corenet_dontaudit_sendrecv_giftd_client_packets" lineno="29060">
15069 -<summary>
15070 -Do not audit attempts to send and receive giftd_client packets.
15071 -</summary>
15072 -<param name="domain">
15073 -<summary>
15074 -Domain to not audit.
15075 -</summary>
15076 -</param>
15077 -<infoflow type="none"/>
15078 -</interface>
15079 -<interface name="corenet_relabelto_giftd_client_packets" lineno="29075">
15080 -<summary>
15081 -Relabel packets to giftd_client the packet type.
15082 -</summary>
15083 -<param name="domain">
15084 -<summary>
15085 -Domain allowed access.
15086 -</summary>
15087 -</param>
15088 -</interface>
15089 -<interface name="corenet_send_giftd_server_packets" lineno="29095">
15090 -<summary>
15091 -Send giftd_server packets.
15092 -</summary>
15093 -<param name="domain">
15094 -<summary>
15095 -Domain allowed access.
15096 -</summary>
15097 -</param>
15098 -<infoflow type="write" weight="10"/>
15099 -</interface>
15100 -<interface name="corenet_dontaudit_send_giftd_server_packets" lineno="29114">
15101 -<summary>
15102 -Do not audit attempts to send giftd_server packets.
15103 -</summary>
15104 -<param name="domain">
15105 -<summary>
15106 -Domain to not audit.
15107 -</summary>
15108 -</param>
15109 -<infoflow type="none"/>
15110 -</interface>
15111 -<interface name="corenet_receive_giftd_server_packets" lineno="29133">
15112 -<summary>
15113 -Receive giftd_server packets.
15114 -</summary>
15115 -<param name="domain">
15116 -<summary>
15117 -Domain allowed access.
15118 -</summary>
15119 -</param>
15120 -<infoflow type="read" weight="10"/>
15121 -</interface>
15122 -<interface name="corenet_dontaudit_receive_giftd_server_packets" lineno="29152">
15123 -<summary>
15124 -Do not audit attempts to receive giftd_server packets.
15125 -</summary>
15126 -<param name="domain">
15127 -<summary>
15128 -Domain allowed access.
15129 -</summary>
15130 -</param>
15131 -<infoflow type="none"/>
15132 -</interface>
15133 -<interface name="corenet_sendrecv_giftd_server_packets" lineno="29171">
15134 -<summary>
15135 -Send and receive giftd_server packets.
15136 -</summary>
15137 -<param name="domain">
15138 -<summary>
15139 -Domain allowed access.
15140 -</summary>
15141 -</param>
15142 -<infoflow type="both" weight="10"/>
15143 -</interface>
15144 -<interface name="corenet_dontaudit_sendrecv_giftd_server_packets" lineno="29187">
15145 -<summary>
15146 -Do not audit attempts to send and receive giftd_server packets.
15147 -</summary>
15148 -<param name="domain">
15149 -<summary>
15150 -Domain to not audit.
15151 -</summary>
15152 -</param>
15153 -<infoflow type="none"/>
15154 -</interface>
15155 -<interface name="corenet_relabelto_giftd_server_packets" lineno="29202">
15156 -<summary>
15157 -Relabel packets to giftd_server the packet type.
15158 -</summary>
15159 -<param name="domain">
15160 -<summary>
15161 -Domain allowed access.
15162 -</summary>
15163 -</param>
15164 -</interface>
15165 -<interface name="corenet_tcp_sendrecv_git_port" lineno="29224">
15166 +<interface name="corenet_tcp_sendrecv_git_port" lineno="29347">
15167 <summary>
15168 Send and receive TCP traffic on the git port.
15169 </summary>
15170 @@ -28377,7 +28194,7 @@ Domain allowed access.
15171 </param>
15172 <infoflow type="both" weight="10"/>
15173 </interface>
15174 -<interface name="corenet_udp_send_git_port" lineno="29239">
15175 +<interface name="corenet_udp_send_git_port" lineno="29362">
15176 <summary>
15177 Send UDP traffic on the git port.
15178 </summary>
15179 @@ -28388,7 +28205,7 @@ Domain allowed access.
15180 </param>
15181 <infoflow type="write" weight="10"/>
15182 </interface>
15183 -<interface name="corenet_dontaudit_udp_send_git_port" lineno="29254">
15184 +<interface name="corenet_dontaudit_udp_send_git_port" lineno="29377">
15185 <summary>
15186 Do not audit attempts to send UDP traffic on the git port.
15187 </summary>
15188 @@ -28399,7 +28216,7 @@ Domain to not audit.
15189 </param>
15190 <infoflow type="none"/>
15191 </interface>
15192 -<interface name="corenet_udp_receive_git_port" lineno="29269">
15193 +<interface name="corenet_udp_receive_git_port" lineno="29392">
15194 <summary>
15195 Receive UDP traffic on the git port.
15196 </summary>
15197 @@ -28410,7 +28227,7 @@ Domain allowed access.
15198 </param>
15199 <infoflow type="read" weight="10"/>
15200 </interface>
15201 -<interface name="corenet_dontaudit_udp_receive_git_port" lineno="29284">
15202 +<interface name="corenet_dontaudit_udp_receive_git_port" lineno="29407">
15203 <summary>
15204 Do not audit attempts to receive UDP traffic on the git port.
15205 </summary>
15206 @@ -28421,7 +28238,7 @@ Domain to not audit.
15207 </param>
15208 <infoflow type="none"/>
15209 </interface>
15210 -<interface name="corenet_udp_sendrecv_git_port" lineno="29299">
15211 +<interface name="corenet_udp_sendrecv_git_port" lineno="29422">
15212 <summary>
15213 Send and receive UDP traffic on the git port.
15214 </summary>
15215 @@ -28432,7 +28249,7 @@ Domain allowed access.
15216 </param>
15217 <infoflow type="both" weight="10"/>
15218 </interface>
15219 -<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="29315">
15220 +<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="29438">
15221 <summary>
15222 Do not audit attempts to send and receive
15223 UDP traffic on the git port.
15224 @@ -28444,7 +28261,7 @@ Domain to not audit.
15225 </param>
15226 <infoflow type="none"/>
15227 </interface>
15228 -<interface name="corenet_tcp_bind_git_port" lineno="29330">
15229 +<interface name="corenet_tcp_bind_git_port" lineno="29453">
15230 <summary>
15231 Bind TCP sockets to the git port.
15232 </summary>
15233 @@ -28455,7 +28272,7 @@ Domain allowed access.
15234 </param>
15235 <infoflow type="none"/>
15236 </interface>
15237 -<interface name="corenet_udp_bind_git_port" lineno="29350">
15238 +<interface name="corenet_udp_bind_git_port" lineno="29473">
15239 <summary>
15240 Bind UDP sockets to the git port.
15241 </summary>
15242 @@ -28466,7 +28283,7 @@ Domain allowed access.
15243 </param>
15244 <infoflow type="none"/>
15245 </interface>
15246 -<interface name="corenet_tcp_connect_git_port" lineno="29369">
15247 +<interface name="corenet_tcp_connect_git_port" lineno="29492">
15248 <summary>
15249 Make a TCP connection to the git port.
15250 </summary>
15251 @@ -28476,7 +28293,7 @@ Domain allowed access.
15252 </summary>
15253 </param>
15254 </interface>
15255 -<interface name="corenet_send_git_client_packets" lineno="29389">
15256 +<interface name="corenet_send_git_client_packets" lineno="29512">
15257 <summary>
15258 Send git_client packets.
15259 </summary>
15260 @@ -28487,7 +28304,7 @@ Domain allowed access.
15261 </param>
15262 <infoflow type="write" weight="10"/>
15263 </interface>
15264 -<interface name="corenet_dontaudit_send_git_client_packets" lineno="29408">
15265 +<interface name="corenet_dontaudit_send_git_client_packets" lineno="29531">
15266 <summary>
15267 Do not audit attempts to send git_client packets.
15268 </summary>
15269 @@ -28498,7 +28315,7 @@ Domain to not audit.
15270 </param>
15271 <infoflow type="none"/>
15272 </interface>
15273 -<interface name="corenet_receive_git_client_packets" lineno="29427">
15274 +<interface name="corenet_receive_git_client_packets" lineno="29550">
15275 <summary>
15276 Receive git_client packets.
15277 </summary>
15278 @@ -28509,7 +28326,7 @@ Domain allowed access.
15279 </param>
15280 <infoflow type="read" weight="10"/>
15281 </interface>
15282 -<interface name="corenet_dontaudit_receive_git_client_packets" lineno="29446">
15283 +<interface name="corenet_dontaudit_receive_git_client_packets" lineno="29569">
15284 <summary>
15285 Do not audit attempts to receive git_client packets.
15286 </summary>
15287 @@ -28520,7 +28337,7 @@ Domain allowed access.
15288 </param>
15289 <infoflow type="none"/>
15290 </interface>
15291 -<interface name="corenet_sendrecv_git_client_packets" lineno="29465">
15292 +<interface name="corenet_sendrecv_git_client_packets" lineno="29588">
15293 <summary>
15294 Send and receive git_client packets.
15295 </summary>
15296 @@ -28531,7 +28348,7 @@ Domain allowed access.
15297 </param>
15298 <infoflow type="both" weight="10"/>
15299 </interface>
15300 -<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="29481">
15301 +<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="29604">
15302 <summary>
15303 Do not audit attempts to send and receive git_client packets.
15304 </summary>
15305 @@ -28542,7 +28359,7 @@ Domain to not audit.
15306 </param>
15307 <infoflow type="none"/>
15308 </interface>
15309 -<interface name="corenet_relabelto_git_client_packets" lineno="29496">
15310 +<interface name="corenet_relabelto_git_client_packets" lineno="29619">
15311 <summary>
15312 Relabel packets to git_client the packet type.
15313 </summary>
15314 @@ -28552,7 +28369,7 @@ Domain allowed access.
15315 </summary>
15316 </param>
15317 </interface>
15318 -<interface name="corenet_send_git_server_packets" lineno="29516">
15319 +<interface name="corenet_send_git_server_packets" lineno="29639">
15320 <summary>
15321 Send git_server packets.
15322 </summary>
15323 @@ -28563,7 +28380,7 @@ Domain allowed access.
15324 </param>
15325 <infoflow type="write" weight="10"/>
15326 </interface>
15327 -<interface name="corenet_dontaudit_send_git_server_packets" lineno="29535">
15328 +<interface name="corenet_dontaudit_send_git_server_packets" lineno="29658">
15329 <summary>
15330 Do not audit attempts to send git_server packets.
15331 </summary>
15332 @@ -28574,7 +28391,7 @@ Domain to not audit.
15333 </param>
15334 <infoflow type="none"/>
15335 </interface>
15336 -<interface name="corenet_receive_git_server_packets" lineno="29554">
15337 +<interface name="corenet_receive_git_server_packets" lineno="29677">
15338 <summary>
15339 Receive git_server packets.
15340 </summary>
15341 @@ -28585,7 +28402,7 @@ Domain allowed access.
15342 </param>
15343 <infoflow type="read" weight="10"/>
15344 </interface>
15345 -<interface name="corenet_dontaudit_receive_git_server_packets" lineno="29573">
15346 +<interface name="corenet_dontaudit_receive_git_server_packets" lineno="29696">
15347 <summary>
15348 Do not audit attempts to receive git_server packets.
15349 </summary>
15350 @@ -28596,7 +28413,7 @@ Domain allowed access.
15351 </param>
15352 <infoflow type="none"/>
15353 </interface>
15354 -<interface name="corenet_sendrecv_git_server_packets" lineno="29592">
15355 +<interface name="corenet_sendrecv_git_server_packets" lineno="29715">
15356 <summary>
15357 Send and receive git_server packets.
15358 </summary>
15359 @@ -28607,7 +28424,7 @@ Domain allowed access.
15360 </param>
15361 <infoflow type="both" weight="10"/>
15362 </interface>
15363 -<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="29608">
15364 +<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="29731">
15365 <summary>
15366 Do not audit attempts to send and receive git_server packets.
15367 </summary>
15368 @@ -28618,7 +28435,7 @@ Domain to not audit.
15369 </param>
15370 <infoflow type="none"/>
15371 </interface>
15372 -<interface name="corenet_relabelto_git_server_packets" lineno="29623">
15373 +<interface name="corenet_relabelto_git_server_packets" lineno="29746">
15374 <summary>
15375 Relabel packets to git_server the packet type.
15376 </summary>
15377 @@ -28628,7 +28445,7 @@ Domain allowed access.
15378 </summary>
15379 </param>
15380 </interface>
15381 -<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="29645">
15382 +<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="29768">
15383 <summary>
15384 Send and receive TCP traffic on the glance_registry port.
15385 </summary>
15386 @@ -28639,7 +28456,7 @@ Domain allowed access.
15387 </param>
15388 <infoflow type="both" weight="10"/>
15389 </interface>
15390 -<interface name="corenet_udp_send_glance_registry_port" lineno="29660">
15391 +<interface name="corenet_udp_send_glance_registry_port" lineno="29783">
15392 <summary>
15393 Send UDP traffic on the glance_registry port.
15394 </summary>
15395 @@ -28650,7 +28467,7 @@ Domain allowed access.
15396 </param>
15397 <infoflow type="write" weight="10"/>
15398 </interface>
15399 -<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="29675">
15400 +<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="29798">
15401 <summary>
15402 Do not audit attempts to send UDP traffic on the glance_registry port.
15403 </summary>
15404 @@ -28661,7 +28478,7 @@ Domain to not audit.
15405 </param>
15406 <infoflow type="none"/>
15407 </interface>
15408 -<interface name="corenet_udp_receive_glance_registry_port" lineno="29690">
15409 +<interface name="corenet_udp_receive_glance_registry_port" lineno="29813">
15410 <summary>
15411 Receive UDP traffic on the glance_registry port.
15412 </summary>
15413 @@ -28672,7 +28489,7 @@ Domain allowed access.
15414 </param>
15415 <infoflow type="read" weight="10"/>
15416 </interface>
15417 -<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="29705">
15418 +<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="29828">
15419 <summary>
15420 Do not audit attempts to receive UDP traffic on the glance_registry port.
15421 </summary>
15422 @@ -28683,7 +28500,7 @@ Domain to not audit.
15423 </param>
15424 <infoflow type="none"/>
15425 </interface>
15426 -<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="29720">
15427 +<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="29843">
15428 <summary>
15429 Send and receive UDP traffic on the glance_registry port.
15430 </summary>
15431 @@ -28694,7 +28511,7 @@ Domain allowed access.
15432 </param>
15433 <infoflow type="both" weight="10"/>
15434 </interface>
15435 -<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="29736">
15436 +<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="29859">
15437 <summary>
15438 Do not audit attempts to send and receive
15439 UDP traffic on the glance_registry port.
15440 @@ -28706,7 +28523,7 @@ Domain to not audit.
15441 </param>
15442 <infoflow type="none"/>
15443 </interface>
15444 -<interface name="corenet_tcp_bind_glance_registry_port" lineno="29751">
15445 +<interface name="corenet_tcp_bind_glance_registry_port" lineno="29874">
15446 <summary>
15447 Bind TCP sockets to the glance_registry port.
15448 </summary>
15449 @@ -28717,7 +28534,7 @@ Domain allowed access.
15450 </param>
15451 <infoflow type="none"/>
15452 </interface>
15453 -<interface name="corenet_udp_bind_glance_registry_port" lineno="29771">
15454 +<interface name="corenet_udp_bind_glance_registry_port" lineno="29894">
15455 <summary>
15456 Bind UDP sockets to the glance_registry port.
15457 </summary>
15458 @@ -28728,7 +28545,7 @@ Domain allowed access.
15459 </param>
15460 <infoflow type="none"/>
15461 </interface>
15462 -<interface name="corenet_tcp_connect_glance_registry_port" lineno="29790">
15463 +<interface name="corenet_tcp_connect_glance_registry_port" lineno="29913">
15464 <summary>
15465 Make a TCP connection to the glance_registry port.
15466 </summary>
15467 @@ -28738,7 +28555,7 @@ Domain allowed access.
15468 </summary>
15469 </param>
15470 </interface>
15471 -<interface name="corenet_send_glance_registry_client_packets" lineno="29810">
15472 +<interface name="corenet_send_glance_registry_client_packets" lineno="29933">
15473 <summary>
15474 Send glance_registry_client packets.
15475 </summary>
15476 @@ -28749,7 +28566,7 @@ Domain allowed access.
15477 </param>
15478 <infoflow type="write" weight="10"/>
15479 </interface>
15480 -<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="29829">
15481 +<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="29952">
15482 <summary>
15483 Do not audit attempts to send glance_registry_client packets.
15484 </summary>
15485 @@ -28760,7 +28577,7 @@ Domain to not audit.
15486 </param>
15487 <infoflow type="none"/>
15488 </interface>
15489 -<interface name="corenet_receive_glance_registry_client_packets" lineno="29848">
15490 +<interface name="corenet_receive_glance_registry_client_packets" lineno="29971">
15491 <summary>
15492 Receive glance_registry_client packets.
15493 </summary>
15494 @@ -28771,7 +28588,7 @@ Domain allowed access.
15495 </param>
15496 <infoflow type="read" weight="10"/>
15497 </interface>
15498 -<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="29867">
15499 +<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="29990">
15500 <summary>
15501 Do not audit attempts to receive glance_registry_client packets.
15502 </summary>
15503 @@ -28782,7 +28599,7 @@ Domain allowed access.
15504 </param>
15505 <infoflow type="none"/>
15506 </interface>
15507 -<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="29886">
15508 +<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="30009">
15509 <summary>
15510 Send and receive glance_registry_client packets.
15511 </summary>
15512 @@ -28793,7 +28610,7 @@ Domain allowed access.
15513 </param>
15514 <infoflow type="both" weight="10"/>
15515 </interface>
15516 -<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="29902">
15517 +<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="30025">
15518 <summary>
15519 Do not audit attempts to send and receive glance_registry_client packets.
15520 </summary>
15521 @@ -28804,7 +28621,7 @@ Domain to not audit.
15522 </param>
15523 <infoflow type="none"/>
15524 </interface>
15525 -<interface name="corenet_relabelto_glance_registry_client_packets" lineno="29917">
15526 +<interface name="corenet_relabelto_glance_registry_client_packets" lineno="30040">
15527 <summary>
15528 Relabel packets to glance_registry_client the packet type.
15529 </summary>
15530 @@ -28814,7 +28631,7 @@ Domain allowed access.
15531 </summary>
15532 </param>
15533 </interface>
15534 -<interface name="corenet_send_glance_registry_server_packets" lineno="29937">
15535 +<interface name="corenet_send_glance_registry_server_packets" lineno="30060">
15536 <summary>
15537 Send glance_registry_server packets.
15538 </summary>
15539 @@ -28825,7 +28642,7 @@ Domain allowed access.
15540 </param>
15541 <infoflow type="write" weight="10"/>
15542 </interface>
15543 -<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="29956">
15544 +<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="30079">
15545 <summary>
15546 Do not audit attempts to send glance_registry_server packets.
15547 </summary>
15548 @@ -28836,7 +28653,7 @@ Domain to not audit.
15549 </param>
15550 <infoflow type="none"/>
15551 </interface>
15552 -<interface name="corenet_receive_glance_registry_server_packets" lineno="29975">
15553 +<interface name="corenet_receive_glance_registry_server_packets" lineno="30098">
15554 <summary>
15555 Receive glance_registry_server packets.
15556 </summary>
15557 @@ -28847,7 +28664,7 @@ Domain allowed access.
15558 </param>
15559 <infoflow type="read" weight="10"/>
15560 </interface>
15561 -<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="29994">
15562 +<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="30117">
15563 <summary>
15564 Do not audit attempts to receive glance_registry_server packets.
15565 </summary>
15566 @@ -28858,7 +28675,7 @@ Domain allowed access.
15567 </param>
15568 <infoflow type="none"/>
15569 </interface>
15570 -<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="30013">
15571 +<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="30136">
15572 <summary>
15573 Send and receive glance_registry_server packets.
15574 </summary>
15575 @@ -28869,7 +28686,7 @@ Domain allowed access.
15576 </param>
15577 <infoflow type="both" weight="10"/>
15578 </interface>
15579 -<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="30029">
15580 +<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="30152">
15581 <summary>
15582 Do not audit attempts to send and receive glance_registry_server packets.
15583 </summary>
15584 @@ -28880,7 +28697,7 @@ Domain to not audit.
15585 </param>
15586 <infoflow type="none"/>
15587 </interface>
15588 -<interface name="corenet_relabelto_glance_registry_server_packets" lineno="30044">
15589 +<interface name="corenet_relabelto_glance_registry_server_packets" lineno="30167">
15590 <summary>
15591 Relabel packets to glance_registry_server the packet type.
15592 </summary>
15593 @@ -28890,7 +28707,7 @@ Domain allowed access.
15594 </summary>
15595 </param>
15596 </interface>
15597 -<interface name="corenet_tcp_sendrecv_gopher_port" lineno="30066">
15598 +<interface name="corenet_tcp_sendrecv_gopher_port" lineno="30189">
15599 <summary>
15600 Send and receive TCP traffic on the gopher port.
15601 </summary>
15602 @@ -28901,7 +28718,7 @@ Domain allowed access.
15603 </param>
15604 <infoflow type="both" weight="10"/>
15605 </interface>
15606 -<interface name="corenet_udp_send_gopher_port" lineno="30081">
15607 +<interface name="corenet_udp_send_gopher_port" lineno="30204">
15608 <summary>
15609 Send UDP traffic on the gopher port.
15610 </summary>
15611 @@ -28912,7 +28729,7 @@ Domain allowed access.
15612 </param>
15613 <infoflow type="write" weight="10"/>
15614 </interface>
15615 -<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="30096">
15616 +<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="30219">
15617 <summary>
15618 Do not audit attempts to send UDP traffic on the gopher port.
15619 </summary>
15620 @@ -28923,7 +28740,7 @@ Domain to not audit.
15621 </param>
15622 <infoflow type="none"/>
15623 </interface>
15624 -<interface name="corenet_udp_receive_gopher_port" lineno="30111">
15625 +<interface name="corenet_udp_receive_gopher_port" lineno="30234">
15626 <summary>
15627 Receive UDP traffic on the gopher port.
15628 </summary>
15629 @@ -28934,7 +28751,7 @@ Domain allowed access.
15630 </param>
15631 <infoflow type="read" weight="10"/>
15632 </interface>
15633 -<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="30126">
15634 +<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="30249">
15635 <summary>
15636 Do not audit attempts to receive UDP traffic on the gopher port.
15637 </summary>
15638 @@ -28945,7 +28762,7 @@ Domain to not audit.
15639 </param>
15640 <infoflow type="none"/>
15641 </interface>
15642 -<interface name="corenet_udp_sendrecv_gopher_port" lineno="30141">
15643 +<interface name="corenet_udp_sendrecv_gopher_port" lineno="30264">
15644 <summary>
15645 Send and receive UDP traffic on the gopher port.
15646 </summary>
15647 @@ -28956,7 +28773,7 @@ Domain allowed access.
15648 </param>
15649 <infoflow type="both" weight="10"/>
15650 </interface>
15651 -<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="30157">
15652 +<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="30280">
15653 <summary>
15654 Do not audit attempts to send and receive
15655 UDP traffic on the gopher port.
15656 @@ -28968,7 +28785,7 @@ Domain to not audit.
15657 </param>
15658 <infoflow type="none"/>
15659 </interface>
15660 -<interface name="corenet_tcp_bind_gopher_port" lineno="30172">
15661 +<interface name="corenet_tcp_bind_gopher_port" lineno="30295">
15662 <summary>
15663 Bind TCP sockets to the gopher port.
15664 </summary>
15665 @@ -28979,7 +28796,7 @@ Domain allowed access.
15666 </param>
15667 <infoflow type="none"/>
15668 </interface>
15669 -<interface name="corenet_udp_bind_gopher_port" lineno="30192">
15670 +<interface name="corenet_udp_bind_gopher_port" lineno="30315">
15671 <summary>
15672 Bind UDP sockets to the gopher port.
15673 </summary>
15674 @@ -28990,7 +28807,7 @@ Domain allowed access.
15675 </param>
15676 <infoflow type="none"/>
15677 </interface>
15678 -<interface name="corenet_tcp_connect_gopher_port" lineno="30211">
15679 +<interface name="corenet_tcp_connect_gopher_port" lineno="30334">
15680 <summary>
15681 Make a TCP connection to the gopher port.
15682 </summary>
15683 @@ -29000,7 +28817,7 @@ Domain allowed access.
15684 </summary>
15685 </param>
15686 </interface>
15687 -<interface name="corenet_send_gopher_client_packets" lineno="30231">
15688 +<interface name="corenet_send_gopher_client_packets" lineno="30354">
15689 <summary>
15690 Send gopher_client packets.
15691 </summary>
15692 @@ -29011,7 +28828,7 @@ Domain allowed access.
15693 </param>
15694 <infoflow type="write" weight="10"/>
15695 </interface>
15696 -<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="30250">
15697 +<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="30373">
15698 <summary>
15699 Do not audit attempts to send gopher_client packets.
15700 </summary>
15701 @@ -29022,7 +28839,7 @@ Domain to not audit.
15702 </param>
15703 <infoflow type="none"/>
15704 </interface>
15705 -<interface name="corenet_receive_gopher_client_packets" lineno="30269">
15706 +<interface name="corenet_receive_gopher_client_packets" lineno="30392">
15707 <summary>
15708 Receive gopher_client packets.
15709 </summary>
15710 @@ -29033,7 +28850,7 @@ Domain allowed access.
15711 </param>
15712 <infoflow type="read" weight="10"/>
15713 </interface>
15714 -<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="30288">
15715 +<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="30411">
15716 <summary>
15717 Do not audit attempts to receive gopher_client packets.
15718 </summary>
15719 @@ -29044,7 +28861,7 @@ Domain allowed access.
15720 </param>
15721 <infoflow type="none"/>
15722 </interface>
15723 -<interface name="corenet_sendrecv_gopher_client_packets" lineno="30307">
15724 +<interface name="corenet_sendrecv_gopher_client_packets" lineno="30430">
15725 <summary>
15726 Send and receive gopher_client packets.
15727 </summary>
15728 @@ -29055,7 +28872,7 @@ Domain allowed access.
15729 </param>
15730 <infoflow type="both" weight="10"/>
15731 </interface>
15732 -<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="30323">
15733 +<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="30446">
15734 <summary>
15735 Do not audit attempts to send and receive gopher_client packets.
15736 </summary>
15737 @@ -29066,7 +28883,7 @@ Domain to not audit.
15738 </param>
15739 <infoflow type="none"/>
15740 </interface>
15741 -<interface name="corenet_relabelto_gopher_client_packets" lineno="30338">
15742 +<interface name="corenet_relabelto_gopher_client_packets" lineno="30461">
15743 <summary>
15744 Relabel packets to gopher_client the packet type.
15745 </summary>
15746 @@ -29076,7 +28893,7 @@ Domain allowed access.
15747 </summary>
15748 </param>
15749 </interface>
15750 -<interface name="corenet_send_gopher_server_packets" lineno="30358">
15751 +<interface name="corenet_send_gopher_server_packets" lineno="30481">
15752 <summary>
15753 Send gopher_server packets.
15754 </summary>
15755 @@ -29087,7 +28904,7 @@ Domain allowed access.
15756 </param>
15757 <infoflow type="write" weight="10"/>
15758 </interface>
15759 -<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="30377">
15760 +<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="30500">
15761 <summary>
15762 Do not audit attempts to send gopher_server packets.
15763 </summary>
15764 @@ -29098,7 +28915,7 @@ Domain to not audit.
15765 </param>
15766 <infoflow type="none"/>
15767 </interface>
15768 -<interface name="corenet_receive_gopher_server_packets" lineno="30396">
15769 +<interface name="corenet_receive_gopher_server_packets" lineno="30519">
15770 <summary>
15771 Receive gopher_server packets.
15772 </summary>
15773 @@ -29109,7 +28926,7 @@ Domain allowed access.
15774 </param>
15775 <infoflow type="read" weight="10"/>
15776 </interface>
15777 -<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="30415">
15778 +<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="30538">
15779 <summary>
15780 Do not audit attempts to receive gopher_server packets.
15781 </summary>
15782 @@ -29120,7 +28937,7 @@ Domain allowed access.
15783 </param>
15784 <infoflow type="none"/>
15785 </interface>
15786 -<interface name="corenet_sendrecv_gopher_server_packets" lineno="30434">
15787 +<interface name="corenet_sendrecv_gopher_server_packets" lineno="30557">
15788 <summary>
15789 Send and receive gopher_server packets.
15790 </summary>
15791 @@ -29131,7 +28948,7 @@ Domain allowed access.
15792 </param>
15793 <infoflow type="both" weight="10"/>
15794 </interface>
15795 -<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="30450">
15796 +<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="30573">
15797 <summary>
15798 Do not audit attempts to send and receive gopher_server packets.
15799 </summary>
15800 @@ -29142,7 +28959,7 @@ Domain to not audit.
15801 </param>
15802 <infoflow type="none"/>
15803 </interface>
15804 -<interface name="corenet_relabelto_gopher_server_packets" lineno="30465">
15805 +<interface name="corenet_relabelto_gopher_server_packets" lineno="30588">
15806 <summary>
15807 Relabel packets to gopher_server the packet type.
15808 </summary>
15809 @@ -29152,7 +28969,7 @@ Domain allowed access.
15810 </summary>
15811 </param>
15812 </interface>
15813 -<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="30487">
15814 +<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="30610">
15815 <summary>
15816 Send and receive TCP traffic on the gpsd port.
15817 </summary>
15818 @@ -29163,7 +28980,7 @@ Domain allowed access.
15819 </param>
15820 <infoflow type="both" weight="10"/>
15821 </interface>
15822 -<interface name="corenet_udp_send_gpsd_port" lineno="30502">
15823 +<interface name="corenet_udp_send_gpsd_port" lineno="30625">
15824 <summary>
15825 Send UDP traffic on the gpsd port.
15826 </summary>
15827 @@ -29174,7 +28991,7 @@ Domain allowed access.
15828 </param>
15829 <infoflow type="write" weight="10"/>
15830 </interface>
15831 -<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="30517">
15832 +<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="30640">
15833 <summary>
15834 Do not audit attempts to send UDP traffic on the gpsd port.
15835 </summary>
15836 @@ -29185,7 +29002,7 @@ Domain to not audit.
15837 </param>
15838 <infoflow type="none"/>
15839 </interface>
15840 -<interface name="corenet_udp_receive_gpsd_port" lineno="30532">
15841 +<interface name="corenet_udp_receive_gpsd_port" lineno="30655">
15842 <summary>
15843 Receive UDP traffic on the gpsd port.
15844 </summary>
15845 @@ -29196,7 +29013,7 @@ Domain allowed access.
15846 </param>
15847 <infoflow type="read" weight="10"/>
15848 </interface>
15849 -<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="30547">
15850 +<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="30670">
15851 <summary>
15852 Do not audit attempts to receive UDP traffic on the gpsd port.
15853 </summary>
15854 @@ -29207,7 +29024,7 @@ Domain to not audit.
15855 </param>
15856 <infoflow type="none"/>
15857 </interface>
15858 -<interface name="corenet_udp_sendrecv_gpsd_port" lineno="30562">
15859 +<interface name="corenet_udp_sendrecv_gpsd_port" lineno="30685">
15860 <summary>
15861 Send and receive UDP traffic on the gpsd port.
15862 </summary>
15863 @@ -29218,7 +29035,7 @@ Domain allowed access.
15864 </param>
15865 <infoflow type="both" weight="10"/>
15866 </interface>
15867 -<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="30578">
15868 +<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="30701">
15869 <summary>
15870 Do not audit attempts to send and receive
15871 UDP traffic on the gpsd port.
15872 @@ -29230,7 +29047,7 @@ Domain to not audit.
15873 </param>
15874 <infoflow type="none"/>
15875 </interface>
15876 -<interface name="corenet_tcp_bind_gpsd_port" lineno="30593">
15877 +<interface name="corenet_tcp_bind_gpsd_port" lineno="30716">
15878 <summary>
15879 Bind TCP sockets to the gpsd port.
15880 </summary>
15881 @@ -29241,7 +29058,7 @@ Domain allowed access.
15882 </param>
15883 <infoflow type="none"/>
15884 </interface>
15885 -<interface name="corenet_udp_bind_gpsd_port" lineno="30613">
15886 +<interface name="corenet_udp_bind_gpsd_port" lineno="30736">
15887 <summary>
15888 Bind UDP sockets to the gpsd port.
15889 </summary>
15890 @@ -29252,7 +29069,7 @@ Domain allowed access.
15891 </param>
15892 <infoflow type="none"/>
15893 </interface>
15894 -<interface name="corenet_tcp_connect_gpsd_port" lineno="30632">
15895 +<interface name="corenet_tcp_connect_gpsd_port" lineno="30755">
15896 <summary>
15897 Make a TCP connection to the gpsd port.
15898 </summary>
15899 @@ -29262,7 +29079,7 @@ Domain allowed access.
15900 </summary>
15901 </param>
15902 </interface>
15903 -<interface name="corenet_send_gpsd_client_packets" lineno="30652">
15904 +<interface name="corenet_send_gpsd_client_packets" lineno="30775">
15905 <summary>
15906 Send gpsd_client packets.
15907 </summary>
15908 @@ -29273,7 +29090,7 @@ Domain allowed access.
15909 </param>
15910 <infoflow type="write" weight="10"/>
15911 </interface>
15912 -<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="30671">
15913 +<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="30794">
15914 <summary>
15915 Do not audit attempts to send gpsd_client packets.
15916 </summary>
15917 @@ -29284,7 +29101,7 @@ Domain to not audit.
15918 </param>
15919 <infoflow type="none"/>
15920 </interface>
15921 -<interface name="corenet_receive_gpsd_client_packets" lineno="30690">
15922 +<interface name="corenet_receive_gpsd_client_packets" lineno="30813">
15923 <summary>
15924 Receive gpsd_client packets.
15925 </summary>
15926 @@ -29295,7 +29112,7 @@ Domain allowed access.
15927 </param>
15928 <infoflow type="read" weight="10"/>
15929 </interface>
15930 -<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="30709">
15931 +<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="30832">
15932 <summary>
15933 Do not audit attempts to receive gpsd_client packets.
15934 </summary>
15935 @@ -29306,7 +29123,7 @@ Domain allowed access.
15936 </param>
15937 <infoflow type="none"/>
15938 </interface>
15939 -<interface name="corenet_sendrecv_gpsd_client_packets" lineno="30728">
15940 +<interface name="corenet_sendrecv_gpsd_client_packets" lineno="30851">
15941 <summary>
15942 Send and receive gpsd_client packets.
15943 </summary>
15944 @@ -29317,7 +29134,7 @@ Domain allowed access.
15945 </param>
15946 <infoflow type="both" weight="10"/>
15947 </interface>
15948 -<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="30744">
15949 +<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="30867">
15950 <summary>
15951 Do not audit attempts to send and receive gpsd_client packets.
15952 </summary>
15953 @@ -29328,7 +29145,7 @@ Domain to not audit.
15954 </param>
15955 <infoflow type="none"/>
15956 </interface>
15957 -<interface name="corenet_relabelto_gpsd_client_packets" lineno="30759">
15958 +<interface name="corenet_relabelto_gpsd_client_packets" lineno="30882">
15959 <summary>
15960 Relabel packets to gpsd_client the packet type.
15961 </summary>
15962 @@ -29338,7 +29155,7 @@ Domain allowed access.
15963 </summary>
15964 </param>
15965 </interface>
15966 -<interface name="corenet_send_gpsd_server_packets" lineno="30779">
15967 +<interface name="corenet_send_gpsd_server_packets" lineno="30902">
15968 <summary>
15969 Send gpsd_server packets.
15970 </summary>
15971 @@ -29349,7 +29166,7 @@ Domain allowed access.
15972 </param>
15973 <infoflow type="write" weight="10"/>
15974 </interface>
15975 -<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="30798">
15976 +<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="30921">
15977 <summary>
15978 Do not audit attempts to send gpsd_server packets.
15979 </summary>
15980 @@ -29360,7 +29177,7 @@ Domain to not audit.
15981 </param>
15982 <infoflow type="none"/>
15983 </interface>
15984 -<interface name="corenet_receive_gpsd_server_packets" lineno="30817">
15985 +<interface name="corenet_receive_gpsd_server_packets" lineno="30940">
15986 <summary>
15987 Receive gpsd_server packets.
15988 </summary>
15989 @@ -29371,7 +29188,7 @@ Domain allowed access.
15990 </param>
15991 <infoflow type="read" weight="10"/>
15992 </interface>
15993 -<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="30836">
15994 +<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="30959">
15995 <summary>
15996 Do not audit attempts to receive gpsd_server packets.
15997 </summary>
15998 @@ -29382,7 +29199,7 @@ Domain allowed access.
15999 </param>
16000 <infoflow type="none"/>
16001 </interface>
16002 -<interface name="corenet_sendrecv_gpsd_server_packets" lineno="30855">
16003 +<interface name="corenet_sendrecv_gpsd_server_packets" lineno="30978">
16004 <summary>
16005 Send and receive gpsd_server packets.
16006 </summary>
16007 @@ -29393,7 +29210,7 @@ Domain allowed access.
16008 </param>
16009 <infoflow type="both" weight="10"/>
16010 </interface>
16011 -<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="30871">
16012 +<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="30994">
16013 <summary>
16014 Do not audit attempts to send and receive gpsd_server packets.
16015 </summary>
16016 @@ -29404,7 +29221,7 @@ Domain to not audit.
16017 </param>
16018 <infoflow type="none"/>
16019 </interface>
16020 -<interface name="corenet_relabelto_gpsd_server_packets" lineno="30886">
16021 +<interface name="corenet_relabelto_gpsd_server_packets" lineno="31009">
16022 <summary>
16023 Relabel packets to gpsd_server the packet type.
16024 </summary>
16025 @@ -29414,7 +29231,7 @@ Domain allowed access.
16026 </summary>
16027 </param>
16028 </interface>
16029 -<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="30908">
16030 +<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="31031">
16031 <summary>
16032 Send and receive TCP traffic on the hadoop_datanode port.
16033 </summary>
16034 @@ -29425,7 +29242,7 @@ Domain allowed access.
16035 </param>
16036 <infoflow type="both" weight="10"/>
16037 </interface>
16038 -<interface name="corenet_udp_send_hadoop_datanode_port" lineno="30923">
16039 +<interface name="corenet_udp_send_hadoop_datanode_port" lineno="31046">
16040 <summary>
16041 Send UDP traffic on the hadoop_datanode port.
16042 </summary>
16043 @@ -29436,7 +29253,7 @@ Domain allowed access.
16044 </param>
16045 <infoflow type="write" weight="10"/>
16046 </interface>
16047 -<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="30938">
16048 +<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="31061">
16049 <summary>
16050 Do not audit attempts to send UDP traffic on the hadoop_datanode port.
16051 </summary>
16052 @@ -29447,7 +29264,7 @@ Domain to not audit.
16053 </param>
16054 <infoflow type="none"/>
16055 </interface>
16056 -<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="30953">
16057 +<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="31076">
16058 <summary>
16059 Receive UDP traffic on the hadoop_datanode port.
16060 </summary>
16061 @@ -29458,7 +29275,7 @@ Domain allowed access.
16062 </param>
16063 <infoflow type="read" weight="10"/>
16064 </interface>
16065 -<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="30968">
16066 +<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="31091">
16067 <summary>
16068 Do not audit attempts to receive UDP traffic on the hadoop_datanode port.
16069 </summary>
16070 @@ -29469,7 +29286,7 @@ Domain to not audit.
16071 </param>
16072 <infoflow type="none"/>
16073 </interface>
16074 -<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="30983">
16075 +<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="31106">
16076 <summary>
16077 Send and receive UDP traffic on the hadoop_datanode port.
16078 </summary>
16079 @@ -29480,7 +29297,7 @@ Domain allowed access.
16080 </param>
16081 <infoflow type="both" weight="10"/>
16082 </interface>
16083 -<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="30999">
16084 +<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="31122">
16085 <summary>
16086 Do not audit attempts to send and receive
16087 UDP traffic on the hadoop_datanode port.
16088 @@ -29492,7 +29309,7 @@ Domain to not audit.
16089 </param>
16090 <infoflow type="none"/>
16091 </interface>
16092 -<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="31014">
16093 +<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="31137">
16094 <summary>
16095 Bind TCP sockets to the hadoop_datanode port.
16096 </summary>
16097 @@ -29503,7 +29320,7 @@ Domain allowed access.
16098 </param>
16099 <infoflow type="none"/>
16100 </interface>
16101 -<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="31034">
16102 +<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="31157">
16103 <summary>
16104 Bind UDP sockets to the hadoop_datanode port.
16105 </summary>
16106 @@ -29514,7 +29331,7 @@ Domain allowed access.
16107 </param>
16108 <infoflow type="none"/>
16109 </interface>
16110 -<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="31053">
16111 +<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="31176">
16112 <summary>
16113 Make a TCP connection to the hadoop_datanode port.
16114 </summary>
16115 @@ -29524,7 +29341,7 @@ Domain allowed access.
16116 </summary>
16117 </param>
16118 </interface>
16119 -<interface name="corenet_send_hadoop_datanode_client_packets" lineno="31073">
16120 +<interface name="corenet_send_hadoop_datanode_client_packets" lineno="31196">
16121 <summary>
16122 Send hadoop_datanode_client packets.
16123 </summary>
16124 @@ -29535,7 +29352,7 @@ Domain allowed access.
16125 </param>
16126 <infoflow type="write" weight="10"/>
16127 </interface>
16128 -<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="31092">
16129 +<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="31215">
16130 <summary>
16131 Do not audit attempts to send hadoop_datanode_client packets.
16132 </summary>
16133 @@ -29546,7 +29363,7 @@ Domain to not audit.
16134 </param>
16135 <infoflow type="none"/>
16136 </interface>
16137 -<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="31111">
16138 +<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="31234">
16139 <summary>
16140 Receive hadoop_datanode_client packets.
16141 </summary>
16142 @@ -29557,7 +29374,7 @@ Domain allowed access.
16143 </param>
16144 <infoflow type="read" weight="10"/>
16145 </interface>
16146 -<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="31130">
16147 +<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="31253">
16148 <summary>
16149 Do not audit attempts to receive hadoop_datanode_client packets.
16150 </summary>
16151 @@ -29568,7 +29385,7 @@ Domain allowed access.
16152 </param>
16153 <infoflow type="none"/>
16154 </interface>
16155 -<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="31149">
16156 +<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="31272">
16157 <summary>
16158 Send and receive hadoop_datanode_client packets.
16159 </summary>
16160 @@ -29579,7 +29396,7 @@ Domain allowed access.
16161 </param>
16162 <infoflow type="both" weight="10"/>
16163 </interface>
16164 -<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="31165">
16165 +<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="31288">
16166 <summary>
16167 Do not audit attempts to send and receive hadoop_datanode_client packets.
16168 </summary>
16169 @@ -29590,7 +29407,7 @@ Domain to not audit.
16170 </param>
16171 <infoflow type="none"/>
16172 </interface>
16173 -<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="31180">
16174 +<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="31303">
16175 <summary>
16176 Relabel packets to hadoop_datanode_client the packet type.
16177 </summary>
16178 @@ -29600,7 +29417,7 @@ Domain allowed access.
16179 </summary>
16180 </param>
16181 </interface>
16182 -<interface name="corenet_send_hadoop_datanode_server_packets" lineno="31200">
16183 +<interface name="corenet_send_hadoop_datanode_server_packets" lineno="31323">
16184 <summary>
16185 Send hadoop_datanode_server packets.
16186 </summary>
16187 @@ -29611,7 +29428,7 @@ Domain allowed access.
16188 </param>
16189 <infoflow type="write" weight="10"/>
16190 </interface>
16191 -<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="31219">
16192 +<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="31342">
16193 <summary>
16194 Do not audit attempts to send hadoop_datanode_server packets.
16195 </summary>
16196 @@ -29622,7 +29439,7 @@ Domain to not audit.
16197 </param>
16198 <infoflow type="none"/>
16199 </interface>
16200 -<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="31238">
16201 +<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="31361">
16202 <summary>
16203 Receive hadoop_datanode_server packets.
16204 </summary>
16205 @@ -29633,7 +29450,7 @@ Domain allowed access.
16206 </param>
16207 <infoflow type="read" weight="10"/>
16208 </interface>
16209 -<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="31257">
16210 +<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="31380">
16211 <summary>
16212 Do not audit attempts to receive hadoop_datanode_server packets.
16213 </summary>
16214 @@ -29644,7 +29461,7 @@ Domain allowed access.
16215 </param>
16216 <infoflow type="none"/>
16217 </interface>
16218 -<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="31276">
16219 +<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="31399">
16220 <summary>
16221 Send and receive hadoop_datanode_server packets.
16222 </summary>
16223 @@ -29655,7 +29472,7 @@ Domain allowed access.
16224 </param>
16225 <infoflow type="both" weight="10"/>
16226 </interface>
16227 -<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="31292">
16228 +<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="31415">
16229 <summary>
16230 Do not audit attempts to send and receive hadoop_datanode_server packets.
16231 </summary>
16232 @@ -29666,7 +29483,7 @@ Domain to not audit.
16233 </param>
16234 <infoflow type="none"/>
16235 </interface>
16236 -<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="31307">
16237 +<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="31430">
16238 <summary>
16239 Relabel packets to hadoop_datanode_server the packet type.
16240 </summary>
16241 @@ -29676,7 +29493,7 @@ Domain allowed access.
16242 </summary>
16243 </param>
16244 </interface>
16245 -<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="31329">
16246 +<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="31452">
16247 <summary>
16248 Send and receive TCP traffic on the hadoop_namenode port.
16249 </summary>
16250 @@ -29687,7 +29504,7 @@ Domain allowed access.
16251 </param>
16252 <infoflow type="both" weight="10"/>
16253 </interface>
16254 -<interface name="corenet_udp_send_hadoop_namenode_port" lineno="31344">
16255 +<interface name="corenet_udp_send_hadoop_namenode_port" lineno="31467">
16256 <summary>
16257 Send UDP traffic on the hadoop_namenode port.
16258 </summary>
16259 @@ -29698,7 +29515,7 @@ Domain allowed access.
16260 </param>
16261 <infoflow type="write" weight="10"/>
16262 </interface>
16263 -<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="31359">
16264 +<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="31482">
16265 <summary>
16266 Do not audit attempts to send UDP traffic on the hadoop_namenode port.
16267 </summary>
16268 @@ -29709,7 +29526,7 @@ Domain to not audit.
16269 </param>
16270 <infoflow type="none"/>
16271 </interface>
16272 -<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="31374">
16273 +<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="31497">
16274 <summary>
16275 Receive UDP traffic on the hadoop_namenode port.
16276 </summary>
16277 @@ -29720,7 +29537,7 @@ Domain allowed access.
16278 </param>
16279 <infoflow type="read" weight="10"/>
16280 </interface>
16281 -<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="31389">
16282 +<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="31512">
16283 <summary>
16284 Do not audit attempts to receive UDP traffic on the hadoop_namenode port.
16285 </summary>
16286 @@ -29731,7 +29548,7 @@ Domain to not audit.
16287 </param>
16288 <infoflow type="none"/>
16289 </interface>
16290 -<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="31404">
16291 +<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="31527">
16292 <summary>
16293 Send and receive UDP traffic on the hadoop_namenode port.
16294 </summary>
16295 @@ -29742,7 +29559,7 @@ Domain allowed access.
16296 </param>
16297 <infoflow type="both" weight="10"/>
16298 </interface>
16299 -<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="31420">
16300 +<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="31543">
16301 <summary>
16302 Do not audit attempts to send and receive
16303 UDP traffic on the hadoop_namenode port.
16304 @@ -29754,7 +29571,7 @@ Domain to not audit.
16305 </param>
16306 <infoflow type="none"/>
16307 </interface>
16308 -<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="31435">
16309 +<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="31558">
16310 <summary>
16311 Bind TCP sockets to the hadoop_namenode port.
16312 </summary>
16313 @@ -29765,7 +29582,7 @@ Domain allowed access.
16314 </param>
16315 <infoflow type="none"/>
16316 </interface>
16317 -<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="31455">
16318 +<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="31578">
16319 <summary>
16320 Bind UDP sockets to the hadoop_namenode port.
16321 </summary>
16322 @@ -29776,7 +29593,7 @@ Domain allowed access.
16323 </param>
16324 <infoflow type="none"/>
16325 </interface>
16326 -<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="31474">
16327 +<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="31597">
16328 <summary>
16329 Make a TCP connection to the hadoop_namenode port.
16330 </summary>
16331 @@ -29786,7 +29603,7 @@ Domain allowed access.
16332 </summary>
16333 </param>
16334 </interface>
16335 -<interface name="corenet_send_hadoop_namenode_client_packets" lineno="31494">
16336 +<interface name="corenet_send_hadoop_namenode_client_packets" lineno="31617">
16337 <summary>
16338 Send hadoop_namenode_client packets.
16339 </summary>
16340 @@ -29797,7 +29614,7 @@ Domain allowed access.
16341 </param>
16342 <infoflow type="write" weight="10"/>
16343 </interface>
16344 -<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="31513">
16345 +<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="31636">
16346 <summary>
16347 Do not audit attempts to send hadoop_namenode_client packets.
16348 </summary>
16349 @@ -29808,7 +29625,7 @@ Domain to not audit.
16350 </param>
16351 <infoflow type="none"/>
16352 </interface>
16353 -<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="31532">
16354 +<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="31655">
16355 <summary>
16356 Receive hadoop_namenode_client packets.
16357 </summary>
16358 @@ -29819,7 +29636,7 @@ Domain allowed access.
16359 </param>
16360 <infoflow type="read" weight="10"/>
16361 </interface>
16362 -<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="31551">
16363 +<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="31674">
16364 <summary>
16365 Do not audit attempts to receive hadoop_namenode_client packets.
16366 </summary>
16367 @@ -29830,7 +29647,7 @@ Domain allowed access.
16368 </param>
16369 <infoflow type="none"/>
16370 </interface>
16371 -<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="31570">
16372 +<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="31693">
16373 <summary>
16374 Send and receive hadoop_namenode_client packets.
16375 </summary>
16376 @@ -29841,7 +29658,7 @@ Domain allowed access.
16377 </param>
16378 <infoflow type="both" weight="10"/>
16379 </interface>
16380 -<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="31586">
16381 +<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="31709">
16382 <summary>
16383 Do not audit attempts to send and receive hadoop_namenode_client packets.
16384 </summary>
16385 @@ -29852,7 +29669,7 @@ Domain to not audit.
16386 </param>
16387 <infoflow type="none"/>
16388 </interface>
16389 -<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="31601">
16390 +<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="31724">
16391 <summary>
16392 Relabel packets to hadoop_namenode_client the packet type.
16393 </summary>
16394 @@ -29862,7 +29679,7 @@ Domain allowed access.
16395 </summary>
16396 </param>
16397 </interface>
16398 -<interface name="corenet_send_hadoop_namenode_server_packets" lineno="31621">
16399 +<interface name="corenet_send_hadoop_namenode_server_packets" lineno="31744">
16400 <summary>
16401 Send hadoop_namenode_server packets.
16402 </summary>
16403 @@ -29873,7 +29690,7 @@ Domain allowed access.
16404 </param>
16405 <infoflow type="write" weight="10"/>
16406 </interface>
16407 -<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="31640">
16408 +<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="31763">
16409 <summary>
16410 Do not audit attempts to send hadoop_namenode_server packets.
16411 </summary>
16412 @@ -29884,7 +29701,7 @@ Domain to not audit.
16413 </param>
16414 <infoflow type="none"/>
16415 </interface>
16416 -<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="31659">
16417 +<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="31782">
16418 <summary>
16419 Receive hadoop_namenode_server packets.
16420 </summary>
16421 @@ -29895,7 +29712,7 @@ Domain allowed access.
16422 </param>
16423 <infoflow type="read" weight="10"/>
16424 </interface>
16425 -<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="31678">
16426 +<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="31801">
16427 <summary>
16428 Do not audit attempts to receive hadoop_namenode_server packets.
16429 </summary>
16430 @@ -29906,7 +29723,7 @@ Domain allowed access.
16431 </param>
16432 <infoflow type="none"/>
16433 </interface>
16434 -<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="31697">
16435 +<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="31820">
16436 <summary>
16437 Send and receive hadoop_namenode_server packets.
16438 </summary>
16439 @@ -29917,7 +29734,7 @@ Domain allowed access.
16440 </param>
16441 <infoflow type="both" weight="10"/>
16442 </interface>
16443 -<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="31713">
16444 +<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="31836">
16445 <summary>
16446 Do not audit attempts to send and receive hadoop_namenode_server packets.
16447 </summary>
16448 @@ -29928,7 +29745,7 @@ Domain to not audit.
16449 </param>
16450 <infoflow type="none"/>
16451 </interface>
16452 -<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="31728">
16453 +<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="31851">
16454 <summary>
16455 Relabel packets to hadoop_namenode_server the packet type.
16456 </summary>
16457 @@ -29938,7 +29755,7 @@ Domain allowed access.
16458 </summary>
16459 </param>
16460 </interface>
16461 -<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="31750">
16462 +<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="31873">
16463 <summary>
16464 Send and receive TCP traffic on the hddtemp port.
16465 </summary>
16466 @@ -29949,7 +29766,7 @@ Domain allowed access.
16467 </param>
16468 <infoflow type="both" weight="10"/>
16469 </interface>
16470 -<interface name="corenet_udp_send_hddtemp_port" lineno="31765">
16471 +<interface name="corenet_udp_send_hddtemp_port" lineno="31888">
16472 <summary>
16473 Send UDP traffic on the hddtemp port.
16474 </summary>
16475 @@ -29960,7 +29777,7 @@ Domain allowed access.
16476 </param>
16477 <infoflow type="write" weight="10"/>
16478 </interface>
16479 -<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="31780">
16480 +<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="31903">
16481 <summary>
16482 Do not audit attempts to send UDP traffic on the hddtemp port.
16483 </summary>
16484 @@ -29971,7 +29788,7 @@ Domain to not audit.
16485 </param>
16486 <infoflow type="none"/>
16487 </interface>
16488 -<interface name="corenet_udp_receive_hddtemp_port" lineno="31795">
16489 +<interface name="corenet_udp_receive_hddtemp_port" lineno="31918">
16490 <summary>
16491 Receive UDP traffic on the hddtemp port.
16492 </summary>
16493 @@ -29982,7 +29799,7 @@ Domain allowed access.
16494 </param>
16495 <infoflow type="read" weight="10"/>
16496 </interface>
16497 -<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="31810">
16498 +<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="31933">
16499 <summary>
16500 Do not audit attempts to receive UDP traffic on the hddtemp port.
16501 </summary>
16502 @@ -29993,7 +29810,7 @@ Domain to not audit.
16503 </param>
16504 <infoflow type="none"/>
16505 </interface>
16506 -<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="31825">
16507 +<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="31948">
16508 <summary>
16509 Send and receive UDP traffic on the hddtemp port.
16510 </summary>
16511 @@ -30004,7 +29821,7 @@ Domain allowed access.
16512 </param>
16513 <infoflow type="both" weight="10"/>
16514 </interface>
16515 -<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="31841">
16516 +<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="31964">
16517 <summary>
16518 Do not audit attempts to send and receive
16519 UDP traffic on the hddtemp port.
16520 @@ -30016,7 +29833,7 @@ Domain to not audit.
16521 </param>
16522 <infoflow type="none"/>
16523 </interface>
16524 -<interface name="corenet_tcp_bind_hddtemp_port" lineno="31856">
16525 +<interface name="corenet_tcp_bind_hddtemp_port" lineno="31979">
16526 <summary>
16527 Bind TCP sockets to the hddtemp port.
16528 </summary>
16529 @@ -30027,7 +29844,7 @@ Domain allowed access.
16530 </param>
16531 <infoflow type="none"/>
16532 </interface>
16533 -<interface name="corenet_udp_bind_hddtemp_port" lineno="31876">
16534 +<interface name="corenet_udp_bind_hddtemp_port" lineno="31999">
16535 <summary>
16536 Bind UDP sockets to the hddtemp port.
16537 </summary>
16538 @@ -30038,7 +29855,7 @@ Domain allowed access.
16539 </param>
16540 <infoflow type="none"/>
16541 </interface>
16542 -<interface name="corenet_tcp_connect_hddtemp_port" lineno="31895">
16543 +<interface name="corenet_tcp_connect_hddtemp_port" lineno="32018">
16544 <summary>
16545 Make a TCP connection to the hddtemp port.
16546 </summary>
16547 @@ -30048,7 +29865,7 @@ Domain allowed access.
16548 </summary>
16549 </param>
16550 </interface>
16551 -<interface name="corenet_send_hddtemp_client_packets" lineno="31915">
16552 +<interface name="corenet_send_hddtemp_client_packets" lineno="32038">
16553 <summary>
16554 Send hddtemp_client packets.
16555 </summary>
16556 @@ -30059,7 +29876,7 @@ Domain allowed access.
16557 </param>
16558 <infoflow type="write" weight="10"/>
16559 </interface>
16560 -<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="31934">
16561 +<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="32057">
16562 <summary>
16563 Do not audit attempts to send hddtemp_client packets.
16564 </summary>
16565 @@ -30070,7 +29887,7 @@ Domain to not audit.
16566 </param>
16567 <infoflow type="none"/>
16568 </interface>
16569 -<interface name="corenet_receive_hddtemp_client_packets" lineno="31953">
16570 +<interface name="corenet_receive_hddtemp_client_packets" lineno="32076">
16571 <summary>
16572 Receive hddtemp_client packets.
16573 </summary>
16574 @@ -30081,7 +29898,7 @@ Domain allowed access.
16575 </param>
16576 <infoflow type="read" weight="10"/>
16577 </interface>
16578 -<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="31972">
16579 +<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="32095">
16580 <summary>
16581 Do not audit attempts to receive hddtemp_client packets.
16582 </summary>
16583 @@ -30092,7 +29909,7 @@ Domain allowed access.
16584 </param>
16585 <infoflow type="none"/>
16586 </interface>
16587 -<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="31991">
16588 +<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="32114">
16589 <summary>
16590 Send and receive hddtemp_client packets.
16591 </summary>
16592 @@ -30103,7 +29920,7 @@ Domain allowed access.
16593 </param>
16594 <infoflow type="both" weight="10"/>
16595 </interface>
16596 -<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="32007">
16597 +<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="32130">
16598 <summary>
16599 Do not audit attempts to send and receive hddtemp_client packets.
16600 </summary>
16601 @@ -30114,7 +29931,7 @@ Domain to not audit.
16602 </param>
16603 <infoflow type="none"/>
16604 </interface>
16605 -<interface name="corenet_relabelto_hddtemp_client_packets" lineno="32022">
16606 +<interface name="corenet_relabelto_hddtemp_client_packets" lineno="32145">
16607 <summary>
16608 Relabel packets to hddtemp_client the packet type.
16609 </summary>
16610 @@ -30124,7 +29941,7 @@ Domain allowed access.
16611 </summary>
16612 </param>
16613 </interface>
16614 -<interface name="corenet_send_hddtemp_server_packets" lineno="32042">
16615 +<interface name="corenet_send_hddtemp_server_packets" lineno="32165">
16616 <summary>
16617 Send hddtemp_server packets.
16618 </summary>
16619 @@ -30135,7 +29952,7 @@ Domain allowed access.
16620 </param>
16621 <infoflow type="write" weight="10"/>
16622 </interface>
16623 -<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="32061">
16624 +<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="32184">
16625 <summary>
16626 Do not audit attempts to send hddtemp_server packets.
16627 </summary>
16628 @@ -30146,7 +29963,7 @@ Domain to not audit.
16629 </param>
16630 <infoflow type="none"/>
16631 </interface>
16632 -<interface name="corenet_receive_hddtemp_server_packets" lineno="32080">
16633 +<interface name="corenet_receive_hddtemp_server_packets" lineno="32203">
16634 <summary>
16635 Receive hddtemp_server packets.
16636 </summary>
16637 @@ -30157,7 +29974,7 @@ Domain allowed access.
16638 </param>
16639 <infoflow type="read" weight="10"/>
16640 </interface>
16641 -<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="32099">
16642 +<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="32222">
16643 <summary>
16644 Do not audit attempts to receive hddtemp_server packets.
16645 </summary>
16646 @@ -30168,7 +29985,7 @@ Domain allowed access.
16647 </param>
16648 <infoflow type="none"/>
16649 </interface>
16650 -<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="32118">
16651 +<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="32241">
16652 <summary>
16653 Send and receive hddtemp_server packets.
16654 </summary>
16655 @@ -30179,7 +29996,7 @@ Domain allowed access.
16656 </param>
16657 <infoflow type="both" weight="10"/>
16658 </interface>
16659 -<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="32134">
16660 +<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="32257">
16661 <summary>
16662 Do not audit attempts to send and receive hddtemp_server packets.
16663 </summary>
16664 @@ -30190,7 +30007,7 @@ Domain to not audit.
16665 </param>
16666 <infoflow type="none"/>
16667 </interface>
16668 -<interface name="corenet_relabelto_hddtemp_server_packets" lineno="32149">
16669 +<interface name="corenet_relabelto_hddtemp_server_packets" lineno="32272">
16670 <summary>
16671 Relabel packets to hddtemp_server the packet type.
16672 </summary>
16673 @@ -30200,7 +30017,7 @@ Domain allowed access.
16674 </summary>
16675 </param>
16676 </interface>
16677 -<interface name="corenet_tcp_sendrecv_howl_port" lineno="32171">
16678 +<interface name="corenet_tcp_sendrecv_howl_port" lineno="32294">
16679 <summary>
16680 Send and receive TCP traffic on the howl port.
16681 </summary>
16682 @@ -30211,7 +30028,7 @@ Domain allowed access.
16683 </param>
16684 <infoflow type="both" weight="10"/>
16685 </interface>
16686 -<interface name="corenet_udp_send_howl_port" lineno="32186">
16687 +<interface name="corenet_udp_send_howl_port" lineno="32309">
16688 <summary>
16689 Send UDP traffic on the howl port.
16690 </summary>
16691 @@ -30222,7 +30039,7 @@ Domain allowed access.
16692 </param>
16693 <infoflow type="write" weight="10"/>
16694 </interface>
16695 -<interface name="corenet_dontaudit_udp_send_howl_port" lineno="32201">
16696 +<interface name="corenet_dontaudit_udp_send_howl_port" lineno="32324">
16697 <summary>
16698 Do not audit attempts to send UDP traffic on the howl port.
16699 </summary>
16700 @@ -30233,7 +30050,7 @@ Domain to not audit.
16701 </param>
16702 <infoflow type="none"/>
16703 </interface>
16704 -<interface name="corenet_udp_receive_howl_port" lineno="32216">
16705 +<interface name="corenet_udp_receive_howl_port" lineno="32339">
16706 <summary>
16707 Receive UDP traffic on the howl port.
16708 </summary>
16709 @@ -30244,7 +30061,7 @@ Domain allowed access.
16710 </param>
16711 <infoflow type="read" weight="10"/>
16712 </interface>
16713 -<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="32231">
16714 +<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="32354">
16715 <summary>
16716 Do not audit attempts to receive UDP traffic on the howl port.
16717 </summary>
16718 @@ -30255,7 +30072,7 @@ Domain to not audit.
16719 </param>
16720 <infoflow type="none"/>
16721 </interface>
16722 -<interface name="corenet_udp_sendrecv_howl_port" lineno="32246">
16723 +<interface name="corenet_udp_sendrecv_howl_port" lineno="32369">
16724 <summary>
16725 Send and receive UDP traffic on the howl port.
16726 </summary>
16727 @@ -30266,7 +30083,7 @@ Domain allowed access.
16728 </param>
16729 <infoflow type="both" weight="10"/>
16730 </interface>
16731 -<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="32262">
16732 +<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="32385">
16733 <summary>
16734 Do not audit attempts to send and receive
16735 UDP traffic on the howl port.
16736 @@ -30278,7 +30095,7 @@ Domain to not audit.
16737 </param>
16738 <infoflow type="none"/>
16739 </interface>
16740 -<interface name="corenet_tcp_bind_howl_port" lineno="32277">
16741 +<interface name="corenet_tcp_bind_howl_port" lineno="32400">
16742 <summary>
16743 Bind TCP sockets to the howl port.
16744 </summary>
16745 @@ -30289,7 +30106,7 @@ Domain allowed access.
16746 </param>
16747 <infoflow type="none"/>
16748 </interface>
16749 -<interface name="corenet_udp_bind_howl_port" lineno="32297">
16750 +<interface name="corenet_udp_bind_howl_port" lineno="32420">
16751 <summary>
16752 Bind UDP sockets to the howl port.
16753 </summary>
16754 @@ -30300,7 +30117,7 @@ Domain allowed access.
16755 </param>
16756 <infoflow type="none"/>
16757 </interface>
16758 -<interface name="corenet_tcp_connect_howl_port" lineno="32316">
16759 +<interface name="corenet_tcp_connect_howl_port" lineno="32439">
16760 <summary>
16761 Make a TCP connection to the howl port.
16762 </summary>
16763 @@ -30310,7 +30127,7 @@ Domain allowed access.
16764 </summary>
16765 </param>
16766 </interface>
16767 -<interface name="corenet_send_howl_client_packets" lineno="32336">
16768 +<interface name="corenet_send_howl_client_packets" lineno="32459">
16769 <summary>
16770 Send howl_client packets.
16771 </summary>
16772 @@ -30321,7 +30138,7 @@ Domain allowed access.
16773 </param>
16774 <infoflow type="write" weight="10"/>
16775 </interface>
16776 -<interface name="corenet_dontaudit_send_howl_client_packets" lineno="32355">
16777 +<interface name="corenet_dontaudit_send_howl_client_packets" lineno="32478">
16778 <summary>
16779 Do not audit attempts to send howl_client packets.
16780 </summary>
16781 @@ -30332,7 +30149,7 @@ Domain to not audit.
16782 </param>
16783 <infoflow type="none"/>
16784 </interface>
16785 -<interface name="corenet_receive_howl_client_packets" lineno="32374">
16786 +<interface name="corenet_receive_howl_client_packets" lineno="32497">
16787 <summary>
16788 Receive howl_client packets.
16789 </summary>
16790 @@ -30343,7 +30160,7 @@ Domain allowed access.
16791 </param>
16792 <infoflow type="read" weight="10"/>
16793 </interface>
16794 -<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="32393">
16795 +<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="32516">
16796 <summary>
16797 Do not audit attempts to receive howl_client packets.
16798 </summary>
16799 @@ -30354,7 +30171,7 @@ Domain allowed access.
16800 </param>
16801 <infoflow type="none"/>
16802 </interface>
16803 -<interface name="corenet_sendrecv_howl_client_packets" lineno="32412">
16804 +<interface name="corenet_sendrecv_howl_client_packets" lineno="32535">
16805 <summary>
16806 Send and receive howl_client packets.
16807 </summary>
16808 @@ -30365,7 +30182,7 @@ Domain allowed access.
16809 </param>
16810 <infoflow type="both" weight="10"/>
16811 </interface>
16812 -<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="32428">
16813 +<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="32551">
16814 <summary>
16815 Do not audit attempts to send and receive howl_client packets.
16816 </summary>
16817 @@ -30376,7 +30193,7 @@ Domain to not audit.
16818 </param>
16819 <infoflow type="none"/>
16820 </interface>
16821 -<interface name="corenet_relabelto_howl_client_packets" lineno="32443">
16822 +<interface name="corenet_relabelto_howl_client_packets" lineno="32566">
16823 <summary>
16824 Relabel packets to howl_client the packet type.
16825 </summary>
16826 @@ -30386,7 +30203,7 @@ Domain allowed access.
16827 </summary>
16828 </param>
16829 </interface>
16830 -<interface name="corenet_send_howl_server_packets" lineno="32463">
16831 +<interface name="corenet_send_howl_server_packets" lineno="32586">
16832 <summary>
16833 Send howl_server packets.
16834 </summary>
16835 @@ -30397,7 +30214,7 @@ Domain allowed access.
16836 </param>
16837 <infoflow type="write" weight="10"/>
16838 </interface>
16839 -<interface name="corenet_dontaudit_send_howl_server_packets" lineno="32482">
16840 +<interface name="corenet_dontaudit_send_howl_server_packets" lineno="32605">
16841 <summary>
16842 Do not audit attempts to send howl_server packets.
16843 </summary>
16844 @@ -30408,7 +30225,7 @@ Domain to not audit.
16845 </param>
16846 <infoflow type="none"/>
16847 </interface>
16848 -<interface name="corenet_receive_howl_server_packets" lineno="32501">
16849 +<interface name="corenet_receive_howl_server_packets" lineno="32624">
16850 <summary>
16851 Receive howl_server packets.
16852 </summary>
16853 @@ -30419,7 +30236,7 @@ Domain allowed access.
16854 </param>
16855 <infoflow type="read" weight="10"/>
16856 </interface>
16857 -<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="32520">
16858 +<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="32643">
16859 <summary>
16860 Do not audit attempts to receive howl_server packets.
16861 </summary>
16862 @@ -30430,7 +30247,7 @@ Domain allowed access.
16863 </param>
16864 <infoflow type="none"/>
16865 </interface>
16866 -<interface name="corenet_sendrecv_howl_server_packets" lineno="32539">
16867 +<interface name="corenet_sendrecv_howl_server_packets" lineno="32662">
16868 <summary>
16869 Send and receive howl_server packets.
16870 </summary>
16871 @@ -30441,7 +30258,7 @@ Domain allowed access.
16872 </param>
16873 <infoflow type="both" weight="10"/>
16874 </interface>
16875 -<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="32555">
16876 +<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="32678">
16877 <summary>
16878 Do not audit attempts to send and receive howl_server packets.
16879 </summary>
16880 @@ -30452,7 +30269,7 @@ Domain to not audit.
16881 </param>
16882 <infoflow type="none"/>
16883 </interface>
16884 -<interface name="corenet_relabelto_howl_server_packets" lineno="32570">
16885 +<interface name="corenet_relabelto_howl_server_packets" lineno="32693">
16886 <summary>
16887 Relabel packets to howl_server the packet type.
16888 </summary>
16889 @@ -30462,7 +30279,7 @@ Domain allowed access.
16890 </summary>
16891 </param>
16892 </interface>
16893 -<interface name="corenet_tcp_sendrecv_hplip_port" lineno="32592">
16894 +<interface name="corenet_tcp_sendrecv_hplip_port" lineno="32715">
16895 <summary>
16896 Send and receive TCP traffic on the hplip port.
16897 </summary>
16898 @@ -30473,7 +30290,7 @@ Domain allowed access.
16899 </param>
16900 <infoflow type="both" weight="10"/>
16901 </interface>
16902 -<interface name="corenet_udp_send_hplip_port" lineno="32607">
16903 +<interface name="corenet_udp_send_hplip_port" lineno="32730">
16904 <summary>
16905 Send UDP traffic on the hplip port.
16906 </summary>
16907 @@ -30484,7 +30301,7 @@ Domain allowed access.
16908 </param>
16909 <infoflow type="write" weight="10"/>
16910 </interface>
16911 -<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="32622">
16912 +<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="32745">
16913 <summary>
16914 Do not audit attempts to send UDP traffic on the hplip port.
16915 </summary>
16916 @@ -30495,7 +30312,7 @@ Domain to not audit.
16917 </param>
16918 <infoflow type="none"/>
16919 </interface>
16920 -<interface name="corenet_udp_receive_hplip_port" lineno="32637">
16921 +<interface name="corenet_udp_receive_hplip_port" lineno="32760">
16922 <summary>
16923 Receive UDP traffic on the hplip port.
16924 </summary>
16925 @@ -30506,7 +30323,7 @@ Domain allowed access.
16926 </param>
16927 <infoflow type="read" weight="10"/>
16928 </interface>
16929 -<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="32652">
16930 +<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="32775">
16931 <summary>
16932 Do not audit attempts to receive UDP traffic on the hplip port.
16933 </summary>
16934 @@ -30517,7 +30334,7 @@ Domain to not audit.
16935 </param>
16936 <infoflow type="none"/>
16937 </interface>
16938 -<interface name="corenet_udp_sendrecv_hplip_port" lineno="32667">
16939 +<interface name="corenet_udp_sendrecv_hplip_port" lineno="32790">
16940 <summary>
16941 Send and receive UDP traffic on the hplip port.
16942 </summary>
16943 @@ -30528,7 +30345,7 @@ Domain allowed access.
16944 </param>
16945 <infoflow type="both" weight="10"/>
16946 </interface>
16947 -<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="32683">
16948 +<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="32806">
16949 <summary>
16950 Do not audit attempts to send and receive
16951 UDP traffic on the hplip port.
16952 @@ -30540,7 +30357,7 @@ Domain to not audit.
16953 </param>
16954 <infoflow type="none"/>
16955 </interface>
16956 -<interface name="corenet_tcp_bind_hplip_port" lineno="32698">
16957 +<interface name="corenet_tcp_bind_hplip_port" lineno="32821">
16958 <summary>
16959 Bind TCP sockets to the hplip port.
16960 </summary>
16961 @@ -30551,7 +30368,7 @@ Domain allowed access.
16962 </param>
16963 <infoflow type="none"/>
16964 </interface>
16965 -<interface name="corenet_udp_bind_hplip_port" lineno="32718">
16966 +<interface name="corenet_udp_bind_hplip_port" lineno="32841">
16967 <summary>
16968 Bind UDP sockets to the hplip port.
16969 </summary>
16970 @@ -30562,7 +30379,7 @@ Domain allowed access.
16971 </param>
16972 <infoflow type="none"/>
16973 </interface>
16974 -<interface name="corenet_tcp_connect_hplip_port" lineno="32737">
16975 +<interface name="corenet_tcp_connect_hplip_port" lineno="32860">
16976 <summary>
16977 Make a TCP connection to the hplip port.
16978 </summary>
16979 @@ -30572,7 +30389,7 @@ Domain allowed access.
16980 </summary>
16981 </param>
16982 </interface>
16983 -<interface name="corenet_send_hplip_client_packets" lineno="32757">
16984 +<interface name="corenet_send_hplip_client_packets" lineno="32880">
16985 <summary>
16986 Send hplip_client packets.
16987 </summary>
16988 @@ -30583,7 +30400,7 @@ Domain allowed access.
16989 </param>
16990 <infoflow type="write" weight="10"/>
16991 </interface>
16992 -<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="32776">
16993 +<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="32899">
16994 <summary>
16995 Do not audit attempts to send hplip_client packets.
16996 </summary>
16997 @@ -30594,7 +30411,7 @@ Domain to not audit.
16998 </param>
16999 <infoflow type="none"/>
17000 </interface>
17001 -<interface name="corenet_receive_hplip_client_packets" lineno="32795">
17002 +<interface name="corenet_receive_hplip_client_packets" lineno="32918">
17003 <summary>
17004 Receive hplip_client packets.
17005 </summary>
17006 @@ -30605,7 +30422,7 @@ Domain allowed access.
17007 </param>
17008 <infoflow type="read" weight="10"/>
17009 </interface>
17010 -<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="32814">
17011 +<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="32937">
17012 <summary>
17013 Do not audit attempts to receive hplip_client packets.
17014 </summary>
17015 @@ -30616,7 +30433,7 @@ Domain allowed access.
17016 </param>
17017 <infoflow type="none"/>
17018 </interface>
17019 -<interface name="corenet_sendrecv_hplip_client_packets" lineno="32833">
17020 +<interface name="corenet_sendrecv_hplip_client_packets" lineno="32956">
17021 <summary>
17022 Send and receive hplip_client packets.
17023 </summary>
17024 @@ -30627,7 +30444,7 @@ Domain allowed access.
17025 </param>
17026 <infoflow type="both" weight="10"/>
17027 </interface>
17028 -<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="32849">
17029 +<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="32972">
17030 <summary>
17031 Do not audit attempts to send and receive hplip_client packets.
17032 </summary>
17033 @@ -30638,7 +30455,7 @@ Domain to not audit.
17034 </param>
17035 <infoflow type="none"/>
17036 </interface>
17037 -<interface name="corenet_relabelto_hplip_client_packets" lineno="32864">
17038 +<interface name="corenet_relabelto_hplip_client_packets" lineno="32987">
17039 <summary>
17040 Relabel packets to hplip_client the packet type.
17041 </summary>
17042 @@ -30648,7 +30465,7 @@ Domain allowed access.
17043 </summary>
17044 </param>
17045 </interface>
17046 -<interface name="corenet_send_hplip_server_packets" lineno="32884">
17047 +<interface name="corenet_send_hplip_server_packets" lineno="33007">
17048 <summary>
17049 Send hplip_server packets.
17050 </summary>
17051 @@ -30659,7 +30476,7 @@ Domain allowed access.
17052 </param>
17053 <infoflow type="write" weight="10"/>
17054 </interface>
17055 -<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="32903">
17056 +<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="33026">
17057 <summary>
17058 Do not audit attempts to send hplip_server packets.
17059 </summary>
17060 @@ -30670,7 +30487,7 @@ Domain to not audit.
17061 </param>
17062 <infoflow type="none"/>
17063 </interface>
17064 -<interface name="corenet_receive_hplip_server_packets" lineno="32922">
17065 +<interface name="corenet_receive_hplip_server_packets" lineno="33045">
17066 <summary>
17067 Receive hplip_server packets.
17068 </summary>
17069 @@ -30681,7 +30498,7 @@ Domain allowed access.
17070 </param>
17071 <infoflow type="read" weight="10"/>
17072 </interface>
17073 -<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="32941">
17074 +<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="33064">
17075 <summary>
17076 Do not audit attempts to receive hplip_server packets.
17077 </summary>
17078 @@ -30692,7 +30509,7 @@ Domain allowed access.
17079 </param>
17080 <infoflow type="none"/>
17081 </interface>
17082 -<interface name="corenet_sendrecv_hplip_server_packets" lineno="32960">
17083 +<interface name="corenet_sendrecv_hplip_server_packets" lineno="33083">
17084 <summary>
17085 Send and receive hplip_server packets.
17086 </summary>
17087 @@ -30703,7 +30520,7 @@ Domain allowed access.
17088 </param>
17089 <infoflow type="both" weight="10"/>
17090 </interface>
17091 -<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="32976">
17092 +<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="33099">
17093 <summary>
17094 Do not audit attempts to send and receive hplip_server packets.
17095 </summary>
17096 @@ -30714,7 +30531,7 @@ Domain to not audit.
17097 </param>
17098 <infoflow type="none"/>
17099 </interface>
17100 -<interface name="corenet_relabelto_hplip_server_packets" lineno="32991">
17101 +<interface name="corenet_relabelto_hplip_server_packets" lineno="33114">
17102 <summary>
17103 Relabel packets to hplip_server the packet type.
17104 </summary>
17105 @@ -30724,7 +30541,7 @@ Domain allowed access.
17106 </summary>
17107 </param>
17108 </interface>
17109 -<interface name="corenet_tcp_sendrecv_http_port" lineno="33013">
17110 +<interface name="corenet_tcp_sendrecv_http_port" lineno="33136">
17111 <summary>
17112 Send and receive TCP traffic on the http port.
17113 </summary>
17114 @@ -30735,7 +30552,7 @@ Domain allowed access.
17115 </param>
17116 <infoflow type="both" weight="10"/>
17117 </interface>
17118 -<interface name="corenet_udp_send_http_port" lineno="33028">
17119 +<interface name="corenet_udp_send_http_port" lineno="33151">
17120 <summary>
17121 Send UDP traffic on the http port.
17122 </summary>
17123 @@ -30746,7 +30563,7 @@ Domain allowed access.
17124 </param>
17125 <infoflow type="write" weight="10"/>
17126 </interface>
17127 -<interface name="corenet_dontaudit_udp_send_http_port" lineno="33043">
17128 +<interface name="corenet_dontaudit_udp_send_http_port" lineno="33166">
17129 <summary>
17130 Do not audit attempts to send UDP traffic on the http port.
17131 </summary>
17132 @@ -30757,7 +30574,7 @@ Domain to not audit.
17133 </param>
17134 <infoflow type="none"/>
17135 </interface>
17136 -<interface name="corenet_udp_receive_http_port" lineno="33058">
17137 +<interface name="corenet_udp_receive_http_port" lineno="33181">
17138 <summary>
17139 Receive UDP traffic on the http port.
17140 </summary>
17141 @@ -30768,7 +30585,7 @@ Domain allowed access.
17142 </param>
17143 <infoflow type="read" weight="10"/>
17144 </interface>
17145 -<interface name="corenet_dontaudit_udp_receive_http_port" lineno="33073">
17146 +<interface name="corenet_dontaudit_udp_receive_http_port" lineno="33196">
17147 <summary>
17148 Do not audit attempts to receive UDP traffic on the http port.
17149 </summary>
17150 @@ -30779,7 +30596,7 @@ Domain to not audit.
17151 </param>
17152 <infoflow type="none"/>
17153 </interface>
17154 -<interface name="corenet_udp_sendrecv_http_port" lineno="33088">
17155 +<interface name="corenet_udp_sendrecv_http_port" lineno="33211">
17156 <summary>
17157 Send and receive UDP traffic on the http port.
17158 </summary>
17159 @@ -30790,7 +30607,7 @@ Domain allowed access.
17160 </param>
17161 <infoflow type="both" weight="10"/>
17162 </interface>
17163 -<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="33104">
17164 +<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="33227">
17165 <summary>
17166 Do not audit attempts to send and receive
17167 UDP traffic on the http port.
17168 @@ -30802,7 +30619,7 @@ Domain to not audit.
17169 </param>
17170 <infoflow type="none"/>
17171 </interface>
17172 -<interface name="corenet_tcp_bind_http_port" lineno="33119">
17173 +<interface name="corenet_tcp_bind_http_port" lineno="33242">
17174 <summary>
17175 Bind TCP sockets to the http port.
17176 </summary>
17177 @@ -30813,7 +30630,7 @@ Domain allowed access.
17178 </param>
17179 <infoflow type="none"/>
17180 </interface>
17181 -<interface name="corenet_udp_bind_http_port" lineno="33139">
17182 +<interface name="corenet_udp_bind_http_port" lineno="33262">
17183 <summary>
17184 Bind UDP sockets to the http port.
17185 </summary>
17186 @@ -30824,7 +30641,7 @@ Domain allowed access.
17187 </param>
17188 <infoflow type="none"/>
17189 </interface>
17190 -<interface name="corenet_tcp_connect_http_port" lineno="33158">
17191 +<interface name="corenet_tcp_connect_http_port" lineno="33281">
17192 <summary>
17193 Make a TCP connection to the http port.
17194 </summary>
17195 @@ -30834,7 +30651,7 @@ Domain allowed access.
17196 </summary>
17197 </param>
17198 </interface>
17199 -<interface name="corenet_send_http_client_packets" lineno="33178">
17200 +<interface name="corenet_send_http_client_packets" lineno="33301">
17201 <summary>
17202 Send http_client packets.
17203 </summary>
17204 @@ -30845,7 +30662,7 @@ Domain allowed access.
17205 </param>
17206 <infoflow type="write" weight="10"/>
17207 </interface>
17208 -<interface name="corenet_dontaudit_send_http_client_packets" lineno="33197">
17209 +<interface name="corenet_dontaudit_send_http_client_packets" lineno="33320">
17210 <summary>
17211 Do not audit attempts to send http_client packets.
17212 </summary>
17213 @@ -30856,7 +30673,7 @@ Domain to not audit.
17214 </param>
17215 <infoflow type="none"/>
17216 </interface>
17217 -<interface name="corenet_receive_http_client_packets" lineno="33216">
17218 +<interface name="corenet_receive_http_client_packets" lineno="33339">
17219 <summary>
17220 Receive http_client packets.
17221 </summary>
17222 @@ -30867,7 +30684,7 @@ Domain allowed access.
17223 </param>
17224 <infoflow type="read" weight="10"/>
17225 </interface>
17226 -<interface name="corenet_dontaudit_receive_http_client_packets" lineno="33235">
17227 +<interface name="corenet_dontaudit_receive_http_client_packets" lineno="33358">
17228 <summary>
17229 Do not audit attempts to receive http_client packets.
17230 </summary>
17231 @@ -30878,7 +30695,7 @@ Domain allowed access.
17232 </param>
17233 <infoflow type="none"/>
17234 </interface>
17235 -<interface name="corenet_sendrecv_http_client_packets" lineno="33254">
17236 +<interface name="corenet_sendrecv_http_client_packets" lineno="33377">
17237 <summary>
17238 Send and receive http_client packets.
17239 </summary>
17240 @@ -30889,7 +30706,7 @@ Domain allowed access.
17241 </param>
17242 <infoflow type="both" weight="10"/>
17243 </interface>
17244 -<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="33270">
17245 +<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="33393">
17246 <summary>
17247 Do not audit attempts to send and receive http_client packets.
17248 </summary>
17249 @@ -30900,7 +30717,7 @@ Domain to not audit.
17250 </param>
17251 <infoflow type="none"/>
17252 </interface>
17253 -<interface name="corenet_relabelto_http_client_packets" lineno="33285">
17254 +<interface name="corenet_relabelto_http_client_packets" lineno="33408">
17255 <summary>
17256 Relabel packets to http_client the packet type.
17257 </summary>
17258 @@ -30910,7 +30727,7 @@ Domain allowed access.
17259 </summary>
17260 </param>
17261 </interface>
17262 -<interface name="corenet_send_http_server_packets" lineno="33305">
17263 +<interface name="corenet_send_http_server_packets" lineno="33428">
17264 <summary>
17265 Send http_server packets.
17266 </summary>
17267 @@ -30921,7 +30738,7 @@ Domain allowed access.
17268 </param>
17269 <infoflow type="write" weight="10"/>
17270 </interface>
17271 -<interface name="corenet_dontaudit_send_http_server_packets" lineno="33324">
17272 +<interface name="corenet_dontaudit_send_http_server_packets" lineno="33447">
17273 <summary>
17274 Do not audit attempts to send http_server packets.
17275 </summary>
17276 @@ -30932,7 +30749,7 @@ Domain to not audit.
17277 </param>
17278 <infoflow type="none"/>
17279 </interface>
17280 -<interface name="corenet_receive_http_server_packets" lineno="33343">
17281 +<interface name="corenet_receive_http_server_packets" lineno="33466">
17282 <summary>
17283 Receive http_server packets.
17284 </summary>
17285 @@ -30943,7 +30760,7 @@ Domain allowed access.
17286 </param>
17287 <infoflow type="read" weight="10"/>
17288 </interface>
17289 -<interface name="corenet_dontaudit_receive_http_server_packets" lineno="33362">
17290 +<interface name="corenet_dontaudit_receive_http_server_packets" lineno="33485">
17291 <summary>
17292 Do not audit attempts to receive http_server packets.
17293 </summary>
17294 @@ -30954,7 +30771,7 @@ Domain allowed access.
17295 </param>
17296 <infoflow type="none"/>
17297 </interface>
17298 -<interface name="corenet_sendrecv_http_server_packets" lineno="33381">
17299 +<interface name="corenet_sendrecv_http_server_packets" lineno="33504">
17300 <summary>
17301 Send and receive http_server packets.
17302 </summary>
17303 @@ -30965,7 +30782,7 @@ Domain allowed access.
17304 </param>
17305 <infoflow type="both" weight="10"/>
17306 </interface>
17307 -<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="33397">
17308 +<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="33520">
17309 <summary>
17310 Do not audit attempts to send and receive http_server packets.
17311 </summary>
17312 @@ -30976,7 +30793,7 @@ Domain to not audit.
17313 </param>
17314 <infoflow type="none"/>
17315 </interface>
17316 -<interface name="corenet_relabelto_http_server_packets" lineno="33412">
17317 +<interface name="corenet_relabelto_http_server_packets" lineno="33535">
17318 <summary>
17319 Relabel packets to http_server the packet type.
17320 </summary>
17321 @@ -30986,7 +30803,7 @@ Domain allowed access.
17322 </summary>
17323 </param>
17324 </interface>
17325 -<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="33434">
17326 +<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="33557">
17327 <summary>
17328 Send and receive TCP traffic on the http_cache port.
17329 </summary>
17330 @@ -30997,7 +30814,7 @@ Domain allowed access.
17331 </param>
17332 <infoflow type="both" weight="10"/>
17333 </interface>
17334 -<interface name="corenet_udp_send_http_cache_port" lineno="33449">
17335 +<interface name="corenet_udp_send_http_cache_port" lineno="33572">
17336 <summary>
17337 Send UDP traffic on the http_cache port.
17338 </summary>
17339 @@ -31008,7 +30825,7 @@ Domain allowed access.
17340 </param>
17341 <infoflow type="write" weight="10"/>
17342 </interface>
17343 -<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="33464">
17344 +<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="33587">
17345 <summary>
17346 Do not audit attempts to send UDP traffic on the http_cache port.
17347 </summary>
17348 @@ -31019,7 +30836,7 @@ Domain to not audit.
17349 </param>
17350 <infoflow type="none"/>
17351 </interface>
17352 -<interface name="corenet_udp_receive_http_cache_port" lineno="33479">
17353 +<interface name="corenet_udp_receive_http_cache_port" lineno="33602">
17354 <summary>
17355 Receive UDP traffic on the http_cache port.
17356 </summary>
17357 @@ -31030,7 +30847,7 @@ Domain allowed access.
17358 </param>
17359 <infoflow type="read" weight="10"/>
17360 </interface>
17361 -<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="33494">
17362 +<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="33617">
17363 <summary>
17364 Do not audit attempts to receive UDP traffic on the http_cache port.
17365 </summary>
17366 @@ -31041,7 +30858,7 @@ Domain to not audit.
17367 </param>
17368 <infoflow type="none"/>
17369 </interface>
17370 -<interface name="corenet_udp_sendrecv_http_cache_port" lineno="33509">
17371 +<interface name="corenet_udp_sendrecv_http_cache_port" lineno="33632">
17372 <summary>
17373 Send and receive UDP traffic on the http_cache port.
17374 </summary>
17375 @@ -31052,7 +30869,7 @@ Domain allowed access.
17376 </param>
17377 <infoflow type="both" weight="10"/>
17378 </interface>
17379 -<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="33525">
17380 +<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="33648">
17381 <summary>
17382 Do not audit attempts to send and receive
17383 UDP traffic on the http_cache port.
17384 @@ -31064,7 +30881,7 @@ Domain to not audit.
17385 </param>
17386 <infoflow type="none"/>
17387 </interface>
17388 -<interface name="corenet_tcp_bind_http_cache_port" lineno="33540">
17389 +<interface name="corenet_tcp_bind_http_cache_port" lineno="33663">
17390 <summary>
17391 Bind TCP sockets to the http_cache port.
17392 </summary>
17393 @@ -31075,7 +30892,7 @@ Domain allowed access.
17394 </param>
17395 <infoflow type="none"/>
17396 </interface>
17397 -<interface name="corenet_udp_bind_http_cache_port" lineno="33560">
17398 +<interface name="corenet_udp_bind_http_cache_port" lineno="33683">
17399 <summary>
17400 Bind UDP sockets to the http_cache port.
17401 </summary>
17402 @@ -31086,7 +30903,7 @@ Domain allowed access.
17403 </param>
17404 <infoflow type="none"/>
17405 </interface>
17406 -<interface name="corenet_tcp_connect_http_cache_port" lineno="33579">
17407 +<interface name="corenet_tcp_connect_http_cache_port" lineno="33702">
17408 <summary>
17409 Make a TCP connection to the http_cache port.
17410 </summary>
17411 @@ -31096,7 +30913,7 @@ Domain allowed access.
17412 </summary>
17413 </param>
17414 </interface>
17415 -<interface name="corenet_send_http_cache_client_packets" lineno="33599">
17416 +<interface name="corenet_send_http_cache_client_packets" lineno="33722">
17417 <summary>
17418 Send http_cache_client packets.
17419 </summary>
17420 @@ -31107,7 +30924,7 @@ Domain allowed access.
17421 </param>
17422 <infoflow type="write" weight="10"/>
17423 </interface>
17424 -<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="33618">
17425 +<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="33741">
17426 <summary>
17427 Do not audit attempts to send http_cache_client packets.
17428 </summary>
17429 @@ -31118,7 +30935,7 @@ Domain to not audit.
17430 </param>
17431 <infoflow type="none"/>
17432 </interface>
17433 -<interface name="corenet_receive_http_cache_client_packets" lineno="33637">
17434 +<interface name="corenet_receive_http_cache_client_packets" lineno="33760">
17435 <summary>
17436 Receive http_cache_client packets.
17437 </summary>
17438 @@ -31129,7 +30946,7 @@ Domain allowed access.
17439 </param>
17440 <infoflow type="read" weight="10"/>
17441 </interface>
17442 -<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="33656">
17443 +<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="33779">
17444 <summary>
17445 Do not audit attempts to receive http_cache_client packets.
17446 </summary>
17447 @@ -31140,7 +30957,7 @@ Domain allowed access.
17448 </param>
17449 <infoflow type="none"/>
17450 </interface>
17451 -<interface name="corenet_sendrecv_http_cache_client_packets" lineno="33675">
17452 +<interface name="corenet_sendrecv_http_cache_client_packets" lineno="33798">
17453 <summary>
17454 Send and receive http_cache_client packets.
17455 </summary>
17456 @@ -31151,7 +30968,7 @@ Domain allowed access.
17457 </param>
17458 <infoflow type="both" weight="10"/>
17459 </interface>
17460 -<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="33691">
17461 +<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="33814">
17462 <summary>
17463 Do not audit attempts to send and receive http_cache_client packets.
17464 </summary>
17465 @@ -31162,7 +30979,7 @@ Domain to not audit.
17466 </param>
17467 <infoflow type="none"/>
17468 </interface>
17469 -<interface name="corenet_relabelto_http_cache_client_packets" lineno="33706">
17470 +<interface name="corenet_relabelto_http_cache_client_packets" lineno="33829">
17471 <summary>
17472 Relabel packets to http_cache_client the packet type.
17473 </summary>
17474 @@ -31172,7 +30989,7 @@ Domain allowed access.
17475 </summary>
17476 </param>
17477 </interface>
17478 -<interface name="corenet_send_http_cache_server_packets" lineno="33726">
17479 +<interface name="corenet_send_http_cache_server_packets" lineno="33849">
17480 <summary>
17481 Send http_cache_server packets.
17482 </summary>
17483 @@ -31183,7 +31000,7 @@ Domain allowed access.
17484 </param>
17485 <infoflow type="write" weight="10"/>
17486 </interface>
17487 -<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="33745">
17488 +<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="33868">
17489 <summary>
17490 Do not audit attempts to send http_cache_server packets.
17491 </summary>
17492 @@ -31194,7 +31011,7 @@ Domain to not audit.
17493 </param>
17494 <infoflow type="none"/>
17495 </interface>
17496 -<interface name="corenet_receive_http_cache_server_packets" lineno="33764">
17497 +<interface name="corenet_receive_http_cache_server_packets" lineno="33887">
17498 <summary>
17499 Receive http_cache_server packets.
17500 </summary>
17501 @@ -31205,7 +31022,7 @@ Domain allowed access.
17502 </param>
17503 <infoflow type="read" weight="10"/>
17504 </interface>
17505 -<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="33783">
17506 +<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="33906">
17507 <summary>
17508 Do not audit attempts to receive http_cache_server packets.
17509 </summary>
17510 @@ -31216,7 +31033,7 @@ Domain allowed access.
17511 </param>
17512 <infoflow type="none"/>
17513 </interface>
17514 -<interface name="corenet_sendrecv_http_cache_server_packets" lineno="33802">
17515 +<interface name="corenet_sendrecv_http_cache_server_packets" lineno="33925">
17516 <summary>
17517 Send and receive http_cache_server packets.
17518 </summary>
17519 @@ -31227,7 +31044,7 @@ Domain allowed access.
17520 </param>
17521 <infoflow type="both" weight="10"/>
17522 </interface>
17523 -<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="33818">
17524 +<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="33941">
17525 <summary>
17526 Do not audit attempts to send and receive http_cache_server packets.
17527 </summary>
17528 @@ -31238,7 +31055,7 @@ Domain to not audit.
17529 </param>
17530 <infoflow type="none"/>
17531 </interface>
17532 -<interface name="corenet_relabelto_http_cache_server_packets" lineno="33833">
17533 +<interface name="corenet_relabelto_http_cache_server_packets" lineno="33956">
17534 <summary>
17535 Relabel packets to http_cache_server the packet type.
17536 </summary>
17537 @@ -31248,7 +31065,7 @@ Domain allowed access.
17538 </summary>
17539 </param>
17540 </interface>
17541 -<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="33855">
17542 +<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="33978">
17543 <summary>
17544 Send and receive TCP traffic on the i18n_input port.
17545 </summary>
17546 @@ -31259,7 +31076,7 @@ Domain allowed access.
17547 </param>
17548 <infoflow type="both" weight="10"/>
17549 </interface>
17550 -<interface name="corenet_udp_send_i18n_input_port" lineno="33870">
17551 +<interface name="corenet_udp_send_i18n_input_port" lineno="33993">
17552 <summary>
17553 Send UDP traffic on the i18n_input port.
17554 </summary>
17555 @@ -31270,7 +31087,7 @@ Domain allowed access.
17556 </param>
17557 <infoflow type="write" weight="10"/>
17558 </interface>
17559 -<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="33885">
17560 +<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="34008">
17561 <summary>
17562 Do not audit attempts to send UDP traffic on the i18n_input port.
17563 </summary>
17564 @@ -31281,7 +31098,7 @@ Domain to not audit.
17565 </param>
17566 <infoflow type="none"/>
17567 </interface>
17568 -<interface name="corenet_udp_receive_i18n_input_port" lineno="33900">
17569 +<interface name="corenet_udp_receive_i18n_input_port" lineno="34023">
17570 <summary>
17571 Receive UDP traffic on the i18n_input port.
17572 </summary>
17573 @@ -31292,7 +31109,7 @@ Domain allowed access.
17574 </param>
17575 <infoflow type="read" weight="10"/>
17576 </interface>
17577 -<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="33915">
17578 +<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="34038">
17579 <summary>
17580 Do not audit attempts to receive UDP traffic on the i18n_input port.
17581 </summary>
17582 @@ -31303,7 +31120,7 @@ Domain to not audit.
17583 </param>
17584 <infoflow type="none"/>
17585 </interface>
17586 -<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="33930">
17587 +<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="34053">
17588 <summary>
17589 Send and receive UDP traffic on the i18n_input port.
17590 </summary>
17591 @@ -31314,7 +31131,7 @@ Domain allowed access.
17592 </param>
17593 <infoflow type="both" weight="10"/>
17594 </interface>
17595 -<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="33946">
17596 +<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="34069">
17597 <summary>
17598 Do not audit attempts to send and receive
17599 UDP traffic on the i18n_input port.
17600 @@ -31326,7 +31143,7 @@ Domain to not audit.
17601 </param>
17602 <infoflow type="none"/>
17603 </interface>
17604 -<interface name="corenet_tcp_bind_i18n_input_port" lineno="33961">
17605 +<interface name="corenet_tcp_bind_i18n_input_port" lineno="34084">
17606 <summary>
17607 Bind TCP sockets to the i18n_input port.
17608 </summary>
17609 @@ -31337,7 +31154,7 @@ Domain allowed access.
17610 </param>
17611 <infoflow type="none"/>
17612 </interface>
17613 -<interface name="corenet_udp_bind_i18n_input_port" lineno="33981">
17614 +<interface name="corenet_udp_bind_i18n_input_port" lineno="34104">
17615 <summary>
17616 Bind UDP sockets to the i18n_input port.
17617 </summary>
17618 @@ -31348,7 +31165,7 @@ Domain allowed access.
17619 </param>
17620 <infoflow type="none"/>
17621 </interface>
17622 -<interface name="corenet_tcp_connect_i18n_input_port" lineno="34000">
17623 +<interface name="corenet_tcp_connect_i18n_input_port" lineno="34123">
17624 <summary>
17625 Make a TCP connection to the i18n_input port.
17626 </summary>
17627 @@ -31358,7 +31175,7 @@ Domain allowed access.
17628 </summary>
17629 </param>
17630 </interface>
17631 -<interface name="corenet_send_i18n_input_client_packets" lineno="34020">
17632 +<interface name="corenet_send_i18n_input_client_packets" lineno="34143">
17633 <summary>
17634 Send i18n_input_client packets.
17635 </summary>
17636 @@ -31369,7 +31186,7 @@ Domain allowed access.
17637 </param>
17638 <infoflow type="write" weight="10"/>
17639 </interface>
17640 -<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="34039">
17641 +<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="34162">
17642 <summary>
17643 Do not audit attempts to send i18n_input_client packets.
17644 </summary>
17645 @@ -31380,7 +31197,7 @@ Domain to not audit.
17646 </param>
17647 <infoflow type="none"/>
17648 </interface>
17649 -<interface name="corenet_receive_i18n_input_client_packets" lineno="34058">
17650 +<interface name="corenet_receive_i18n_input_client_packets" lineno="34181">
17651 <summary>
17652 Receive i18n_input_client packets.
17653 </summary>
17654 @@ -31391,7 +31208,7 @@ Domain allowed access.
17655 </param>
17656 <infoflow type="read" weight="10"/>
17657 </interface>
17658 -<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="34077">
17659 +<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="34200">
17660 <summary>
17661 Do not audit attempts to receive i18n_input_client packets.
17662 </summary>
17663 @@ -31402,7 +31219,7 @@ Domain allowed access.
17664 </param>
17665 <infoflow type="none"/>
17666 </interface>
17667 -<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="34096">
17668 +<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="34219">
17669 <summary>
17670 Send and receive i18n_input_client packets.
17671 </summary>
17672 @@ -31413,7 +31230,7 @@ Domain allowed access.
17673 </param>
17674 <infoflow type="both" weight="10"/>
17675 </interface>
17676 -<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="34112">
17677 +<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="34235">
17678 <summary>
17679 Do not audit attempts to send and receive i18n_input_client packets.
17680 </summary>
17681 @@ -31424,7 +31241,7 @@ Domain to not audit.
17682 </param>
17683 <infoflow type="none"/>
17684 </interface>
17685 -<interface name="corenet_relabelto_i18n_input_client_packets" lineno="34127">
17686 +<interface name="corenet_relabelto_i18n_input_client_packets" lineno="34250">
17687 <summary>
17688 Relabel packets to i18n_input_client the packet type.
17689 </summary>
17690 @@ -31434,7 +31251,7 @@ Domain allowed access.
17691 </summary>
17692 </param>
17693 </interface>
17694 -<interface name="corenet_send_i18n_input_server_packets" lineno="34147">
17695 +<interface name="corenet_send_i18n_input_server_packets" lineno="34270">
17696 <summary>
17697 Send i18n_input_server packets.
17698 </summary>
17699 @@ -31445,7 +31262,7 @@ Domain allowed access.
17700 </param>
17701 <infoflow type="write" weight="10"/>
17702 </interface>
17703 -<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="34166">
17704 +<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="34289">
17705 <summary>
17706 Do not audit attempts to send i18n_input_server packets.
17707 </summary>
17708 @@ -31456,7 +31273,7 @@ Domain to not audit.
17709 </param>
17710 <infoflow type="none"/>
17711 </interface>
17712 -<interface name="corenet_receive_i18n_input_server_packets" lineno="34185">
17713 +<interface name="corenet_receive_i18n_input_server_packets" lineno="34308">
17714 <summary>
17715 Receive i18n_input_server packets.
17716 </summary>
17717 @@ -31467,7 +31284,7 @@ Domain allowed access.
17718 </param>
17719 <infoflow type="read" weight="10"/>
17720 </interface>
17721 -<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="34204">
17722 +<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="34327">
17723 <summary>
17724 Do not audit attempts to receive i18n_input_server packets.
17725 </summary>
17726 @@ -31478,7 +31295,7 @@ Domain allowed access.
17727 </param>
17728 <infoflow type="none"/>
17729 </interface>
17730 -<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="34223">
17731 +<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="34346">
17732 <summary>
17733 Send and receive i18n_input_server packets.
17734 </summary>
17735 @@ -31489,7 +31306,7 @@ Domain allowed access.
17736 </param>
17737 <infoflow type="both" weight="10"/>
17738 </interface>
17739 -<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="34239">
17740 +<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="34362">
17741 <summary>
17742 Do not audit attempts to send and receive i18n_input_server packets.
17743 </summary>
17744 @@ -31500,7 +31317,7 @@ Domain to not audit.
17745 </param>
17746 <infoflow type="none"/>
17747 </interface>
17748 -<interface name="corenet_relabelto_i18n_input_server_packets" lineno="34254">
17749 +<interface name="corenet_relabelto_i18n_input_server_packets" lineno="34377">
17750 <summary>
17751 Relabel packets to i18n_input_server the packet type.
17752 </summary>
17753 @@ -31510,7 +31327,7 @@ Domain allowed access.
17754 </summary>
17755 </param>
17756 </interface>
17757 -<interface name="corenet_tcp_sendrecv_imaze_port" lineno="34276">
17758 +<interface name="corenet_tcp_sendrecv_imaze_port" lineno="34399">
17759 <summary>
17760 Send and receive TCP traffic on the imaze port.
17761 </summary>
17762 @@ -31521,7 +31338,7 @@ Domain allowed access.
17763 </param>
17764 <infoflow type="both" weight="10"/>
17765 </interface>
17766 -<interface name="corenet_udp_send_imaze_port" lineno="34291">
17767 +<interface name="corenet_udp_send_imaze_port" lineno="34414">
17768 <summary>
17769 Send UDP traffic on the imaze port.
17770 </summary>
17771 @@ -31532,7 +31349,7 @@ Domain allowed access.
17772 </param>
17773 <infoflow type="write" weight="10"/>
17774 </interface>
17775 -<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="34306">
17776 +<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="34429">
17777 <summary>
17778 Do not audit attempts to send UDP traffic on the imaze port.
17779 </summary>
17780 @@ -31543,7 +31360,7 @@ Domain to not audit.
17781 </param>
17782 <infoflow type="none"/>
17783 </interface>
17784 -<interface name="corenet_udp_receive_imaze_port" lineno="34321">
17785 +<interface name="corenet_udp_receive_imaze_port" lineno="34444">
17786 <summary>
17787 Receive UDP traffic on the imaze port.
17788 </summary>
17789 @@ -31554,7 +31371,7 @@ Domain allowed access.
17790 </param>
17791 <infoflow type="read" weight="10"/>
17792 </interface>
17793 -<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="34336">
17794 +<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="34459">
17795 <summary>
17796 Do not audit attempts to receive UDP traffic on the imaze port.
17797 </summary>
17798 @@ -31565,7 +31382,7 @@ Domain to not audit.
17799 </param>
17800 <infoflow type="none"/>
17801 </interface>
17802 -<interface name="corenet_udp_sendrecv_imaze_port" lineno="34351">
17803 +<interface name="corenet_udp_sendrecv_imaze_port" lineno="34474">
17804 <summary>
17805 Send and receive UDP traffic on the imaze port.
17806 </summary>
17807 @@ -31576,7 +31393,7 @@ Domain allowed access.
17808 </param>
17809 <infoflow type="both" weight="10"/>
17810 </interface>
17811 -<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="34367">
17812 +<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="34490">
17813 <summary>
17814 Do not audit attempts to send and receive
17815 UDP traffic on the imaze port.
17816 @@ -31588,7 +31405,7 @@ Domain to not audit.
17817 </param>
17818 <infoflow type="none"/>
17819 </interface>
17820 -<interface name="corenet_tcp_bind_imaze_port" lineno="34382">
17821 +<interface name="corenet_tcp_bind_imaze_port" lineno="34505">
17822 <summary>
17823 Bind TCP sockets to the imaze port.
17824 </summary>
17825 @@ -31599,7 +31416,7 @@ Domain allowed access.
17826 </param>
17827 <infoflow type="none"/>
17828 </interface>
17829 -<interface name="corenet_udp_bind_imaze_port" lineno="34402">
17830 +<interface name="corenet_udp_bind_imaze_port" lineno="34525">
17831 <summary>
17832 Bind UDP sockets to the imaze port.
17833 </summary>
17834 @@ -31610,7 +31427,7 @@ Domain allowed access.
17835 </param>
17836 <infoflow type="none"/>
17837 </interface>
17838 -<interface name="corenet_tcp_connect_imaze_port" lineno="34421">
17839 +<interface name="corenet_tcp_connect_imaze_port" lineno="34544">
17840 <summary>
17841 Make a TCP connection to the imaze port.
17842 </summary>
17843 @@ -31620,7 +31437,7 @@ Domain allowed access.
17844 </summary>
17845 </param>
17846 </interface>
17847 -<interface name="corenet_send_imaze_client_packets" lineno="34441">
17848 +<interface name="corenet_send_imaze_client_packets" lineno="34564">
17849 <summary>
17850 Send imaze_client packets.
17851 </summary>
17852 @@ -31631,7 +31448,7 @@ Domain allowed access.
17853 </param>
17854 <infoflow type="write" weight="10"/>
17855 </interface>
17856 -<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="34460">
17857 +<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="34583">
17858 <summary>
17859 Do not audit attempts to send imaze_client packets.
17860 </summary>
17861 @@ -31642,7 +31459,7 @@ Domain to not audit.
17862 </param>
17863 <infoflow type="none"/>
17864 </interface>
17865 -<interface name="corenet_receive_imaze_client_packets" lineno="34479">
17866 +<interface name="corenet_receive_imaze_client_packets" lineno="34602">
17867 <summary>
17868 Receive imaze_client packets.
17869 </summary>
17870 @@ -31653,7 +31470,7 @@ Domain allowed access.
17871 </param>
17872 <infoflow type="read" weight="10"/>
17873 </interface>
17874 -<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="34498">
17875 +<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="34621">
17876 <summary>
17877 Do not audit attempts to receive imaze_client packets.
17878 </summary>
17879 @@ -31664,7 +31481,7 @@ Domain allowed access.
17880 </param>
17881 <infoflow type="none"/>
17882 </interface>
17883 -<interface name="corenet_sendrecv_imaze_client_packets" lineno="34517">
17884 +<interface name="corenet_sendrecv_imaze_client_packets" lineno="34640">
17885 <summary>
17886 Send and receive imaze_client packets.
17887 </summary>
17888 @@ -31675,7 +31492,7 @@ Domain allowed access.
17889 </param>
17890 <infoflow type="both" weight="10"/>
17891 </interface>
17892 -<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="34533">
17893 +<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="34656">
17894 <summary>
17895 Do not audit attempts to send and receive imaze_client packets.
17896 </summary>
17897 @@ -31686,7 +31503,7 @@ Domain to not audit.
17898 </param>
17899 <infoflow type="none"/>
17900 </interface>
17901 -<interface name="corenet_relabelto_imaze_client_packets" lineno="34548">
17902 +<interface name="corenet_relabelto_imaze_client_packets" lineno="34671">
17903 <summary>
17904 Relabel packets to imaze_client the packet type.
17905 </summary>
17906 @@ -31696,7 +31513,7 @@ Domain allowed access.
17907 </summary>
17908 </param>
17909 </interface>
17910 -<interface name="corenet_send_imaze_server_packets" lineno="34568">
17911 +<interface name="corenet_send_imaze_server_packets" lineno="34691">
17912 <summary>
17913 Send imaze_server packets.
17914 </summary>
17915 @@ -31707,7 +31524,7 @@ Domain allowed access.
17916 </param>
17917 <infoflow type="write" weight="10"/>
17918 </interface>
17919 -<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="34587">
17920 +<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="34710">
17921 <summary>
17922 Do not audit attempts to send imaze_server packets.
17923 </summary>
17924 @@ -31718,7 +31535,7 @@ Domain to not audit.
17925 </param>
17926 <infoflow type="none"/>
17927 </interface>
17928 -<interface name="corenet_receive_imaze_server_packets" lineno="34606">
17929 +<interface name="corenet_receive_imaze_server_packets" lineno="34729">
17930 <summary>
17931 Receive imaze_server packets.
17932 </summary>
17933 @@ -31729,7 +31546,7 @@ Domain allowed access.
17934 </param>
17935 <infoflow type="read" weight="10"/>
17936 </interface>
17937 -<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="34625">
17938 +<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="34748">
17939 <summary>
17940 Do not audit attempts to receive imaze_server packets.
17941 </summary>
17942 @@ -31740,7 +31557,7 @@ Domain allowed access.
17943 </param>
17944 <infoflow type="none"/>
17945 </interface>
17946 -<interface name="corenet_sendrecv_imaze_server_packets" lineno="34644">
17947 +<interface name="corenet_sendrecv_imaze_server_packets" lineno="34767">
17948 <summary>
17949 Send and receive imaze_server packets.
17950 </summary>
17951 @@ -31751,7 +31568,7 @@ Domain allowed access.
17952 </param>
17953 <infoflow type="both" weight="10"/>
17954 </interface>
17955 -<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="34660">
17956 +<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="34783">
17957 <summary>
17958 Do not audit attempts to send and receive imaze_server packets.
17959 </summary>
17960 @@ -31762,7 +31579,7 @@ Domain to not audit.
17961 </param>
17962 <infoflow type="none"/>
17963 </interface>
17964 -<interface name="corenet_relabelto_imaze_server_packets" lineno="34675">
17965 +<interface name="corenet_relabelto_imaze_server_packets" lineno="34798">
17966 <summary>
17967 Relabel packets to imaze_server the packet type.
17968 </summary>
17969 @@ -31772,7 +31589,7 @@ Domain allowed access.
17970 </summary>
17971 </param>
17972 </interface>
17973 -<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="34697">
17974 +<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="34820">
17975 <summary>
17976 Send and receive TCP traffic on the inetd_child port.
17977 </summary>
17978 @@ -31783,7 +31600,7 @@ Domain allowed access.
17979 </param>
17980 <infoflow type="both" weight="10"/>
17981 </interface>
17982 -<interface name="corenet_udp_send_inetd_child_port" lineno="34712">
17983 +<interface name="corenet_udp_send_inetd_child_port" lineno="34835">
17984 <summary>
17985 Send UDP traffic on the inetd_child port.
17986 </summary>
17987 @@ -31794,7 +31611,7 @@ Domain allowed access.
17988 </param>
17989 <infoflow type="write" weight="10"/>
17990 </interface>
17991 -<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="34727">
17992 +<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="34850">
17993 <summary>
17994 Do not audit attempts to send UDP traffic on the inetd_child port.
17995 </summary>
17996 @@ -31805,7 +31622,7 @@ Domain to not audit.
17997 </param>
17998 <infoflow type="none"/>
17999 </interface>
18000 -<interface name="corenet_udp_receive_inetd_child_port" lineno="34742">
18001 +<interface name="corenet_udp_receive_inetd_child_port" lineno="34865">
18002 <summary>
18003 Receive UDP traffic on the inetd_child port.
18004 </summary>
18005 @@ -31816,7 +31633,7 @@ Domain allowed access.
18006 </param>
18007 <infoflow type="read" weight="10"/>
18008 </interface>
18009 -<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="34757">
18010 +<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="34880">
18011 <summary>
18012 Do not audit attempts to receive UDP traffic on the inetd_child port.
18013 </summary>
18014 @@ -31827,7 +31644,7 @@ Domain to not audit.
18015 </param>
18016 <infoflow type="none"/>
18017 </interface>
18018 -<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="34772">
18019 +<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="34895">
18020 <summary>
18021 Send and receive UDP traffic on the inetd_child port.
18022 </summary>
18023 @@ -31838,7 +31655,7 @@ Domain allowed access.
18024 </param>
18025 <infoflow type="both" weight="10"/>
18026 </interface>
18027 -<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="34788">
18028 +<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="34911">
18029 <summary>
18030 Do not audit attempts to send and receive
18031 UDP traffic on the inetd_child port.
18032 @@ -31850,7 +31667,7 @@ Domain to not audit.
18033 </param>
18034 <infoflow type="none"/>
18035 </interface>
18036 -<interface name="corenet_tcp_bind_inetd_child_port" lineno="34803">
18037 +<interface name="corenet_tcp_bind_inetd_child_port" lineno="34926">
18038 <summary>
18039 Bind TCP sockets to the inetd_child port.
18040 </summary>
18041 @@ -31861,7 +31678,7 @@ Domain allowed access.
18042 </param>
18043 <infoflow type="none"/>
18044 </interface>
18045 -<interface name="corenet_udp_bind_inetd_child_port" lineno="34823">
18046 +<interface name="corenet_udp_bind_inetd_child_port" lineno="34946">
18047 <summary>
18048 Bind UDP sockets to the inetd_child port.
18049 </summary>
18050 @@ -31872,7 +31689,7 @@ Domain allowed access.
18051 </param>
18052 <infoflow type="none"/>
18053 </interface>
18054 -<interface name="corenet_tcp_connect_inetd_child_port" lineno="34842">
18055 +<interface name="corenet_tcp_connect_inetd_child_port" lineno="34965">
18056 <summary>
18057 Make a TCP connection to the inetd_child port.
18058 </summary>
18059 @@ -31882,7 +31699,7 @@ Domain allowed access.
18060 </summary>
18061 </param>
18062 </interface>
18063 -<interface name="corenet_send_inetd_child_client_packets" lineno="34862">
18064 +<interface name="corenet_send_inetd_child_client_packets" lineno="34985">
18065 <summary>
18066 Send inetd_child_client packets.
18067 </summary>
18068 @@ -31893,7 +31710,7 @@ Domain allowed access.
18069 </param>
18070 <infoflow type="write" weight="10"/>
18071 </interface>
18072 -<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="34881">
18073 +<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="35004">
18074 <summary>
18075 Do not audit attempts to send inetd_child_client packets.
18076 </summary>
18077 @@ -31904,7 +31721,7 @@ Domain to not audit.
18078 </param>
18079 <infoflow type="none"/>
18080 </interface>
18081 -<interface name="corenet_receive_inetd_child_client_packets" lineno="34900">
18082 +<interface name="corenet_receive_inetd_child_client_packets" lineno="35023">
18083 <summary>
18084 Receive inetd_child_client packets.
18085 </summary>
18086 @@ -31915,7 +31732,7 @@ Domain allowed access.
18087 </param>
18088 <infoflow type="read" weight="10"/>
18089 </interface>
18090 -<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="34919">
18091 +<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="35042">
18092 <summary>
18093 Do not audit attempts to receive inetd_child_client packets.
18094 </summary>
18095 @@ -31926,7 +31743,7 @@ Domain allowed access.
18096 </param>
18097 <infoflow type="none"/>
18098 </interface>
18099 -<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="34938">
18100 +<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="35061">
18101 <summary>
18102 Send and receive inetd_child_client packets.
18103 </summary>
18104 @@ -31937,7 +31754,7 @@ Domain allowed access.
18105 </param>
18106 <infoflow type="both" weight="10"/>
18107 </interface>
18108 -<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="34954">
18109 +<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="35077">
18110 <summary>
18111 Do not audit attempts to send and receive inetd_child_client packets.
18112 </summary>
18113 @@ -31948,7 +31765,7 @@ Domain to not audit.
18114 </param>
18115 <infoflow type="none"/>
18116 </interface>
18117 -<interface name="corenet_relabelto_inetd_child_client_packets" lineno="34969">
18118 +<interface name="corenet_relabelto_inetd_child_client_packets" lineno="35092">
18119 <summary>
18120 Relabel packets to inetd_child_client the packet type.
18121 </summary>
18122 @@ -31958,7 +31775,7 @@ Domain allowed access.
18123 </summary>
18124 </param>
18125 </interface>
18126 -<interface name="corenet_send_inetd_child_server_packets" lineno="34989">
18127 +<interface name="corenet_send_inetd_child_server_packets" lineno="35112">
18128 <summary>
18129 Send inetd_child_server packets.
18130 </summary>
18131 @@ -31969,7 +31786,7 @@ Domain allowed access.
18132 </param>
18133 <infoflow type="write" weight="10"/>
18134 </interface>
18135 -<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="35008">
18136 +<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="35131">
18137 <summary>
18138 Do not audit attempts to send inetd_child_server packets.
18139 </summary>
18140 @@ -31980,7 +31797,7 @@ Domain to not audit.
18141 </param>
18142 <infoflow type="none"/>
18143 </interface>
18144 -<interface name="corenet_receive_inetd_child_server_packets" lineno="35027">
18145 +<interface name="corenet_receive_inetd_child_server_packets" lineno="35150">
18146 <summary>
18147 Receive inetd_child_server packets.
18148 </summary>
18149 @@ -31991,7 +31808,7 @@ Domain allowed access.
18150 </param>
18151 <infoflow type="read" weight="10"/>
18152 </interface>
18153 -<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="35046">
18154 +<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="35169">
18155 <summary>
18156 Do not audit attempts to receive inetd_child_server packets.
18157 </summary>
18158 @@ -32002,7 +31819,7 @@ Domain allowed access.
18159 </param>
18160 <infoflow type="none"/>
18161 </interface>
18162 -<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="35065">
18163 +<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="35188">
18164 <summary>
18165 Send and receive inetd_child_server packets.
18166 </summary>
18167 @@ -32013,7 +31830,7 @@ Domain allowed access.
18168 </param>
18169 <infoflow type="both" weight="10"/>
18170 </interface>
18171 -<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="35081">
18172 +<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="35204">
18173 <summary>
18174 Do not audit attempts to send and receive inetd_child_server packets.
18175 </summary>
18176 @@ -32024,7 +31841,7 @@ Domain to not audit.
18177 </param>
18178 <infoflow type="none"/>
18179 </interface>
18180 -<interface name="corenet_relabelto_inetd_child_server_packets" lineno="35096">
18181 +<interface name="corenet_relabelto_inetd_child_server_packets" lineno="35219">
18182 <summary>
18183 Relabel packets to inetd_child_server the packet type.
18184 </summary>
18185 @@ -32034,7 +31851,7 @@ Domain allowed access.
18186 </summary>
18187 </param>
18188 </interface>
18189 -<interface name="corenet_tcp_sendrecv_innd_port" lineno="35118">
18190 +<interface name="corenet_tcp_sendrecv_innd_port" lineno="35241">
18191 <summary>
18192 Send and receive TCP traffic on the innd port.
18193 </summary>
18194 @@ -32045,7 +31862,7 @@ Domain allowed access.
18195 </param>
18196 <infoflow type="both" weight="10"/>
18197 </interface>
18198 -<interface name="corenet_udp_send_innd_port" lineno="35133">
18199 +<interface name="corenet_udp_send_innd_port" lineno="35256">
18200 <summary>
18201 Send UDP traffic on the innd port.
18202 </summary>
18203 @@ -32056,7 +31873,7 @@ Domain allowed access.
18204 </param>
18205 <infoflow type="write" weight="10"/>
18206 </interface>
18207 -<interface name="corenet_dontaudit_udp_send_innd_port" lineno="35148">
18208 +<interface name="corenet_dontaudit_udp_send_innd_port" lineno="35271">
18209 <summary>
18210 Do not audit attempts to send UDP traffic on the innd port.
18211 </summary>
18212 @@ -32067,7 +31884,7 @@ Domain to not audit.
18213 </param>
18214 <infoflow type="none"/>
18215 </interface>
18216 -<interface name="corenet_udp_receive_innd_port" lineno="35163">
18217 +<interface name="corenet_udp_receive_innd_port" lineno="35286">
18218 <summary>
18219 Receive UDP traffic on the innd port.
18220 </summary>
18221 @@ -32078,7 +31895,7 @@ Domain allowed access.
18222 </param>
18223 <infoflow type="read" weight="10"/>
18224 </interface>
18225 -<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="35178">
18226 +<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="35301">
18227 <summary>
18228 Do not audit attempts to receive UDP traffic on the innd port.
18229 </summary>
18230 @@ -32089,7 +31906,7 @@ Domain to not audit.
18231 </param>
18232 <infoflow type="none"/>
18233 </interface>
18234 -<interface name="corenet_udp_sendrecv_innd_port" lineno="35193">
18235 +<interface name="corenet_udp_sendrecv_innd_port" lineno="35316">
18236 <summary>
18237 Send and receive UDP traffic on the innd port.
18238 </summary>
18239 @@ -32100,7 +31917,7 @@ Domain allowed access.
18240 </param>
18241 <infoflow type="both" weight="10"/>
18242 </interface>
18243 -<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="35209">
18244 +<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="35332">
18245 <summary>
18246 Do not audit attempts to send and receive
18247 UDP traffic on the innd port.
18248 @@ -32112,7 +31929,7 @@ Domain to not audit.
18249 </param>
18250 <infoflow type="none"/>
18251 </interface>
18252 -<interface name="corenet_tcp_bind_innd_port" lineno="35224">
18253 +<interface name="corenet_tcp_bind_innd_port" lineno="35347">
18254 <summary>
18255 Bind TCP sockets to the innd port.
18256 </summary>
18257 @@ -32123,7 +31940,7 @@ Domain allowed access.
18258 </param>
18259 <infoflow type="none"/>
18260 </interface>
18261 -<interface name="corenet_udp_bind_innd_port" lineno="35244">
18262 +<interface name="corenet_udp_bind_innd_port" lineno="35367">
18263 <summary>
18264 Bind UDP sockets to the innd port.
18265 </summary>
18266 @@ -32134,7 +31951,7 @@ Domain allowed access.
18267 </param>
18268 <infoflow type="none"/>
18269 </interface>
18270 -<interface name="corenet_tcp_connect_innd_port" lineno="35263">
18271 +<interface name="corenet_tcp_connect_innd_port" lineno="35386">
18272 <summary>
18273 Make a TCP connection to the innd port.
18274 </summary>
18275 @@ -32144,7 +31961,7 @@ Domain allowed access.
18276 </summary>
18277 </param>
18278 </interface>
18279 -<interface name="corenet_send_innd_client_packets" lineno="35283">
18280 +<interface name="corenet_send_innd_client_packets" lineno="35406">
18281 <summary>
18282 Send innd_client packets.
18283 </summary>
18284 @@ -32155,7 +31972,7 @@ Domain allowed access.
18285 </param>
18286 <infoflow type="write" weight="10"/>
18287 </interface>
18288 -<interface name="corenet_dontaudit_send_innd_client_packets" lineno="35302">
18289 +<interface name="corenet_dontaudit_send_innd_client_packets" lineno="35425">
18290 <summary>
18291 Do not audit attempts to send innd_client packets.
18292 </summary>
18293 @@ -32166,7 +31983,7 @@ Domain to not audit.
18294 </param>
18295 <infoflow type="none"/>
18296 </interface>
18297 -<interface name="corenet_receive_innd_client_packets" lineno="35321">
18298 +<interface name="corenet_receive_innd_client_packets" lineno="35444">
18299 <summary>
18300 Receive innd_client packets.
18301 </summary>
18302 @@ -32177,7 +31994,7 @@ Domain allowed access.
18303 </param>
18304 <infoflow type="read" weight="10"/>
18305 </interface>
18306 -<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="35340">
18307 +<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="35463">
18308 <summary>
18309 Do not audit attempts to receive innd_client packets.
18310 </summary>
18311 @@ -32188,7 +32005,7 @@ Domain allowed access.
18312 </param>
18313 <infoflow type="none"/>
18314 </interface>
18315 -<interface name="corenet_sendrecv_innd_client_packets" lineno="35359">
18316 +<interface name="corenet_sendrecv_innd_client_packets" lineno="35482">
18317 <summary>
18318 Send and receive innd_client packets.
18319 </summary>
18320 @@ -32199,7 +32016,7 @@ Domain allowed access.
18321 </param>
18322 <infoflow type="both" weight="10"/>
18323 </interface>
18324 -<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="35375">
18325 +<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="35498">
18326 <summary>
18327 Do not audit attempts to send and receive innd_client packets.
18328 </summary>
18329 @@ -32210,7 +32027,7 @@ Domain to not audit.
18330 </param>
18331 <infoflow type="none"/>
18332 </interface>
18333 -<interface name="corenet_relabelto_innd_client_packets" lineno="35390">
18334 +<interface name="corenet_relabelto_innd_client_packets" lineno="35513">
18335 <summary>
18336 Relabel packets to innd_client the packet type.
18337 </summary>
18338 @@ -32220,7 +32037,7 @@ Domain allowed access.
18339 </summary>
18340 </param>
18341 </interface>
18342 -<interface name="corenet_send_innd_server_packets" lineno="35410">
18343 +<interface name="corenet_send_innd_server_packets" lineno="35533">
18344 <summary>
18345 Send innd_server packets.
18346 </summary>
18347 @@ -32231,7 +32048,7 @@ Domain allowed access.
18348 </param>
18349 <infoflow type="write" weight="10"/>
18350 </interface>
18351 -<interface name="corenet_dontaudit_send_innd_server_packets" lineno="35429">
18352 +<interface name="corenet_dontaudit_send_innd_server_packets" lineno="35552">
18353 <summary>
18354 Do not audit attempts to send innd_server packets.
18355 </summary>
18356 @@ -32242,7 +32059,7 @@ Domain to not audit.
18357 </param>
18358 <infoflow type="none"/>
18359 </interface>
18360 -<interface name="corenet_receive_innd_server_packets" lineno="35448">
18361 +<interface name="corenet_receive_innd_server_packets" lineno="35571">
18362 <summary>
18363 Receive innd_server packets.
18364 </summary>
18365 @@ -32253,7 +32070,7 @@ Domain allowed access.
18366 </param>
18367 <infoflow type="read" weight="10"/>
18368 </interface>
18369 -<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="35467">
18370 +<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="35590">
18371 <summary>
18372 Do not audit attempts to receive innd_server packets.
18373 </summary>
18374 @@ -32264,7 +32081,7 @@ Domain allowed access.
18375 </param>
18376 <infoflow type="none"/>
18377 </interface>
18378 -<interface name="corenet_sendrecv_innd_server_packets" lineno="35486">
18379 +<interface name="corenet_sendrecv_innd_server_packets" lineno="35609">
18380 <summary>
18381 Send and receive innd_server packets.
18382 </summary>
18383 @@ -32275,7 +32092,7 @@ Domain allowed access.
18384 </param>
18385 <infoflow type="both" weight="10"/>
18386 </interface>
18387 -<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="35502">
18388 +<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="35625">
18389 <summary>
18390 Do not audit attempts to send and receive innd_server packets.
18391 </summary>
18392 @@ -32286,7 +32103,7 @@ Domain to not audit.
18393 </param>
18394 <infoflow type="none"/>
18395 </interface>
18396 -<interface name="corenet_relabelto_innd_server_packets" lineno="35517">
18397 +<interface name="corenet_relabelto_innd_server_packets" lineno="35640">
18398 <summary>
18399 Relabel packets to innd_server the packet type.
18400 </summary>
18401 @@ -32296,7 +32113,7 @@ Domain allowed access.
18402 </summary>
18403 </param>
18404 </interface>
18405 -<interface name="corenet_tcp_sendrecv_interwise_port" lineno="35539">
18406 +<interface name="corenet_tcp_sendrecv_interwise_port" lineno="35662">
18407 <summary>
18408 Send and receive TCP traffic on the interwise port.
18409 </summary>
18410 @@ -32307,7 +32124,7 @@ Domain allowed access.
18411 </param>
18412 <infoflow type="both" weight="10"/>
18413 </interface>
18414 -<interface name="corenet_udp_send_interwise_port" lineno="35554">
18415 +<interface name="corenet_udp_send_interwise_port" lineno="35677">
18416 <summary>
18417 Send UDP traffic on the interwise port.
18418 </summary>
18419 @@ -32318,7 +32135,7 @@ Domain allowed access.
18420 </param>
18421 <infoflow type="write" weight="10"/>
18422 </interface>
18423 -<interface name="corenet_dontaudit_udp_send_interwise_port" lineno="35569">
18424 +<interface name="corenet_dontaudit_udp_send_interwise_port" lineno="35692">
18425 <summary>
18426 Do not audit attempts to send UDP traffic on the interwise port.
18427 </summary>
18428 @@ -32329,7 +32146,7 @@ Domain to not audit.
18429 </param>
18430 <infoflow type="none"/>
18431 </interface>
18432 -<interface name="corenet_udp_receive_interwise_port" lineno="35584">
18433 +<interface name="corenet_udp_receive_interwise_port" lineno="35707">
18434 <summary>
18435 Receive UDP traffic on the interwise port.
18436 </summary>
18437 @@ -32340,7 +32157,7 @@ Domain allowed access.
18438 </param>
18439 <infoflow type="read" weight="10"/>
18440 </interface>
18441 -<interface name="corenet_dontaudit_udp_receive_interwise_port" lineno="35599">
18442 +<interface name="corenet_dontaudit_udp_receive_interwise_port" lineno="35722">
18443 <summary>
18444 Do not audit attempts to receive UDP traffic on the interwise port.
18445 </summary>
18446 @@ -32351,7 +32168,7 @@ Domain to not audit.
18447 </param>
18448 <infoflow type="none"/>
18449 </interface>
18450 -<interface name="corenet_udp_sendrecv_interwise_port" lineno="35614">
18451 +<interface name="corenet_udp_sendrecv_interwise_port" lineno="35737">
18452 <summary>
18453 Send and receive UDP traffic on the interwise port.
18454 </summary>
18455 @@ -32362,7 +32179,7 @@ Domain allowed access.
18456 </param>
18457 <infoflow type="both" weight="10"/>
18458 </interface>
18459 -<interface name="corenet_dontaudit_udp_sendrecv_interwise_port" lineno="35630">
18460 +<interface name="corenet_dontaudit_udp_sendrecv_interwise_port" lineno="35753">
18461 <summary>
18462 Do not audit attempts to send and receive
18463 UDP traffic on the interwise port.
18464 @@ -32374,7 +32191,7 @@ Domain to not audit.
18465 </param>
18466 <infoflow type="none"/>
18467 </interface>
18468 -<interface name="corenet_tcp_bind_interwise_port" lineno="35645">
18469 +<interface name="corenet_tcp_bind_interwise_port" lineno="35768">
18470 <summary>
18471 Bind TCP sockets to the interwise port.
18472 </summary>
18473 @@ -32385,7 +32202,7 @@ Domain allowed access.
18474 </param>
18475 <infoflow type="none"/>
18476 </interface>
18477 -<interface name="corenet_udp_bind_interwise_port" lineno="35665">
18478 +<interface name="corenet_udp_bind_interwise_port" lineno="35788">
18479 <summary>
18480 Bind UDP sockets to the interwise port.
18481 </summary>
18482 @@ -32396,7 +32213,7 @@ Domain allowed access.
18483 </param>
18484 <infoflow type="none"/>
18485 </interface>
18486 -<interface name="corenet_tcp_connect_interwise_port" lineno="35684">
18487 +<interface name="corenet_tcp_connect_interwise_port" lineno="35807">
18488 <summary>
18489 Make a TCP connection to the interwise port.
18490 </summary>
18491 @@ -32406,7 +32223,7 @@ Domain allowed access.
18492 </summary>
18493 </param>
18494 </interface>
18495 -<interface name="corenet_send_interwise_client_packets" lineno="35704">
18496 +<interface name="corenet_send_interwise_client_packets" lineno="35827">
18497 <summary>
18498 Send interwise_client packets.
18499 </summary>
18500 @@ -32417,7 +32234,7 @@ Domain allowed access.
18501 </param>
18502 <infoflow type="write" weight="10"/>
18503 </interface>
18504 -<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="35723">
18505 +<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="35846">
18506 <summary>
18507 Do not audit attempts to send interwise_client packets.
18508 </summary>
18509 @@ -32428,7 +32245,7 @@ Domain to not audit.
18510 </param>
18511 <infoflow type="none"/>
18512 </interface>
18513 -<interface name="corenet_receive_interwise_client_packets" lineno="35742">
18514 +<interface name="corenet_receive_interwise_client_packets" lineno="35865">
18515 <summary>
18516 Receive interwise_client packets.
18517 </summary>
18518 @@ -32439,7 +32256,7 @@ Domain allowed access.
18519 </param>
18520 <infoflow type="read" weight="10"/>
18521 </interface>
18522 -<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="35761">
18523 +<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="35884">
18524 <summary>
18525 Do not audit attempts to receive interwise_client packets.
18526 </summary>
18527 @@ -32450,7 +32267,7 @@ Domain allowed access.
18528 </param>
18529 <infoflow type="none"/>
18530 </interface>
18531 -<interface name="corenet_sendrecv_interwise_client_packets" lineno="35780">
18532 +<interface name="corenet_sendrecv_interwise_client_packets" lineno="35903">
18533 <summary>
18534 Send and receive interwise_client packets.
18535 </summary>
18536 @@ -32461,7 +32278,7 @@ Domain allowed access.
18537 </param>
18538 <infoflow type="both" weight="10"/>
18539 </interface>
18540 -<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="35796">
18541 +<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="35919">
18542 <summary>
18543 Do not audit attempts to send and receive interwise_client packets.
18544 </summary>
18545 @@ -32472,7 +32289,7 @@ Domain to not audit.
18546 </param>
18547 <infoflow type="none"/>
18548 </interface>
18549 -<interface name="corenet_relabelto_interwise_client_packets" lineno="35811">
18550 +<interface name="corenet_relabelto_interwise_client_packets" lineno="35934">
18551 <summary>
18552 Relabel packets to interwise_client the packet type.
18553 </summary>
18554 @@ -32482,7 +32299,7 @@ Domain allowed access.
18555 </summary>
18556 </param>
18557 </interface>
18558 -<interface name="corenet_send_interwise_server_packets" lineno="35831">
18559 +<interface name="corenet_send_interwise_server_packets" lineno="35954">
18560 <summary>
18561 Send interwise_server packets.
18562 </summary>
18563 @@ -32493,7 +32310,7 @@ Domain allowed access.
18564 </param>
18565 <infoflow type="write" weight="10"/>
18566 </interface>
18567 -<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="35850">
18568 +<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="35973">
18569 <summary>
18570 Do not audit attempts to send interwise_server packets.
18571 </summary>
18572 @@ -32504,7 +32321,7 @@ Domain to not audit.
18573 </param>
18574 <infoflow type="none"/>
18575 </interface>
18576 -<interface name="corenet_receive_interwise_server_packets" lineno="35869">
18577 +<interface name="corenet_receive_interwise_server_packets" lineno="35992">
18578 <summary>
18579 Receive interwise_server packets.
18580 </summary>
18581 @@ -32515,7 +32332,7 @@ Domain allowed access.
18582 </param>
18583 <infoflow type="read" weight="10"/>
18584 </interface>
18585 -<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="35888">
18586 +<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="36011">
18587 <summary>
18588 Do not audit attempts to receive interwise_server packets.
18589 </summary>
18590 @@ -32526,7 +32343,7 @@ Domain allowed access.
18591 </param>
18592 <infoflow type="none"/>
18593 </interface>
18594 -<interface name="corenet_sendrecv_interwise_server_packets" lineno="35907">
18595 +<interface name="corenet_sendrecv_interwise_server_packets" lineno="36030">
18596 <summary>
18597 Send and receive interwise_server packets.
18598 </summary>
18599 @@ -32537,7 +32354,7 @@ Domain allowed access.
18600 </param>
18601 <infoflow type="both" weight="10"/>
18602 </interface>
18603 -<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="35923">
18604 +<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="36046">
18605 <summary>
18606 Do not audit attempts to send and receive interwise_server packets.
18607 </summary>
18608 @@ -32548,7 +32365,7 @@ Domain to not audit.
18609 </param>
18610 <infoflow type="none"/>
18611 </interface>
18612 -<interface name="corenet_relabelto_interwise_server_packets" lineno="35938">
18613 +<interface name="corenet_relabelto_interwise_server_packets" lineno="36061">
18614 <summary>
18615 Relabel packets to interwise_server the packet type.
18616 </summary>
18617 @@ -32558,7 +32375,7 @@ Domain allowed access.
18618 </summary>
18619 </param>
18620 </interface>
18621 -<interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="35960">
18622 +<interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="36083">
18623 <summary>
18624 Send and receive TCP traffic on the ionixnetmon port.
18625 </summary>
18626 @@ -32569,7 +32386,7 @@ Domain allowed access.
18627 </param>
18628 <infoflow type="both" weight="10"/>
18629 </interface>
18630 -<interface name="corenet_udp_send_ionixnetmon_port" lineno="35975">
18631 +<interface name="corenet_udp_send_ionixnetmon_port" lineno="36098">
18632 <summary>
18633 Send UDP traffic on the ionixnetmon port.
18634 </summary>
18635 @@ -32580,7 +32397,7 @@ Domain allowed access.
18636 </param>
18637 <infoflow type="write" weight="10"/>
18638 </interface>
18639 -<interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="35990">
18640 +<interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="36113">
18641 <summary>
18642 Do not audit attempts to send UDP traffic on the ionixnetmon port.
18643 </summary>
18644 @@ -32591,7 +32408,7 @@ Domain to not audit.
18645 </param>
18646 <infoflow type="none"/>
18647 </interface>
18648 -<interface name="corenet_udp_receive_ionixnetmon_port" lineno="36005">
18649 +<interface name="corenet_udp_receive_ionixnetmon_port" lineno="36128">
18650 <summary>
18651 Receive UDP traffic on the ionixnetmon port.
18652 </summary>
18653 @@ -32602,7 +32419,7 @@ Domain allowed access.
18654 </param>
18655 <infoflow type="read" weight="10"/>
18656 </interface>
18657 -<interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="36020">
18658 +<interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="36143">
18659 <summary>
18660 Do not audit attempts to receive UDP traffic on the ionixnetmon port.
18661 </summary>
18662 @@ -32613,7 +32430,7 @@ Domain to not audit.
18663 </param>
18664 <infoflow type="none"/>
18665 </interface>
18666 -<interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="36035">
18667 +<interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="36158">
18668 <summary>
18669 Send and receive UDP traffic on the ionixnetmon port.
18670 </summary>
18671 @@ -32624,7 +32441,7 @@ Domain allowed access.
18672 </param>
18673 <infoflow type="both" weight="10"/>
18674 </interface>
18675 -<interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="36051">
18676 +<interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="36174">
18677 <summary>
18678 Do not audit attempts to send and receive
18679 UDP traffic on the ionixnetmon port.
18680 @@ -32636,7 +32453,7 @@ Domain to not audit.
18681 </param>
18682 <infoflow type="none"/>
18683 </interface>
18684 -<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="36066">
18685 +<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="36189">
18686 <summary>
18687 Bind TCP sockets to the ionixnetmon port.
18688 </summary>
18689 @@ -32647,7 +32464,7 @@ Domain allowed access.
18690 </param>
18691 <infoflow type="none"/>
18692 </interface>
18693 -<interface name="corenet_udp_bind_ionixnetmon_port" lineno="36086">
18694 +<interface name="corenet_udp_bind_ionixnetmon_port" lineno="36209">
18695 <summary>
18696 Bind UDP sockets to the ionixnetmon port.
18697 </summary>
18698 @@ -32658,7 +32475,7 @@ Domain allowed access.
18699 </param>
18700 <infoflow type="none"/>
18701 </interface>
18702 -<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="36105">
18703 +<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="36228">
18704 <summary>
18705 Make a TCP connection to the ionixnetmon port.
18706 </summary>
18707 @@ -32668,7 +32485,7 @@ Domain allowed access.
18708 </summary>
18709 </param>
18710 </interface>
18711 -<interface name="corenet_send_ionixnetmon_client_packets" lineno="36125">
18712 +<interface name="corenet_send_ionixnetmon_client_packets" lineno="36248">
18713 <summary>
18714 Send ionixnetmon_client packets.
18715 </summary>
18716 @@ -32679,7 +32496,7 @@ Domain allowed access.
18717 </param>
18718 <infoflow type="write" weight="10"/>
18719 </interface>
18720 -<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="36144">
18721 +<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="36267">
18722 <summary>
18723 Do not audit attempts to send ionixnetmon_client packets.
18724 </summary>
18725 @@ -32690,7 +32507,7 @@ Domain to not audit.
18726 </param>
18727 <infoflow type="none"/>
18728 </interface>
18729 -<interface name="corenet_receive_ionixnetmon_client_packets" lineno="36163">
18730 +<interface name="corenet_receive_ionixnetmon_client_packets" lineno="36286">
18731 <summary>
18732 Receive ionixnetmon_client packets.
18733 </summary>
18734 @@ -32701,7 +32518,7 @@ Domain allowed access.
18735 </param>
18736 <infoflow type="read" weight="10"/>
18737 </interface>
18738 -<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="36182">
18739 +<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="36305">
18740 <summary>
18741 Do not audit attempts to receive ionixnetmon_client packets.
18742 </summary>
18743 @@ -32712,7 +32529,7 @@ Domain allowed access.
18744 </param>
18745 <infoflow type="none"/>
18746 </interface>
18747 -<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="36201">
18748 +<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="36324">
18749 <summary>
18750 Send and receive ionixnetmon_client packets.
18751 </summary>
18752 @@ -32723,7 +32540,7 @@ Domain allowed access.
18753 </param>
18754 <infoflow type="both" weight="10"/>
18755 </interface>
18756 -<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="36217">
18757 +<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="36340">
18758 <summary>
18759 Do not audit attempts to send and receive ionixnetmon_client packets.
18760 </summary>
18761 @@ -32734,7 +32551,7 @@ Domain to not audit.
18762 </param>
18763 <infoflow type="none"/>
18764 </interface>
18765 -<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="36232">
18766 +<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="36355">
18767 <summary>
18768 Relabel packets to ionixnetmon_client the packet type.
18769 </summary>
18770 @@ -32744,7 +32561,7 @@ Domain allowed access.
18771 </summary>
18772 </param>
18773 </interface>
18774 -<interface name="corenet_send_ionixnetmon_server_packets" lineno="36252">
18775 +<interface name="corenet_send_ionixnetmon_server_packets" lineno="36375">
18776 <summary>
18777 Send ionixnetmon_server packets.
18778 </summary>
18779 @@ -32755,7 +32572,7 @@ Domain allowed access.
18780 </param>
18781 <infoflow type="write" weight="10"/>
18782 </interface>
18783 -<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="36271">
18784 +<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="36394">
18785 <summary>
18786 Do not audit attempts to send ionixnetmon_server packets.
18787 </summary>
18788 @@ -32766,7 +32583,7 @@ Domain to not audit.
18789 </param>
18790 <infoflow type="none"/>
18791 </interface>
18792 -<interface name="corenet_receive_ionixnetmon_server_packets" lineno="36290">
18793 +<interface name="corenet_receive_ionixnetmon_server_packets" lineno="36413">
18794 <summary>
18795 Receive ionixnetmon_server packets.
18796 </summary>
18797 @@ -32777,7 +32594,7 @@ Domain allowed access.
18798 </param>
18799 <infoflow type="read" weight="10"/>
18800 </interface>
18801 -<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="36309">
18802 +<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="36432">
18803 <summary>
18804 Do not audit attempts to receive ionixnetmon_server packets.
18805 </summary>
18806 @@ -32788,7 +32605,7 @@ Domain allowed access.
18807 </param>
18808 <infoflow type="none"/>
18809 </interface>
18810 -<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="36328">
18811 +<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="36451">
18812 <summary>
18813 Send and receive ionixnetmon_server packets.
18814 </summary>
18815 @@ -32799,7 +32616,7 @@ Domain allowed access.
18816 </param>
18817 <infoflow type="both" weight="10"/>
18818 </interface>
18819 -<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="36344">
18820 +<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="36467">
18821 <summary>
18822 Do not audit attempts to send and receive ionixnetmon_server packets.
18823 </summary>
18824 @@ -32810,7 +32627,7 @@ Domain to not audit.
18825 </param>
18826 <infoflow type="none"/>
18827 </interface>
18828 -<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="36359">
18829 +<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="36482">
18830 <summary>
18831 Relabel packets to ionixnetmon_server the packet type.
18832 </summary>
18833 @@ -32820,7 +32637,7 @@ Domain allowed access.
18834 </summary>
18835 </param>
18836 </interface>
18837 -<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="36381">
18838 +<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="36504">
18839 <summary>
18840 Send and receive TCP traffic on the ipmi port.
18841 </summary>
18842 @@ -32831,7 +32648,7 @@ Domain allowed access.
18843 </param>
18844 <infoflow type="both" weight="10"/>
18845 </interface>
18846 -<interface name="corenet_udp_send_ipmi_port" lineno="36396">
18847 +<interface name="corenet_udp_send_ipmi_port" lineno="36519">
18848 <summary>
18849 Send UDP traffic on the ipmi port.
18850 </summary>
18851 @@ -32842,7 +32659,7 @@ Domain allowed access.
18852 </param>
18853 <infoflow type="write" weight="10"/>
18854 </interface>
18855 -<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="36411">
18856 +<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="36534">
18857 <summary>
18858 Do not audit attempts to send UDP traffic on the ipmi port.
18859 </summary>
18860 @@ -32853,7 +32670,7 @@ Domain to not audit.
18861 </param>
18862 <infoflow type="none"/>
18863 </interface>
18864 -<interface name="corenet_udp_receive_ipmi_port" lineno="36426">
18865 +<interface name="corenet_udp_receive_ipmi_port" lineno="36549">
18866 <summary>
18867 Receive UDP traffic on the ipmi port.
18868 </summary>
18869 @@ -32864,7 +32681,7 @@ Domain allowed access.
18870 </param>
18871 <infoflow type="read" weight="10"/>
18872 </interface>
18873 -<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="36441">
18874 +<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="36564">
18875 <summary>
18876 Do not audit attempts to receive UDP traffic on the ipmi port.
18877 </summary>
18878 @@ -32875,7 +32692,7 @@ Domain to not audit.
18879 </param>
18880 <infoflow type="none"/>
18881 </interface>
18882 -<interface name="corenet_udp_sendrecv_ipmi_port" lineno="36456">
18883 +<interface name="corenet_udp_sendrecv_ipmi_port" lineno="36579">
18884 <summary>
18885 Send and receive UDP traffic on the ipmi port.
18886 </summary>
18887 @@ -32886,7 +32703,7 @@ Domain allowed access.
18888 </param>
18889 <infoflow type="both" weight="10"/>
18890 </interface>
18891 -<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="36472">
18892 +<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="36595">
18893 <summary>
18894 Do not audit attempts to send and receive
18895 UDP traffic on the ipmi port.
18896 @@ -32898,7 +32715,7 @@ Domain to not audit.
18897 </param>
18898 <infoflow type="none"/>
18899 </interface>
18900 -<interface name="corenet_tcp_bind_ipmi_port" lineno="36487">
18901 +<interface name="corenet_tcp_bind_ipmi_port" lineno="36610">
18902 <summary>
18903 Bind TCP sockets to the ipmi port.
18904 </summary>
18905 @@ -32909,7 +32726,7 @@ Domain allowed access.
18906 </param>
18907 <infoflow type="none"/>
18908 </interface>
18909 -<interface name="corenet_udp_bind_ipmi_port" lineno="36507">
18910 +<interface name="corenet_udp_bind_ipmi_port" lineno="36630">
18911 <summary>
18912 Bind UDP sockets to the ipmi port.
18913 </summary>
18914 @@ -32920,7 +32737,7 @@ Domain allowed access.
18915 </param>
18916 <infoflow type="none"/>
18917 </interface>
18918 -<interface name="corenet_tcp_connect_ipmi_port" lineno="36526">
18919 +<interface name="corenet_tcp_connect_ipmi_port" lineno="36649">
18920 <summary>
18921 Make a TCP connection to the ipmi port.
18922 </summary>
18923 @@ -32930,7 +32747,7 @@ Domain allowed access.
18924 </summary>
18925 </param>
18926 </interface>
18927 -<interface name="corenet_send_ipmi_client_packets" lineno="36546">
18928 +<interface name="corenet_send_ipmi_client_packets" lineno="36669">
18929 <summary>
18930 Send ipmi_client packets.
18931 </summary>
18932 @@ -32941,7 +32758,7 @@ Domain allowed access.
18933 </param>
18934 <infoflow type="write" weight="10"/>
18935 </interface>
18936 -<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="36565">
18937 +<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="36688">
18938 <summary>
18939 Do not audit attempts to send ipmi_client packets.
18940 </summary>
18941 @@ -32952,7 +32769,7 @@ Domain to not audit.
18942 </param>
18943 <infoflow type="none"/>
18944 </interface>
18945 -<interface name="corenet_receive_ipmi_client_packets" lineno="36584">
18946 +<interface name="corenet_receive_ipmi_client_packets" lineno="36707">
18947 <summary>
18948 Receive ipmi_client packets.
18949 </summary>
18950 @@ -32963,7 +32780,7 @@ Domain allowed access.
18951 </param>
18952 <infoflow type="read" weight="10"/>
18953 </interface>
18954 -<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="36603">
18955 +<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="36726">
18956 <summary>
18957 Do not audit attempts to receive ipmi_client packets.
18958 </summary>
18959 @@ -32974,7 +32791,7 @@ Domain allowed access.
18960 </param>
18961 <infoflow type="none"/>
18962 </interface>
18963 -<interface name="corenet_sendrecv_ipmi_client_packets" lineno="36622">
18964 +<interface name="corenet_sendrecv_ipmi_client_packets" lineno="36745">
18965 <summary>
18966 Send and receive ipmi_client packets.
18967 </summary>
18968 @@ -32985,7 +32802,7 @@ Domain allowed access.
18969 </param>
18970 <infoflow type="both" weight="10"/>
18971 </interface>
18972 -<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="36638">
18973 +<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="36761">
18974 <summary>
18975 Do not audit attempts to send and receive ipmi_client packets.
18976 </summary>
18977 @@ -32996,7 +32813,7 @@ Domain to not audit.
18978 </param>
18979 <infoflow type="none"/>
18980 </interface>
18981 -<interface name="corenet_relabelto_ipmi_client_packets" lineno="36653">
18982 +<interface name="corenet_relabelto_ipmi_client_packets" lineno="36776">
18983 <summary>
18984 Relabel packets to ipmi_client the packet type.
18985 </summary>
18986 @@ -33006,7 +32823,7 @@ Domain allowed access.
18987 </summary>
18988 </param>
18989 </interface>
18990 -<interface name="corenet_send_ipmi_server_packets" lineno="36673">
18991 +<interface name="corenet_send_ipmi_server_packets" lineno="36796">
18992 <summary>
18993 Send ipmi_server packets.
18994 </summary>
18995 @@ -33017,7 +32834,7 @@ Domain allowed access.
18996 </param>
18997 <infoflow type="write" weight="10"/>
18998 </interface>
18999 -<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="36692">
19000 +<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="36815">
19001 <summary>
19002 Do not audit attempts to send ipmi_server packets.
19003 </summary>
19004 @@ -33028,7 +32845,7 @@ Domain to not audit.
19005 </param>
19006 <infoflow type="none"/>
19007 </interface>
19008 -<interface name="corenet_receive_ipmi_server_packets" lineno="36711">
19009 +<interface name="corenet_receive_ipmi_server_packets" lineno="36834">
19010 <summary>
19011 Receive ipmi_server packets.
19012 </summary>
19013 @@ -33039,7 +32856,7 @@ Domain allowed access.
19014 </param>
19015 <infoflow type="read" weight="10"/>
19016 </interface>
19017 -<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="36730">
19018 +<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="36853">
19019 <summary>
19020 Do not audit attempts to receive ipmi_server packets.
19021 </summary>
19022 @@ -33050,7 +32867,7 @@ Domain allowed access.
19023 </param>
19024 <infoflow type="none"/>
19025 </interface>
19026 -<interface name="corenet_sendrecv_ipmi_server_packets" lineno="36749">
19027 +<interface name="corenet_sendrecv_ipmi_server_packets" lineno="36872">
19028 <summary>
19029 Send and receive ipmi_server packets.
19030 </summary>
19031 @@ -33061,7 +32878,7 @@ Domain allowed access.
19032 </param>
19033 <infoflow type="both" weight="10"/>
19034 </interface>
19035 -<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="36765">
19036 +<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="36888">
19037 <summary>
19038 Do not audit attempts to send and receive ipmi_server packets.
19039 </summary>
19040 @@ -33072,7 +32889,7 @@ Domain to not audit.
19041 </param>
19042 <infoflow type="none"/>
19043 </interface>
19044 -<interface name="corenet_relabelto_ipmi_server_packets" lineno="36780">
19045 +<interface name="corenet_relabelto_ipmi_server_packets" lineno="36903">
19046 <summary>
19047 Relabel packets to ipmi_server the packet type.
19048 </summary>
19049 @@ -33082,7 +32899,7 @@ Domain allowed access.
19050 </summary>
19051 </param>
19052 </interface>
19053 -<interface name="corenet_tcp_sendrecv_ipp_port" lineno="36802">
19054 +<interface name="corenet_tcp_sendrecv_ipp_port" lineno="36925">
19055 <summary>
19056 Send and receive TCP traffic on the ipp port.
19057 </summary>
19058 @@ -33093,7 +32910,7 @@ Domain allowed access.
19059 </param>
19060 <infoflow type="both" weight="10"/>
19061 </interface>
19062 -<interface name="corenet_udp_send_ipp_port" lineno="36817">
19063 +<interface name="corenet_udp_send_ipp_port" lineno="36940">
19064 <summary>
19065 Send UDP traffic on the ipp port.
19066 </summary>
19067 @@ -33104,7 +32921,7 @@ Domain allowed access.
19068 </param>
19069 <infoflow type="write" weight="10"/>
19070 </interface>
19071 -<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="36832">
19072 +<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="36955">
19073 <summary>
19074 Do not audit attempts to send UDP traffic on the ipp port.
19075 </summary>
19076 @@ -33115,7 +32932,7 @@ Domain to not audit.
19077 </param>
19078 <infoflow type="none"/>
19079 </interface>
19080 -<interface name="corenet_udp_receive_ipp_port" lineno="36847">
19081 +<interface name="corenet_udp_receive_ipp_port" lineno="36970">
19082 <summary>
19083 Receive UDP traffic on the ipp port.
19084 </summary>
19085 @@ -33126,7 +32943,7 @@ Domain allowed access.
19086 </param>
19087 <infoflow type="read" weight="10"/>
19088 </interface>
19089 -<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="36862">
19090 +<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="36985">
19091 <summary>
19092 Do not audit attempts to receive UDP traffic on the ipp port.
19093 </summary>
19094 @@ -33137,7 +32954,7 @@ Domain to not audit.
19095 </param>
19096 <infoflow type="none"/>
19097 </interface>
19098 -<interface name="corenet_udp_sendrecv_ipp_port" lineno="36877">
19099 +<interface name="corenet_udp_sendrecv_ipp_port" lineno="37000">
19100 <summary>
19101 Send and receive UDP traffic on the ipp port.
19102 </summary>
19103 @@ -33148,7 +32965,7 @@ Domain allowed access.
19104 </param>
19105 <infoflow type="both" weight="10"/>
19106 </interface>
19107 -<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="36893">
19108 +<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="37016">
19109 <summary>
19110 Do not audit attempts to send and receive
19111 UDP traffic on the ipp port.
19112 @@ -33160,7 +32977,7 @@ Domain to not audit.
19113 </param>
19114 <infoflow type="none"/>
19115 </interface>
19116 -<interface name="corenet_tcp_bind_ipp_port" lineno="36908">
19117 +<interface name="corenet_tcp_bind_ipp_port" lineno="37031">
19118 <summary>
19119 Bind TCP sockets to the ipp port.
19120 </summary>
19121 @@ -33171,7 +32988,7 @@ Domain allowed access.
19122 </param>
19123 <infoflow type="none"/>
19124 </interface>
19125 -<interface name="corenet_udp_bind_ipp_port" lineno="36928">
19126 +<interface name="corenet_udp_bind_ipp_port" lineno="37051">
19127 <summary>
19128 Bind UDP sockets to the ipp port.
19129 </summary>
19130 @@ -33182,7 +32999,7 @@ Domain allowed access.
19131 </param>
19132 <infoflow type="none"/>
19133 </interface>
19134 -<interface name="corenet_tcp_connect_ipp_port" lineno="36947">
19135 +<interface name="corenet_tcp_connect_ipp_port" lineno="37070">
19136 <summary>
19137 Make a TCP connection to the ipp port.
19138 </summary>
19139 @@ -33192,7 +33009,7 @@ Domain allowed access.
19140 </summary>
19141 </param>
19142 </interface>
19143 -<interface name="corenet_send_ipp_client_packets" lineno="36967">
19144 +<interface name="corenet_send_ipp_client_packets" lineno="37090">
19145 <summary>
19146 Send ipp_client packets.
19147 </summary>
19148 @@ -33203,7 +33020,7 @@ Domain allowed access.
19149 </param>
19150 <infoflow type="write" weight="10"/>
19151 </interface>
19152 -<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="36986">
19153 +<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="37109">
19154 <summary>
19155 Do not audit attempts to send ipp_client packets.
19156 </summary>
19157 @@ -33214,7 +33031,7 @@ Domain to not audit.
19158 </param>
19159 <infoflow type="none"/>
19160 </interface>
19161 -<interface name="corenet_receive_ipp_client_packets" lineno="37005">
19162 +<interface name="corenet_receive_ipp_client_packets" lineno="37128">
19163 <summary>
19164 Receive ipp_client packets.
19165 </summary>
19166 @@ -33225,7 +33042,7 @@ Domain allowed access.
19167 </param>
19168 <infoflow type="read" weight="10"/>
19169 </interface>
19170 -<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="37024">
19171 +<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="37147">
19172 <summary>
19173 Do not audit attempts to receive ipp_client packets.
19174 </summary>
19175 @@ -33236,7 +33053,7 @@ Domain allowed access.
19176 </param>
19177 <infoflow type="none"/>
19178 </interface>
19179 -<interface name="corenet_sendrecv_ipp_client_packets" lineno="37043">
19180 +<interface name="corenet_sendrecv_ipp_client_packets" lineno="37166">
19181 <summary>
19182 Send and receive ipp_client packets.
19183 </summary>
19184 @@ -33247,7 +33064,7 @@ Domain allowed access.
19185 </param>
19186 <infoflow type="both" weight="10"/>
19187 </interface>
19188 -<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="37059">
19189 +<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="37182">
19190 <summary>
19191 Do not audit attempts to send and receive ipp_client packets.
19192 </summary>
19193 @@ -33258,7 +33075,7 @@ Domain to not audit.
19194 </param>
19195 <infoflow type="none"/>
19196 </interface>
19197 -<interface name="corenet_relabelto_ipp_client_packets" lineno="37074">
19198 +<interface name="corenet_relabelto_ipp_client_packets" lineno="37197">
19199 <summary>
19200 Relabel packets to ipp_client the packet type.
19201 </summary>
19202 @@ -33268,7 +33085,7 @@ Domain allowed access.
19203 </summary>
19204 </param>
19205 </interface>
19206 -<interface name="corenet_send_ipp_server_packets" lineno="37094">
19207 +<interface name="corenet_send_ipp_server_packets" lineno="37217">
19208 <summary>
19209 Send ipp_server packets.
19210 </summary>
19211 @@ -33279,7 +33096,7 @@ Domain allowed access.
19212 </param>
19213 <infoflow type="write" weight="10"/>
19214 </interface>
19215 -<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="37113">
19216 +<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="37236">
19217 <summary>
19218 Do not audit attempts to send ipp_server packets.
19219 </summary>
19220 @@ -33290,7 +33107,7 @@ Domain to not audit.
19221 </param>
19222 <infoflow type="none"/>
19223 </interface>
19224 -<interface name="corenet_receive_ipp_server_packets" lineno="37132">
19225 +<interface name="corenet_receive_ipp_server_packets" lineno="37255">
19226 <summary>
19227 Receive ipp_server packets.
19228 </summary>
19229 @@ -33301,7 +33118,7 @@ Domain allowed access.
19230 </param>
19231 <infoflow type="read" weight="10"/>
19232 </interface>
19233 -<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="37151">
19234 +<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="37274">
19235 <summary>
19236 Do not audit attempts to receive ipp_server packets.
19237 </summary>
19238 @@ -33312,7 +33129,7 @@ Domain allowed access.
19239 </param>
19240 <infoflow type="none"/>
19241 </interface>
19242 -<interface name="corenet_sendrecv_ipp_server_packets" lineno="37170">
19243 +<interface name="corenet_sendrecv_ipp_server_packets" lineno="37293">
19244 <summary>
19245 Send and receive ipp_server packets.
19246 </summary>
19247 @@ -33323,7 +33140,7 @@ Domain allowed access.
19248 </param>
19249 <infoflow type="both" weight="10"/>
19250 </interface>
19251 -<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="37186">
19252 +<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="37309">
19253 <summary>
19254 Do not audit attempts to send and receive ipp_server packets.
19255 </summary>
19256 @@ -33334,7 +33151,7 @@ Domain to not audit.
19257 </param>
19258 <infoflow type="none"/>
19259 </interface>
19260 -<interface name="corenet_relabelto_ipp_server_packets" lineno="37201">
19261 +<interface name="corenet_relabelto_ipp_server_packets" lineno="37324">
19262 <summary>
19263 Relabel packets to ipp_server the packet type.
19264 </summary>
19265 @@ -33344,7 +33161,7 @@ Domain allowed access.
19266 </summary>
19267 </param>
19268 </interface>
19269 -<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="37223">
19270 +<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="37346">
19271 <summary>
19272 Send and receive TCP traffic on the ipsecnat port.
19273 </summary>
19274 @@ -33355,7 +33172,7 @@ Domain allowed access.
19275 </param>
19276 <infoflow type="both" weight="10"/>
19277 </interface>
19278 -<interface name="corenet_udp_send_ipsecnat_port" lineno="37238">
19279 +<interface name="corenet_udp_send_ipsecnat_port" lineno="37361">
19280 <summary>
19281 Send UDP traffic on the ipsecnat port.
19282 </summary>
19283 @@ -33366,7 +33183,7 @@ Domain allowed access.
19284 </param>
19285 <infoflow type="write" weight="10"/>
19286 </interface>
19287 -<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="37253">
19288 +<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="37376">
19289 <summary>
19290 Do not audit attempts to send UDP traffic on the ipsecnat port.
19291 </summary>
19292 @@ -33377,7 +33194,7 @@ Domain to not audit.
19293 </param>
19294 <infoflow type="none"/>
19295 </interface>
19296 -<interface name="corenet_udp_receive_ipsecnat_port" lineno="37268">
19297 +<interface name="corenet_udp_receive_ipsecnat_port" lineno="37391">
19298 <summary>
19299 Receive UDP traffic on the ipsecnat port.
19300 </summary>
19301 @@ -33388,7 +33205,7 @@ Domain allowed access.
19302 </param>
19303 <infoflow type="read" weight="10"/>
19304 </interface>
19305 -<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="37283">
19306 +<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="37406">
19307 <summary>
19308 Do not audit attempts to receive UDP traffic on the ipsecnat port.
19309 </summary>
19310 @@ -33399,7 +33216,7 @@ Domain to not audit.
19311 </param>
19312 <infoflow type="none"/>
19313 </interface>
19314 -<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="37298">
19315 +<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="37421">
19316 <summary>
19317 Send and receive UDP traffic on the ipsecnat port.
19318 </summary>
19319 @@ -33410,7 +33227,7 @@ Domain allowed access.
19320 </param>
19321 <infoflow type="both" weight="10"/>
19322 </interface>
19323 -<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="37314">
19324 +<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="37437">
19325 <summary>
19326 Do not audit attempts to send and receive
19327 UDP traffic on the ipsecnat port.
19328 @@ -33422,7 +33239,7 @@ Domain to not audit.
19329 </param>
19330 <infoflow type="none"/>
19331 </interface>
19332 -<interface name="corenet_tcp_bind_ipsecnat_port" lineno="37329">
19333 +<interface name="corenet_tcp_bind_ipsecnat_port" lineno="37452">
19334 <summary>
19335 Bind TCP sockets to the ipsecnat port.
19336 </summary>
19337 @@ -33433,7 +33250,7 @@ Domain allowed access.
19338 </param>
19339 <infoflow type="none"/>
19340 </interface>
19341 -<interface name="corenet_udp_bind_ipsecnat_port" lineno="37349">
19342 +<interface name="corenet_udp_bind_ipsecnat_port" lineno="37472">
19343 <summary>
19344 Bind UDP sockets to the ipsecnat port.
19345 </summary>
19346 @@ -33444,7 +33261,7 @@ Domain allowed access.
19347 </param>
19348 <infoflow type="none"/>
19349 </interface>
19350 -<interface name="corenet_tcp_connect_ipsecnat_port" lineno="37368">
19351 +<interface name="corenet_tcp_connect_ipsecnat_port" lineno="37491">
19352 <summary>
19353 Make a TCP connection to the ipsecnat port.
19354 </summary>
19355 @@ -33454,7 +33271,7 @@ Domain allowed access.
19356 </summary>
19357 </param>
19358 </interface>
19359 -<interface name="corenet_send_ipsecnat_client_packets" lineno="37388">
19360 +<interface name="corenet_send_ipsecnat_client_packets" lineno="37511">
19361 <summary>
19362 Send ipsecnat_client packets.
19363 </summary>
19364 @@ -33465,7 +33282,7 @@ Domain allowed access.
19365 </param>
19366 <infoflow type="write" weight="10"/>
19367 </interface>
19368 -<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="37407">
19369 +<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="37530">
19370 <summary>
19371 Do not audit attempts to send ipsecnat_client packets.
19372 </summary>
19373 @@ -33476,7 +33293,7 @@ Domain to not audit.
19374 </param>
19375 <infoflow type="none"/>
19376 </interface>
19377 -<interface name="corenet_receive_ipsecnat_client_packets" lineno="37426">
19378 +<interface name="corenet_receive_ipsecnat_client_packets" lineno="37549">
19379 <summary>
19380 Receive ipsecnat_client packets.
19381 </summary>
19382 @@ -33487,7 +33304,7 @@ Domain allowed access.
19383 </param>
19384 <infoflow type="read" weight="10"/>
19385 </interface>
19386 -<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="37445">
19387 +<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="37568">
19388 <summary>
19389 Do not audit attempts to receive ipsecnat_client packets.
19390 </summary>
19391 @@ -33498,7 +33315,7 @@ Domain allowed access.
19392 </param>
19393 <infoflow type="none"/>
19394 </interface>
19395 -<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="37464">
19396 +<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="37587">
19397 <summary>
19398 Send and receive ipsecnat_client packets.
19399 </summary>
19400 @@ -33509,7 +33326,7 @@ Domain allowed access.
19401 </param>
19402 <infoflow type="both" weight="10"/>
19403 </interface>
19404 -<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="37480">
19405 +<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="37603">
19406 <summary>
19407 Do not audit attempts to send and receive ipsecnat_client packets.
19408 </summary>
19409 @@ -33520,7 +33337,7 @@ Domain to not audit.
19410 </param>
19411 <infoflow type="none"/>
19412 </interface>
19413 -<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="37495">
19414 +<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="37618">
19415 <summary>
19416 Relabel packets to ipsecnat_client the packet type.
19417 </summary>
19418 @@ -33530,7 +33347,7 @@ Domain allowed access.
19419 </summary>
19420 </param>
19421 </interface>
19422 -<interface name="corenet_send_ipsecnat_server_packets" lineno="37515">
19423 +<interface name="corenet_send_ipsecnat_server_packets" lineno="37638">
19424 <summary>
19425 Send ipsecnat_server packets.
19426 </summary>
19427 @@ -33541,7 +33358,7 @@ Domain allowed access.
19428 </param>
19429 <infoflow type="write" weight="10"/>
19430 </interface>
19431 -<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="37534">
19432 +<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="37657">
19433 <summary>
19434 Do not audit attempts to send ipsecnat_server packets.
19435 </summary>
19436 @@ -33552,7 +33369,7 @@ Domain to not audit.
19437 </param>
19438 <infoflow type="none"/>
19439 </interface>
19440 -<interface name="corenet_receive_ipsecnat_server_packets" lineno="37553">
19441 +<interface name="corenet_receive_ipsecnat_server_packets" lineno="37676">
19442 <summary>
19443 Receive ipsecnat_server packets.
19444 </summary>
19445 @@ -33563,7 +33380,7 @@ Domain allowed access.
19446 </param>
19447 <infoflow type="read" weight="10"/>
19448 </interface>
19449 -<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="37572">
19450 +<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="37695">
19451 <summary>
19452 Do not audit attempts to receive ipsecnat_server packets.
19453 </summary>
19454 @@ -33574,7 +33391,7 @@ Domain allowed access.
19455 </param>
19456 <infoflow type="none"/>
19457 </interface>
19458 -<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="37591">
19459 +<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="37714">
19460 <summary>
19461 Send and receive ipsecnat_server packets.
19462 </summary>
19463 @@ -33585,7 +33402,7 @@ Domain allowed access.
19464 </param>
19465 <infoflow type="both" weight="10"/>
19466 </interface>
19467 -<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="37607">
19468 +<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="37730">
19469 <summary>
19470 Do not audit attempts to send and receive ipsecnat_server packets.
19471 </summary>
19472 @@ -33596,7 +33413,7 @@ Domain to not audit.
19473 </param>
19474 <infoflow type="none"/>
19475 </interface>
19476 -<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="37622">
19477 +<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="37745">
19478 <summary>
19479 Relabel packets to ipsecnat_server the packet type.
19480 </summary>
19481 @@ -33606,7 +33423,7 @@ Domain allowed access.
19482 </summary>
19483 </param>
19484 </interface>
19485 -<interface name="corenet_tcp_sendrecv_ircd_port" lineno="37644">
19486 +<interface name="corenet_tcp_sendrecv_ircd_port" lineno="37767">
19487 <summary>
19488 Send and receive TCP traffic on the ircd port.
19489 </summary>
19490 @@ -33617,7 +33434,7 @@ Domain allowed access.
19491 </param>
19492 <infoflow type="both" weight="10"/>
19493 </interface>
19494 -<interface name="corenet_udp_send_ircd_port" lineno="37659">
19495 +<interface name="corenet_udp_send_ircd_port" lineno="37782">
19496 <summary>
19497 Send UDP traffic on the ircd port.
19498 </summary>
19499 @@ -33628,7 +33445,7 @@ Domain allowed access.
19500 </param>
19501 <infoflow type="write" weight="10"/>
19502 </interface>
19503 -<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="37674">
19504 +<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="37797">
19505 <summary>
19506 Do not audit attempts to send UDP traffic on the ircd port.
19507 </summary>
19508 @@ -33639,7 +33456,7 @@ Domain to not audit.
19509 </param>
19510 <infoflow type="none"/>
19511 </interface>
19512 -<interface name="corenet_udp_receive_ircd_port" lineno="37689">
19513 +<interface name="corenet_udp_receive_ircd_port" lineno="37812">
19514 <summary>
19515 Receive UDP traffic on the ircd port.
19516 </summary>
19517 @@ -33650,7 +33467,7 @@ Domain allowed access.
19518 </param>
19519 <infoflow type="read" weight="10"/>
19520 </interface>
19521 -<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="37704">
19522 +<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="37827">
19523 <summary>
19524 Do not audit attempts to receive UDP traffic on the ircd port.
19525 </summary>
19526 @@ -33661,7 +33478,7 @@ Domain to not audit.
19527 </param>
19528 <infoflow type="none"/>
19529 </interface>
19530 -<interface name="corenet_udp_sendrecv_ircd_port" lineno="37719">
19531 +<interface name="corenet_udp_sendrecv_ircd_port" lineno="37842">
19532 <summary>
19533 Send and receive UDP traffic on the ircd port.
19534 </summary>
19535 @@ -33672,7 +33489,7 @@ Domain allowed access.
19536 </param>
19537 <infoflow type="both" weight="10"/>
19538 </interface>
19539 -<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="37735">
19540 +<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="37858">
19541 <summary>
19542 Do not audit attempts to send and receive
19543 UDP traffic on the ircd port.
19544 @@ -33684,7 +33501,7 @@ Domain to not audit.
19545 </param>
19546 <infoflow type="none"/>
19547 </interface>
19548 -<interface name="corenet_tcp_bind_ircd_port" lineno="37750">
19549 +<interface name="corenet_tcp_bind_ircd_port" lineno="37873">
19550 <summary>
19551 Bind TCP sockets to the ircd port.
19552 </summary>
19553 @@ -33695,7 +33512,7 @@ Domain allowed access.
19554 </param>
19555 <infoflow type="none"/>
19556 </interface>
19557 -<interface name="corenet_udp_bind_ircd_port" lineno="37770">
19558 +<interface name="corenet_udp_bind_ircd_port" lineno="37893">
19559 <summary>
19560 Bind UDP sockets to the ircd port.
19561 </summary>
19562 @@ -33706,7 +33523,7 @@ Domain allowed access.
19563 </param>
19564 <infoflow type="none"/>
19565 </interface>
19566 -<interface name="corenet_tcp_connect_ircd_port" lineno="37789">
19567 +<interface name="corenet_tcp_connect_ircd_port" lineno="37912">
19568 <summary>
19569 Make a TCP connection to the ircd port.
19570 </summary>
19571 @@ -33716,7 +33533,7 @@ Domain allowed access.
19572 </summary>
19573 </param>
19574 </interface>
19575 -<interface name="corenet_send_ircd_client_packets" lineno="37809">
19576 +<interface name="corenet_send_ircd_client_packets" lineno="37932">
19577 <summary>
19578 Send ircd_client packets.
19579 </summary>
19580 @@ -33727,7 +33544,7 @@ Domain allowed access.
19581 </param>
19582 <infoflow type="write" weight="10"/>
19583 </interface>
19584 -<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="37828">
19585 +<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="37951">
19586 <summary>
19587 Do not audit attempts to send ircd_client packets.
19588 </summary>
19589 @@ -33738,7 +33555,7 @@ Domain to not audit.
19590 </param>
19591 <infoflow type="none"/>
19592 </interface>
19593 -<interface name="corenet_receive_ircd_client_packets" lineno="37847">
19594 +<interface name="corenet_receive_ircd_client_packets" lineno="37970">
19595 <summary>
19596 Receive ircd_client packets.
19597 </summary>
19598 @@ -33749,7 +33566,7 @@ Domain allowed access.
19599 </param>
19600 <infoflow type="read" weight="10"/>
19601 </interface>
19602 -<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="37866">
19603 +<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="37989">
19604 <summary>
19605 Do not audit attempts to receive ircd_client packets.
19606 </summary>
19607 @@ -33760,7 +33577,7 @@ Domain allowed access.
19608 </param>
19609 <infoflow type="none"/>
19610 </interface>
19611 -<interface name="corenet_sendrecv_ircd_client_packets" lineno="37885">
19612 +<interface name="corenet_sendrecv_ircd_client_packets" lineno="38008">
19613 <summary>
19614 Send and receive ircd_client packets.
19615 </summary>
19616 @@ -33771,7 +33588,7 @@ Domain allowed access.
19617 </param>
19618 <infoflow type="both" weight="10"/>
19619 </interface>
19620 -<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="37901">
19621 +<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="38024">
19622 <summary>
19623 Do not audit attempts to send and receive ircd_client packets.
19624 </summary>
19625 @@ -33782,7 +33599,7 @@ Domain to not audit.
19626 </param>
19627 <infoflow type="none"/>
19628 </interface>
19629 -<interface name="corenet_relabelto_ircd_client_packets" lineno="37916">
19630 +<interface name="corenet_relabelto_ircd_client_packets" lineno="38039">
19631 <summary>
19632 Relabel packets to ircd_client the packet type.
19633 </summary>
19634 @@ -33792,7 +33609,7 @@ Domain allowed access.
19635 </summary>
19636 </param>
19637 </interface>
19638 -<interface name="corenet_send_ircd_server_packets" lineno="37936">
19639 +<interface name="corenet_send_ircd_server_packets" lineno="38059">
19640 <summary>
19641 Send ircd_server packets.
19642 </summary>
19643 @@ -33803,7 +33620,7 @@ Domain allowed access.
19644 </param>
19645 <infoflow type="write" weight="10"/>
19646 </interface>
19647 -<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="37955">
19648 +<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="38078">
19649 <summary>
19650 Do not audit attempts to send ircd_server packets.
19651 </summary>
19652 @@ -33814,7 +33631,7 @@ Domain to not audit.
19653 </param>
19654 <infoflow type="none"/>
19655 </interface>
19656 -<interface name="corenet_receive_ircd_server_packets" lineno="37974">
19657 +<interface name="corenet_receive_ircd_server_packets" lineno="38097">
19658 <summary>
19659 Receive ircd_server packets.
19660 </summary>
19661 @@ -33825,7 +33642,7 @@ Domain allowed access.
19662 </param>
19663 <infoflow type="read" weight="10"/>
19664 </interface>
19665 -<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="37993">
19666 +<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="38116">
19667 <summary>
19668 Do not audit attempts to receive ircd_server packets.
19669 </summary>
19670 @@ -33836,7 +33653,7 @@ Domain allowed access.
19671 </param>
19672 <infoflow type="none"/>
19673 </interface>
19674 -<interface name="corenet_sendrecv_ircd_server_packets" lineno="38012">
19675 +<interface name="corenet_sendrecv_ircd_server_packets" lineno="38135">
19676 <summary>
19677 Send and receive ircd_server packets.
19678 </summary>
19679 @@ -33847,7 +33664,7 @@ Domain allowed access.
19680 </param>
19681 <infoflow type="both" weight="10"/>
19682 </interface>
19683 -<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="38028">
19684 +<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="38151">
19685 <summary>
19686 Do not audit attempts to send and receive ircd_server packets.
19687 </summary>
19688 @@ -33858,7 +33675,7 @@ Domain to not audit.
19689 </param>
19690 <infoflow type="none"/>
19691 </interface>
19692 -<interface name="corenet_relabelto_ircd_server_packets" lineno="38043">
19693 +<interface name="corenet_relabelto_ircd_server_packets" lineno="38166">
19694 <summary>
19695 Relabel packets to ircd_server the packet type.
19696 </summary>
19697 @@ -33868,7 +33685,7 @@ Domain allowed access.
19698 </summary>
19699 </param>
19700 </interface>
19701 -<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="38065">
19702 +<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="38188">
19703 <summary>
19704 Send and receive TCP traffic on the isakmp port.
19705 </summary>
19706 @@ -33879,7 +33696,7 @@ Domain allowed access.
19707 </param>
19708 <infoflow type="both" weight="10"/>
19709 </interface>
19710 -<interface name="corenet_udp_send_isakmp_port" lineno="38080">
19711 +<interface name="corenet_udp_send_isakmp_port" lineno="38203">
19712 <summary>
19713 Send UDP traffic on the isakmp port.
19714 </summary>
19715 @@ -33890,7 +33707,7 @@ Domain allowed access.
19716 </param>
19717 <infoflow type="write" weight="10"/>
19718 </interface>
19719 -<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="38095">
19720 +<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="38218">
19721 <summary>
19722 Do not audit attempts to send UDP traffic on the isakmp port.
19723 </summary>
19724 @@ -33901,7 +33718,7 @@ Domain to not audit.
19725 </param>
19726 <infoflow type="none"/>
19727 </interface>
19728 -<interface name="corenet_udp_receive_isakmp_port" lineno="38110">
19729 +<interface name="corenet_udp_receive_isakmp_port" lineno="38233">
19730 <summary>
19731 Receive UDP traffic on the isakmp port.
19732 </summary>
19733 @@ -33912,7 +33729,7 @@ Domain allowed access.
19734 </param>
19735 <infoflow type="read" weight="10"/>
19736 </interface>
19737 -<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="38125">
19738 +<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="38248">
19739 <summary>
19740 Do not audit attempts to receive UDP traffic on the isakmp port.
19741 </summary>
19742 @@ -33923,7 +33740,7 @@ Domain to not audit.
19743 </param>
19744 <infoflow type="none"/>
19745 </interface>
19746 -<interface name="corenet_udp_sendrecv_isakmp_port" lineno="38140">
19747 +<interface name="corenet_udp_sendrecv_isakmp_port" lineno="38263">
19748 <summary>
19749 Send and receive UDP traffic on the isakmp port.
19750 </summary>
19751 @@ -33934,7 +33751,7 @@ Domain allowed access.
19752 </param>
19753 <infoflow type="both" weight="10"/>
19754 </interface>
19755 -<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="38156">
19756 +<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="38279">
19757 <summary>
19758 Do not audit attempts to send and receive
19759 UDP traffic on the isakmp port.
19760 @@ -33946,7 +33763,7 @@ Domain to not audit.
19761 </param>
19762 <infoflow type="none"/>
19763 </interface>
19764 -<interface name="corenet_tcp_bind_isakmp_port" lineno="38171">
19765 +<interface name="corenet_tcp_bind_isakmp_port" lineno="38294">
19766 <summary>
19767 Bind TCP sockets to the isakmp port.
19768 </summary>
19769 @@ -33957,7 +33774,7 @@ Domain allowed access.
19770 </param>
19771 <infoflow type="none"/>
19772 </interface>
19773 -<interface name="corenet_udp_bind_isakmp_port" lineno="38191">
19774 +<interface name="corenet_udp_bind_isakmp_port" lineno="38314">
19775 <summary>
19776 Bind UDP sockets to the isakmp port.
19777 </summary>
19778 @@ -33968,7 +33785,7 @@ Domain allowed access.
19779 </param>
19780 <infoflow type="none"/>
19781 </interface>
19782 -<interface name="corenet_tcp_connect_isakmp_port" lineno="38210">
19783 +<interface name="corenet_tcp_connect_isakmp_port" lineno="38333">
19784 <summary>
19785 Make a TCP connection to the isakmp port.
19786 </summary>
19787 @@ -33978,7 +33795,7 @@ Domain allowed access.
19788 </summary>
19789 </param>
19790 </interface>
19791 -<interface name="corenet_send_isakmp_client_packets" lineno="38230">
19792 +<interface name="corenet_send_isakmp_client_packets" lineno="38353">
19793 <summary>
19794 Send isakmp_client packets.
19795 </summary>
19796 @@ -33989,7 +33806,7 @@ Domain allowed access.
19797 </param>
19798 <infoflow type="write" weight="10"/>
19799 </interface>
19800 -<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="38249">
19801 +<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="38372">
19802 <summary>
19803 Do not audit attempts to send isakmp_client packets.
19804 </summary>
19805 @@ -34000,7 +33817,7 @@ Domain to not audit.
19806 </param>
19807 <infoflow type="none"/>
19808 </interface>
19809 -<interface name="corenet_receive_isakmp_client_packets" lineno="38268">
19810 +<interface name="corenet_receive_isakmp_client_packets" lineno="38391">
19811 <summary>
19812 Receive isakmp_client packets.
19813 </summary>
19814 @@ -34011,7 +33828,7 @@ Domain allowed access.
19815 </param>
19816 <infoflow type="read" weight="10"/>
19817 </interface>
19818 -<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="38287">
19819 +<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="38410">
19820 <summary>
19821 Do not audit attempts to receive isakmp_client packets.
19822 </summary>
19823 @@ -34022,7 +33839,7 @@ Domain allowed access.
19824 </param>
19825 <infoflow type="none"/>
19826 </interface>
19827 -<interface name="corenet_sendrecv_isakmp_client_packets" lineno="38306">
19828 +<interface name="corenet_sendrecv_isakmp_client_packets" lineno="38429">
19829 <summary>
19830 Send and receive isakmp_client packets.
19831 </summary>
19832 @@ -34033,7 +33850,7 @@ Domain allowed access.
19833 </param>
19834 <infoflow type="both" weight="10"/>
19835 </interface>
19836 -<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="38322">
19837 +<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="38445">
19838 <summary>
19839 Do not audit attempts to send and receive isakmp_client packets.
19840 </summary>
19841 @@ -34044,7 +33861,7 @@ Domain to not audit.
19842 </param>
19843 <infoflow type="none"/>
19844 </interface>
19845 -<interface name="corenet_relabelto_isakmp_client_packets" lineno="38337">
19846 +<interface name="corenet_relabelto_isakmp_client_packets" lineno="38460">
19847 <summary>
19848 Relabel packets to isakmp_client the packet type.
19849 </summary>
19850 @@ -34054,7 +33871,7 @@ Domain allowed access.
19851 </summary>
19852 </param>
19853 </interface>
19854 -<interface name="corenet_send_isakmp_server_packets" lineno="38357">
19855 +<interface name="corenet_send_isakmp_server_packets" lineno="38480">
19856 <summary>
19857 Send isakmp_server packets.
19858 </summary>
19859 @@ -34065,7 +33882,7 @@ Domain allowed access.
19860 </param>
19861 <infoflow type="write" weight="10"/>
19862 </interface>
19863 -<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="38376">
19864 +<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="38499">
19865 <summary>
19866 Do not audit attempts to send isakmp_server packets.
19867 </summary>
19868 @@ -34076,7 +33893,7 @@ Domain to not audit.
19869 </param>
19870 <infoflow type="none"/>
19871 </interface>
19872 -<interface name="corenet_receive_isakmp_server_packets" lineno="38395">
19873 +<interface name="corenet_receive_isakmp_server_packets" lineno="38518">
19874 <summary>
19875 Receive isakmp_server packets.
19876 </summary>
19877 @@ -34087,7 +33904,7 @@ Domain allowed access.
19878 </param>
19879 <infoflow type="read" weight="10"/>
19880 </interface>
19881 -<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="38414">
19882 +<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="38537">
19883 <summary>
19884 Do not audit attempts to receive isakmp_server packets.
19885 </summary>
19886 @@ -34098,7 +33915,7 @@ Domain allowed access.
19887 </param>
19888 <infoflow type="none"/>
19889 </interface>
19890 -<interface name="corenet_sendrecv_isakmp_server_packets" lineno="38433">
19891 +<interface name="corenet_sendrecv_isakmp_server_packets" lineno="38556">
19892 <summary>
19893 Send and receive isakmp_server packets.
19894 </summary>
19895 @@ -34109,7 +33926,7 @@ Domain allowed access.
19896 </param>
19897 <infoflow type="both" weight="10"/>
19898 </interface>
19899 -<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="38449">
19900 +<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="38572">
19901 <summary>
19902 Do not audit attempts to send and receive isakmp_server packets.
19903 </summary>
19904 @@ -34120,7 +33937,7 @@ Domain to not audit.
19905 </param>
19906 <infoflow type="none"/>
19907 </interface>
19908 -<interface name="corenet_relabelto_isakmp_server_packets" lineno="38464">
19909 +<interface name="corenet_relabelto_isakmp_server_packets" lineno="38587">
19910 <summary>
19911 Relabel packets to isakmp_server the packet type.
19912 </summary>
19913 @@ -34130,7 +33947,7 @@ Domain allowed access.
19914 </summary>
19915 </param>
19916 </interface>
19917 -<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="38486">
19918 +<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="38609">
19919 <summary>
19920 Send and receive TCP traffic on the iscsi port.
19921 </summary>
19922 @@ -34141,7 +33958,7 @@ Domain allowed access.
19923 </param>
19924 <infoflow type="both" weight="10"/>
19925 </interface>
19926 -<interface name="corenet_udp_send_iscsi_port" lineno="38501">
19927 +<interface name="corenet_udp_send_iscsi_port" lineno="38624">
19928 <summary>
19929 Send UDP traffic on the iscsi port.
19930 </summary>
19931 @@ -34152,7 +33969,7 @@ Domain allowed access.
19932 </param>
19933 <infoflow type="write" weight="10"/>
19934 </interface>
19935 -<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="38516">
19936 +<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="38639">
19937 <summary>
19938 Do not audit attempts to send UDP traffic on the iscsi port.
19939 </summary>
19940 @@ -34163,7 +33980,7 @@ Domain to not audit.
19941 </param>
19942 <infoflow type="none"/>
19943 </interface>
19944 -<interface name="corenet_udp_receive_iscsi_port" lineno="38531">
19945 +<interface name="corenet_udp_receive_iscsi_port" lineno="38654">
19946 <summary>
19947 Receive UDP traffic on the iscsi port.
19948 </summary>
19949 @@ -34174,7 +33991,7 @@ Domain allowed access.
19950 </param>
19951 <infoflow type="read" weight="10"/>
19952 </interface>
19953 -<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="38546">
19954 +<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="38669">
19955 <summary>
19956 Do not audit attempts to receive UDP traffic on the iscsi port.
19957 </summary>
19958 @@ -34185,7 +34002,7 @@ Domain to not audit.
19959 </param>
19960 <infoflow type="none"/>
19961 </interface>
19962 -<interface name="corenet_udp_sendrecv_iscsi_port" lineno="38561">
19963 +<interface name="corenet_udp_sendrecv_iscsi_port" lineno="38684">
19964 <summary>
19965 Send and receive UDP traffic on the iscsi port.
19966 </summary>
19967 @@ -34196,7 +34013,7 @@ Domain allowed access.
19968 </param>
19969 <infoflow type="both" weight="10"/>
19970 </interface>
19971 -<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="38577">
19972 +<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="38700">
19973 <summary>
19974 Do not audit attempts to send and receive
19975 UDP traffic on the iscsi port.
19976 @@ -34208,7 +34025,7 @@ Domain to not audit.
19977 </param>
19978 <infoflow type="none"/>
19979 </interface>
19980 -<interface name="corenet_tcp_bind_iscsi_port" lineno="38592">
19981 +<interface name="corenet_tcp_bind_iscsi_port" lineno="38715">
19982 <summary>
19983 Bind TCP sockets to the iscsi port.
19984 </summary>
19985 @@ -34219,7 +34036,7 @@ Domain allowed access.
19986 </param>
19987 <infoflow type="none"/>
19988 </interface>
19989 -<interface name="corenet_udp_bind_iscsi_port" lineno="38612">
19990 +<interface name="corenet_udp_bind_iscsi_port" lineno="38735">
19991 <summary>
19992 Bind UDP sockets to the iscsi port.
19993 </summary>
19994 @@ -34230,7 +34047,7 @@ Domain allowed access.
19995 </param>
19996 <infoflow type="none"/>
19997 </interface>
19998 -<interface name="corenet_tcp_connect_iscsi_port" lineno="38631">
19999 +<interface name="corenet_tcp_connect_iscsi_port" lineno="38754">
20000 <summary>
20001 Make a TCP connection to the iscsi port.
20002 </summary>
20003 @@ -34240,7 +34057,7 @@ Domain allowed access.
20004 </summary>
20005 </param>
20006 </interface>
20007 -<interface name="corenet_send_iscsi_client_packets" lineno="38651">
20008 +<interface name="corenet_send_iscsi_client_packets" lineno="38774">
20009 <summary>
20010 Send iscsi_client packets.
20011 </summary>
20012 @@ -34251,7 +34068,7 @@ Domain allowed access.
20013 </param>
20014 <infoflow type="write" weight="10"/>
20015 </interface>
20016 -<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="38670">
20017 +<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="38793">
20018 <summary>
20019 Do not audit attempts to send iscsi_client packets.
20020 </summary>
20021 @@ -34262,7 +34079,7 @@ Domain to not audit.
20022 </param>
20023 <infoflow type="none"/>
20024 </interface>
20025 -<interface name="corenet_receive_iscsi_client_packets" lineno="38689">
20026 +<interface name="corenet_receive_iscsi_client_packets" lineno="38812">
20027 <summary>
20028 Receive iscsi_client packets.
20029 </summary>
20030 @@ -34273,7 +34090,7 @@ Domain allowed access.
20031 </param>
20032 <infoflow type="read" weight="10"/>
20033 </interface>
20034 -<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="38708">
20035 +<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="38831">
20036 <summary>
20037 Do not audit attempts to receive iscsi_client packets.
20038 </summary>
20039 @@ -34284,7 +34101,7 @@ Domain allowed access.
20040 </param>
20041 <infoflow type="none"/>
20042 </interface>
20043 -<interface name="corenet_sendrecv_iscsi_client_packets" lineno="38727">
20044 +<interface name="corenet_sendrecv_iscsi_client_packets" lineno="38850">
20045 <summary>
20046 Send and receive iscsi_client packets.
20047 </summary>
20048 @@ -34295,7 +34112,7 @@ Domain allowed access.
20049 </param>
20050 <infoflow type="both" weight="10"/>
20051 </interface>
20052 -<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="38743">
20053 +<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="38866">
20054 <summary>
20055 Do not audit attempts to send and receive iscsi_client packets.
20056 </summary>
20057 @@ -34306,7 +34123,7 @@ Domain to not audit.
20058 </param>
20059 <infoflow type="none"/>
20060 </interface>
20061 -<interface name="corenet_relabelto_iscsi_client_packets" lineno="38758">
20062 +<interface name="corenet_relabelto_iscsi_client_packets" lineno="38881">
20063 <summary>
20064 Relabel packets to iscsi_client the packet type.
20065 </summary>
20066 @@ -34316,7 +34133,7 @@ Domain allowed access.
20067 </summary>
20068 </param>
20069 </interface>
20070 -<interface name="corenet_send_iscsi_server_packets" lineno="38778">
20071 +<interface name="corenet_send_iscsi_server_packets" lineno="38901">
20072 <summary>
20073 Send iscsi_server packets.
20074 </summary>
20075 @@ -34327,7 +34144,7 @@ Domain allowed access.
20076 </param>
20077 <infoflow type="write" weight="10"/>
20078 </interface>
20079 -<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="38797">
20080 +<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="38920">
20081 <summary>
20082 Do not audit attempts to send iscsi_server packets.
20083 </summary>
20084 @@ -34338,7 +34155,7 @@ Domain to not audit.
20085 </param>
20086 <infoflow type="none"/>
20087 </interface>
20088 -<interface name="corenet_receive_iscsi_server_packets" lineno="38816">
20089 +<interface name="corenet_receive_iscsi_server_packets" lineno="38939">
20090 <summary>
20091 Receive iscsi_server packets.
20092 </summary>
20093 @@ -34349,7 +34166,7 @@ Domain allowed access.
20094 </param>
20095 <infoflow type="read" weight="10"/>
20096 </interface>
20097 -<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="38835">
20098 +<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="38958">
20099 <summary>
20100 Do not audit attempts to receive iscsi_server packets.
20101 </summary>
20102 @@ -34360,7 +34177,7 @@ Domain allowed access.
20103 </param>
20104 <infoflow type="none"/>
20105 </interface>
20106 -<interface name="corenet_sendrecv_iscsi_server_packets" lineno="38854">
20107 +<interface name="corenet_sendrecv_iscsi_server_packets" lineno="38977">
20108 <summary>
20109 Send and receive iscsi_server packets.
20110 </summary>
20111 @@ -34371,7 +34188,7 @@ Domain allowed access.
20112 </param>
20113 <infoflow type="both" weight="10"/>
20114 </interface>
20115 -<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="38870">
20116 +<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="38993">
20117 <summary>
20118 Do not audit attempts to send and receive iscsi_server packets.
20119 </summary>
20120 @@ -34382,7 +34199,7 @@ Domain to not audit.
20121 </param>
20122 <infoflow type="none"/>
20123 </interface>
20124 -<interface name="corenet_relabelto_iscsi_server_packets" lineno="38885">
20125 +<interface name="corenet_relabelto_iscsi_server_packets" lineno="39008">
20126 <summary>
20127 Relabel packets to iscsi_server the packet type.
20128 </summary>
20129 @@ -34392,7 +34209,7 @@ Domain allowed access.
20130 </summary>
20131 </param>
20132 </interface>
20133 -<interface name="corenet_tcp_sendrecv_isns_port" lineno="38907">
20134 +<interface name="corenet_tcp_sendrecv_isns_port" lineno="39030">
20135 <summary>
20136 Send and receive TCP traffic on the isns port.
20137 </summary>
20138 @@ -34403,7 +34220,7 @@ Domain allowed access.
20139 </param>
20140 <infoflow type="both" weight="10"/>
20141 </interface>
20142 -<interface name="corenet_udp_send_isns_port" lineno="38922">
20143 +<interface name="corenet_udp_send_isns_port" lineno="39045">
20144 <summary>
20145 Send UDP traffic on the isns port.
20146 </summary>
20147 @@ -34414,7 +34231,7 @@ Domain allowed access.
20148 </param>
20149 <infoflow type="write" weight="10"/>
20150 </interface>
20151 -<interface name="corenet_dontaudit_udp_send_isns_port" lineno="38937">
20152 +<interface name="corenet_dontaudit_udp_send_isns_port" lineno="39060">
20153 <summary>
20154 Do not audit attempts to send UDP traffic on the isns port.
20155 </summary>
20156 @@ -34425,7 +34242,7 @@ Domain to not audit.
20157 </param>
20158 <infoflow type="none"/>
20159 </interface>
20160 -<interface name="corenet_udp_receive_isns_port" lineno="38952">
20161 +<interface name="corenet_udp_receive_isns_port" lineno="39075">
20162 <summary>
20163 Receive UDP traffic on the isns port.
20164 </summary>
20165 @@ -34436,7 +34253,7 @@ Domain allowed access.
20166 </param>
20167 <infoflow type="read" weight="10"/>
20168 </interface>
20169 -<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="38967">
20170 +<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="39090">
20171 <summary>
20172 Do not audit attempts to receive UDP traffic on the isns port.
20173 </summary>
20174 @@ -34447,7 +34264,7 @@ Domain to not audit.
20175 </param>
20176 <infoflow type="none"/>
20177 </interface>
20178 -<interface name="corenet_udp_sendrecv_isns_port" lineno="38982">
20179 +<interface name="corenet_udp_sendrecv_isns_port" lineno="39105">
20180 <summary>
20181 Send and receive UDP traffic on the isns port.
20182 </summary>
20183 @@ -34458,7 +34275,7 @@ Domain allowed access.
20184 </param>
20185 <infoflow type="both" weight="10"/>
20186 </interface>
20187 -<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="38998">
20188 +<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="39121">
20189 <summary>
20190 Do not audit attempts to send and receive
20191 UDP traffic on the isns port.
20192 @@ -34470,7 +34287,7 @@ Domain to not audit.
20193 </param>
20194 <infoflow type="none"/>
20195 </interface>
20196 -<interface name="corenet_tcp_bind_isns_port" lineno="39013">
20197 +<interface name="corenet_tcp_bind_isns_port" lineno="39136">
20198 <summary>
20199 Bind TCP sockets to the isns port.
20200 </summary>
20201 @@ -34481,7 +34298,7 @@ Domain allowed access.
20202 </param>
20203 <infoflow type="none"/>
20204 </interface>
20205 -<interface name="corenet_udp_bind_isns_port" lineno="39033">
20206 +<interface name="corenet_udp_bind_isns_port" lineno="39156">
20207 <summary>
20208 Bind UDP sockets to the isns port.
20209 </summary>
20210 @@ -34492,7 +34309,7 @@ Domain allowed access.
20211 </param>
20212 <infoflow type="none"/>
20213 </interface>
20214 -<interface name="corenet_tcp_connect_isns_port" lineno="39052">
20215 +<interface name="corenet_tcp_connect_isns_port" lineno="39175">
20216 <summary>
20217 Make a TCP connection to the isns port.
20218 </summary>
20219 @@ -34502,7 +34319,7 @@ Domain allowed access.
20220 </summary>
20221 </param>
20222 </interface>
20223 -<interface name="corenet_send_isns_client_packets" lineno="39072">
20224 +<interface name="corenet_send_isns_client_packets" lineno="39195">
20225 <summary>
20226 Send isns_client packets.
20227 </summary>
20228 @@ -34513,7 +34330,7 @@ Domain allowed access.
20229 </param>
20230 <infoflow type="write" weight="10"/>
20231 </interface>
20232 -<interface name="corenet_dontaudit_send_isns_client_packets" lineno="39091">
20233 +<interface name="corenet_dontaudit_send_isns_client_packets" lineno="39214">
20234 <summary>
20235 Do not audit attempts to send isns_client packets.
20236 </summary>
20237 @@ -34524,7 +34341,7 @@ Domain to not audit.
20238 </param>
20239 <infoflow type="none"/>
20240 </interface>
20241 -<interface name="corenet_receive_isns_client_packets" lineno="39110">
20242 +<interface name="corenet_receive_isns_client_packets" lineno="39233">
20243 <summary>
20244 Receive isns_client packets.
20245 </summary>
20246 @@ -34535,7 +34352,7 @@ Domain allowed access.
20247 </param>
20248 <infoflow type="read" weight="10"/>
20249 </interface>
20250 -<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="39129">
20251 +<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="39252">
20252 <summary>
20253 Do not audit attempts to receive isns_client packets.
20254 </summary>
20255 @@ -34546,7 +34363,7 @@ Domain allowed access.
20256 </param>
20257 <infoflow type="none"/>
20258 </interface>
20259 -<interface name="corenet_sendrecv_isns_client_packets" lineno="39148">
20260 +<interface name="corenet_sendrecv_isns_client_packets" lineno="39271">
20261 <summary>
20262 Send and receive isns_client packets.
20263 </summary>
20264 @@ -34557,7 +34374,7 @@ Domain allowed access.
20265 </param>
20266 <infoflow type="both" weight="10"/>
20267 </interface>
20268 -<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="39164">
20269 +<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="39287">
20270 <summary>
20271 Do not audit attempts to send and receive isns_client packets.
20272 </summary>
20273 @@ -34568,7 +34385,7 @@ Domain to not audit.
20274 </param>
20275 <infoflow type="none"/>
20276 </interface>
20277 -<interface name="corenet_relabelto_isns_client_packets" lineno="39179">
20278 +<interface name="corenet_relabelto_isns_client_packets" lineno="39302">
20279 <summary>
20280 Relabel packets to isns_client the packet type.
20281 </summary>
20282 @@ -34578,7 +34395,7 @@ Domain allowed access.
20283 </summary>
20284 </param>
20285 </interface>
20286 -<interface name="corenet_send_isns_server_packets" lineno="39199">
20287 +<interface name="corenet_send_isns_server_packets" lineno="39322">
20288 <summary>
20289 Send isns_server packets.
20290 </summary>
20291 @@ -34589,7 +34406,7 @@ Domain allowed access.
20292 </param>
20293 <infoflow type="write" weight="10"/>
20294 </interface>
20295 -<interface name="corenet_dontaudit_send_isns_server_packets" lineno="39218">
20296 +<interface name="corenet_dontaudit_send_isns_server_packets" lineno="39341">
20297 <summary>
20298 Do not audit attempts to send isns_server packets.
20299 </summary>
20300 @@ -34600,7 +34417,7 @@ Domain to not audit.
20301 </param>
20302 <infoflow type="none"/>
20303 </interface>
20304 -<interface name="corenet_receive_isns_server_packets" lineno="39237">
20305 +<interface name="corenet_receive_isns_server_packets" lineno="39360">
20306 <summary>
20307 Receive isns_server packets.
20308 </summary>
20309 @@ -34611,7 +34428,7 @@ Domain allowed access.
20310 </param>
20311 <infoflow type="read" weight="10"/>
20312 </interface>
20313 -<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="39256">
20314 +<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="39379">
20315 <summary>
20316 Do not audit attempts to receive isns_server packets.
20317 </summary>
20318 @@ -34622,7 +34439,7 @@ Domain allowed access.
20319 </param>
20320 <infoflow type="none"/>
20321 </interface>
20322 -<interface name="corenet_sendrecv_isns_server_packets" lineno="39275">
20323 +<interface name="corenet_sendrecv_isns_server_packets" lineno="39398">
20324 <summary>
20325 Send and receive isns_server packets.
20326 </summary>
20327 @@ -34633,7 +34450,7 @@ Domain allowed access.
20328 </param>
20329 <infoflow type="both" weight="10"/>
20330 </interface>
20331 -<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="39291">
20332 +<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="39414">
20333 <summary>
20334 Do not audit attempts to send and receive isns_server packets.
20335 </summary>
20336 @@ -34644,7 +34461,7 @@ Domain to not audit.
20337 </param>
20338 <infoflow type="none"/>
20339 </interface>
20340 -<interface name="corenet_relabelto_isns_server_packets" lineno="39306">
20341 +<interface name="corenet_relabelto_isns_server_packets" lineno="39429">
20342 <summary>
20343 Relabel packets to isns_server the packet type.
20344 </summary>
20345 @@ -34654,7 +34471,7 @@ Domain allowed access.
20346 </summary>
20347 </param>
20348 </interface>
20349 -<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="39328">
20350 +<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="39451">
20351 <summary>
20352 Send and receive TCP traffic on the jabber_client port.
20353 </summary>
20354 @@ -34665,7 +34482,7 @@ Domain allowed access.
20355 </param>
20356 <infoflow type="both" weight="10"/>
20357 </interface>
20358 -<interface name="corenet_udp_send_jabber_client_port" lineno="39343">
20359 +<interface name="corenet_udp_send_jabber_client_port" lineno="39466">
20360 <summary>
20361 Send UDP traffic on the jabber_client port.
20362 </summary>
20363 @@ -34676,7 +34493,7 @@ Domain allowed access.
20364 </param>
20365 <infoflow type="write" weight="10"/>
20366 </interface>
20367 -<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="39358">
20368 +<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="39481">
20369 <summary>
20370 Do not audit attempts to send UDP traffic on the jabber_client port.
20371 </summary>
20372 @@ -34687,7 +34504,7 @@ Domain to not audit.
20373 </param>
20374 <infoflow type="none"/>
20375 </interface>
20376 -<interface name="corenet_udp_receive_jabber_client_port" lineno="39373">
20377 +<interface name="corenet_udp_receive_jabber_client_port" lineno="39496">
20378 <summary>
20379 Receive UDP traffic on the jabber_client port.
20380 </summary>
20381 @@ -34698,7 +34515,7 @@ Domain allowed access.
20382 </param>
20383 <infoflow type="read" weight="10"/>
20384 </interface>
20385 -<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="39388">
20386 +<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="39511">
20387 <summary>
20388 Do not audit attempts to receive UDP traffic on the jabber_client port.
20389 </summary>
20390 @@ -34709,7 +34526,7 @@ Domain to not audit.
20391 </param>
20392 <infoflow type="none"/>
20393 </interface>
20394 -<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="39403">
20395 +<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="39526">
20396 <summary>
20397 Send and receive UDP traffic on the jabber_client port.
20398 </summary>
20399 @@ -34720,7 +34537,7 @@ Domain allowed access.
20400 </param>
20401 <infoflow type="both" weight="10"/>
20402 </interface>
20403 -<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="39419">
20404 +<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="39542">
20405 <summary>
20406 Do not audit attempts to send and receive
20407 UDP traffic on the jabber_client port.
20408 @@ -34732,7 +34549,7 @@ Domain to not audit.
20409 </param>
20410 <infoflow type="none"/>
20411 </interface>
20412 -<interface name="corenet_tcp_bind_jabber_client_port" lineno="39434">
20413 +<interface name="corenet_tcp_bind_jabber_client_port" lineno="39557">
20414 <summary>
20415 Bind TCP sockets to the jabber_client port.
20416 </summary>
20417 @@ -34743,7 +34560,7 @@ Domain allowed access.
20418 </param>
20419 <infoflow type="none"/>
20420 </interface>
20421 -<interface name="corenet_udp_bind_jabber_client_port" lineno="39454">
20422 +<interface name="corenet_udp_bind_jabber_client_port" lineno="39577">
20423 <summary>
20424 Bind UDP sockets to the jabber_client port.
20425 </summary>
20426 @@ -34754,7 +34571,7 @@ Domain allowed access.
20427 </param>
20428 <infoflow type="none"/>
20429 </interface>
20430 -<interface name="corenet_tcp_connect_jabber_client_port" lineno="39473">
20431 +<interface name="corenet_tcp_connect_jabber_client_port" lineno="39596">
20432 <summary>
20433 Make a TCP connection to the jabber_client port.
20434 </summary>
20435 @@ -34764,7 +34581,7 @@ Domain allowed access.
20436 </summary>
20437 </param>
20438 </interface>
20439 -<interface name="corenet_send_jabber_client_client_packets" lineno="39493">
20440 +<interface name="corenet_send_jabber_client_client_packets" lineno="39616">
20441 <summary>
20442 Send jabber_client_client packets.
20443 </summary>
20444 @@ -34775,7 +34592,7 @@ Domain allowed access.
20445 </param>
20446 <infoflow type="write" weight="10"/>
20447 </interface>
20448 -<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="39512">
20449 +<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="39635">
20450 <summary>
20451 Do not audit attempts to send jabber_client_client packets.
20452 </summary>
20453 @@ -34786,7 +34603,7 @@ Domain to not audit.
20454 </param>
20455 <infoflow type="none"/>
20456 </interface>
20457 -<interface name="corenet_receive_jabber_client_client_packets" lineno="39531">
20458 +<interface name="corenet_receive_jabber_client_client_packets" lineno="39654">
20459 <summary>
20460 Receive jabber_client_client packets.
20461 </summary>
20462 @@ -34797,7 +34614,7 @@ Domain allowed access.
20463 </param>
20464 <infoflow type="read" weight="10"/>
20465 </interface>
20466 -<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="39550">
20467 +<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="39673">
20468 <summary>
20469 Do not audit attempts to receive jabber_client_client packets.
20470 </summary>
20471 @@ -34808,7 +34625,7 @@ Domain allowed access.
20472 </param>
20473 <infoflow type="none"/>
20474 </interface>
20475 -<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="39569">
20476 +<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="39692">
20477 <summary>
20478 Send and receive jabber_client_client packets.
20479 </summary>
20480 @@ -34819,7 +34636,7 @@ Domain allowed access.
20481 </param>
20482 <infoflow type="both" weight="10"/>
20483 </interface>
20484 -<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="39585">
20485 +<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="39708">
20486 <summary>
20487 Do not audit attempts to send and receive jabber_client_client packets.
20488 </summary>
20489 @@ -34830,7 +34647,7 @@ Domain to not audit.
20490 </param>
20491 <infoflow type="none"/>
20492 </interface>
20493 -<interface name="corenet_relabelto_jabber_client_client_packets" lineno="39600">
20494 +<interface name="corenet_relabelto_jabber_client_client_packets" lineno="39723">
20495 <summary>
20496 Relabel packets to jabber_client_client the packet type.
20497 </summary>
20498 @@ -34840,7 +34657,7 @@ Domain allowed access.
20499 </summary>
20500 </param>
20501 </interface>
20502 -<interface name="corenet_send_jabber_client_server_packets" lineno="39620">
20503 +<interface name="corenet_send_jabber_client_server_packets" lineno="39743">
20504 <summary>
20505 Send jabber_client_server packets.
20506 </summary>
20507 @@ -34851,7 +34668,7 @@ Domain allowed access.
20508 </param>
20509 <infoflow type="write" weight="10"/>
20510 </interface>
20511 -<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="39639">
20512 +<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="39762">
20513 <summary>
20514 Do not audit attempts to send jabber_client_server packets.
20515 </summary>
20516 @@ -34862,7 +34679,7 @@ Domain to not audit.
20517 </param>
20518 <infoflow type="none"/>
20519 </interface>
20520 -<interface name="corenet_receive_jabber_client_server_packets" lineno="39658">
20521 +<interface name="corenet_receive_jabber_client_server_packets" lineno="39781">
20522 <summary>
20523 Receive jabber_client_server packets.
20524 </summary>
20525 @@ -34873,7 +34690,7 @@ Domain allowed access.
20526 </param>
20527 <infoflow type="read" weight="10"/>
20528 </interface>
20529 -<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="39677">
20530 +<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="39800">
20531 <summary>
20532 Do not audit attempts to receive jabber_client_server packets.
20533 </summary>
20534 @@ -34884,7 +34701,7 @@ Domain allowed access.
20535 </param>
20536 <infoflow type="none"/>
20537 </interface>
20538 -<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="39696">
20539 +<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="39819">
20540 <summary>
20541 Send and receive jabber_client_server packets.
20542 </summary>
20543 @@ -34895,7 +34712,7 @@ Domain allowed access.
20544 </param>
20545 <infoflow type="both" weight="10"/>
20546 </interface>
20547 -<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="39712">
20548 +<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="39835">
20549 <summary>
20550 Do not audit attempts to send and receive jabber_client_server packets.
20551 </summary>
20552 @@ -34906,7 +34723,7 @@ Domain to not audit.
20553 </param>
20554 <infoflow type="none"/>
20555 </interface>
20556 -<interface name="corenet_relabelto_jabber_client_server_packets" lineno="39727">
20557 +<interface name="corenet_relabelto_jabber_client_server_packets" lineno="39850">
20558 <summary>
20559 Relabel packets to jabber_client_server the packet type.
20560 </summary>
20561 @@ -34916,7 +34733,7 @@ Domain allowed access.
20562 </summary>
20563 </param>
20564 </interface>
20565 -<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="39749">
20566 +<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="39872">
20567 <summary>
20568 Send and receive TCP traffic on the jabber_interserver port.
20569 </summary>
20570 @@ -34927,7 +34744,7 @@ Domain allowed access.
20571 </param>
20572 <infoflow type="both" weight="10"/>
20573 </interface>
20574 -<interface name="corenet_udp_send_jabber_interserver_port" lineno="39764">
20575 +<interface name="corenet_udp_send_jabber_interserver_port" lineno="39887">
20576 <summary>
20577 Send UDP traffic on the jabber_interserver port.
20578 </summary>
20579 @@ -34938,7 +34755,7 @@ Domain allowed access.
20580 </param>
20581 <infoflow type="write" weight="10"/>
20582 </interface>
20583 -<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="39779">
20584 +<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="39902">
20585 <summary>
20586 Do not audit attempts to send UDP traffic on the jabber_interserver port.
20587 </summary>
20588 @@ -34949,7 +34766,7 @@ Domain to not audit.
20589 </param>
20590 <infoflow type="none"/>
20591 </interface>
20592 -<interface name="corenet_udp_receive_jabber_interserver_port" lineno="39794">
20593 +<interface name="corenet_udp_receive_jabber_interserver_port" lineno="39917">
20594 <summary>
20595 Receive UDP traffic on the jabber_interserver port.
20596 </summary>
20597 @@ -34960,7 +34777,7 @@ Domain allowed access.
20598 </param>
20599 <infoflow type="read" weight="10"/>
20600 </interface>
20601 -<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="39809">
20602 +<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="39932">
20603 <summary>
20604 Do not audit attempts to receive UDP traffic on the jabber_interserver port.
20605 </summary>
20606 @@ -34971,7 +34788,7 @@ Domain to not audit.
20607 </param>
20608 <infoflow type="none"/>
20609 </interface>
20610 -<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="39824">
20611 +<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="39947">
20612 <summary>
20613 Send and receive UDP traffic on the jabber_interserver port.
20614 </summary>
20615 @@ -34982,7 +34799,7 @@ Domain allowed access.
20616 </param>
20617 <infoflow type="both" weight="10"/>
20618 </interface>
20619 -<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="39840">
20620 +<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="39963">
20621 <summary>
20622 Do not audit attempts to send and receive
20623 UDP traffic on the jabber_interserver port.
20624 @@ -34994,7 +34811,7 @@ Domain to not audit.
20625 </param>
20626 <infoflow type="none"/>
20627 </interface>
20628 -<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="39855">
20629 +<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="39978">
20630 <summary>
20631 Bind TCP sockets to the jabber_interserver port.
20632 </summary>
20633 @@ -35005,7 +34822,7 @@ Domain allowed access.
20634 </param>
20635 <infoflow type="none"/>
20636 </interface>
20637 -<interface name="corenet_udp_bind_jabber_interserver_port" lineno="39875">
20638 +<interface name="corenet_udp_bind_jabber_interserver_port" lineno="39998">
20639 <summary>
20640 Bind UDP sockets to the jabber_interserver port.
20641 </summary>
20642 @@ -35016,7 +34833,7 @@ Domain allowed access.
20643 </param>
20644 <infoflow type="none"/>
20645 </interface>
20646 -<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="39894">
20647 +<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="40017">
20648 <summary>
20649 Make a TCP connection to the jabber_interserver port.
20650 </summary>
20651 @@ -35026,7 +34843,7 @@ Domain allowed access.
20652 </summary>
20653 </param>
20654 </interface>
20655 -<interface name="corenet_send_jabber_interserver_client_packets" lineno="39914">
20656 +<interface name="corenet_send_jabber_interserver_client_packets" lineno="40037">
20657 <summary>
20658 Send jabber_interserver_client packets.
20659 </summary>
20660 @@ -35037,7 +34854,7 @@ Domain allowed access.
20661 </param>
20662 <infoflow type="write" weight="10"/>
20663 </interface>
20664 -<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="39933">
20665 +<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="40056">
20666 <summary>
20667 Do not audit attempts to send jabber_interserver_client packets.
20668 </summary>
20669 @@ -35048,7 +34865,7 @@ Domain to not audit.
20670 </param>
20671 <infoflow type="none"/>
20672 </interface>
20673 -<interface name="corenet_receive_jabber_interserver_client_packets" lineno="39952">
20674 +<interface name="corenet_receive_jabber_interserver_client_packets" lineno="40075">
20675 <summary>
20676 Receive jabber_interserver_client packets.
20677 </summary>
20678 @@ -35059,7 +34876,7 @@ Domain allowed access.
20679 </param>
20680 <infoflow type="read" weight="10"/>
20681 </interface>
20682 -<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="39971">
20683 +<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="40094">
20684 <summary>
20685 Do not audit attempts to receive jabber_interserver_client packets.
20686 </summary>
20687 @@ -35070,7 +34887,7 @@ Domain allowed access.
20688 </param>
20689 <infoflow type="none"/>
20690 </interface>
20691 -<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="39990">
20692 +<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="40113">
20693 <summary>
20694 Send and receive jabber_interserver_client packets.
20695 </summary>
20696 @@ -35081,7 +34898,7 @@ Domain allowed access.
20697 </param>
20698 <infoflow type="both" weight="10"/>
20699 </interface>
20700 -<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="40006">
20701 +<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="40129">
20702 <summary>
20703 Do not audit attempts to send and receive jabber_interserver_client packets.
20704 </summary>
20705 @@ -35092,7 +34909,7 @@ Domain to not audit.
20706 </param>
20707 <infoflow type="none"/>
20708 </interface>
20709 -<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="40021">
20710 +<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="40144">
20711 <summary>
20712 Relabel packets to jabber_interserver_client the packet type.
20713 </summary>
20714 @@ -35102,7 +34919,7 @@ Domain allowed access.
20715 </summary>
20716 </param>
20717 </interface>
20718 -<interface name="corenet_send_jabber_interserver_server_packets" lineno="40041">
20719 +<interface name="corenet_send_jabber_interserver_server_packets" lineno="40164">
20720 <summary>
20721 Send jabber_interserver_server packets.
20722 </summary>
20723 @@ -35113,7 +34930,7 @@ Domain allowed access.
20724 </param>
20725 <infoflow type="write" weight="10"/>
20726 </interface>
20727 -<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="40060">
20728 +<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="40183">
20729 <summary>
20730 Do not audit attempts to send jabber_interserver_server packets.
20731 </summary>
20732 @@ -35124,7 +34941,7 @@ Domain to not audit.
20733 </param>
20734 <infoflow type="none"/>
20735 </interface>
20736 -<interface name="corenet_receive_jabber_interserver_server_packets" lineno="40079">
20737 +<interface name="corenet_receive_jabber_interserver_server_packets" lineno="40202">
20738 <summary>
20739 Receive jabber_interserver_server packets.
20740 </summary>
20741 @@ -35135,7 +34952,7 @@ Domain allowed access.
20742 </param>
20743 <infoflow type="read" weight="10"/>
20744 </interface>
20745 -<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="40098">
20746 +<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="40221">
20747 <summary>
20748 Do not audit attempts to receive jabber_interserver_server packets.
20749 </summary>
20750 @@ -35146,7 +34963,7 @@ Domain allowed access.
20751 </param>
20752 <infoflow type="none"/>
20753 </interface>
20754 -<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="40117">
20755 +<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="40240">
20756 <summary>
20757 Send and receive jabber_interserver_server packets.
20758 </summary>
20759 @@ -35157,7 +34974,7 @@ Domain allowed access.
20760 </param>
20761 <infoflow type="both" weight="10"/>
20762 </interface>
20763 -<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="40133">
20764 +<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="40256">
20765 <summary>
20766 Do not audit attempts to send and receive jabber_interserver_server packets.
20767 </summary>
20768 @@ -35168,7 +34985,7 @@ Domain to not audit.
20769 </param>
20770 <infoflow type="none"/>
20771 </interface>
20772 -<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="40148">
20773 +<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="40271">
20774 <summary>
20775 Relabel packets to jabber_interserver_server the packet type.
20776 </summary>
20777 @@ -35178,7 +34995,7 @@ Domain allowed access.
20778 </summary>
20779 </param>
20780 </interface>
20781 -<interface name="corenet_tcp_sendrecv_jboss_iiop_port" lineno="40170">
20782 +<interface name="corenet_tcp_sendrecv_jboss_iiop_port" lineno="40293">
20783 <summary>
20784 Send and receive TCP traffic on the jboss_iiop port.
20785 </summary>
20786 @@ -35189,7 +35006,7 @@ Domain allowed access.
20787 </param>
20788 <infoflow type="both" weight="10"/>
20789 </interface>
20790 -<interface name="corenet_udp_send_jboss_iiop_port" lineno="40185">
20791 +<interface name="corenet_udp_send_jboss_iiop_port" lineno="40308">
20792 <summary>
20793 Send UDP traffic on the jboss_iiop port.
20794 </summary>
20795 @@ -35200,7 +35017,7 @@ Domain allowed access.
20796 </param>
20797 <infoflow type="write" weight="10"/>
20798 </interface>
20799 -<interface name="corenet_dontaudit_udp_send_jboss_iiop_port" lineno="40200">
20800 +<interface name="corenet_dontaudit_udp_send_jboss_iiop_port" lineno="40323">
20801 <summary>
20802 Do not audit attempts to send UDP traffic on the jboss_iiop port.
20803 </summary>
20804 @@ -35211,7 +35028,7 @@ Domain to not audit.
20805 </param>
20806 <infoflow type="none"/>
20807 </interface>
20808 -<interface name="corenet_udp_receive_jboss_iiop_port" lineno="40215">
20809 +<interface name="corenet_udp_receive_jboss_iiop_port" lineno="40338">
20810 <summary>
20811 Receive UDP traffic on the jboss_iiop port.
20812 </summary>
20813 @@ -35222,7 +35039,7 @@ Domain allowed access.
20814 </param>
20815 <infoflow type="read" weight="10"/>
20816 </interface>
20817 -<interface name="corenet_dontaudit_udp_receive_jboss_iiop_port" lineno="40230">
20818 +<interface name="corenet_dontaudit_udp_receive_jboss_iiop_port" lineno="40353">
20819 <summary>
20820 Do not audit attempts to receive UDP traffic on the jboss_iiop port.
20821 </summary>
20822 @@ -35233,7 +35050,7 @@ Domain to not audit.
20823 </param>
20824 <infoflow type="none"/>
20825 </interface>
20826 -<interface name="corenet_udp_sendrecv_jboss_iiop_port" lineno="40245">
20827 +<interface name="corenet_udp_sendrecv_jboss_iiop_port" lineno="40368">
20828 <summary>
20829 Send and receive UDP traffic on the jboss_iiop port.
20830 </summary>
20831 @@ -35244,7 +35061,7 @@ Domain allowed access.
20832 </param>
20833 <infoflow type="both" weight="10"/>
20834 </interface>
20835 -<interface name="corenet_dontaudit_udp_sendrecv_jboss_iiop_port" lineno="40261">
20836 +<interface name="corenet_dontaudit_udp_sendrecv_jboss_iiop_port" lineno="40384">
20837 <summary>
20838 Do not audit attempts to send and receive
20839 UDP traffic on the jboss_iiop port.
20840 @@ -35256,7 +35073,7 @@ Domain to not audit.
20841 </param>
20842 <infoflow type="none"/>
20843 </interface>
20844 -<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="40276">
20845 +<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="40399">
20846 <summary>
20847 Bind TCP sockets to the jboss_iiop port.
20848 </summary>
20849 @@ -35267,7 +35084,7 @@ Domain allowed access.
20850 </param>
20851 <infoflow type="none"/>
20852 </interface>
20853 -<interface name="corenet_udp_bind_jboss_iiop_port" lineno="40296">
20854 +<interface name="corenet_udp_bind_jboss_iiop_port" lineno="40419">
20855 <summary>
20856 Bind UDP sockets to the jboss_iiop port.
20857 </summary>
20858 @@ -35278,7 +35095,7 @@ Domain allowed access.
20859 </param>
20860 <infoflow type="none"/>
20861 </interface>
20862 -<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="40315">
20863 +<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="40438">
20864 <summary>
20865 Make a TCP connection to the jboss_iiop port.
20866 </summary>
20867 @@ -35288,7 +35105,7 @@ Domain allowed access.
20868 </summary>
20869 </param>
20870 </interface>
20871 -<interface name="corenet_send_jboss_iiop_client_packets" lineno="40335">
20872 +<interface name="corenet_send_jboss_iiop_client_packets" lineno="40458">
20873 <summary>
20874 Send jboss_iiop_client packets.
20875 </summary>
20876 @@ -35299,7 +35116,7 @@ Domain allowed access.
20877 </param>
20878 <infoflow type="write" weight="10"/>
20879 </interface>
20880 -<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="40354">
20881 +<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="40477">
20882 <summary>
20883 Do not audit attempts to send jboss_iiop_client packets.
20884 </summary>
20885 @@ -35310,7 +35127,7 @@ Domain to not audit.
20886 </param>
20887 <infoflow type="none"/>
20888 </interface>
20889 -<interface name="corenet_receive_jboss_iiop_client_packets" lineno="40373">
20890 +<interface name="corenet_receive_jboss_iiop_client_packets" lineno="40496">
20891 <summary>
20892 Receive jboss_iiop_client packets.
20893 </summary>
20894 @@ -35321,7 +35138,7 @@ Domain allowed access.
20895 </param>
20896 <infoflow type="read" weight="10"/>
20897 </interface>
20898 -<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="40392">
20899 +<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="40515">
20900 <summary>
20901 Do not audit attempts to receive jboss_iiop_client packets.
20902 </summary>
20903 @@ -35332,7 +35149,7 @@ Domain allowed access.
20904 </param>
20905 <infoflow type="none"/>
20906 </interface>
20907 -<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="40411">
20908 +<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="40534">
20909 <summary>
20910 Send and receive jboss_iiop_client packets.
20911 </summary>
20912 @@ -35343,7 +35160,7 @@ Domain allowed access.
20913 </param>
20914 <infoflow type="both" weight="10"/>
20915 </interface>
20916 -<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="40427">
20917 +<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="40550">
20918 <summary>
20919 Do not audit attempts to send and receive jboss_iiop_client packets.
20920 </summary>
20921 @@ -35354,7 +35171,7 @@ Domain to not audit.
20922 </param>
20923 <infoflow type="none"/>
20924 </interface>
20925 -<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="40442">
20926 +<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="40565">
20927 <summary>
20928 Relabel packets to jboss_iiop_client the packet type.
20929 </summary>
20930 @@ -35364,7 +35181,7 @@ Domain allowed access.
20931 </summary>
20932 </param>
20933 </interface>
20934 -<interface name="corenet_send_jboss_iiop_server_packets" lineno="40462">
20935 +<interface name="corenet_send_jboss_iiop_server_packets" lineno="40585">
20936 <summary>
20937 Send jboss_iiop_server packets.
20938 </summary>
20939 @@ -35375,7 +35192,7 @@ Domain allowed access.
20940 </param>
20941 <infoflow type="write" weight="10"/>
20942 </interface>
20943 -<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="40481">
20944 +<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="40604">
20945 <summary>
20946 Do not audit attempts to send jboss_iiop_server packets.
20947 </summary>
20948 @@ -35386,7 +35203,7 @@ Domain to not audit.
20949 </param>
20950 <infoflow type="none"/>
20951 </interface>
20952 -<interface name="corenet_receive_jboss_iiop_server_packets" lineno="40500">
20953 +<interface name="corenet_receive_jboss_iiop_server_packets" lineno="40623">
20954 <summary>
20955 Receive jboss_iiop_server packets.
20956 </summary>
20957 @@ -35397,7 +35214,7 @@ Domain allowed access.
20958 </param>
20959 <infoflow type="read" weight="10"/>
20960 </interface>
20961 -<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="40519">
20962 +<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="40642">
20963 <summary>
20964 Do not audit attempts to receive jboss_iiop_server packets.
20965 </summary>
20966 @@ -35408,7 +35225,7 @@ Domain allowed access.
20967 </param>
20968 <infoflow type="none"/>
20969 </interface>
20970 -<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="40538">
20971 +<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="40661">
20972 <summary>
20973 Send and receive jboss_iiop_server packets.
20974 </summary>
20975 @@ -35419,7 +35236,7 @@ Domain allowed access.
20976 </param>
20977 <infoflow type="both" weight="10"/>
20978 </interface>
20979 -<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="40554">
20980 +<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="40677">
20981 <summary>
20982 Do not audit attempts to send and receive jboss_iiop_server packets.
20983 </summary>
20984 @@ -35430,7 +35247,7 @@ Domain to not audit.
20985 </param>
20986 <infoflow type="none"/>
20987 </interface>
20988 -<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="40569">
20989 +<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="40692">
20990 <summary>
20991 Relabel packets to jboss_iiop_server the packet type.
20992 </summary>
20993 @@ -35440,7 +35257,7 @@ Domain allowed access.
20994 </summary>
20995 </param>
20996 </interface>
20997 -<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="40591">
20998 +<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="40714">
20999 <summary>
21000 Send and receive TCP traffic on the kerberos port.
21001 </summary>
21002 @@ -35451,7 +35268,7 @@ Domain allowed access.
21003 </param>
21004 <infoflow type="both" weight="10"/>
21005 </interface>
21006 -<interface name="corenet_udp_send_kerberos_port" lineno="40606">
21007 +<interface name="corenet_udp_send_kerberos_port" lineno="40729">
21008 <summary>
21009 Send UDP traffic on the kerberos port.
21010 </summary>
21011 @@ -35462,7 +35279,7 @@ Domain allowed access.
21012 </param>
21013 <infoflow type="write" weight="10"/>
21014 </interface>
21015 -<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="40621">
21016 +<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="40744">
21017 <summary>
21018 Do not audit attempts to send UDP traffic on the kerberos port.
21019 </summary>
21020 @@ -35473,7 +35290,7 @@ Domain to not audit.
21021 </param>
21022 <infoflow type="none"/>
21023 </interface>
21024 -<interface name="corenet_udp_receive_kerberos_port" lineno="40636">
21025 +<interface name="corenet_udp_receive_kerberos_port" lineno="40759">
21026 <summary>
21027 Receive UDP traffic on the kerberos port.
21028 </summary>
21029 @@ -35484,7 +35301,7 @@ Domain allowed access.
21030 </param>
21031 <infoflow type="read" weight="10"/>
21032 </interface>
21033 -<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="40651">
21034 +<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="40774">
21035 <summary>
21036 Do not audit attempts to receive UDP traffic on the kerberos port.
21037 </summary>
21038 @@ -35495,7 +35312,7 @@ Domain to not audit.
21039 </param>
21040 <infoflow type="none"/>
21041 </interface>
21042 -<interface name="corenet_udp_sendrecv_kerberos_port" lineno="40666">
21043 +<interface name="corenet_udp_sendrecv_kerberos_port" lineno="40789">
21044 <summary>
21045 Send and receive UDP traffic on the kerberos port.
21046 </summary>
21047 @@ -35506,7 +35323,7 @@ Domain allowed access.
21048 </param>
21049 <infoflow type="both" weight="10"/>
21050 </interface>
21051 -<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="40682">
21052 +<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="40805">
21053 <summary>
21054 Do not audit attempts to send and receive
21055 UDP traffic on the kerberos port.
21056 @@ -35518,7 +35335,7 @@ Domain to not audit.
21057 </param>
21058 <infoflow type="none"/>
21059 </interface>
21060 -<interface name="corenet_tcp_bind_kerberos_port" lineno="40697">
21061 +<interface name="corenet_tcp_bind_kerberos_port" lineno="40820">
21062 <summary>
21063 Bind TCP sockets to the kerberos port.
21064 </summary>
21065 @@ -35529,7 +35346,7 @@ Domain allowed access.
21066 </param>
21067 <infoflow type="none"/>
21068 </interface>
21069 -<interface name="corenet_udp_bind_kerberos_port" lineno="40717">
21070 +<interface name="corenet_udp_bind_kerberos_port" lineno="40840">
21071 <summary>
21072 Bind UDP sockets to the kerberos port.
21073 </summary>
21074 @@ -35540,7 +35357,7 @@ Domain allowed access.
21075 </param>
21076 <infoflow type="none"/>
21077 </interface>
21078 -<interface name="corenet_tcp_connect_kerberos_port" lineno="40736">
21079 +<interface name="corenet_tcp_connect_kerberos_port" lineno="40859">
21080 <summary>
21081 Make a TCP connection to the kerberos port.
21082 </summary>
21083 @@ -35550,7 +35367,7 @@ Domain allowed access.
21084 </summary>
21085 </param>
21086 </interface>
21087 -<interface name="corenet_send_kerberos_client_packets" lineno="40756">
21088 +<interface name="corenet_send_kerberos_client_packets" lineno="40879">
21089 <summary>
21090 Send kerberos_client packets.
21091 </summary>
21092 @@ -35561,7 +35378,7 @@ Domain allowed access.
21093 </param>
21094 <infoflow type="write" weight="10"/>
21095 </interface>
21096 -<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="40775">
21097 +<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="40898">
21098 <summary>
21099 Do not audit attempts to send kerberos_client packets.
21100 </summary>
21101 @@ -35572,7 +35389,7 @@ Domain to not audit.
21102 </param>
21103 <infoflow type="none"/>
21104 </interface>
21105 -<interface name="corenet_receive_kerberos_client_packets" lineno="40794">
21106 +<interface name="corenet_receive_kerberos_client_packets" lineno="40917">
21107 <summary>
21108 Receive kerberos_client packets.
21109 </summary>
21110 @@ -35583,7 +35400,7 @@ Domain allowed access.
21111 </param>
21112 <infoflow type="read" weight="10"/>
21113 </interface>
21114 -<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="40813">
21115 +<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="40936">
21116 <summary>
21117 Do not audit attempts to receive kerberos_client packets.
21118 </summary>
21119 @@ -35594,7 +35411,7 @@ Domain allowed access.
21120 </param>
21121 <infoflow type="none"/>
21122 </interface>
21123 -<interface name="corenet_sendrecv_kerberos_client_packets" lineno="40832">
21124 +<interface name="corenet_sendrecv_kerberos_client_packets" lineno="40955">
21125 <summary>
21126 Send and receive kerberos_client packets.
21127 </summary>
21128 @@ -35605,7 +35422,7 @@ Domain allowed access.
21129 </param>
21130 <infoflow type="both" weight="10"/>
21131 </interface>
21132 -<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="40848">
21133 +<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="40971">
21134 <summary>
21135 Do not audit attempts to send and receive kerberos_client packets.
21136 </summary>
21137 @@ -35616,7 +35433,7 @@ Domain to not audit.
21138 </param>
21139 <infoflow type="none"/>
21140 </interface>
21141 -<interface name="corenet_relabelto_kerberos_client_packets" lineno="40863">
21142 +<interface name="corenet_relabelto_kerberos_client_packets" lineno="40986">
21143 <summary>
21144 Relabel packets to kerberos_client the packet type.
21145 </summary>
21146 @@ -35626,7 +35443,7 @@ Domain allowed access.
21147 </summary>
21148 </param>
21149 </interface>
21150 -<interface name="corenet_send_kerberos_server_packets" lineno="40883">
21151 +<interface name="corenet_send_kerberos_server_packets" lineno="41006">
21152 <summary>
21153 Send kerberos_server packets.
21154 </summary>
21155 @@ -35637,7 +35454,7 @@ Domain allowed access.
21156 </param>
21157 <infoflow type="write" weight="10"/>
21158 </interface>
21159 -<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="40902">
21160 +<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="41025">
21161 <summary>
21162 Do not audit attempts to send kerberos_server packets.
21163 </summary>
21164 @@ -35648,7 +35465,7 @@ Domain to not audit.
21165 </param>
21166 <infoflow type="none"/>
21167 </interface>
21168 -<interface name="corenet_receive_kerberos_server_packets" lineno="40921">
21169 +<interface name="corenet_receive_kerberos_server_packets" lineno="41044">
21170 <summary>
21171 Receive kerberos_server packets.
21172 </summary>
21173 @@ -35659,7 +35476,7 @@ Domain allowed access.
21174 </param>
21175 <infoflow type="read" weight="10"/>
21176 </interface>
21177 -<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="40940">
21178 +<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="41063">
21179 <summary>
21180 Do not audit attempts to receive kerberos_server packets.
21181 </summary>
21182 @@ -35670,7 +35487,7 @@ Domain allowed access.
21183 </param>
21184 <infoflow type="none"/>
21185 </interface>
21186 -<interface name="corenet_sendrecv_kerberos_server_packets" lineno="40959">
21187 +<interface name="corenet_sendrecv_kerberos_server_packets" lineno="41082">
21188 <summary>
21189 Send and receive kerberos_server packets.
21190 </summary>
21191 @@ -35681,7 +35498,7 @@ Domain allowed access.
21192 </param>
21193 <infoflow type="both" weight="10"/>
21194 </interface>
21195 -<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="40975">
21196 +<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="41098">
21197 <summary>
21198 Do not audit attempts to send and receive kerberos_server packets.
21199 </summary>
21200 @@ -35692,7 +35509,7 @@ Domain to not audit.
21201 </param>
21202 <infoflow type="none"/>
21203 </interface>
21204 -<interface name="corenet_relabelto_kerberos_server_packets" lineno="40990">
21205 +<interface name="corenet_relabelto_kerberos_server_packets" lineno="41113">
21206 <summary>
21207 Relabel packets to kerberos_server the packet type.
21208 </summary>
21209 @@ -35702,7 +35519,7 @@ Domain allowed access.
21210 </summary>
21211 </param>
21212 </interface>
21213 -<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="41012">
21214 +<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="41135">
21215 <summary>
21216 Send and receive TCP traffic on the kerberos_admin port.
21217 </summary>
21218 @@ -35713,7 +35530,7 @@ Domain allowed access.
21219 </param>
21220 <infoflow type="both" weight="10"/>
21221 </interface>
21222 -<interface name="corenet_udp_send_kerberos_admin_port" lineno="41027">
21223 +<interface name="corenet_udp_send_kerberos_admin_port" lineno="41150">
21224 <summary>
21225 Send UDP traffic on the kerberos_admin port.
21226 </summary>
21227 @@ -35724,7 +35541,7 @@ Domain allowed access.
21228 </param>
21229 <infoflow type="write" weight="10"/>
21230 </interface>
21231 -<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="41042">
21232 +<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="41165">
21233 <summary>
21234 Do not audit attempts to send UDP traffic on the kerberos_admin port.
21235 </summary>
21236 @@ -35735,7 +35552,7 @@ Domain to not audit.
21237 </param>
21238 <infoflow type="none"/>
21239 </interface>
21240 -<interface name="corenet_udp_receive_kerberos_admin_port" lineno="41057">
21241 +<interface name="corenet_udp_receive_kerberos_admin_port" lineno="41180">
21242 <summary>
21243 Receive UDP traffic on the kerberos_admin port.
21244 </summary>
21245 @@ -35746,7 +35563,7 @@ Domain allowed access.
21246 </param>
21247 <infoflow type="read" weight="10"/>
21248 </interface>
21249 -<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="41072">
21250 +<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="41195">
21251 <summary>
21252 Do not audit attempts to receive UDP traffic on the kerberos_admin port.
21253 </summary>
21254 @@ -35757,7 +35574,7 @@ Domain to not audit.
21255 </param>
21256 <infoflow type="none"/>
21257 </interface>
21258 -<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="41087">
21259 +<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="41210">
21260 <summary>
21261 Send and receive UDP traffic on the kerberos_admin port.
21262 </summary>
21263 @@ -35768,7 +35585,7 @@ Domain allowed access.
21264 </param>
21265 <infoflow type="both" weight="10"/>
21266 </interface>
21267 -<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="41103">
21268 +<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="41226">
21269 <summary>
21270 Do not audit attempts to send and receive
21271 UDP traffic on the kerberos_admin port.
21272 @@ -35780,7 +35597,7 @@ Domain to not audit.
21273 </param>
21274 <infoflow type="none"/>
21275 </interface>
21276 -<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="41118">
21277 +<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="41241">
21278 <summary>
21279 Bind TCP sockets to the kerberos_admin port.
21280 </summary>
21281 @@ -35791,7 +35608,7 @@ Domain allowed access.
21282 </param>
21283 <infoflow type="none"/>
21284 </interface>
21285 -<interface name="corenet_udp_bind_kerberos_admin_port" lineno="41138">
21286 +<interface name="corenet_udp_bind_kerberos_admin_port" lineno="41261">
21287 <summary>
21288 Bind UDP sockets to the kerberos_admin port.
21289 </summary>
21290 @@ -35802,7 +35619,7 @@ Domain allowed access.
21291 </param>
21292 <infoflow type="none"/>
21293 </interface>
21294 -<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="41157">
21295 +<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="41280">
21296 <summary>
21297 Make a TCP connection to the kerberos_admin port.
21298 </summary>
21299 @@ -35812,7 +35629,7 @@ Domain allowed access.
21300 </summary>
21301 </param>
21302 </interface>
21303 -<interface name="corenet_send_kerberos_admin_client_packets" lineno="41177">
21304 +<interface name="corenet_send_kerberos_admin_client_packets" lineno="41300">
21305 <summary>
21306 Send kerberos_admin_client packets.
21307 </summary>
21308 @@ -35823,7 +35640,7 @@ Domain allowed access.
21309 </param>
21310 <infoflow type="write" weight="10"/>
21311 </interface>
21312 -<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="41196">
21313 +<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="41319">
21314 <summary>
21315 Do not audit attempts to send kerberos_admin_client packets.
21316 </summary>
21317 @@ -35834,7 +35651,7 @@ Domain to not audit.
21318 </param>
21319 <infoflow type="none"/>
21320 </interface>
21321 -<interface name="corenet_receive_kerberos_admin_client_packets" lineno="41215">
21322 +<interface name="corenet_receive_kerberos_admin_client_packets" lineno="41338">
21323 <summary>
21324 Receive kerberos_admin_client packets.
21325 </summary>
21326 @@ -35845,7 +35662,7 @@ Domain allowed access.
21327 </param>
21328 <infoflow type="read" weight="10"/>
21329 </interface>
21330 -<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="41234">
21331 +<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="41357">
21332 <summary>
21333 Do not audit attempts to receive kerberos_admin_client packets.
21334 </summary>
21335 @@ -35856,7 +35673,7 @@ Domain allowed access.
21336 </param>
21337 <infoflow type="none"/>
21338 </interface>
21339 -<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="41253">
21340 +<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="41376">
21341 <summary>
21342 Send and receive kerberos_admin_client packets.
21343 </summary>
21344 @@ -35867,7 +35684,7 @@ Domain allowed access.
21345 </param>
21346 <infoflow type="both" weight="10"/>
21347 </interface>
21348 -<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="41269">
21349 +<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="41392">
21350 <summary>
21351 Do not audit attempts to send and receive kerberos_admin_client packets.
21352 </summary>
21353 @@ -35878,7 +35695,7 @@ Domain to not audit.
21354 </param>
21355 <infoflow type="none"/>
21356 </interface>
21357 -<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="41284">
21358 +<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="41407">
21359 <summary>
21360 Relabel packets to kerberos_admin_client the packet type.
21361 </summary>
21362 @@ -35888,7 +35705,7 @@ Domain allowed access.
21363 </summary>
21364 </param>
21365 </interface>
21366 -<interface name="corenet_send_kerberos_admin_server_packets" lineno="41304">
21367 +<interface name="corenet_send_kerberos_admin_server_packets" lineno="41427">
21368 <summary>
21369 Send kerberos_admin_server packets.
21370 </summary>
21371 @@ -35899,7 +35716,7 @@ Domain allowed access.
21372 </param>
21373 <infoflow type="write" weight="10"/>
21374 </interface>
21375 -<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="41323">
21376 +<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="41446">
21377 <summary>
21378 Do not audit attempts to send kerberos_admin_server packets.
21379 </summary>
21380 @@ -35910,7 +35727,7 @@ Domain to not audit.
21381 </param>
21382 <infoflow type="none"/>
21383 </interface>
21384 -<interface name="corenet_receive_kerberos_admin_server_packets" lineno="41342">
21385 +<interface name="corenet_receive_kerberos_admin_server_packets" lineno="41465">
21386 <summary>
21387 Receive kerberos_admin_server packets.
21388 </summary>
21389 @@ -35921,7 +35738,7 @@ Domain allowed access.
21390 </param>
21391 <infoflow type="read" weight="10"/>
21392 </interface>
21393 -<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="41361">
21394 +<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="41484">
21395 <summary>
21396 Do not audit attempts to receive kerberos_admin_server packets.
21397 </summary>
21398 @@ -35932,7 +35749,7 @@ Domain allowed access.
21399 </param>
21400 <infoflow type="none"/>
21401 </interface>
21402 -<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="41380">
21403 +<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="41503">
21404 <summary>
21405 Send and receive kerberos_admin_server packets.
21406 </summary>
21407 @@ -35943,7 +35760,7 @@ Domain allowed access.
21408 </param>
21409 <infoflow type="both" weight="10"/>
21410 </interface>
21411 -<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="41396">
21412 +<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="41519">
21413 <summary>
21414 Do not audit attempts to send and receive kerberos_admin_server packets.
21415 </summary>
21416 @@ -35954,7 +35771,7 @@ Domain to not audit.
21417 </param>
21418 <infoflow type="none"/>
21419 </interface>
21420 -<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="41411">
21421 +<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="41534">
21422 <summary>
21423 Relabel packets to kerberos_admin_server the packet type.
21424 </summary>
21425 @@ -35964,7 +35781,7 @@ Domain allowed access.
21426 </summary>
21427 </param>
21428 </interface>
21429 -<interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="41433">
21430 +<interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="41556">
21431 <summary>
21432 Send and receive TCP traffic on the kerberos_master port.
21433 </summary>
21434 @@ -35975,7 +35792,7 @@ Domain allowed access.
21435 </param>
21436 <infoflow type="both" weight="10"/>
21437 </interface>
21438 -<interface name="corenet_udp_send_kerberos_master_port" lineno="41448">
21439 +<interface name="corenet_udp_send_kerberos_master_port" lineno="41571">
21440 <summary>
21441 Send UDP traffic on the kerberos_master port.
21442 </summary>
21443 @@ -35986,7 +35803,7 @@ Domain allowed access.
21444 </param>
21445 <infoflow type="write" weight="10"/>
21446 </interface>
21447 -<interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="41463">
21448 +<interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="41586">
21449 <summary>
21450 Do not audit attempts to send UDP traffic on the kerberos_master port.
21451 </summary>
21452 @@ -35997,7 +35814,7 @@ Domain to not audit.
21453 </param>
21454 <infoflow type="none"/>
21455 </interface>
21456 -<interface name="corenet_udp_receive_kerberos_master_port" lineno="41478">
21457 +<interface name="corenet_udp_receive_kerberos_master_port" lineno="41601">
21458 <summary>
21459 Receive UDP traffic on the kerberos_master port.
21460 </summary>
21461 @@ -36008,7 +35825,7 @@ Domain allowed access.
21462 </param>
21463 <infoflow type="read" weight="10"/>
21464 </interface>
21465 -<interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="41493">
21466 +<interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="41616">
21467 <summary>
21468 Do not audit attempts to receive UDP traffic on the kerberos_master port.
21469 </summary>
21470 @@ -36019,7 +35836,7 @@ Domain to not audit.
21471 </param>
21472 <infoflow type="none"/>
21473 </interface>
21474 -<interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="41508">
21475 +<interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="41631">
21476 <summary>
21477 Send and receive UDP traffic on the kerberos_master port.
21478 </summary>
21479 @@ -36030,7 +35847,7 @@ Domain allowed access.
21480 </param>
21481 <infoflow type="both" weight="10"/>
21482 </interface>
21483 -<interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="41524">
21484 +<interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="41647">
21485 <summary>
21486 Do not audit attempts to send and receive
21487 UDP traffic on the kerberos_master port.
21488 @@ -36042,7 +35859,7 @@ Domain to not audit.
21489 </param>
21490 <infoflow type="none"/>
21491 </interface>
21492 -<interface name="corenet_tcp_bind_kerberos_master_port" lineno="41539">
21493 +<interface name="corenet_tcp_bind_kerberos_master_port" lineno="41662">
21494 <summary>
21495 Bind TCP sockets to the kerberos_master port.
21496 </summary>
21497 @@ -36053,7 +35870,7 @@ Domain allowed access.
21498 </param>
21499 <infoflow type="none"/>
21500 </interface>
21501 -<interface name="corenet_udp_bind_kerberos_master_port" lineno="41559">
21502 +<interface name="corenet_udp_bind_kerberos_master_port" lineno="41682">
21503 <summary>
21504 Bind UDP sockets to the kerberos_master port.
21505 </summary>
21506 @@ -36064,7 +35881,7 @@ Domain allowed access.
21507 </param>
21508 <infoflow type="none"/>
21509 </interface>
21510 -<interface name="corenet_tcp_connect_kerberos_master_port" lineno="41578">
21511 +<interface name="corenet_tcp_connect_kerberos_master_port" lineno="41701">
21512 <summary>
21513 Make a TCP connection to the kerberos_master port.
21514 </summary>
21515 @@ -36074,7 +35891,7 @@ Domain allowed access.
21516 </summary>
21517 </param>
21518 </interface>
21519 -<interface name="corenet_send_kerberos_master_client_packets" lineno="41598">
21520 +<interface name="corenet_send_kerberos_master_client_packets" lineno="41721">
21521 <summary>
21522 Send kerberos_master_client packets.
21523 </summary>
21524 @@ -36085,7 +35902,7 @@ Domain allowed access.
21525 </param>
21526 <infoflow type="write" weight="10"/>
21527 </interface>
21528 -<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="41617">
21529 +<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="41740">
21530 <summary>
21531 Do not audit attempts to send kerberos_master_client packets.
21532 </summary>
21533 @@ -36096,7 +35913,7 @@ Domain to not audit.
21534 </param>
21535 <infoflow type="none"/>
21536 </interface>
21537 -<interface name="corenet_receive_kerberos_master_client_packets" lineno="41636">
21538 +<interface name="corenet_receive_kerberos_master_client_packets" lineno="41759">
21539 <summary>
21540 Receive kerberos_master_client packets.
21541 </summary>
21542 @@ -36107,7 +35924,7 @@ Domain allowed access.
21543 </param>
21544 <infoflow type="read" weight="10"/>
21545 </interface>
21546 -<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="41655">
21547 +<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="41778">
21548 <summary>
21549 Do not audit attempts to receive kerberos_master_client packets.
21550 </summary>
21551 @@ -36118,7 +35935,7 @@ Domain allowed access.
21552 </param>
21553 <infoflow type="none"/>
21554 </interface>
21555 -<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="41674">
21556 +<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="41797">
21557 <summary>
21558 Send and receive kerberos_master_client packets.
21559 </summary>
21560 @@ -36129,7 +35946,7 @@ Domain allowed access.
21561 </param>
21562 <infoflow type="both" weight="10"/>
21563 </interface>
21564 -<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="41690">
21565 +<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="41813">
21566 <summary>
21567 Do not audit attempts to send and receive kerberos_master_client packets.
21568 </summary>
21569 @@ -36140,7 +35957,7 @@ Domain to not audit.
21570 </param>
21571 <infoflow type="none"/>
21572 </interface>
21573 -<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="41705">
21574 +<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="41828">
21575 <summary>
21576 Relabel packets to kerberos_master_client the packet type.
21577 </summary>
21578 @@ -36150,7 +35967,7 @@ Domain allowed access.
21579 </summary>
21580 </param>
21581 </interface>
21582 -<interface name="corenet_send_kerberos_master_server_packets" lineno="41725">
21583 +<interface name="corenet_send_kerberos_master_server_packets" lineno="41848">
21584 <summary>
21585 Send kerberos_master_server packets.
21586 </summary>
21587 @@ -36161,7 +35978,7 @@ Domain allowed access.
21588 </param>
21589 <infoflow type="write" weight="10"/>
21590 </interface>
21591 -<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="41744">
21592 +<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="41867">
21593 <summary>
21594 Do not audit attempts to send kerberos_master_server packets.
21595 </summary>
21596 @@ -36172,7 +35989,7 @@ Domain to not audit.
21597 </param>
21598 <infoflow type="none"/>
21599 </interface>
21600 -<interface name="corenet_receive_kerberos_master_server_packets" lineno="41763">
21601 +<interface name="corenet_receive_kerberos_master_server_packets" lineno="41886">
21602 <summary>
21603 Receive kerberos_master_server packets.
21604 </summary>
21605 @@ -36183,7 +36000,7 @@ Domain allowed access.
21606 </param>
21607 <infoflow type="read" weight="10"/>
21608 </interface>
21609 -<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="41782">
21610 +<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="41905">
21611 <summary>
21612 Do not audit attempts to receive kerberos_master_server packets.
21613 </summary>
21614 @@ -36194,7 +36011,7 @@ Domain allowed access.
21615 </param>
21616 <infoflow type="none"/>
21617 </interface>
21618 -<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="41801">
21619 +<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="41924">
21620 <summary>
21621 Send and receive kerberos_master_server packets.
21622 </summary>
21623 @@ -36205,7 +36022,7 @@ Domain allowed access.
21624 </param>
21625 <infoflow type="both" weight="10"/>
21626 </interface>
21627 -<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="41817">
21628 +<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="41940">
21629 <summary>
21630 Do not audit attempts to send and receive kerberos_master_server packets.
21631 </summary>
21632 @@ -36216,7 +36033,7 @@ Domain to not audit.
21633 </param>
21634 <infoflow type="none"/>
21635 </interface>
21636 -<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="41832">
21637 +<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="41955">
21638 <summary>
21639 Relabel packets to kerberos_master_server the packet type.
21640 </summary>
21641 @@ -36226,7 +36043,7 @@ Domain allowed access.
21642 </summary>
21643 </param>
21644 </interface>
21645 -<interface name="corenet_tcp_sendrecv_kismet_port" lineno="41854">
21646 +<interface name="corenet_tcp_sendrecv_kismet_port" lineno="41977">
21647 <summary>
21648 Send and receive TCP traffic on the kismet port.
21649 </summary>
21650 @@ -36237,7 +36054,7 @@ Domain allowed access.
21651 </param>
21652 <infoflow type="both" weight="10"/>
21653 </interface>
21654 -<interface name="corenet_udp_send_kismet_port" lineno="41869">
21655 +<interface name="corenet_udp_send_kismet_port" lineno="41992">
21656 <summary>
21657 Send UDP traffic on the kismet port.
21658 </summary>
21659 @@ -36248,7 +36065,7 @@ Domain allowed access.
21660 </param>
21661 <infoflow type="write" weight="10"/>
21662 </interface>
21663 -<interface name="corenet_dontaudit_udp_send_kismet_port" lineno="41884">
21664 +<interface name="corenet_dontaudit_udp_send_kismet_port" lineno="42007">
21665 <summary>
21666 Do not audit attempts to send UDP traffic on the kismet port.
21667 </summary>
21668 @@ -36259,7 +36076,7 @@ Domain to not audit.
21669 </param>
21670 <infoflow type="none"/>
21671 </interface>
21672 -<interface name="corenet_udp_receive_kismet_port" lineno="41899">
21673 +<interface name="corenet_udp_receive_kismet_port" lineno="42022">
21674 <summary>
21675 Receive UDP traffic on the kismet port.
21676 </summary>
21677 @@ -36270,7 +36087,7 @@ Domain allowed access.
21678 </param>
21679 <infoflow type="read" weight="10"/>
21680 </interface>
21681 -<interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="41914">
21682 +<interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="42037">
21683 <summary>
21684 Do not audit attempts to receive UDP traffic on the kismet port.
21685 </summary>
21686 @@ -36281,7 +36098,7 @@ Domain to not audit.
21687 </param>
21688 <infoflow type="none"/>
21689 </interface>
21690 -<interface name="corenet_udp_sendrecv_kismet_port" lineno="41929">
21691 +<interface name="corenet_udp_sendrecv_kismet_port" lineno="42052">
21692 <summary>
21693 Send and receive UDP traffic on the kismet port.
21694 </summary>
21695 @@ -36292,7 +36109,7 @@ Domain allowed access.
21696 </param>
21697 <infoflow type="both" weight="10"/>
21698 </interface>
21699 -<interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="41945">
21700 +<interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="42068">
21701 <summary>
21702 Do not audit attempts to send and receive
21703 UDP traffic on the kismet port.
21704 @@ -36304,7 +36121,7 @@ Domain to not audit.
21705 </param>
21706 <infoflow type="none"/>
21707 </interface>
21708 -<interface name="corenet_tcp_bind_kismet_port" lineno="41960">
21709 +<interface name="corenet_tcp_bind_kismet_port" lineno="42083">
21710 <summary>
21711 Bind TCP sockets to the kismet port.
21712 </summary>
21713 @@ -36315,7 +36132,7 @@ Domain allowed access.
21714 </param>
21715 <infoflow type="none"/>
21716 </interface>
21717 -<interface name="corenet_udp_bind_kismet_port" lineno="41980">
21718 +<interface name="corenet_udp_bind_kismet_port" lineno="42103">
21719 <summary>
21720 Bind UDP sockets to the kismet port.
21721 </summary>
21722 @@ -36326,7 +36143,7 @@ Domain allowed access.
21723 </param>
21724 <infoflow type="none"/>
21725 </interface>
21726 -<interface name="corenet_tcp_connect_kismet_port" lineno="41999">
21727 +<interface name="corenet_tcp_connect_kismet_port" lineno="42122">
21728 <summary>
21729 Make a TCP connection to the kismet port.
21730 </summary>
21731 @@ -36336,7 +36153,7 @@ Domain allowed access.
21732 </summary>
21733 </param>
21734 </interface>
21735 -<interface name="corenet_send_kismet_client_packets" lineno="42019">
21736 +<interface name="corenet_send_kismet_client_packets" lineno="42142">
21737 <summary>
21738 Send kismet_client packets.
21739 </summary>
21740 @@ -36347,7 +36164,7 @@ Domain allowed access.
21741 </param>
21742 <infoflow type="write" weight="10"/>
21743 </interface>
21744 -<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="42038">
21745 +<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="42161">
21746 <summary>
21747 Do not audit attempts to send kismet_client packets.
21748 </summary>
21749 @@ -36358,7 +36175,7 @@ Domain to not audit.
21750 </param>
21751 <infoflow type="none"/>
21752 </interface>
21753 -<interface name="corenet_receive_kismet_client_packets" lineno="42057">
21754 +<interface name="corenet_receive_kismet_client_packets" lineno="42180">
21755 <summary>
21756 Receive kismet_client packets.
21757 </summary>
21758 @@ -36369,7 +36186,7 @@ Domain allowed access.
21759 </param>
21760 <infoflow type="read" weight="10"/>
21761 </interface>
21762 -<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="42076">
21763 +<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="42199">
21764 <summary>
21765 Do not audit attempts to receive kismet_client packets.
21766 </summary>
21767 @@ -36380,7 +36197,7 @@ Domain allowed access.
21768 </param>
21769 <infoflow type="none"/>
21770 </interface>
21771 -<interface name="corenet_sendrecv_kismet_client_packets" lineno="42095">
21772 +<interface name="corenet_sendrecv_kismet_client_packets" lineno="42218">
21773 <summary>
21774 Send and receive kismet_client packets.
21775 </summary>
21776 @@ -36391,7 +36208,7 @@ Domain allowed access.
21777 </param>
21778 <infoflow type="both" weight="10"/>
21779 </interface>
21780 -<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="42111">
21781 +<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="42234">
21782 <summary>
21783 Do not audit attempts to send and receive kismet_client packets.
21784 </summary>
21785 @@ -36402,7 +36219,7 @@ Domain to not audit.
21786 </param>
21787 <infoflow type="none"/>
21788 </interface>
21789 -<interface name="corenet_relabelto_kismet_client_packets" lineno="42126">
21790 +<interface name="corenet_relabelto_kismet_client_packets" lineno="42249">
21791 <summary>
21792 Relabel packets to kismet_client the packet type.
21793 </summary>
21794 @@ -36412,7 +36229,7 @@ Domain allowed access.
21795 </summary>
21796 </param>
21797 </interface>
21798 -<interface name="corenet_send_kismet_server_packets" lineno="42146">
21799 +<interface name="corenet_send_kismet_server_packets" lineno="42269">
21800 <summary>
21801 Send kismet_server packets.
21802 </summary>
21803 @@ -36423,7 +36240,7 @@ Domain allowed access.
21804 </param>
21805 <infoflow type="write" weight="10"/>
21806 </interface>
21807 -<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="42165">
21808 +<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="42288">
21809 <summary>
21810 Do not audit attempts to send kismet_server packets.
21811 </summary>
21812 @@ -36434,7 +36251,7 @@ Domain to not audit.
21813 </param>
21814 <infoflow type="none"/>
21815 </interface>
21816 -<interface name="corenet_receive_kismet_server_packets" lineno="42184">
21817 +<interface name="corenet_receive_kismet_server_packets" lineno="42307">
21818 <summary>
21819 Receive kismet_server packets.
21820 </summary>
21821 @@ -36445,7 +36262,7 @@ Domain allowed access.
21822 </param>
21823 <infoflow type="read" weight="10"/>
21824 </interface>
21825 -<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="42203">
21826 +<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="42326">
21827 <summary>
21828 Do not audit attempts to receive kismet_server packets.
21829 </summary>
21830 @@ -36456,7 +36273,7 @@ Domain allowed access.
21831 </param>
21832 <infoflow type="none"/>
21833 </interface>
21834 -<interface name="corenet_sendrecv_kismet_server_packets" lineno="42222">
21835 +<interface name="corenet_sendrecv_kismet_server_packets" lineno="42345">
21836 <summary>
21837 Send and receive kismet_server packets.
21838 </summary>
21839 @@ -36467,7 +36284,7 @@ Domain allowed access.
21840 </param>
21841 <infoflow type="both" weight="10"/>
21842 </interface>
21843 -<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="42238">
21844 +<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="42361">
21845 <summary>
21846 Do not audit attempts to send and receive kismet_server packets.
21847 </summary>
21848 @@ -36478,7 +36295,7 @@ Domain to not audit.
21849 </param>
21850 <infoflow type="none"/>
21851 </interface>
21852 -<interface name="corenet_relabelto_kismet_server_packets" lineno="42253">
21853 +<interface name="corenet_relabelto_kismet_server_packets" lineno="42376">
21854 <summary>
21855 Relabel packets to kismet_server the packet type.
21856 </summary>
21857 @@ -36488,7 +36305,7 @@ Domain allowed access.
21858 </summary>
21859 </param>
21860 </interface>
21861 -<interface name="corenet_tcp_sendrecv_kdeconnect_port" lineno="42275">
21862 +<interface name="corenet_tcp_sendrecv_kdeconnect_port" lineno="42398">
21863 <summary>
21864 Send and receive TCP traffic on the kdeconnect port.
21865 </summary>
21866 @@ -36499,7 +36316,7 @@ Domain allowed access.
21867 </param>
21868 <infoflow type="both" weight="10"/>
21869 </interface>
21870 -<interface name="corenet_udp_send_kdeconnect_port" lineno="42290">
21871 +<interface name="corenet_udp_send_kdeconnect_port" lineno="42413">
21872 <summary>
21873 Send UDP traffic on the kdeconnect port.
21874 </summary>
21875 @@ -36510,7 +36327,7 @@ Domain allowed access.
21876 </param>
21877 <infoflow type="write" weight="10"/>
21878 </interface>
21879 -<interface name="corenet_dontaudit_udp_send_kdeconnect_port" lineno="42305">
21880 +<interface name="corenet_dontaudit_udp_send_kdeconnect_port" lineno="42428">
21881 <summary>
21882 Do not audit attempts to send UDP traffic on the kdeconnect port.
21883 </summary>
21884 @@ -36521,7 +36338,7 @@ Domain to not audit.
21885 </param>
21886 <infoflow type="none"/>
21887 </interface>
21888 -<interface name="corenet_udp_receive_kdeconnect_port" lineno="42320">
21889 +<interface name="corenet_udp_receive_kdeconnect_port" lineno="42443">
21890 <summary>
21891 Receive UDP traffic on the kdeconnect port.
21892 </summary>
21893 @@ -36532,7 +36349,7 @@ Domain allowed access.
21894 </param>
21895 <infoflow type="read" weight="10"/>
21896 </interface>
21897 -<interface name="corenet_dontaudit_udp_receive_kdeconnect_port" lineno="42335">
21898 +<interface name="corenet_dontaudit_udp_receive_kdeconnect_port" lineno="42458">
21899 <summary>
21900 Do not audit attempts to receive UDP traffic on the kdeconnect port.
21901 </summary>
21902 @@ -36543,7 +36360,7 @@ Domain to not audit.
21903 </param>
21904 <infoflow type="none"/>
21905 </interface>
21906 -<interface name="corenet_udp_sendrecv_kdeconnect_port" lineno="42350">
21907 +<interface name="corenet_udp_sendrecv_kdeconnect_port" lineno="42473">
21908 <summary>
21909 Send and receive UDP traffic on the kdeconnect port.
21910 </summary>
21911 @@ -36554,7 +36371,7 @@ Domain allowed access.
21912 </param>
21913 <infoflow type="both" weight="10"/>
21914 </interface>
21915 -<interface name="corenet_dontaudit_udp_sendrecv_kdeconnect_port" lineno="42366">
21916 +<interface name="corenet_dontaudit_udp_sendrecv_kdeconnect_port" lineno="42489">
21917 <summary>
21918 Do not audit attempts to send and receive
21919 UDP traffic on the kdeconnect port.
21920 @@ -36566,7 +36383,7 @@ Domain to not audit.
21921 </param>
21922 <infoflow type="none"/>
21923 </interface>
21924 -<interface name="corenet_tcp_bind_kdeconnect_port" lineno="42381">
21925 +<interface name="corenet_tcp_bind_kdeconnect_port" lineno="42504">
21926 <summary>
21927 Bind TCP sockets to the kdeconnect port.
21928 </summary>
21929 @@ -36577,7 +36394,7 @@ Domain allowed access.
21930 </param>
21931 <infoflow type="none"/>
21932 </interface>
21933 -<interface name="corenet_udp_bind_kdeconnect_port" lineno="42401">
21934 +<interface name="corenet_udp_bind_kdeconnect_port" lineno="42524">
21935 <summary>
21936 Bind UDP sockets to the kdeconnect port.
21937 </summary>
21938 @@ -36588,7 +36405,7 @@ Domain allowed access.
21939 </param>
21940 <infoflow type="none"/>
21941 </interface>
21942 -<interface name="corenet_tcp_connect_kdeconnect_port" lineno="42420">
21943 +<interface name="corenet_tcp_connect_kdeconnect_port" lineno="42543">
21944 <summary>
21945 Make a TCP connection to the kdeconnect port.
21946 </summary>
21947 @@ -36598,7 +36415,7 @@ Domain allowed access.
21948 </summary>
21949 </param>
21950 </interface>
21951 -<interface name="corenet_send_kdeconnect_client_packets" lineno="42440">
21952 +<interface name="corenet_send_kdeconnect_client_packets" lineno="42563">
21953 <summary>
21954 Send kdeconnect_client packets.
21955 </summary>
21956 @@ -36609,7 +36426,7 @@ Domain allowed access.
21957 </param>
21958 <infoflow type="write" weight="10"/>
21959 </interface>
21960 -<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="42459">
21961 +<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="42582">
21962 <summary>
21963 Do not audit attempts to send kdeconnect_client packets.
21964 </summary>
21965 @@ -36620,7 +36437,7 @@ Domain to not audit.
21966 </param>
21967 <infoflow type="none"/>
21968 </interface>
21969 -<interface name="corenet_receive_kdeconnect_client_packets" lineno="42478">
21970 +<interface name="corenet_receive_kdeconnect_client_packets" lineno="42601">
21971 <summary>
21972 Receive kdeconnect_client packets.
21973 </summary>
21974 @@ -36631,7 +36448,7 @@ Domain allowed access.
21975 </param>
21976 <infoflow type="read" weight="10"/>
21977 </interface>
21978 -<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="42497">
21979 +<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="42620">
21980 <summary>
21981 Do not audit attempts to receive kdeconnect_client packets.
21982 </summary>
21983 @@ -36642,7 +36459,7 @@ Domain allowed access.
21984 </param>
21985 <infoflow type="none"/>
21986 </interface>
21987 -<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="42516">
21988 +<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="42639">
21989 <summary>
21990 Send and receive kdeconnect_client packets.
21991 </summary>
21992 @@ -36653,7 +36470,7 @@ Domain allowed access.
21993 </param>
21994 <infoflow type="both" weight="10"/>
21995 </interface>
21996 -<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="42532">
21997 +<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="42655">
21998 <summary>
21999 Do not audit attempts to send and receive kdeconnect_client packets.
22000 </summary>
22001 @@ -36664,7 +36481,7 @@ Domain to not audit.
22002 </param>
22003 <infoflow type="none"/>
22004 </interface>
22005 -<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="42547">
22006 +<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="42670">
22007 <summary>
22008 Relabel packets to kdeconnect_client the packet type.
22009 </summary>
22010 @@ -36674,7 +36491,7 @@ Domain allowed access.
22011 </summary>
22012 </param>
22013 </interface>
22014 -<interface name="corenet_send_kdeconnect_server_packets" lineno="42567">
22015 +<interface name="corenet_send_kdeconnect_server_packets" lineno="42690">
22016 <summary>
22017 Send kdeconnect_server packets.
22018 </summary>
22019 @@ -36685,7 +36502,7 @@ Domain allowed access.
22020 </param>
22021 <infoflow type="write" weight="10"/>
22022 </interface>
22023 -<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="42586">
22024 +<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="42709">
22025 <summary>
22026 Do not audit attempts to send kdeconnect_server packets.
22027 </summary>
22028 @@ -36696,7 +36513,7 @@ Domain to not audit.
22029 </param>
22030 <infoflow type="none"/>
22031 </interface>
22032 -<interface name="corenet_receive_kdeconnect_server_packets" lineno="42605">
22033 +<interface name="corenet_receive_kdeconnect_server_packets" lineno="42728">
22034 <summary>
22035 Receive kdeconnect_server packets.
22036 </summary>
22037 @@ -36707,7 +36524,7 @@ Domain allowed access.
22038 </param>
22039 <infoflow type="read" weight="10"/>
22040 </interface>
22041 -<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="42624">
22042 +<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="42747">
22043 <summary>
22044 Do not audit attempts to receive kdeconnect_server packets.
22045 </summary>
22046 @@ -36718,7 +36535,7 @@ Domain allowed access.
22047 </param>
22048 <infoflow type="none"/>
22049 </interface>
22050 -<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="42643">
22051 +<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="42766">
22052 <summary>
22053 Send and receive kdeconnect_server packets.
22054 </summary>
22055 @@ -36729,7 +36546,7 @@ Domain allowed access.
22056 </param>
22057 <infoflow type="both" weight="10"/>
22058 </interface>
22059 -<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="42659">
22060 +<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="42782">
22061 <summary>
22062 Do not audit attempts to send and receive kdeconnect_server packets.
22063 </summary>
22064 @@ -36740,7 +36557,7 @@ Domain to not audit.
22065 </param>
22066 <infoflow type="none"/>
22067 </interface>
22068 -<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="42674">
22069 +<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="42797">
22070 <summary>
22071 Relabel packets to kdeconnect_server the packet type.
22072 </summary>
22073 @@ -36750,7 +36567,7 @@ Domain allowed access.
22074 </summary>
22075 </param>
22076 </interface>
22077 -<interface name="corenet_tcp_sendrecv_kprop_port" lineno="42696">
22078 +<interface name="corenet_tcp_sendrecv_kprop_port" lineno="42819">
22079 <summary>
22080 Send and receive TCP traffic on the kprop port.
22081 </summary>
22082 @@ -36761,7 +36578,7 @@ Domain allowed access.
22083 </param>
22084 <infoflow type="both" weight="10"/>
22085 </interface>
22086 -<interface name="corenet_udp_send_kprop_port" lineno="42711">
22087 +<interface name="corenet_udp_send_kprop_port" lineno="42834">
22088 <summary>
22089 Send UDP traffic on the kprop port.
22090 </summary>
22091 @@ -36772,7 +36589,7 @@ Domain allowed access.
22092 </param>
22093 <infoflow type="write" weight="10"/>
22094 </interface>
22095 -<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="42726">
22096 +<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="42849">
22097 <summary>
22098 Do not audit attempts to send UDP traffic on the kprop port.
22099 </summary>
22100 @@ -36783,7 +36600,7 @@ Domain to not audit.
22101 </param>
22102 <infoflow type="none"/>
22103 </interface>
22104 -<interface name="corenet_udp_receive_kprop_port" lineno="42741">
22105 +<interface name="corenet_udp_receive_kprop_port" lineno="42864">
22106 <summary>
22107 Receive UDP traffic on the kprop port.
22108 </summary>
22109 @@ -36794,7 +36611,7 @@ Domain allowed access.
22110 </param>
22111 <infoflow type="read" weight="10"/>
22112 </interface>
22113 -<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="42756">
22114 +<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="42879">
22115 <summary>
22116 Do not audit attempts to receive UDP traffic on the kprop port.
22117 </summary>
22118 @@ -36805,7 +36622,7 @@ Domain to not audit.
22119 </param>
22120 <infoflow type="none"/>
22121 </interface>
22122 -<interface name="corenet_udp_sendrecv_kprop_port" lineno="42771">
22123 +<interface name="corenet_udp_sendrecv_kprop_port" lineno="42894">
22124 <summary>
22125 Send and receive UDP traffic on the kprop port.
22126 </summary>
22127 @@ -36816,7 +36633,7 @@ Domain allowed access.
22128 </param>
22129 <infoflow type="both" weight="10"/>
22130 </interface>
22131 -<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="42787">
22132 +<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="42910">
22133 <summary>
22134 Do not audit attempts to send and receive
22135 UDP traffic on the kprop port.
22136 @@ -36828,7 +36645,7 @@ Domain to not audit.
22137 </param>
22138 <infoflow type="none"/>
22139 </interface>
22140 -<interface name="corenet_tcp_bind_kprop_port" lineno="42802">
22141 +<interface name="corenet_tcp_bind_kprop_port" lineno="42925">
22142 <summary>
22143 Bind TCP sockets to the kprop port.
22144 </summary>
22145 @@ -36839,7 +36656,7 @@ Domain allowed access.
22146 </param>
22147 <infoflow type="none"/>
22148 </interface>
22149 -<interface name="corenet_udp_bind_kprop_port" lineno="42822">
22150 +<interface name="corenet_udp_bind_kprop_port" lineno="42945">
22151 <summary>
22152 Bind UDP sockets to the kprop port.
22153 </summary>
22154 @@ -36850,7 +36667,7 @@ Domain allowed access.
22155 </param>
22156 <infoflow type="none"/>
22157 </interface>
22158 -<interface name="corenet_tcp_connect_kprop_port" lineno="42841">
22159 +<interface name="corenet_tcp_connect_kprop_port" lineno="42964">
22160 <summary>
22161 Make a TCP connection to the kprop port.
22162 </summary>
22163 @@ -36860,7 +36677,7 @@ Domain allowed access.
22164 </summary>
22165 </param>
22166 </interface>
22167 -<interface name="corenet_send_kprop_client_packets" lineno="42861">
22168 +<interface name="corenet_send_kprop_client_packets" lineno="42984">
22169 <summary>
22170 Send kprop_client packets.
22171 </summary>
22172 @@ -36871,7 +36688,7 @@ Domain allowed access.
22173 </param>
22174 <infoflow type="write" weight="10"/>
22175 </interface>
22176 -<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="42880">
22177 +<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="43003">
22178 <summary>
22179 Do not audit attempts to send kprop_client packets.
22180 </summary>
22181 @@ -36882,7 +36699,7 @@ Domain to not audit.
22182 </param>
22183 <infoflow type="none"/>
22184 </interface>
22185 -<interface name="corenet_receive_kprop_client_packets" lineno="42899">
22186 +<interface name="corenet_receive_kprop_client_packets" lineno="43022">
22187 <summary>
22188 Receive kprop_client packets.
22189 </summary>
22190 @@ -36893,7 +36710,7 @@ Domain allowed access.
22191 </param>
22192 <infoflow type="read" weight="10"/>
22193 </interface>
22194 -<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="42918">
22195 +<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="43041">
22196 <summary>
22197 Do not audit attempts to receive kprop_client packets.
22198 </summary>
22199 @@ -36904,7 +36721,7 @@ Domain allowed access.
22200 </param>
22201 <infoflow type="none"/>
22202 </interface>
22203 -<interface name="corenet_sendrecv_kprop_client_packets" lineno="42937">
22204 +<interface name="corenet_sendrecv_kprop_client_packets" lineno="43060">
22205 <summary>
22206 Send and receive kprop_client packets.
22207 </summary>
22208 @@ -36915,7 +36732,7 @@ Domain allowed access.
22209 </param>
22210 <infoflow type="both" weight="10"/>
22211 </interface>
22212 -<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="42953">
22213 +<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="43076">
22214 <summary>
22215 Do not audit attempts to send and receive kprop_client packets.
22216 </summary>
22217 @@ -36926,7 +36743,7 @@ Domain to not audit.
22218 </param>
22219 <infoflow type="none"/>
22220 </interface>
22221 -<interface name="corenet_relabelto_kprop_client_packets" lineno="42968">
22222 +<interface name="corenet_relabelto_kprop_client_packets" lineno="43091">
22223 <summary>
22224 Relabel packets to kprop_client the packet type.
22225 </summary>
22226 @@ -36936,7 +36753,7 @@ Domain allowed access.
22227 </summary>
22228 </param>
22229 </interface>
22230 -<interface name="corenet_send_kprop_server_packets" lineno="42988">
22231 +<interface name="corenet_send_kprop_server_packets" lineno="43111">
22232 <summary>
22233 Send kprop_server packets.
22234 </summary>
22235 @@ -36947,7 +36764,7 @@ Domain allowed access.
22236 </param>
22237 <infoflow type="write" weight="10"/>
22238 </interface>
22239 -<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="43007">
22240 +<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="43130">
22241 <summary>
22242 Do not audit attempts to send kprop_server packets.
22243 </summary>
22244 @@ -36958,7 +36775,7 @@ Domain to not audit.
22245 </param>
22246 <infoflow type="none"/>
22247 </interface>
22248 -<interface name="corenet_receive_kprop_server_packets" lineno="43026">
22249 +<interface name="corenet_receive_kprop_server_packets" lineno="43149">
22250 <summary>
22251 Receive kprop_server packets.
22252 </summary>
22253 @@ -36969,7 +36786,7 @@ Domain allowed access.
22254 </param>
22255 <infoflow type="read" weight="10"/>
22256 </interface>
22257 -<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="43045">
22258 +<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="43168">
22259 <summary>
22260 Do not audit attempts to receive kprop_server packets.
22261 </summary>
22262 @@ -36980,7 +36797,7 @@ Domain allowed access.
22263 </param>
22264 <infoflow type="none"/>
22265 </interface>
22266 -<interface name="corenet_sendrecv_kprop_server_packets" lineno="43064">
22267 +<interface name="corenet_sendrecv_kprop_server_packets" lineno="43187">
22268 <summary>
22269 Send and receive kprop_server packets.
22270 </summary>
22271 @@ -36991,7 +36808,7 @@ Domain allowed access.
22272 </param>
22273 <infoflow type="both" weight="10"/>
22274 </interface>
22275 -<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="43080">
22276 +<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="43203">
22277 <summary>
22278 Do not audit attempts to send and receive kprop_server packets.
22279 </summary>
22280 @@ -37002,7 +36819,7 @@ Domain to not audit.
22281 </param>
22282 <infoflow type="none"/>
22283 </interface>
22284 -<interface name="corenet_relabelto_kprop_server_packets" lineno="43095">
22285 +<interface name="corenet_relabelto_kprop_server_packets" lineno="43218">
22286 <summary>
22287 Relabel packets to kprop_server the packet type.
22288 </summary>
22289 @@ -37012,7 +36829,7 @@ Domain allowed access.
22290 </summary>
22291 </param>
22292 </interface>
22293 -<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="43117">
22294 +<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="43240">
22295 <summary>
22296 Send and receive TCP traffic on the ktalkd port.
22297 </summary>
22298 @@ -37023,7 +36840,7 @@ Domain allowed access.
22299 </param>
22300 <infoflow type="both" weight="10"/>
22301 </interface>
22302 -<interface name="corenet_udp_send_ktalkd_port" lineno="43132">
22303 +<interface name="corenet_udp_send_ktalkd_port" lineno="43255">
22304 <summary>
22305 Send UDP traffic on the ktalkd port.
22306 </summary>
22307 @@ -37034,7 +36851,7 @@ Domain allowed access.
22308 </param>
22309 <infoflow type="write" weight="10"/>
22310 </interface>
22311 -<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="43147">
22312 +<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="43270">
22313 <summary>
22314 Do not audit attempts to send UDP traffic on the ktalkd port.
22315 </summary>
22316 @@ -37045,7 +36862,7 @@ Domain to not audit.
22317 </param>
22318 <infoflow type="none"/>
22319 </interface>
22320 -<interface name="corenet_udp_receive_ktalkd_port" lineno="43162">
22321 +<interface name="corenet_udp_receive_ktalkd_port" lineno="43285">
22322 <summary>
22323 Receive UDP traffic on the ktalkd port.
22324 </summary>
22325 @@ -37056,7 +36873,7 @@ Domain allowed access.
22326 </param>
22327 <infoflow type="read" weight="10"/>
22328 </interface>
22329 -<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="43177">
22330 +<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="43300">
22331 <summary>
22332 Do not audit attempts to receive UDP traffic on the ktalkd port.
22333 </summary>
22334 @@ -37067,7 +36884,7 @@ Domain to not audit.
22335 </param>
22336 <infoflow type="none"/>
22337 </interface>
22338 -<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="43192">
22339 +<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="43315">
22340 <summary>
22341 Send and receive UDP traffic on the ktalkd port.
22342 </summary>
22343 @@ -37078,7 +36895,7 @@ Domain allowed access.
22344 </param>
22345 <infoflow type="both" weight="10"/>
22346 </interface>
22347 -<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="43208">
22348 +<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="43331">
22349 <summary>
22350 Do not audit attempts to send and receive
22351 UDP traffic on the ktalkd port.
22352 @@ -37090,7 +36907,7 @@ Domain to not audit.
22353 </param>
22354 <infoflow type="none"/>
22355 </interface>
22356 -<interface name="corenet_tcp_bind_ktalkd_port" lineno="43223">
22357 +<interface name="corenet_tcp_bind_ktalkd_port" lineno="43346">
22358 <summary>
22359 Bind TCP sockets to the ktalkd port.
22360 </summary>
22361 @@ -37101,7 +36918,7 @@ Domain allowed access.
22362 </param>
22363 <infoflow type="none"/>
22364 </interface>
22365 -<interface name="corenet_udp_bind_ktalkd_port" lineno="43243">
22366 +<interface name="corenet_udp_bind_ktalkd_port" lineno="43366">
22367 <summary>
22368 Bind UDP sockets to the ktalkd port.
22369 </summary>
22370 @@ -37112,7 +36929,7 @@ Domain allowed access.
22371 </param>
22372 <infoflow type="none"/>
22373 </interface>
22374 -<interface name="corenet_tcp_connect_ktalkd_port" lineno="43262">
22375 +<interface name="corenet_tcp_connect_ktalkd_port" lineno="43385">
22376 <summary>
22377 Make a TCP connection to the ktalkd port.
22378 </summary>
22379 @@ -37122,7 +36939,7 @@ Domain allowed access.
22380 </summary>
22381 </param>
22382 </interface>
22383 -<interface name="corenet_send_ktalkd_client_packets" lineno="43282">
22384 +<interface name="corenet_send_ktalkd_client_packets" lineno="43405">
22385 <summary>
22386 Send ktalkd_client packets.
22387 </summary>
22388 @@ -37133,7 +36950,7 @@ Domain allowed access.
22389 </param>
22390 <infoflow type="write" weight="10"/>
22391 </interface>
22392 -<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="43301">
22393 +<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="43424">
22394 <summary>
22395 Do not audit attempts to send ktalkd_client packets.
22396 </summary>
22397 @@ -37144,7 +36961,7 @@ Domain to not audit.
22398 </param>
22399 <infoflow type="none"/>
22400 </interface>
22401 -<interface name="corenet_receive_ktalkd_client_packets" lineno="43320">
22402 +<interface name="corenet_receive_ktalkd_client_packets" lineno="43443">
22403 <summary>
22404 Receive ktalkd_client packets.
22405 </summary>
22406 @@ -37155,7 +36972,7 @@ Domain allowed access.
22407 </param>
22408 <infoflow type="read" weight="10"/>
22409 </interface>
22410 -<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="43339">
22411 +<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="43462">
22412 <summary>
22413 Do not audit attempts to receive ktalkd_client packets.
22414 </summary>
22415 @@ -37166,7 +36983,7 @@ Domain allowed access.
22416 </param>
22417 <infoflow type="none"/>
22418 </interface>
22419 -<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="43358">
22420 +<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="43481">
22421 <summary>
22422 Send and receive ktalkd_client packets.
22423 </summary>
22424 @@ -37177,7 +36994,7 @@ Domain allowed access.
22425 </param>
22426 <infoflow type="both" weight="10"/>
22427 </interface>
22428 -<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="43374">
22429 +<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="43497">
22430 <summary>
22431 Do not audit attempts to send and receive ktalkd_client packets.
22432 </summary>
22433 @@ -37188,7 +37005,7 @@ Domain to not audit.
22434 </param>
22435 <infoflow type="none"/>
22436 </interface>
22437 -<interface name="corenet_relabelto_ktalkd_client_packets" lineno="43389">
22438 +<interface name="corenet_relabelto_ktalkd_client_packets" lineno="43512">
22439 <summary>
22440 Relabel packets to ktalkd_client the packet type.
22441 </summary>
22442 @@ -37198,7 +37015,7 @@ Domain allowed access.
22443 </summary>
22444 </param>
22445 </interface>
22446 -<interface name="corenet_send_ktalkd_server_packets" lineno="43409">
22447 +<interface name="corenet_send_ktalkd_server_packets" lineno="43532">
22448 <summary>
22449 Send ktalkd_server packets.
22450 </summary>
22451 @@ -37209,7 +37026,7 @@ Domain allowed access.
22452 </param>
22453 <infoflow type="write" weight="10"/>
22454 </interface>
22455 -<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="43428">
22456 +<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="43551">
22457 <summary>
22458 Do not audit attempts to send ktalkd_server packets.
22459 </summary>
22460 @@ -37220,7 +37037,7 @@ Domain to not audit.
22461 </param>
22462 <infoflow type="none"/>
22463 </interface>
22464 -<interface name="corenet_receive_ktalkd_server_packets" lineno="43447">
22465 +<interface name="corenet_receive_ktalkd_server_packets" lineno="43570">
22466 <summary>
22467 Receive ktalkd_server packets.
22468 </summary>
22469 @@ -37231,7 +37048,7 @@ Domain allowed access.
22470 </param>
22471 <infoflow type="read" weight="10"/>
22472 </interface>
22473 -<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="43466">
22474 +<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="43589">
22475 <summary>
22476 Do not audit attempts to receive ktalkd_server packets.
22477 </summary>
22478 @@ -37242,7 +37059,7 @@ Domain allowed access.
22479 </param>
22480 <infoflow type="none"/>
22481 </interface>
22482 -<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="43485">
22483 +<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="43608">
22484 <summary>
22485 Send and receive ktalkd_server packets.
22486 </summary>
22487 @@ -37253,7 +37070,7 @@ Domain allowed access.
22488 </param>
22489 <infoflow type="both" weight="10"/>
22490 </interface>
22491 -<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="43501">
22492 +<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="43624">
22493 <summary>
22494 Do not audit attempts to send and receive ktalkd_server packets.
22495 </summary>
22496 @@ -37264,7 +37081,7 @@ Domain to not audit.
22497 </param>
22498 <infoflow type="none"/>
22499 </interface>
22500 -<interface name="corenet_relabelto_ktalkd_server_packets" lineno="43516">
22501 +<interface name="corenet_relabelto_ktalkd_server_packets" lineno="43639">
22502 <summary>
22503 Relabel packets to ktalkd_server the packet type.
22504 </summary>
22505 @@ -37274,7 +37091,7 @@ Domain allowed access.
22506 </summary>
22507 </param>
22508 </interface>
22509 -<interface name="corenet_tcp_sendrecv_l2tp_port" lineno="43538">
22510 +<interface name="corenet_tcp_sendrecv_l2tp_port" lineno="43661">
22511 <summary>
22512 Send and receive TCP traffic on the l2tp port.
22513 </summary>
22514 @@ -37285,7 +37102,7 @@ Domain allowed access.
22515 </param>
22516 <infoflow type="both" weight="10"/>
22517 </interface>
22518 -<interface name="corenet_udp_send_l2tp_port" lineno="43553">
22519 +<interface name="corenet_udp_send_l2tp_port" lineno="43676">
22520 <summary>
22521 Send UDP traffic on the l2tp port.
22522 </summary>
22523 @@ -37296,7 +37113,7 @@ Domain allowed access.
22524 </param>
22525 <infoflow type="write" weight="10"/>
22526 </interface>
22527 -<interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="43568">
22528 +<interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="43691">
22529 <summary>
22530 Do not audit attempts to send UDP traffic on the l2tp port.
22531 </summary>
22532 @@ -37307,7 +37124,7 @@ Domain to not audit.
22533 </param>
22534 <infoflow type="none"/>
22535 </interface>
22536 -<interface name="corenet_udp_receive_l2tp_port" lineno="43583">
22537 +<interface name="corenet_udp_receive_l2tp_port" lineno="43706">
22538 <summary>
22539 Receive UDP traffic on the l2tp port.
22540 </summary>
22541 @@ -37318,7 +37135,7 @@ Domain allowed access.
22542 </param>
22543 <infoflow type="read" weight="10"/>
22544 </interface>
22545 -<interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="43598">
22546 +<interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="43721">
22547 <summary>
22548 Do not audit attempts to receive UDP traffic on the l2tp port.
22549 </summary>
22550 @@ -37329,7 +37146,7 @@ Domain to not audit.
22551 </param>
22552 <infoflow type="none"/>
22553 </interface>
22554 -<interface name="corenet_udp_sendrecv_l2tp_port" lineno="43613">
22555 +<interface name="corenet_udp_sendrecv_l2tp_port" lineno="43736">
22556 <summary>
22557 Send and receive UDP traffic on the l2tp port.
22558 </summary>
22559 @@ -37340,7 +37157,7 @@ Domain allowed access.
22560 </param>
22561 <infoflow type="both" weight="10"/>
22562 </interface>
22563 -<interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="43629">
22564 +<interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="43752">
22565 <summary>
22566 Do not audit attempts to send and receive
22567 UDP traffic on the l2tp port.
22568 @@ -37352,7 +37169,7 @@ Domain to not audit.
22569 </param>
22570 <infoflow type="none"/>
22571 </interface>
22572 -<interface name="corenet_tcp_bind_l2tp_port" lineno="43644">
22573 +<interface name="corenet_tcp_bind_l2tp_port" lineno="43767">
22574 <summary>
22575 Bind TCP sockets to the l2tp port.
22576 </summary>
22577 @@ -37363,7 +37180,7 @@ Domain allowed access.
22578 </param>
22579 <infoflow type="none"/>
22580 </interface>
22581 -<interface name="corenet_udp_bind_l2tp_port" lineno="43664">
22582 +<interface name="corenet_udp_bind_l2tp_port" lineno="43787">
22583 <summary>
22584 Bind UDP sockets to the l2tp port.
22585 </summary>
22586 @@ -37374,7 +37191,7 @@ Domain allowed access.
22587 </param>
22588 <infoflow type="none"/>
22589 </interface>
22590 -<interface name="corenet_tcp_connect_l2tp_port" lineno="43683">
22591 +<interface name="corenet_tcp_connect_l2tp_port" lineno="43806">
22592 <summary>
22593 Make a TCP connection to the l2tp port.
22594 </summary>
22595 @@ -37384,7 +37201,7 @@ Domain allowed access.
22596 </summary>
22597 </param>
22598 </interface>
22599 -<interface name="corenet_send_l2tp_client_packets" lineno="43703">
22600 +<interface name="corenet_send_l2tp_client_packets" lineno="43826">
22601 <summary>
22602 Send l2tp_client packets.
22603 </summary>
22604 @@ -37395,7 +37212,7 @@ Domain allowed access.
22605 </param>
22606 <infoflow type="write" weight="10"/>
22607 </interface>
22608 -<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="43722">
22609 +<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="43845">
22610 <summary>
22611 Do not audit attempts to send l2tp_client packets.
22612 </summary>
22613 @@ -37406,7 +37223,7 @@ Domain to not audit.
22614 </param>
22615 <infoflow type="none"/>
22616 </interface>
22617 -<interface name="corenet_receive_l2tp_client_packets" lineno="43741">
22618 +<interface name="corenet_receive_l2tp_client_packets" lineno="43864">
22619 <summary>
22620 Receive l2tp_client packets.
22621 </summary>
22622 @@ -37417,7 +37234,7 @@ Domain allowed access.
22623 </param>
22624 <infoflow type="read" weight="10"/>
22625 </interface>
22626 -<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="43760">
22627 +<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="43883">
22628 <summary>
22629 Do not audit attempts to receive l2tp_client packets.
22630 </summary>
22631 @@ -37428,7 +37245,7 @@ Domain allowed access.
22632 </param>
22633 <infoflow type="none"/>
22634 </interface>
22635 -<interface name="corenet_sendrecv_l2tp_client_packets" lineno="43779">
22636 +<interface name="corenet_sendrecv_l2tp_client_packets" lineno="43902">
22637 <summary>
22638 Send and receive l2tp_client packets.
22639 </summary>
22640 @@ -37439,7 +37256,7 @@ Domain allowed access.
22641 </param>
22642 <infoflow type="both" weight="10"/>
22643 </interface>
22644 -<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="43795">
22645 +<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="43918">
22646 <summary>
22647 Do not audit attempts to send and receive l2tp_client packets.
22648 </summary>
22649 @@ -37450,7 +37267,7 @@ Domain to not audit.
22650 </param>
22651 <infoflow type="none"/>
22652 </interface>
22653 -<interface name="corenet_relabelto_l2tp_client_packets" lineno="43810">
22654 +<interface name="corenet_relabelto_l2tp_client_packets" lineno="43933">
22655 <summary>
22656 Relabel packets to l2tp_client the packet type.
22657 </summary>
22658 @@ -37460,7 +37277,7 @@ Domain allowed access.
22659 </summary>
22660 </param>
22661 </interface>
22662 -<interface name="corenet_send_l2tp_server_packets" lineno="43830">
22663 +<interface name="corenet_send_l2tp_server_packets" lineno="43953">
22664 <summary>
22665 Send l2tp_server packets.
22666 </summary>
22667 @@ -37471,7 +37288,7 @@ Domain allowed access.
22668 </param>
22669 <infoflow type="write" weight="10"/>
22670 </interface>
22671 -<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="43849">
22672 +<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="43972">
22673 <summary>
22674 Do not audit attempts to send l2tp_server packets.
22675 </summary>
22676 @@ -37482,7 +37299,7 @@ Domain to not audit.
22677 </param>
22678 <infoflow type="none"/>
22679 </interface>
22680 -<interface name="corenet_receive_l2tp_server_packets" lineno="43868">
22681 +<interface name="corenet_receive_l2tp_server_packets" lineno="43991">
22682 <summary>
22683 Receive l2tp_server packets.
22684 </summary>
22685 @@ -37493,7 +37310,7 @@ Domain allowed access.
22686 </param>
22687 <infoflow type="read" weight="10"/>
22688 </interface>
22689 -<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="43887">
22690 +<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="44010">
22691 <summary>
22692 Do not audit attempts to receive l2tp_server packets.
22693 </summary>
22694 @@ -37504,7 +37321,7 @@ Domain allowed access.
22695 </param>
22696 <infoflow type="none"/>
22697 </interface>
22698 -<interface name="corenet_sendrecv_l2tp_server_packets" lineno="43906">
22699 +<interface name="corenet_sendrecv_l2tp_server_packets" lineno="44029">
22700 <summary>
22701 Send and receive l2tp_server packets.
22702 </summary>
22703 @@ -37515,7 +37332,7 @@ Domain allowed access.
22704 </param>
22705 <infoflow type="both" weight="10"/>
22706 </interface>
22707 -<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="43922">
22708 +<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="44045">
22709 <summary>
22710 Do not audit attempts to send and receive l2tp_server packets.
22711 </summary>
22712 @@ -37526,7 +37343,7 @@ Domain to not audit.
22713 </param>
22714 <infoflow type="none"/>
22715 </interface>
22716 -<interface name="corenet_relabelto_l2tp_server_packets" lineno="43937">
22717 +<interface name="corenet_relabelto_l2tp_server_packets" lineno="44060">
22718 <summary>
22719 Relabel packets to l2tp_server the packet type.
22720 </summary>
22721 @@ -37536,7 +37353,7 @@ Domain allowed access.
22722 </summary>
22723 </param>
22724 </interface>
22725 -<interface name="corenet_tcp_sendrecv_ldap_port" lineno="43959">
22726 +<interface name="corenet_tcp_sendrecv_ldap_port" lineno="44082">
22727 <summary>
22728 Send and receive TCP traffic on the ldap port.
22729 </summary>
22730 @@ -37547,7 +37364,7 @@ Domain allowed access.
22731 </param>
22732 <infoflow type="both" weight="10"/>
22733 </interface>
22734 -<interface name="corenet_udp_send_ldap_port" lineno="43974">
22735 +<interface name="corenet_udp_send_ldap_port" lineno="44097">
22736 <summary>
22737 Send UDP traffic on the ldap port.
22738 </summary>
22739 @@ -37558,7 +37375,7 @@ Domain allowed access.
22740 </param>
22741 <infoflow type="write" weight="10"/>
22742 </interface>
22743 -<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="43989">
22744 +<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="44112">
22745 <summary>
22746 Do not audit attempts to send UDP traffic on the ldap port.
22747 </summary>
22748 @@ -37569,7 +37386,7 @@ Domain to not audit.
22749 </param>
22750 <infoflow type="none"/>
22751 </interface>
22752 -<interface name="corenet_udp_receive_ldap_port" lineno="44004">
22753 +<interface name="corenet_udp_receive_ldap_port" lineno="44127">
22754 <summary>
22755 Receive UDP traffic on the ldap port.
22756 </summary>
22757 @@ -37580,7 +37397,7 @@ Domain allowed access.
22758 </param>
22759 <infoflow type="read" weight="10"/>
22760 </interface>
22761 -<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="44019">
22762 +<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="44142">
22763 <summary>
22764 Do not audit attempts to receive UDP traffic on the ldap port.
22765 </summary>
22766 @@ -37591,7 +37408,7 @@ Domain to not audit.
22767 </param>
22768 <infoflow type="none"/>
22769 </interface>
22770 -<interface name="corenet_udp_sendrecv_ldap_port" lineno="44034">
22771 +<interface name="corenet_udp_sendrecv_ldap_port" lineno="44157">
22772 <summary>
22773 Send and receive UDP traffic on the ldap port.
22774 </summary>
22775 @@ -37602,7 +37419,7 @@ Domain allowed access.
22776 </param>
22777 <infoflow type="both" weight="10"/>
22778 </interface>
22779 -<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="44050">
22780 +<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="44173">
22781 <summary>
22782 Do not audit attempts to send and receive
22783 UDP traffic on the ldap port.
22784 @@ -37614,7 +37431,7 @@ Domain to not audit.
22785 </param>
22786 <infoflow type="none"/>
22787 </interface>
22788 -<interface name="corenet_tcp_bind_ldap_port" lineno="44065">
22789 +<interface name="corenet_tcp_bind_ldap_port" lineno="44188">
22790 <summary>
22791 Bind TCP sockets to the ldap port.
22792 </summary>
22793 @@ -37625,7 +37442,7 @@ Domain allowed access.
22794 </param>
22795 <infoflow type="none"/>
22796 </interface>
22797 -<interface name="corenet_udp_bind_ldap_port" lineno="44085">
22798 +<interface name="corenet_udp_bind_ldap_port" lineno="44208">
22799 <summary>
22800 Bind UDP sockets to the ldap port.
22801 </summary>
22802 @@ -37636,7 +37453,7 @@ Domain allowed access.
22803 </param>
22804 <infoflow type="none"/>
22805 </interface>
22806 -<interface name="corenet_tcp_connect_ldap_port" lineno="44104">
22807 +<interface name="corenet_tcp_connect_ldap_port" lineno="44227">
22808 <summary>
22809 Make a TCP connection to the ldap port.
22810 </summary>
22811 @@ -37646,7 +37463,7 @@ Domain allowed access.
22812 </summary>
22813 </param>
22814 </interface>
22815 -<interface name="corenet_send_ldap_client_packets" lineno="44124">
22816 +<interface name="corenet_send_ldap_client_packets" lineno="44247">
22817 <summary>
22818 Send ldap_client packets.
22819 </summary>
22820 @@ -37657,7 +37474,7 @@ Domain allowed access.
22821 </param>
22822 <infoflow type="write" weight="10"/>
22823 </interface>
22824 -<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="44143">
22825 +<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="44266">
22826 <summary>
22827 Do not audit attempts to send ldap_client packets.
22828 </summary>
22829 @@ -37668,7 +37485,7 @@ Domain to not audit.
22830 </param>
22831 <infoflow type="none"/>
22832 </interface>
22833 -<interface name="corenet_receive_ldap_client_packets" lineno="44162">
22834 +<interface name="corenet_receive_ldap_client_packets" lineno="44285">
22835 <summary>
22836 Receive ldap_client packets.
22837 </summary>
22838 @@ -37679,7 +37496,7 @@ Domain allowed access.
22839 </param>
22840 <infoflow type="read" weight="10"/>
22841 </interface>
22842 -<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="44181">
22843 +<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="44304">
22844 <summary>
22845 Do not audit attempts to receive ldap_client packets.
22846 </summary>
22847 @@ -37690,7 +37507,7 @@ Domain allowed access.
22848 </param>
22849 <infoflow type="none"/>
22850 </interface>
22851 -<interface name="corenet_sendrecv_ldap_client_packets" lineno="44200">
22852 +<interface name="corenet_sendrecv_ldap_client_packets" lineno="44323">
22853 <summary>
22854 Send and receive ldap_client packets.
22855 </summary>
22856 @@ -37701,7 +37518,7 @@ Domain allowed access.
22857 </param>
22858 <infoflow type="both" weight="10"/>
22859 </interface>
22860 -<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="44216">
22861 +<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="44339">
22862 <summary>
22863 Do not audit attempts to send and receive ldap_client packets.
22864 </summary>
22865 @@ -37712,7 +37529,7 @@ Domain to not audit.
22866 </param>
22867 <infoflow type="none"/>
22868 </interface>
22869 -<interface name="corenet_relabelto_ldap_client_packets" lineno="44231">
22870 +<interface name="corenet_relabelto_ldap_client_packets" lineno="44354">
22871 <summary>
22872 Relabel packets to ldap_client the packet type.
22873 </summary>
22874 @@ -37722,7 +37539,7 @@ Domain allowed access.
22875 </summary>
22876 </param>
22877 </interface>
22878 -<interface name="corenet_send_ldap_server_packets" lineno="44251">
22879 +<interface name="corenet_send_ldap_server_packets" lineno="44374">
22880 <summary>
22881 Send ldap_server packets.
22882 </summary>
22883 @@ -37733,7 +37550,7 @@ Domain allowed access.
22884 </param>
22885 <infoflow type="write" weight="10"/>
22886 </interface>
22887 -<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="44270">
22888 +<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="44393">
22889 <summary>
22890 Do not audit attempts to send ldap_server packets.
22891 </summary>
22892 @@ -37744,7 +37561,7 @@ Domain to not audit.
22893 </param>
22894 <infoflow type="none"/>
22895 </interface>
22896 -<interface name="corenet_receive_ldap_server_packets" lineno="44289">
22897 +<interface name="corenet_receive_ldap_server_packets" lineno="44412">
22898 <summary>
22899 Receive ldap_server packets.
22900 </summary>
22901 @@ -37755,7 +37572,7 @@ Domain allowed access.
22902 </param>
22903 <infoflow type="read" weight="10"/>
22904 </interface>
22905 -<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="44308">
22906 +<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="44431">
22907 <summary>
22908 Do not audit attempts to receive ldap_server packets.
22909 </summary>
22910 @@ -37766,7 +37583,7 @@ Domain allowed access.
22911 </param>
22912 <infoflow type="none"/>
22913 </interface>
22914 -<interface name="corenet_sendrecv_ldap_server_packets" lineno="44327">
22915 +<interface name="corenet_sendrecv_ldap_server_packets" lineno="44450">
22916 <summary>
22917 Send and receive ldap_server packets.
22918 </summary>
22919 @@ -37777,7 +37594,7 @@ Domain allowed access.
22920 </param>
22921 <infoflow type="both" weight="10"/>
22922 </interface>
22923 -<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="44343">
22924 +<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="44466">
22925 <summary>
22926 Do not audit attempts to send and receive ldap_server packets.
22927 </summary>
22928 @@ -37788,7 +37605,7 @@ Domain to not audit.
22929 </param>
22930 <infoflow type="none"/>
22931 </interface>
22932 -<interface name="corenet_relabelto_ldap_server_packets" lineno="44358">
22933 +<interface name="corenet_relabelto_ldap_server_packets" lineno="44481">
22934 <summary>
22935 Relabel packets to ldap_server the packet type.
22936 </summary>
22937 @@ -37798,7 +37615,7 @@ Domain allowed access.
22938 </summary>
22939 </param>
22940 </interface>
22941 -<interface name="corenet_tcp_sendrecv_lirc_port" lineno="44380">
22942 +<interface name="corenet_tcp_sendrecv_lirc_port" lineno="44503">
22943 <summary>
22944 Send and receive TCP traffic on the lirc port.
22945 </summary>
22946 @@ -37809,7 +37626,7 @@ Domain allowed access.
22947 </param>
22948 <infoflow type="both" weight="10"/>
22949 </interface>
22950 -<interface name="corenet_udp_send_lirc_port" lineno="44395">
22951 +<interface name="corenet_udp_send_lirc_port" lineno="44518">
22952 <summary>
22953 Send UDP traffic on the lirc port.
22954 </summary>
22955 @@ -37820,7 +37637,7 @@ Domain allowed access.
22956 </param>
22957 <infoflow type="write" weight="10"/>
22958 </interface>
22959 -<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="44410">
22960 +<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="44533">
22961 <summary>
22962 Do not audit attempts to send UDP traffic on the lirc port.
22963 </summary>
22964 @@ -37831,7 +37648,7 @@ Domain to not audit.
22965 </param>
22966 <infoflow type="none"/>
22967 </interface>
22968 -<interface name="corenet_udp_receive_lirc_port" lineno="44425">
22969 +<interface name="corenet_udp_receive_lirc_port" lineno="44548">
22970 <summary>
22971 Receive UDP traffic on the lirc port.
22972 </summary>
22973 @@ -37842,7 +37659,7 @@ Domain allowed access.
22974 </param>
22975 <infoflow type="read" weight="10"/>
22976 </interface>
22977 -<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="44440">
22978 +<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="44563">
22979 <summary>
22980 Do not audit attempts to receive UDP traffic on the lirc port.
22981 </summary>
22982 @@ -37853,7 +37670,7 @@ Domain to not audit.
22983 </param>
22984 <infoflow type="none"/>
22985 </interface>
22986 -<interface name="corenet_udp_sendrecv_lirc_port" lineno="44455">
22987 +<interface name="corenet_udp_sendrecv_lirc_port" lineno="44578">
22988 <summary>
22989 Send and receive UDP traffic on the lirc port.
22990 </summary>
22991 @@ -37864,7 +37681,7 @@ Domain allowed access.
22992 </param>
22993 <infoflow type="both" weight="10"/>
22994 </interface>
22995 -<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="44471">
22996 +<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="44594">
22997 <summary>
22998 Do not audit attempts to send and receive
22999 UDP traffic on the lirc port.
23000 @@ -37876,7 +37693,7 @@ Domain to not audit.
23001 </param>
23002 <infoflow type="none"/>
23003 </interface>
23004 -<interface name="corenet_tcp_bind_lirc_port" lineno="44486">
23005 +<interface name="corenet_tcp_bind_lirc_port" lineno="44609">
23006 <summary>
23007 Bind TCP sockets to the lirc port.
23008 </summary>
23009 @@ -37887,7 +37704,7 @@ Domain allowed access.
23010 </param>
23011 <infoflow type="none"/>
23012 </interface>
23013 -<interface name="corenet_udp_bind_lirc_port" lineno="44506">
23014 +<interface name="corenet_udp_bind_lirc_port" lineno="44629">
23015 <summary>
23016 Bind UDP sockets to the lirc port.
23017 </summary>
23018 @@ -37898,7 +37715,7 @@ Domain allowed access.
23019 </param>
23020 <infoflow type="none"/>
23021 </interface>
23022 -<interface name="corenet_tcp_connect_lirc_port" lineno="44525">
23023 +<interface name="corenet_tcp_connect_lirc_port" lineno="44648">
23024 <summary>
23025 Make a TCP connection to the lirc port.
23026 </summary>
23027 @@ -37908,7 +37725,7 @@ Domain allowed access.
23028 </summary>
23029 </param>
23030 </interface>
23031 -<interface name="corenet_send_lirc_client_packets" lineno="44545">
23032 +<interface name="corenet_send_lirc_client_packets" lineno="44668">
23033 <summary>
23034 Send lirc_client packets.
23035 </summary>
23036 @@ -37919,7 +37736,7 @@ Domain allowed access.
23037 </param>
23038 <infoflow type="write" weight="10"/>
23039 </interface>
23040 -<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="44564">
23041 +<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="44687">
23042 <summary>
23043 Do not audit attempts to send lirc_client packets.
23044 </summary>
23045 @@ -37930,7 +37747,7 @@ Domain to not audit.
23046 </param>
23047 <infoflow type="none"/>
23048 </interface>
23049 -<interface name="corenet_receive_lirc_client_packets" lineno="44583">
23050 +<interface name="corenet_receive_lirc_client_packets" lineno="44706">
23051 <summary>
23052 Receive lirc_client packets.
23053 </summary>
23054 @@ -37941,7 +37758,7 @@ Domain allowed access.
23055 </param>
23056 <infoflow type="read" weight="10"/>
23057 </interface>
23058 -<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="44602">
23059 +<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="44725">
23060 <summary>
23061 Do not audit attempts to receive lirc_client packets.
23062 </summary>
23063 @@ -37952,7 +37769,7 @@ Domain allowed access.
23064 </param>
23065 <infoflow type="none"/>
23066 </interface>
23067 -<interface name="corenet_sendrecv_lirc_client_packets" lineno="44621">
23068 +<interface name="corenet_sendrecv_lirc_client_packets" lineno="44744">
23069 <summary>
23070 Send and receive lirc_client packets.
23071 </summary>
23072 @@ -37963,7 +37780,7 @@ Domain allowed access.
23073 </param>
23074 <infoflow type="both" weight="10"/>
23075 </interface>
23076 -<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="44637">
23077 +<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="44760">
23078 <summary>
23079 Do not audit attempts to send and receive lirc_client packets.
23080 </summary>
23081 @@ -37974,7 +37791,7 @@ Domain to not audit.
23082 </param>
23083 <infoflow type="none"/>
23084 </interface>
23085 -<interface name="corenet_relabelto_lirc_client_packets" lineno="44652">
23086 +<interface name="corenet_relabelto_lirc_client_packets" lineno="44775">
23087 <summary>
23088 Relabel packets to lirc_client the packet type.
23089 </summary>
23090 @@ -37984,7 +37801,7 @@ Domain allowed access.
23091 </summary>
23092 </param>
23093 </interface>
23094 -<interface name="corenet_send_lirc_server_packets" lineno="44672">
23095 +<interface name="corenet_send_lirc_server_packets" lineno="44795">
23096 <summary>
23097 Send lirc_server packets.
23098 </summary>
23099 @@ -37995,7 +37812,7 @@ Domain allowed access.
23100 </param>
23101 <infoflow type="write" weight="10"/>
23102 </interface>
23103 -<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="44691">
23104 +<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="44814">
23105 <summary>
23106 Do not audit attempts to send lirc_server packets.
23107 </summary>
23108 @@ -38006,7 +37823,7 @@ Domain to not audit.
23109 </param>
23110 <infoflow type="none"/>
23111 </interface>
23112 -<interface name="corenet_receive_lirc_server_packets" lineno="44710">
23113 +<interface name="corenet_receive_lirc_server_packets" lineno="44833">
23114 <summary>
23115 Receive lirc_server packets.
23116 </summary>
23117 @@ -38017,7 +37834,7 @@ Domain allowed access.
23118 </param>
23119 <infoflow type="read" weight="10"/>
23120 </interface>
23121 -<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="44729">
23122 +<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="44852">
23123 <summary>
23124 Do not audit attempts to receive lirc_server packets.
23125 </summary>
23126 @@ -38028,7 +37845,7 @@ Domain allowed access.
23127 </param>
23128 <infoflow type="none"/>
23129 </interface>
23130 -<interface name="corenet_sendrecv_lirc_server_packets" lineno="44748">
23131 +<interface name="corenet_sendrecv_lirc_server_packets" lineno="44871">
23132 <summary>
23133 Send and receive lirc_server packets.
23134 </summary>
23135 @@ -38039,7 +37856,7 @@ Domain allowed access.
23136 </param>
23137 <infoflow type="both" weight="10"/>
23138 </interface>
23139 -<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="44764">
23140 +<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="44887">
23141 <summary>
23142 Do not audit attempts to send and receive lirc_server packets.
23143 </summary>
23144 @@ -38050,7 +37867,7 @@ Domain to not audit.
23145 </param>
23146 <infoflow type="none"/>
23147 </interface>
23148 -<interface name="corenet_relabelto_lirc_server_packets" lineno="44779">
23149 +<interface name="corenet_relabelto_lirc_server_packets" lineno="44902">
23150 <summary>
23151 Relabel packets to lirc_server the packet type.
23152 </summary>
23153 @@ -38060,7 +37877,7 @@ Domain allowed access.
23154 </summary>
23155 </param>
23156 </interface>
23157 -<interface name="corenet_tcp_sendrecv_llmnr_port" lineno="44801">
23158 +<interface name="corenet_tcp_sendrecv_llmnr_port" lineno="44924">
23159 <summary>
23160 Send and receive TCP traffic on the llmnr port.
23161 </summary>
23162 @@ -38071,7 +37888,7 @@ Domain allowed access.
23163 </param>
23164 <infoflow type="both" weight="10"/>
23165 </interface>
23166 -<interface name="corenet_udp_send_llmnr_port" lineno="44816">
23167 +<interface name="corenet_udp_send_llmnr_port" lineno="44939">
23168 <summary>
23169 Send UDP traffic on the llmnr port.
23170 </summary>
23171 @@ -38082,7 +37899,7 @@ Domain allowed access.
23172 </param>
23173 <infoflow type="write" weight="10"/>
23174 </interface>
23175 -<interface name="corenet_dontaudit_udp_send_llmnr_port" lineno="44831">
23176 +<interface name="corenet_dontaudit_udp_send_llmnr_port" lineno="44954">
23177 <summary>
23178 Do not audit attempts to send UDP traffic on the llmnr port.
23179 </summary>
23180 @@ -38093,7 +37910,7 @@ Domain to not audit.
23181 </param>
23182 <infoflow type="none"/>
23183 </interface>
23184 -<interface name="corenet_udp_receive_llmnr_port" lineno="44846">
23185 +<interface name="corenet_udp_receive_llmnr_port" lineno="44969">
23186 <summary>
23187 Receive UDP traffic on the llmnr port.
23188 </summary>
23189 @@ -38104,7 +37921,7 @@ Domain allowed access.
23190 </param>
23191 <infoflow type="read" weight="10"/>
23192 </interface>
23193 -<interface name="corenet_dontaudit_udp_receive_llmnr_port" lineno="44861">
23194 +<interface name="corenet_dontaudit_udp_receive_llmnr_port" lineno="44984">
23195 <summary>
23196 Do not audit attempts to receive UDP traffic on the llmnr port.
23197 </summary>
23198 @@ -38115,7 +37932,7 @@ Domain to not audit.
23199 </param>
23200 <infoflow type="none"/>
23201 </interface>
23202 -<interface name="corenet_udp_sendrecv_llmnr_port" lineno="44876">
23203 +<interface name="corenet_udp_sendrecv_llmnr_port" lineno="44999">
23204 <summary>
23205 Send and receive UDP traffic on the llmnr port.
23206 </summary>
23207 @@ -38126,7 +37943,7 @@ Domain allowed access.
23208 </param>
23209 <infoflow type="both" weight="10"/>
23210 </interface>
23211 -<interface name="corenet_dontaudit_udp_sendrecv_llmnr_port" lineno="44892">
23212 +<interface name="corenet_dontaudit_udp_sendrecv_llmnr_port" lineno="45015">
23213 <summary>
23214 Do not audit attempts to send and receive
23215 UDP traffic on the llmnr port.
23216 @@ -38138,7 +37955,7 @@ Domain to not audit.
23217 </param>
23218 <infoflow type="none"/>
23219 </interface>
23220 -<interface name="corenet_tcp_bind_llmnr_port" lineno="44907">
23221 +<interface name="corenet_tcp_bind_llmnr_port" lineno="45030">
23222 <summary>
23223 Bind TCP sockets to the llmnr port.
23224 </summary>
23225 @@ -38149,7 +37966,7 @@ Domain allowed access.
23226 </param>
23227 <infoflow type="none"/>
23228 </interface>
23229 -<interface name="corenet_udp_bind_llmnr_port" lineno="44927">
23230 +<interface name="corenet_udp_bind_llmnr_port" lineno="45050">
23231 <summary>
23232 Bind UDP sockets to the llmnr port.
23233 </summary>
23234 @@ -38160,7 +37977,7 @@ Domain allowed access.
23235 </param>
23236 <infoflow type="none"/>
23237 </interface>
23238 -<interface name="corenet_tcp_connect_llmnr_port" lineno="44946">
23239 +<interface name="corenet_tcp_connect_llmnr_port" lineno="45069">
23240 <summary>
23241 Make a TCP connection to the llmnr port.
23242 </summary>
23243 @@ -38170,7 +37987,7 @@ Domain allowed access.
23244 </summary>
23245 </param>
23246 </interface>
23247 -<interface name="corenet_send_llmnr_client_packets" lineno="44966">
23248 +<interface name="corenet_send_llmnr_client_packets" lineno="45089">
23249 <summary>
23250 Send llmnr_client packets.
23251 </summary>
23252 @@ -38181,7 +37998,7 @@ Domain allowed access.
23253 </param>
23254 <infoflow type="write" weight="10"/>
23255 </interface>
23256 -<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="44985">
23257 +<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="45108">
23258 <summary>
23259 Do not audit attempts to send llmnr_client packets.
23260 </summary>
23261 @@ -38192,7 +38009,7 @@ Domain to not audit.
23262 </param>
23263 <infoflow type="none"/>
23264 </interface>
23265 -<interface name="corenet_receive_llmnr_client_packets" lineno="45004">
23266 +<interface name="corenet_receive_llmnr_client_packets" lineno="45127">
23267 <summary>
23268 Receive llmnr_client packets.
23269 </summary>
23270 @@ -38203,7 +38020,7 @@ Domain allowed access.
23271 </param>
23272 <infoflow type="read" weight="10"/>
23273 </interface>
23274 -<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="45023">
23275 +<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="45146">
23276 <summary>
23277 Do not audit attempts to receive llmnr_client packets.
23278 </summary>
23279 @@ -38214,7 +38031,7 @@ Domain allowed access.
23280 </param>
23281 <infoflow type="none"/>
23282 </interface>
23283 -<interface name="corenet_sendrecv_llmnr_client_packets" lineno="45042">
23284 +<interface name="corenet_sendrecv_llmnr_client_packets" lineno="45165">
23285 <summary>
23286 Send and receive llmnr_client packets.
23287 </summary>
23288 @@ -38225,7 +38042,7 @@ Domain allowed access.
23289 </param>
23290 <infoflow type="both" weight="10"/>
23291 </interface>
23292 -<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="45058">
23293 +<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="45181">
23294 <summary>
23295 Do not audit attempts to send and receive llmnr_client packets.
23296 </summary>
23297 @@ -38236,7 +38053,7 @@ Domain to not audit.
23298 </param>
23299 <infoflow type="none"/>
23300 </interface>
23301 -<interface name="corenet_relabelto_llmnr_client_packets" lineno="45073">
23302 +<interface name="corenet_relabelto_llmnr_client_packets" lineno="45196">
23303 <summary>
23304 Relabel packets to llmnr_client the packet type.
23305 </summary>
23306 @@ -38246,7 +38063,7 @@ Domain allowed access.
23307 </summary>
23308 </param>
23309 </interface>
23310 -<interface name="corenet_send_llmnr_server_packets" lineno="45093">
23311 +<interface name="corenet_send_llmnr_server_packets" lineno="45216">
23312 <summary>
23313 Send llmnr_server packets.
23314 </summary>
23315 @@ -38257,7 +38074,7 @@ Domain allowed access.
23316 </param>
23317 <infoflow type="write" weight="10"/>
23318 </interface>
23319 -<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="45112">
23320 +<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="45235">
23321 <summary>
23322 Do not audit attempts to send llmnr_server packets.
23323 </summary>
23324 @@ -38268,7 +38085,7 @@ Domain to not audit.
23325 </param>
23326 <infoflow type="none"/>
23327 </interface>
23328 -<interface name="corenet_receive_llmnr_server_packets" lineno="45131">
23329 +<interface name="corenet_receive_llmnr_server_packets" lineno="45254">
23330 <summary>
23331 Receive llmnr_server packets.
23332 </summary>
23333 @@ -38279,7 +38096,7 @@ Domain allowed access.
23334 </param>
23335 <infoflow type="read" weight="10"/>
23336 </interface>
23337 -<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="45150">
23338 +<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="45273">
23339 <summary>
23340 Do not audit attempts to receive llmnr_server packets.
23341 </summary>
23342 @@ -38290,7 +38107,7 @@ Domain allowed access.
23343 </param>
23344 <infoflow type="none"/>
23345 </interface>
23346 -<interface name="corenet_sendrecv_llmnr_server_packets" lineno="45169">
23347 +<interface name="corenet_sendrecv_llmnr_server_packets" lineno="45292">
23348 <summary>
23349 Send and receive llmnr_server packets.
23350 </summary>
23351 @@ -38301,7 +38118,7 @@ Domain allowed access.
23352 </param>
23353 <infoflow type="both" weight="10"/>
23354 </interface>
23355 -<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="45185">
23356 +<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="45308">
23357 <summary>
23358 Do not audit attempts to send and receive llmnr_server packets.
23359 </summary>
23360 @@ -38312,7 +38129,7 @@ Domain to not audit.
23361 </param>
23362 <infoflow type="none"/>
23363 </interface>
23364 -<interface name="corenet_relabelto_llmnr_server_packets" lineno="45200">
23365 +<interface name="corenet_relabelto_llmnr_server_packets" lineno="45323">
23366 <summary>
23367 Relabel packets to llmnr_server the packet type.
23368 </summary>
23369 @@ -38322,7 +38139,7 @@ Domain allowed access.
23370 </summary>
23371 </param>
23372 </interface>
23373 -<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="45222">
23374 +<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="45345">
23375 <summary>
23376 Send and receive TCP traffic on the lmtp port.
23377 </summary>
23378 @@ -38333,7 +38150,7 @@ Domain allowed access.
23379 </param>
23380 <infoflow type="both" weight="10"/>
23381 </interface>
23382 -<interface name="corenet_udp_send_lmtp_port" lineno="45237">
23383 +<interface name="corenet_udp_send_lmtp_port" lineno="45360">
23384 <summary>
23385 Send UDP traffic on the lmtp port.
23386 </summary>
23387 @@ -38344,7 +38161,7 @@ Domain allowed access.
23388 </param>
23389 <infoflow type="write" weight="10"/>
23390 </interface>
23391 -<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="45252">
23392 +<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="45375">
23393 <summary>
23394 Do not audit attempts to send UDP traffic on the lmtp port.
23395 </summary>
23396 @@ -38355,7 +38172,7 @@ Domain to not audit.
23397 </param>
23398 <infoflow type="none"/>
23399 </interface>
23400 -<interface name="corenet_udp_receive_lmtp_port" lineno="45267">
23401 +<interface name="corenet_udp_receive_lmtp_port" lineno="45390">
23402 <summary>
23403 Receive UDP traffic on the lmtp port.
23404 </summary>
23405 @@ -38366,7 +38183,7 @@ Domain allowed access.
23406 </param>
23407 <infoflow type="read" weight="10"/>
23408 </interface>
23409 -<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="45282">
23410 +<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="45405">
23411 <summary>
23412 Do not audit attempts to receive UDP traffic on the lmtp port.
23413 </summary>
23414 @@ -38377,7 +38194,7 @@ Domain to not audit.
23415 </param>
23416 <infoflow type="none"/>
23417 </interface>
23418 -<interface name="corenet_udp_sendrecv_lmtp_port" lineno="45297">
23419 +<interface name="corenet_udp_sendrecv_lmtp_port" lineno="45420">
23420 <summary>
23421 Send and receive UDP traffic on the lmtp port.
23422 </summary>
23423 @@ -38388,7 +38205,7 @@ Domain allowed access.
23424 </param>
23425 <infoflow type="both" weight="10"/>
23426 </interface>
23427 -<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="45313">
23428 +<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="45436">
23429 <summary>
23430 Do not audit attempts to send and receive
23431 UDP traffic on the lmtp port.
23432 @@ -38400,7 +38217,7 @@ Domain to not audit.
23433 </param>
23434 <infoflow type="none"/>
23435 </interface>
23436 -<interface name="corenet_tcp_bind_lmtp_port" lineno="45328">
23437 +<interface name="corenet_tcp_bind_lmtp_port" lineno="45451">
23438 <summary>
23439 Bind TCP sockets to the lmtp port.
23440 </summary>
23441 @@ -38411,7 +38228,7 @@ Domain allowed access.
23442 </param>
23443 <infoflow type="none"/>
23444 </interface>
23445 -<interface name="corenet_udp_bind_lmtp_port" lineno="45348">
23446 +<interface name="corenet_udp_bind_lmtp_port" lineno="45471">
23447 <summary>
23448 Bind UDP sockets to the lmtp port.
23449 </summary>
23450 @@ -38422,7 +38239,7 @@ Domain allowed access.
23451 </param>
23452 <infoflow type="none"/>
23453 </interface>
23454 -<interface name="corenet_tcp_connect_lmtp_port" lineno="45367">
23455 +<interface name="corenet_tcp_connect_lmtp_port" lineno="45490">
23456 <summary>
23457 Make a TCP connection to the lmtp port.
23458 </summary>
23459 @@ -38432,7 +38249,7 @@ Domain allowed access.
23460 </summary>
23461 </param>
23462 </interface>
23463 -<interface name="corenet_send_lmtp_client_packets" lineno="45387">
23464 +<interface name="corenet_send_lmtp_client_packets" lineno="45510">
23465 <summary>
23466 Send lmtp_client packets.
23467 </summary>
23468 @@ -38443,7 +38260,7 @@ Domain allowed access.
23469 </param>
23470 <infoflow type="write" weight="10"/>
23471 </interface>
23472 -<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="45406">
23473 +<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="45529">
23474 <summary>
23475 Do not audit attempts to send lmtp_client packets.
23476 </summary>
23477 @@ -38454,7 +38271,7 @@ Domain to not audit.
23478 </param>
23479 <infoflow type="none"/>
23480 </interface>
23481 -<interface name="corenet_receive_lmtp_client_packets" lineno="45425">
23482 +<interface name="corenet_receive_lmtp_client_packets" lineno="45548">
23483 <summary>
23484 Receive lmtp_client packets.
23485 </summary>
23486 @@ -38465,7 +38282,7 @@ Domain allowed access.
23487 </param>
23488 <infoflow type="read" weight="10"/>
23489 </interface>
23490 -<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="45444">
23491 +<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="45567">
23492 <summary>
23493 Do not audit attempts to receive lmtp_client packets.
23494 </summary>
23495 @@ -38476,7 +38293,7 @@ Domain allowed access.
23496 </param>
23497 <infoflow type="none"/>
23498 </interface>
23499 -<interface name="corenet_sendrecv_lmtp_client_packets" lineno="45463">
23500 +<interface name="corenet_sendrecv_lmtp_client_packets" lineno="45586">
23501 <summary>
23502 Send and receive lmtp_client packets.
23503 </summary>
23504 @@ -38487,7 +38304,7 @@ Domain allowed access.
23505 </param>
23506 <infoflow type="both" weight="10"/>
23507 </interface>
23508 -<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="45479">
23509 +<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="45602">
23510 <summary>
23511 Do not audit attempts to send and receive lmtp_client packets.
23512 </summary>
23513 @@ -38498,7 +38315,7 @@ Domain to not audit.
23514 </param>
23515 <infoflow type="none"/>
23516 </interface>
23517 -<interface name="corenet_relabelto_lmtp_client_packets" lineno="45494">
23518 +<interface name="corenet_relabelto_lmtp_client_packets" lineno="45617">
23519 <summary>
23520 Relabel packets to lmtp_client the packet type.
23521 </summary>
23522 @@ -38508,7 +38325,7 @@ Domain allowed access.
23523 </summary>
23524 </param>
23525 </interface>
23526 -<interface name="corenet_send_lmtp_server_packets" lineno="45514">
23527 +<interface name="corenet_send_lmtp_server_packets" lineno="45637">
23528 <summary>
23529 Send lmtp_server packets.
23530 </summary>
23531 @@ -38519,7 +38336,7 @@ Domain allowed access.
23532 </param>
23533 <infoflow type="write" weight="10"/>
23534 </interface>
23535 -<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="45533">
23536 +<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="45656">
23537 <summary>
23538 Do not audit attempts to send lmtp_server packets.
23539 </summary>
23540 @@ -38530,7 +38347,7 @@ Domain to not audit.
23541 </param>
23542 <infoflow type="none"/>
23543 </interface>
23544 -<interface name="corenet_receive_lmtp_server_packets" lineno="45552">
23545 +<interface name="corenet_receive_lmtp_server_packets" lineno="45675">
23546 <summary>
23547 Receive lmtp_server packets.
23548 </summary>
23549 @@ -38541,7 +38358,7 @@ Domain allowed access.
23550 </param>
23551 <infoflow type="read" weight="10"/>
23552 </interface>
23553 -<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="45571">
23554 +<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="45694">
23555 <summary>
23556 Do not audit attempts to receive lmtp_server packets.
23557 </summary>
23558 @@ -38552,7 +38369,7 @@ Domain allowed access.
23559 </param>
23560 <infoflow type="none"/>
23561 </interface>
23562 -<interface name="corenet_sendrecv_lmtp_server_packets" lineno="45590">
23563 +<interface name="corenet_sendrecv_lmtp_server_packets" lineno="45713">
23564 <summary>
23565 Send and receive lmtp_server packets.
23566 </summary>
23567 @@ -38563,7 +38380,7 @@ Domain allowed access.
23568 </param>
23569 <infoflow type="both" weight="10"/>
23570 </interface>
23571 -<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="45606">
23572 +<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="45729">
23573 <summary>
23574 Do not audit attempts to send and receive lmtp_server packets.
23575 </summary>
23576 @@ -38574,7 +38391,7 @@ Domain to not audit.
23577 </param>
23578 <infoflow type="none"/>
23579 </interface>
23580 -<interface name="corenet_relabelto_lmtp_server_packets" lineno="45621">
23581 +<interface name="corenet_relabelto_lmtp_server_packets" lineno="45744">
23582 <summary>
23583 Relabel packets to lmtp_server the packet type.
23584 </summary>
23585 @@ -38584,7 +38401,7 @@ Domain allowed access.
23586 </summary>
23587 </param>
23588 </interface>
23589 -<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="45643">
23590 +<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="45766">
23591 <summary>
23592 Send and receive TCP traffic on the lrrd port.
23593 </summary>
23594 @@ -38595,7 +38412,7 @@ Domain allowed access.
23595 </param>
23596 <infoflow type="both" weight="10"/>
23597 </interface>
23598 -<interface name="corenet_udp_send_lrrd_port" lineno="45658">
23599 +<interface name="corenet_udp_send_lrrd_port" lineno="45781">
23600 <summary>
23601 Send UDP traffic on the lrrd port.
23602 </summary>
23603 @@ -38606,7 +38423,7 @@ Domain allowed access.
23604 </param>
23605 <infoflow type="write" weight="10"/>
23606 </interface>
23607 -<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="45673">
23608 +<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="45796">
23609 <summary>
23610 Do not audit attempts to send UDP traffic on the lrrd port.
23611 </summary>
23612 @@ -38617,7 +38434,7 @@ Domain to not audit.
23613 </param>
23614 <infoflow type="none"/>
23615 </interface>
23616 -<interface name="corenet_udp_receive_lrrd_port" lineno="45688">
23617 +<interface name="corenet_udp_receive_lrrd_port" lineno="45811">
23618 <summary>
23619 Receive UDP traffic on the lrrd port.
23620 </summary>
23621 @@ -38628,7 +38445,7 @@ Domain allowed access.
23622 </param>
23623 <infoflow type="read" weight="10"/>
23624 </interface>
23625 -<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="45703">
23626 +<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="45826">
23627 <summary>
23628 Do not audit attempts to receive UDP traffic on the lrrd port.
23629 </summary>
23630 @@ -38639,7 +38456,7 @@ Domain to not audit.
23631 </param>
23632 <infoflow type="none"/>
23633 </interface>
23634 -<interface name="corenet_udp_sendrecv_lrrd_port" lineno="45718">
23635 +<interface name="corenet_udp_sendrecv_lrrd_port" lineno="45841">
23636 <summary>
23637 Send and receive UDP traffic on the lrrd port.
23638 </summary>
23639 @@ -38650,7 +38467,7 @@ Domain allowed access.
23640 </param>
23641 <infoflow type="both" weight="10"/>
23642 </interface>
23643 -<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="45734">
23644 +<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="45857">
23645 <summary>
23646 Do not audit attempts to send and receive
23647 UDP traffic on the lrrd port.
23648 @@ -38662,7 +38479,7 @@ Domain to not audit.
23649 </param>
23650 <infoflow type="none"/>
23651 </interface>
23652 -<interface name="corenet_tcp_bind_lrrd_port" lineno="45749">
23653 +<interface name="corenet_tcp_bind_lrrd_port" lineno="45872">
23654 <summary>
23655 Bind TCP sockets to the lrrd port.
23656 </summary>
23657 @@ -38673,7 +38490,7 @@ Domain allowed access.
23658 </param>
23659 <infoflow type="none"/>
23660 </interface>
23661 -<interface name="corenet_udp_bind_lrrd_port" lineno="45769">
23662 +<interface name="corenet_udp_bind_lrrd_port" lineno="45892">
23663 <summary>
23664 Bind UDP sockets to the lrrd port.
23665 </summary>
23666 @@ -38684,7 +38501,7 @@ Domain allowed access.
23667 </param>
23668 <infoflow type="none"/>
23669 </interface>
23670 -<interface name="corenet_tcp_connect_lrrd_port" lineno="45788">
23671 +<interface name="corenet_tcp_connect_lrrd_port" lineno="45911">
23672 <summary>
23673 Make a TCP connection to the lrrd port.
23674 </summary>
23675 @@ -38694,7 +38511,7 @@ Domain allowed access.
23676 </summary>
23677 </param>
23678 </interface>
23679 -<interface name="corenet_send_lrrd_client_packets" lineno="45808">
23680 +<interface name="corenet_send_lrrd_client_packets" lineno="45931">
23681 <summary>
23682 Send lrrd_client packets.
23683 </summary>
23684 @@ -38705,7 +38522,7 @@ Domain allowed access.
23685 </param>
23686 <infoflow type="write" weight="10"/>
23687 </interface>
23688 -<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="45827">
23689 +<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="45950">
23690 <summary>
23691 Do not audit attempts to send lrrd_client packets.
23692 </summary>
23693 @@ -38716,7 +38533,7 @@ Domain to not audit.
23694 </param>
23695 <infoflow type="none"/>
23696 </interface>
23697 -<interface name="corenet_receive_lrrd_client_packets" lineno="45846">
23698 +<interface name="corenet_receive_lrrd_client_packets" lineno="45969">
23699 <summary>
23700 Receive lrrd_client packets.
23701 </summary>
23702 @@ -38727,7 +38544,7 @@ Domain allowed access.
23703 </param>
23704 <infoflow type="read" weight="10"/>
23705 </interface>
23706 -<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="45865">
23707 +<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="45988">
23708 <summary>
23709 Do not audit attempts to receive lrrd_client packets.
23710 </summary>
23711 @@ -38738,7 +38555,7 @@ Domain allowed access.
23712 </param>
23713 <infoflow type="none"/>
23714 </interface>
23715 -<interface name="corenet_sendrecv_lrrd_client_packets" lineno="45884">
23716 +<interface name="corenet_sendrecv_lrrd_client_packets" lineno="46007">
23717 <summary>
23718 Send and receive lrrd_client packets.
23719 </summary>
23720 @@ -38749,7 +38566,7 @@ Domain allowed access.
23721 </param>
23722 <infoflow type="both" weight="10"/>
23723 </interface>
23724 -<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="45900">
23725 +<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="46023">
23726 <summary>
23727 Do not audit attempts to send and receive lrrd_client packets.
23728 </summary>
23729 @@ -38760,7 +38577,7 @@ Domain to not audit.
23730 </param>
23731 <infoflow type="none"/>
23732 </interface>
23733 -<interface name="corenet_relabelto_lrrd_client_packets" lineno="45915">
23734 +<interface name="corenet_relabelto_lrrd_client_packets" lineno="46038">
23735 <summary>
23736 Relabel packets to lrrd_client the packet type.
23737 </summary>
23738 @@ -38770,7 +38587,7 @@ Domain allowed access.
23739 </summary>
23740 </param>
23741 </interface>
23742 -<interface name="corenet_send_lrrd_server_packets" lineno="45935">
23743 +<interface name="corenet_send_lrrd_server_packets" lineno="46058">
23744 <summary>
23745 Send lrrd_server packets.
23746 </summary>
23747 @@ -38781,7 +38598,7 @@ Domain allowed access.
23748 </param>
23749 <infoflow type="write" weight="10"/>
23750 </interface>
23751 -<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="45954">
23752 +<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="46077">
23753 <summary>
23754 Do not audit attempts to send lrrd_server packets.
23755 </summary>
23756 @@ -38792,7 +38609,7 @@ Domain to not audit.
23757 </param>
23758 <infoflow type="none"/>
23759 </interface>
23760 -<interface name="corenet_receive_lrrd_server_packets" lineno="45973">
23761 +<interface name="corenet_receive_lrrd_server_packets" lineno="46096">
23762 <summary>
23763 Receive lrrd_server packets.
23764 </summary>
23765 @@ -38803,7 +38620,7 @@ Domain allowed access.
23766 </param>
23767 <infoflow type="read" weight="10"/>
23768 </interface>
23769 -<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="45992">
23770 +<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="46115">
23771 <summary>
23772 Do not audit attempts to receive lrrd_server packets.
23773 </summary>
23774 @@ -38814,7 +38631,7 @@ Domain allowed access.
23775 </param>
23776 <infoflow type="none"/>
23777 </interface>
23778 -<interface name="corenet_sendrecv_lrrd_server_packets" lineno="46011">
23779 +<interface name="corenet_sendrecv_lrrd_server_packets" lineno="46134">
23780 <summary>
23781 Send and receive lrrd_server packets.
23782 </summary>
23783 @@ -38825,7 +38642,7 @@ Domain allowed access.
23784 </param>
23785 <infoflow type="both" weight="10"/>
23786 </interface>
23787 -<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="46027">
23788 +<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="46150">
23789 <summary>
23790 Do not audit attempts to send and receive lrrd_server packets.
23791 </summary>
23792 @@ -38836,7 +38653,7 @@ Domain to not audit.
23793 </param>
23794 <infoflow type="none"/>
23795 </interface>
23796 -<interface name="corenet_relabelto_lrrd_server_packets" lineno="46042">
23797 +<interface name="corenet_relabelto_lrrd_server_packets" lineno="46165">
23798 <summary>
23799 Relabel packets to lrrd_server the packet type.
23800 </summary>
23801 @@ -38846,7 +38663,7 @@ Domain allowed access.
23802 </summary>
23803 </param>
23804 </interface>
23805 -<interface name="corenet_tcp_sendrecv_mail_port" lineno="46064">
23806 +<interface name="corenet_tcp_sendrecv_mail_port" lineno="46187">
23807 <summary>
23808 Send and receive TCP traffic on the mail port.
23809 </summary>
23810 @@ -38857,7 +38674,7 @@ Domain allowed access.
23811 </param>
23812 <infoflow type="both" weight="10"/>
23813 </interface>
23814 -<interface name="corenet_udp_send_mail_port" lineno="46079">
23815 +<interface name="corenet_udp_send_mail_port" lineno="46202">
23816 <summary>
23817 Send UDP traffic on the mail port.
23818 </summary>
23819 @@ -38868,7 +38685,7 @@ Domain allowed access.
23820 </param>
23821 <infoflow type="write" weight="10"/>
23822 </interface>
23823 -<interface name="corenet_dontaudit_udp_send_mail_port" lineno="46094">
23824 +<interface name="corenet_dontaudit_udp_send_mail_port" lineno="46217">
23825 <summary>
23826 Do not audit attempts to send UDP traffic on the mail port.
23827 </summary>
23828 @@ -38879,7 +38696,7 @@ Domain to not audit.
23829 </param>
23830 <infoflow type="none"/>
23831 </interface>
23832 -<interface name="corenet_udp_receive_mail_port" lineno="46109">
23833 +<interface name="corenet_udp_receive_mail_port" lineno="46232">
23834 <summary>
23835 Receive UDP traffic on the mail port.
23836 </summary>
23837 @@ -38890,7 +38707,7 @@ Domain allowed access.
23838 </param>
23839 <infoflow type="read" weight="10"/>
23840 </interface>
23841 -<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="46124">
23842 +<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="46247">
23843 <summary>
23844 Do not audit attempts to receive UDP traffic on the mail port.
23845 </summary>
23846 @@ -38901,7 +38718,7 @@ Domain to not audit.
23847 </param>
23848 <infoflow type="none"/>
23849 </interface>
23850 -<interface name="corenet_udp_sendrecv_mail_port" lineno="46139">
23851 +<interface name="corenet_udp_sendrecv_mail_port" lineno="46262">
23852 <summary>
23853 Send and receive UDP traffic on the mail port.
23854 </summary>
23855 @@ -38912,7 +38729,7 @@ Domain allowed access.
23856 </param>
23857 <infoflow type="both" weight="10"/>
23858 </interface>
23859 -<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="46155">
23860 +<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="46278">
23861 <summary>
23862 Do not audit attempts to send and receive
23863 UDP traffic on the mail port.
23864 @@ -38924,7 +38741,7 @@ Domain to not audit.
23865 </param>
23866 <infoflow type="none"/>
23867 </interface>
23868 -<interface name="corenet_tcp_bind_mail_port" lineno="46170">
23869 +<interface name="corenet_tcp_bind_mail_port" lineno="46293">
23870 <summary>
23871 Bind TCP sockets to the mail port.
23872 </summary>
23873 @@ -38935,7 +38752,7 @@ Domain allowed access.
23874 </param>
23875 <infoflow type="none"/>
23876 </interface>
23877 -<interface name="corenet_udp_bind_mail_port" lineno="46190">
23878 +<interface name="corenet_udp_bind_mail_port" lineno="46313">
23879 <summary>
23880 Bind UDP sockets to the mail port.
23881 </summary>
23882 @@ -38946,7 +38763,7 @@ Domain allowed access.
23883 </param>
23884 <infoflow type="none"/>
23885 </interface>
23886 -<interface name="corenet_tcp_connect_mail_port" lineno="46209">
23887 +<interface name="corenet_tcp_connect_mail_port" lineno="46332">
23888 <summary>
23889 Make a TCP connection to the mail port.
23890 </summary>
23891 @@ -38956,7 +38773,7 @@ Domain allowed access.
23892 </summary>
23893 </param>
23894 </interface>
23895 -<interface name="corenet_send_mail_client_packets" lineno="46229">
23896 +<interface name="corenet_send_mail_client_packets" lineno="46352">
23897 <summary>
23898 Send mail_client packets.
23899 </summary>
23900 @@ -38967,7 +38784,7 @@ Domain allowed access.
23901 </param>
23902 <infoflow type="write" weight="10"/>
23903 </interface>
23904 -<interface name="corenet_dontaudit_send_mail_client_packets" lineno="46248">
23905 +<interface name="corenet_dontaudit_send_mail_client_packets" lineno="46371">
23906 <summary>
23907 Do not audit attempts to send mail_client packets.
23908 </summary>
23909 @@ -38978,7 +38795,7 @@ Domain to not audit.
23910 </param>
23911 <infoflow type="none"/>
23912 </interface>
23913 -<interface name="corenet_receive_mail_client_packets" lineno="46267">
23914 +<interface name="corenet_receive_mail_client_packets" lineno="46390">
23915 <summary>
23916 Receive mail_client packets.
23917 </summary>
23918 @@ -38989,7 +38806,7 @@ Domain allowed access.
23919 </param>
23920 <infoflow type="read" weight="10"/>
23921 </interface>
23922 -<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="46286">
23923 +<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="46409">
23924 <summary>
23925 Do not audit attempts to receive mail_client packets.
23926 </summary>
23927 @@ -39000,7 +38817,7 @@ Domain allowed access.
23928 </param>
23929 <infoflow type="none"/>
23930 </interface>
23931 -<interface name="corenet_sendrecv_mail_client_packets" lineno="46305">
23932 +<interface name="corenet_sendrecv_mail_client_packets" lineno="46428">
23933 <summary>
23934 Send and receive mail_client packets.
23935 </summary>
23936 @@ -39011,7 +38828,7 @@ Domain allowed access.
23937 </param>
23938 <infoflow type="both" weight="10"/>
23939 </interface>
23940 -<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="46321">
23941 +<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="46444">
23942 <summary>
23943 Do not audit attempts to send and receive mail_client packets.
23944 </summary>
23945 @@ -39022,7 +38839,7 @@ Domain to not audit.
23946 </param>
23947 <infoflow type="none"/>
23948 </interface>
23949 -<interface name="corenet_relabelto_mail_client_packets" lineno="46336">
23950 +<interface name="corenet_relabelto_mail_client_packets" lineno="46459">
23951 <summary>
23952 Relabel packets to mail_client the packet type.
23953 </summary>
23954 @@ -39032,7 +38849,7 @@ Domain allowed access.
23955 </summary>
23956 </param>
23957 </interface>
23958 -<interface name="corenet_send_mail_server_packets" lineno="46356">
23959 +<interface name="corenet_send_mail_server_packets" lineno="46479">
23960 <summary>
23961 Send mail_server packets.
23962 </summary>
23963 @@ -39043,7 +38860,7 @@ Domain allowed access.
23964 </param>
23965 <infoflow type="write" weight="10"/>
23966 </interface>
23967 -<interface name="corenet_dontaudit_send_mail_server_packets" lineno="46375">
23968 +<interface name="corenet_dontaudit_send_mail_server_packets" lineno="46498">
23969 <summary>
23970 Do not audit attempts to send mail_server packets.
23971 </summary>
23972 @@ -39054,7 +38871,7 @@ Domain to not audit.
23973 </param>
23974 <infoflow type="none"/>
23975 </interface>
23976 -<interface name="corenet_receive_mail_server_packets" lineno="46394">
23977 +<interface name="corenet_receive_mail_server_packets" lineno="46517">
23978 <summary>
23979 Receive mail_server packets.
23980 </summary>
23981 @@ -39065,7 +38882,7 @@ Domain allowed access.
23982 </param>
23983 <infoflow type="read" weight="10"/>
23984 </interface>
23985 -<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="46413">
23986 +<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="46536">
23987 <summary>
23988 Do not audit attempts to receive mail_server packets.
23989 </summary>
23990 @@ -39076,7 +38893,7 @@ Domain allowed access.
23991 </param>
23992 <infoflow type="none"/>
23993 </interface>
23994 -<interface name="corenet_sendrecv_mail_server_packets" lineno="46432">
23995 +<interface name="corenet_sendrecv_mail_server_packets" lineno="46555">
23996 <summary>
23997 Send and receive mail_server packets.
23998 </summary>
23999 @@ -39087,7 +38904,7 @@ Domain allowed access.
24000 </param>
24001 <infoflow type="both" weight="10"/>
24002 </interface>
24003 -<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="46448">
24004 +<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="46571">
24005 <summary>
24006 Do not audit attempts to send and receive mail_server packets.
24007 </summary>
24008 @@ -39098,7 +38915,7 @@ Domain to not audit.
24009 </param>
24010 <infoflow type="none"/>
24011 </interface>
24012 -<interface name="corenet_relabelto_mail_server_packets" lineno="46463">
24013 +<interface name="corenet_relabelto_mail_server_packets" lineno="46586">
24014 <summary>
24015 Relabel packets to mail_server the packet type.
24016 </summary>
24017 @@ -39108,7 +38925,7 @@ Domain allowed access.
24018 </summary>
24019 </param>
24020 </interface>
24021 -<interface name="corenet_tcp_sendrecv_matahari_port" lineno="46485">
24022 +<interface name="corenet_tcp_sendrecv_matahari_port" lineno="46608">
24023 <summary>
24024 Send and receive TCP traffic on the matahari port.
24025 </summary>
24026 @@ -39119,7 +38936,7 @@ Domain allowed access.
24027 </param>
24028 <infoflow type="both" weight="10"/>
24029 </interface>
24030 -<interface name="corenet_udp_send_matahari_port" lineno="46500">
24031 +<interface name="corenet_udp_send_matahari_port" lineno="46623">
24032 <summary>
24033 Send UDP traffic on the matahari port.
24034 </summary>
24035 @@ -39130,7 +38947,7 @@ Domain allowed access.
24036 </param>
24037 <infoflow type="write" weight="10"/>
24038 </interface>
24039 -<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="46515">
24040 +<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="46638">
24041 <summary>
24042 Do not audit attempts to send UDP traffic on the matahari port.
24043 </summary>
24044 @@ -39141,7 +38958,7 @@ Domain to not audit.
24045 </param>
24046 <infoflow type="none"/>
24047 </interface>
24048 -<interface name="corenet_udp_receive_matahari_port" lineno="46530">
24049 +<interface name="corenet_udp_receive_matahari_port" lineno="46653">
24050 <summary>
24051 Receive UDP traffic on the matahari port.
24052 </summary>
24053 @@ -39152,7 +38969,7 @@ Domain allowed access.
24054 </param>
24055 <infoflow type="read" weight="10"/>
24056 </interface>
24057 -<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="46545">
24058 +<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="46668">
24059 <summary>
24060 Do not audit attempts to receive UDP traffic on the matahari port.
24061 </summary>
24062 @@ -39163,7 +38980,7 @@ Domain to not audit.
24063 </param>
24064 <infoflow type="none"/>
24065 </interface>
24066 -<interface name="corenet_udp_sendrecv_matahari_port" lineno="46560">
24067 +<interface name="corenet_udp_sendrecv_matahari_port" lineno="46683">
24068 <summary>
24069 Send and receive UDP traffic on the matahari port.
24070 </summary>
24071 @@ -39174,7 +38991,7 @@ Domain allowed access.
24072 </param>
24073 <infoflow type="both" weight="10"/>
24074 </interface>
24075 -<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="46576">
24076 +<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="46699">
24077 <summary>
24078 Do not audit attempts to send and receive
24079 UDP traffic on the matahari port.
24080 @@ -39186,7 +39003,7 @@ Domain to not audit.
24081 </param>
24082 <infoflow type="none"/>
24083 </interface>
24084 -<interface name="corenet_tcp_bind_matahari_port" lineno="46591">
24085 +<interface name="corenet_tcp_bind_matahari_port" lineno="46714">
24086 <summary>
24087 Bind TCP sockets to the matahari port.
24088 </summary>
24089 @@ -39197,7 +39014,7 @@ Domain allowed access.
24090 </param>
24091 <infoflow type="none"/>
24092 </interface>
24093 -<interface name="corenet_udp_bind_matahari_port" lineno="46611">
24094 +<interface name="corenet_udp_bind_matahari_port" lineno="46734">
24095 <summary>
24096 Bind UDP sockets to the matahari port.
24097 </summary>
24098 @@ -39208,7 +39025,7 @@ Domain allowed access.
24099 </param>
24100 <infoflow type="none"/>
24101 </interface>
24102 -<interface name="corenet_tcp_connect_matahari_port" lineno="46630">
24103 +<interface name="corenet_tcp_connect_matahari_port" lineno="46753">
24104 <summary>
24105 Make a TCP connection to the matahari port.
24106 </summary>
24107 @@ -39218,7 +39035,7 @@ Domain allowed access.
24108 </summary>
24109 </param>
24110 </interface>
24111 -<interface name="corenet_send_matahari_client_packets" lineno="46650">
24112 +<interface name="corenet_send_matahari_client_packets" lineno="46773">
24113 <summary>
24114 Send matahari_client packets.
24115 </summary>
24116 @@ -39229,7 +39046,7 @@ Domain allowed access.
24117 </param>
24118 <infoflow type="write" weight="10"/>
24119 </interface>
24120 -<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="46669">
24121 +<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="46792">
24122 <summary>
24123 Do not audit attempts to send matahari_client packets.
24124 </summary>
24125 @@ -39240,7 +39057,7 @@ Domain to not audit.
24126 </param>
24127 <infoflow type="none"/>
24128 </interface>
24129 -<interface name="corenet_receive_matahari_client_packets" lineno="46688">
24130 +<interface name="corenet_receive_matahari_client_packets" lineno="46811">
24131 <summary>
24132 Receive matahari_client packets.
24133 </summary>
24134 @@ -39251,7 +39068,7 @@ Domain allowed access.
24135 </param>
24136 <infoflow type="read" weight="10"/>
24137 </interface>
24138 -<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="46707">
24139 +<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="46830">
24140 <summary>
24141 Do not audit attempts to receive matahari_client packets.
24142 </summary>
24143 @@ -39262,7 +39079,7 @@ Domain allowed access.
24144 </param>
24145 <infoflow type="none"/>
24146 </interface>
24147 -<interface name="corenet_sendrecv_matahari_client_packets" lineno="46726">
24148 +<interface name="corenet_sendrecv_matahari_client_packets" lineno="46849">
24149 <summary>
24150 Send and receive matahari_client packets.
24151 </summary>
24152 @@ -39273,7 +39090,7 @@ Domain allowed access.
24153 </param>
24154 <infoflow type="both" weight="10"/>
24155 </interface>
24156 -<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="46742">
24157 +<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="46865">
24158 <summary>
24159 Do not audit attempts to send and receive matahari_client packets.
24160 </summary>
24161 @@ -39284,7 +39101,7 @@ Domain to not audit.
24162 </param>
24163 <infoflow type="none"/>
24164 </interface>
24165 -<interface name="corenet_relabelto_matahari_client_packets" lineno="46757">
24166 +<interface name="corenet_relabelto_matahari_client_packets" lineno="46880">
24167 <summary>
24168 Relabel packets to matahari_client the packet type.
24169 </summary>
24170 @@ -39294,7 +39111,7 @@ Domain allowed access.
24171 </summary>
24172 </param>
24173 </interface>
24174 -<interface name="corenet_send_matahari_server_packets" lineno="46777">
24175 +<interface name="corenet_send_matahari_server_packets" lineno="46900">
24176 <summary>
24177 Send matahari_server packets.
24178 </summary>
24179 @@ -39305,7 +39122,7 @@ Domain allowed access.
24180 </param>
24181 <infoflow type="write" weight="10"/>
24182 </interface>
24183 -<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="46796">
24184 +<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="46919">
24185 <summary>
24186 Do not audit attempts to send matahari_server packets.
24187 </summary>
24188 @@ -39316,7 +39133,7 @@ Domain to not audit.
24189 </param>
24190 <infoflow type="none"/>
24191 </interface>
24192 -<interface name="corenet_receive_matahari_server_packets" lineno="46815">
24193 +<interface name="corenet_receive_matahari_server_packets" lineno="46938">
24194 <summary>
24195 Receive matahari_server packets.
24196 </summary>
24197 @@ -39327,7 +39144,7 @@ Domain allowed access.
24198 </param>
24199 <infoflow type="read" weight="10"/>
24200 </interface>
24201 -<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="46834">
24202 +<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="46957">
24203 <summary>
24204 Do not audit attempts to receive matahari_server packets.
24205 </summary>
24206 @@ -39338,7 +39155,7 @@ Domain allowed access.
24207 </param>
24208 <infoflow type="none"/>
24209 </interface>
24210 -<interface name="corenet_sendrecv_matahari_server_packets" lineno="46853">
24211 +<interface name="corenet_sendrecv_matahari_server_packets" lineno="46976">
24212 <summary>
24213 Send and receive matahari_server packets.
24214 </summary>
24215 @@ -39349,7 +39166,7 @@ Domain allowed access.
24216 </param>
24217 <infoflow type="both" weight="10"/>
24218 </interface>
24219 -<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="46869">
24220 +<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="46992">
24221 <summary>
24222 Do not audit attempts to send and receive matahari_server packets.
24223 </summary>
24224 @@ -39360,7 +39177,7 @@ Domain to not audit.
24225 </param>
24226 <infoflow type="none"/>
24227 </interface>
24228 -<interface name="corenet_relabelto_matahari_server_packets" lineno="46884">
24229 +<interface name="corenet_relabelto_matahari_server_packets" lineno="47007">
24230 <summary>
24231 Relabel packets to matahari_server the packet type.
24232 </summary>
24233 @@ -39370,7 +39187,7 @@ Domain allowed access.
24234 </summary>
24235 </param>
24236 </interface>
24237 -<interface name="corenet_tcp_sendrecv_memcache_port" lineno="46906">
24238 +<interface name="corenet_tcp_sendrecv_memcache_port" lineno="47029">
24239 <summary>
24240 Send and receive TCP traffic on the memcache port.
24241 </summary>
24242 @@ -39381,7 +39198,7 @@ Domain allowed access.
24243 </param>
24244 <infoflow type="both" weight="10"/>
24245 </interface>
24246 -<interface name="corenet_udp_send_memcache_port" lineno="46921">
24247 +<interface name="corenet_udp_send_memcache_port" lineno="47044">
24248 <summary>
24249 Send UDP traffic on the memcache port.
24250 </summary>
24251 @@ -39392,7 +39209,7 @@ Domain allowed access.
24252 </param>
24253 <infoflow type="write" weight="10"/>
24254 </interface>
24255 -<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="46936">
24256 +<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="47059">
24257 <summary>
24258 Do not audit attempts to send UDP traffic on the memcache port.
24259 </summary>
24260 @@ -39403,7 +39220,7 @@ Domain to not audit.
24261 </param>
24262 <infoflow type="none"/>
24263 </interface>
24264 -<interface name="corenet_udp_receive_memcache_port" lineno="46951">
24265 +<interface name="corenet_udp_receive_memcache_port" lineno="47074">
24266 <summary>
24267 Receive UDP traffic on the memcache port.
24268 </summary>
24269 @@ -39414,7 +39231,7 @@ Domain allowed access.
24270 </param>
24271 <infoflow type="read" weight="10"/>
24272 </interface>
24273 -<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="46966">
24274 +<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="47089">
24275 <summary>
24276 Do not audit attempts to receive UDP traffic on the memcache port.
24277 </summary>
24278 @@ -39425,7 +39242,7 @@ Domain to not audit.
24279 </param>
24280 <infoflow type="none"/>
24281 </interface>
24282 -<interface name="corenet_udp_sendrecv_memcache_port" lineno="46981">
24283 +<interface name="corenet_udp_sendrecv_memcache_port" lineno="47104">
24284 <summary>
24285 Send and receive UDP traffic on the memcache port.
24286 </summary>
24287 @@ -39436,7 +39253,7 @@ Domain allowed access.
24288 </param>
24289 <infoflow type="both" weight="10"/>
24290 </interface>
24291 -<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="46997">
24292 +<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="47120">
24293 <summary>
24294 Do not audit attempts to send and receive
24295 UDP traffic on the memcache port.
24296 @@ -39448,7 +39265,7 @@ Domain to not audit.
24297 </param>
24298 <infoflow type="none"/>
24299 </interface>
24300 -<interface name="corenet_tcp_bind_memcache_port" lineno="47012">
24301 +<interface name="corenet_tcp_bind_memcache_port" lineno="47135">
24302 <summary>
24303 Bind TCP sockets to the memcache port.
24304 </summary>
24305 @@ -39459,7 +39276,7 @@ Domain allowed access.
24306 </param>
24307 <infoflow type="none"/>
24308 </interface>
24309 -<interface name="corenet_udp_bind_memcache_port" lineno="47032">
24310 +<interface name="corenet_udp_bind_memcache_port" lineno="47155">
24311 <summary>
24312 Bind UDP sockets to the memcache port.
24313 </summary>
24314 @@ -39470,7 +39287,7 @@ Domain allowed access.
24315 </param>
24316 <infoflow type="none"/>
24317 </interface>
24318 -<interface name="corenet_tcp_connect_memcache_port" lineno="47051">
24319 +<interface name="corenet_tcp_connect_memcache_port" lineno="47174">
24320 <summary>
24321 Make a TCP connection to the memcache port.
24322 </summary>
24323 @@ -39480,7 +39297,7 @@ Domain allowed access.
24324 </summary>
24325 </param>
24326 </interface>
24327 -<interface name="corenet_send_memcache_client_packets" lineno="47071">
24328 +<interface name="corenet_send_memcache_client_packets" lineno="47194">
24329 <summary>
24330 Send memcache_client packets.
24331 </summary>
24332 @@ -39491,7 +39308,7 @@ Domain allowed access.
24333 </param>
24334 <infoflow type="write" weight="10"/>
24335 </interface>
24336 -<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="47090">
24337 +<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="47213">
24338 <summary>
24339 Do not audit attempts to send memcache_client packets.
24340 </summary>
24341 @@ -39502,7 +39319,7 @@ Domain to not audit.
24342 </param>
24343 <infoflow type="none"/>
24344 </interface>
24345 -<interface name="corenet_receive_memcache_client_packets" lineno="47109">
24346 +<interface name="corenet_receive_memcache_client_packets" lineno="47232">
24347 <summary>
24348 Receive memcache_client packets.
24349 </summary>
24350 @@ -39513,7 +39330,7 @@ Domain allowed access.
24351 </param>
24352 <infoflow type="read" weight="10"/>
24353 </interface>
24354 -<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="47128">
24355 +<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="47251">
24356 <summary>
24357 Do not audit attempts to receive memcache_client packets.
24358 </summary>
24359 @@ -39524,7 +39341,7 @@ Domain allowed access.
24360 </param>
24361 <infoflow type="none"/>
24362 </interface>
24363 -<interface name="corenet_sendrecv_memcache_client_packets" lineno="47147">
24364 +<interface name="corenet_sendrecv_memcache_client_packets" lineno="47270">
24365 <summary>
24366 Send and receive memcache_client packets.
24367 </summary>
24368 @@ -39535,7 +39352,7 @@ Domain allowed access.
24369 </param>
24370 <infoflow type="both" weight="10"/>
24371 </interface>
24372 -<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="47163">
24373 +<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="47286">
24374 <summary>
24375 Do not audit attempts to send and receive memcache_client packets.
24376 </summary>
24377 @@ -39546,7 +39363,7 @@ Domain to not audit.
24378 </param>
24379 <infoflow type="none"/>
24380 </interface>
24381 -<interface name="corenet_relabelto_memcache_client_packets" lineno="47178">
24382 +<interface name="corenet_relabelto_memcache_client_packets" lineno="47301">
24383 <summary>
24384 Relabel packets to memcache_client the packet type.
24385 </summary>
24386 @@ -39556,7 +39373,7 @@ Domain allowed access.
24387 </summary>
24388 </param>
24389 </interface>
24390 -<interface name="corenet_send_memcache_server_packets" lineno="47198">
24391 +<interface name="corenet_send_memcache_server_packets" lineno="47321">
24392 <summary>
24393 Send memcache_server packets.
24394 </summary>
24395 @@ -39567,7 +39384,7 @@ Domain allowed access.
24396 </param>
24397 <infoflow type="write" weight="10"/>
24398 </interface>
24399 -<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="47217">
24400 +<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="47340">
24401 <summary>
24402 Do not audit attempts to send memcache_server packets.
24403 </summary>
24404 @@ -39578,7 +39395,7 @@ Domain to not audit.
24405 </param>
24406 <infoflow type="none"/>
24407 </interface>
24408 -<interface name="corenet_receive_memcache_server_packets" lineno="47236">
24409 +<interface name="corenet_receive_memcache_server_packets" lineno="47359">
24410 <summary>
24411 Receive memcache_server packets.
24412 </summary>
24413 @@ -39589,7 +39406,7 @@ Domain allowed access.
24414 </param>
24415 <infoflow type="read" weight="10"/>
24416 </interface>
24417 -<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="47255">
24418 +<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="47378">
24419 <summary>
24420 Do not audit attempts to receive memcache_server packets.
24421 </summary>
24422 @@ -39600,7 +39417,7 @@ Domain allowed access.
24423 </param>
24424 <infoflow type="none"/>
24425 </interface>
24426 -<interface name="corenet_sendrecv_memcache_server_packets" lineno="47274">
24427 +<interface name="corenet_sendrecv_memcache_server_packets" lineno="47397">
24428 <summary>
24429 Send and receive memcache_server packets.
24430 </summary>
24431 @@ -39611,7 +39428,7 @@ Domain allowed access.
24432 </param>
24433 <infoflow type="both" weight="10"/>
24434 </interface>
24435 -<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="47290">
24436 +<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="47413">
24437 <summary>
24438 Do not audit attempts to send and receive memcache_server packets.
24439 </summary>
24440 @@ -39622,7 +39439,7 @@ Domain to not audit.
24441 </param>
24442 <infoflow type="none"/>
24443 </interface>
24444 -<interface name="corenet_relabelto_memcache_server_packets" lineno="47305">
24445 +<interface name="corenet_relabelto_memcache_server_packets" lineno="47428">
24446 <summary>
24447 Relabel packets to memcache_server the packet type.
24448 </summary>
24449 @@ -39632,7 +39449,7 @@ Domain allowed access.
24450 </summary>
24451 </param>
24452 </interface>
24453 -<interface name="corenet_tcp_sendrecv_milter_port" lineno="47327">
24454 +<interface name="corenet_tcp_sendrecv_milter_port" lineno="47450">
24455 <summary>
24456 Send and receive TCP traffic on the milter port.
24457 </summary>
24458 @@ -39643,7 +39460,7 @@ Domain allowed access.
24459 </param>
24460 <infoflow type="both" weight="10"/>
24461 </interface>
24462 -<interface name="corenet_udp_send_milter_port" lineno="47342">
24463 +<interface name="corenet_udp_send_milter_port" lineno="47465">
24464 <summary>
24465 Send UDP traffic on the milter port.
24466 </summary>
24467 @@ -39654,7 +39471,7 @@ Domain allowed access.
24468 </param>
24469 <infoflow type="write" weight="10"/>
24470 </interface>
24471 -<interface name="corenet_dontaudit_udp_send_milter_port" lineno="47357">
24472 +<interface name="corenet_dontaudit_udp_send_milter_port" lineno="47480">
24473 <summary>
24474 Do not audit attempts to send UDP traffic on the milter port.
24475 </summary>
24476 @@ -39665,7 +39482,7 @@ Domain to not audit.
24477 </param>
24478 <infoflow type="none"/>
24479 </interface>
24480 -<interface name="corenet_udp_receive_milter_port" lineno="47372">
24481 +<interface name="corenet_udp_receive_milter_port" lineno="47495">
24482 <summary>
24483 Receive UDP traffic on the milter port.
24484 </summary>
24485 @@ -39676,7 +39493,7 @@ Domain allowed access.
24486 </param>
24487 <infoflow type="read" weight="10"/>
24488 </interface>
24489 -<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="47387">
24490 +<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="47510">
24491 <summary>
24492 Do not audit attempts to receive UDP traffic on the milter port.
24493 </summary>
24494 @@ -39687,7 +39504,7 @@ Domain to not audit.
24495 </param>
24496 <infoflow type="none"/>
24497 </interface>
24498 -<interface name="corenet_udp_sendrecv_milter_port" lineno="47402">
24499 +<interface name="corenet_udp_sendrecv_milter_port" lineno="47525">
24500 <summary>
24501 Send and receive UDP traffic on the milter port.
24502 </summary>
24503 @@ -39698,7 +39515,7 @@ Domain allowed access.
24504 </param>
24505 <infoflow type="both" weight="10"/>
24506 </interface>
24507 -<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="47418">
24508 +<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="47541">
24509 <summary>
24510 Do not audit attempts to send and receive
24511 UDP traffic on the milter port.
24512 @@ -39710,7 +39527,7 @@ Domain to not audit.
24513 </param>
24514 <infoflow type="none"/>
24515 </interface>
24516 -<interface name="corenet_tcp_bind_milter_port" lineno="47433">
24517 +<interface name="corenet_tcp_bind_milter_port" lineno="47556">
24518 <summary>
24519 Bind TCP sockets to the milter port.
24520 </summary>
24521 @@ -39721,7 +39538,7 @@ Domain allowed access.
24522 </param>
24523 <infoflow type="none"/>
24524 </interface>
24525 -<interface name="corenet_udp_bind_milter_port" lineno="47453">
24526 +<interface name="corenet_udp_bind_milter_port" lineno="47576">
24527 <summary>
24528 Bind UDP sockets to the milter port.
24529 </summary>
24530 @@ -39732,7 +39549,7 @@ Domain allowed access.
24531 </param>
24532 <infoflow type="none"/>
24533 </interface>
24534 -<interface name="corenet_tcp_connect_milter_port" lineno="47472">
24535 +<interface name="corenet_tcp_connect_milter_port" lineno="47595">
24536 <summary>
24537 Make a TCP connection to the milter port.
24538 </summary>
24539 @@ -39742,7 +39559,7 @@ Domain allowed access.
24540 </summary>
24541 </param>
24542 </interface>
24543 -<interface name="corenet_send_milter_client_packets" lineno="47492">
24544 +<interface name="corenet_send_milter_client_packets" lineno="47615">
24545 <summary>
24546 Send milter_client packets.
24547 </summary>
24548 @@ -39753,7 +39570,7 @@ Domain allowed access.
24549 </param>
24550 <infoflow type="write" weight="10"/>
24551 </interface>
24552 -<interface name="corenet_dontaudit_send_milter_client_packets" lineno="47511">
24553 +<interface name="corenet_dontaudit_send_milter_client_packets" lineno="47634">
24554 <summary>
24555 Do not audit attempts to send milter_client packets.
24556 </summary>
24557 @@ -39764,7 +39581,7 @@ Domain to not audit.
24558 </param>
24559 <infoflow type="none"/>
24560 </interface>
24561 -<interface name="corenet_receive_milter_client_packets" lineno="47530">
24562 +<interface name="corenet_receive_milter_client_packets" lineno="47653">
24563 <summary>
24564 Receive milter_client packets.
24565 </summary>
24566 @@ -39775,7 +39592,7 @@ Domain allowed access.
24567 </param>
24568 <infoflow type="read" weight="10"/>
24569 </interface>
24570 -<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="47549">
24571 +<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="47672">
24572 <summary>
24573 Do not audit attempts to receive milter_client packets.
24574 </summary>
24575 @@ -39786,7 +39603,7 @@ Domain allowed access.
24576 </param>
24577 <infoflow type="none"/>
24578 </interface>
24579 -<interface name="corenet_sendrecv_milter_client_packets" lineno="47568">
24580 +<interface name="corenet_sendrecv_milter_client_packets" lineno="47691">
24581 <summary>
24582 Send and receive milter_client packets.
24583 </summary>
24584 @@ -39797,7 +39614,7 @@ Domain allowed access.
24585 </param>
24586 <infoflow type="both" weight="10"/>
24587 </interface>
24588 -<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="47584">
24589 +<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="47707">
24590 <summary>
24591 Do not audit attempts to send and receive milter_client packets.
24592 </summary>
24593 @@ -39808,7 +39625,7 @@ Domain to not audit.
24594 </param>
24595 <infoflow type="none"/>
24596 </interface>
24597 -<interface name="corenet_relabelto_milter_client_packets" lineno="47599">
24598 +<interface name="corenet_relabelto_milter_client_packets" lineno="47722">
24599 <summary>
24600 Relabel packets to milter_client the packet type.
24601 </summary>
24602 @@ -39818,7 +39635,7 @@ Domain allowed access.
24603 </summary>
24604 </param>
24605 </interface>
24606 -<interface name="corenet_send_milter_server_packets" lineno="47619">
24607 +<interface name="corenet_send_milter_server_packets" lineno="47742">
24608 <summary>
24609 Send milter_server packets.
24610 </summary>
24611 @@ -39829,7 +39646,7 @@ Domain allowed access.
24612 </param>
24613 <infoflow type="write" weight="10"/>
24614 </interface>
24615 -<interface name="corenet_dontaudit_send_milter_server_packets" lineno="47638">
24616 +<interface name="corenet_dontaudit_send_milter_server_packets" lineno="47761">
24617 <summary>
24618 Do not audit attempts to send milter_server packets.
24619 </summary>
24620 @@ -39840,7 +39657,7 @@ Domain to not audit.
24621 </param>
24622 <infoflow type="none"/>
24623 </interface>
24624 -<interface name="corenet_receive_milter_server_packets" lineno="47657">
24625 +<interface name="corenet_receive_milter_server_packets" lineno="47780">
24626 <summary>
24627 Receive milter_server packets.
24628 </summary>
24629 @@ -39851,7 +39668,7 @@ Domain allowed access.
24630 </param>
24631 <infoflow type="read" weight="10"/>
24632 </interface>
24633 -<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="47676">
24634 +<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="47799">
24635 <summary>
24636 Do not audit attempts to receive milter_server packets.
24637 </summary>
24638 @@ -39862,7 +39679,7 @@ Domain allowed access.
24639 </param>
24640 <infoflow type="none"/>
24641 </interface>
24642 -<interface name="corenet_sendrecv_milter_server_packets" lineno="47695">
24643 +<interface name="corenet_sendrecv_milter_server_packets" lineno="47818">
24644 <summary>
24645 Send and receive milter_server packets.
24646 </summary>
24647 @@ -39873,7 +39690,7 @@ Domain allowed access.
24648 </param>
24649 <infoflow type="both" weight="10"/>
24650 </interface>
24651 -<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="47711">
24652 +<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="47834">
24653 <summary>
24654 Do not audit attempts to send and receive milter_server packets.
24655 </summary>
24656 @@ -39884,7 +39701,7 @@ Domain to not audit.
24657 </param>
24658 <infoflow type="none"/>
24659 </interface>
24660 -<interface name="corenet_relabelto_milter_server_packets" lineno="47726">
24661 +<interface name="corenet_relabelto_milter_server_packets" lineno="47849">
24662 <summary>
24663 Relabel packets to milter_server the packet type.
24664 </summary>
24665 @@ -39894,7 +39711,7 @@ Domain allowed access.
24666 </summary>
24667 </param>
24668 </interface>
24669 -<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="47748">
24670 +<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="47871">
24671 <summary>
24672 Send and receive TCP traffic on the mmcc port.
24673 </summary>
24674 @@ -39905,7 +39722,7 @@ Domain allowed access.
24675 </param>
24676 <infoflow type="both" weight="10"/>
24677 </interface>
24678 -<interface name="corenet_udp_send_mmcc_port" lineno="47763">
24679 +<interface name="corenet_udp_send_mmcc_port" lineno="47886">
24680 <summary>
24681 Send UDP traffic on the mmcc port.
24682 </summary>
24683 @@ -39916,7 +39733,7 @@ Domain allowed access.
24684 </param>
24685 <infoflow type="write" weight="10"/>
24686 </interface>
24687 -<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="47778">
24688 +<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="47901">
24689 <summary>
24690 Do not audit attempts to send UDP traffic on the mmcc port.
24691 </summary>
24692 @@ -39927,7 +39744,7 @@ Domain to not audit.
24693 </param>
24694 <infoflow type="none"/>
24695 </interface>
24696 -<interface name="corenet_udp_receive_mmcc_port" lineno="47793">
24697 +<interface name="corenet_udp_receive_mmcc_port" lineno="47916">
24698 <summary>
24699 Receive UDP traffic on the mmcc port.
24700 </summary>
24701 @@ -39938,7 +39755,7 @@ Domain allowed access.
24702 </param>
24703 <infoflow type="read" weight="10"/>
24704 </interface>
24705 -<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="47808">
24706 +<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="47931">
24707 <summary>
24708 Do not audit attempts to receive UDP traffic on the mmcc port.
24709 </summary>
24710 @@ -39949,7 +39766,7 @@ Domain to not audit.
24711 </param>
24712 <infoflow type="none"/>
24713 </interface>
24714 -<interface name="corenet_udp_sendrecv_mmcc_port" lineno="47823">
24715 +<interface name="corenet_udp_sendrecv_mmcc_port" lineno="47946">
24716 <summary>
24717 Send and receive UDP traffic on the mmcc port.
24718 </summary>
24719 @@ -39960,7 +39777,7 @@ Domain allowed access.
24720 </param>
24721 <infoflow type="both" weight="10"/>
24722 </interface>
24723 -<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="47839">
24724 +<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="47962">
24725 <summary>
24726 Do not audit attempts to send and receive
24727 UDP traffic on the mmcc port.
24728 @@ -39972,7 +39789,7 @@ Domain to not audit.
24729 </param>
24730 <infoflow type="none"/>
24731 </interface>
24732 -<interface name="corenet_tcp_bind_mmcc_port" lineno="47854">
24733 +<interface name="corenet_tcp_bind_mmcc_port" lineno="47977">
24734 <summary>
24735 Bind TCP sockets to the mmcc port.
24736 </summary>
24737 @@ -39983,7 +39800,7 @@ Domain allowed access.
24738 </param>
24739 <infoflow type="none"/>
24740 </interface>
24741 -<interface name="corenet_udp_bind_mmcc_port" lineno="47874">
24742 +<interface name="corenet_udp_bind_mmcc_port" lineno="47997">
24743 <summary>
24744 Bind UDP sockets to the mmcc port.
24745 </summary>
24746 @@ -39994,7 +39811,7 @@ Domain allowed access.
24747 </param>
24748 <infoflow type="none"/>
24749 </interface>
24750 -<interface name="corenet_tcp_connect_mmcc_port" lineno="47893">
24751 +<interface name="corenet_tcp_connect_mmcc_port" lineno="48016">
24752 <summary>
24753 Make a TCP connection to the mmcc port.
24754 </summary>
24755 @@ -40004,7 +39821,7 @@ Domain allowed access.
24756 </summary>
24757 </param>
24758 </interface>
24759 -<interface name="corenet_send_mmcc_client_packets" lineno="47913">
24760 +<interface name="corenet_send_mmcc_client_packets" lineno="48036">
24761 <summary>
24762 Send mmcc_client packets.
24763 </summary>
24764 @@ -40015,7 +39832,7 @@ Domain allowed access.
24765 </param>
24766 <infoflow type="write" weight="10"/>
24767 </interface>
24768 -<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="47932">
24769 +<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="48055">
24770 <summary>
24771 Do not audit attempts to send mmcc_client packets.
24772 </summary>
24773 @@ -40026,7 +39843,7 @@ Domain to not audit.
24774 </param>
24775 <infoflow type="none"/>
24776 </interface>
24777 -<interface name="corenet_receive_mmcc_client_packets" lineno="47951">
24778 +<interface name="corenet_receive_mmcc_client_packets" lineno="48074">
24779 <summary>
24780 Receive mmcc_client packets.
24781 </summary>
24782 @@ -40037,7 +39854,7 @@ Domain allowed access.
24783 </param>
24784 <infoflow type="read" weight="10"/>
24785 </interface>
24786 -<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="47970">
24787 +<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="48093">
24788 <summary>
24789 Do not audit attempts to receive mmcc_client packets.
24790 </summary>
24791 @@ -40048,7 +39865,7 @@ Domain allowed access.
24792 </param>
24793 <infoflow type="none"/>
24794 </interface>
24795 -<interface name="corenet_sendrecv_mmcc_client_packets" lineno="47989">
24796 +<interface name="corenet_sendrecv_mmcc_client_packets" lineno="48112">
24797 <summary>
24798 Send and receive mmcc_client packets.
24799 </summary>
24800 @@ -40059,7 +39876,7 @@ Domain allowed access.
24801 </param>
24802 <infoflow type="both" weight="10"/>
24803 </interface>
24804 -<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="48005">
24805 +<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="48128">
24806 <summary>
24807 Do not audit attempts to send and receive mmcc_client packets.
24808 </summary>
24809 @@ -40070,7 +39887,7 @@ Domain to not audit.
24810 </param>
24811 <infoflow type="none"/>
24812 </interface>
24813 -<interface name="corenet_relabelto_mmcc_client_packets" lineno="48020">
24814 +<interface name="corenet_relabelto_mmcc_client_packets" lineno="48143">
24815 <summary>
24816 Relabel packets to mmcc_client the packet type.
24817 </summary>
24818 @@ -40080,7 +39897,7 @@ Domain allowed access.
24819 </summary>
24820 </param>
24821 </interface>
24822 -<interface name="corenet_send_mmcc_server_packets" lineno="48040">
24823 +<interface name="corenet_send_mmcc_server_packets" lineno="48163">
24824 <summary>
24825 Send mmcc_server packets.
24826 </summary>
24827 @@ -40091,7 +39908,7 @@ Domain allowed access.
24828 </param>
24829 <infoflow type="write" weight="10"/>
24830 </interface>
24831 -<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="48059">
24832 +<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="48182">
24833 <summary>
24834 Do not audit attempts to send mmcc_server packets.
24835 </summary>
24836 @@ -40102,7 +39919,7 @@ Domain to not audit.
24837 </param>
24838 <infoflow type="none"/>
24839 </interface>
24840 -<interface name="corenet_receive_mmcc_server_packets" lineno="48078">
24841 +<interface name="corenet_receive_mmcc_server_packets" lineno="48201">
24842 <summary>
24843 Receive mmcc_server packets.
24844 </summary>
24845 @@ -40113,7 +39930,7 @@ Domain allowed access.
24846 </param>
24847 <infoflow type="read" weight="10"/>
24848 </interface>
24849 -<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="48097">
24850 +<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="48220">
24851 <summary>
24852 Do not audit attempts to receive mmcc_server packets.
24853 </summary>
24854 @@ -40124,7 +39941,7 @@ Domain allowed access.
24855 </param>
24856 <infoflow type="none"/>
24857 </interface>
24858 -<interface name="corenet_sendrecv_mmcc_server_packets" lineno="48116">
24859 +<interface name="corenet_sendrecv_mmcc_server_packets" lineno="48239">
24860 <summary>
24861 Send and receive mmcc_server packets.
24862 </summary>
24863 @@ -40135,7 +39952,7 @@ Domain allowed access.
24864 </param>
24865 <infoflow type="both" weight="10"/>
24866 </interface>
24867 -<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="48132">
24868 +<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="48255">
24869 <summary>
24870 Do not audit attempts to send and receive mmcc_server packets.
24871 </summary>
24872 @@ -40146,7 +39963,7 @@ Domain to not audit.
24873 </param>
24874 <infoflow type="none"/>
24875 </interface>
24876 -<interface name="corenet_relabelto_mmcc_server_packets" lineno="48147">
24877 +<interface name="corenet_relabelto_mmcc_server_packets" lineno="48270">
24878 <summary>
24879 Relabel packets to mmcc_server the packet type.
24880 </summary>
24881 @@ -40156,7 +39973,7 @@ Domain allowed access.
24882 </summary>
24883 </param>
24884 </interface>
24885 -<interface name="corenet_tcp_sendrecv_mon_port" lineno="48169">
24886 +<interface name="corenet_tcp_sendrecv_mon_port" lineno="48292">
24887 <summary>
24888 Send and receive TCP traffic on the mon port.
24889 </summary>
24890 @@ -40167,7 +39984,7 @@ Domain allowed access.
24891 </param>
24892 <infoflow type="both" weight="10"/>
24893 </interface>
24894 -<interface name="corenet_udp_send_mon_port" lineno="48184">
24895 +<interface name="corenet_udp_send_mon_port" lineno="48307">
24896 <summary>
24897 Send UDP traffic on the mon port.
24898 </summary>
24899 @@ -40178,7 +39995,7 @@ Domain allowed access.
24900 </param>
24901 <infoflow type="write" weight="10"/>
24902 </interface>
24903 -<interface name="corenet_dontaudit_udp_send_mon_port" lineno="48199">
24904 +<interface name="corenet_dontaudit_udp_send_mon_port" lineno="48322">
24905 <summary>
24906 Do not audit attempts to send UDP traffic on the mon port.
24907 </summary>
24908 @@ -40189,7 +40006,7 @@ Domain to not audit.
24909 </param>
24910 <infoflow type="none"/>
24911 </interface>
24912 -<interface name="corenet_udp_receive_mon_port" lineno="48214">
24913 +<interface name="corenet_udp_receive_mon_port" lineno="48337">
24914 <summary>
24915 Receive UDP traffic on the mon port.
24916 </summary>
24917 @@ -40200,7 +40017,7 @@ Domain allowed access.
24918 </param>
24919 <infoflow type="read" weight="10"/>
24920 </interface>
24921 -<interface name="corenet_dontaudit_udp_receive_mon_port" lineno="48229">
24922 +<interface name="corenet_dontaudit_udp_receive_mon_port" lineno="48352">
24923 <summary>
24924 Do not audit attempts to receive UDP traffic on the mon port.
24925 </summary>
24926 @@ -40211,7 +40028,7 @@ Domain to not audit.
24927 </param>
24928 <infoflow type="none"/>
24929 </interface>
24930 -<interface name="corenet_udp_sendrecv_mon_port" lineno="48244">
24931 +<interface name="corenet_udp_sendrecv_mon_port" lineno="48367">
24932 <summary>
24933 Send and receive UDP traffic on the mon port.
24934 </summary>
24935 @@ -40222,7 +40039,7 @@ Domain allowed access.
24936 </param>
24937 <infoflow type="both" weight="10"/>
24938 </interface>
24939 -<interface name="corenet_dontaudit_udp_sendrecv_mon_port" lineno="48260">
24940 +<interface name="corenet_dontaudit_udp_sendrecv_mon_port" lineno="48383">
24941 <summary>
24942 Do not audit attempts to send and receive
24943 UDP traffic on the mon port.
24944 @@ -40234,7 +40051,7 @@ Domain to not audit.
24945 </param>
24946 <infoflow type="none"/>
24947 </interface>
24948 -<interface name="corenet_tcp_bind_mon_port" lineno="48275">
24949 +<interface name="corenet_tcp_bind_mon_port" lineno="48398">
24950 <summary>
24951 Bind TCP sockets to the mon port.
24952 </summary>
24953 @@ -40245,7 +40062,7 @@ Domain allowed access.
24954 </param>
24955 <infoflow type="none"/>
24956 </interface>
24957 -<interface name="corenet_udp_bind_mon_port" lineno="48295">
24958 +<interface name="corenet_udp_bind_mon_port" lineno="48418">
24959 <summary>
24960 Bind UDP sockets to the mon port.
24961 </summary>
24962 @@ -40256,7 +40073,7 @@ Domain allowed access.
24963 </param>
24964 <infoflow type="none"/>
24965 </interface>
24966 -<interface name="corenet_tcp_connect_mon_port" lineno="48314">
24967 +<interface name="corenet_tcp_connect_mon_port" lineno="48437">
24968 <summary>
24969 Make a TCP connection to the mon port.
24970 </summary>
24971 @@ -40266,7 +40083,7 @@ Domain allowed access.
24972 </summary>
24973 </param>
24974 </interface>
24975 -<interface name="corenet_send_mon_client_packets" lineno="48334">
24976 +<interface name="corenet_send_mon_client_packets" lineno="48457">
24977 <summary>
24978 Send mon_client packets.
24979 </summary>
24980 @@ -40277,7 +40094,7 @@ Domain allowed access.
24981 </param>
24982 <infoflow type="write" weight="10"/>
24983 </interface>
24984 -<interface name="corenet_dontaudit_send_mon_client_packets" lineno="48353">
24985 +<interface name="corenet_dontaudit_send_mon_client_packets" lineno="48476">
24986 <summary>
24987 Do not audit attempts to send mon_client packets.
24988 </summary>
24989 @@ -40288,7 +40105,7 @@ Domain to not audit.
24990 </param>
24991 <infoflow type="none"/>
24992 </interface>
24993 -<interface name="corenet_receive_mon_client_packets" lineno="48372">
24994 +<interface name="corenet_receive_mon_client_packets" lineno="48495">
24995 <summary>
24996 Receive mon_client packets.
24997 </summary>
24998 @@ -40299,7 +40116,7 @@ Domain allowed access.
24999 </param>
25000 <infoflow type="read" weight="10"/>
25001 </interface>
25002 -<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="48391">
25003 +<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="48514">
25004 <summary>
25005 Do not audit attempts to receive mon_client packets.
25006 </summary>
25007 @@ -40310,7 +40127,7 @@ Domain allowed access.
25008 </param>
25009 <infoflow type="none"/>
25010 </interface>
25011 -<interface name="corenet_sendrecv_mon_client_packets" lineno="48410">
25012 +<interface name="corenet_sendrecv_mon_client_packets" lineno="48533">
25013 <summary>
25014 Send and receive mon_client packets.
25015 </summary>
25016 @@ -40321,7 +40138,7 @@ Domain allowed access.
25017 </param>
25018 <infoflow type="both" weight="10"/>
25019 </interface>
25020 -<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="48426">
25021 +<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="48549">
25022 <summary>
25023 Do not audit attempts to send and receive mon_client packets.
25024 </summary>
25025 @@ -40332,7 +40149,7 @@ Domain to not audit.
25026 </param>
25027 <infoflow type="none"/>
25028 </interface>
25029 -<interface name="corenet_relabelto_mon_client_packets" lineno="48441">
25030 +<interface name="corenet_relabelto_mon_client_packets" lineno="48564">
25031 <summary>
25032 Relabel packets to mon_client the packet type.
25033 </summary>
25034 @@ -40342,7 +40159,7 @@ Domain allowed access.
25035 </summary>
25036 </param>
25037 </interface>
25038 -<interface name="corenet_send_mon_server_packets" lineno="48461">
25039 +<interface name="corenet_send_mon_server_packets" lineno="48584">
25040 <summary>
25041 Send mon_server packets.
25042 </summary>
25043 @@ -40353,7 +40170,7 @@ Domain allowed access.
25044 </param>
25045 <infoflow type="write" weight="10"/>
25046 </interface>
25047 -<interface name="corenet_dontaudit_send_mon_server_packets" lineno="48480">
25048 +<interface name="corenet_dontaudit_send_mon_server_packets" lineno="48603">
25049 <summary>
25050 Do not audit attempts to send mon_server packets.
25051 </summary>
25052 @@ -40364,7 +40181,7 @@ Domain to not audit.
25053 </param>
25054 <infoflow type="none"/>
25055 </interface>
25056 -<interface name="corenet_receive_mon_server_packets" lineno="48499">
25057 +<interface name="corenet_receive_mon_server_packets" lineno="48622">
25058 <summary>
25059 Receive mon_server packets.
25060 </summary>
25061 @@ -40375,7 +40192,7 @@ Domain allowed access.
25062 </param>
25063 <infoflow type="read" weight="10"/>
25064 </interface>
25065 -<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="48518">
25066 +<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="48641">
25067 <summary>
25068 Do not audit attempts to receive mon_server packets.
25069 </summary>
25070 @@ -40386,7 +40203,7 @@ Domain allowed access.
25071 </param>
25072 <infoflow type="none"/>
25073 </interface>
25074 -<interface name="corenet_sendrecv_mon_server_packets" lineno="48537">
25075 +<interface name="corenet_sendrecv_mon_server_packets" lineno="48660">
25076 <summary>
25077 Send and receive mon_server packets.
25078 </summary>
25079 @@ -40397,7 +40214,7 @@ Domain allowed access.
25080 </param>
25081 <infoflow type="both" weight="10"/>
25082 </interface>
25083 -<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="48553">
25084 +<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="48676">
25085 <summary>
25086 Do not audit attempts to send and receive mon_server packets.
25087 </summary>
25088 @@ -40408,7 +40225,7 @@ Domain to not audit.
25089 </param>
25090 <infoflow type="none"/>
25091 </interface>
25092 -<interface name="corenet_relabelto_mon_server_packets" lineno="48568">
25093 +<interface name="corenet_relabelto_mon_server_packets" lineno="48691">
25094 <summary>
25095 Relabel packets to mon_server the packet type.
25096 </summary>
25097 @@ -40418,7 +40235,7 @@ Domain allowed access.
25098 </summary>
25099 </param>
25100 </interface>
25101 -<interface name="corenet_tcp_sendrecv_monit_port" lineno="48590">
25102 +<interface name="corenet_tcp_sendrecv_monit_port" lineno="48713">
25103 <summary>
25104 Send and receive TCP traffic on the monit port.
25105 </summary>
25106 @@ -40429,7 +40246,7 @@ Domain allowed access.
25107 </param>
25108 <infoflow type="both" weight="10"/>
25109 </interface>
25110 -<interface name="corenet_udp_send_monit_port" lineno="48605">
25111 +<interface name="corenet_udp_send_monit_port" lineno="48728">
25112 <summary>
25113 Send UDP traffic on the monit port.
25114 </summary>
25115 @@ -40440,7 +40257,7 @@ Domain allowed access.
25116 </param>
25117 <infoflow type="write" weight="10"/>
25118 </interface>
25119 -<interface name="corenet_dontaudit_udp_send_monit_port" lineno="48620">
25120 +<interface name="corenet_dontaudit_udp_send_monit_port" lineno="48743">
25121 <summary>
25122 Do not audit attempts to send UDP traffic on the monit port.
25123 </summary>
25124 @@ -40451,7 +40268,7 @@ Domain to not audit.
25125 </param>
25126 <infoflow type="none"/>
25127 </interface>
25128 -<interface name="corenet_udp_receive_monit_port" lineno="48635">
25129 +<interface name="corenet_udp_receive_monit_port" lineno="48758">
25130 <summary>
25131 Receive UDP traffic on the monit port.
25132 </summary>
25133 @@ -40462,7 +40279,7 @@ Domain allowed access.
25134 </param>
25135 <infoflow type="read" weight="10"/>
25136 </interface>
25137 -<interface name="corenet_dontaudit_udp_receive_monit_port" lineno="48650">
25138 +<interface name="corenet_dontaudit_udp_receive_monit_port" lineno="48773">
25139 <summary>
25140 Do not audit attempts to receive UDP traffic on the monit port.
25141 </summary>
25142 @@ -40473,7 +40290,7 @@ Domain to not audit.
25143 </param>
25144 <infoflow type="none"/>
25145 </interface>
25146 -<interface name="corenet_udp_sendrecv_monit_port" lineno="48665">
25147 +<interface name="corenet_udp_sendrecv_monit_port" lineno="48788">
25148 <summary>
25149 Send and receive UDP traffic on the monit port.
25150 </summary>
25151 @@ -40484,7 +40301,7 @@ Domain allowed access.
25152 </param>
25153 <infoflow type="both" weight="10"/>
25154 </interface>
25155 -<interface name="corenet_dontaudit_udp_sendrecv_monit_port" lineno="48681">
25156 +<interface name="corenet_dontaudit_udp_sendrecv_monit_port" lineno="48804">
25157 <summary>
25158 Do not audit attempts to send and receive
25159 UDP traffic on the monit port.
25160 @@ -40496,7 +40313,7 @@ Domain to not audit.
25161 </param>
25162 <infoflow type="none"/>
25163 </interface>
25164 -<interface name="corenet_tcp_bind_monit_port" lineno="48696">
25165 +<interface name="corenet_tcp_bind_monit_port" lineno="48819">
25166 <summary>
25167 Bind TCP sockets to the monit port.
25168 </summary>
25169 @@ -40507,7 +40324,7 @@ Domain allowed access.
25170 </param>
25171 <infoflow type="none"/>
25172 </interface>
25173 -<interface name="corenet_udp_bind_monit_port" lineno="48716">
25174 +<interface name="corenet_udp_bind_monit_port" lineno="48839">
25175 <summary>
25176 Bind UDP sockets to the monit port.
25177 </summary>
25178 @@ -40518,7 +40335,7 @@ Domain allowed access.
25179 </param>
25180 <infoflow type="none"/>
25181 </interface>
25182 -<interface name="corenet_tcp_connect_monit_port" lineno="48735">
25183 +<interface name="corenet_tcp_connect_monit_port" lineno="48858">
25184 <summary>
25185 Make a TCP connection to the monit port.
25186 </summary>
25187 @@ -40528,7 +40345,7 @@ Domain allowed access.
25188 </summary>
25189 </param>
25190 </interface>
25191 -<interface name="corenet_send_monit_client_packets" lineno="48755">
25192 +<interface name="corenet_send_monit_client_packets" lineno="48878">
25193 <summary>
25194 Send monit_client packets.
25195 </summary>
25196 @@ -40539,7 +40356,7 @@ Domain allowed access.
25197 </param>
25198 <infoflow type="write" weight="10"/>
25199 </interface>
25200 -<interface name="corenet_dontaudit_send_monit_client_packets" lineno="48774">
25201 +<interface name="corenet_dontaudit_send_monit_client_packets" lineno="48897">
25202 <summary>
25203 Do not audit attempts to send monit_client packets.
25204 </summary>
25205 @@ -40550,7 +40367,7 @@ Domain to not audit.
25206 </param>
25207 <infoflow type="none"/>
25208 </interface>
25209 -<interface name="corenet_receive_monit_client_packets" lineno="48793">
25210 +<interface name="corenet_receive_monit_client_packets" lineno="48916">
25211 <summary>
25212 Receive monit_client packets.
25213 </summary>
25214 @@ -40561,7 +40378,7 @@ Domain allowed access.
25215 </param>
25216 <infoflow type="read" weight="10"/>
25217 </interface>
25218 -<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="48812">
25219 +<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="48935">
25220 <summary>
25221 Do not audit attempts to receive monit_client packets.
25222 </summary>
25223 @@ -40572,7 +40389,7 @@ Domain allowed access.
25224 </param>
25225 <infoflow type="none"/>
25226 </interface>
25227 -<interface name="corenet_sendrecv_monit_client_packets" lineno="48831">
25228 +<interface name="corenet_sendrecv_monit_client_packets" lineno="48954">
25229 <summary>
25230 Send and receive monit_client packets.
25231 </summary>
25232 @@ -40583,7 +40400,7 @@ Domain allowed access.
25233 </param>
25234 <infoflow type="both" weight="10"/>
25235 </interface>
25236 -<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="48847">
25237 +<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="48970">
25238 <summary>
25239 Do not audit attempts to send and receive monit_client packets.
25240 </summary>
25241 @@ -40594,7 +40411,7 @@ Domain to not audit.
25242 </param>
25243 <infoflow type="none"/>
25244 </interface>
25245 -<interface name="corenet_relabelto_monit_client_packets" lineno="48862">
25246 +<interface name="corenet_relabelto_monit_client_packets" lineno="48985">
25247 <summary>
25248 Relabel packets to monit_client the packet type.
25249 </summary>
25250 @@ -40604,7 +40421,7 @@ Domain allowed access.
25251 </summary>
25252 </param>
25253 </interface>
25254 -<interface name="corenet_send_monit_server_packets" lineno="48882">
25255 +<interface name="corenet_send_monit_server_packets" lineno="49005">
25256 <summary>
25257 Send monit_server packets.
25258 </summary>
25259 @@ -40615,7 +40432,7 @@ Domain allowed access.
25260 </param>
25261 <infoflow type="write" weight="10"/>
25262 </interface>
25263 -<interface name="corenet_dontaudit_send_monit_server_packets" lineno="48901">
25264 +<interface name="corenet_dontaudit_send_monit_server_packets" lineno="49024">
25265 <summary>
25266 Do not audit attempts to send monit_server packets.
25267 </summary>
25268 @@ -40626,7 +40443,7 @@ Domain to not audit.
25269 </param>
25270 <infoflow type="none"/>
25271 </interface>
25272 -<interface name="corenet_receive_monit_server_packets" lineno="48920">
25273 +<interface name="corenet_receive_monit_server_packets" lineno="49043">
25274 <summary>
25275 Receive monit_server packets.
25276 </summary>
25277 @@ -40637,7 +40454,7 @@ Domain allowed access.
25278 </param>
25279 <infoflow type="read" weight="10"/>
25280 </interface>
25281 -<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="48939">
25282 +<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="49062">
25283 <summary>
25284 Do not audit attempts to receive monit_server packets.
25285 </summary>
25286 @@ -40648,7 +40465,7 @@ Domain allowed access.
25287 </param>
25288 <infoflow type="none"/>
25289 </interface>
25290 -<interface name="corenet_sendrecv_monit_server_packets" lineno="48958">
25291 +<interface name="corenet_sendrecv_monit_server_packets" lineno="49081">
25292 <summary>
25293 Send and receive monit_server packets.
25294 </summary>
25295 @@ -40659,7 +40476,7 @@ Domain allowed access.
25296 </param>
25297 <infoflow type="both" weight="10"/>
25298 </interface>
25299 -<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="48974">
25300 +<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="49097">
25301 <summary>
25302 Do not audit attempts to send and receive monit_server packets.
25303 </summary>
25304 @@ -40670,7 +40487,7 @@ Domain to not audit.
25305 </param>
25306 <infoflow type="none"/>
25307 </interface>
25308 -<interface name="corenet_relabelto_monit_server_packets" lineno="48989">
25309 +<interface name="corenet_relabelto_monit_server_packets" lineno="49112">
25310 <summary>
25311 Relabel packets to monit_server the packet type.
25312 </summary>
25313 @@ -40680,7 +40497,7 @@ Domain allowed access.
25314 </summary>
25315 </param>
25316 </interface>
25317 -<interface name="corenet_tcp_sendrecv_monopd_port" lineno="49011">
25318 +<interface name="corenet_tcp_sendrecv_monopd_port" lineno="49134">
25319 <summary>
25320 Send and receive TCP traffic on the monopd port.
25321 </summary>
25322 @@ -40691,7 +40508,7 @@ Domain allowed access.
25323 </param>
25324 <infoflow type="both" weight="10"/>
25325 </interface>
25326 -<interface name="corenet_udp_send_monopd_port" lineno="49026">
25327 +<interface name="corenet_udp_send_monopd_port" lineno="49149">
25328 <summary>
25329 Send UDP traffic on the monopd port.
25330 </summary>
25331 @@ -40702,7 +40519,7 @@ Domain allowed access.
25332 </param>
25333 <infoflow type="write" weight="10"/>
25334 </interface>
25335 -<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="49041">
25336 +<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="49164">
25337 <summary>
25338 Do not audit attempts to send UDP traffic on the monopd port.
25339 </summary>
25340 @@ -40713,7 +40530,7 @@ Domain to not audit.
25341 </param>
25342 <infoflow type="none"/>
25343 </interface>
25344 -<interface name="corenet_udp_receive_monopd_port" lineno="49056">
25345 +<interface name="corenet_udp_receive_monopd_port" lineno="49179">
25346 <summary>
25347 Receive UDP traffic on the monopd port.
25348 </summary>
25349 @@ -40724,7 +40541,7 @@ Domain allowed access.
25350 </param>
25351 <infoflow type="read" weight="10"/>
25352 </interface>
25353 -<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="49071">
25354 +<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="49194">
25355 <summary>
25356 Do not audit attempts to receive UDP traffic on the monopd port.
25357 </summary>
25358 @@ -40735,7 +40552,7 @@ Domain to not audit.
25359 </param>
25360 <infoflow type="none"/>
25361 </interface>
25362 -<interface name="corenet_udp_sendrecv_monopd_port" lineno="49086">
25363 +<interface name="corenet_udp_sendrecv_monopd_port" lineno="49209">
25364 <summary>
25365 Send and receive UDP traffic on the monopd port.
25366 </summary>
25367 @@ -40746,7 +40563,7 @@ Domain allowed access.
25368 </param>
25369 <infoflow type="both" weight="10"/>
25370 </interface>
25371 -<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="49102">
25372 +<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="49225">
25373 <summary>
25374 Do not audit attempts to send and receive
25375 UDP traffic on the monopd port.
25376 @@ -40758,7 +40575,7 @@ Domain to not audit.
25377 </param>
25378 <infoflow type="none"/>
25379 </interface>
25380 -<interface name="corenet_tcp_bind_monopd_port" lineno="49117">
25381 +<interface name="corenet_tcp_bind_monopd_port" lineno="49240">
25382 <summary>
25383 Bind TCP sockets to the monopd port.
25384 </summary>
25385 @@ -40769,7 +40586,7 @@ Domain allowed access.
25386 </param>
25387 <infoflow type="none"/>
25388 </interface>
25389 -<interface name="corenet_udp_bind_monopd_port" lineno="49137">
25390 +<interface name="corenet_udp_bind_monopd_port" lineno="49260">
25391 <summary>
25392 Bind UDP sockets to the monopd port.
25393 </summary>
25394 @@ -40780,7 +40597,7 @@ Domain allowed access.
25395 </param>
25396 <infoflow type="none"/>
25397 </interface>
25398 -<interface name="corenet_tcp_connect_monopd_port" lineno="49156">
25399 +<interface name="corenet_tcp_connect_monopd_port" lineno="49279">
25400 <summary>
25401 Make a TCP connection to the monopd port.
25402 </summary>
25403 @@ -40790,7 +40607,7 @@ Domain allowed access.
25404 </summary>
25405 </param>
25406 </interface>
25407 -<interface name="corenet_send_monopd_client_packets" lineno="49176">
25408 +<interface name="corenet_send_monopd_client_packets" lineno="49299">
25409 <summary>
25410 Send monopd_client packets.
25411 </summary>
25412 @@ -40801,7 +40618,7 @@ Domain allowed access.
25413 </param>
25414 <infoflow type="write" weight="10"/>
25415 </interface>
25416 -<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="49195">
25417 +<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="49318">
25418 <summary>
25419 Do not audit attempts to send monopd_client packets.
25420 </summary>
25421 @@ -40812,7 +40629,7 @@ Domain to not audit.
25422 </param>
25423 <infoflow type="none"/>
25424 </interface>
25425 -<interface name="corenet_receive_monopd_client_packets" lineno="49214">
25426 +<interface name="corenet_receive_monopd_client_packets" lineno="49337">
25427 <summary>
25428 Receive monopd_client packets.
25429 </summary>
25430 @@ -40823,7 +40640,7 @@ Domain allowed access.
25431 </param>
25432 <infoflow type="read" weight="10"/>
25433 </interface>
25434 -<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="49233">
25435 +<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="49356">
25436 <summary>
25437 Do not audit attempts to receive monopd_client packets.
25438 </summary>
25439 @@ -40834,7 +40651,7 @@ Domain allowed access.
25440 </param>
25441 <infoflow type="none"/>
25442 </interface>
25443 -<interface name="corenet_sendrecv_monopd_client_packets" lineno="49252">
25444 +<interface name="corenet_sendrecv_monopd_client_packets" lineno="49375">
25445 <summary>
25446 Send and receive monopd_client packets.
25447 </summary>
25448 @@ -40845,7 +40662,7 @@ Domain allowed access.
25449 </param>
25450 <infoflow type="both" weight="10"/>
25451 </interface>
25452 -<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="49268">
25453 +<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="49391">
25454 <summary>
25455 Do not audit attempts to send and receive monopd_client packets.
25456 </summary>
25457 @@ -40856,7 +40673,7 @@ Domain to not audit.
25458 </param>
25459 <infoflow type="none"/>
25460 </interface>
25461 -<interface name="corenet_relabelto_monopd_client_packets" lineno="49283">
25462 +<interface name="corenet_relabelto_monopd_client_packets" lineno="49406">
25463 <summary>
25464 Relabel packets to monopd_client the packet type.
25465 </summary>
25466 @@ -40866,7 +40683,7 @@ Domain allowed access.
25467 </summary>
25468 </param>
25469 </interface>
25470 -<interface name="corenet_send_monopd_server_packets" lineno="49303">
25471 +<interface name="corenet_send_monopd_server_packets" lineno="49426">
25472 <summary>
25473 Send monopd_server packets.
25474 </summary>
25475 @@ -40877,7 +40694,7 @@ Domain allowed access.
25476 </param>
25477 <infoflow type="write" weight="10"/>
25478 </interface>
25479 -<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="49322">
25480 +<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="49445">
25481 <summary>
25482 Do not audit attempts to send monopd_server packets.
25483 </summary>
25484 @@ -40888,7 +40705,7 @@ Domain to not audit.
25485 </param>
25486 <infoflow type="none"/>
25487 </interface>
25488 -<interface name="corenet_receive_monopd_server_packets" lineno="49341">
25489 +<interface name="corenet_receive_monopd_server_packets" lineno="49464">
25490 <summary>
25491 Receive monopd_server packets.
25492 </summary>
25493 @@ -40899,7 +40716,7 @@ Domain allowed access.
25494 </param>
25495 <infoflow type="read" weight="10"/>
25496 </interface>
25497 -<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="49360">
25498 +<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="49483">
25499 <summary>
25500 Do not audit attempts to receive monopd_server packets.
25501 </summary>
25502 @@ -40910,7 +40727,7 @@ Domain allowed access.
25503 </param>
25504 <infoflow type="none"/>
25505 </interface>
25506 -<interface name="corenet_sendrecv_monopd_server_packets" lineno="49379">
25507 +<interface name="corenet_sendrecv_monopd_server_packets" lineno="49502">
25508 <summary>
25509 Send and receive monopd_server packets.
25510 </summary>
25511 @@ -40921,7 +40738,7 @@ Domain allowed access.
25512 </param>
25513 <infoflow type="both" weight="10"/>
25514 </interface>
25515 -<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="49395">
25516 +<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="49518">
25517 <summary>
25518 Do not audit attempts to send and receive monopd_server packets.
25519 </summary>
25520 @@ -40932,7 +40749,7 @@ Domain to not audit.
25521 </param>
25522 <infoflow type="none"/>
25523 </interface>
25524 -<interface name="corenet_relabelto_monopd_server_packets" lineno="49410">
25525 +<interface name="corenet_relabelto_monopd_server_packets" lineno="49533">
25526 <summary>
25527 Relabel packets to monopd_server the packet type.
25528 </summary>
25529 @@ -40942,7 +40759,7 @@ Domain allowed access.
25530 </summary>
25531 </param>
25532 </interface>
25533 -<interface name="corenet_tcp_sendrecv_mountd_port" lineno="49432">
25534 +<interface name="corenet_tcp_sendrecv_mountd_port" lineno="49555">
25535 <summary>
25536 Send and receive TCP traffic on the mountd port.
25537 </summary>
25538 @@ -40953,7 +40770,7 @@ Domain allowed access.
25539 </param>
25540 <infoflow type="both" weight="10"/>
25541 </interface>
25542 -<interface name="corenet_udp_send_mountd_port" lineno="49447">
25543 +<interface name="corenet_udp_send_mountd_port" lineno="49570">
25544 <summary>
25545 Send UDP traffic on the mountd port.
25546 </summary>
25547 @@ -40964,7 +40781,7 @@ Domain allowed access.
25548 </param>
25549 <infoflow type="write" weight="10"/>
25550 </interface>
25551 -<interface name="corenet_dontaudit_udp_send_mountd_port" lineno="49462">
25552 +<interface name="corenet_dontaudit_udp_send_mountd_port" lineno="49585">
25553 <summary>
25554 Do not audit attempts to send UDP traffic on the mountd port.
25555 </summary>
25556 @@ -40975,7 +40792,7 @@ Domain to not audit.
25557 </param>
25558 <infoflow type="none"/>
25559 </interface>
25560 -<interface name="corenet_udp_receive_mountd_port" lineno="49477">
25561 +<interface name="corenet_udp_receive_mountd_port" lineno="49600">
25562 <summary>
25563 Receive UDP traffic on the mountd port.
25564 </summary>
25565 @@ -40986,7 +40803,7 @@ Domain allowed access.
25566 </param>
25567 <infoflow type="read" weight="10"/>
25568 </interface>
25569 -<interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="49492">
25570 +<interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="49615">
25571 <summary>
25572 Do not audit attempts to receive UDP traffic on the mountd port.
25573 </summary>
25574 @@ -40997,7 +40814,7 @@ Domain to not audit.
25575 </param>
25576 <infoflow type="none"/>
25577 </interface>
25578 -<interface name="corenet_udp_sendrecv_mountd_port" lineno="49507">
25579 +<interface name="corenet_udp_sendrecv_mountd_port" lineno="49630">
25580 <summary>
25581 Send and receive UDP traffic on the mountd port.
25582 </summary>
25583 @@ -41008,7 +40825,7 @@ Domain allowed access.
25584 </param>
25585 <infoflow type="both" weight="10"/>
25586 </interface>
25587 -<interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="49523">
25588 +<interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="49646">
25589 <summary>
25590 Do not audit attempts to send and receive
25591 UDP traffic on the mountd port.
25592 @@ -41020,7 +40837,7 @@ Domain to not audit.
25593 </param>
25594 <infoflow type="none"/>
25595 </interface>
25596 -<interface name="corenet_tcp_bind_mountd_port" lineno="49538">
25597 +<interface name="corenet_tcp_bind_mountd_port" lineno="49661">
25598 <summary>
25599 Bind TCP sockets to the mountd port.
25600 </summary>
25601 @@ -41031,7 +40848,7 @@ Domain allowed access.
25602 </param>
25603 <infoflow type="none"/>
25604 </interface>
25605 -<interface name="corenet_udp_bind_mountd_port" lineno="49558">
25606 +<interface name="corenet_udp_bind_mountd_port" lineno="49681">
25607 <summary>
25608 Bind UDP sockets to the mountd port.
25609 </summary>
25610 @@ -41042,7 +40859,7 @@ Domain allowed access.
25611 </param>
25612 <infoflow type="none"/>
25613 </interface>
25614 -<interface name="corenet_tcp_connect_mountd_port" lineno="49577">
25615 +<interface name="corenet_tcp_connect_mountd_port" lineno="49700">
25616 <summary>
25617 Make a TCP connection to the mountd port.
25618 </summary>
25619 @@ -41052,7 +40869,7 @@ Domain allowed access.
25620 </summary>
25621 </param>
25622 </interface>
25623 -<interface name="corenet_send_mountd_client_packets" lineno="49597">
25624 +<interface name="corenet_send_mountd_client_packets" lineno="49720">
25625 <summary>
25626 Send mountd_client packets.
25627 </summary>
25628 @@ -41063,7 +40880,7 @@ Domain allowed access.
25629 </param>
25630 <infoflow type="write" weight="10"/>
25631 </interface>
25632 -<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="49616">
25633 +<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="49739">
25634 <summary>
25635 Do not audit attempts to send mountd_client packets.
25636 </summary>
25637 @@ -41074,7 +40891,7 @@ Domain to not audit.
25638 </param>
25639 <infoflow type="none"/>
25640 </interface>
25641 -<interface name="corenet_receive_mountd_client_packets" lineno="49635">
25642 +<interface name="corenet_receive_mountd_client_packets" lineno="49758">
25643 <summary>
25644 Receive mountd_client packets.
25645 </summary>
25646 @@ -41085,7 +40902,7 @@ Domain allowed access.
25647 </param>
25648 <infoflow type="read" weight="10"/>
25649 </interface>
25650 -<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="49654">
25651 +<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="49777">
25652 <summary>
25653 Do not audit attempts to receive mountd_client packets.
25654 </summary>
25655 @@ -41096,7 +40913,7 @@ Domain allowed access.
25656 </param>
25657 <infoflow type="none"/>
25658 </interface>
25659 -<interface name="corenet_sendrecv_mountd_client_packets" lineno="49673">
25660 +<interface name="corenet_sendrecv_mountd_client_packets" lineno="49796">
25661 <summary>
25662 Send and receive mountd_client packets.
25663 </summary>
25664 @@ -41107,7 +40924,7 @@ Domain allowed access.
25665 </param>
25666 <infoflow type="both" weight="10"/>
25667 </interface>
25668 -<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="49689">
25669 +<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="49812">
25670 <summary>
25671 Do not audit attempts to send and receive mountd_client packets.
25672 </summary>
25673 @@ -41118,7 +40935,7 @@ Domain to not audit.
25674 </param>
25675 <infoflow type="none"/>
25676 </interface>
25677 -<interface name="corenet_relabelto_mountd_client_packets" lineno="49704">
25678 +<interface name="corenet_relabelto_mountd_client_packets" lineno="49827">
25679 <summary>
25680 Relabel packets to mountd_client the packet type.
25681 </summary>
25682 @@ -41128,7 +40945,7 @@ Domain allowed access.
25683 </summary>
25684 </param>
25685 </interface>
25686 -<interface name="corenet_send_mountd_server_packets" lineno="49724">
25687 +<interface name="corenet_send_mountd_server_packets" lineno="49847">
25688 <summary>
25689 Send mountd_server packets.
25690 </summary>
25691 @@ -41139,7 +40956,7 @@ Domain allowed access.
25692 </param>
25693 <infoflow type="write" weight="10"/>
25694 </interface>
25695 -<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="49743">
25696 +<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="49866">
25697 <summary>
25698 Do not audit attempts to send mountd_server packets.
25699 </summary>
25700 @@ -41150,7 +40967,7 @@ Domain to not audit.
25701 </param>
25702 <infoflow type="none"/>
25703 </interface>
25704 -<interface name="corenet_receive_mountd_server_packets" lineno="49762">
25705 +<interface name="corenet_receive_mountd_server_packets" lineno="49885">
25706 <summary>
25707 Receive mountd_server packets.
25708 </summary>
25709 @@ -41161,7 +40978,7 @@ Domain allowed access.
25710 </param>
25711 <infoflow type="read" weight="10"/>
25712 </interface>
25713 -<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="49781">
25714 +<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="49904">
25715 <summary>
25716 Do not audit attempts to receive mountd_server packets.
25717 </summary>
25718 @@ -41172,7 +40989,7 @@ Domain allowed access.
25719 </param>
25720 <infoflow type="none"/>
25721 </interface>
25722 -<interface name="corenet_sendrecv_mountd_server_packets" lineno="49800">
25723 +<interface name="corenet_sendrecv_mountd_server_packets" lineno="49923">
25724 <summary>
25725 Send and receive mountd_server packets.
25726 </summary>
25727 @@ -41183,7 +41000,7 @@ Domain allowed access.
25728 </param>
25729 <infoflow type="both" weight="10"/>
25730 </interface>
25731 -<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="49816">
25732 +<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="49939">
25733 <summary>
25734 Do not audit attempts to send and receive mountd_server packets.
25735 </summary>
25736 @@ -41194,7 +41011,7 @@ Domain to not audit.
25737 </param>
25738 <infoflow type="none"/>
25739 </interface>
25740 -<interface name="corenet_relabelto_mountd_server_packets" lineno="49831">
25741 +<interface name="corenet_relabelto_mountd_server_packets" lineno="49954">
25742 <summary>
25743 Relabel packets to mountd_server the packet type.
25744 </summary>
25745 @@ -41204,7 +41021,7 @@ Domain allowed access.
25746 </summary>
25747 </param>
25748 </interface>
25749 -<interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="49853">
25750 +<interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="49976">
25751 <summary>
25752 Send and receive TCP traffic on the movaz_ssc port.
25753 </summary>
25754 @@ -41215,7 +41032,7 @@ Domain allowed access.
25755 </param>
25756 <infoflow type="both" weight="10"/>
25757 </interface>
25758 -<interface name="corenet_udp_send_movaz_ssc_port" lineno="49868">
25759 +<interface name="corenet_udp_send_movaz_ssc_port" lineno="49991">
25760 <summary>
25761 Send UDP traffic on the movaz_ssc port.
25762 </summary>
25763 @@ -41226,7 +41043,7 @@ Domain allowed access.
25764 </param>
25765 <infoflow type="write" weight="10"/>
25766 </interface>
25767 -<interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="49883">
25768 +<interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="50006">
25769 <summary>
25770 Do not audit attempts to send UDP traffic on the movaz_ssc port.
25771 </summary>
25772 @@ -41237,7 +41054,7 @@ Domain to not audit.
25773 </param>
25774 <infoflow type="none"/>
25775 </interface>
25776 -<interface name="corenet_udp_receive_movaz_ssc_port" lineno="49898">
25777 +<interface name="corenet_udp_receive_movaz_ssc_port" lineno="50021">
25778 <summary>
25779 Receive UDP traffic on the movaz_ssc port.
25780 </summary>
25781 @@ -41248,7 +41065,7 @@ Domain allowed access.
25782 </param>
25783 <infoflow type="read" weight="10"/>
25784 </interface>
25785 -<interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="49913">
25786 +<interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="50036">
25787 <summary>
25788 Do not audit attempts to receive UDP traffic on the movaz_ssc port.
25789 </summary>
25790 @@ -41259,7 +41076,7 @@ Domain to not audit.
25791 </param>
25792 <infoflow type="none"/>
25793 </interface>
25794 -<interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="49928">
25795 +<interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="50051">
25796 <summary>
25797 Send and receive UDP traffic on the movaz_ssc port.
25798 </summary>
25799 @@ -41270,7 +41087,7 @@ Domain allowed access.
25800 </param>
25801 <infoflow type="both" weight="10"/>
25802 </interface>
25803 -<interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="49944">
25804 +<interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="50067">
25805 <summary>
25806 Do not audit attempts to send and receive
25807 UDP traffic on the movaz_ssc port.
25808 @@ -41282,7 +41099,7 @@ Domain to not audit.
25809 </param>
25810 <infoflow type="none"/>
25811 </interface>
25812 -<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="49959">
25813 +<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="50082">
25814 <summary>
25815 Bind TCP sockets to the movaz_ssc port.
25816 </summary>
25817 @@ -41293,7 +41110,7 @@ Domain allowed access.
25818 </param>
25819 <infoflow type="none"/>
25820 </interface>
25821 -<interface name="corenet_udp_bind_movaz_ssc_port" lineno="49979">
25822 +<interface name="corenet_udp_bind_movaz_ssc_port" lineno="50102">
25823 <summary>
25824 Bind UDP sockets to the movaz_ssc port.
25825 </summary>
25826 @@ -41304,7 +41121,7 @@ Domain allowed access.
25827 </param>
25828 <infoflow type="none"/>
25829 </interface>
25830 -<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="49998">
25831 +<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="50121">
25832 <summary>
25833 Make a TCP connection to the movaz_ssc port.
25834 </summary>
25835 @@ -41314,7 +41131,7 @@ Domain allowed access.
25836 </summary>
25837 </param>
25838 </interface>
25839 -<interface name="corenet_send_movaz_ssc_client_packets" lineno="50018">
25840 +<interface name="corenet_send_movaz_ssc_client_packets" lineno="50141">
25841 <summary>
25842 Send movaz_ssc_client packets.
25843 </summary>
25844 @@ -41325,7 +41142,7 @@ Domain allowed access.
25845 </param>
25846 <infoflow type="write" weight="10"/>
25847 </interface>
25848 -<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="50037">
25849 +<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="50160">
25850 <summary>
25851 Do not audit attempts to send movaz_ssc_client packets.
25852 </summary>
25853 @@ -41336,7 +41153,7 @@ Domain to not audit.
25854 </param>
25855 <infoflow type="none"/>
25856 </interface>
25857 -<interface name="corenet_receive_movaz_ssc_client_packets" lineno="50056">
25858 +<interface name="corenet_receive_movaz_ssc_client_packets" lineno="50179">
25859 <summary>
25860 Receive movaz_ssc_client packets.
25861 </summary>
25862 @@ -41347,7 +41164,7 @@ Domain allowed access.
25863 </param>
25864 <infoflow type="read" weight="10"/>
25865 </interface>
25866 -<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="50075">
25867 +<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="50198">
25868 <summary>
25869 Do not audit attempts to receive movaz_ssc_client packets.
25870 </summary>
25871 @@ -41358,7 +41175,7 @@ Domain allowed access.
25872 </param>
25873 <infoflow type="none"/>
25874 </interface>
25875 -<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="50094">
25876 +<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="50217">
25877 <summary>
25878 Send and receive movaz_ssc_client packets.
25879 </summary>
25880 @@ -41369,7 +41186,7 @@ Domain allowed access.
25881 </param>
25882 <infoflow type="both" weight="10"/>
25883 </interface>
25884 -<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="50110">
25885 +<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="50233">
25886 <summary>
25887 Do not audit attempts to send and receive movaz_ssc_client packets.
25888 </summary>
25889 @@ -41380,7 +41197,7 @@ Domain to not audit.
25890 </param>
25891 <infoflow type="none"/>
25892 </interface>
25893 -<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="50125">
25894 +<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="50248">
25895 <summary>
25896 Relabel packets to movaz_ssc_client the packet type.
25897 </summary>
25898 @@ -41390,7 +41207,7 @@ Domain allowed access.
25899 </summary>
25900 </param>
25901 </interface>
25902 -<interface name="corenet_send_movaz_ssc_server_packets" lineno="50145">
25903 +<interface name="corenet_send_movaz_ssc_server_packets" lineno="50268">
25904 <summary>
25905 Send movaz_ssc_server packets.
25906 </summary>
25907 @@ -41401,7 +41218,7 @@ Domain allowed access.
25908 </param>
25909 <infoflow type="write" weight="10"/>
25910 </interface>
25911 -<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="50164">
25912 +<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="50287">
25913 <summary>
25914 Do not audit attempts to send movaz_ssc_server packets.
25915 </summary>
25916 @@ -41412,7 +41229,7 @@ Domain to not audit.
25917 </param>
25918 <infoflow type="none"/>
25919 </interface>
25920 -<interface name="corenet_receive_movaz_ssc_server_packets" lineno="50183">
25921 +<interface name="corenet_receive_movaz_ssc_server_packets" lineno="50306">
25922 <summary>
25923 Receive movaz_ssc_server packets.
25924 </summary>
25925 @@ -41423,7 +41240,7 @@ Domain allowed access.
25926 </param>
25927 <infoflow type="read" weight="10"/>
25928 </interface>
25929 -<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="50202">
25930 +<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="50325">
25931 <summary>
25932 Do not audit attempts to receive movaz_ssc_server packets.
25933 </summary>
25934 @@ -41434,7 +41251,7 @@ Domain allowed access.
25935 </param>
25936 <infoflow type="none"/>
25937 </interface>
25938 -<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="50221">
25939 +<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="50344">
25940 <summary>
25941 Send and receive movaz_ssc_server packets.
25942 </summary>
25943 @@ -41445,7 +41262,7 @@ Domain allowed access.
25944 </param>
25945 <infoflow type="both" weight="10"/>
25946 </interface>
25947 -<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="50237">
25948 +<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="50360">
25949 <summary>
25950 Do not audit attempts to send and receive movaz_ssc_server packets.
25951 </summary>
25952 @@ -41456,7 +41273,7 @@ Domain to not audit.
25953 </param>
25954 <infoflow type="none"/>
25955 </interface>
25956 -<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="50252">
25957 +<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="50375">
25958 <summary>
25959 Relabel packets to movaz_ssc_server the packet type.
25960 </summary>
25961 @@ -41466,7 +41283,7 @@ Domain allowed access.
25962 </summary>
25963 </param>
25964 </interface>
25965 -<interface name="corenet_tcp_sendrecv_mpd_port" lineno="50274">
25966 +<interface name="corenet_tcp_sendrecv_mpd_port" lineno="50397">
25967 <summary>
25968 Send and receive TCP traffic on the mpd port.
25969 </summary>
25970 @@ -41477,7 +41294,7 @@ Domain allowed access.
25971 </param>
25972 <infoflow type="both" weight="10"/>
25973 </interface>
25974 -<interface name="corenet_udp_send_mpd_port" lineno="50289">
25975 +<interface name="corenet_udp_send_mpd_port" lineno="50412">
25976 <summary>
25977 Send UDP traffic on the mpd port.
25978 </summary>
25979 @@ -41488,7 +41305,7 @@ Domain allowed access.
25980 </param>
25981 <infoflow type="write" weight="10"/>
25982 </interface>
25983 -<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="50304">
25984 +<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="50427">
25985 <summary>
25986 Do not audit attempts to send UDP traffic on the mpd port.
25987 </summary>
25988 @@ -41499,7 +41316,7 @@ Domain to not audit.
25989 </param>
25990 <infoflow type="none"/>
25991 </interface>
25992 -<interface name="corenet_udp_receive_mpd_port" lineno="50319">
25993 +<interface name="corenet_udp_receive_mpd_port" lineno="50442">
25994 <summary>
25995 Receive UDP traffic on the mpd port.
25996 </summary>
25997 @@ -41510,7 +41327,7 @@ Domain allowed access.
25998 </param>
25999 <infoflow type="read" weight="10"/>
26000 </interface>
26001 -<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="50334">
26002 +<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="50457">
26003 <summary>
26004 Do not audit attempts to receive UDP traffic on the mpd port.
26005 </summary>
26006 @@ -41521,7 +41338,7 @@ Domain to not audit.
26007 </param>
26008 <infoflow type="none"/>
26009 </interface>
26010 -<interface name="corenet_udp_sendrecv_mpd_port" lineno="50349">
26011 +<interface name="corenet_udp_sendrecv_mpd_port" lineno="50472">
26012 <summary>
26013 Send and receive UDP traffic on the mpd port.
26014 </summary>
26015 @@ -41532,7 +41349,7 @@ Domain allowed access.
26016 </param>
26017 <infoflow type="both" weight="10"/>
26018 </interface>
26019 -<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="50365">
26020 +<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="50488">
26021 <summary>
26022 Do not audit attempts to send and receive
26023 UDP traffic on the mpd port.
26024 @@ -41544,7 +41361,7 @@ Domain to not audit.
26025 </param>
26026 <infoflow type="none"/>
26027 </interface>
26028 -<interface name="corenet_tcp_bind_mpd_port" lineno="50380">
26029 +<interface name="corenet_tcp_bind_mpd_port" lineno="50503">
26030 <summary>
26031 Bind TCP sockets to the mpd port.
26032 </summary>
26033 @@ -41555,7 +41372,7 @@ Domain allowed access.
26034 </param>
26035 <infoflow type="none"/>
26036 </interface>
26037 -<interface name="corenet_udp_bind_mpd_port" lineno="50400">
26038 +<interface name="corenet_udp_bind_mpd_port" lineno="50523">
26039 <summary>
26040 Bind UDP sockets to the mpd port.
26041 </summary>
26042 @@ -41566,7 +41383,7 @@ Domain allowed access.
26043 </param>
26044 <infoflow type="none"/>
26045 </interface>
26046 -<interface name="corenet_tcp_connect_mpd_port" lineno="50419">
26047 +<interface name="corenet_tcp_connect_mpd_port" lineno="50542">
26048 <summary>
26049 Make a TCP connection to the mpd port.
26050 </summary>
26051 @@ -41576,7 +41393,7 @@ Domain allowed access.
26052 </summary>
26053 </param>
26054 </interface>
26055 -<interface name="corenet_send_mpd_client_packets" lineno="50439">
26056 +<interface name="corenet_send_mpd_client_packets" lineno="50562">
26057 <summary>
26058 Send mpd_client packets.
26059 </summary>
26060 @@ -41587,7 +41404,7 @@ Domain allowed access.
26061 </param>
26062 <infoflow type="write" weight="10"/>
26063 </interface>
26064 -<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="50458">
26065 +<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="50581">
26066 <summary>
26067 Do not audit attempts to send mpd_client packets.
26068 </summary>
26069 @@ -41598,7 +41415,7 @@ Domain to not audit.
26070 </param>
26071 <infoflow type="none"/>
26072 </interface>
26073 -<interface name="corenet_receive_mpd_client_packets" lineno="50477">
26074 +<interface name="corenet_receive_mpd_client_packets" lineno="50600">
26075 <summary>
26076 Receive mpd_client packets.
26077 </summary>
26078 @@ -41609,7 +41426,7 @@ Domain allowed access.
26079 </param>
26080 <infoflow type="read" weight="10"/>
26081 </interface>
26082 -<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="50496">
26083 +<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="50619">
26084 <summary>
26085 Do not audit attempts to receive mpd_client packets.
26086 </summary>
26087 @@ -41620,7 +41437,7 @@ Domain allowed access.
26088 </param>
26089 <infoflow type="none"/>
26090 </interface>
26091 -<interface name="corenet_sendrecv_mpd_client_packets" lineno="50515">
26092 +<interface name="corenet_sendrecv_mpd_client_packets" lineno="50638">
26093 <summary>
26094 Send and receive mpd_client packets.
26095 </summary>
26096 @@ -41631,7 +41448,7 @@ Domain allowed access.
26097 </param>
26098 <infoflow type="both" weight="10"/>
26099 </interface>
26100 -<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="50531">
26101 +<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="50654">
26102 <summary>
26103 Do not audit attempts to send and receive mpd_client packets.
26104 </summary>
26105 @@ -41642,7 +41459,7 @@ Domain to not audit.
26106 </param>
26107 <infoflow type="none"/>
26108 </interface>
26109 -<interface name="corenet_relabelto_mpd_client_packets" lineno="50546">
26110 +<interface name="corenet_relabelto_mpd_client_packets" lineno="50669">
26111 <summary>
26112 Relabel packets to mpd_client the packet type.
26113 </summary>
26114 @@ -41652,7 +41469,7 @@ Domain allowed access.
26115 </summary>
26116 </param>
26117 </interface>
26118 -<interface name="corenet_send_mpd_server_packets" lineno="50566">
26119 +<interface name="corenet_send_mpd_server_packets" lineno="50689">
26120 <summary>
26121 Send mpd_server packets.
26122 </summary>
26123 @@ -41663,7 +41480,7 @@ Domain allowed access.
26124 </param>
26125 <infoflow type="write" weight="10"/>
26126 </interface>
26127 -<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="50585">
26128 +<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="50708">
26129 <summary>
26130 Do not audit attempts to send mpd_server packets.
26131 </summary>
26132 @@ -41674,7 +41491,7 @@ Domain to not audit.
26133 </param>
26134 <infoflow type="none"/>
26135 </interface>
26136 -<interface name="corenet_receive_mpd_server_packets" lineno="50604">
26137 +<interface name="corenet_receive_mpd_server_packets" lineno="50727">
26138 <summary>
26139 Receive mpd_server packets.
26140 </summary>
26141 @@ -41685,7 +41502,7 @@ Domain allowed access.
26142 </param>
26143 <infoflow type="read" weight="10"/>
26144 </interface>
26145 -<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="50623">
26146 +<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="50746">
26147 <summary>
26148 Do not audit attempts to receive mpd_server packets.
26149 </summary>
26150 @@ -41696,7 +41513,7 @@ Domain allowed access.
26151 </param>
26152 <infoflow type="none"/>
26153 </interface>
26154 -<interface name="corenet_sendrecv_mpd_server_packets" lineno="50642">
26155 +<interface name="corenet_sendrecv_mpd_server_packets" lineno="50765">
26156 <summary>
26157 Send and receive mpd_server packets.
26158 </summary>
26159 @@ -41707,7 +41524,7 @@ Domain allowed access.
26160 </param>
26161 <infoflow type="both" weight="10"/>
26162 </interface>
26163 -<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="50658">
26164 +<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="50781">
26165 <summary>
26166 Do not audit attempts to send and receive mpd_server packets.
26167 </summary>
26168 @@ -41718,7 +41535,7 @@ Domain to not audit.
26169 </param>
26170 <infoflow type="none"/>
26171 </interface>
26172 -<interface name="corenet_relabelto_mpd_server_packets" lineno="50673">
26173 +<interface name="corenet_relabelto_mpd_server_packets" lineno="50796">
26174 <summary>
26175 Relabel packets to mpd_server the packet type.
26176 </summary>
26177 @@ -41728,7 +41545,7 @@ Domain allowed access.
26178 </summary>
26179 </param>
26180 </interface>
26181 -<interface name="corenet_tcp_sendrecv_msgsrvr_port" lineno="50695">
26182 +<interface name="corenet_tcp_sendrecv_msgsrvr_port" lineno="50818">
26183 <summary>
26184 Send and receive TCP traffic on the msgsrvr port.
26185 </summary>
26186 @@ -41739,7 +41556,7 @@ Domain allowed access.
26187 </param>
26188 <infoflow type="both" weight="10"/>
26189 </interface>
26190 -<interface name="corenet_udp_send_msgsrvr_port" lineno="50710">
26191 +<interface name="corenet_udp_send_msgsrvr_port" lineno="50833">
26192 <summary>
26193 Send UDP traffic on the msgsrvr port.
26194 </summary>
26195 @@ -41750,7 +41567,7 @@ Domain allowed access.
26196 </param>
26197 <infoflow type="write" weight="10"/>
26198 </interface>
26199 -<interface name="corenet_dontaudit_udp_send_msgsrvr_port" lineno="50725">
26200 +<interface name="corenet_dontaudit_udp_send_msgsrvr_port" lineno="50848">
26201 <summary>
26202 Do not audit attempts to send UDP traffic on the msgsrvr port.
26203 </summary>
26204 @@ -41761,7 +41578,7 @@ Domain to not audit.
26205 </param>
26206 <infoflow type="none"/>
26207 </interface>
26208 -<interface name="corenet_udp_receive_msgsrvr_port" lineno="50740">
26209 +<interface name="corenet_udp_receive_msgsrvr_port" lineno="50863">
26210 <summary>
26211 Receive UDP traffic on the msgsrvr port.
26212 </summary>
26213 @@ -41772,7 +41589,7 @@ Domain allowed access.
26214 </param>
26215 <infoflow type="read" weight="10"/>
26216 </interface>
26217 -<interface name="corenet_dontaudit_udp_receive_msgsrvr_port" lineno="50755">
26218 +<interface name="corenet_dontaudit_udp_receive_msgsrvr_port" lineno="50878">
26219 <summary>
26220 Do not audit attempts to receive UDP traffic on the msgsrvr port.
26221 </summary>
26222 @@ -41783,7 +41600,7 @@ Domain to not audit.
26223 </param>
26224 <infoflow type="none"/>
26225 </interface>
26226 -<interface name="corenet_udp_sendrecv_msgsrvr_port" lineno="50770">
26227 +<interface name="corenet_udp_sendrecv_msgsrvr_port" lineno="50893">
26228 <summary>
26229 Send and receive UDP traffic on the msgsrvr port.
26230 </summary>
26231 @@ -41794,7 +41611,7 @@ Domain allowed access.
26232 </param>
26233 <infoflow type="both" weight="10"/>
26234 </interface>
26235 -<interface name="corenet_dontaudit_udp_sendrecv_msgsrvr_port" lineno="50786">
26236 +<interface name="corenet_dontaudit_udp_sendrecv_msgsrvr_port" lineno="50909">
26237 <summary>
26238 Do not audit attempts to send and receive
26239 UDP traffic on the msgsrvr port.
26240 @@ -41806,7 +41623,7 @@ Domain to not audit.
26241 </param>
26242 <infoflow type="none"/>
26243 </interface>
26244 -<interface name="corenet_tcp_bind_msgsrvr_port" lineno="50801">
26245 +<interface name="corenet_tcp_bind_msgsrvr_port" lineno="50924">
26246 <summary>
26247 Bind TCP sockets to the msgsrvr port.
26248 </summary>
26249 @@ -41817,7 +41634,7 @@ Domain allowed access.
26250 </param>
26251 <infoflow type="none"/>
26252 </interface>
26253 -<interface name="corenet_udp_bind_msgsrvr_port" lineno="50821">
26254 +<interface name="corenet_udp_bind_msgsrvr_port" lineno="50944">
26255 <summary>
26256 Bind UDP sockets to the msgsrvr port.
26257 </summary>
26258 @@ -41828,7 +41645,7 @@ Domain allowed access.
26259 </param>
26260 <infoflow type="none"/>
26261 </interface>
26262 -<interface name="corenet_tcp_connect_msgsrvr_port" lineno="50840">
26263 +<interface name="corenet_tcp_connect_msgsrvr_port" lineno="50963">
26264 <summary>
26265 Make a TCP connection to the msgsrvr port.
26266 </summary>
26267 @@ -41838,7 +41655,7 @@ Domain allowed access.
26268 </summary>
26269 </param>
26270 </interface>
26271 -<interface name="corenet_send_msgsrvr_client_packets" lineno="50860">
26272 +<interface name="corenet_send_msgsrvr_client_packets" lineno="50983">
26273 <summary>
26274 Send msgsrvr_client packets.
26275 </summary>
26276 @@ -41849,7 +41666,7 @@ Domain allowed access.
26277 </param>
26278 <infoflow type="write" weight="10"/>
26279 </interface>
26280 -<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="50879">
26281 +<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="51002">
26282 <summary>
26283 Do not audit attempts to send msgsrvr_client packets.
26284 </summary>
26285 @@ -41860,7 +41677,7 @@ Domain to not audit.
26286 </param>
26287 <infoflow type="none"/>
26288 </interface>
26289 -<interface name="corenet_receive_msgsrvr_client_packets" lineno="50898">
26290 +<interface name="corenet_receive_msgsrvr_client_packets" lineno="51021">
26291 <summary>
26292 Receive msgsrvr_client packets.
26293 </summary>
26294 @@ -41871,7 +41688,7 @@ Domain allowed access.
26295 </param>
26296 <infoflow type="read" weight="10"/>
26297 </interface>
26298 -<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="50917">
26299 +<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="51040">
26300 <summary>
26301 Do not audit attempts to receive msgsrvr_client packets.
26302 </summary>
26303 @@ -41882,7 +41699,7 @@ Domain allowed access.
26304 </param>
26305 <infoflow type="none"/>
26306 </interface>
26307 -<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="50936">
26308 +<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="51059">
26309 <summary>
26310 Send and receive msgsrvr_client packets.
26311 </summary>
26312 @@ -41893,7 +41710,7 @@ Domain allowed access.
26313 </param>
26314 <infoflow type="both" weight="10"/>
26315 </interface>
26316 -<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="50952">
26317 +<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="51075">
26318 <summary>
26319 Do not audit attempts to send and receive msgsrvr_client packets.
26320 </summary>
26321 @@ -41904,7 +41721,7 @@ Domain to not audit.
26322 </param>
26323 <infoflow type="none"/>
26324 </interface>
26325 -<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="50967">
26326 +<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="51090">
26327 <summary>
26328 Relabel packets to msgsrvr_client the packet type.
26329 </summary>
26330 @@ -41914,7 +41731,7 @@ Domain allowed access.
26331 </summary>
26332 </param>
26333 </interface>
26334 -<interface name="corenet_send_msgsrvr_server_packets" lineno="50987">
26335 +<interface name="corenet_send_msgsrvr_server_packets" lineno="51110">
26336 <summary>
26337 Send msgsrvr_server packets.
26338 </summary>
26339 @@ -41925,7 +41742,7 @@ Domain allowed access.
26340 </param>
26341 <infoflow type="write" weight="10"/>
26342 </interface>
26343 -<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="51006">
26344 +<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="51129">
26345 <summary>
26346 Do not audit attempts to send msgsrvr_server packets.
26347 </summary>
26348 @@ -41936,7 +41753,7 @@ Domain to not audit.
26349 </param>
26350 <infoflow type="none"/>
26351 </interface>
26352 -<interface name="corenet_receive_msgsrvr_server_packets" lineno="51025">
26353 +<interface name="corenet_receive_msgsrvr_server_packets" lineno="51148">
26354 <summary>
26355 Receive msgsrvr_server packets.
26356 </summary>
26357 @@ -41947,7 +41764,7 @@ Domain allowed access.
26358 </param>
26359 <infoflow type="read" weight="10"/>
26360 </interface>
26361 -<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="51044">
26362 +<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="51167">
26363 <summary>
26364 Do not audit attempts to receive msgsrvr_server packets.
26365 </summary>
26366 @@ -41958,7 +41775,7 @@ Domain allowed access.
26367 </param>
26368 <infoflow type="none"/>
26369 </interface>
26370 -<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="51063">
26371 +<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="51186">
26372 <summary>
26373 Send and receive msgsrvr_server packets.
26374 </summary>
26375 @@ -41969,7 +41786,7 @@ Domain allowed access.
26376 </param>
26377 <infoflow type="both" weight="10"/>
26378 </interface>
26379 -<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="51079">
26380 +<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="51202">
26381 <summary>
26382 Do not audit attempts to send and receive msgsrvr_server packets.
26383 </summary>
26384 @@ -41980,7 +41797,7 @@ Domain to not audit.
26385 </param>
26386 <infoflow type="none"/>
26387 </interface>
26388 -<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="51094">
26389 +<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="51217">
26390 <summary>
26391 Relabel packets to msgsrvr_server the packet type.
26392 </summary>
26393 @@ -41990,7 +41807,7 @@ Domain allowed access.
26394 </summary>
26395 </param>
26396 </interface>
26397 -<interface name="corenet_tcp_sendrecv_msnp_port" lineno="51116">
26398 +<interface name="corenet_tcp_sendrecv_msnp_port" lineno="51239">
26399 <summary>
26400 Send and receive TCP traffic on the msnp port.
26401 </summary>
26402 @@ -42001,7 +41818,7 @@ Domain allowed access.
26403 </param>
26404 <infoflow type="both" weight="10"/>
26405 </interface>
26406 -<interface name="corenet_udp_send_msnp_port" lineno="51131">
26407 +<interface name="corenet_udp_send_msnp_port" lineno="51254">
26408 <summary>
26409 Send UDP traffic on the msnp port.
26410 </summary>
26411 @@ -42012,7 +41829,7 @@ Domain allowed access.
26412 </param>
26413 <infoflow type="write" weight="10"/>
26414 </interface>
26415 -<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="51146">
26416 +<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="51269">
26417 <summary>
26418 Do not audit attempts to send UDP traffic on the msnp port.
26419 </summary>
26420 @@ -42023,7 +41840,7 @@ Domain to not audit.
26421 </param>
26422 <infoflow type="none"/>
26423 </interface>
26424 -<interface name="corenet_udp_receive_msnp_port" lineno="51161">
26425 +<interface name="corenet_udp_receive_msnp_port" lineno="51284">
26426 <summary>
26427 Receive UDP traffic on the msnp port.
26428 </summary>
26429 @@ -42034,7 +41851,7 @@ Domain allowed access.
26430 </param>
26431 <infoflow type="read" weight="10"/>
26432 </interface>
26433 -<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="51176">
26434 +<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="51299">
26435 <summary>
26436 Do not audit attempts to receive UDP traffic on the msnp port.
26437 </summary>
26438 @@ -42045,7 +41862,7 @@ Domain to not audit.
26439 </param>
26440 <infoflow type="none"/>
26441 </interface>
26442 -<interface name="corenet_udp_sendrecv_msnp_port" lineno="51191">
26443 +<interface name="corenet_udp_sendrecv_msnp_port" lineno="51314">
26444 <summary>
26445 Send and receive UDP traffic on the msnp port.
26446 </summary>
26447 @@ -42056,7 +41873,7 @@ Domain allowed access.
26448 </param>
26449 <infoflow type="both" weight="10"/>
26450 </interface>
26451 -<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="51207">
26452 +<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="51330">
26453 <summary>
26454 Do not audit attempts to send and receive
26455 UDP traffic on the msnp port.
26456 @@ -42068,7 +41885,7 @@ Domain to not audit.
26457 </param>
26458 <infoflow type="none"/>
26459 </interface>
26460 -<interface name="corenet_tcp_bind_msnp_port" lineno="51222">
26461 +<interface name="corenet_tcp_bind_msnp_port" lineno="51345">
26462 <summary>
26463 Bind TCP sockets to the msnp port.
26464 </summary>
26465 @@ -42079,7 +41896,7 @@ Domain allowed access.
26466 </param>
26467 <infoflow type="none"/>
26468 </interface>
26469 -<interface name="corenet_udp_bind_msnp_port" lineno="51242">
26470 +<interface name="corenet_udp_bind_msnp_port" lineno="51365">
26471 <summary>
26472 Bind UDP sockets to the msnp port.
26473 </summary>
26474 @@ -42090,7 +41907,7 @@ Domain allowed access.
26475 </param>
26476 <infoflow type="none"/>
26477 </interface>
26478 -<interface name="corenet_tcp_connect_msnp_port" lineno="51261">
26479 +<interface name="corenet_tcp_connect_msnp_port" lineno="51384">
26480 <summary>
26481 Make a TCP connection to the msnp port.
26482 </summary>
26483 @@ -42100,7 +41917,7 @@ Domain allowed access.
26484 </summary>
26485 </param>
26486 </interface>
26487 -<interface name="corenet_send_msnp_client_packets" lineno="51281">
26488 +<interface name="corenet_send_msnp_client_packets" lineno="51404">
26489 <summary>
26490 Send msnp_client packets.
26491 </summary>
26492 @@ -42111,7 +41928,7 @@ Domain allowed access.
26493 </param>
26494 <infoflow type="write" weight="10"/>
26495 </interface>
26496 -<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="51300">
26497 +<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="51423">
26498 <summary>
26499 Do not audit attempts to send msnp_client packets.
26500 </summary>
26501 @@ -42122,7 +41939,7 @@ Domain to not audit.
26502 </param>
26503 <infoflow type="none"/>
26504 </interface>
26505 -<interface name="corenet_receive_msnp_client_packets" lineno="51319">
26506 +<interface name="corenet_receive_msnp_client_packets" lineno="51442">
26507 <summary>
26508 Receive msnp_client packets.
26509 </summary>
26510 @@ -42133,7 +41950,7 @@ Domain allowed access.
26511 </param>
26512 <infoflow type="read" weight="10"/>
26513 </interface>
26514 -<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="51338">
26515 +<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="51461">
26516 <summary>
26517 Do not audit attempts to receive msnp_client packets.
26518 </summary>
26519 @@ -42144,7 +41961,7 @@ Domain allowed access.
26520 </param>
26521 <infoflow type="none"/>
26522 </interface>
26523 -<interface name="corenet_sendrecv_msnp_client_packets" lineno="51357">
26524 +<interface name="corenet_sendrecv_msnp_client_packets" lineno="51480">
26525 <summary>
26526 Send and receive msnp_client packets.
26527 </summary>
26528 @@ -42155,7 +41972,7 @@ Domain allowed access.
26529 </param>
26530 <infoflow type="both" weight="10"/>
26531 </interface>
26532 -<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="51373">
26533 +<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="51496">
26534 <summary>
26535 Do not audit attempts to send and receive msnp_client packets.
26536 </summary>
26537 @@ -42166,7 +41983,7 @@ Domain to not audit.
26538 </param>
26539 <infoflow type="none"/>
26540 </interface>
26541 -<interface name="corenet_relabelto_msnp_client_packets" lineno="51388">
26542 +<interface name="corenet_relabelto_msnp_client_packets" lineno="51511">
26543 <summary>
26544 Relabel packets to msnp_client the packet type.
26545 </summary>
26546 @@ -42176,7 +41993,7 @@ Domain allowed access.
26547 </summary>
26548 </param>
26549 </interface>
26550 -<interface name="corenet_send_msnp_server_packets" lineno="51408">
26551 +<interface name="corenet_send_msnp_server_packets" lineno="51531">
26552 <summary>
26553 Send msnp_server packets.
26554 </summary>
26555 @@ -42187,7 +42004,7 @@ Domain allowed access.
26556 </param>
26557 <infoflow type="write" weight="10"/>
26558 </interface>
26559 -<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="51427">
26560 +<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="51550">
26561 <summary>
26562 Do not audit attempts to send msnp_server packets.
26563 </summary>
26564 @@ -42198,7 +42015,7 @@ Domain to not audit.
26565 </param>
26566 <infoflow type="none"/>
26567 </interface>
26568 -<interface name="corenet_receive_msnp_server_packets" lineno="51446">
26569 +<interface name="corenet_receive_msnp_server_packets" lineno="51569">
26570 <summary>
26571 Receive msnp_server packets.
26572 </summary>
26573 @@ -42209,7 +42026,7 @@ Domain allowed access.
26574 </param>
26575 <infoflow type="read" weight="10"/>
26576 </interface>
26577 -<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="51465">
26578 +<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="51588">
26579 <summary>
26580 Do not audit attempts to receive msnp_server packets.
26581 </summary>
26582 @@ -42220,7 +42037,7 @@ Domain allowed access.
26583 </param>
26584 <infoflow type="none"/>
26585 </interface>
26586 -<interface name="corenet_sendrecv_msnp_server_packets" lineno="51484">
26587 +<interface name="corenet_sendrecv_msnp_server_packets" lineno="51607">
26588 <summary>
26589 Send and receive msnp_server packets.
26590 </summary>
26591 @@ -42231,7 +42048,7 @@ Domain allowed access.
26592 </param>
26593 <infoflow type="both" weight="10"/>
26594 </interface>
26595 -<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="51500">
26596 +<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="51623">
26597 <summary>
26598 Do not audit attempts to send and receive msnp_server packets.
26599 </summary>
26600 @@ -42242,7 +42059,7 @@ Domain to not audit.
26601 </param>
26602 <infoflow type="none"/>
26603 </interface>
26604 -<interface name="corenet_relabelto_msnp_server_packets" lineno="51515">
26605 +<interface name="corenet_relabelto_msnp_server_packets" lineno="51638">
26606 <summary>
26607 Relabel packets to msnp_server the packet type.
26608 </summary>
26609 @@ -42252,7 +42069,7 @@ Domain allowed access.
26610 </summary>
26611 </param>
26612 </interface>
26613 -<interface name="corenet_tcp_sendrecv_mssql_port" lineno="51537">
26614 +<interface name="corenet_tcp_sendrecv_mssql_port" lineno="51660">
26615 <summary>
26616 Send and receive TCP traffic on the mssql port.
26617 </summary>
26618 @@ -42263,7 +42080,7 @@ Domain allowed access.
26619 </param>
26620 <infoflow type="both" weight="10"/>
26621 </interface>
26622 -<interface name="corenet_udp_send_mssql_port" lineno="51552">
26623 +<interface name="corenet_udp_send_mssql_port" lineno="51675">
26624 <summary>
26625 Send UDP traffic on the mssql port.
26626 </summary>
26627 @@ -42274,7 +42091,7 @@ Domain allowed access.
26628 </param>
26629 <infoflow type="write" weight="10"/>
26630 </interface>
26631 -<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="51567">
26632 +<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="51690">
26633 <summary>
26634 Do not audit attempts to send UDP traffic on the mssql port.
26635 </summary>
26636 @@ -42285,7 +42102,7 @@ Domain to not audit.
26637 </param>
26638 <infoflow type="none"/>
26639 </interface>
26640 -<interface name="corenet_udp_receive_mssql_port" lineno="51582">
26641 +<interface name="corenet_udp_receive_mssql_port" lineno="51705">
26642 <summary>
26643 Receive UDP traffic on the mssql port.
26644 </summary>
26645 @@ -42296,7 +42113,7 @@ Domain allowed access.
26646 </param>
26647 <infoflow type="read" weight="10"/>
26648 </interface>
26649 -<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="51597">
26650 +<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="51720">
26651 <summary>
26652 Do not audit attempts to receive UDP traffic on the mssql port.
26653 </summary>
26654 @@ -42307,7 +42124,7 @@ Domain to not audit.
26655 </param>
26656 <infoflow type="none"/>
26657 </interface>
26658 -<interface name="corenet_udp_sendrecv_mssql_port" lineno="51612">
26659 +<interface name="corenet_udp_sendrecv_mssql_port" lineno="51735">
26660 <summary>
26661 Send and receive UDP traffic on the mssql port.
26662 </summary>
26663 @@ -42318,7 +42135,7 @@ Domain allowed access.
26664 </param>
26665 <infoflow type="both" weight="10"/>
26666 </interface>
26667 -<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="51628">
26668 +<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="51751">
26669 <summary>
26670 Do not audit attempts to send and receive
26671 UDP traffic on the mssql port.
26672 @@ -42330,7 +42147,7 @@ Domain to not audit.
26673 </param>
26674 <infoflow type="none"/>
26675 </interface>
26676 -<interface name="corenet_tcp_bind_mssql_port" lineno="51643">
26677 +<interface name="corenet_tcp_bind_mssql_port" lineno="51766">
26678 <summary>
26679 Bind TCP sockets to the mssql port.
26680 </summary>
26681 @@ -42341,7 +42158,7 @@ Domain allowed access.
26682 </param>
26683 <infoflow type="none"/>
26684 </interface>
26685 -<interface name="corenet_udp_bind_mssql_port" lineno="51663">
26686 +<interface name="corenet_udp_bind_mssql_port" lineno="51786">
26687 <summary>
26688 Bind UDP sockets to the mssql port.
26689 </summary>
26690 @@ -42352,7 +42169,7 @@ Domain allowed access.
26691 </param>
26692 <infoflow type="none"/>
26693 </interface>
26694 -<interface name="corenet_tcp_connect_mssql_port" lineno="51682">
26695 +<interface name="corenet_tcp_connect_mssql_port" lineno="51805">
26696 <summary>
26697 Make a TCP connection to the mssql port.
26698 </summary>
26699 @@ -42362,7 +42179,7 @@ Domain allowed access.
26700 </summary>
26701 </param>
26702 </interface>
26703 -<interface name="corenet_send_mssql_client_packets" lineno="51702">
26704 +<interface name="corenet_send_mssql_client_packets" lineno="51825">
26705 <summary>
26706 Send mssql_client packets.
26707 </summary>
26708 @@ -42373,7 +42190,7 @@ Domain allowed access.
26709 </param>
26710 <infoflow type="write" weight="10"/>
26711 </interface>
26712 -<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="51721">
26713 +<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="51844">
26714 <summary>
26715 Do not audit attempts to send mssql_client packets.
26716 </summary>
26717 @@ -42384,7 +42201,7 @@ Domain to not audit.
26718 </param>
26719 <infoflow type="none"/>
26720 </interface>
26721 -<interface name="corenet_receive_mssql_client_packets" lineno="51740">
26722 +<interface name="corenet_receive_mssql_client_packets" lineno="51863">
26723 <summary>
26724 Receive mssql_client packets.
26725 </summary>
26726 @@ -42395,7 +42212,7 @@ Domain allowed access.
26727 </param>
26728 <infoflow type="read" weight="10"/>
26729 </interface>
26730 -<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="51759">
26731 +<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="51882">
26732 <summary>
26733 Do not audit attempts to receive mssql_client packets.
26734 </summary>
26735 @@ -42406,7 +42223,7 @@ Domain allowed access.
26736 </param>
26737 <infoflow type="none"/>
26738 </interface>
26739 -<interface name="corenet_sendrecv_mssql_client_packets" lineno="51778">
26740 +<interface name="corenet_sendrecv_mssql_client_packets" lineno="51901">
26741 <summary>
26742 Send and receive mssql_client packets.
26743 </summary>
26744 @@ -42417,7 +42234,7 @@ Domain allowed access.
26745 </param>
26746 <infoflow type="both" weight="10"/>
26747 </interface>
26748 -<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="51794">
26749 +<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="51917">
26750 <summary>
26751 Do not audit attempts to send and receive mssql_client packets.
26752 </summary>
26753 @@ -42428,7 +42245,7 @@ Domain to not audit.
26754 </param>
26755 <infoflow type="none"/>
26756 </interface>
26757 -<interface name="corenet_relabelto_mssql_client_packets" lineno="51809">
26758 +<interface name="corenet_relabelto_mssql_client_packets" lineno="51932">
26759 <summary>
26760 Relabel packets to mssql_client the packet type.
26761 </summary>
26762 @@ -42438,7 +42255,7 @@ Domain allowed access.
26763 </summary>
26764 </param>
26765 </interface>
26766 -<interface name="corenet_send_mssql_server_packets" lineno="51829">
26767 +<interface name="corenet_send_mssql_server_packets" lineno="51952">
26768 <summary>
26769 Send mssql_server packets.
26770 </summary>
26771 @@ -42449,7 +42266,7 @@ Domain allowed access.
26772 </param>
26773 <infoflow type="write" weight="10"/>
26774 </interface>
26775 -<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="51848">
26776 +<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="51971">
26777 <summary>
26778 Do not audit attempts to send mssql_server packets.
26779 </summary>
26780 @@ -42460,7 +42277,7 @@ Domain to not audit.
26781 </param>
26782 <infoflow type="none"/>
26783 </interface>
26784 -<interface name="corenet_receive_mssql_server_packets" lineno="51867">
26785 +<interface name="corenet_receive_mssql_server_packets" lineno="51990">
26786 <summary>
26787 Receive mssql_server packets.
26788 </summary>
26789 @@ -42471,7 +42288,7 @@ Domain allowed access.
26790 </param>
26791 <infoflow type="read" weight="10"/>
26792 </interface>
26793 -<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="51886">
26794 +<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="52009">
26795 <summary>
26796 Do not audit attempts to receive mssql_server packets.
26797 </summary>
26798 @@ -42482,7 +42299,7 @@ Domain allowed access.
26799 </param>
26800 <infoflow type="none"/>
26801 </interface>
26802 -<interface name="corenet_sendrecv_mssql_server_packets" lineno="51905">
26803 +<interface name="corenet_sendrecv_mssql_server_packets" lineno="52028">
26804 <summary>
26805 Send and receive mssql_server packets.
26806 </summary>
26807 @@ -42493,7 +42310,7 @@ Domain allowed access.
26808 </param>
26809 <infoflow type="both" weight="10"/>
26810 </interface>
26811 -<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="51921">
26812 +<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="52044">
26813 <summary>
26814 Do not audit attempts to send and receive mssql_server packets.
26815 </summary>
26816 @@ -42504,7 +42321,7 @@ Domain to not audit.
26817 </param>
26818 <infoflow type="none"/>
26819 </interface>
26820 -<interface name="corenet_relabelto_mssql_server_packets" lineno="51936">
26821 +<interface name="corenet_relabelto_mssql_server_packets" lineno="52059">
26822 <summary>
26823 Relabel packets to mssql_server the packet type.
26824 </summary>
26825 @@ -42514,7 +42331,7 @@ Domain allowed access.
26826 </summary>
26827 </param>
26828 </interface>
26829 -<interface name="corenet_tcp_sendrecv_ms_streaming_port" lineno="51958">
26830 +<interface name="corenet_tcp_sendrecv_ms_streaming_port" lineno="52081">
26831 <summary>
26832 Send and receive TCP traffic on the ms_streaming port.
26833 </summary>
26834 @@ -42525,7 +42342,7 @@ Domain allowed access.
26835 </param>
26836 <infoflow type="both" weight="10"/>
26837 </interface>
26838 -<interface name="corenet_udp_send_ms_streaming_port" lineno="51973">
26839 +<interface name="corenet_udp_send_ms_streaming_port" lineno="52096">
26840 <summary>
26841 Send UDP traffic on the ms_streaming port.
26842 </summary>
26843 @@ -42536,7 +42353,7 @@ Domain allowed access.
26844 </param>
26845 <infoflow type="write" weight="10"/>
26846 </interface>
26847 -<interface name="corenet_dontaudit_udp_send_ms_streaming_port" lineno="51988">
26848 +<interface name="corenet_dontaudit_udp_send_ms_streaming_port" lineno="52111">
26849 <summary>
26850 Do not audit attempts to send UDP traffic on the ms_streaming port.
26851 </summary>
26852 @@ -42547,7 +42364,7 @@ Domain to not audit.
26853 </param>
26854 <infoflow type="none"/>
26855 </interface>
26856 -<interface name="corenet_udp_receive_ms_streaming_port" lineno="52003">
26857 +<interface name="corenet_udp_receive_ms_streaming_port" lineno="52126">
26858 <summary>
26859 Receive UDP traffic on the ms_streaming port.
26860 </summary>
26861 @@ -42558,7 +42375,7 @@ Domain allowed access.
26862 </param>
26863 <infoflow type="read" weight="10"/>
26864 </interface>
26865 -<interface name="corenet_dontaudit_udp_receive_ms_streaming_port" lineno="52018">
26866 +<interface name="corenet_dontaudit_udp_receive_ms_streaming_port" lineno="52141">
26867 <summary>
26868 Do not audit attempts to receive UDP traffic on the ms_streaming port.
26869 </summary>
26870 @@ -42569,7 +42386,7 @@ Domain to not audit.
26871 </param>
26872 <infoflow type="none"/>
26873 </interface>
26874 -<interface name="corenet_udp_sendrecv_ms_streaming_port" lineno="52033">
26875 +<interface name="corenet_udp_sendrecv_ms_streaming_port" lineno="52156">
26876 <summary>
26877 Send and receive UDP traffic on the ms_streaming port.
26878 </summary>
26879 @@ -42580,7 +42397,7 @@ Domain allowed access.
26880 </param>
26881 <infoflow type="both" weight="10"/>
26882 </interface>
26883 -<interface name="corenet_dontaudit_udp_sendrecv_ms_streaming_port" lineno="52049">
26884 +<interface name="corenet_dontaudit_udp_sendrecv_ms_streaming_port" lineno="52172">
26885 <summary>
26886 Do not audit attempts to send and receive
26887 UDP traffic on the ms_streaming port.
26888 @@ -42592,7 +42409,7 @@ Domain to not audit.
26889 </param>
26890 <infoflow type="none"/>
26891 </interface>
26892 -<interface name="corenet_tcp_bind_ms_streaming_port" lineno="52064">
26893 +<interface name="corenet_tcp_bind_ms_streaming_port" lineno="52187">
26894 <summary>
26895 Bind TCP sockets to the ms_streaming port.
26896 </summary>
26897 @@ -42603,7 +42420,7 @@ Domain allowed access.
26898 </param>
26899 <infoflow type="none"/>
26900 </interface>
26901 -<interface name="corenet_udp_bind_ms_streaming_port" lineno="52084">
26902 +<interface name="corenet_udp_bind_ms_streaming_port" lineno="52207">
26903 <summary>
26904 Bind UDP sockets to the ms_streaming port.
26905 </summary>
26906 @@ -42614,7 +42431,7 @@ Domain allowed access.
26907 </param>
26908 <infoflow type="none"/>
26909 </interface>
26910 -<interface name="corenet_tcp_connect_ms_streaming_port" lineno="52103">
26911 +<interface name="corenet_tcp_connect_ms_streaming_port" lineno="52226">
26912 <summary>
26913 Make a TCP connection to the ms_streaming port.
26914 </summary>
26915 @@ -42624,7 +42441,7 @@ Domain allowed access.
26916 </summary>
26917 </param>
26918 </interface>
26919 -<interface name="corenet_send_ms_streaming_client_packets" lineno="52123">
26920 +<interface name="corenet_send_ms_streaming_client_packets" lineno="52246">
26921 <summary>
26922 Send ms_streaming_client packets.
26923 </summary>
26924 @@ -42635,7 +42452,7 @@ Domain allowed access.
26925 </param>
26926 <infoflow type="write" weight="10"/>
26927 </interface>
26928 -<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="52142">
26929 +<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="52265">
26930 <summary>
26931 Do not audit attempts to send ms_streaming_client packets.
26932 </summary>
26933 @@ -42646,7 +42463,7 @@ Domain to not audit.
26934 </param>
26935 <infoflow type="none"/>
26936 </interface>
26937 -<interface name="corenet_receive_ms_streaming_client_packets" lineno="52161">
26938 +<interface name="corenet_receive_ms_streaming_client_packets" lineno="52284">
26939 <summary>
26940 Receive ms_streaming_client packets.
26941 </summary>
26942 @@ -42657,7 +42474,7 @@ Domain allowed access.
26943 </param>
26944 <infoflow type="read" weight="10"/>
26945 </interface>
26946 -<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="52180">
26947 +<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="52303">
26948 <summary>
26949 Do not audit attempts to receive ms_streaming_client packets.
26950 </summary>
26951 @@ -42668,7 +42485,7 @@ Domain allowed access.
26952 </param>
26953 <infoflow type="none"/>
26954 </interface>
26955 -<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="52199">
26956 +<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="52322">
26957 <summary>
26958 Send and receive ms_streaming_client packets.
26959 </summary>
26960 @@ -42679,7 +42496,7 @@ Domain allowed access.
26961 </param>
26962 <infoflow type="both" weight="10"/>
26963 </interface>
26964 -<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="52215">
26965 +<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="52338">
26966 <summary>
26967 Do not audit attempts to send and receive ms_streaming_client packets.
26968 </summary>
26969 @@ -42690,7 +42507,7 @@ Domain to not audit.
26970 </param>
26971 <infoflow type="none"/>
26972 </interface>
26973 -<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="52230">
26974 +<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="52353">
26975 <summary>
26976 Relabel packets to ms_streaming_client the packet type.
26977 </summary>
26978 @@ -42700,7 +42517,7 @@ Domain allowed access.
26979 </summary>
26980 </param>
26981 </interface>
26982 -<interface name="corenet_send_ms_streaming_server_packets" lineno="52250">
26983 +<interface name="corenet_send_ms_streaming_server_packets" lineno="52373">
26984 <summary>
26985 Send ms_streaming_server packets.
26986 </summary>
26987 @@ -42711,7 +42528,7 @@ Domain allowed access.
26988 </param>
26989 <infoflow type="write" weight="10"/>
26990 </interface>
26991 -<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="52269">
26992 +<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="52392">
26993 <summary>
26994 Do not audit attempts to send ms_streaming_server packets.
26995 </summary>
26996 @@ -42722,7 +42539,7 @@ Domain to not audit.
26997 </param>
26998 <infoflow type="none"/>
26999 </interface>
27000 -<interface name="corenet_receive_ms_streaming_server_packets" lineno="52288">
27001 +<interface name="corenet_receive_ms_streaming_server_packets" lineno="52411">
27002 <summary>
27003 Receive ms_streaming_server packets.
27004 </summary>
27005 @@ -42733,7 +42550,7 @@ Domain allowed access.
27006 </param>
27007 <infoflow type="read" weight="10"/>
27008 </interface>
27009 -<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="52307">
27010 +<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="52430">
27011 <summary>
27012 Do not audit attempts to receive ms_streaming_server packets.
27013 </summary>
27014 @@ -42744,7 +42561,7 @@ Domain allowed access.
27015 </param>
27016 <infoflow type="none"/>
27017 </interface>
27018 -<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="52326">
27019 +<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="52449">
27020 <summary>
27021 Send and receive ms_streaming_server packets.
27022 </summary>
27023 @@ -42755,7 +42572,7 @@ Domain allowed access.
27024 </param>
27025 <infoflow type="both" weight="10"/>
27026 </interface>
27027 -<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="52342">
27028 +<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="52465">
27029 <summary>
27030 Do not audit attempts to send and receive ms_streaming_server packets.
27031 </summary>
27032 @@ -42766,7 +42583,7 @@ Domain to not audit.
27033 </param>
27034 <infoflow type="none"/>
27035 </interface>
27036 -<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="52357">
27037 +<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="52480">
27038 <summary>
27039 Relabel packets to ms_streaming_server the packet type.
27040 </summary>
27041 @@ -42776,7 +42593,7 @@ Domain allowed access.
27042 </summary>
27043 </param>
27044 </interface>
27045 -<interface name="corenet_tcp_sendrecv_munin_port" lineno="52379">
27046 +<interface name="corenet_tcp_sendrecv_munin_port" lineno="52502">
27047 <summary>
27048 Send and receive TCP traffic on the munin port.
27049 </summary>
27050 @@ -42787,7 +42604,7 @@ Domain allowed access.
27051 </param>
27052 <infoflow type="both" weight="10"/>
27053 </interface>
27054 -<interface name="corenet_udp_send_munin_port" lineno="52394">
27055 +<interface name="corenet_udp_send_munin_port" lineno="52517">
27056 <summary>
27057 Send UDP traffic on the munin port.
27058 </summary>
27059 @@ -42798,7 +42615,7 @@ Domain allowed access.
27060 </param>
27061 <infoflow type="write" weight="10"/>
27062 </interface>
27063 -<interface name="corenet_dontaudit_udp_send_munin_port" lineno="52409">
27064 +<interface name="corenet_dontaudit_udp_send_munin_port" lineno="52532">
27065 <summary>
27066 Do not audit attempts to send UDP traffic on the munin port.
27067 </summary>
27068 @@ -42809,7 +42626,7 @@ Domain to not audit.
27069 </param>
27070 <infoflow type="none"/>
27071 </interface>
27072 -<interface name="corenet_udp_receive_munin_port" lineno="52424">
27073 +<interface name="corenet_udp_receive_munin_port" lineno="52547">
27074 <summary>
27075 Receive UDP traffic on the munin port.
27076 </summary>
27077 @@ -42820,7 +42637,7 @@ Domain allowed access.
27078 </param>
27079 <infoflow type="read" weight="10"/>
27080 </interface>
27081 -<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="52439">
27082 +<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="52562">
27083 <summary>
27084 Do not audit attempts to receive UDP traffic on the munin port.
27085 </summary>
27086 @@ -42831,7 +42648,7 @@ Domain to not audit.
27087 </param>
27088 <infoflow type="none"/>
27089 </interface>
27090 -<interface name="corenet_udp_sendrecv_munin_port" lineno="52454">
27091 +<interface name="corenet_udp_sendrecv_munin_port" lineno="52577">
27092 <summary>
27093 Send and receive UDP traffic on the munin port.
27094 </summary>
27095 @@ -42842,7 +42659,7 @@ Domain allowed access.
27096 </param>
27097 <infoflow type="both" weight="10"/>
27098 </interface>
27099 -<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="52470">
27100 +<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="52593">
27101 <summary>
27102 Do not audit attempts to send and receive
27103 UDP traffic on the munin port.
27104 @@ -42854,7 +42671,7 @@ Domain to not audit.
27105 </param>
27106 <infoflow type="none"/>
27107 </interface>
27108 -<interface name="corenet_tcp_bind_munin_port" lineno="52485">
27109 +<interface name="corenet_tcp_bind_munin_port" lineno="52608">
27110 <summary>
27111 Bind TCP sockets to the munin port.
27112 </summary>
27113 @@ -42865,7 +42682,7 @@ Domain allowed access.
27114 </param>
27115 <infoflow type="none"/>
27116 </interface>
27117 -<interface name="corenet_udp_bind_munin_port" lineno="52505">
27118 +<interface name="corenet_udp_bind_munin_port" lineno="52628">
27119 <summary>
27120 Bind UDP sockets to the munin port.
27121 </summary>
27122 @@ -42876,7 +42693,7 @@ Domain allowed access.
27123 </param>
27124 <infoflow type="none"/>
27125 </interface>
27126 -<interface name="corenet_tcp_connect_munin_port" lineno="52524">
27127 +<interface name="corenet_tcp_connect_munin_port" lineno="52647">
27128 <summary>
27129 Make a TCP connection to the munin port.
27130 </summary>
27131 @@ -42886,7 +42703,7 @@ Domain allowed access.
27132 </summary>
27133 </param>
27134 </interface>
27135 -<interface name="corenet_send_munin_client_packets" lineno="52544">
27136 +<interface name="corenet_send_munin_client_packets" lineno="52667">
27137 <summary>
27138 Send munin_client packets.
27139 </summary>
27140 @@ -42897,7 +42714,7 @@ Domain allowed access.
27141 </param>
27142 <infoflow type="write" weight="10"/>
27143 </interface>
27144 -<interface name="corenet_dontaudit_send_munin_client_packets" lineno="52563">
27145 +<interface name="corenet_dontaudit_send_munin_client_packets" lineno="52686">
27146 <summary>
27147 Do not audit attempts to send munin_client packets.
27148 </summary>
27149 @@ -42908,7 +42725,7 @@ Domain to not audit.
27150 </param>
27151 <infoflow type="none"/>
27152 </interface>
27153 -<interface name="corenet_receive_munin_client_packets" lineno="52582">
27154 +<interface name="corenet_receive_munin_client_packets" lineno="52705">
27155 <summary>
27156 Receive munin_client packets.
27157 </summary>
27158 @@ -42919,7 +42736,7 @@ Domain allowed access.
27159 </param>
27160 <infoflow type="read" weight="10"/>
27161 </interface>
27162 -<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="52601">
27163 +<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="52724">
27164 <summary>
27165 Do not audit attempts to receive munin_client packets.
27166 </summary>
27167 @@ -42930,7 +42747,7 @@ Domain allowed access.
27168 </param>
27169 <infoflow type="none"/>
27170 </interface>
27171 -<interface name="corenet_sendrecv_munin_client_packets" lineno="52620">
27172 +<interface name="corenet_sendrecv_munin_client_packets" lineno="52743">
27173 <summary>
27174 Send and receive munin_client packets.
27175 </summary>
27176 @@ -42941,7 +42758,7 @@ Domain allowed access.
27177 </param>
27178 <infoflow type="both" weight="10"/>
27179 </interface>
27180 -<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="52636">
27181 +<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="52759">
27182 <summary>
27183 Do not audit attempts to send and receive munin_client packets.
27184 </summary>
27185 @@ -42952,7 +42769,7 @@ Domain to not audit.
27186 </param>
27187 <infoflow type="none"/>
27188 </interface>
27189 -<interface name="corenet_relabelto_munin_client_packets" lineno="52651">
27190 +<interface name="corenet_relabelto_munin_client_packets" lineno="52774">
27191 <summary>
27192 Relabel packets to munin_client the packet type.
27193 </summary>
27194 @@ -42962,7 +42779,7 @@ Domain allowed access.
27195 </summary>
27196 </param>
27197 </interface>
27198 -<interface name="corenet_send_munin_server_packets" lineno="52671">
27199 +<interface name="corenet_send_munin_server_packets" lineno="52794">
27200 <summary>
27201 Send munin_server packets.
27202 </summary>
27203 @@ -42973,7 +42790,7 @@ Domain allowed access.
27204 </param>
27205 <infoflow type="write" weight="10"/>
27206 </interface>
27207 -<interface name="corenet_dontaudit_send_munin_server_packets" lineno="52690">
27208 +<interface name="corenet_dontaudit_send_munin_server_packets" lineno="52813">
27209 <summary>
27210 Do not audit attempts to send munin_server packets.
27211 </summary>
27212 @@ -42984,7 +42801,7 @@ Domain to not audit.
27213 </param>
27214 <infoflow type="none"/>
27215 </interface>
27216 -<interface name="corenet_receive_munin_server_packets" lineno="52709">
27217 +<interface name="corenet_receive_munin_server_packets" lineno="52832">
27218 <summary>
27219 Receive munin_server packets.
27220 </summary>
27221 @@ -42995,7 +42812,7 @@ Domain allowed access.
27222 </param>
27223 <infoflow type="read" weight="10"/>
27224 </interface>
27225 -<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="52728">
27226 +<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="52851">
27227 <summary>
27228 Do not audit attempts to receive munin_server packets.
27229 </summary>
27230 @@ -43006,7 +42823,7 @@ Domain allowed access.
27231 </param>
27232 <infoflow type="none"/>
27233 </interface>
27234 -<interface name="corenet_sendrecv_munin_server_packets" lineno="52747">
27235 +<interface name="corenet_sendrecv_munin_server_packets" lineno="52870">
27236 <summary>
27237 Send and receive munin_server packets.
27238 </summary>
27239 @@ -43017,7 +42834,7 @@ Domain allowed access.
27240 </param>
27241 <infoflow type="both" weight="10"/>
27242 </interface>
27243 -<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="52763">
27244 +<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="52886">
27245 <summary>
27246 Do not audit attempts to send and receive munin_server packets.
27247 </summary>
27248 @@ -43028,7 +42845,7 @@ Domain to not audit.
27249 </param>
27250 <infoflow type="none"/>
27251 </interface>
27252 -<interface name="corenet_relabelto_munin_server_packets" lineno="52778">
27253 +<interface name="corenet_relabelto_munin_server_packets" lineno="52901">
27254 <summary>
27255 Relabel packets to munin_server the packet type.
27256 </summary>
27257 @@ -43038,7 +42855,7 @@ Domain allowed access.
27258 </summary>
27259 </param>
27260 </interface>
27261 -<interface name="corenet_tcp_sendrecv_mxi_port" lineno="52800">
27262 +<interface name="corenet_tcp_sendrecv_mxi_port" lineno="52923">
27263 <summary>
27264 Send and receive TCP traffic on the mxi port.
27265 </summary>
27266 @@ -43049,7 +42866,7 @@ Domain allowed access.
27267 </param>
27268 <infoflow type="both" weight="10"/>
27269 </interface>
27270 -<interface name="corenet_udp_send_mxi_port" lineno="52815">
27271 +<interface name="corenet_udp_send_mxi_port" lineno="52938">
27272 <summary>
27273 Send UDP traffic on the mxi port.
27274 </summary>
27275 @@ -43060,7 +42877,7 @@ Domain allowed access.
27276 </param>
27277 <infoflow type="write" weight="10"/>
27278 </interface>
27279 -<interface name="corenet_dontaudit_udp_send_mxi_port" lineno="52830">
27280 +<interface name="corenet_dontaudit_udp_send_mxi_port" lineno="52953">
27281 <summary>
27282 Do not audit attempts to send UDP traffic on the mxi port.
27283 </summary>
27284 @@ -43071,7 +42888,7 @@ Domain to not audit.
27285 </param>
27286 <infoflow type="none"/>
27287 </interface>
27288 -<interface name="corenet_udp_receive_mxi_port" lineno="52845">
27289 +<interface name="corenet_udp_receive_mxi_port" lineno="52968">
27290 <summary>
27291 Receive UDP traffic on the mxi port.
27292 </summary>
27293 @@ -43082,7 +42899,7 @@ Domain allowed access.
27294 </param>
27295 <infoflow type="read" weight="10"/>
27296 </interface>
27297 -<interface name="corenet_dontaudit_udp_receive_mxi_port" lineno="52860">
27298 +<interface name="corenet_dontaudit_udp_receive_mxi_port" lineno="52983">
27299 <summary>
27300 Do not audit attempts to receive UDP traffic on the mxi port.
27301 </summary>
27302 @@ -43093,7 +42910,7 @@ Domain to not audit.
27303 </param>
27304 <infoflow type="none"/>
27305 </interface>
27306 -<interface name="corenet_udp_sendrecv_mxi_port" lineno="52875">
27307 +<interface name="corenet_udp_sendrecv_mxi_port" lineno="52998">
27308 <summary>
27309 Send and receive UDP traffic on the mxi port.
27310 </summary>
27311 @@ -43104,7 +42921,7 @@ Domain allowed access.
27312 </param>
27313 <infoflow type="both" weight="10"/>
27314 </interface>
27315 -<interface name="corenet_dontaudit_udp_sendrecv_mxi_port" lineno="52891">
27316 +<interface name="corenet_dontaudit_udp_sendrecv_mxi_port" lineno="53014">
27317 <summary>
27318 Do not audit attempts to send and receive
27319 UDP traffic on the mxi port.
27320 @@ -43116,7 +42933,7 @@ Domain to not audit.
27321 </param>
27322 <infoflow type="none"/>
27323 </interface>
27324 -<interface name="corenet_tcp_bind_mxi_port" lineno="52906">
27325 +<interface name="corenet_tcp_bind_mxi_port" lineno="53029">
27326 <summary>
27327 Bind TCP sockets to the mxi port.
27328 </summary>
27329 @@ -43127,7 +42944,7 @@ Domain allowed access.
27330 </param>
27331 <infoflow type="none"/>
27332 </interface>
27333 -<interface name="corenet_udp_bind_mxi_port" lineno="52926">
27334 +<interface name="corenet_udp_bind_mxi_port" lineno="53049">
27335 <summary>
27336 Bind UDP sockets to the mxi port.
27337 </summary>
27338 @@ -43138,7 +42955,7 @@ Domain allowed access.
27339 </param>
27340 <infoflow type="none"/>
27341 </interface>
27342 -<interface name="corenet_tcp_connect_mxi_port" lineno="52945">
27343 +<interface name="corenet_tcp_connect_mxi_port" lineno="53068">
27344 <summary>
27345 Make a TCP connection to the mxi port.
27346 </summary>
27347 @@ -43148,7 +42965,7 @@ Domain allowed access.
27348 </summary>
27349 </param>
27350 </interface>
27351 -<interface name="corenet_send_mxi_client_packets" lineno="52965">
27352 +<interface name="corenet_send_mxi_client_packets" lineno="53088">
27353 <summary>
27354 Send mxi_client packets.
27355 </summary>
27356 @@ -43159,7 +42976,7 @@ Domain allowed access.
27357 </param>
27358 <infoflow type="write" weight="10"/>
27359 </interface>
27360 -<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="52984">
27361 +<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="53107">
27362 <summary>
27363 Do not audit attempts to send mxi_client packets.
27364 </summary>
27365 @@ -43170,7 +42987,7 @@ Domain to not audit.
27366 </param>
27367 <infoflow type="none"/>
27368 </interface>
27369 -<interface name="corenet_receive_mxi_client_packets" lineno="53003">
27370 +<interface name="corenet_receive_mxi_client_packets" lineno="53126">
27371 <summary>
27372 Receive mxi_client packets.
27373 </summary>
27374 @@ -43181,7 +42998,7 @@ Domain allowed access.
27375 </param>
27376 <infoflow type="read" weight="10"/>
27377 </interface>
27378 -<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="53022">
27379 +<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="53145">
27380 <summary>
27381 Do not audit attempts to receive mxi_client packets.
27382 </summary>
27383 @@ -43192,7 +43009,7 @@ Domain allowed access.
27384 </param>
27385 <infoflow type="none"/>
27386 </interface>
27387 -<interface name="corenet_sendrecv_mxi_client_packets" lineno="53041">
27388 +<interface name="corenet_sendrecv_mxi_client_packets" lineno="53164">
27389 <summary>
27390 Send and receive mxi_client packets.
27391 </summary>
27392 @@ -43203,7 +43020,7 @@ Domain allowed access.
27393 </param>
27394 <infoflow type="both" weight="10"/>
27395 </interface>
27396 -<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="53057">
27397 +<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="53180">
27398 <summary>
27399 Do not audit attempts to send and receive mxi_client packets.
27400 </summary>
27401 @@ -43214,7 +43031,7 @@ Domain to not audit.
27402 </param>
27403 <infoflow type="none"/>
27404 </interface>
27405 -<interface name="corenet_relabelto_mxi_client_packets" lineno="53072">
27406 +<interface name="corenet_relabelto_mxi_client_packets" lineno="53195">
27407 <summary>
27408 Relabel packets to mxi_client the packet type.
27409 </summary>
27410 @@ -43224,7 +43041,7 @@ Domain allowed access.
27411 </summary>
27412 </param>
27413 </interface>
27414 -<interface name="corenet_send_mxi_server_packets" lineno="53092">
27415 +<interface name="corenet_send_mxi_server_packets" lineno="53215">
27416 <summary>
27417 Send mxi_server packets.
27418 </summary>
27419 @@ -43235,7 +43052,7 @@ Domain allowed access.
27420 </param>
27421 <infoflow type="write" weight="10"/>
27422 </interface>
27423 -<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="53111">
27424 +<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="53234">
27425 <summary>
27426 Do not audit attempts to send mxi_server packets.
27427 </summary>
27428 @@ -43246,7 +43063,7 @@ Domain to not audit.
27429 </param>
27430 <infoflow type="none"/>
27431 </interface>
27432 -<interface name="corenet_receive_mxi_server_packets" lineno="53130">
27433 +<interface name="corenet_receive_mxi_server_packets" lineno="53253">
27434 <summary>
27435 Receive mxi_server packets.
27436 </summary>
27437 @@ -43257,7 +43074,7 @@ Domain allowed access.
27438 </param>
27439 <infoflow type="read" weight="10"/>
27440 </interface>
27441 -<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="53149">
27442 +<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="53272">
27443 <summary>
27444 Do not audit attempts to receive mxi_server packets.
27445 </summary>
27446 @@ -43268,7 +43085,7 @@ Domain allowed access.
27447 </param>
27448 <infoflow type="none"/>
27449 </interface>
27450 -<interface name="corenet_sendrecv_mxi_server_packets" lineno="53168">
27451 +<interface name="corenet_sendrecv_mxi_server_packets" lineno="53291">
27452 <summary>
27453 Send and receive mxi_server packets.
27454 </summary>
27455 @@ -43279,7 +43096,7 @@ Domain allowed access.
27456 </param>
27457 <infoflow type="both" weight="10"/>
27458 </interface>
27459 -<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="53184">
27460 +<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="53307">
27461 <summary>
27462 Do not audit attempts to send and receive mxi_server packets.
27463 </summary>
27464 @@ -43290,7 +43107,7 @@ Domain to not audit.
27465 </param>
27466 <infoflow type="none"/>
27467 </interface>
27468 -<interface name="corenet_relabelto_mxi_server_packets" lineno="53199">
27469 +<interface name="corenet_relabelto_mxi_server_packets" lineno="53322">
27470 <summary>
27471 Relabel packets to mxi_server the packet type.
27472 </summary>
27473 @@ -43300,7 +43117,7 @@ Domain allowed access.
27474 </summary>
27475 </param>
27476 </interface>
27477 -<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="53221">
27478 +<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="53344">
27479 <summary>
27480 Send and receive TCP traffic on the mysqld port.
27481 </summary>
27482 @@ -43311,7 +43128,7 @@ Domain allowed access.
27483 </param>
27484 <infoflow type="both" weight="10"/>
27485 </interface>
27486 -<interface name="corenet_udp_send_mysqld_port" lineno="53236">
27487 +<interface name="corenet_udp_send_mysqld_port" lineno="53359">
27488 <summary>
27489 Send UDP traffic on the mysqld port.
27490 </summary>
27491 @@ -43322,7 +43139,7 @@ Domain allowed access.
27492 </param>
27493 <infoflow type="write" weight="10"/>
27494 </interface>
27495 -<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="53251">
27496 +<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="53374">
27497 <summary>
27498 Do not audit attempts to send UDP traffic on the mysqld port.
27499 </summary>
27500 @@ -43333,7 +43150,7 @@ Domain to not audit.
27501 </param>
27502 <infoflow type="none"/>
27503 </interface>
27504 -<interface name="corenet_udp_receive_mysqld_port" lineno="53266">
27505 +<interface name="corenet_udp_receive_mysqld_port" lineno="53389">
27506 <summary>
27507 Receive UDP traffic on the mysqld port.
27508 </summary>
27509 @@ -43344,7 +43161,7 @@ Domain allowed access.
27510 </param>
27511 <infoflow type="read" weight="10"/>
27512 </interface>
27513 -<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="53281">
27514 +<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="53404">
27515 <summary>
27516 Do not audit attempts to receive UDP traffic on the mysqld port.
27517 </summary>
27518 @@ -43355,7 +43172,7 @@ Domain to not audit.
27519 </param>
27520 <infoflow type="none"/>
27521 </interface>
27522 -<interface name="corenet_udp_sendrecv_mysqld_port" lineno="53296">
27523 +<interface name="corenet_udp_sendrecv_mysqld_port" lineno="53419">
27524 <summary>
27525 Send and receive UDP traffic on the mysqld port.
27526 </summary>
27527 @@ -43366,7 +43183,7 @@ Domain allowed access.
27528 </param>
27529 <infoflow type="both" weight="10"/>
27530 </interface>
27531 -<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="53312">
27532 +<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="53435">
27533 <summary>
27534 Do not audit attempts to send and receive
27535 UDP traffic on the mysqld port.
27536 @@ -43378,7 +43195,7 @@ Domain to not audit.
27537 </param>
27538 <infoflow type="none"/>
27539 </interface>
27540 -<interface name="corenet_tcp_bind_mysqld_port" lineno="53327">
27541 +<interface name="corenet_tcp_bind_mysqld_port" lineno="53450">
27542 <summary>
27543 Bind TCP sockets to the mysqld port.
27544 </summary>
27545 @@ -43389,7 +43206,7 @@ Domain allowed access.
27546 </param>
27547 <infoflow type="none"/>
27548 </interface>
27549 -<interface name="corenet_udp_bind_mysqld_port" lineno="53347">
27550 +<interface name="corenet_udp_bind_mysqld_port" lineno="53470">
27551 <summary>
27552 Bind UDP sockets to the mysqld port.
27553 </summary>
27554 @@ -43400,7 +43217,7 @@ Domain allowed access.
27555 </param>
27556 <infoflow type="none"/>
27557 </interface>
27558 -<interface name="corenet_tcp_connect_mysqld_port" lineno="53366">
27559 +<interface name="corenet_tcp_connect_mysqld_port" lineno="53489">
27560 <summary>
27561 Make a TCP connection to the mysqld port.
27562 </summary>
27563 @@ -43410,7 +43227,7 @@ Domain allowed access.
27564 </summary>
27565 </param>
27566 </interface>
27567 -<interface name="corenet_send_mysqld_client_packets" lineno="53386">
27568 +<interface name="corenet_send_mysqld_client_packets" lineno="53509">
27569 <summary>
27570 Send mysqld_client packets.
27571 </summary>
27572 @@ -43421,7 +43238,7 @@ Domain allowed access.
27573 </param>
27574 <infoflow type="write" weight="10"/>
27575 </interface>
27576 -<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="53405">
27577 +<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="53528">
27578 <summary>
27579 Do not audit attempts to send mysqld_client packets.
27580 </summary>
27581 @@ -43432,7 +43249,7 @@ Domain to not audit.
27582 </param>
27583 <infoflow type="none"/>
27584 </interface>
27585 -<interface name="corenet_receive_mysqld_client_packets" lineno="53424">
27586 +<interface name="corenet_receive_mysqld_client_packets" lineno="53547">
27587 <summary>
27588 Receive mysqld_client packets.
27589 </summary>
27590 @@ -43443,7 +43260,7 @@ Domain allowed access.
27591 </param>
27592 <infoflow type="read" weight="10"/>
27593 </interface>
27594 -<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="53443">
27595 +<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="53566">
27596 <summary>
27597 Do not audit attempts to receive mysqld_client packets.
27598 </summary>
27599 @@ -43454,7 +43271,7 @@ Domain allowed access.
27600 </param>
27601 <infoflow type="none"/>
27602 </interface>
27603 -<interface name="corenet_sendrecv_mysqld_client_packets" lineno="53462">
27604 +<interface name="corenet_sendrecv_mysqld_client_packets" lineno="53585">
27605 <summary>
27606 Send and receive mysqld_client packets.
27607 </summary>
27608 @@ -43465,7 +43282,7 @@ Domain allowed access.
27609 </param>
27610 <infoflow type="both" weight="10"/>
27611 </interface>
27612 -<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="53478">
27613 +<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="53601">
27614 <summary>
27615 Do not audit attempts to send and receive mysqld_client packets.
27616 </summary>
27617 @@ -43476,7 +43293,7 @@ Domain to not audit.
27618 </param>
27619 <infoflow type="none"/>
27620 </interface>
27621 -<interface name="corenet_relabelto_mysqld_client_packets" lineno="53493">
27622 +<interface name="corenet_relabelto_mysqld_client_packets" lineno="53616">
27623 <summary>
27624 Relabel packets to mysqld_client the packet type.
27625 </summary>
27626 @@ -43486,7 +43303,7 @@ Domain allowed access.
27627 </summary>
27628 </param>
27629 </interface>
27630 -<interface name="corenet_send_mysqld_server_packets" lineno="53513">
27631 +<interface name="corenet_send_mysqld_server_packets" lineno="53636">
27632 <summary>
27633 Send mysqld_server packets.
27634 </summary>
27635 @@ -43497,7 +43314,7 @@ Domain allowed access.
27636 </param>
27637 <infoflow type="write" weight="10"/>
27638 </interface>
27639 -<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="53532">
27640 +<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="53655">
27641 <summary>
27642 Do not audit attempts to send mysqld_server packets.
27643 </summary>
27644 @@ -43508,7 +43325,7 @@ Domain to not audit.
27645 </param>
27646 <infoflow type="none"/>
27647 </interface>
27648 -<interface name="corenet_receive_mysqld_server_packets" lineno="53551">
27649 +<interface name="corenet_receive_mysqld_server_packets" lineno="53674">
27650 <summary>
27651 Receive mysqld_server packets.
27652 </summary>
27653 @@ -43519,7 +43336,7 @@ Domain allowed access.
27654 </param>
27655 <infoflow type="read" weight="10"/>
27656 </interface>
27657 -<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="53570">
27658 +<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="53693">
27659 <summary>
27660 Do not audit attempts to receive mysqld_server packets.
27661 </summary>
27662 @@ -43530,7 +43347,7 @@ Domain allowed access.
27663 </param>
27664 <infoflow type="none"/>
27665 </interface>
27666 -<interface name="corenet_sendrecv_mysqld_server_packets" lineno="53589">
27667 +<interface name="corenet_sendrecv_mysqld_server_packets" lineno="53712">
27668 <summary>
27669 Send and receive mysqld_server packets.
27670 </summary>
27671 @@ -43541,7 +43358,7 @@ Domain allowed access.
27672 </param>
27673 <infoflow type="both" weight="10"/>
27674 </interface>
27675 -<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="53605">
27676 +<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="53728">
27677 <summary>
27678 Do not audit attempts to send and receive mysqld_server packets.
27679 </summary>
27680 @@ -43552,7 +43369,7 @@ Domain to not audit.
27681 </param>
27682 <infoflow type="none"/>
27683 </interface>
27684 -<interface name="corenet_relabelto_mysqld_server_packets" lineno="53620">
27685 +<interface name="corenet_relabelto_mysqld_server_packets" lineno="53743">
27686 <summary>
27687 Relabel packets to mysqld_server the packet type.
27688 </summary>
27689 @@ -43562,7 +43379,7 @@ Domain allowed access.
27690 </summary>
27691 </param>
27692 </interface>
27693 -<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="53642">
27694 +<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="53765">
27695 <summary>
27696 Send and receive TCP traffic on the mysqlmanagerd port.
27697 </summary>
27698 @@ -43573,7 +43390,7 @@ Domain allowed access.
27699 </param>
27700 <infoflow type="both" weight="10"/>
27701 </interface>
27702 -<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="53657">
27703 +<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="53780">
27704 <summary>
27705 Send UDP traffic on the mysqlmanagerd port.
27706 </summary>
27707 @@ -43584,7 +43401,7 @@ Domain allowed access.
27708 </param>
27709 <infoflow type="write" weight="10"/>
27710 </interface>
27711 -<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="53672">
27712 +<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="53795">
27713 <summary>
27714 Do not audit attempts to send UDP traffic on the mysqlmanagerd port.
27715 </summary>
27716 @@ -43595,7 +43412,7 @@ Domain to not audit.
27717 </param>
27718 <infoflow type="none"/>
27719 </interface>
27720 -<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="53687">
27721 +<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="53810">
27722 <summary>
27723 Receive UDP traffic on the mysqlmanagerd port.
27724 </summary>
27725 @@ -43606,7 +43423,7 @@ Domain allowed access.
27726 </param>
27727 <infoflow type="read" weight="10"/>
27728 </interface>
27729 -<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="53702">
27730 +<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="53825">
27731 <summary>
27732 Do not audit attempts to receive UDP traffic on the mysqlmanagerd port.
27733 </summary>
27734 @@ -43617,7 +43434,7 @@ Domain to not audit.
27735 </param>
27736 <infoflow type="none"/>
27737 </interface>
27738 -<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="53717">
27739 +<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="53840">
27740 <summary>
27741 Send and receive UDP traffic on the mysqlmanagerd port.
27742 </summary>
27743 @@ -43628,7 +43445,7 @@ Domain allowed access.
27744 </param>
27745 <infoflow type="both" weight="10"/>
27746 </interface>
27747 -<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="53733">
27748 +<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="53856">
27749 <summary>
27750 Do not audit attempts to send and receive
27751 UDP traffic on the mysqlmanagerd port.
27752 @@ -43640,7 +43457,7 @@ Domain to not audit.
27753 </param>
27754 <infoflow type="none"/>
27755 </interface>
27756 -<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="53748">
27757 +<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="53871">
27758 <summary>
27759 Bind TCP sockets to the mysqlmanagerd port.
27760 </summary>
27761 @@ -43651,7 +43468,7 @@ Domain allowed access.
27762 </param>
27763 <infoflow type="none"/>
27764 </interface>
27765 -<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="53768">
27766 +<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="53891">
27767 <summary>
27768 Bind UDP sockets to the mysqlmanagerd port.
27769 </summary>
27770 @@ -43662,7 +43479,7 @@ Domain allowed access.
27771 </param>
27772 <infoflow type="none"/>
27773 </interface>
27774 -<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="53787">
27775 +<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="53910">
27776 <summary>
27777 Make a TCP connection to the mysqlmanagerd port.
27778 </summary>
27779 @@ -43672,7 +43489,7 @@ Domain allowed access.
27780 </summary>
27781 </param>
27782 </interface>
27783 -<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="53807">
27784 +<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="53930">
27785 <summary>
27786 Send mysqlmanagerd_client packets.
27787 </summary>
27788 @@ -43683,7 +43500,7 @@ Domain allowed access.
27789 </param>
27790 <infoflow type="write" weight="10"/>
27791 </interface>
27792 -<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="53826">
27793 +<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="53949">
27794 <summary>
27795 Do not audit attempts to send mysqlmanagerd_client packets.
27796 </summary>
27797 @@ -43694,7 +43511,7 @@ Domain to not audit.
27798 </param>
27799 <infoflow type="none"/>
27800 </interface>
27801 -<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="53845">
27802 +<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="53968">
27803 <summary>
27804 Receive mysqlmanagerd_client packets.
27805 </summary>
27806 @@ -43705,7 +43522,7 @@ Domain allowed access.
27807 </param>
27808 <infoflow type="read" weight="10"/>
27809 </interface>
27810 -<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="53864">
27811 +<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="53987">
27812 <summary>
27813 Do not audit attempts to receive mysqlmanagerd_client packets.
27814 </summary>
27815 @@ -43716,7 +43533,7 @@ Domain allowed access.
27816 </param>
27817 <infoflow type="none"/>
27818 </interface>
27819 -<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="53883">
27820 +<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="54006">
27821 <summary>
27822 Send and receive mysqlmanagerd_client packets.
27823 </summary>
27824 @@ -43727,7 +43544,7 @@ Domain allowed access.
27825 </param>
27826 <infoflow type="both" weight="10"/>
27827 </interface>
27828 -<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="53899">
27829 +<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="54022">
27830 <summary>
27831 Do not audit attempts to send and receive mysqlmanagerd_client packets.
27832 </summary>
27833 @@ -43738,7 +43555,7 @@ Domain to not audit.
27834 </param>
27835 <infoflow type="none"/>
27836 </interface>
27837 -<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="53914">
27838 +<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="54037">
27839 <summary>
27840 Relabel packets to mysqlmanagerd_client the packet type.
27841 </summary>
27842 @@ -43748,7 +43565,7 @@ Domain allowed access.
27843 </summary>
27844 </param>
27845 </interface>
27846 -<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="53934">
27847 +<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="54057">
27848 <summary>
27849 Send mysqlmanagerd_server packets.
27850 </summary>
27851 @@ -43759,7 +43576,7 @@ Domain allowed access.
27852 </param>
27853 <infoflow type="write" weight="10"/>
27854 </interface>
27855 -<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="53953">
27856 +<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="54076">
27857 <summary>
27858 Do not audit attempts to send mysqlmanagerd_server packets.
27859 </summary>
27860 @@ -43770,7 +43587,7 @@ Domain to not audit.
27861 </param>
27862 <infoflow type="none"/>
27863 </interface>
27864 -<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="53972">
27865 +<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="54095">
27866 <summary>
27867 Receive mysqlmanagerd_server packets.
27868 </summary>
27869 @@ -43781,7 +43598,7 @@ Domain allowed access.
27870 </param>
27871 <infoflow type="read" weight="10"/>
27872 </interface>
27873 -<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="53991">
27874 +<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="54114">
27875 <summary>
27876 Do not audit attempts to receive mysqlmanagerd_server packets.
27877 </summary>
27878 @@ -43792,7 +43609,7 @@ Domain allowed access.
27879 </param>
27880 <infoflow type="none"/>
27881 </interface>
27882 -<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="54010">
27883 +<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="54133">
27884 <summary>
27885 Send and receive mysqlmanagerd_server packets.
27886 </summary>
27887 @@ -43803,7 +43620,7 @@ Domain allowed access.
27888 </param>
27889 <infoflow type="both" weight="10"/>
27890 </interface>
27891 -<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="54026">
27892 +<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="54149">
27893 <summary>
27894 Do not audit attempts to send and receive mysqlmanagerd_server packets.
27895 </summary>
27896 @@ -43814,7 +43631,7 @@ Domain to not audit.
27897 </param>
27898 <infoflow type="none"/>
27899 </interface>
27900 -<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="54041">
27901 +<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="54164">
27902 <summary>
27903 Relabel packets to mysqlmanagerd_server the packet type.
27904 </summary>
27905 @@ -43824,7 +43641,7 @@ Domain allowed access.
27906 </summary>
27907 </param>
27908 </interface>
27909 -<interface name="corenet_tcp_sendrecv_nessus_port" lineno="54063">
27910 +<interface name="corenet_tcp_sendrecv_nessus_port" lineno="54186">
27911 <summary>
27912 Send and receive TCP traffic on the nessus port.
27913 </summary>
27914 @@ -43835,7 +43652,7 @@ Domain allowed access.
27915 </param>
27916 <infoflow type="both" weight="10"/>
27917 </interface>
27918 -<interface name="corenet_udp_send_nessus_port" lineno="54078">
27919 +<interface name="corenet_udp_send_nessus_port" lineno="54201">
27920 <summary>
27921 Send UDP traffic on the nessus port.
27922 </summary>
27923 @@ -43846,7 +43663,7 @@ Domain allowed access.
27924 </param>
27925 <infoflow type="write" weight="10"/>
27926 </interface>
27927 -<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="54093">
27928 +<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="54216">
27929 <summary>
27930 Do not audit attempts to send UDP traffic on the nessus port.
27931 </summary>
27932 @@ -43857,7 +43674,7 @@ Domain to not audit.
27933 </param>
27934 <infoflow type="none"/>
27935 </interface>
27936 -<interface name="corenet_udp_receive_nessus_port" lineno="54108">
27937 +<interface name="corenet_udp_receive_nessus_port" lineno="54231">
27938 <summary>
27939 Receive UDP traffic on the nessus port.
27940 </summary>
27941 @@ -43868,7 +43685,7 @@ Domain allowed access.
27942 </param>
27943 <infoflow type="read" weight="10"/>
27944 </interface>
27945 -<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="54123">
27946 +<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="54246">
27947 <summary>
27948 Do not audit attempts to receive UDP traffic on the nessus port.
27949 </summary>
27950 @@ -43879,7 +43696,7 @@ Domain to not audit.
27951 </param>
27952 <infoflow type="none"/>
27953 </interface>
27954 -<interface name="corenet_udp_sendrecv_nessus_port" lineno="54138">
27955 +<interface name="corenet_udp_sendrecv_nessus_port" lineno="54261">
27956 <summary>
27957 Send and receive UDP traffic on the nessus port.
27958 </summary>
27959 @@ -43890,7 +43707,7 @@ Domain allowed access.
27960 </param>
27961 <infoflow type="both" weight="10"/>
27962 </interface>
27963 -<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="54154">
27964 +<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="54277">
27965 <summary>
27966 Do not audit attempts to send and receive
27967 UDP traffic on the nessus port.
27968 @@ -43902,7 +43719,7 @@ Domain to not audit.
27969 </param>
27970 <infoflow type="none"/>
27971 </interface>
27972 -<interface name="corenet_tcp_bind_nessus_port" lineno="54169">
27973 +<interface name="corenet_tcp_bind_nessus_port" lineno="54292">
27974 <summary>
27975 Bind TCP sockets to the nessus port.
27976 </summary>
27977 @@ -43913,7 +43730,7 @@ Domain allowed access.
27978 </param>
27979 <infoflow type="none"/>
27980 </interface>
27981 -<interface name="corenet_udp_bind_nessus_port" lineno="54189">
27982 +<interface name="corenet_udp_bind_nessus_port" lineno="54312">
27983 <summary>
27984 Bind UDP sockets to the nessus port.
27985 </summary>
27986 @@ -43924,7 +43741,7 @@ Domain allowed access.
27987 </param>
27988 <infoflow type="none"/>
27989 </interface>
27990 -<interface name="corenet_tcp_connect_nessus_port" lineno="54208">
27991 +<interface name="corenet_tcp_connect_nessus_port" lineno="54331">
27992 <summary>
27993 Make a TCP connection to the nessus port.
27994 </summary>
27995 @@ -43934,7 +43751,7 @@ Domain allowed access.
27996 </summary>
27997 </param>
27998 </interface>
27999 -<interface name="corenet_send_nessus_client_packets" lineno="54228">
28000 +<interface name="corenet_send_nessus_client_packets" lineno="54351">
28001 <summary>
28002 Send nessus_client packets.
28003 </summary>
28004 @@ -43945,7 +43762,7 @@ Domain allowed access.
28005 </param>
28006 <infoflow type="write" weight="10"/>
28007 </interface>
28008 -<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="54247">
28009 +<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="54370">
28010 <summary>
28011 Do not audit attempts to send nessus_client packets.
28012 </summary>
28013 @@ -43956,7 +43773,7 @@ Domain to not audit.
28014 </param>
28015 <infoflow type="none"/>
28016 </interface>
28017 -<interface name="corenet_receive_nessus_client_packets" lineno="54266">
28018 +<interface name="corenet_receive_nessus_client_packets" lineno="54389">
28019 <summary>
28020 Receive nessus_client packets.
28021 </summary>
28022 @@ -43967,7 +43784,7 @@ Domain allowed access.
28023 </param>
28024 <infoflow type="read" weight="10"/>
28025 </interface>
28026 -<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="54285">
28027 +<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="54408">
28028 <summary>
28029 Do not audit attempts to receive nessus_client packets.
28030 </summary>
28031 @@ -43978,7 +43795,7 @@ Domain allowed access.
28032 </param>
28033 <infoflow type="none"/>
28034 </interface>
28035 -<interface name="corenet_sendrecv_nessus_client_packets" lineno="54304">
28036 +<interface name="corenet_sendrecv_nessus_client_packets" lineno="54427">
28037 <summary>
28038 Send and receive nessus_client packets.
28039 </summary>
28040 @@ -43989,7 +43806,7 @@ Domain allowed access.
28041 </param>
28042 <infoflow type="both" weight="10"/>
28043 </interface>
28044 -<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="54320">
28045 +<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="54443">
28046 <summary>
28047 Do not audit attempts to send and receive nessus_client packets.
28048 </summary>
28049 @@ -44000,7 +43817,7 @@ Domain to not audit.
28050 </param>
28051 <infoflow type="none"/>
28052 </interface>
28053 -<interface name="corenet_relabelto_nessus_client_packets" lineno="54335">
28054 +<interface name="corenet_relabelto_nessus_client_packets" lineno="54458">
28055 <summary>
28056 Relabel packets to nessus_client the packet type.
28057 </summary>
28058 @@ -44010,7 +43827,7 @@ Domain allowed access.
28059 </summary>
28060 </param>
28061 </interface>
28062 -<interface name="corenet_send_nessus_server_packets" lineno="54355">
28063 +<interface name="corenet_send_nessus_server_packets" lineno="54478">
28064 <summary>
28065 Send nessus_server packets.
28066 </summary>
28067 @@ -44021,7 +43838,7 @@ Domain allowed access.
28068 </param>
28069 <infoflow type="write" weight="10"/>
28070 </interface>
28071 -<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="54374">
28072 +<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="54497">
28073 <summary>
28074 Do not audit attempts to send nessus_server packets.
28075 </summary>
28076 @@ -44032,7 +43849,7 @@ Domain to not audit.
28077 </param>
28078 <infoflow type="none"/>
28079 </interface>
28080 -<interface name="corenet_receive_nessus_server_packets" lineno="54393">
28081 +<interface name="corenet_receive_nessus_server_packets" lineno="54516">
28082 <summary>
28083 Receive nessus_server packets.
28084 </summary>
28085 @@ -44043,7 +43860,7 @@ Domain allowed access.
28086 </param>
28087 <infoflow type="read" weight="10"/>
28088 </interface>
28089 -<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="54412">
28090 +<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="54535">
28091 <summary>
28092 Do not audit attempts to receive nessus_server packets.
28093 </summary>
28094 @@ -44054,7 +43871,7 @@ Domain allowed access.
28095 </param>
28096 <infoflow type="none"/>
28097 </interface>
28098 -<interface name="corenet_sendrecv_nessus_server_packets" lineno="54431">
28099 +<interface name="corenet_sendrecv_nessus_server_packets" lineno="54554">
28100 <summary>
28101 Send and receive nessus_server packets.
28102 </summary>
28103 @@ -44065,7 +43882,7 @@ Domain allowed access.
28104 </param>
28105 <infoflow type="both" weight="10"/>
28106 </interface>
28107 -<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="54447">
28108 +<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="54570">
28109 <summary>
28110 Do not audit attempts to send and receive nessus_server packets.
28111 </summary>
28112 @@ -44076,7 +43893,7 @@ Domain to not audit.
28113 </param>
28114 <infoflow type="none"/>
28115 </interface>
28116 -<interface name="corenet_relabelto_nessus_server_packets" lineno="54462">
28117 +<interface name="corenet_relabelto_nessus_server_packets" lineno="54585">
28118 <summary>
28119 Relabel packets to nessus_server the packet type.
28120 </summary>
28121 @@ -44086,7 +43903,7 @@ Domain allowed access.
28122 </summary>
28123 </param>
28124 </interface>
28125 -<interface name="corenet_tcp_sendrecv_netport_port" lineno="54484">
28126 +<interface name="corenet_tcp_sendrecv_netport_port" lineno="54607">
28127 <summary>
28128 Send and receive TCP traffic on the netport port.
28129 </summary>
28130 @@ -44097,7 +43914,7 @@ Domain allowed access.
28131 </param>
28132 <infoflow type="both" weight="10"/>
28133 </interface>
28134 -<interface name="corenet_udp_send_netport_port" lineno="54499">
28135 +<interface name="corenet_udp_send_netport_port" lineno="54622">
28136 <summary>
28137 Send UDP traffic on the netport port.
28138 </summary>
28139 @@ -44108,7 +43925,7 @@ Domain allowed access.
28140 </param>
28141 <infoflow type="write" weight="10"/>
28142 </interface>
28143 -<interface name="corenet_dontaudit_udp_send_netport_port" lineno="54514">
28144 +<interface name="corenet_dontaudit_udp_send_netport_port" lineno="54637">
28145 <summary>
28146 Do not audit attempts to send UDP traffic on the netport port.
28147 </summary>
28148 @@ -44119,7 +43936,7 @@ Domain to not audit.
28149 </param>
28150 <infoflow type="none"/>
28151 </interface>
28152 -<interface name="corenet_udp_receive_netport_port" lineno="54529">
28153 +<interface name="corenet_udp_receive_netport_port" lineno="54652">
28154 <summary>
28155 Receive UDP traffic on the netport port.
28156 </summary>
28157 @@ -44130,7 +43947,7 @@ Domain allowed access.
28158 </param>
28159 <infoflow type="read" weight="10"/>
28160 </interface>
28161 -<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="54544">
28162 +<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="54667">
28163 <summary>
28164 Do not audit attempts to receive UDP traffic on the netport port.
28165 </summary>
28166 @@ -44141,7 +43958,7 @@ Domain to not audit.
28167 </param>
28168 <infoflow type="none"/>
28169 </interface>
28170 -<interface name="corenet_udp_sendrecv_netport_port" lineno="54559">
28171 +<interface name="corenet_udp_sendrecv_netport_port" lineno="54682">
28172 <summary>
28173 Send and receive UDP traffic on the netport port.
28174 </summary>
28175 @@ -44152,7 +43969,7 @@ Domain allowed access.
28176 </param>
28177 <infoflow type="both" weight="10"/>
28178 </interface>
28179 -<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="54575">
28180 +<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="54698">
28181 <summary>
28182 Do not audit attempts to send and receive
28183 UDP traffic on the netport port.
28184 @@ -44164,7 +43981,7 @@ Domain to not audit.
28185 </param>
28186 <infoflow type="none"/>
28187 </interface>
28188 -<interface name="corenet_tcp_bind_netport_port" lineno="54590">
28189 +<interface name="corenet_tcp_bind_netport_port" lineno="54713">
28190 <summary>
28191 Bind TCP sockets to the netport port.
28192 </summary>
28193 @@ -44175,7 +43992,7 @@ Domain allowed access.
28194 </param>
28195 <infoflow type="none"/>
28196 </interface>
28197 -<interface name="corenet_udp_bind_netport_port" lineno="54610">
28198 +<interface name="corenet_udp_bind_netport_port" lineno="54733">
28199 <summary>
28200 Bind UDP sockets to the netport port.
28201 </summary>
28202 @@ -44186,7 +44003,7 @@ Domain allowed access.
28203 </param>
28204 <infoflow type="none"/>
28205 </interface>
28206 -<interface name="corenet_tcp_connect_netport_port" lineno="54629">
28207 +<interface name="corenet_tcp_connect_netport_port" lineno="54752">
28208 <summary>
28209 Make a TCP connection to the netport port.
28210 </summary>
28211 @@ -44196,7 +44013,7 @@ Domain allowed access.
28212 </summary>
28213 </param>
28214 </interface>
28215 -<interface name="corenet_send_netport_client_packets" lineno="54649">
28216 +<interface name="corenet_send_netport_client_packets" lineno="54772">
28217 <summary>
28218 Send netport_client packets.
28219 </summary>
28220 @@ -44207,7 +44024,7 @@ Domain allowed access.
28221 </param>
28222 <infoflow type="write" weight="10"/>
28223 </interface>
28224 -<interface name="corenet_dontaudit_send_netport_client_packets" lineno="54668">
28225 +<interface name="corenet_dontaudit_send_netport_client_packets" lineno="54791">
28226 <summary>
28227 Do not audit attempts to send netport_client packets.
28228 </summary>
28229 @@ -44218,7 +44035,7 @@ Domain to not audit.
28230 </param>
28231 <infoflow type="none"/>
28232 </interface>
28233 -<interface name="corenet_receive_netport_client_packets" lineno="54687">
28234 +<interface name="corenet_receive_netport_client_packets" lineno="54810">
28235 <summary>
28236 Receive netport_client packets.
28237 </summary>
28238 @@ -44229,7 +44046,7 @@ Domain allowed access.
28239 </param>
28240 <infoflow type="read" weight="10"/>
28241 </interface>
28242 -<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="54706">
28243 +<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="54829">
28244 <summary>
28245 Do not audit attempts to receive netport_client packets.
28246 </summary>
28247 @@ -44240,7 +44057,7 @@ Domain allowed access.
28248 </param>
28249 <infoflow type="none"/>
28250 </interface>
28251 -<interface name="corenet_sendrecv_netport_client_packets" lineno="54725">
28252 +<interface name="corenet_sendrecv_netport_client_packets" lineno="54848">
28253 <summary>
28254 Send and receive netport_client packets.
28255 </summary>
28256 @@ -44251,7 +44068,7 @@ Domain allowed access.
28257 </param>
28258 <infoflow type="both" weight="10"/>
28259 </interface>
28260 -<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="54741">
28261 +<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="54864">
28262 <summary>
28263 Do not audit attempts to send and receive netport_client packets.
28264 </summary>
28265 @@ -44262,7 +44079,7 @@ Domain to not audit.
28266 </param>
28267 <infoflow type="none"/>
28268 </interface>
28269 -<interface name="corenet_relabelto_netport_client_packets" lineno="54756">
28270 +<interface name="corenet_relabelto_netport_client_packets" lineno="54879">
28271 <summary>
28272 Relabel packets to netport_client the packet type.
28273 </summary>
28274 @@ -44272,7 +44089,7 @@ Domain allowed access.
28275 </summary>
28276 </param>
28277 </interface>
28278 -<interface name="corenet_send_netport_server_packets" lineno="54776">
28279 +<interface name="corenet_send_netport_server_packets" lineno="54899">
28280 <summary>
28281 Send netport_server packets.
28282 </summary>
28283 @@ -44283,7 +44100,7 @@ Domain allowed access.
28284 </param>
28285 <infoflow type="write" weight="10"/>
28286 </interface>
28287 -<interface name="corenet_dontaudit_send_netport_server_packets" lineno="54795">
28288 +<interface name="corenet_dontaudit_send_netport_server_packets" lineno="54918">
28289 <summary>
28290 Do not audit attempts to send netport_server packets.
28291 </summary>
28292 @@ -44294,7 +44111,7 @@ Domain to not audit.
28293 </param>
28294 <infoflow type="none"/>
28295 </interface>
28296 -<interface name="corenet_receive_netport_server_packets" lineno="54814">
28297 +<interface name="corenet_receive_netport_server_packets" lineno="54937">
28298 <summary>
28299 Receive netport_server packets.
28300 </summary>
28301 @@ -44305,7 +44122,7 @@ Domain allowed access.
28302 </param>
28303 <infoflow type="read" weight="10"/>
28304 </interface>
28305 -<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="54833">
28306 +<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="54956">
28307 <summary>
28308 Do not audit attempts to receive netport_server packets.
28309 </summary>
28310 @@ -44316,7 +44133,7 @@ Domain allowed access.
28311 </param>
28312 <infoflow type="none"/>
28313 </interface>
28314 -<interface name="corenet_sendrecv_netport_server_packets" lineno="54852">
28315 +<interface name="corenet_sendrecv_netport_server_packets" lineno="54975">
28316 <summary>
28317 Send and receive netport_server packets.
28318 </summary>
28319 @@ -44327,7 +44144,7 @@ Domain allowed access.
28320 </param>
28321 <infoflow type="both" weight="10"/>
28322 </interface>
28323 -<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="54868">
28324 +<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="54991">
28325 <summary>
28326 Do not audit attempts to send and receive netport_server packets.
28327 </summary>
28328 @@ -44338,7 +44155,7 @@ Domain to not audit.
28329 </param>
28330 <infoflow type="none"/>
28331 </interface>
28332 -<interface name="corenet_relabelto_netport_server_packets" lineno="54883">
28333 +<interface name="corenet_relabelto_netport_server_packets" lineno="55006">
28334 <summary>
28335 Relabel packets to netport_server the packet type.
28336 </summary>
28337 @@ -44348,7 +44165,7 @@ Domain allowed access.
28338 </summary>
28339 </param>
28340 </interface>
28341 -<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="54905">
28342 +<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="55028">
28343 <summary>
28344 Send and receive TCP traffic on the netsupport port.
28345 </summary>
28346 @@ -44359,7 +44176,7 @@ Domain allowed access.
28347 </param>
28348 <infoflow type="both" weight="10"/>
28349 </interface>
28350 -<interface name="corenet_udp_send_netsupport_port" lineno="54920">
28351 +<interface name="corenet_udp_send_netsupport_port" lineno="55043">
28352 <summary>
28353 Send UDP traffic on the netsupport port.
28354 </summary>
28355 @@ -44370,7 +44187,7 @@ Domain allowed access.
28356 </param>
28357 <infoflow type="write" weight="10"/>
28358 </interface>
28359 -<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="54935">
28360 +<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="55058">
28361 <summary>
28362 Do not audit attempts to send UDP traffic on the netsupport port.
28363 </summary>
28364 @@ -44381,7 +44198,7 @@ Domain to not audit.
28365 </param>
28366 <infoflow type="none"/>
28367 </interface>
28368 -<interface name="corenet_udp_receive_netsupport_port" lineno="54950">
28369 +<interface name="corenet_udp_receive_netsupport_port" lineno="55073">
28370 <summary>
28371 Receive UDP traffic on the netsupport port.
28372 </summary>
28373 @@ -44392,7 +44209,7 @@ Domain allowed access.
28374 </param>
28375 <infoflow type="read" weight="10"/>
28376 </interface>
28377 -<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="54965">
28378 +<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="55088">
28379 <summary>
28380 Do not audit attempts to receive UDP traffic on the netsupport port.
28381 </summary>
28382 @@ -44403,7 +44220,7 @@ Domain to not audit.
28383 </param>
28384 <infoflow type="none"/>
28385 </interface>
28386 -<interface name="corenet_udp_sendrecv_netsupport_port" lineno="54980">
28387 +<interface name="corenet_udp_sendrecv_netsupport_port" lineno="55103">
28388 <summary>
28389 Send and receive UDP traffic on the netsupport port.
28390 </summary>
28391 @@ -44414,7 +44231,7 @@ Domain allowed access.
28392 </param>
28393 <infoflow type="both" weight="10"/>
28394 </interface>
28395 -<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="54996">
28396 +<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="55119">
28397 <summary>
28398 Do not audit attempts to send and receive
28399 UDP traffic on the netsupport port.
28400 @@ -44426,7 +44243,7 @@ Domain to not audit.
28401 </param>
28402 <infoflow type="none"/>
28403 </interface>
28404 -<interface name="corenet_tcp_bind_netsupport_port" lineno="55011">
28405 +<interface name="corenet_tcp_bind_netsupport_port" lineno="55134">
28406 <summary>
28407 Bind TCP sockets to the netsupport port.
28408 </summary>
28409 @@ -44437,7 +44254,7 @@ Domain allowed access.
28410 </param>
28411 <infoflow type="none"/>
28412 </interface>
28413 -<interface name="corenet_udp_bind_netsupport_port" lineno="55031">
28414 +<interface name="corenet_udp_bind_netsupport_port" lineno="55154">
28415 <summary>
28416 Bind UDP sockets to the netsupport port.
28417 </summary>
28418 @@ -44448,7 +44265,7 @@ Domain allowed access.
28419 </param>
28420 <infoflow type="none"/>
28421 </interface>
28422 -<interface name="corenet_tcp_connect_netsupport_port" lineno="55050">
28423 +<interface name="corenet_tcp_connect_netsupport_port" lineno="55173">
28424 <summary>
28425 Make a TCP connection to the netsupport port.
28426 </summary>
28427 @@ -44458,7 +44275,7 @@ Domain allowed access.
28428 </summary>
28429 </param>
28430 </interface>
28431 -<interface name="corenet_send_netsupport_client_packets" lineno="55070">
28432 +<interface name="corenet_send_netsupport_client_packets" lineno="55193">
28433 <summary>
28434 Send netsupport_client packets.
28435 </summary>
28436 @@ -44469,7 +44286,7 @@ Domain allowed access.
28437 </param>
28438 <infoflow type="write" weight="10"/>
28439 </interface>
28440 -<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="55089">
28441 +<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="55212">
28442 <summary>
28443 Do not audit attempts to send netsupport_client packets.
28444 </summary>
28445 @@ -44480,7 +44297,7 @@ Domain to not audit.
28446 </param>
28447 <infoflow type="none"/>
28448 </interface>
28449 -<interface name="corenet_receive_netsupport_client_packets" lineno="55108">
28450 +<interface name="corenet_receive_netsupport_client_packets" lineno="55231">
28451 <summary>
28452 Receive netsupport_client packets.
28453 </summary>
28454 @@ -44491,7 +44308,7 @@ Domain allowed access.
28455 </param>
28456 <infoflow type="read" weight="10"/>
28457 </interface>
28458 -<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="55127">
28459 +<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="55250">
28460 <summary>
28461 Do not audit attempts to receive netsupport_client packets.
28462 </summary>
28463 @@ -44502,7 +44319,7 @@ Domain allowed access.
28464 </param>
28465 <infoflow type="none"/>
28466 </interface>
28467 -<interface name="corenet_sendrecv_netsupport_client_packets" lineno="55146">
28468 +<interface name="corenet_sendrecv_netsupport_client_packets" lineno="55269">
28469 <summary>
28470 Send and receive netsupport_client packets.
28471 </summary>
28472 @@ -44513,7 +44330,7 @@ Domain allowed access.
28473 </param>
28474 <infoflow type="both" weight="10"/>
28475 </interface>
28476 -<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="55162">
28477 +<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="55285">
28478 <summary>
28479 Do not audit attempts to send and receive netsupport_client packets.
28480 </summary>
28481 @@ -44524,7 +44341,7 @@ Domain to not audit.
28482 </param>
28483 <infoflow type="none"/>
28484 </interface>
28485 -<interface name="corenet_relabelto_netsupport_client_packets" lineno="55177">
28486 +<interface name="corenet_relabelto_netsupport_client_packets" lineno="55300">
28487 <summary>
28488 Relabel packets to netsupport_client the packet type.
28489 </summary>
28490 @@ -44534,7 +44351,7 @@ Domain allowed access.
28491 </summary>
28492 </param>
28493 </interface>
28494 -<interface name="corenet_send_netsupport_server_packets" lineno="55197">
28495 +<interface name="corenet_send_netsupport_server_packets" lineno="55320">
28496 <summary>
28497 Send netsupport_server packets.
28498 </summary>
28499 @@ -44545,7 +44362,7 @@ Domain allowed access.
28500 </param>
28501 <infoflow type="write" weight="10"/>
28502 </interface>
28503 -<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="55216">
28504 +<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="55339">
28505 <summary>
28506 Do not audit attempts to send netsupport_server packets.
28507 </summary>
28508 @@ -44556,7 +44373,7 @@ Domain to not audit.
28509 </param>
28510 <infoflow type="none"/>
28511 </interface>
28512 -<interface name="corenet_receive_netsupport_server_packets" lineno="55235">
28513 +<interface name="corenet_receive_netsupport_server_packets" lineno="55358">
28514 <summary>
28515 Receive netsupport_server packets.
28516 </summary>
28517 @@ -44567,7 +44384,7 @@ Domain allowed access.
28518 </param>
28519 <infoflow type="read" weight="10"/>
28520 </interface>
28521 -<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="55254">
28522 +<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="55377">
28523 <summary>
28524 Do not audit attempts to receive netsupport_server packets.
28525 </summary>
28526 @@ -44578,7 +44395,7 @@ Domain allowed access.
28527 </param>
28528 <infoflow type="none"/>
28529 </interface>
28530 -<interface name="corenet_sendrecv_netsupport_server_packets" lineno="55273">
28531 +<interface name="corenet_sendrecv_netsupport_server_packets" lineno="55396">
28532 <summary>
28533 Send and receive netsupport_server packets.
28534 </summary>
28535 @@ -44589,7 +44406,7 @@ Domain allowed access.
28536 </param>
28537 <infoflow type="both" weight="10"/>
28538 </interface>
28539 -<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="55289">
28540 +<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="55412">
28541 <summary>
28542 Do not audit attempts to send and receive netsupport_server packets.
28543 </summary>
28544 @@ -44600,7 +44417,7 @@ Domain to not audit.
28545 </param>
28546 <infoflow type="none"/>
28547 </interface>
28548 -<interface name="corenet_relabelto_netsupport_server_packets" lineno="55304">
28549 +<interface name="corenet_relabelto_netsupport_server_packets" lineno="55427">
28550 <summary>
28551 Relabel packets to netsupport_server the packet type.
28552 </summary>
28553 @@ -44610,7 +44427,7 @@ Domain allowed access.
28554 </summary>
28555 </param>
28556 </interface>
28557 -<interface name="corenet_tcp_sendrecv_nfs_port" lineno="55326">
28558 +<interface name="corenet_tcp_sendrecv_nfs_port" lineno="55449">
28559 <summary>
28560 Send and receive TCP traffic on the nfs port.
28561 </summary>
28562 @@ -44621,7 +44438,7 @@ Domain allowed access.
28563 </param>
28564 <infoflow type="both" weight="10"/>
28565 </interface>
28566 -<interface name="corenet_udp_send_nfs_port" lineno="55341">
28567 +<interface name="corenet_udp_send_nfs_port" lineno="55464">
28568 <summary>
28569 Send UDP traffic on the nfs port.
28570 </summary>
28571 @@ -44632,7 +44449,7 @@ Domain allowed access.
28572 </param>
28573 <infoflow type="write" weight="10"/>
28574 </interface>
28575 -<interface name="corenet_dontaudit_udp_send_nfs_port" lineno="55356">
28576 +<interface name="corenet_dontaudit_udp_send_nfs_port" lineno="55479">
28577 <summary>
28578 Do not audit attempts to send UDP traffic on the nfs port.
28579 </summary>
28580 @@ -44643,7 +44460,7 @@ Domain to not audit.
28581 </param>
28582 <infoflow type="none"/>
28583 </interface>
28584 -<interface name="corenet_udp_receive_nfs_port" lineno="55371">
28585 +<interface name="corenet_udp_receive_nfs_port" lineno="55494">
28586 <summary>
28587 Receive UDP traffic on the nfs port.
28588 </summary>
28589 @@ -44654,7 +44471,7 @@ Domain allowed access.
28590 </param>
28591 <infoflow type="read" weight="10"/>
28592 </interface>
28593 -<interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="55386">
28594 +<interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="55509">
28595 <summary>
28596 Do not audit attempts to receive UDP traffic on the nfs port.
28597 </summary>
28598 @@ -44665,7 +44482,7 @@ Domain to not audit.
28599 </param>
28600 <infoflow type="none"/>
28601 </interface>
28602 -<interface name="corenet_udp_sendrecv_nfs_port" lineno="55401">
28603 +<interface name="corenet_udp_sendrecv_nfs_port" lineno="55524">
28604 <summary>
28605 Send and receive UDP traffic on the nfs port.
28606 </summary>
28607 @@ -44676,7 +44493,7 @@ Domain allowed access.
28608 </param>
28609 <infoflow type="both" weight="10"/>
28610 </interface>
28611 -<interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="55417">
28612 +<interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="55540">
28613 <summary>
28614 Do not audit attempts to send and receive
28615 UDP traffic on the nfs port.
28616 @@ -44688,7 +44505,7 @@ Domain to not audit.
28617 </param>
28618 <infoflow type="none"/>
28619 </interface>
28620 -<interface name="corenet_tcp_bind_nfs_port" lineno="55432">
28621 +<interface name="corenet_tcp_bind_nfs_port" lineno="55555">
28622 <summary>
28623 Bind TCP sockets to the nfs port.
28624 </summary>
28625 @@ -44699,7 +44516,7 @@ Domain allowed access.
28626 </param>
28627 <infoflow type="none"/>
28628 </interface>
28629 -<interface name="corenet_udp_bind_nfs_port" lineno="55452">
28630 +<interface name="corenet_udp_bind_nfs_port" lineno="55575">
28631 <summary>
28632 Bind UDP sockets to the nfs port.
28633 </summary>
28634 @@ -44710,7 +44527,7 @@ Domain allowed access.
28635 </param>
28636 <infoflow type="none"/>
28637 </interface>
28638 -<interface name="corenet_tcp_connect_nfs_port" lineno="55471">
28639 +<interface name="corenet_tcp_connect_nfs_port" lineno="55594">
28640 <summary>
28641 Make a TCP connection to the nfs port.
28642 </summary>
28643 @@ -44720,7 +44537,7 @@ Domain allowed access.
28644 </summary>
28645 </param>
28646 </interface>
28647 -<interface name="corenet_send_nfs_client_packets" lineno="55491">
28648 +<interface name="corenet_send_nfs_client_packets" lineno="55614">
28649 <summary>
28650 Send nfs_client packets.
28651 </summary>
28652 @@ -44731,7 +44548,7 @@ Domain allowed access.
28653 </param>
28654 <infoflow type="write" weight="10"/>
28655 </interface>
28656 -<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="55510">
28657 +<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="55633">
28658 <summary>
28659 Do not audit attempts to send nfs_client packets.
28660 </summary>
28661 @@ -44742,7 +44559,7 @@ Domain to not audit.
28662 </param>
28663 <infoflow type="none"/>
28664 </interface>
28665 -<interface name="corenet_receive_nfs_client_packets" lineno="55529">
28666 +<interface name="corenet_receive_nfs_client_packets" lineno="55652">
28667 <summary>
28668 Receive nfs_client packets.
28669 </summary>
28670 @@ -44753,7 +44570,7 @@ Domain allowed access.
28671 </param>
28672 <infoflow type="read" weight="10"/>
28673 </interface>
28674 -<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="55548">
28675 +<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="55671">
28676 <summary>
28677 Do not audit attempts to receive nfs_client packets.
28678 </summary>
28679 @@ -44764,7 +44581,7 @@ Domain allowed access.
28680 </param>
28681 <infoflow type="none"/>
28682 </interface>
28683 -<interface name="corenet_sendrecv_nfs_client_packets" lineno="55567">
28684 +<interface name="corenet_sendrecv_nfs_client_packets" lineno="55690">
28685 <summary>
28686 Send and receive nfs_client packets.
28687 </summary>
28688 @@ -44775,7 +44592,7 @@ Domain allowed access.
28689 </param>
28690 <infoflow type="both" weight="10"/>
28691 </interface>
28692 -<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="55583">
28693 +<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="55706">
28694 <summary>
28695 Do not audit attempts to send and receive nfs_client packets.
28696 </summary>
28697 @@ -44786,7 +44603,7 @@ Domain to not audit.
28698 </param>
28699 <infoflow type="none"/>
28700 </interface>
28701 -<interface name="corenet_relabelto_nfs_client_packets" lineno="55598">
28702 +<interface name="corenet_relabelto_nfs_client_packets" lineno="55721">
28703 <summary>
28704 Relabel packets to nfs_client the packet type.
28705 </summary>
28706 @@ -44796,7 +44613,7 @@ Domain allowed access.
28707 </summary>
28708 </param>
28709 </interface>
28710 -<interface name="corenet_send_nfs_server_packets" lineno="55618">
28711 +<interface name="corenet_send_nfs_server_packets" lineno="55741">
28712 <summary>
28713 Send nfs_server packets.
28714 </summary>
28715 @@ -44807,7 +44624,7 @@ Domain allowed access.
28716 </param>
28717 <infoflow type="write" weight="10"/>
28718 </interface>
28719 -<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="55637">
28720 +<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="55760">
28721 <summary>
28722 Do not audit attempts to send nfs_server packets.
28723 </summary>
28724 @@ -44818,7 +44635,7 @@ Domain to not audit.
28725 </param>
28726 <infoflow type="none"/>
28727 </interface>
28728 -<interface name="corenet_receive_nfs_server_packets" lineno="55656">
28729 +<interface name="corenet_receive_nfs_server_packets" lineno="55779">
28730 <summary>
28731 Receive nfs_server packets.
28732 </summary>
28733 @@ -44829,7 +44646,7 @@ Domain allowed access.
28734 </param>
28735 <infoflow type="read" weight="10"/>
28736 </interface>
28737 -<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="55675">
28738 +<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="55798">
28739 <summary>
28740 Do not audit attempts to receive nfs_server packets.
28741 </summary>
28742 @@ -44840,7 +44657,7 @@ Domain allowed access.
28743 </param>
28744 <infoflow type="none"/>
28745 </interface>
28746 -<interface name="corenet_sendrecv_nfs_server_packets" lineno="55694">
28747 +<interface name="corenet_sendrecv_nfs_server_packets" lineno="55817">
28748 <summary>
28749 Send and receive nfs_server packets.
28750 </summary>
28751 @@ -44851,7 +44668,7 @@ Domain allowed access.
28752 </param>
28753 <infoflow type="both" weight="10"/>
28754 </interface>
28755 -<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="55710">
28756 +<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="55833">
28757 <summary>
28758 Do not audit attempts to send and receive nfs_server packets.
28759 </summary>
28760 @@ -44862,7 +44679,7 @@ Domain to not audit.
28761 </param>
28762 <infoflow type="none"/>
28763 </interface>
28764 -<interface name="corenet_relabelto_nfs_server_packets" lineno="55725">
28765 +<interface name="corenet_relabelto_nfs_server_packets" lineno="55848">
28766 <summary>
28767 Relabel packets to nfs_server the packet type.
28768 </summary>
28769 @@ -44872,7 +44689,7 @@ Domain allowed access.
28770 </summary>
28771 </param>
28772 </interface>
28773 -<interface name="corenet_tcp_sendrecv_nfsrdma_port" lineno="55747">
28774 +<interface name="corenet_tcp_sendrecv_nfsrdma_port" lineno="55870">
28775 <summary>
28776 Send and receive TCP traffic on the nfsrdma port.
28777 </summary>
28778 @@ -44883,7 +44700,7 @@ Domain allowed access.
28779 </param>
28780 <infoflow type="both" weight="10"/>
28781 </interface>
28782 -<interface name="corenet_udp_send_nfsrdma_port" lineno="55762">
28783 +<interface name="corenet_udp_send_nfsrdma_port" lineno="55885">
28784 <summary>
28785 Send UDP traffic on the nfsrdma port.
28786 </summary>
28787 @@ -44894,7 +44711,7 @@ Domain allowed access.
28788 </param>
28789 <infoflow type="write" weight="10"/>
28790 </interface>
28791 -<interface name="corenet_dontaudit_udp_send_nfsrdma_port" lineno="55777">
28792 +<interface name="corenet_dontaudit_udp_send_nfsrdma_port" lineno="55900">
28793 <summary>
28794 Do not audit attempts to send UDP traffic on the nfsrdma port.
28795 </summary>
28796 @@ -44905,7 +44722,7 @@ Domain to not audit.
28797 </param>
28798 <infoflow type="none"/>
28799 </interface>
28800 -<interface name="corenet_udp_receive_nfsrdma_port" lineno="55792">
28801 +<interface name="corenet_udp_receive_nfsrdma_port" lineno="55915">
28802 <summary>
28803 Receive UDP traffic on the nfsrdma port.
28804 </summary>
28805 @@ -44916,7 +44733,7 @@ Domain allowed access.
28806 </param>
28807 <infoflow type="read" weight="10"/>
28808 </interface>
28809 -<interface name="corenet_dontaudit_udp_receive_nfsrdma_port" lineno="55807">
28810 +<interface name="corenet_dontaudit_udp_receive_nfsrdma_port" lineno="55930">
28811 <summary>
28812 Do not audit attempts to receive UDP traffic on the nfsrdma port.
28813 </summary>
28814 @@ -44927,7 +44744,7 @@ Domain to not audit.
28815 </param>
28816 <infoflow type="none"/>
28817 </interface>
28818 -<interface name="corenet_udp_sendrecv_nfsrdma_port" lineno="55822">
28819 +<interface name="corenet_udp_sendrecv_nfsrdma_port" lineno="55945">
28820 <summary>
28821 Send and receive UDP traffic on the nfsrdma port.
28822 </summary>
28823 @@ -44938,7 +44755,7 @@ Domain allowed access.
28824 </param>
28825 <infoflow type="both" weight="10"/>
28826 </interface>
28827 -<interface name="corenet_dontaudit_udp_sendrecv_nfsrdma_port" lineno="55838">
28828 +<interface name="corenet_dontaudit_udp_sendrecv_nfsrdma_port" lineno="55961">
28829 <summary>
28830 Do not audit attempts to send and receive
28831 UDP traffic on the nfsrdma port.
28832 @@ -44950,7 +44767,7 @@ Domain to not audit.
28833 </param>
28834 <infoflow type="none"/>
28835 </interface>
28836 -<interface name="corenet_tcp_bind_nfsrdma_port" lineno="55853">
28837 +<interface name="corenet_tcp_bind_nfsrdma_port" lineno="55976">
28838 <summary>
28839 Bind TCP sockets to the nfsrdma port.
28840 </summary>
28841 @@ -44961,7 +44778,7 @@ Domain allowed access.
28842 </param>
28843 <infoflow type="none"/>
28844 </interface>
28845 -<interface name="corenet_udp_bind_nfsrdma_port" lineno="55873">
28846 +<interface name="corenet_udp_bind_nfsrdma_port" lineno="55996">
28847 <summary>
28848 Bind UDP sockets to the nfsrdma port.
28849 </summary>
28850 @@ -44972,7 +44789,7 @@ Domain allowed access.
28851 </param>
28852 <infoflow type="none"/>
28853 </interface>
28854 -<interface name="corenet_tcp_connect_nfsrdma_port" lineno="55892">
28855 +<interface name="corenet_tcp_connect_nfsrdma_port" lineno="56015">
28856 <summary>
28857 Make a TCP connection to the nfsrdma port.
28858 </summary>
28859 @@ -44982,7 +44799,7 @@ Domain allowed access.
28860 </summary>
28861 </param>
28862 </interface>
28863 -<interface name="corenet_send_nfsrdma_client_packets" lineno="55912">
28864 +<interface name="corenet_send_nfsrdma_client_packets" lineno="56035">
28865 <summary>
28866 Send nfsrdma_client packets.
28867 </summary>
28868 @@ -44993,7 +44810,7 @@ Domain allowed access.
28869 </param>
28870 <infoflow type="write" weight="10"/>
28871 </interface>
28872 -<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="55931">
28873 +<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="56054">
28874 <summary>
28875 Do not audit attempts to send nfsrdma_client packets.
28876 </summary>
28877 @@ -45004,7 +44821,7 @@ Domain to not audit.
28878 </param>
28879 <infoflow type="none"/>
28880 </interface>
28881 -<interface name="corenet_receive_nfsrdma_client_packets" lineno="55950">
28882 +<interface name="corenet_receive_nfsrdma_client_packets" lineno="56073">
28883 <summary>
28884 Receive nfsrdma_client packets.
28885 </summary>
28886 @@ -45015,7 +44832,7 @@ Domain allowed access.
28887 </param>
28888 <infoflow type="read" weight="10"/>
28889 </interface>
28890 -<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="55969">
28891 +<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="56092">
28892 <summary>
28893 Do not audit attempts to receive nfsrdma_client packets.
28894 </summary>
28895 @@ -45026,7 +44843,7 @@ Domain allowed access.
28896 </param>
28897 <infoflow type="none"/>
28898 </interface>
28899 -<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="55988">
28900 +<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="56111">
28901 <summary>
28902 Send and receive nfsrdma_client packets.
28903 </summary>
28904 @@ -45037,7 +44854,7 @@ Domain allowed access.
28905 </param>
28906 <infoflow type="both" weight="10"/>
28907 </interface>
28908 -<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="56004">
28909 +<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="56127">
28910 <summary>
28911 Do not audit attempts to send and receive nfsrdma_client packets.
28912 </summary>
28913 @@ -45048,7 +44865,7 @@ Domain to not audit.
28914 </param>
28915 <infoflow type="none"/>
28916 </interface>
28917 -<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="56019">
28918 +<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="56142">
28919 <summary>
28920 Relabel packets to nfsrdma_client the packet type.
28921 </summary>
28922 @@ -45058,7 +44875,7 @@ Domain allowed access.
28923 </summary>
28924 </param>
28925 </interface>
28926 -<interface name="corenet_send_nfsrdma_server_packets" lineno="56039">
28927 +<interface name="corenet_send_nfsrdma_server_packets" lineno="56162">
28928 <summary>
28929 Send nfsrdma_server packets.
28930 </summary>
28931 @@ -45069,7 +44886,7 @@ Domain allowed access.
28932 </param>
28933 <infoflow type="write" weight="10"/>
28934 </interface>
28935 -<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="56058">
28936 +<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="56181">
28937 <summary>
28938 Do not audit attempts to send nfsrdma_server packets.
28939 </summary>
28940 @@ -45080,7 +44897,7 @@ Domain to not audit.
28941 </param>
28942 <infoflow type="none"/>
28943 </interface>
28944 -<interface name="corenet_receive_nfsrdma_server_packets" lineno="56077">
28945 +<interface name="corenet_receive_nfsrdma_server_packets" lineno="56200">
28946 <summary>
28947 Receive nfsrdma_server packets.
28948 </summary>
28949 @@ -45091,7 +44908,7 @@ Domain allowed access.
28950 </param>
28951 <infoflow type="read" weight="10"/>
28952 </interface>
28953 -<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="56096">
28954 +<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="56219">
28955 <summary>
28956 Do not audit attempts to receive nfsrdma_server packets.
28957 </summary>
28958 @@ -45102,7 +44919,7 @@ Domain allowed access.
28959 </param>
28960 <infoflow type="none"/>
28961 </interface>
28962 -<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="56115">
28963 +<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="56238">
28964 <summary>
28965 Send and receive nfsrdma_server packets.
28966 </summary>
28967 @@ -45113,7 +44930,7 @@ Domain allowed access.
28968 </param>
28969 <infoflow type="both" weight="10"/>
28970 </interface>
28971 -<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="56131">
28972 +<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="56254">
28973 <summary>
28974 Do not audit attempts to send and receive nfsrdma_server packets.
28975 </summary>
28976 @@ -45124,7 +44941,7 @@ Domain to not audit.
28977 </param>
28978 <infoflow type="none"/>
28979 </interface>
28980 -<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="56146">
28981 +<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="56269">
28982 <summary>
28983 Relabel packets to nfsrdma_server the packet type.
28984 </summary>
28985 @@ -45134,7 +44951,7 @@ Domain allowed access.
28986 </summary>
28987 </param>
28988 </interface>
28989 -<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="56168">
28990 +<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="56291">
28991 <summary>
28992 Send and receive TCP traffic on the nmbd port.
28993 </summary>
28994 @@ -45145,7 +44962,7 @@ Domain allowed access.
28995 </param>
28996 <infoflow type="both" weight="10"/>
28997 </interface>
28998 -<interface name="corenet_udp_send_nmbd_port" lineno="56183">
28999 +<interface name="corenet_udp_send_nmbd_port" lineno="56306">
29000 <summary>
29001 Send UDP traffic on the nmbd port.
29002 </summary>
29003 @@ -45156,7 +44973,7 @@ Domain allowed access.
29004 </param>
29005 <infoflow type="write" weight="10"/>
29006 </interface>
29007 -<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="56198">
29008 +<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="56321">
29009 <summary>
29010 Do not audit attempts to send UDP traffic on the nmbd port.
29011 </summary>
29012 @@ -45167,7 +44984,7 @@ Domain to not audit.
29013 </param>
29014 <infoflow type="none"/>
29015 </interface>
29016 -<interface name="corenet_udp_receive_nmbd_port" lineno="56213">
29017 +<interface name="corenet_udp_receive_nmbd_port" lineno="56336">
29018 <summary>
29019 Receive UDP traffic on the nmbd port.
29020 </summary>
29021 @@ -45178,7 +44995,7 @@ Domain allowed access.
29022 </param>
29023 <infoflow type="read" weight="10"/>
29024 </interface>
29025 -<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="56228">
29026 +<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="56351">
29027 <summary>
29028 Do not audit attempts to receive UDP traffic on the nmbd port.
29029 </summary>
29030 @@ -45189,7 +45006,7 @@ Domain to not audit.
29031 </param>
29032 <infoflow type="none"/>
29033 </interface>
29034 -<interface name="corenet_udp_sendrecv_nmbd_port" lineno="56243">
29035 +<interface name="corenet_udp_sendrecv_nmbd_port" lineno="56366">
29036 <summary>
29037 Send and receive UDP traffic on the nmbd port.
29038 </summary>
29039 @@ -45200,7 +45017,7 @@ Domain allowed access.
29040 </param>
29041 <infoflow type="both" weight="10"/>
29042 </interface>
29043 -<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="56259">
29044 +<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="56382">
29045 <summary>
29046 Do not audit attempts to send and receive
29047 UDP traffic on the nmbd port.
29048 @@ -45212,7 +45029,7 @@ Domain to not audit.
29049 </param>
29050 <infoflow type="none"/>
29051 </interface>
29052 -<interface name="corenet_tcp_bind_nmbd_port" lineno="56274">
29053 +<interface name="corenet_tcp_bind_nmbd_port" lineno="56397">
29054 <summary>
29055 Bind TCP sockets to the nmbd port.
29056 </summary>
29057 @@ -45223,7 +45040,7 @@ Domain allowed access.
29058 </param>
29059 <infoflow type="none"/>
29060 </interface>
29061 -<interface name="corenet_udp_bind_nmbd_port" lineno="56294">
29062 +<interface name="corenet_udp_bind_nmbd_port" lineno="56417">
29063 <summary>
29064 Bind UDP sockets to the nmbd port.
29065 </summary>
29066 @@ -45234,7 +45051,7 @@ Domain allowed access.
29067 </param>
29068 <infoflow type="none"/>
29069 </interface>
29070 -<interface name="corenet_tcp_connect_nmbd_port" lineno="56313">
29071 +<interface name="corenet_tcp_connect_nmbd_port" lineno="56436">
29072 <summary>
29073 Make a TCP connection to the nmbd port.
29074 </summary>
29075 @@ -45244,7 +45061,7 @@ Domain allowed access.
29076 </summary>
29077 </param>
29078 </interface>
29079 -<interface name="corenet_send_nmbd_client_packets" lineno="56333">
29080 +<interface name="corenet_send_nmbd_client_packets" lineno="56456">
29081 <summary>
29082 Send nmbd_client packets.
29083 </summary>
29084 @@ -45255,7 +45072,7 @@ Domain allowed access.
29085 </param>
29086 <infoflow type="write" weight="10"/>
29087 </interface>
29088 -<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="56352">
29089 +<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="56475">
29090 <summary>
29091 Do not audit attempts to send nmbd_client packets.
29092 </summary>
29093 @@ -45266,7 +45083,7 @@ Domain to not audit.
29094 </param>
29095 <infoflow type="none"/>
29096 </interface>
29097 -<interface name="corenet_receive_nmbd_client_packets" lineno="56371">
29098 +<interface name="corenet_receive_nmbd_client_packets" lineno="56494">
29099 <summary>
29100 Receive nmbd_client packets.
29101 </summary>
29102 @@ -45277,7 +45094,7 @@ Domain allowed access.
29103 </param>
29104 <infoflow type="read" weight="10"/>
29105 </interface>
29106 -<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="56390">
29107 +<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="56513">
29108 <summary>
29109 Do not audit attempts to receive nmbd_client packets.
29110 </summary>
29111 @@ -45288,7 +45105,7 @@ Domain allowed access.
29112 </param>
29113 <infoflow type="none"/>
29114 </interface>
29115 -<interface name="corenet_sendrecv_nmbd_client_packets" lineno="56409">
29116 +<interface name="corenet_sendrecv_nmbd_client_packets" lineno="56532">
29117 <summary>
29118 Send and receive nmbd_client packets.
29119 </summary>
29120 @@ -45299,7 +45116,7 @@ Domain allowed access.
29121 </param>
29122 <infoflow type="both" weight="10"/>
29123 </interface>
29124 -<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="56425">
29125 +<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="56548">
29126 <summary>
29127 Do not audit attempts to send and receive nmbd_client packets.
29128 </summary>
29129 @@ -45310,7 +45127,7 @@ Domain to not audit.
29130 </param>
29131 <infoflow type="none"/>
29132 </interface>
29133 -<interface name="corenet_relabelto_nmbd_client_packets" lineno="56440">
29134 +<interface name="corenet_relabelto_nmbd_client_packets" lineno="56563">
29135 <summary>
29136 Relabel packets to nmbd_client the packet type.
29137 </summary>
29138 @@ -45320,7 +45137,7 @@ Domain allowed access.
29139 </summary>
29140 </param>
29141 </interface>
29142 -<interface name="corenet_send_nmbd_server_packets" lineno="56460">
29143 +<interface name="corenet_send_nmbd_server_packets" lineno="56583">
29144 <summary>
29145 Send nmbd_server packets.
29146 </summary>
29147 @@ -45331,7 +45148,7 @@ Domain allowed access.
29148 </param>
29149 <infoflow type="write" weight="10"/>
29150 </interface>
29151 -<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="56479">
29152 +<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="56602">
29153 <summary>
29154 Do not audit attempts to send nmbd_server packets.
29155 </summary>
29156 @@ -45342,7 +45159,7 @@ Domain to not audit.
29157 </param>
29158 <infoflow type="none"/>
29159 </interface>
29160 -<interface name="corenet_receive_nmbd_server_packets" lineno="56498">
29161 +<interface name="corenet_receive_nmbd_server_packets" lineno="56621">
29162 <summary>
29163 Receive nmbd_server packets.
29164 </summary>
29165 @@ -45353,7 +45170,7 @@ Domain allowed access.
29166 </param>
29167 <infoflow type="read" weight="10"/>
29168 </interface>
29169 -<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="56517">
29170 +<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="56640">
29171 <summary>
29172 Do not audit attempts to receive nmbd_server packets.
29173 </summary>
29174 @@ -45364,7 +45181,7 @@ Domain allowed access.
29175 </param>
29176 <infoflow type="none"/>
29177 </interface>
29178 -<interface name="corenet_sendrecv_nmbd_server_packets" lineno="56536">
29179 +<interface name="corenet_sendrecv_nmbd_server_packets" lineno="56659">
29180 <summary>
29181 Send and receive nmbd_server packets.
29182 </summary>
29183 @@ -45375,7 +45192,7 @@ Domain allowed access.
29184 </param>
29185 <infoflow type="both" weight="10"/>
29186 </interface>
29187 -<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="56552">
29188 +<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="56675">
29189 <summary>
29190 Do not audit attempts to send and receive nmbd_server packets.
29191 </summary>
29192 @@ -45386,7 +45203,7 @@ Domain to not audit.
29193 </param>
29194 <infoflow type="none"/>
29195 </interface>
29196 -<interface name="corenet_relabelto_nmbd_server_packets" lineno="56567">
29197 +<interface name="corenet_relabelto_nmbd_server_packets" lineno="56690">
29198 <summary>
29199 Relabel packets to nmbd_server the packet type.
29200 </summary>
29201 @@ -45396,7 +45213,7 @@ Domain allowed access.
29202 </summary>
29203 </param>
29204 </interface>
29205 -<interface name="corenet_tcp_sendrecv_ntop_port" lineno="56589">
29206 +<interface name="corenet_tcp_sendrecv_ntop_port" lineno="56712">
29207 <summary>
29208 Send and receive TCP traffic on the ntop port.
29209 </summary>
29210 @@ -45407,7 +45224,7 @@ Domain allowed access.
29211 </param>
29212 <infoflow type="both" weight="10"/>
29213 </interface>
29214 -<interface name="corenet_udp_send_ntop_port" lineno="56604">
29215 +<interface name="corenet_udp_send_ntop_port" lineno="56727">
29216 <summary>
29217 Send UDP traffic on the ntop port.
29218 </summary>
29219 @@ -45418,7 +45235,7 @@ Domain allowed access.
29220 </param>
29221 <infoflow type="write" weight="10"/>
29222 </interface>
29223 -<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="56619">
29224 +<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="56742">
29225 <summary>
29226 Do not audit attempts to send UDP traffic on the ntop port.
29227 </summary>
29228 @@ -45429,7 +45246,7 @@ Domain to not audit.
29229 </param>
29230 <infoflow type="none"/>
29231 </interface>
29232 -<interface name="corenet_udp_receive_ntop_port" lineno="56634">
29233 +<interface name="corenet_udp_receive_ntop_port" lineno="56757">
29234 <summary>
29235 Receive UDP traffic on the ntop port.
29236 </summary>
29237 @@ -45440,7 +45257,7 @@ Domain allowed access.
29238 </param>
29239 <infoflow type="read" weight="10"/>
29240 </interface>
29241 -<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="56649">
29242 +<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="56772">
29243 <summary>
29244 Do not audit attempts to receive UDP traffic on the ntop port.
29245 </summary>
29246 @@ -45451,7 +45268,7 @@ Domain to not audit.
29247 </param>
29248 <infoflow type="none"/>
29249 </interface>
29250 -<interface name="corenet_udp_sendrecv_ntop_port" lineno="56664">
29251 +<interface name="corenet_udp_sendrecv_ntop_port" lineno="56787">
29252 <summary>
29253 Send and receive UDP traffic on the ntop port.
29254 </summary>
29255 @@ -45462,7 +45279,7 @@ Domain allowed access.
29256 </param>
29257 <infoflow type="both" weight="10"/>
29258 </interface>
29259 -<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="56680">
29260 +<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="56803">
29261 <summary>
29262 Do not audit attempts to send and receive
29263 UDP traffic on the ntop port.
29264 @@ -45474,7 +45291,7 @@ Domain to not audit.
29265 </param>
29266 <infoflow type="none"/>
29267 </interface>
29268 -<interface name="corenet_tcp_bind_ntop_port" lineno="56695">
29269 +<interface name="corenet_tcp_bind_ntop_port" lineno="56818">
29270 <summary>
29271 Bind TCP sockets to the ntop port.
29272 </summary>
29273 @@ -45485,7 +45302,7 @@ Domain allowed access.
29274 </param>
29275 <infoflow type="none"/>
29276 </interface>
29277 -<interface name="corenet_udp_bind_ntop_port" lineno="56715">
29278 +<interface name="corenet_udp_bind_ntop_port" lineno="56838">
29279 <summary>
29280 Bind UDP sockets to the ntop port.
29281 </summary>
29282 @@ -45496,7 +45313,7 @@ Domain allowed access.
29283 </param>
29284 <infoflow type="none"/>
29285 </interface>
29286 -<interface name="corenet_tcp_connect_ntop_port" lineno="56734">
29287 +<interface name="corenet_tcp_connect_ntop_port" lineno="56857">
29288 <summary>
29289 Make a TCP connection to the ntop port.
29290 </summary>
29291 @@ -45506,7 +45323,7 @@ Domain allowed access.
29292 </summary>
29293 </param>
29294 </interface>
29295 -<interface name="corenet_send_ntop_client_packets" lineno="56754">
29296 +<interface name="corenet_send_ntop_client_packets" lineno="56877">
29297 <summary>
29298 Send ntop_client packets.
29299 </summary>
29300 @@ -45517,7 +45334,7 @@ Domain allowed access.
29301 </param>
29302 <infoflow type="write" weight="10"/>
29303 </interface>
29304 -<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="56773">
29305 +<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="56896">
29306 <summary>
29307 Do not audit attempts to send ntop_client packets.
29308 </summary>
29309 @@ -45528,7 +45345,7 @@ Domain to not audit.
29310 </param>
29311 <infoflow type="none"/>
29312 </interface>
29313 -<interface name="corenet_receive_ntop_client_packets" lineno="56792">
29314 +<interface name="corenet_receive_ntop_client_packets" lineno="56915">
29315 <summary>
29316 Receive ntop_client packets.
29317 </summary>
29318 @@ -45539,7 +45356,7 @@ Domain allowed access.
29319 </param>
29320 <infoflow type="read" weight="10"/>
29321 </interface>
29322 -<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="56811">
29323 +<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="56934">
29324 <summary>
29325 Do not audit attempts to receive ntop_client packets.
29326 </summary>
29327 @@ -45550,7 +45367,7 @@ Domain allowed access.
29328 </param>
29329 <infoflow type="none"/>
29330 </interface>
29331 -<interface name="corenet_sendrecv_ntop_client_packets" lineno="56830">
29332 +<interface name="corenet_sendrecv_ntop_client_packets" lineno="56953">
29333 <summary>
29334 Send and receive ntop_client packets.
29335 </summary>
29336 @@ -45561,7 +45378,7 @@ Domain allowed access.
29337 </param>
29338 <infoflow type="both" weight="10"/>
29339 </interface>
29340 -<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="56846">
29341 +<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="56969">
29342 <summary>
29343 Do not audit attempts to send and receive ntop_client packets.
29344 </summary>
29345 @@ -45572,7 +45389,7 @@ Domain to not audit.
29346 </param>
29347 <infoflow type="none"/>
29348 </interface>
29349 -<interface name="corenet_relabelto_ntop_client_packets" lineno="56861">
29350 +<interface name="corenet_relabelto_ntop_client_packets" lineno="56984">
29351 <summary>
29352 Relabel packets to ntop_client the packet type.
29353 </summary>
29354 @@ -45582,7 +45399,7 @@ Domain allowed access.
29355 </summary>
29356 </param>
29357 </interface>
29358 -<interface name="corenet_send_ntop_server_packets" lineno="56881">
29359 +<interface name="corenet_send_ntop_server_packets" lineno="57004">
29360 <summary>
29361 Send ntop_server packets.
29362 </summary>
29363 @@ -45593,7 +45410,7 @@ Domain allowed access.
29364 </param>
29365 <infoflow type="write" weight="10"/>
29366 </interface>
29367 -<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="56900">
29368 +<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="57023">
29369 <summary>
29370 Do not audit attempts to send ntop_server packets.
29371 </summary>
29372 @@ -45604,7 +45421,7 @@ Domain to not audit.
29373 </param>
29374 <infoflow type="none"/>
29375 </interface>
29376 -<interface name="corenet_receive_ntop_server_packets" lineno="56919">
29377 +<interface name="corenet_receive_ntop_server_packets" lineno="57042">
29378 <summary>
29379 Receive ntop_server packets.
29380 </summary>
29381 @@ -45615,7 +45432,7 @@ Domain allowed access.
29382 </param>
29383 <infoflow type="read" weight="10"/>
29384 </interface>
29385 -<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="56938">
29386 +<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="57061">
29387 <summary>
29388 Do not audit attempts to receive ntop_server packets.
29389 </summary>
29390 @@ -45626,7 +45443,7 @@ Domain allowed access.
29391 </param>
29392 <infoflow type="none"/>
29393 </interface>
29394 -<interface name="corenet_sendrecv_ntop_server_packets" lineno="56957">
29395 +<interface name="corenet_sendrecv_ntop_server_packets" lineno="57080">
29396 <summary>
29397 Send and receive ntop_server packets.
29398 </summary>
29399 @@ -45637,7 +45454,7 @@ Domain allowed access.
29400 </param>
29401 <infoflow type="both" weight="10"/>
29402 </interface>
29403 -<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="56973">
29404 +<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="57096">
29405 <summary>
29406 Do not audit attempts to send and receive ntop_server packets.
29407 </summary>
29408 @@ -45648,7 +45465,7 @@ Domain to not audit.
29409 </param>
29410 <infoflow type="none"/>
29411 </interface>
29412 -<interface name="corenet_relabelto_ntop_server_packets" lineno="56988">
29413 +<interface name="corenet_relabelto_ntop_server_packets" lineno="57111">
29414 <summary>
29415 Relabel packets to ntop_server the packet type.
29416 </summary>
29417 @@ -45658,7 +45475,7 @@ Domain allowed access.
29418 </summary>
29419 </param>
29420 </interface>
29421 -<interface name="corenet_tcp_sendrecv_ntp_port" lineno="57010">
29422 +<interface name="corenet_tcp_sendrecv_ntp_port" lineno="57133">
29423 <summary>
29424 Send and receive TCP traffic on the ntp port.
29425 </summary>
29426 @@ -45669,7 +45486,7 @@ Domain allowed access.
29427 </param>
29428 <infoflow type="both" weight="10"/>
29429 </interface>
29430 -<interface name="corenet_udp_send_ntp_port" lineno="57025">
29431 +<interface name="corenet_udp_send_ntp_port" lineno="57148">
29432 <summary>
29433 Send UDP traffic on the ntp port.
29434 </summary>
29435 @@ -45680,7 +45497,7 @@ Domain allowed access.
29436 </param>
29437 <infoflow type="write" weight="10"/>
29438 </interface>
29439 -<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="57040">
29440 +<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="57163">
29441 <summary>
29442 Do not audit attempts to send UDP traffic on the ntp port.
29443 </summary>
29444 @@ -45691,7 +45508,7 @@ Domain to not audit.
29445 </param>
29446 <infoflow type="none"/>
29447 </interface>
29448 -<interface name="corenet_udp_receive_ntp_port" lineno="57055">
29449 +<interface name="corenet_udp_receive_ntp_port" lineno="57178">
29450 <summary>
29451 Receive UDP traffic on the ntp port.
29452 </summary>
29453 @@ -45702,7 +45519,7 @@ Domain allowed access.
29454 </param>
29455 <infoflow type="read" weight="10"/>
29456 </interface>
29457 -<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="57070">
29458 +<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="57193">
29459 <summary>
29460 Do not audit attempts to receive UDP traffic on the ntp port.
29461 </summary>
29462 @@ -45713,7 +45530,7 @@ Domain to not audit.
29463 </param>
29464 <infoflow type="none"/>
29465 </interface>
29466 -<interface name="corenet_udp_sendrecv_ntp_port" lineno="57085">
29467 +<interface name="corenet_udp_sendrecv_ntp_port" lineno="57208">
29468 <summary>
29469 Send and receive UDP traffic on the ntp port.
29470 </summary>
29471 @@ -45724,7 +45541,7 @@ Domain allowed access.
29472 </param>
29473 <infoflow type="both" weight="10"/>
29474 </interface>
29475 -<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="57101">
29476 +<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="57224">
29477 <summary>
29478 Do not audit attempts to send and receive
29479 UDP traffic on the ntp port.
29480 @@ -45736,7 +45553,7 @@ Domain to not audit.
29481 </param>
29482 <infoflow type="none"/>
29483 </interface>
29484 -<interface name="corenet_tcp_bind_ntp_port" lineno="57116">
29485 +<interface name="corenet_tcp_bind_ntp_port" lineno="57239">
29486 <summary>
29487 Bind TCP sockets to the ntp port.
29488 </summary>
29489 @@ -45747,7 +45564,7 @@ Domain allowed access.
29490 </param>
29491 <infoflow type="none"/>
29492 </interface>
29493 -<interface name="corenet_udp_bind_ntp_port" lineno="57136">
29494 +<interface name="corenet_udp_bind_ntp_port" lineno="57259">
29495 <summary>
29496 Bind UDP sockets to the ntp port.
29497 </summary>
29498 @@ -45758,7 +45575,7 @@ Domain allowed access.
29499 </param>
29500 <infoflow type="none"/>
29501 </interface>
29502 -<interface name="corenet_tcp_connect_ntp_port" lineno="57155">
29503 +<interface name="corenet_tcp_connect_ntp_port" lineno="57278">
29504 <summary>
29505 Make a TCP connection to the ntp port.
29506 </summary>
29507 @@ -45768,7 +45585,7 @@ Domain allowed access.
29508 </summary>
29509 </param>
29510 </interface>
29511 -<interface name="corenet_send_ntp_client_packets" lineno="57175">
29512 +<interface name="corenet_send_ntp_client_packets" lineno="57298">
29513 <summary>
29514 Send ntp_client packets.
29515 </summary>
29516 @@ -45779,7 +45596,7 @@ Domain allowed access.
29517 </param>
29518 <infoflow type="write" weight="10"/>
29519 </interface>
29520 -<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="57194">
29521 +<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="57317">
29522 <summary>
29523 Do not audit attempts to send ntp_client packets.
29524 </summary>
29525 @@ -45790,7 +45607,7 @@ Domain to not audit.
29526 </param>
29527 <infoflow type="none"/>
29528 </interface>
29529 -<interface name="corenet_receive_ntp_client_packets" lineno="57213">
29530 +<interface name="corenet_receive_ntp_client_packets" lineno="57336">
29531 <summary>
29532 Receive ntp_client packets.
29533 </summary>
29534 @@ -45801,7 +45618,7 @@ Domain allowed access.
29535 </param>
29536 <infoflow type="read" weight="10"/>
29537 </interface>
29538 -<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="57232">
29539 +<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="57355">
29540 <summary>
29541 Do not audit attempts to receive ntp_client packets.
29542 </summary>
29543 @@ -45812,7 +45629,7 @@ Domain allowed access.
29544 </param>
29545 <infoflow type="none"/>
29546 </interface>
29547 -<interface name="corenet_sendrecv_ntp_client_packets" lineno="57251">
29548 +<interface name="corenet_sendrecv_ntp_client_packets" lineno="57374">
29549 <summary>
29550 Send and receive ntp_client packets.
29551 </summary>
29552 @@ -45823,7 +45640,7 @@ Domain allowed access.
29553 </param>
29554 <infoflow type="both" weight="10"/>
29555 </interface>
29556 -<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="57267">
29557 +<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="57390">
29558 <summary>
29559 Do not audit attempts to send and receive ntp_client packets.
29560 </summary>
29561 @@ -45834,7 +45651,7 @@ Domain to not audit.
29562 </param>
29563 <infoflow type="none"/>
29564 </interface>
29565 -<interface name="corenet_relabelto_ntp_client_packets" lineno="57282">
29566 +<interface name="corenet_relabelto_ntp_client_packets" lineno="57405">
29567 <summary>
29568 Relabel packets to ntp_client the packet type.
29569 </summary>
29570 @@ -45844,7 +45661,7 @@ Domain allowed access.
29571 </summary>
29572 </param>
29573 </interface>
29574 -<interface name="corenet_send_ntp_server_packets" lineno="57302">
29575 +<interface name="corenet_send_ntp_server_packets" lineno="57425">
29576 <summary>
29577 Send ntp_server packets.
29578 </summary>
29579 @@ -45855,7 +45672,7 @@ Domain allowed access.
29580 </param>
29581 <infoflow type="write" weight="10"/>
29582 </interface>
29583 -<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="57321">
29584 +<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="57444">
29585 <summary>
29586 Do not audit attempts to send ntp_server packets.
29587 </summary>
29588 @@ -45866,7 +45683,7 @@ Domain to not audit.
29589 </param>
29590 <infoflow type="none"/>
29591 </interface>
29592 -<interface name="corenet_receive_ntp_server_packets" lineno="57340">
29593 +<interface name="corenet_receive_ntp_server_packets" lineno="57463">
29594 <summary>
29595 Receive ntp_server packets.
29596 </summary>
29597 @@ -45877,7 +45694,7 @@ Domain allowed access.
29598 </param>
29599 <infoflow type="read" weight="10"/>
29600 </interface>
29601 -<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="57359">
29602 +<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="57482">
29603 <summary>
29604 Do not audit attempts to receive ntp_server packets.
29605 </summary>
29606 @@ -45888,7 +45705,7 @@ Domain allowed access.
29607 </param>
29608 <infoflow type="none"/>
29609 </interface>
29610 -<interface name="corenet_sendrecv_ntp_server_packets" lineno="57378">
29611 +<interface name="corenet_sendrecv_ntp_server_packets" lineno="57501">
29612 <summary>
29613 Send and receive ntp_server packets.
29614 </summary>
29615 @@ -45899,7 +45716,7 @@ Domain allowed access.
29616 </param>
29617 <infoflow type="both" weight="10"/>
29618 </interface>
29619 -<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="57394">
29620 +<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="57517">
29621 <summary>
29622 Do not audit attempts to send and receive ntp_server packets.
29623 </summary>
29624 @@ -45910,7 +45727,7 @@ Domain to not audit.
29625 </param>
29626 <infoflow type="none"/>
29627 </interface>
29628 -<interface name="corenet_relabelto_ntp_server_packets" lineno="57409">
29629 +<interface name="corenet_relabelto_ntp_server_packets" lineno="57532">
29630 <summary>
29631 Relabel packets to ntp_server the packet type.
29632 </summary>
29633 @@ -45920,7 +45737,7 @@ Domain allowed access.
29634 </summary>
29635 </param>
29636 </interface>
29637 -<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="57431">
29638 +<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="57554">
29639 <summary>
29640 Send and receive TCP traffic on the oa_system port.
29641 </summary>
29642 @@ -45931,7 +45748,7 @@ Domain allowed access.
29643 </param>
29644 <infoflow type="both" weight="10"/>
29645 </interface>
29646 -<interface name="corenet_udp_send_oa_system_port" lineno="57446">
29647 +<interface name="corenet_udp_send_oa_system_port" lineno="57569">
29648 <summary>
29649 Send UDP traffic on the oa_system port.
29650 </summary>
29651 @@ -45942,7 +45759,7 @@ Domain allowed access.
29652 </param>
29653 <infoflow type="write" weight="10"/>
29654 </interface>
29655 -<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="57461">
29656 +<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="57584">
29657 <summary>
29658 Do not audit attempts to send UDP traffic on the oa_system port.
29659 </summary>
29660 @@ -45953,7 +45770,7 @@ Domain to not audit.
29661 </param>
29662 <infoflow type="none"/>
29663 </interface>
29664 -<interface name="corenet_udp_receive_oa_system_port" lineno="57476">
29665 +<interface name="corenet_udp_receive_oa_system_port" lineno="57599">
29666 <summary>
29667 Receive UDP traffic on the oa_system port.
29668 </summary>
29669 @@ -45964,7 +45781,7 @@ Domain allowed access.
29670 </param>
29671 <infoflow type="read" weight="10"/>
29672 </interface>
29673 -<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="57491">
29674 +<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="57614">
29675 <summary>
29676 Do not audit attempts to receive UDP traffic on the oa_system port.
29677 </summary>
29678 @@ -45975,7 +45792,7 @@ Domain to not audit.
29679 </param>
29680 <infoflow type="none"/>
29681 </interface>
29682 -<interface name="corenet_udp_sendrecv_oa_system_port" lineno="57506">
29683 +<interface name="corenet_udp_sendrecv_oa_system_port" lineno="57629">
29684 <summary>
29685 Send and receive UDP traffic on the oa_system port.
29686 </summary>
29687 @@ -45986,7 +45803,7 @@ Domain allowed access.
29688 </param>
29689 <infoflow type="both" weight="10"/>
29690 </interface>
29691 -<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="57522">
29692 +<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="57645">
29693 <summary>
29694 Do not audit attempts to send and receive
29695 UDP traffic on the oa_system port.
29696 @@ -45998,7 +45815,7 @@ Domain to not audit.
29697 </param>
29698 <infoflow type="none"/>
29699 </interface>
29700 -<interface name="corenet_tcp_bind_oa_system_port" lineno="57537">
29701 +<interface name="corenet_tcp_bind_oa_system_port" lineno="57660">
29702 <summary>
29703 Bind TCP sockets to the oa_system port.
29704 </summary>
29705 @@ -46009,7 +45826,7 @@ Domain allowed access.
29706 </param>
29707 <infoflow type="none"/>
29708 </interface>
29709 -<interface name="corenet_udp_bind_oa_system_port" lineno="57557">
29710 +<interface name="corenet_udp_bind_oa_system_port" lineno="57680">
29711 <summary>
29712 Bind UDP sockets to the oa_system port.
29713 </summary>
29714 @@ -46020,7 +45837,7 @@ Domain allowed access.
29715 </param>
29716 <infoflow type="none"/>
29717 </interface>
29718 -<interface name="corenet_tcp_connect_oa_system_port" lineno="57576">
29719 +<interface name="corenet_tcp_connect_oa_system_port" lineno="57699">
29720 <summary>
29721 Make a TCP connection to the oa_system port.
29722 </summary>
29723 @@ -46030,7 +45847,7 @@ Domain allowed access.
29724 </summary>
29725 </param>
29726 </interface>
29727 -<interface name="corenet_send_oa_system_client_packets" lineno="57596">
29728 +<interface name="corenet_send_oa_system_client_packets" lineno="57719">
29729 <summary>
29730 Send oa_system_client packets.
29731 </summary>
29732 @@ -46041,7 +45858,7 @@ Domain allowed access.
29733 </param>
29734 <infoflow type="write" weight="10"/>
29735 </interface>
29736 -<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="57615">
29737 +<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="57738">
29738 <summary>
29739 Do not audit attempts to send oa_system_client packets.
29740 </summary>
29741 @@ -46052,7 +45869,7 @@ Domain to not audit.
29742 </param>
29743 <infoflow type="none"/>
29744 </interface>
29745 -<interface name="corenet_receive_oa_system_client_packets" lineno="57634">
29746 +<interface name="corenet_receive_oa_system_client_packets" lineno="57757">
29747 <summary>
29748 Receive oa_system_client packets.
29749 </summary>
29750 @@ -46063,7 +45880,7 @@ Domain allowed access.
29751 </param>
29752 <infoflow type="read" weight="10"/>
29753 </interface>
29754 -<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="57653">
29755 +<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="57776">
29756 <summary>
29757 Do not audit attempts to receive oa_system_client packets.
29758 </summary>
29759 @@ -46074,7 +45891,7 @@ Domain allowed access.
29760 </param>
29761 <infoflow type="none"/>
29762 </interface>
29763 -<interface name="corenet_sendrecv_oa_system_client_packets" lineno="57672">
29764 +<interface name="corenet_sendrecv_oa_system_client_packets" lineno="57795">
29765 <summary>
29766 Send and receive oa_system_client packets.
29767 </summary>
29768 @@ -46085,7 +45902,7 @@ Domain allowed access.
29769 </param>
29770 <infoflow type="both" weight="10"/>
29771 </interface>
29772 -<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="57688">
29773 +<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="57811">
29774 <summary>
29775 Do not audit attempts to send and receive oa_system_client packets.
29776 </summary>
29777 @@ -46096,7 +45913,7 @@ Domain to not audit.
29778 </param>
29779 <infoflow type="none"/>
29780 </interface>
29781 -<interface name="corenet_relabelto_oa_system_client_packets" lineno="57703">
29782 +<interface name="corenet_relabelto_oa_system_client_packets" lineno="57826">
29783 <summary>
29784 Relabel packets to oa_system_client the packet type.
29785 </summary>
29786 @@ -46106,7 +45923,7 @@ Domain allowed access.
29787 </summary>
29788 </param>
29789 </interface>
29790 -<interface name="corenet_send_oa_system_server_packets" lineno="57723">
29791 +<interface name="corenet_send_oa_system_server_packets" lineno="57846">
29792 <summary>
29793 Send oa_system_server packets.
29794 </summary>
29795 @@ -46117,7 +45934,7 @@ Domain allowed access.
29796 </param>
29797 <infoflow type="write" weight="10"/>
29798 </interface>
29799 -<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="57742">
29800 +<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="57865">
29801 <summary>
29802 Do not audit attempts to send oa_system_server packets.
29803 </summary>
29804 @@ -46128,7 +45945,7 @@ Domain to not audit.
29805 </param>
29806 <infoflow type="none"/>
29807 </interface>
29808 -<interface name="corenet_receive_oa_system_server_packets" lineno="57761">
29809 +<interface name="corenet_receive_oa_system_server_packets" lineno="57884">
29810 <summary>
29811 Receive oa_system_server packets.
29812 </summary>
29813 @@ -46139,7 +45956,7 @@ Domain allowed access.
29814 </param>
29815 <infoflow type="read" weight="10"/>
29816 </interface>
29817 -<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="57780">
29818 +<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="57903">
29819 <summary>
29820 Do not audit attempts to receive oa_system_server packets.
29821 </summary>
29822 @@ -46150,7 +45967,7 @@ Domain allowed access.
29823 </param>
29824 <infoflow type="none"/>
29825 </interface>
29826 -<interface name="corenet_sendrecv_oa_system_server_packets" lineno="57799">
29827 +<interface name="corenet_sendrecv_oa_system_server_packets" lineno="57922">
29828 <summary>
29829 Send and receive oa_system_server packets.
29830 </summary>
29831 @@ -46161,7 +45978,7 @@ Domain allowed access.
29832 </param>
29833 <infoflow type="both" weight="10"/>
29834 </interface>
29835 -<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="57815">
29836 +<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="57938">
29837 <summary>
29838 Do not audit attempts to send and receive oa_system_server packets.
29839 </summary>
29840 @@ -46172,7 +45989,7 @@ Domain to not audit.
29841 </param>
29842 <infoflow type="none"/>
29843 </interface>
29844 -<interface name="corenet_relabelto_oa_system_server_packets" lineno="57830">
29845 +<interface name="corenet_relabelto_oa_system_server_packets" lineno="57953">
29846 <summary>
29847 Relabel packets to oa_system_server the packet type.
29848 </summary>
29849 @@ -46182,7 +45999,7 @@ Domain allowed access.
29850 </summary>
29851 </param>
29852 </interface>
29853 -<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="57852">
29854 +<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="57975">
29855 <summary>
29856 Send and receive TCP traffic on the oracledb port.
29857 </summary>
29858 @@ -46193,7 +46010,7 @@ Domain allowed access.
29859 </param>
29860 <infoflow type="both" weight="10"/>
29861 </interface>
29862 -<interface name="corenet_udp_send_oracledb_port" lineno="57867">
29863 +<interface name="corenet_udp_send_oracledb_port" lineno="57990">
29864 <summary>
29865 Send UDP traffic on the oracledb port.
29866 </summary>
29867 @@ -46204,7 +46021,7 @@ Domain allowed access.
29868 </param>
29869 <infoflow type="write" weight="10"/>
29870 </interface>
29871 -<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="57882">
29872 +<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="58005">
29873 <summary>
29874 Do not audit attempts to send UDP traffic on the oracledb port.
29875 </summary>
29876 @@ -46215,7 +46032,7 @@ Domain to not audit.
29877 </param>
29878 <infoflow type="none"/>
29879 </interface>
29880 -<interface name="corenet_udp_receive_oracledb_port" lineno="57897">
29881 +<interface name="corenet_udp_receive_oracledb_port" lineno="58020">
29882 <summary>
29883 Receive UDP traffic on the oracledb port.
29884 </summary>
29885 @@ -46226,7 +46043,7 @@ Domain allowed access.
29886 </param>
29887 <infoflow type="read" weight="10"/>
29888 </interface>
29889 -<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="57912">
29890 +<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="58035">
29891 <summary>
29892 Do not audit attempts to receive UDP traffic on the oracledb port.
29893 </summary>
29894 @@ -46237,7 +46054,7 @@ Domain to not audit.
29895 </param>
29896 <infoflow type="none"/>
29897 </interface>
29898 -<interface name="corenet_udp_sendrecv_oracledb_port" lineno="57927">
29899 +<interface name="corenet_udp_sendrecv_oracledb_port" lineno="58050">
29900 <summary>
29901 Send and receive UDP traffic on the oracledb port.
29902 </summary>
29903 @@ -46248,7 +46065,7 @@ Domain allowed access.
29904 </param>
29905 <infoflow type="both" weight="10"/>
29906 </interface>
29907 -<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="57943">
29908 +<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="58066">
29909 <summary>
29910 Do not audit attempts to send and receive
29911 UDP traffic on the oracledb port.
29912 @@ -46260,7 +46077,7 @@ Domain to not audit.
29913 </param>
29914 <infoflow type="none"/>
29915 </interface>
29916 -<interface name="corenet_tcp_bind_oracledb_port" lineno="57958">
29917 +<interface name="corenet_tcp_bind_oracledb_port" lineno="58081">
29918 <summary>
29919 Bind TCP sockets to the oracledb port.
29920 </summary>
29921 @@ -46271,7 +46088,7 @@ Domain allowed access.
29922 </param>
29923 <infoflow type="none"/>
29924 </interface>
29925 -<interface name="corenet_udp_bind_oracledb_port" lineno="57978">
29926 +<interface name="corenet_udp_bind_oracledb_port" lineno="58101">
29927 <summary>
29928 Bind UDP sockets to the oracledb port.
29929 </summary>
29930 @@ -46282,7 +46099,7 @@ Domain allowed access.
29931 </param>
29932 <infoflow type="none"/>
29933 </interface>
29934 -<interface name="corenet_tcp_connect_oracledb_port" lineno="57997">
29935 +<interface name="corenet_tcp_connect_oracledb_port" lineno="58120">
29936 <summary>
29937 Make a TCP connection to the oracledb port.
29938 </summary>
29939 @@ -46292,7 +46109,7 @@ Domain allowed access.
29940 </summary>
29941 </param>
29942 </interface>
29943 -<interface name="corenet_send_oracledb_client_packets" lineno="58017">
29944 +<interface name="corenet_send_oracledb_client_packets" lineno="58140">
29945 <summary>
29946 Send oracledb_client packets.
29947 </summary>
29948 @@ -46303,7 +46120,7 @@ Domain allowed access.
29949 </param>
29950 <infoflow type="write" weight="10"/>
29951 </interface>
29952 -<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="58036">
29953 +<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="58159">
29954 <summary>
29955 Do not audit attempts to send oracledb_client packets.
29956 </summary>
29957 @@ -46314,7 +46131,7 @@ Domain to not audit.
29958 </param>
29959 <infoflow type="none"/>
29960 </interface>
29961 -<interface name="corenet_receive_oracledb_client_packets" lineno="58055">
29962 +<interface name="corenet_receive_oracledb_client_packets" lineno="58178">
29963 <summary>
29964 Receive oracledb_client packets.
29965 </summary>
29966 @@ -46325,7 +46142,7 @@ Domain allowed access.
29967 </param>
29968 <infoflow type="read" weight="10"/>
29969 </interface>
29970 -<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="58074">
29971 +<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="58197">
29972 <summary>
29973 Do not audit attempts to receive oracledb_client packets.
29974 </summary>
29975 @@ -46336,7 +46153,7 @@ Domain allowed access.
29976 </param>
29977 <infoflow type="none"/>
29978 </interface>
29979 -<interface name="corenet_sendrecv_oracledb_client_packets" lineno="58093">
29980 +<interface name="corenet_sendrecv_oracledb_client_packets" lineno="58216">
29981 <summary>
29982 Send and receive oracledb_client packets.
29983 </summary>
29984 @@ -46347,7 +46164,7 @@ Domain allowed access.
29985 </param>
29986 <infoflow type="both" weight="10"/>
29987 </interface>
29988 -<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="58109">
29989 +<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="58232">
29990 <summary>
29991 Do not audit attempts to send and receive oracledb_client packets.
29992 </summary>
29993 @@ -46358,7 +46175,7 @@ Domain to not audit.
29994 </param>
29995 <infoflow type="none"/>
29996 </interface>
29997 -<interface name="corenet_relabelto_oracledb_client_packets" lineno="58124">
29998 +<interface name="corenet_relabelto_oracledb_client_packets" lineno="58247">
29999 <summary>
30000 Relabel packets to oracledb_client the packet type.
30001 </summary>
30002 @@ -46368,7 +46185,7 @@ Domain allowed access.
30003 </summary>
30004 </param>
30005 </interface>
30006 -<interface name="corenet_send_oracledb_server_packets" lineno="58144">
30007 +<interface name="corenet_send_oracledb_server_packets" lineno="58267">
30008 <summary>
30009 Send oracledb_server packets.
30010 </summary>
30011 @@ -46379,7 +46196,7 @@ Domain allowed access.
30012 </param>
30013 <infoflow type="write" weight="10"/>
30014 </interface>
30015 -<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="58163">
30016 +<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="58286">
30017 <summary>
30018 Do not audit attempts to send oracledb_server packets.
30019 </summary>
30020 @@ -46390,7 +46207,7 @@ Domain to not audit.
30021 </param>
30022 <infoflow type="none"/>
30023 </interface>
30024 -<interface name="corenet_receive_oracledb_server_packets" lineno="58182">
30025 +<interface name="corenet_receive_oracledb_server_packets" lineno="58305">
30026 <summary>
30027 Receive oracledb_server packets.
30028 </summary>
30029 @@ -46401,7 +46218,7 @@ Domain allowed access.
30030 </param>
30031 <infoflow type="read" weight="10"/>
30032 </interface>
30033 -<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="58201">
30034 +<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="58324">
30035 <summary>
30036 Do not audit attempts to receive oracledb_server packets.
30037 </summary>
30038 @@ -46412,7 +46229,7 @@ Domain allowed access.
30039 </param>
30040 <infoflow type="none"/>
30041 </interface>
30042 -<interface name="corenet_sendrecv_oracledb_server_packets" lineno="58220">
30043 +<interface name="corenet_sendrecv_oracledb_server_packets" lineno="58343">
30044 <summary>
30045 Send and receive oracledb_server packets.
30046 </summary>
30047 @@ -46423,7 +46240,7 @@ Domain allowed access.
30048 </param>
30049 <infoflow type="both" weight="10"/>
30050 </interface>
30051 -<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="58236">
30052 +<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="58359">
30053 <summary>
30054 Do not audit attempts to send and receive oracledb_server packets.
30055 </summary>
30056 @@ -46434,7 +46251,7 @@ Domain to not audit.
30057 </param>
30058 <infoflow type="none"/>
30059 </interface>
30060 -<interface name="corenet_relabelto_oracledb_server_packets" lineno="58251">
30061 +<interface name="corenet_relabelto_oracledb_server_packets" lineno="58374">
30062 <summary>
30063 Relabel packets to oracledb_server the packet type.
30064 </summary>
30065 @@ -46444,7 +46261,7 @@ Domain allowed access.
30066 </summary>
30067 </param>
30068 </interface>
30069 -<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="58273">
30070 +<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="58396">
30071 <summary>
30072 Send and receive TCP traffic on the ocsp port.
30073 </summary>
30074 @@ -46455,7 +46272,7 @@ Domain allowed access.
30075 </param>
30076 <infoflow type="both" weight="10"/>
30077 </interface>
30078 -<interface name="corenet_udp_send_ocsp_port" lineno="58288">
30079 +<interface name="corenet_udp_send_ocsp_port" lineno="58411">
30080 <summary>
30081 Send UDP traffic on the ocsp port.
30082 </summary>
30083 @@ -46466,7 +46283,7 @@ Domain allowed access.
30084 </param>
30085 <infoflow type="write" weight="10"/>
30086 </interface>
30087 -<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="58303">
30088 +<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="58426">
30089 <summary>
30090 Do not audit attempts to send UDP traffic on the ocsp port.
30091 </summary>
30092 @@ -46477,7 +46294,7 @@ Domain to not audit.
30093 </param>
30094 <infoflow type="none"/>
30095 </interface>
30096 -<interface name="corenet_udp_receive_ocsp_port" lineno="58318">
30097 +<interface name="corenet_udp_receive_ocsp_port" lineno="58441">
30098 <summary>
30099 Receive UDP traffic on the ocsp port.
30100 </summary>
30101 @@ -46488,7 +46305,7 @@ Domain allowed access.
30102 </param>
30103 <infoflow type="read" weight="10"/>
30104 </interface>
30105 -<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="58333">
30106 +<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="58456">
30107 <summary>
30108 Do not audit attempts to receive UDP traffic on the ocsp port.
30109 </summary>
30110 @@ -46499,7 +46316,7 @@ Domain to not audit.
30111 </param>
30112 <infoflow type="none"/>
30113 </interface>
30114 -<interface name="corenet_udp_sendrecv_ocsp_port" lineno="58348">
30115 +<interface name="corenet_udp_sendrecv_ocsp_port" lineno="58471">
30116 <summary>
30117 Send and receive UDP traffic on the ocsp port.
30118 </summary>
30119 @@ -46510,7 +46327,7 @@ Domain allowed access.
30120 </param>
30121 <infoflow type="both" weight="10"/>
30122 </interface>
30123 -<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="58364">
30124 +<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="58487">
30125 <summary>
30126 Do not audit attempts to send and receive
30127 UDP traffic on the ocsp port.
30128 @@ -46522,7 +46339,7 @@ Domain to not audit.
30129 </param>
30130 <infoflow type="none"/>
30131 </interface>
30132 -<interface name="corenet_tcp_bind_ocsp_port" lineno="58379">
30133 +<interface name="corenet_tcp_bind_ocsp_port" lineno="58502">
30134 <summary>
30135 Bind TCP sockets to the ocsp port.
30136 </summary>
30137 @@ -46533,7 +46350,7 @@ Domain allowed access.
30138 </param>
30139 <infoflow type="none"/>
30140 </interface>
30141 -<interface name="corenet_udp_bind_ocsp_port" lineno="58399">
30142 +<interface name="corenet_udp_bind_ocsp_port" lineno="58522">
30143 <summary>
30144 Bind UDP sockets to the ocsp port.
30145 </summary>
30146 @@ -46544,7 +46361,7 @@ Domain allowed access.
30147 </param>
30148 <infoflow type="none"/>
30149 </interface>
30150 -<interface name="corenet_tcp_connect_ocsp_port" lineno="58418">
30151 +<interface name="corenet_tcp_connect_ocsp_port" lineno="58541">
30152 <summary>
30153 Make a TCP connection to the ocsp port.
30154 </summary>
30155 @@ -46554,7 +46371,7 @@ Domain allowed access.
30156 </summary>
30157 </param>
30158 </interface>
30159 -<interface name="corenet_send_ocsp_client_packets" lineno="58438">
30160 +<interface name="corenet_send_ocsp_client_packets" lineno="58561">
30161 <summary>
30162 Send ocsp_client packets.
30163 </summary>
30164 @@ -46565,7 +46382,7 @@ Domain allowed access.
30165 </param>
30166 <infoflow type="write" weight="10"/>
30167 </interface>
30168 -<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="58457">
30169 +<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="58580">
30170 <summary>
30171 Do not audit attempts to send ocsp_client packets.
30172 </summary>
30173 @@ -46576,7 +46393,7 @@ Domain to not audit.
30174 </param>
30175 <infoflow type="none"/>
30176 </interface>
30177 -<interface name="corenet_receive_ocsp_client_packets" lineno="58476">
30178 +<interface name="corenet_receive_ocsp_client_packets" lineno="58599">
30179 <summary>
30180 Receive ocsp_client packets.
30181 </summary>
30182 @@ -46587,7 +46404,7 @@ Domain allowed access.
30183 </param>
30184 <infoflow type="read" weight="10"/>
30185 </interface>
30186 -<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="58495">
30187 +<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="58618">
30188 <summary>
30189 Do not audit attempts to receive ocsp_client packets.
30190 </summary>
30191 @@ -46598,7 +46415,7 @@ Domain allowed access.
30192 </param>
30193 <infoflow type="none"/>
30194 </interface>
30195 -<interface name="corenet_sendrecv_ocsp_client_packets" lineno="58514">
30196 +<interface name="corenet_sendrecv_ocsp_client_packets" lineno="58637">
30197 <summary>
30198 Send and receive ocsp_client packets.
30199 </summary>
30200 @@ -46609,7 +46426,7 @@ Domain allowed access.
30201 </param>
30202 <infoflow type="both" weight="10"/>
30203 </interface>
30204 -<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="58530">
30205 +<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="58653">
30206 <summary>
30207 Do not audit attempts to send and receive ocsp_client packets.
30208 </summary>
30209 @@ -46620,7 +46437,7 @@ Domain to not audit.
30210 </param>
30211 <infoflow type="none"/>
30212 </interface>
30213 -<interface name="corenet_relabelto_ocsp_client_packets" lineno="58545">
30214 +<interface name="corenet_relabelto_ocsp_client_packets" lineno="58668">
30215 <summary>
30216 Relabel packets to ocsp_client the packet type.
30217 </summary>
30218 @@ -46630,7 +46447,7 @@ Domain allowed access.
30219 </summary>
30220 </param>
30221 </interface>
30222 -<interface name="corenet_send_ocsp_server_packets" lineno="58565">
30223 +<interface name="corenet_send_ocsp_server_packets" lineno="58688">
30224 <summary>
30225 Send ocsp_server packets.
30226 </summary>
30227 @@ -46641,7 +46458,7 @@ Domain allowed access.
30228 </param>
30229 <infoflow type="write" weight="10"/>
30230 </interface>
30231 -<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="58584">
30232 +<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="58707">
30233 <summary>
30234 Do not audit attempts to send ocsp_server packets.
30235 </summary>
30236 @@ -46652,7 +46469,7 @@ Domain to not audit.
30237 </param>
30238 <infoflow type="none"/>
30239 </interface>
30240 -<interface name="corenet_receive_ocsp_server_packets" lineno="58603">
30241 +<interface name="corenet_receive_ocsp_server_packets" lineno="58726">
30242 <summary>
30243 Receive ocsp_server packets.
30244 </summary>
30245 @@ -46663,7 +46480,7 @@ Domain allowed access.
30246 </param>
30247 <infoflow type="read" weight="10"/>
30248 </interface>
30249 -<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="58622">
30250 +<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="58745">
30251 <summary>
30252 Do not audit attempts to receive ocsp_server packets.
30253 </summary>
30254 @@ -46674,7 +46491,7 @@ Domain allowed access.
30255 </param>
30256 <infoflow type="none"/>
30257 </interface>
30258 -<interface name="corenet_sendrecv_ocsp_server_packets" lineno="58641">
30259 +<interface name="corenet_sendrecv_ocsp_server_packets" lineno="58764">
30260 <summary>
30261 Send and receive ocsp_server packets.
30262 </summary>
30263 @@ -46685,7 +46502,7 @@ Domain allowed access.
30264 </param>
30265 <infoflow type="both" weight="10"/>
30266 </interface>
30267 -<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="58657">
30268 +<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="58780">
30269 <summary>
30270 Do not audit attempts to send and receive ocsp_server packets.
30271 </summary>
30272 @@ -46696,7 +46513,7 @@ Domain to not audit.
30273 </param>
30274 <infoflow type="none"/>
30275 </interface>
30276 -<interface name="corenet_relabelto_ocsp_server_packets" lineno="58672">
30277 +<interface name="corenet_relabelto_ocsp_server_packets" lineno="58795">
30278 <summary>
30279 Relabel packets to ocsp_server the packet type.
30280 </summary>
30281 @@ -46706,7 +46523,7 @@ Domain allowed access.
30282 </summary>
30283 </param>
30284 </interface>
30285 -<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="58694">
30286 +<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="58817">
30287 <summary>
30288 Send and receive TCP traffic on the openhpid port.
30289 </summary>
30290 @@ -46717,7 +46534,7 @@ Domain allowed access.
30291 </param>
30292 <infoflow type="both" weight="10"/>
30293 </interface>
30294 -<interface name="corenet_udp_send_openhpid_port" lineno="58709">
30295 +<interface name="corenet_udp_send_openhpid_port" lineno="58832">
30296 <summary>
30297 Send UDP traffic on the openhpid port.
30298 </summary>
30299 @@ -46728,7 +46545,7 @@ Domain allowed access.
30300 </param>
30301 <infoflow type="write" weight="10"/>
30302 </interface>
30303 -<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="58724">
30304 +<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="58847">
30305 <summary>
30306 Do not audit attempts to send UDP traffic on the openhpid port.
30307 </summary>
30308 @@ -46739,7 +46556,7 @@ Domain to not audit.
30309 </param>
30310 <infoflow type="none"/>
30311 </interface>
30312 -<interface name="corenet_udp_receive_openhpid_port" lineno="58739">
30313 +<interface name="corenet_udp_receive_openhpid_port" lineno="58862">
30314 <summary>
30315 Receive UDP traffic on the openhpid port.
30316 </summary>
30317 @@ -46750,7 +46567,7 @@ Domain allowed access.
30318 </param>
30319 <infoflow type="read" weight="10"/>
30320 </interface>
30321 -<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="58754">
30322 +<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="58877">
30323 <summary>
30324 Do not audit attempts to receive UDP traffic on the openhpid port.
30325 </summary>
30326 @@ -46761,7 +46578,7 @@ Domain to not audit.
30327 </param>
30328 <infoflow type="none"/>
30329 </interface>
30330 -<interface name="corenet_udp_sendrecv_openhpid_port" lineno="58769">
30331 +<interface name="corenet_udp_sendrecv_openhpid_port" lineno="58892">
30332 <summary>
30333 Send and receive UDP traffic on the openhpid port.
30334 </summary>
30335 @@ -46772,7 +46589,7 @@ Domain allowed access.
30336 </param>
30337 <infoflow type="both" weight="10"/>
30338 </interface>
30339 -<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="58785">
30340 +<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="58908">
30341 <summary>
30342 Do not audit attempts to send and receive
30343 UDP traffic on the openhpid port.
30344 @@ -46784,7 +46601,7 @@ Domain to not audit.
30345 </param>
30346 <infoflow type="none"/>
30347 </interface>
30348 -<interface name="corenet_tcp_bind_openhpid_port" lineno="58800">
30349 +<interface name="corenet_tcp_bind_openhpid_port" lineno="58923">
30350 <summary>
30351 Bind TCP sockets to the openhpid port.
30352 </summary>
30353 @@ -46795,7 +46612,7 @@ Domain allowed access.
30354 </param>
30355 <infoflow type="none"/>
30356 </interface>
30357 -<interface name="corenet_udp_bind_openhpid_port" lineno="58820">
30358 +<interface name="corenet_udp_bind_openhpid_port" lineno="58943">
30359 <summary>
30360 Bind UDP sockets to the openhpid port.
30361 </summary>
30362 @@ -46806,7 +46623,7 @@ Domain allowed access.
30363 </param>
30364 <infoflow type="none"/>
30365 </interface>
30366 -<interface name="corenet_tcp_connect_openhpid_port" lineno="58839">
30367 +<interface name="corenet_tcp_connect_openhpid_port" lineno="58962">
30368 <summary>
30369 Make a TCP connection to the openhpid port.
30370 </summary>
30371 @@ -46816,7 +46633,7 @@ Domain allowed access.
30372 </summary>
30373 </param>
30374 </interface>
30375 -<interface name="corenet_send_openhpid_client_packets" lineno="58859">
30376 +<interface name="corenet_send_openhpid_client_packets" lineno="58982">
30377 <summary>
30378 Send openhpid_client packets.
30379 </summary>
30380 @@ -46827,7 +46644,7 @@ Domain allowed access.
30381 </param>
30382 <infoflow type="write" weight="10"/>
30383 </interface>
30384 -<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="58878">
30385 +<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="59001">
30386 <summary>
30387 Do not audit attempts to send openhpid_client packets.
30388 </summary>
30389 @@ -46838,7 +46655,7 @@ Domain to not audit.
30390 </param>
30391 <infoflow type="none"/>
30392 </interface>
30393 -<interface name="corenet_receive_openhpid_client_packets" lineno="58897">
30394 +<interface name="corenet_receive_openhpid_client_packets" lineno="59020">
30395 <summary>
30396 Receive openhpid_client packets.
30397 </summary>
30398 @@ -46849,7 +46666,7 @@ Domain allowed access.
30399 </param>
30400 <infoflow type="read" weight="10"/>
30401 </interface>
30402 -<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="58916">
30403 +<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="59039">
30404 <summary>
30405 Do not audit attempts to receive openhpid_client packets.
30406 </summary>
30407 @@ -46860,7 +46677,7 @@ Domain allowed access.
30408 </param>
30409 <infoflow type="none"/>
30410 </interface>
30411 -<interface name="corenet_sendrecv_openhpid_client_packets" lineno="58935">
30412 +<interface name="corenet_sendrecv_openhpid_client_packets" lineno="59058">
30413 <summary>
30414 Send and receive openhpid_client packets.
30415 </summary>
30416 @@ -46871,7 +46688,7 @@ Domain allowed access.
30417 </param>
30418 <infoflow type="both" weight="10"/>
30419 </interface>
30420 -<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="58951">
30421 +<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="59074">
30422 <summary>
30423 Do not audit attempts to send and receive openhpid_client packets.
30424 </summary>
30425 @@ -46882,7 +46699,7 @@ Domain to not audit.
30426 </param>
30427 <infoflow type="none"/>
30428 </interface>
30429 -<interface name="corenet_relabelto_openhpid_client_packets" lineno="58966">
30430 +<interface name="corenet_relabelto_openhpid_client_packets" lineno="59089">
30431 <summary>
30432 Relabel packets to openhpid_client the packet type.
30433 </summary>
30434 @@ -46892,7 +46709,7 @@ Domain allowed access.
30435 </summary>
30436 </param>
30437 </interface>
30438 -<interface name="corenet_send_openhpid_server_packets" lineno="58986">
30439 +<interface name="corenet_send_openhpid_server_packets" lineno="59109">
30440 <summary>
30441 Send openhpid_server packets.
30442 </summary>
30443 @@ -46903,7 +46720,7 @@ Domain allowed access.
30444 </param>
30445 <infoflow type="write" weight="10"/>
30446 </interface>
30447 -<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="59005">
30448 +<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="59128">
30449 <summary>
30450 Do not audit attempts to send openhpid_server packets.
30451 </summary>
30452 @@ -46914,7 +46731,7 @@ Domain to not audit.
30453 </param>
30454 <infoflow type="none"/>
30455 </interface>
30456 -<interface name="corenet_receive_openhpid_server_packets" lineno="59024">
30457 +<interface name="corenet_receive_openhpid_server_packets" lineno="59147">
30458 <summary>
30459 Receive openhpid_server packets.
30460 </summary>
30461 @@ -46925,7 +46742,7 @@ Domain allowed access.
30462 </param>
30463 <infoflow type="read" weight="10"/>
30464 </interface>
30465 -<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="59043">
30466 +<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="59166">
30467 <summary>
30468 Do not audit attempts to receive openhpid_server packets.
30469 </summary>
30470 @@ -46936,7 +46753,7 @@ Domain allowed access.
30471 </param>
30472 <infoflow type="none"/>
30473 </interface>
30474 -<interface name="corenet_sendrecv_openhpid_server_packets" lineno="59062">
30475 +<interface name="corenet_sendrecv_openhpid_server_packets" lineno="59185">
30476 <summary>
30477 Send and receive openhpid_server packets.
30478 </summary>
30479 @@ -46947,7 +46764,7 @@ Domain allowed access.
30480 </param>
30481 <infoflow type="both" weight="10"/>
30482 </interface>
30483 -<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="59078">
30484 +<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="59201">
30485 <summary>
30486 Do not audit attempts to send and receive openhpid_server packets.
30487 </summary>
30488 @@ -46958,7 +46775,7 @@ Domain to not audit.
30489 </param>
30490 <infoflow type="none"/>
30491 </interface>
30492 -<interface name="corenet_relabelto_openhpid_server_packets" lineno="59093">
30493 +<interface name="corenet_relabelto_openhpid_server_packets" lineno="59216">
30494 <summary>
30495 Relabel packets to openhpid_server the packet type.
30496 </summary>
30497 @@ -46968,7 +46785,7 @@ Domain allowed access.
30498 </summary>
30499 </param>
30500 </interface>
30501 -<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="59115">
30502 +<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="59238">
30503 <summary>
30504 Send and receive TCP traffic on the openvpn port.
30505 </summary>
30506 @@ -46979,7 +46796,7 @@ Domain allowed access.
30507 </param>
30508 <infoflow type="both" weight="10"/>
30509 </interface>
30510 -<interface name="corenet_udp_send_openvpn_port" lineno="59130">
30511 +<interface name="corenet_udp_send_openvpn_port" lineno="59253">
30512 <summary>
30513 Send UDP traffic on the openvpn port.
30514 </summary>
30515 @@ -46990,7 +46807,7 @@ Domain allowed access.
30516 </param>
30517 <infoflow type="write" weight="10"/>
30518 </interface>
30519 -<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="59145">
30520 +<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="59268">
30521 <summary>
30522 Do not audit attempts to send UDP traffic on the openvpn port.
30523 </summary>
30524 @@ -47001,7 +46818,7 @@ Domain to not audit.
30525 </param>
30526 <infoflow type="none"/>
30527 </interface>
30528 -<interface name="corenet_udp_receive_openvpn_port" lineno="59160">
30529 +<interface name="corenet_udp_receive_openvpn_port" lineno="59283">
30530 <summary>
30531 Receive UDP traffic on the openvpn port.
30532 </summary>
30533 @@ -47012,7 +46829,7 @@ Domain allowed access.
30534 </param>
30535 <infoflow type="read" weight="10"/>
30536 </interface>
30537 -<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="59175">
30538 +<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="59298">
30539 <summary>
30540 Do not audit attempts to receive UDP traffic on the openvpn port.
30541 </summary>
30542 @@ -47023,7 +46840,7 @@ Domain to not audit.
30543 </param>
30544 <infoflow type="none"/>
30545 </interface>
30546 -<interface name="corenet_udp_sendrecv_openvpn_port" lineno="59190">
30547 +<interface name="corenet_udp_sendrecv_openvpn_port" lineno="59313">
30548 <summary>
30549 Send and receive UDP traffic on the openvpn port.
30550 </summary>
30551 @@ -47034,7 +46851,7 @@ Domain allowed access.
30552 </param>
30553 <infoflow type="both" weight="10"/>
30554 </interface>
30555 -<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="59206">
30556 +<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="59329">
30557 <summary>
30558 Do not audit attempts to send and receive
30559 UDP traffic on the openvpn port.
30560 @@ -47046,7 +46863,7 @@ Domain to not audit.
30561 </param>
30562 <infoflow type="none"/>
30563 </interface>
30564 -<interface name="corenet_tcp_bind_openvpn_port" lineno="59221">
30565 +<interface name="corenet_tcp_bind_openvpn_port" lineno="59344">
30566 <summary>
30567 Bind TCP sockets to the openvpn port.
30568 </summary>
30569 @@ -47057,7 +46874,7 @@ Domain allowed access.
30570 </param>
30571 <infoflow type="none"/>
30572 </interface>
30573 -<interface name="corenet_udp_bind_openvpn_port" lineno="59241">
30574 +<interface name="corenet_udp_bind_openvpn_port" lineno="59364">
30575 <summary>
30576 Bind UDP sockets to the openvpn port.
30577 </summary>
30578 @@ -47068,7 +46885,7 @@ Domain allowed access.
30579 </param>
30580 <infoflow type="none"/>
30581 </interface>
30582 -<interface name="corenet_tcp_connect_openvpn_port" lineno="59260">
30583 +<interface name="corenet_tcp_connect_openvpn_port" lineno="59383">
30584 <summary>
30585 Make a TCP connection to the openvpn port.
30586 </summary>
30587 @@ -47078,7 +46895,7 @@ Domain allowed access.
30588 </summary>
30589 </param>
30590 </interface>
30591 -<interface name="corenet_send_openvpn_client_packets" lineno="59280">
30592 +<interface name="corenet_send_openvpn_client_packets" lineno="59403">
30593 <summary>
30594 Send openvpn_client packets.
30595 </summary>
30596 @@ -47089,7 +46906,7 @@ Domain allowed access.
30597 </param>
30598 <infoflow type="write" weight="10"/>
30599 </interface>
30600 -<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="59299">
30601 +<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="59422">
30602 <summary>
30603 Do not audit attempts to send openvpn_client packets.
30604 </summary>
30605 @@ -47100,7 +46917,7 @@ Domain to not audit.
30606 </param>
30607 <infoflow type="none"/>
30608 </interface>
30609 -<interface name="corenet_receive_openvpn_client_packets" lineno="59318">
30610 +<interface name="corenet_receive_openvpn_client_packets" lineno="59441">
30611 <summary>
30612 Receive openvpn_client packets.
30613 </summary>
30614 @@ -47111,7 +46928,7 @@ Domain allowed access.
30615 </param>
30616 <infoflow type="read" weight="10"/>
30617 </interface>
30618 -<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="59337">
30619 +<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="59460">
30620 <summary>
30621 Do not audit attempts to receive openvpn_client packets.
30622 </summary>
30623 @@ -47122,7 +46939,7 @@ Domain allowed access.
30624 </param>
30625 <infoflow type="none"/>
30626 </interface>
30627 -<interface name="corenet_sendrecv_openvpn_client_packets" lineno="59356">
30628 +<interface name="corenet_sendrecv_openvpn_client_packets" lineno="59479">
30629 <summary>
30630 Send and receive openvpn_client packets.
30631 </summary>
30632 @@ -47133,7 +46950,7 @@ Domain allowed access.
30633 </param>
30634 <infoflow type="both" weight="10"/>
30635 </interface>
30636 -<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="59372">
30637 +<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="59495">
30638 <summary>
30639 Do not audit attempts to send and receive openvpn_client packets.
30640 </summary>
30641 @@ -47144,7 +46961,7 @@ Domain to not audit.
30642 </param>
30643 <infoflow type="none"/>
30644 </interface>
30645 -<interface name="corenet_relabelto_openvpn_client_packets" lineno="59387">
30646 +<interface name="corenet_relabelto_openvpn_client_packets" lineno="59510">
30647 <summary>
30648 Relabel packets to openvpn_client the packet type.
30649 </summary>
30650 @@ -47154,7 +46971,7 @@ Domain allowed access.
30651 </summary>
30652 </param>
30653 </interface>
30654 -<interface name="corenet_send_openvpn_server_packets" lineno="59407">
30655 +<interface name="corenet_send_openvpn_server_packets" lineno="59530">
30656 <summary>
30657 Send openvpn_server packets.
30658 </summary>
30659 @@ -47165,7 +46982,7 @@ Domain allowed access.
30660 </param>
30661 <infoflow type="write" weight="10"/>
30662 </interface>
30663 -<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="59426">
30664 +<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="59549">
30665 <summary>
30666 Do not audit attempts to send openvpn_server packets.
30667 </summary>
30668 @@ -47176,7 +46993,7 @@ Domain to not audit.
30669 </param>
30670 <infoflow type="none"/>
30671 </interface>
30672 -<interface name="corenet_receive_openvpn_server_packets" lineno="59445">
30673 +<interface name="corenet_receive_openvpn_server_packets" lineno="59568">
30674 <summary>
30675 Receive openvpn_server packets.
30676 </summary>
30677 @@ -47187,7 +47004,7 @@ Domain allowed access.
30678 </param>
30679 <infoflow type="read" weight="10"/>
30680 </interface>
30681 -<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="59464">
30682 +<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="59587">
30683 <summary>
30684 Do not audit attempts to receive openvpn_server packets.
30685 </summary>
30686 @@ -47198,7 +47015,7 @@ Domain allowed access.
30687 </param>
30688 <infoflow type="none"/>
30689 </interface>
30690 -<interface name="corenet_sendrecv_openvpn_server_packets" lineno="59483">
30691 +<interface name="corenet_sendrecv_openvpn_server_packets" lineno="59606">
30692 <summary>
30693 Send and receive openvpn_server packets.
30694 </summary>
30695 @@ -47209,7 +47026,7 @@ Domain allowed access.
30696 </param>
30697 <infoflow type="both" weight="10"/>
30698 </interface>
30699 -<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="59499">
30700 +<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="59622">
30701 <summary>
30702 Do not audit attempts to send and receive openvpn_server packets.
30703 </summary>
30704 @@ -47220,7 +47037,7 @@ Domain to not audit.
30705 </param>
30706 <infoflow type="none"/>
30707 </interface>
30708 -<interface name="corenet_relabelto_openvpn_server_packets" lineno="59514">
30709 +<interface name="corenet_relabelto_openvpn_server_packets" lineno="59637">
30710 <summary>
30711 Relabel packets to openvpn_server the packet type.
30712 </summary>
30713 @@ -47230,7 +47047,7 @@ Domain allowed access.
30714 </summary>
30715 </param>
30716 </interface>
30717 -<interface name="corenet_tcp_sendrecv_pdps_port" lineno="59536">
30718 +<interface name="corenet_tcp_sendrecv_pdps_port" lineno="59659">
30719 <summary>
30720 Send and receive TCP traffic on the pdps port.
30721 </summary>
30722 @@ -47241,7 +47058,7 @@ Domain allowed access.
30723 </param>
30724 <infoflow type="both" weight="10"/>
30725 </interface>
30726 -<interface name="corenet_udp_send_pdps_port" lineno="59551">
30727 +<interface name="corenet_udp_send_pdps_port" lineno="59674">
30728 <summary>
30729 Send UDP traffic on the pdps port.
30730 </summary>
30731 @@ -47252,7 +47069,7 @@ Domain allowed access.
30732 </param>
30733 <infoflow type="write" weight="10"/>
30734 </interface>
30735 -<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="59566">
30736 +<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="59689">
30737 <summary>
30738 Do not audit attempts to send UDP traffic on the pdps port.
30739 </summary>
30740 @@ -47263,7 +47080,7 @@ Domain to not audit.
30741 </param>
30742 <infoflow type="none"/>
30743 </interface>
30744 -<interface name="corenet_udp_receive_pdps_port" lineno="59581">
30745 +<interface name="corenet_udp_receive_pdps_port" lineno="59704">
30746 <summary>
30747 Receive UDP traffic on the pdps port.
30748 </summary>
30749 @@ -47274,7 +47091,7 @@ Domain allowed access.
30750 </param>
30751 <infoflow type="read" weight="10"/>
30752 </interface>
30753 -<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="59596">
30754 +<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="59719">
30755 <summary>
30756 Do not audit attempts to receive UDP traffic on the pdps port.
30757 </summary>
30758 @@ -47285,7 +47102,7 @@ Domain to not audit.
30759 </param>
30760 <infoflow type="none"/>
30761 </interface>
30762 -<interface name="corenet_udp_sendrecv_pdps_port" lineno="59611">
30763 +<interface name="corenet_udp_sendrecv_pdps_port" lineno="59734">
30764 <summary>
30765 Send and receive UDP traffic on the pdps port.
30766 </summary>
30767 @@ -47296,7 +47113,7 @@ Domain allowed access.
30768 </param>
30769 <infoflow type="both" weight="10"/>
30770 </interface>
30771 -<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="59627">
30772 +<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="59750">
30773 <summary>
30774 Do not audit attempts to send and receive
30775 UDP traffic on the pdps port.
30776 @@ -47308,7 +47125,7 @@ Domain to not audit.
30777 </param>
30778 <infoflow type="none"/>
30779 </interface>
30780 -<interface name="corenet_tcp_bind_pdps_port" lineno="59642">
30781 +<interface name="corenet_tcp_bind_pdps_port" lineno="59765">
30782 <summary>
30783 Bind TCP sockets to the pdps port.
30784 </summary>
30785 @@ -47319,7 +47136,7 @@ Domain allowed access.
30786 </param>
30787 <infoflow type="none"/>
30788 </interface>
30789 -<interface name="corenet_udp_bind_pdps_port" lineno="59662">
30790 +<interface name="corenet_udp_bind_pdps_port" lineno="59785">
30791 <summary>
30792 Bind UDP sockets to the pdps port.
30793 </summary>
30794 @@ -47330,7 +47147,7 @@ Domain allowed access.
30795 </param>
30796 <infoflow type="none"/>
30797 </interface>
30798 -<interface name="corenet_tcp_connect_pdps_port" lineno="59681">
30799 +<interface name="corenet_tcp_connect_pdps_port" lineno="59804">
30800 <summary>
30801 Make a TCP connection to the pdps port.
30802 </summary>
30803 @@ -47340,7 +47157,7 @@ Domain allowed access.
30804 </summary>
30805 </param>
30806 </interface>
30807 -<interface name="corenet_send_pdps_client_packets" lineno="59701">
30808 +<interface name="corenet_send_pdps_client_packets" lineno="59824">
30809 <summary>
30810 Send pdps_client packets.
30811 </summary>
30812 @@ -47351,7 +47168,7 @@ Domain allowed access.
30813 </param>
30814 <infoflow type="write" weight="10"/>
30815 </interface>
30816 -<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="59720">
30817 +<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="59843">
30818 <summary>
30819 Do not audit attempts to send pdps_client packets.
30820 </summary>
30821 @@ -47362,7 +47179,7 @@ Domain to not audit.
30822 </param>
30823 <infoflow type="none"/>
30824 </interface>
30825 -<interface name="corenet_receive_pdps_client_packets" lineno="59739">
30826 +<interface name="corenet_receive_pdps_client_packets" lineno="59862">
30827 <summary>
30828 Receive pdps_client packets.
30829 </summary>
30830 @@ -47373,7 +47190,7 @@ Domain allowed access.
30831 </param>
30832 <infoflow type="read" weight="10"/>
30833 </interface>
30834 -<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="59758">
30835 +<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="59881">
30836 <summary>
30837 Do not audit attempts to receive pdps_client packets.
30838 </summary>
30839 @@ -47384,7 +47201,7 @@ Domain allowed access.
30840 </param>
30841 <infoflow type="none"/>
30842 </interface>
30843 -<interface name="corenet_sendrecv_pdps_client_packets" lineno="59777">
30844 +<interface name="corenet_sendrecv_pdps_client_packets" lineno="59900">
30845 <summary>
30846 Send and receive pdps_client packets.
30847 </summary>
30848 @@ -47395,7 +47212,7 @@ Domain allowed access.
30849 </param>
30850 <infoflow type="both" weight="10"/>
30851 </interface>
30852 -<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="59793">
30853 +<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="59916">
30854 <summary>
30855 Do not audit attempts to send and receive pdps_client packets.
30856 </summary>
30857 @@ -47406,7 +47223,7 @@ Domain to not audit.
30858 </param>
30859 <infoflow type="none"/>
30860 </interface>
30861 -<interface name="corenet_relabelto_pdps_client_packets" lineno="59808">
30862 +<interface name="corenet_relabelto_pdps_client_packets" lineno="59931">
30863 <summary>
30864 Relabel packets to pdps_client the packet type.
30865 </summary>
30866 @@ -47416,7 +47233,7 @@ Domain allowed access.
30867 </summary>
30868 </param>
30869 </interface>
30870 -<interface name="corenet_send_pdps_server_packets" lineno="59828">
30871 +<interface name="corenet_send_pdps_server_packets" lineno="59951">
30872 <summary>
30873 Send pdps_server packets.
30874 </summary>
30875 @@ -47427,7 +47244,7 @@ Domain allowed access.
30876 </param>
30877 <infoflow type="write" weight="10"/>
30878 </interface>
30879 -<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="59847">
30880 +<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="59970">
30881 <summary>
30882 Do not audit attempts to send pdps_server packets.
30883 </summary>
30884 @@ -47438,7 +47255,7 @@ Domain to not audit.
30885 </param>
30886 <infoflow type="none"/>
30887 </interface>
30888 -<interface name="corenet_receive_pdps_server_packets" lineno="59866">
30889 +<interface name="corenet_receive_pdps_server_packets" lineno="59989">
30890 <summary>
30891 Receive pdps_server packets.
30892 </summary>
30893 @@ -47449,7 +47266,7 @@ Domain allowed access.
30894 </param>
30895 <infoflow type="read" weight="10"/>
30896 </interface>
30897 -<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="59885">
30898 +<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="60008">
30899 <summary>
30900 Do not audit attempts to receive pdps_server packets.
30901 </summary>
30902 @@ -47460,7 +47277,7 @@ Domain allowed access.
30903 </param>
30904 <infoflow type="none"/>
30905 </interface>
30906 -<interface name="corenet_sendrecv_pdps_server_packets" lineno="59904">
30907 +<interface name="corenet_sendrecv_pdps_server_packets" lineno="60027">
30908 <summary>
30909 Send and receive pdps_server packets.
30910 </summary>
30911 @@ -47471,7 +47288,7 @@ Domain allowed access.
30912 </param>
30913 <infoflow type="both" weight="10"/>
30914 </interface>
30915 -<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="59920">
30916 +<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="60043">
30917 <summary>
30918 Do not audit attempts to send and receive pdps_server packets.
30919 </summary>
30920 @@ -47482,7 +47299,7 @@ Domain to not audit.
30921 </param>
30922 <infoflow type="none"/>
30923 </interface>
30924 -<interface name="corenet_relabelto_pdps_server_packets" lineno="59935">
30925 +<interface name="corenet_relabelto_pdps_server_packets" lineno="60058">
30926 <summary>
30927 Relabel packets to pdps_server the packet type.
30928 </summary>
30929 @@ -47492,7 +47309,7 @@ Domain allowed access.
30930 </summary>
30931 </param>
30932 </interface>
30933 -<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="59957">
30934 +<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="60080">
30935 <summary>
30936 Send and receive TCP traffic on the pegasus_http port.
30937 </summary>
30938 @@ -47503,7 +47320,7 @@ Domain allowed access.
30939 </param>
30940 <infoflow type="both" weight="10"/>
30941 </interface>
30942 -<interface name="corenet_udp_send_pegasus_http_port" lineno="59972">
30943 +<interface name="corenet_udp_send_pegasus_http_port" lineno="60095">
30944 <summary>
30945 Send UDP traffic on the pegasus_http port.
30946 </summary>
30947 @@ -47514,7 +47331,7 @@ Domain allowed access.
30948 </param>
30949 <infoflow type="write" weight="10"/>
30950 </interface>
30951 -<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="59987">
30952 +<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="60110">
30953 <summary>
30954 Do not audit attempts to send UDP traffic on the pegasus_http port.
30955 </summary>
30956 @@ -47525,7 +47342,7 @@ Domain to not audit.
30957 </param>
30958 <infoflow type="none"/>
30959 </interface>
30960 -<interface name="corenet_udp_receive_pegasus_http_port" lineno="60002">
30961 +<interface name="corenet_udp_receive_pegasus_http_port" lineno="60125">
30962 <summary>
30963 Receive UDP traffic on the pegasus_http port.
30964 </summary>
30965 @@ -47536,7 +47353,7 @@ Domain allowed access.
30966 </param>
30967 <infoflow type="read" weight="10"/>
30968 </interface>
30969 -<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="60017">
30970 +<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="60140">
30971 <summary>
30972 Do not audit attempts to receive UDP traffic on the pegasus_http port.
30973 </summary>
30974 @@ -47547,7 +47364,7 @@ Domain to not audit.
30975 </param>
30976 <infoflow type="none"/>
30977 </interface>
30978 -<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="60032">
30979 +<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="60155">
30980 <summary>
30981 Send and receive UDP traffic on the pegasus_http port.
30982 </summary>
30983 @@ -47558,7 +47375,7 @@ Domain allowed access.
30984 </param>
30985 <infoflow type="both" weight="10"/>
30986 </interface>
30987 -<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="60048">
30988 +<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="60171">
30989 <summary>
30990 Do not audit attempts to send and receive
30991 UDP traffic on the pegasus_http port.
30992 @@ -47570,7 +47387,7 @@ Domain to not audit.
30993 </param>
30994 <infoflow type="none"/>
30995 </interface>
30996 -<interface name="corenet_tcp_bind_pegasus_http_port" lineno="60063">
30997 +<interface name="corenet_tcp_bind_pegasus_http_port" lineno="60186">
30998 <summary>
30999 Bind TCP sockets to the pegasus_http port.
31000 </summary>
31001 @@ -47581,7 +47398,7 @@ Domain allowed access.
31002 </param>
31003 <infoflow type="none"/>
31004 </interface>
31005 -<interface name="corenet_udp_bind_pegasus_http_port" lineno="60083">
31006 +<interface name="corenet_udp_bind_pegasus_http_port" lineno="60206">
31007 <summary>
31008 Bind UDP sockets to the pegasus_http port.
31009 </summary>
31010 @@ -47592,7 +47409,7 @@ Domain allowed access.
31011 </param>
31012 <infoflow type="none"/>
31013 </interface>
31014 -<interface name="corenet_tcp_connect_pegasus_http_port" lineno="60102">
31015 +<interface name="corenet_tcp_connect_pegasus_http_port" lineno="60225">
31016 <summary>
31017 Make a TCP connection to the pegasus_http port.
31018 </summary>
31019 @@ -47602,7 +47419,7 @@ Domain allowed access.
31020 </summary>
31021 </param>
31022 </interface>
31023 -<interface name="corenet_send_pegasus_http_client_packets" lineno="60122">
31024 +<interface name="corenet_send_pegasus_http_client_packets" lineno="60245">
31025 <summary>
31026 Send pegasus_http_client packets.
31027 </summary>
31028 @@ -47613,7 +47430,7 @@ Domain allowed access.
31029 </param>
31030 <infoflow type="write" weight="10"/>
31031 </interface>
31032 -<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="60141">
31033 +<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="60264">
31034 <summary>
31035 Do not audit attempts to send pegasus_http_client packets.
31036 </summary>
31037 @@ -47624,7 +47441,7 @@ Domain to not audit.
31038 </param>
31039 <infoflow type="none"/>
31040 </interface>
31041 -<interface name="corenet_receive_pegasus_http_client_packets" lineno="60160">
31042 +<interface name="corenet_receive_pegasus_http_client_packets" lineno="60283">
31043 <summary>
31044 Receive pegasus_http_client packets.
31045 </summary>
31046 @@ -47635,7 +47452,7 @@ Domain allowed access.
31047 </param>
31048 <infoflow type="read" weight="10"/>
31049 </interface>
31050 -<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="60179">
31051 +<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="60302">
31052 <summary>
31053 Do not audit attempts to receive pegasus_http_client packets.
31054 </summary>
31055 @@ -47646,7 +47463,7 @@ Domain allowed access.
31056 </param>
31057 <infoflow type="none"/>
31058 </interface>
31059 -<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="60198">
31060 +<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="60321">
31061 <summary>
31062 Send and receive pegasus_http_client packets.
31063 </summary>
31064 @@ -47657,7 +47474,7 @@ Domain allowed access.
31065 </param>
31066 <infoflow type="both" weight="10"/>
31067 </interface>
31068 -<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="60214">
31069 +<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="60337">
31070 <summary>
31071 Do not audit attempts to send and receive pegasus_http_client packets.
31072 </summary>
31073 @@ -47668,7 +47485,7 @@ Domain to not audit.
31074 </param>
31075 <infoflow type="none"/>
31076 </interface>
31077 -<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="60229">
31078 +<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="60352">
31079 <summary>
31080 Relabel packets to pegasus_http_client the packet type.
31081 </summary>
31082 @@ -47678,7 +47495,7 @@ Domain allowed access.
31083 </summary>
31084 </param>
31085 </interface>
31086 -<interface name="corenet_send_pegasus_http_server_packets" lineno="60249">
31087 +<interface name="corenet_send_pegasus_http_server_packets" lineno="60372">
31088 <summary>
31089 Send pegasus_http_server packets.
31090 </summary>
31091 @@ -47689,7 +47506,7 @@ Domain allowed access.
31092 </param>
31093 <infoflow type="write" weight="10"/>
31094 </interface>
31095 -<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="60268">
31096 +<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="60391">
31097 <summary>
31098 Do not audit attempts to send pegasus_http_server packets.
31099 </summary>
31100 @@ -47700,7 +47517,7 @@ Domain to not audit.
31101 </param>
31102 <infoflow type="none"/>
31103 </interface>
31104 -<interface name="corenet_receive_pegasus_http_server_packets" lineno="60287">
31105 +<interface name="corenet_receive_pegasus_http_server_packets" lineno="60410">
31106 <summary>
31107 Receive pegasus_http_server packets.
31108 </summary>
31109 @@ -47711,7 +47528,7 @@ Domain allowed access.
31110 </param>
31111 <infoflow type="read" weight="10"/>
31112 </interface>
31113 -<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="60306">
31114 +<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="60429">
31115 <summary>
31116 Do not audit attempts to receive pegasus_http_server packets.
31117 </summary>
31118 @@ -47722,7 +47539,7 @@ Domain allowed access.
31119 </param>
31120 <infoflow type="none"/>
31121 </interface>
31122 -<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="60325">
31123 +<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="60448">
31124 <summary>
31125 Send and receive pegasus_http_server packets.
31126 </summary>
31127 @@ -47733,7 +47550,7 @@ Domain allowed access.
31128 </param>
31129 <infoflow type="both" weight="10"/>
31130 </interface>
31131 -<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="60341">
31132 +<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="60464">
31133 <summary>
31134 Do not audit attempts to send and receive pegasus_http_server packets.
31135 </summary>
31136 @@ -47744,7 +47561,7 @@ Domain to not audit.
31137 </param>
31138 <infoflow type="none"/>
31139 </interface>
31140 -<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="60356">
31141 +<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="60479">
31142 <summary>
31143 Relabel packets to pegasus_http_server the packet type.
31144 </summary>
31145 @@ -47754,7 +47571,7 @@ Domain allowed access.
31146 </summary>
31147 </param>
31148 </interface>
31149 -<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="60378">
31150 +<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="60501">
31151 <summary>
31152 Send and receive TCP traffic on the pegasus_https port.
31153 </summary>
31154 @@ -47765,7 +47582,7 @@ Domain allowed access.
31155 </param>
31156 <infoflow type="both" weight="10"/>
31157 </interface>
31158 -<interface name="corenet_udp_send_pegasus_https_port" lineno="60393">
31159 +<interface name="corenet_udp_send_pegasus_https_port" lineno="60516">
31160 <summary>
31161 Send UDP traffic on the pegasus_https port.
31162 </summary>
31163 @@ -47776,7 +47593,7 @@ Domain allowed access.
31164 </param>
31165 <infoflow type="write" weight="10"/>
31166 </interface>
31167 -<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="60408">
31168 +<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="60531">
31169 <summary>
31170 Do not audit attempts to send UDP traffic on the pegasus_https port.
31171 </summary>
31172 @@ -47787,7 +47604,7 @@ Domain to not audit.
31173 </param>
31174 <infoflow type="none"/>
31175 </interface>
31176 -<interface name="corenet_udp_receive_pegasus_https_port" lineno="60423">
31177 +<interface name="corenet_udp_receive_pegasus_https_port" lineno="60546">
31178 <summary>
31179 Receive UDP traffic on the pegasus_https port.
31180 </summary>
31181 @@ -47798,7 +47615,7 @@ Domain allowed access.
31182 </param>
31183 <infoflow type="read" weight="10"/>
31184 </interface>
31185 -<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="60438">
31186 +<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="60561">
31187 <summary>
31188 Do not audit attempts to receive UDP traffic on the pegasus_https port.
31189 </summary>
31190 @@ -47809,7 +47626,7 @@ Domain to not audit.
31191 </param>
31192 <infoflow type="none"/>
31193 </interface>
31194 -<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="60453">
31195 +<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="60576">
31196 <summary>
31197 Send and receive UDP traffic on the pegasus_https port.
31198 </summary>
31199 @@ -47820,7 +47637,7 @@ Domain allowed access.
31200 </param>
31201 <infoflow type="both" weight="10"/>
31202 </interface>
31203 -<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="60469">
31204 +<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="60592">
31205 <summary>
31206 Do not audit attempts to send and receive
31207 UDP traffic on the pegasus_https port.
31208 @@ -47832,7 +47649,7 @@ Domain to not audit.
31209 </param>
31210 <infoflow type="none"/>
31211 </interface>
31212 -<interface name="corenet_tcp_bind_pegasus_https_port" lineno="60484">
31213 +<interface name="corenet_tcp_bind_pegasus_https_port" lineno="60607">
31214 <summary>
31215 Bind TCP sockets to the pegasus_https port.
31216 </summary>
31217 @@ -47843,7 +47660,7 @@ Domain allowed access.
31218 </param>
31219 <infoflow type="none"/>
31220 </interface>
31221 -<interface name="corenet_udp_bind_pegasus_https_port" lineno="60504">
31222 +<interface name="corenet_udp_bind_pegasus_https_port" lineno="60627">
31223 <summary>
31224 Bind UDP sockets to the pegasus_https port.
31225 </summary>
31226 @@ -47854,7 +47671,7 @@ Domain allowed access.
31227 </param>
31228 <infoflow type="none"/>
31229 </interface>
31230 -<interface name="corenet_tcp_connect_pegasus_https_port" lineno="60523">
31231 +<interface name="corenet_tcp_connect_pegasus_https_port" lineno="60646">
31232 <summary>
31233 Make a TCP connection to the pegasus_https port.
31234 </summary>
31235 @@ -47864,7 +47681,7 @@ Domain allowed access.
31236 </summary>
31237 </param>
31238 </interface>
31239 -<interface name="corenet_send_pegasus_https_client_packets" lineno="60543">
31240 +<interface name="corenet_send_pegasus_https_client_packets" lineno="60666">
31241 <summary>
31242 Send pegasus_https_client packets.
31243 </summary>
31244 @@ -47875,7 +47692,7 @@ Domain allowed access.
31245 </param>
31246 <infoflow type="write" weight="10"/>
31247 </interface>
31248 -<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="60562">
31249 +<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="60685">
31250 <summary>
31251 Do not audit attempts to send pegasus_https_client packets.
31252 </summary>
31253 @@ -47886,7 +47703,7 @@ Domain to not audit.
31254 </param>
31255 <infoflow type="none"/>
31256 </interface>
31257 -<interface name="corenet_receive_pegasus_https_client_packets" lineno="60581">
31258 +<interface name="corenet_receive_pegasus_https_client_packets" lineno="60704">
31259 <summary>
31260 Receive pegasus_https_client packets.
31261 </summary>
31262 @@ -47897,7 +47714,7 @@ Domain allowed access.
31263 </param>
31264 <infoflow type="read" weight="10"/>
31265 </interface>
31266 -<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="60600">
31267 +<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="60723">
31268 <summary>
31269 Do not audit attempts to receive pegasus_https_client packets.
31270 </summary>
31271 @@ -47908,7 +47725,7 @@ Domain allowed access.
31272 </param>
31273 <infoflow type="none"/>
31274 </interface>
31275 -<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="60619">
31276 +<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="60742">
31277 <summary>
31278 Send and receive pegasus_https_client packets.
31279 </summary>
31280 @@ -47919,7 +47736,7 @@ Domain allowed access.
31281 </param>
31282 <infoflow type="both" weight="10"/>
31283 </interface>
31284 -<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="60635">
31285 +<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="60758">
31286 <summary>
31287 Do not audit attempts to send and receive pegasus_https_client packets.
31288 </summary>
31289 @@ -47930,7 +47747,7 @@ Domain to not audit.
31290 </param>
31291 <infoflow type="none"/>
31292 </interface>
31293 -<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="60650">
31294 +<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="60773">
31295 <summary>
31296 Relabel packets to pegasus_https_client the packet type.
31297 </summary>
31298 @@ -47940,7 +47757,7 @@ Domain allowed access.
31299 </summary>
31300 </param>
31301 </interface>
31302 -<interface name="corenet_send_pegasus_https_server_packets" lineno="60670">
31303 +<interface name="corenet_send_pegasus_https_server_packets" lineno="60793">
31304 <summary>
31305 Send pegasus_https_server packets.
31306 </summary>
31307 @@ -47951,7 +47768,7 @@ Domain allowed access.
31308 </param>
31309 <infoflow type="write" weight="10"/>
31310 </interface>
31311 -<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="60689">
31312 +<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="60812">
31313 <summary>
31314 Do not audit attempts to send pegasus_https_server packets.
31315 </summary>
31316 @@ -47962,7 +47779,7 @@ Domain to not audit.
31317 </param>
31318 <infoflow type="none"/>
31319 </interface>
31320 -<interface name="corenet_receive_pegasus_https_server_packets" lineno="60708">
31321 +<interface name="corenet_receive_pegasus_https_server_packets" lineno="60831">
31322 <summary>
31323 Receive pegasus_https_server packets.
31324 </summary>
31325 @@ -47973,7 +47790,7 @@ Domain allowed access.
31326 </param>
31327 <infoflow type="read" weight="10"/>
31328 </interface>
31329 -<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="60727">
31330 +<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="60850">
31331 <summary>
31332 Do not audit attempts to receive pegasus_https_server packets.
31333 </summary>
31334 @@ -47984,7 +47801,7 @@ Domain allowed access.
31335 </param>
31336 <infoflow type="none"/>
31337 </interface>
31338 -<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="60746">
31339 +<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="60869">
31340 <summary>
31341 Send and receive pegasus_https_server packets.
31342 </summary>
31343 @@ -47995,7 +47812,7 @@ Domain allowed access.
31344 </param>
31345 <infoflow type="both" weight="10"/>
31346 </interface>
31347 -<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="60762">
31348 +<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="60885">
31349 <summary>
31350 Do not audit attempts to send and receive pegasus_https_server packets.
31351 </summary>
31352 @@ -48006,7 +47823,7 @@ Domain to not audit.
31353 </param>
31354 <infoflow type="none"/>
31355 </interface>
31356 -<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="60777">
31357 +<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="60900">
31358 <summary>
31359 Relabel packets to pegasus_https_server the packet type.
31360 </summary>
31361 @@ -48016,7 +47833,7 @@ Domain allowed access.
31362 </summary>
31363 </param>
31364 </interface>
31365 -<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="60799">
31366 +<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="60922">
31367 <summary>
31368 Send and receive TCP traffic on the pgpkeyserver port.
31369 </summary>
31370 @@ -48027,7 +47844,7 @@ Domain allowed access.
31371 </param>
31372 <infoflow type="both" weight="10"/>
31373 </interface>
31374 -<interface name="corenet_udp_send_pgpkeyserver_port" lineno="60814">
31375 +<interface name="corenet_udp_send_pgpkeyserver_port" lineno="60937">
31376 <summary>
31377 Send UDP traffic on the pgpkeyserver port.
31378 </summary>
31379 @@ -48038,7 +47855,7 @@ Domain allowed access.
31380 </param>
31381 <infoflow type="write" weight="10"/>
31382 </interface>
31383 -<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="60829">
31384 +<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="60952">
31385 <summary>
31386 Do not audit attempts to send UDP traffic on the pgpkeyserver port.
31387 </summary>
31388 @@ -48049,7 +47866,7 @@ Domain to not audit.
31389 </param>
31390 <infoflow type="none"/>
31391 </interface>
31392 -<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="60844">
31393 +<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="60967">
31394 <summary>
31395 Receive UDP traffic on the pgpkeyserver port.
31396 </summary>
31397 @@ -48060,7 +47877,7 @@ Domain allowed access.
31398 </param>
31399 <infoflow type="read" weight="10"/>
31400 </interface>
31401 -<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="60859">
31402 +<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="60982">
31403 <summary>
31404 Do not audit attempts to receive UDP traffic on the pgpkeyserver port.
31405 </summary>
31406 @@ -48071,7 +47888,7 @@ Domain to not audit.
31407 </param>
31408 <infoflow type="none"/>
31409 </interface>
31410 -<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="60874">
31411 +<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="60997">
31412 <summary>
31413 Send and receive UDP traffic on the pgpkeyserver port.
31414 </summary>
31415 @@ -48082,7 +47899,7 @@ Domain allowed access.
31416 </param>
31417 <infoflow type="both" weight="10"/>
31418 </interface>
31419 -<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="60890">
31420 +<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="61013">
31421 <summary>
31422 Do not audit attempts to send and receive
31423 UDP traffic on the pgpkeyserver port.
31424 @@ -48094,7 +47911,7 @@ Domain to not audit.
31425 </param>
31426 <infoflow type="none"/>
31427 </interface>
31428 -<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="60905">
31429 +<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="61028">
31430 <summary>
31431 Bind TCP sockets to the pgpkeyserver port.
31432 </summary>
31433 @@ -48105,7 +47922,7 @@ Domain allowed access.
31434 </param>
31435 <infoflow type="none"/>
31436 </interface>
31437 -<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="60925">
31438 +<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="61048">
31439 <summary>
31440 Bind UDP sockets to the pgpkeyserver port.
31441 </summary>
31442 @@ -48116,7 +47933,7 @@ Domain allowed access.
31443 </param>
31444 <infoflow type="none"/>
31445 </interface>
31446 -<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="60944">
31447 +<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="61067">
31448 <summary>
31449 Make a TCP connection to the pgpkeyserver port.
31450 </summary>
31451 @@ -48126,7 +47943,7 @@ Domain allowed access.
31452 </summary>
31453 </param>
31454 </interface>
31455 -<interface name="corenet_send_pgpkeyserver_client_packets" lineno="60964">
31456 +<interface name="corenet_send_pgpkeyserver_client_packets" lineno="61087">
31457 <summary>
31458 Send pgpkeyserver_client packets.
31459 </summary>
31460 @@ -48137,7 +47954,7 @@ Domain allowed access.
31461 </param>
31462 <infoflow type="write" weight="10"/>
31463 </interface>
31464 -<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="60983">
31465 +<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="61106">
31466 <summary>
31467 Do not audit attempts to send pgpkeyserver_client packets.
31468 </summary>
31469 @@ -48148,7 +47965,7 @@ Domain to not audit.
31470 </param>
31471 <infoflow type="none"/>
31472 </interface>
31473 -<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="61002">
31474 +<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="61125">
31475 <summary>
31476 Receive pgpkeyserver_client packets.
31477 </summary>
31478 @@ -48159,7 +47976,7 @@ Domain allowed access.
31479 </param>
31480 <infoflow type="read" weight="10"/>
31481 </interface>
31482 -<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="61021">
31483 +<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="61144">
31484 <summary>
31485 Do not audit attempts to receive pgpkeyserver_client packets.
31486 </summary>
31487 @@ -48170,7 +47987,7 @@ Domain allowed access.
31488 </param>
31489 <infoflow type="none"/>
31490 </interface>
31491 -<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="61040">
31492 +<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="61163">
31493 <summary>
31494 Send and receive pgpkeyserver_client packets.
31495 </summary>
31496 @@ -48181,7 +47998,7 @@ Domain allowed access.
31497 </param>
31498 <infoflow type="both" weight="10"/>
31499 </interface>
31500 -<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="61056">
31501 +<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="61179">
31502 <summary>
31503 Do not audit attempts to send and receive pgpkeyserver_client packets.
31504 </summary>
31505 @@ -48192,7 +48009,7 @@ Domain to not audit.
31506 </param>
31507 <infoflow type="none"/>
31508 </interface>
31509 -<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="61071">
31510 +<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="61194">
31511 <summary>
31512 Relabel packets to pgpkeyserver_client the packet type.
31513 </summary>
31514 @@ -48202,7 +48019,7 @@ Domain allowed access.
31515 </summary>
31516 </param>
31517 </interface>
31518 -<interface name="corenet_send_pgpkeyserver_server_packets" lineno="61091">
31519 +<interface name="corenet_send_pgpkeyserver_server_packets" lineno="61214">
31520 <summary>
31521 Send pgpkeyserver_server packets.
31522 </summary>
31523 @@ -48213,7 +48030,7 @@ Domain allowed access.
31524 </param>
31525 <infoflow type="write" weight="10"/>
31526 </interface>
31527 -<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="61110">
31528 +<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="61233">
31529 <summary>
31530 Do not audit attempts to send pgpkeyserver_server packets.
31531 </summary>
31532 @@ -48224,7 +48041,7 @@ Domain to not audit.
31533 </param>
31534 <infoflow type="none"/>
31535 </interface>
31536 -<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="61129">
31537 +<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="61252">
31538 <summary>
31539 Receive pgpkeyserver_server packets.
31540 </summary>
31541 @@ -48235,7 +48052,7 @@ Domain allowed access.
31542 </param>
31543 <infoflow type="read" weight="10"/>
31544 </interface>
31545 -<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="61148">
31546 +<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="61271">
31547 <summary>
31548 Do not audit attempts to receive pgpkeyserver_server packets.
31549 </summary>
31550 @@ -48246,7 +48063,7 @@ Domain allowed access.
31551 </param>
31552 <infoflow type="none"/>
31553 </interface>
31554 -<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="61167">
31555 +<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="61290">
31556 <summary>
31557 Send and receive pgpkeyserver_server packets.
31558 </summary>
31559 @@ -48257,7 +48074,7 @@ Domain allowed access.
31560 </param>
31561 <infoflow type="both" weight="10"/>
31562 </interface>
31563 -<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="61183">
31564 +<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="61306">
31565 <summary>
31566 Do not audit attempts to send and receive pgpkeyserver_server packets.
31567 </summary>
31568 @@ -48268,7 +48085,7 @@ Domain to not audit.
31569 </param>
31570 <infoflow type="none"/>
31571 </interface>
31572 -<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="61198">
31573 +<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="61321">
31574 <summary>
31575 Relabel packets to pgpkeyserver_server the packet type.
31576 </summary>
31577 @@ -48278,7 +48095,7 @@ Domain allowed access.
31578 </summary>
31579 </param>
31580 </interface>
31581 -<interface name="corenet_tcp_sendrecv_pingd_port" lineno="61220">
31582 +<interface name="corenet_tcp_sendrecv_pingd_port" lineno="61343">
31583 <summary>
31584 Send and receive TCP traffic on the pingd port.
31585 </summary>
31586 @@ -48289,7 +48106,7 @@ Domain allowed access.
31587 </param>
31588 <infoflow type="both" weight="10"/>
31589 </interface>
31590 -<interface name="corenet_udp_send_pingd_port" lineno="61235">
31591 +<interface name="corenet_udp_send_pingd_port" lineno="61358">
31592 <summary>
31593 Send UDP traffic on the pingd port.
31594 </summary>
31595 @@ -48300,7 +48117,7 @@ Domain allowed access.
31596 </param>
31597 <infoflow type="write" weight="10"/>
31598 </interface>
31599 -<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="61250">
31600 +<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="61373">
31601 <summary>
31602 Do not audit attempts to send UDP traffic on the pingd port.
31603 </summary>
31604 @@ -48311,7 +48128,7 @@ Domain to not audit.
31605 </param>
31606 <infoflow type="none"/>
31607 </interface>
31608 -<interface name="corenet_udp_receive_pingd_port" lineno="61265">
31609 +<interface name="corenet_udp_receive_pingd_port" lineno="61388">
31610 <summary>
31611 Receive UDP traffic on the pingd port.
31612 </summary>
31613 @@ -48322,7 +48139,7 @@ Domain allowed access.
31614 </param>
31615 <infoflow type="read" weight="10"/>
31616 </interface>
31617 -<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="61280">
31618 +<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="61403">
31619 <summary>
31620 Do not audit attempts to receive UDP traffic on the pingd port.
31621 </summary>
31622 @@ -48333,7 +48150,7 @@ Domain to not audit.
31623 </param>
31624 <infoflow type="none"/>
31625 </interface>
31626 -<interface name="corenet_udp_sendrecv_pingd_port" lineno="61295">
31627 +<interface name="corenet_udp_sendrecv_pingd_port" lineno="61418">
31628 <summary>
31629 Send and receive UDP traffic on the pingd port.
31630 </summary>
31631 @@ -48344,7 +48161,7 @@ Domain allowed access.
31632 </param>
31633 <infoflow type="both" weight="10"/>
31634 </interface>
31635 -<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="61311">
31636 +<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="61434">
31637 <summary>
31638 Do not audit attempts to send and receive
31639 UDP traffic on the pingd port.
31640 @@ -48356,7 +48173,7 @@ Domain to not audit.
31641 </param>
31642 <infoflow type="none"/>
31643 </interface>
31644 -<interface name="corenet_tcp_bind_pingd_port" lineno="61326">
31645 +<interface name="corenet_tcp_bind_pingd_port" lineno="61449">
31646 <summary>
31647 Bind TCP sockets to the pingd port.
31648 </summary>
31649 @@ -48367,7 +48184,7 @@ Domain allowed access.
31650 </param>
31651 <infoflow type="none"/>
31652 </interface>
31653 -<interface name="corenet_udp_bind_pingd_port" lineno="61346">
31654 +<interface name="corenet_udp_bind_pingd_port" lineno="61469">
31655 <summary>
31656 Bind UDP sockets to the pingd port.
31657 </summary>
31658 @@ -48378,7 +48195,7 @@ Domain allowed access.
31659 </param>
31660 <infoflow type="none"/>
31661 </interface>
31662 -<interface name="corenet_tcp_connect_pingd_port" lineno="61365">
31663 +<interface name="corenet_tcp_connect_pingd_port" lineno="61488">
31664 <summary>
31665 Make a TCP connection to the pingd port.
31666 </summary>
31667 @@ -48388,7 +48205,7 @@ Domain allowed access.
31668 </summary>
31669 </param>
31670 </interface>
31671 -<interface name="corenet_send_pingd_client_packets" lineno="61385">
31672 +<interface name="corenet_send_pingd_client_packets" lineno="61508">
31673 <summary>
31674 Send pingd_client packets.
31675 </summary>
31676 @@ -48399,7 +48216,7 @@ Domain allowed access.
31677 </param>
31678 <infoflow type="write" weight="10"/>
31679 </interface>
31680 -<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="61404">
31681 +<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="61527">
31682 <summary>
31683 Do not audit attempts to send pingd_client packets.
31684 </summary>
31685 @@ -48410,7 +48227,7 @@ Domain to not audit.
31686 </param>
31687 <infoflow type="none"/>
31688 </interface>
31689 -<interface name="corenet_receive_pingd_client_packets" lineno="61423">
31690 +<interface name="corenet_receive_pingd_client_packets" lineno="61546">
31691 <summary>
31692 Receive pingd_client packets.
31693 </summary>
31694 @@ -48421,7 +48238,7 @@ Domain allowed access.
31695 </param>
31696 <infoflow type="read" weight="10"/>
31697 </interface>
31698 -<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="61442">
31699 +<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="61565">
31700 <summary>
31701 Do not audit attempts to receive pingd_client packets.
31702 </summary>
31703 @@ -48432,7 +48249,7 @@ Domain allowed access.
31704 </param>
31705 <infoflow type="none"/>
31706 </interface>
31707 -<interface name="corenet_sendrecv_pingd_client_packets" lineno="61461">
31708 +<interface name="corenet_sendrecv_pingd_client_packets" lineno="61584">
31709 <summary>
31710 Send and receive pingd_client packets.
31711 </summary>
31712 @@ -48443,7 +48260,7 @@ Domain allowed access.
31713 </param>
31714 <infoflow type="both" weight="10"/>
31715 </interface>
31716 -<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="61477">
31717 +<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="61600">
31718 <summary>
31719 Do not audit attempts to send and receive pingd_client packets.
31720 </summary>
31721 @@ -48454,7 +48271,7 @@ Domain to not audit.
31722 </param>
31723 <infoflow type="none"/>
31724 </interface>
31725 -<interface name="corenet_relabelto_pingd_client_packets" lineno="61492">
31726 +<interface name="corenet_relabelto_pingd_client_packets" lineno="61615">
31727 <summary>
31728 Relabel packets to pingd_client the packet type.
31729 </summary>
31730 @@ -48464,7 +48281,7 @@ Domain allowed access.
31731 </summary>
31732 </param>
31733 </interface>
31734 -<interface name="corenet_send_pingd_server_packets" lineno="61512">
31735 +<interface name="corenet_send_pingd_server_packets" lineno="61635">
31736 <summary>
31737 Send pingd_server packets.
31738 </summary>
31739 @@ -48475,7 +48292,7 @@ Domain allowed access.
31740 </param>
31741 <infoflow type="write" weight="10"/>
31742 </interface>
31743 -<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="61531">
31744 +<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="61654">
31745 <summary>
31746 Do not audit attempts to send pingd_server packets.
31747 </summary>
31748 @@ -48486,7 +48303,7 @@ Domain to not audit.
31749 </param>
31750 <infoflow type="none"/>
31751 </interface>
31752 -<interface name="corenet_receive_pingd_server_packets" lineno="61550">
31753 +<interface name="corenet_receive_pingd_server_packets" lineno="61673">
31754 <summary>
31755 Receive pingd_server packets.
31756 </summary>
31757 @@ -48497,7 +48314,7 @@ Domain allowed access.
31758 </param>
31759 <infoflow type="read" weight="10"/>
31760 </interface>
31761 -<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="61569">
31762 +<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="61692">
31763 <summary>
31764 Do not audit attempts to receive pingd_server packets.
31765 </summary>
31766 @@ -48508,7 +48325,7 @@ Domain allowed access.
31767 </param>
31768 <infoflow type="none"/>
31769 </interface>
31770 -<interface name="corenet_sendrecv_pingd_server_packets" lineno="61588">
31771 +<interface name="corenet_sendrecv_pingd_server_packets" lineno="61711">
31772 <summary>
31773 Send and receive pingd_server packets.
31774 </summary>
31775 @@ -48519,7 +48336,7 @@ Domain allowed access.
31776 </param>
31777 <infoflow type="both" weight="10"/>
31778 </interface>
31779 -<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="61604">
31780 +<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="61727">
31781 <summary>
31782 Do not audit attempts to send and receive pingd_server packets.
31783 </summary>
31784 @@ -48530,7 +48347,7 @@ Domain to not audit.
31785 </param>
31786 <infoflow type="none"/>
31787 </interface>
31788 -<interface name="corenet_relabelto_pingd_server_packets" lineno="61619">
31789 +<interface name="corenet_relabelto_pingd_server_packets" lineno="61742">
31790 <summary>
31791 Relabel packets to pingd_server the packet type.
31792 </summary>
31793 @@ -48540,7 +48357,7 @@ Domain allowed access.
31794 </summary>
31795 </param>
31796 </interface>
31797 -<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="61641">
31798 +<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="61764">
31799 <summary>
31800 Send and receive TCP traffic on the pktcable_cops port.
31801 </summary>
31802 @@ -48551,7 +48368,7 @@ Domain allowed access.
31803 </param>
31804 <infoflow type="both" weight="10"/>
31805 </interface>
31806 -<interface name="corenet_udp_send_pktcable_cops_port" lineno="61656">
31807 +<interface name="corenet_udp_send_pktcable_cops_port" lineno="61779">
31808 <summary>
31809 Send UDP traffic on the pktcable_cops port.
31810 </summary>
31811 @@ -48562,7 +48379,7 @@ Domain allowed access.
31812 </param>
31813 <infoflow type="write" weight="10"/>
31814 </interface>
31815 -<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="61671">
31816 +<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="61794">
31817 <summary>
31818 Do not audit attempts to send UDP traffic on the pktcable_cops port.
31819 </summary>
31820 @@ -48573,7 +48390,7 @@ Domain to not audit.
31821 </param>
31822 <infoflow type="none"/>
31823 </interface>
31824 -<interface name="corenet_udp_receive_pktcable_cops_port" lineno="61686">
31825 +<interface name="corenet_udp_receive_pktcable_cops_port" lineno="61809">
31826 <summary>
31827 Receive UDP traffic on the pktcable_cops port.
31828 </summary>
31829 @@ -48584,7 +48401,7 @@ Domain allowed access.
31830 </param>
31831 <infoflow type="read" weight="10"/>
31832 </interface>
31833 -<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="61701">
31834 +<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="61824">
31835 <summary>
31836 Do not audit attempts to receive UDP traffic on the pktcable_cops port.
31837 </summary>
31838 @@ -48595,7 +48412,7 @@ Domain to not audit.
31839 </param>
31840 <infoflow type="none"/>
31841 </interface>
31842 -<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="61716">
31843 +<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="61839">
31844 <summary>
31845 Send and receive UDP traffic on the pktcable_cops port.
31846 </summary>
31847 @@ -48606,7 +48423,7 @@ Domain allowed access.
31848 </param>
31849 <infoflow type="both" weight="10"/>
31850 </interface>
31851 -<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="61732">
31852 +<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="61855">
31853 <summary>
31854 Do not audit attempts to send and receive
31855 UDP traffic on the pktcable_cops port.
31856 @@ -48618,7 +48435,7 @@ Domain to not audit.
31857 </param>
31858 <infoflow type="none"/>
31859 </interface>
31860 -<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="61747">
31861 +<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="61870">
31862 <summary>
31863 Bind TCP sockets to the pktcable_cops port.
31864 </summary>
31865 @@ -48629,7 +48446,7 @@ Domain allowed access.
31866 </param>
31867 <infoflow type="none"/>
31868 </interface>
31869 -<interface name="corenet_udp_bind_pktcable_cops_port" lineno="61767">
31870 +<interface name="corenet_udp_bind_pktcable_cops_port" lineno="61890">
31871 <summary>
31872 Bind UDP sockets to the pktcable_cops port.
31873 </summary>
31874 @@ -48640,7 +48457,7 @@ Domain allowed access.
31875 </param>
31876 <infoflow type="none"/>
31877 </interface>
31878 -<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="61786">
31879 +<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="61909">
31880 <summary>
31881 Make a TCP connection to the pktcable_cops port.
31882 </summary>
31883 @@ -48650,7 +48467,7 @@ Domain allowed access.
31884 </summary>
31885 </param>
31886 </interface>
31887 -<interface name="corenet_send_pktcable_cops_client_packets" lineno="61806">
31888 +<interface name="corenet_send_pktcable_cops_client_packets" lineno="61929">
31889 <summary>
31890 Send pktcable_cops_client packets.
31891 </summary>
31892 @@ -48661,7 +48478,7 @@ Domain allowed access.
31893 </param>
31894 <infoflow type="write" weight="10"/>
31895 </interface>
31896 -<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="61825">
31897 +<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="61948">
31898 <summary>
31899 Do not audit attempts to send pktcable_cops_client packets.
31900 </summary>
31901 @@ -48672,7 +48489,7 @@ Domain to not audit.
31902 </param>
31903 <infoflow type="none"/>
31904 </interface>
31905 -<interface name="corenet_receive_pktcable_cops_client_packets" lineno="61844">
31906 +<interface name="corenet_receive_pktcable_cops_client_packets" lineno="61967">
31907 <summary>
31908 Receive pktcable_cops_client packets.
31909 </summary>
31910 @@ -48683,7 +48500,7 @@ Domain allowed access.
31911 </param>
31912 <infoflow type="read" weight="10"/>
31913 </interface>
31914 -<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="61863">
31915 +<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="61986">
31916 <summary>
31917 Do not audit attempts to receive pktcable_cops_client packets.
31918 </summary>
31919 @@ -48694,7 +48511,7 @@ Domain allowed access.
31920 </param>
31921 <infoflow type="none"/>
31922 </interface>
31923 -<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="61882">
31924 +<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="62005">
31925 <summary>
31926 Send and receive pktcable_cops_client packets.
31927 </summary>
31928 @@ -48705,7 +48522,7 @@ Domain allowed access.
31929 </param>
31930 <infoflow type="both" weight="10"/>
31931 </interface>
31932 -<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="61898">
31933 +<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="62021">
31934 <summary>
31935 Do not audit attempts to send and receive pktcable_cops_client packets.
31936 </summary>
31937 @@ -48716,7 +48533,7 @@ Domain to not audit.
31938 </param>
31939 <infoflow type="none"/>
31940 </interface>
31941 -<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="61913">
31942 +<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="62036">
31943 <summary>
31944 Relabel packets to pktcable_cops_client the packet type.
31945 </summary>
31946 @@ -48726,7 +48543,7 @@ Domain allowed access.
31947 </summary>
31948 </param>
31949 </interface>
31950 -<interface name="corenet_send_pktcable_cops_server_packets" lineno="61933">
31951 +<interface name="corenet_send_pktcable_cops_server_packets" lineno="62056">
31952 <summary>
31953 Send pktcable_cops_server packets.
31954 </summary>
31955 @@ -48737,7 +48554,7 @@ Domain allowed access.
31956 </param>
31957 <infoflow type="write" weight="10"/>
31958 </interface>
31959 -<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="61952">
31960 +<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="62075">
31961 <summary>
31962 Do not audit attempts to send pktcable_cops_server packets.
31963 </summary>
31964 @@ -48748,7 +48565,7 @@ Domain to not audit.
31965 </param>
31966 <infoflow type="none"/>
31967 </interface>
31968 -<interface name="corenet_receive_pktcable_cops_server_packets" lineno="61971">
31969 +<interface name="corenet_receive_pktcable_cops_server_packets" lineno="62094">
31970 <summary>
31971 Receive pktcable_cops_server packets.
31972 </summary>
31973 @@ -48759,7 +48576,7 @@ Domain allowed access.
31974 </param>
31975 <infoflow type="read" weight="10"/>
31976 </interface>
31977 -<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="61990">
31978 +<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="62113">
31979 <summary>
31980 Do not audit attempts to receive pktcable_cops_server packets.
31981 </summary>
31982 @@ -48770,7 +48587,7 @@ Domain allowed access.
31983 </param>
31984 <infoflow type="none"/>
31985 </interface>
31986 -<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="62009">
31987 +<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="62132">
31988 <summary>
31989 Send and receive pktcable_cops_server packets.
31990 </summary>
31991 @@ -48781,7 +48598,7 @@ Domain allowed access.
31992 </param>
31993 <infoflow type="both" weight="10"/>
31994 </interface>
31995 -<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="62025">
31996 +<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="62148">
31997 <summary>
31998 Do not audit attempts to send and receive pktcable_cops_server packets.
31999 </summary>
32000 @@ -48792,7 +48609,7 @@ Domain to not audit.
32001 </param>
32002 <infoflow type="none"/>
32003 </interface>
32004 -<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="62040">
32005 +<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="62163">
32006 <summary>
32007 Relabel packets to pktcable_cops_server the packet type.
32008 </summary>
32009 @@ -48802,7 +48619,7 @@ Domain allowed access.
32010 </summary>
32011 </param>
32012 </interface>
32013 -<interface name="corenet_tcp_sendrecv_pop_port" lineno="62062">
32014 +<interface name="corenet_tcp_sendrecv_pop_port" lineno="62185">
32015 <summary>
32016 Send and receive TCP traffic on the pop port.
32017 </summary>
32018 @@ -48813,7 +48630,7 @@ Domain allowed access.
32019 </param>
32020 <infoflow type="both" weight="10"/>
32021 </interface>
32022 -<interface name="corenet_udp_send_pop_port" lineno="62077">
32023 +<interface name="corenet_udp_send_pop_port" lineno="62200">
32024 <summary>
32025 Send UDP traffic on the pop port.
32026 </summary>
32027 @@ -48824,7 +48641,7 @@ Domain allowed access.
32028 </param>
32029 <infoflow type="write" weight="10"/>
32030 </interface>
32031 -<interface name="corenet_dontaudit_udp_send_pop_port" lineno="62092">
32032 +<interface name="corenet_dontaudit_udp_send_pop_port" lineno="62215">
32033 <summary>
32034 Do not audit attempts to send UDP traffic on the pop port.
32035 </summary>
32036 @@ -48835,7 +48652,7 @@ Domain to not audit.
32037 </param>
32038 <infoflow type="none"/>
32039 </interface>
32040 -<interface name="corenet_udp_receive_pop_port" lineno="62107">
32041 +<interface name="corenet_udp_receive_pop_port" lineno="62230">
32042 <summary>
32043 Receive UDP traffic on the pop port.
32044 </summary>
32045 @@ -48846,7 +48663,7 @@ Domain allowed access.
32046 </param>
32047 <infoflow type="read" weight="10"/>
32048 </interface>
32049 -<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="62122">
32050 +<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="62245">
32051 <summary>
32052 Do not audit attempts to receive UDP traffic on the pop port.
32053 </summary>
32054 @@ -48857,7 +48674,7 @@ Domain to not audit.
32055 </param>
32056 <infoflow type="none"/>
32057 </interface>
32058 -<interface name="corenet_udp_sendrecv_pop_port" lineno="62137">
32059 +<interface name="corenet_udp_sendrecv_pop_port" lineno="62260">
32060 <summary>
32061 Send and receive UDP traffic on the pop port.
32062 </summary>
32063 @@ -48868,7 +48685,7 @@ Domain allowed access.
32064 </param>
32065 <infoflow type="both" weight="10"/>
32066 </interface>
32067 -<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="62153">
32068 +<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="62276">
32069 <summary>
32070 Do not audit attempts to send and receive
32071 UDP traffic on the pop port.
32072 @@ -48880,7 +48697,7 @@ Domain to not audit.
32073 </param>
32074 <infoflow type="none"/>
32075 </interface>
32076 -<interface name="corenet_tcp_bind_pop_port" lineno="62168">
32077 +<interface name="corenet_tcp_bind_pop_port" lineno="62291">
32078 <summary>
32079 Bind TCP sockets to the pop port.
32080 </summary>
32081 @@ -48891,7 +48708,7 @@ Domain allowed access.
32082 </param>
32083 <infoflow type="none"/>
32084 </interface>
32085 -<interface name="corenet_udp_bind_pop_port" lineno="62188">
32086 +<interface name="corenet_udp_bind_pop_port" lineno="62311">
32087 <summary>
32088 Bind UDP sockets to the pop port.
32089 </summary>
32090 @@ -48902,7 +48719,7 @@ Domain allowed access.
32091 </param>
32092 <infoflow type="none"/>
32093 </interface>
32094 -<interface name="corenet_tcp_connect_pop_port" lineno="62207">
32095 +<interface name="corenet_tcp_connect_pop_port" lineno="62330">
32096 <summary>
32097 Make a TCP connection to the pop port.
32098 </summary>
32099 @@ -48912,7 +48729,7 @@ Domain allowed access.
32100 </summary>
32101 </param>
32102 </interface>
32103 -<interface name="corenet_send_pop_client_packets" lineno="62227">
32104 +<interface name="corenet_send_pop_client_packets" lineno="62350">
32105 <summary>
32106 Send pop_client packets.
32107 </summary>
32108 @@ -48923,7 +48740,7 @@ Domain allowed access.
32109 </param>
32110 <infoflow type="write" weight="10"/>
32111 </interface>
32112 -<interface name="corenet_dontaudit_send_pop_client_packets" lineno="62246">
32113 +<interface name="corenet_dontaudit_send_pop_client_packets" lineno="62369">
32114 <summary>
32115 Do not audit attempts to send pop_client packets.
32116 </summary>
32117 @@ -48934,7 +48751,7 @@ Domain to not audit.
32118 </param>
32119 <infoflow type="none"/>
32120 </interface>
32121 -<interface name="corenet_receive_pop_client_packets" lineno="62265">
32122 +<interface name="corenet_receive_pop_client_packets" lineno="62388">
32123 <summary>
32124 Receive pop_client packets.
32125 </summary>
32126 @@ -48945,7 +48762,7 @@ Domain allowed access.
32127 </param>
32128 <infoflow type="read" weight="10"/>
32129 </interface>
32130 -<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="62284">
32131 +<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="62407">
32132 <summary>
32133 Do not audit attempts to receive pop_client packets.
32134 </summary>
32135 @@ -48956,7 +48773,7 @@ Domain allowed access.
32136 </param>
32137 <infoflow type="none"/>
32138 </interface>
32139 -<interface name="corenet_sendrecv_pop_client_packets" lineno="62303">
32140 +<interface name="corenet_sendrecv_pop_client_packets" lineno="62426">
32141 <summary>
32142 Send and receive pop_client packets.
32143 </summary>
32144 @@ -48967,7 +48784,7 @@ Domain allowed access.
32145 </param>
32146 <infoflow type="both" weight="10"/>
32147 </interface>
32148 -<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="62319">
32149 +<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="62442">
32150 <summary>
32151 Do not audit attempts to send and receive pop_client packets.
32152 </summary>
32153 @@ -48978,7 +48795,7 @@ Domain to not audit.
32154 </param>
32155 <infoflow type="none"/>
32156 </interface>
32157 -<interface name="corenet_relabelto_pop_client_packets" lineno="62334">
32158 +<interface name="corenet_relabelto_pop_client_packets" lineno="62457">
32159 <summary>
32160 Relabel packets to pop_client the packet type.
32161 </summary>
32162 @@ -48988,7 +48805,7 @@ Domain allowed access.
32163 </summary>
32164 </param>
32165 </interface>
32166 -<interface name="corenet_send_pop_server_packets" lineno="62354">
32167 +<interface name="corenet_send_pop_server_packets" lineno="62477">
32168 <summary>
32169 Send pop_server packets.
32170 </summary>
32171 @@ -48999,7 +48816,7 @@ Domain allowed access.
32172 </param>
32173 <infoflow type="write" weight="10"/>
32174 </interface>
32175 -<interface name="corenet_dontaudit_send_pop_server_packets" lineno="62373">
32176 +<interface name="corenet_dontaudit_send_pop_server_packets" lineno="62496">
32177 <summary>
32178 Do not audit attempts to send pop_server packets.
32179 </summary>
32180 @@ -49010,7 +48827,7 @@ Domain to not audit.
32181 </param>
32182 <infoflow type="none"/>
32183 </interface>
32184 -<interface name="corenet_receive_pop_server_packets" lineno="62392">
32185 +<interface name="corenet_receive_pop_server_packets" lineno="62515">
32186 <summary>
32187 Receive pop_server packets.
32188 </summary>
32189 @@ -49021,7 +48838,7 @@ Domain allowed access.
32190 </param>
32191 <infoflow type="read" weight="10"/>
32192 </interface>
32193 -<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="62411">
32194 +<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="62534">
32195 <summary>
32196 Do not audit attempts to receive pop_server packets.
32197 </summary>
32198 @@ -49032,7 +48849,7 @@ Domain allowed access.
32199 </param>
32200 <infoflow type="none"/>
32201 </interface>
32202 -<interface name="corenet_sendrecv_pop_server_packets" lineno="62430">
32203 +<interface name="corenet_sendrecv_pop_server_packets" lineno="62553">
32204 <summary>
32205 Send and receive pop_server packets.
32206 </summary>
32207 @@ -49043,7 +48860,7 @@ Domain allowed access.
32208 </param>
32209 <infoflow type="both" weight="10"/>
32210 </interface>
32211 -<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="62446">
32212 +<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="62569">
32213 <summary>
32214 Do not audit attempts to send and receive pop_server packets.
32215 </summary>
32216 @@ -49054,7 +48871,7 @@ Domain to not audit.
32217 </param>
32218 <infoflow type="none"/>
32219 </interface>
32220 -<interface name="corenet_relabelto_pop_server_packets" lineno="62461">
32221 +<interface name="corenet_relabelto_pop_server_packets" lineno="62584">
32222 <summary>
32223 Relabel packets to pop_server the packet type.
32224 </summary>
32225 @@ -49064,7 +48881,7 @@ Domain allowed access.
32226 </summary>
32227 </param>
32228 </interface>
32229 -<interface name="corenet_tcp_sendrecv_portmap_port" lineno="62483">
32230 +<interface name="corenet_tcp_sendrecv_portmap_port" lineno="62606">
32231 <summary>
32232 Send and receive TCP traffic on the portmap port.
32233 </summary>
32234 @@ -49075,7 +48892,7 @@ Domain allowed access.
32235 </param>
32236 <infoflow type="both" weight="10"/>
32237 </interface>
32238 -<interface name="corenet_udp_send_portmap_port" lineno="62498">
32239 +<interface name="corenet_udp_send_portmap_port" lineno="62621">
32240 <summary>
32241 Send UDP traffic on the portmap port.
32242 </summary>
32243 @@ -49086,7 +48903,7 @@ Domain allowed access.
32244 </param>
32245 <infoflow type="write" weight="10"/>
32246 </interface>
32247 -<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="62513">
32248 +<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="62636">
32249 <summary>
32250 Do not audit attempts to send UDP traffic on the portmap port.
32251 </summary>
32252 @@ -49097,7 +48914,7 @@ Domain to not audit.
32253 </param>
32254 <infoflow type="none"/>
32255 </interface>
32256 -<interface name="corenet_udp_receive_portmap_port" lineno="62528">
32257 +<interface name="corenet_udp_receive_portmap_port" lineno="62651">
32258 <summary>
32259 Receive UDP traffic on the portmap port.
32260 </summary>
32261 @@ -49108,7 +48925,7 @@ Domain allowed access.
32262 </param>
32263 <infoflow type="read" weight="10"/>
32264 </interface>
32265 -<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="62543">
32266 +<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="62666">
32267 <summary>
32268 Do not audit attempts to receive UDP traffic on the portmap port.
32269 </summary>
32270 @@ -49119,7 +48936,7 @@ Domain to not audit.
32271 </param>
32272 <infoflow type="none"/>
32273 </interface>
32274 -<interface name="corenet_udp_sendrecv_portmap_port" lineno="62558">
32275 +<interface name="corenet_udp_sendrecv_portmap_port" lineno="62681">
32276 <summary>
32277 Send and receive UDP traffic on the portmap port.
32278 </summary>
32279 @@ -49130,7 +48947,7 @@ Domain allowed access.
32280 </param>
32281 <infoflow type="both" weight="10"/>
32282 </interface>
32283 -<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="62574">
32284 +<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="62697">
32285 <summary>
32286 Do not audit attempts to send and receive
32287 UDP traffic on the portmap port.
32288 @@ -49142,7 +48959,7 @@ Domain to not audit.
32289 </param>
32290 <infoflow type="none"/>
32291 </interface>
32292 -<interface name="corenet_tcp_bind_portmap_port" lineno="62589">
32293 +<interface name="corenet_tcp_bind_portmap_port" lineno="62712">
32294 <summary>
32295 Bind TCP sockets to the portmap port.
32296 </summary>
32297 @@ -49153,7 +48970,7 @@ Domain allowed access.
32298 </param>
32299 <infoflow type="none"/>
32300 </interface>
32301 -<interface name="corenet_udp_bind_portmap_port" lineno="62609">
32302 +<interface name="corenet_udp_bind_portmap_port" lineno="62732">
32303 <summary>
32304 Bind UDP sockets to the portmap port.
32305 </summary>
32306 @@ -49164,7 +48981,7 @@ Domain allowed access.
32307 </param>
32308 <infoflow type="none"/>
32309 </interface>
32310 -<interface name="corenet_tcp_connect_portmap_port" lineno="62628">
32311 +<interface name="corenet_tcp_connect_portmap_port" lineno="62751">
32312 <summary>
32313 Make a TCP connection to the portmap port.
32314 </summary>
32315 @@ -49174,7 +48991,7 @@ Domain allowed access.
32316 </summary>
32317 </param>
32318 </interface>
32319 -<interface name="corenet_send_portmap_client_packets" lineno="62648">
32320 +<interface name="corenet_send_portmap_client_packets" lineno="62771">
32321 <summary>
32322 Send portmap_client packets.
32323 </summary>
32324 @@ -49185,7 +49002,7 @@ Domain allowed access.
32325 </param>
32326 <infoflow type="write" weight="10"/>
32327 </interface>
32328 -<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="62667">
32329 +<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="62790">
32330 <summary>
32331 Do not audit attempts to send portmap_client packets.
32332 </summary>
32333 @@ -49196,7 +49013,7 @@ Domain to not audit.
32334 </param>
32335 <infoflow type="none"/>
32336 </interface>
32337 -<interface name="corenet_receive_portmap_client_packets" lineno="62686">
32338 +<interface name="corenet_receive_portmap_client_packets" lineno="62809">
32339 <summary>
32340 Receive portmap_client packets.
32341 </summary>
32342 @@ -49207,7 +49024,7 @@ Domain allowed access.
32343 </param>
32344 <infoflow type="read" weight="10"/>
32345 </interface>
32346 -<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="62705">
32347 +<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="62828">
32348 <summary>
32349 Do not audit attempts to receive portmap_client packets.
32350 </summary>
32351 @@ -49218,7 +49035,7 @@ Domain allowed access.
32352 </param>
32353 <infoflow type="none"/>
32354 </interface>
32355 -<interface name="corenet_sendrecv_portmap_client_packets" lineno="62724">
32356 +<interface name="corenet_sendrecv_portmap_client_packets" lineno="62847">
32357 <summary>
32358 Send and receive portmap_client packets.
32359 </summary>
32360 @@ -49229,7 +49046,7 @@ Domain allowed access.
32361 </param>
32362 <infoflow type="both" weight="10"/>
32363 </interface>
32364 -<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="62740">
32365 +<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="62863">
32366 <summary>
32367 Do not audit attempts to send and receive portmap_client packets.
32368 </summary>
32369 @@ -49240,7 +49057,7 @@ Domain to not audit.
32370 </param>
32371 <infoflow type="none"/>
32372 </interface>
32373 -<interface name="corenet_relabelto_portmap_client_packets" lineno="62755">
32374 +<interface name="corenet_relabelto_portmap_client_packets" lineno="62878">
32375 <summary>
32376 Relabel packets to portmap_client the packet type.
32377 </summary>
32378 @@ -49250,7 +49067,7 @@ Domain allowed access.
32379 </summary>
32380 </param>
32381 </interface>
32382 -<interface name="corenet_send_portmap_server_packets" lineno="62775">
32383 +<interface name="corenet_send_portmap_server_packets" lineno="62898">
32384 <summary>
32385 Send portmap_server packets.
32386 </summary>
32387 @@ -49261,7 +49078,7 @@ Domain allowed access.
32388 </param>
32389 <infoflow type="write" weight="10"/>
32390 </interface>
32391 -<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="62794">
32392 +<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="62917">
32393 <summary>
32394 Do not audit attempts to send portmap_server packets.
32395 </summary>
32396 @@ -49272,7 +49089,7 @@ Domain to not audit.
32397 </param>
32398 <infoflow type="none"/>
32399 </interface>
32400 -<interface name="corenet_receive_portmap_server_packets" lineno="62813">
32401 +<interface name="corenet_receive_portmap_server_packets" lineno="62936">
32402 <summary>
32403 Receive portmap_server packets.
32404 </summary>
32405 @@ -49283,7 +49100,7 @@ Domain allowed access.
32406 </param>
32407 <infoflow type="read" weight="10"/>
32408 </interface>
32409 -<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="62832">
32410 +<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="62955">
32411 <summary>
32412 Do not audit attempts to receive portmap_server packets.
32413 </summary>
32414 @@ -49294,7 +49111,7 @@ Domain allowed access.
32415 </param>
32416 <infoflow type="none"/>
32417 </interface>
32418 -<interface name="corenet_sendrecv_portmap_server_packets" lineno="62851">
32419 +<interface name="corenet_sendrecv_portmap_server_packets" lineno="62974">
32420 <summary>
32421 Send and receive portmap_server packets.
32422 </summary>
32423 @@ -49305,7 +49122,7 @@ Domain allowed access.
32424 </param>
32425 <infoflow type="both" weight="10"/>
32426 </interface>
32427 -<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="62867">
32428 +<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="62990">
32429 <summary>
32430 Do not audit attempts to send and receive portmap_server packets.
32431 </summary>
32432 @@ -49316,7 +49133,7 @@ Domain to not audit.
32433 </param>
32434 <infoflow type="none"/>
32435 </interface>
32436 -<interface name="corenet_relabelto_portmap_server_packets" lineno="62882">
32437 +<interface name="corenet_relabelto_portmap_server_packets" lineno="63005">
32438 <summary>
32439 Relabel packets to portmap_server the packet type.
32440 </summary>
32441 @@ -49326,7 +49143,7 @@ Domain allowed access.
32442 </summary>
32443 </param>
32444 </interface>
32445 -<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="62904">
32446 +<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="63027">
32447 <summary>
32448 Send and receive TCP traffic on the postfix_policyd port.
32449 </summary>
32450 @@ -49337,7 +49154,7 @@ Domain allowed access.
32451 </param>
32452 <infoflow type="both" weight="10"/>
32453 </interface>
32454 -<interface name="corenet_udp_send_postfix_policyd_port" lineno="62919">
32455 +<interface name="corenet_udp_send_postfix_policyd_port" lineno="63042">
32456 <summary>
32457 Send UDP traffic on the postfix_policyd port.
32458 </summary>
32459 @@ -49348,7 +49165,7 @@ Domain allowed access.
32460 </param>
32461 <infoflow type="write" weight="10"/>
32462 </interface>
32463 -<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="62934">
32464 +<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="63057">
32465 <summary>
32466 Do not audit attempts to send UDP traffic on the postfix_policyd port.
32467 </summary>
32468 @@ -49359,7 +49176,7 @@ Domain to not audit.
32469 </param>
32470 <infoflow type="none"/>
32471 </interface>
32472 -<interface name="corenet_udp_receive_postfix_policyd_port" lineno="62949">
32473 +<interface name="corenet_udp_receive_postfix_policyd_port" lineno="63072">
32474 <summary>
32475 Receive UDP traffic on the postfix_policyd port.
32476 </summary>
32477 @@ -49370,7 +49187,7 @@ Domain allowed access.
32478 </param>
32479 <infoflow type="read" weight="10"/>
32480 </interface>
32481 -<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="62964">
32482 +<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="63087">
32483 <summary>
32484 Do not audit attempts to receive UDP traffic on the postfix_policyd port.
32485 </summary>
32486 @@ -49381,7 +49198,7 @@ Domain to not audit.
32487 </param>
32488 <infoflow type="none"/>
32489 </interface>
32490 -<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="62979">
32491 +<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="63102">
32492 <summary>
32493 Send and receive UDP traffic on the postfix_policyd port.
32494 </summary>
32495 @@ -49392,7 +49209,7 @@ Domain allowed access.
32496 </param>
32497 <infoflow type="both" weight="10"/>
32498 </interface>
32499 -<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="62995">
32500 +<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="63118">
32501 <summary>
32502 Do not audit attempts to send and receive
32503 UDP traffic on the postfix_policyd port.
32504 @@ -49404,7 +49221,7 @@ Domain to not audit.
32505 </param>
32506 <infoflow type="none"/>
32507 </interface>
32508 -<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="63010">
32509 +<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="63133">
32510 <summary>
32511 Bind TCP sockets to the postfix_policyd port.
32512 </summary>
32513 @@ -49415,7 +49232,7 @@ Domain allowed access.
32514 </param>
32515 <infoflow type="none"/>
32516 </interface>
32517 -<interface name="corenet_udp_bind_postfix_policyd_port" lineno="63030">
32518 +<interface name="corenet_udp_bind_postfix_policyd_port" lineno="63153">
32519 <summary>
32520 Bind UDP sockets to the postfix_policyd port.
32521 </summary>
32522 @@ -49426,7 +49243,7 @@ Domain allowed access.
32523 </param>
32524 <infoflow type="none"/>
32525 </interface>
32526 -<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="63049">
32527 +<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="63172">
32528 <summary>
32529 Make a TCP connection to the postfix_policyd port.
32530 </summary>
32531 @@ -49436,7 +49253,7 @@ Domain allowed access.
32532 </summary>
32533 </param>
32534 </interface>
32535 -<interface name="corenet_send_postfix_policyd_client_packets" lineno="63069">
32536 +<interface name="corenet_send_postfix_policyd_client_packets" lineno="63192">
32537 <summary>
32538 Send postfix_policyd_client packets.
32539 </summary>
32540 @@ -49447,7 +49264,7 @@ Domain allowed access.
32541 </param>
32542 <infoflow type="write" weight="10"/>
32543 </interface>
32544 -<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="63088">
32545 +<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="63211">
32546 <summary>
32547 Do not audit attempts to send postfix_policyd_client packets.
32548 </summary>
32549 @@ -49458,7 +49275,7 @@ Domain to not audit.
32550 </param>
32551 <infoflow type="none"/>
32552 </interface>
32553 -<interface name="corenet_receive_postfix_policyd_client_packets" lineno="63107">
32554 +<interface name="corenet_receive_postfix_policyd_client_packets" lineno="63230">
32555 <summary>
32556 Receive postfix_policyd_client packets.
32557 </summary>
32558 @@ -49469,7 +49286,7 @@ Domain allowed access.
32559 </param>
32560 <infoflow type="read" weight="10"/>
32561 </interface>
32562 -<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="63126">
32563 +<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="63249">
32564 <summary>
32565 Do not audit attempts to receive postfix_policyd_client packets.
32566 </summary>
32567 @@ -49480,7 +49297,7 @@ Domain allowed access.
32568 </param>
32569 <infoflow type="none"/>
32570 </interface>
32571 -<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="63145">
32572 +<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="63268">
32573 <summary>
32574 Send and receive postfix_policyd_client packets.
32575 </summary>
32576 @@ -49491,7 +49308,7 @@ Domain allowed access.
32577 </param>
32578 <infoflow type="both" weight="10"/>
32579 </interface>
32580 -<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="63161">
32581 +<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="63284">
32582 <summary>
32583 Do not audit attempts to send and receive postfix_policyd_client packets.
32584 </summary>
32585 @@ -49502,7 +49319,7 @@ Domain to not audit.
32586 </param>
32587 <infoflow type="none"/>
32588 </interface>
32589 -<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="63176">
32590 +<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="63299">
32591 <summary>
32592 Relabel packets to postfix_policyd_client the packet type.
32593 </summary>
32594 @@ -49512,7 +49329,7 @@ Domain allowed access.
32595 </summary>
32596 </param>
32597 </interface>
32598 -<interface name="corenet_send_postfix_policyd_server_packets" lineno="63196">
32599 +<interface name="corenet_send_postfix_policyd_server_packets" lineno="63319">
32600 <summary>
32601 Send postfix_policyd_server packets.
32602 </summary>
32603 @@ -49523,7 +49340,7 @@ Domain allowed access.
32604 </param>
32605 <infoflow type="write" weight="10"/>
32606 </interface>
32607 -<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="63215">
32608 +<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="63338">
32609 <summary>
32610 Do not audit attempts to send postfix_policyd_server packets.
32611 </summary>
32612 @@ -49534,7 +49351,7 @@ Domain to not audit.
32613 </param>
32614 <infoflow type="none"/>
32615 </interface>
32616 -<interface name="corenet_receive_postfix_policyd_server_packets" lineno="63234">
32617 +<interface name="corenet_receive_postfix_policyd_server_packets" lineno="63357">
32618 <summary>
32619 Receive postfix_policyd_server packets.
32620 </summary>
32621 @@ -49545,7 +49362,7 @@ Domain allowed access.
32622 </param>
32623 <infoflow type="read" weight="10"/>
32624 </interface>
32625 -<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="63253">
32626 +<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="63376">
32627 <summary>
32628 Do not audit attempts to receive postfix_policyd_server packets.
32629 </summary>
32630 @@ -49556,7 +49373,7 @@ Domain allowed access.
32631 </param>
32632 <infoflow type="none"/>
32633 </interface>
32634 -<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="63272">
32635 +<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="63395">
32636 <summary>
32637 Send and receive postfix_policyd_server packets.
32638 </summary>
32639 @@ -49567,7 +49384,7 @@ Domain allowed access.
32640 </param>
32641 <infoflow type="both" weight="10"/>
32642 </interface>
32643 -<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="63288">
32644 +<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="63411">
32645 <summary>
32646 Do not audit attempts to send and receive postfix_policyd_server packets.
32647 </summary>
32648 @@ -49578,7 +49395,7 @@ Domain to not audit.
32649 </param>
32650 <infoflow type="none"/>
32651 </interface>
32652 -<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="63303">
32653 +<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="63426">
32654 <summary>
32655 Relabel packets to postfix_policyd_server the packet type.
32656 </summary>
32657 @@ -49588,7 +49405,7 @@ Domain allowed access.
32658 </summary>
32659 </param>
32660 </interface>
32661 -<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="63325">
32662 +<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="63448">
32663 <summary>
32664 Send and receive TCP traffic on the postgresql port.
32665 </summary>
32666 @@ -49599,7 +49416,7 @@ Domain allowed access.
32667 </param>
32668 <infoflow type="both" weight="10"/>
32669 </interface>
32670 -<interface name="corenet_udp_send_postgresql_port" lineno="63340">
32671 +<interface name="corenet_udp_send_postgresql_port" lineno="63463">
32672 <summary>
32673 Send UDP traffic on the postgresql port.
32674 </summary>
32675 @@ -49610,7 +49427,7 @@ Domain allowed access.
32676 </param>
32677 <infoflow type="write" weight="10"/>
32678 </interface>
32679 -<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="63355">
32680 +<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="63478">
32681 <summary>
32682 Do not audit attempts to send UDP traffic on the postgresql port.
32683 </summary>
32684 @@ -49621,7 +49438,7 @@ Domain to not audit.
32685 </param>
32686 <infoflow type="none"/>
32687 </interface>
32688 -<interface name="corenet_udp_receive_postgresql_port" lineno="63370">
32689 +<interface name="corenet_udp_receive_postgresql_port" lineno="63493">
32690 <summary>
32691 Receive UDP traffic on the postgresql port.
32692 </summary>
32693 @@ -49632,7 +49449,7 @@ Domain allowed access.
32694 </param>
32695 <infoflow type="read" weight="10"/>
32696 </interface>
32697 -<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="63385">
32698 +<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="63508">
32699 <summary>
32700 Do not audit attempts to receive UDP traffic on the postgresql port.
32701 </summary>
32702 @@ -49643,7 +49460,7 @@ Domain to not audit.
32703 </param>
32704 <infoflow type="none"/>
32705 </interface>
32706 -<interface name="corenet_udp_sendrecv_postgresql_port" lineno="63400">
32707 +<interface name="corenet_udp_sendrecv_postgresql_port" lineno="63523">
32708 <summary>
32709 Send and receive UDP traffic on the postgresql port.
32710 </summary>
32711 @@ -49654,7 +49471,7 @@ Domain allowed access.
32712 </param>
32713 <infoflow type="both" weight="10"/>
32714 </interface>
32715 -<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="63416">
32716 +<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="63539">
32717 <summary>
32718 Do not audit attempts to send and receive
32719 UDP traffic on the postgresql port.
32720 @@ -49666,7 +49483,7 @@ Domain to not audit.
32721 </param>
32722 <infoflow type="none"/>
32723 </interface>
32724 -<interface name="corenet_tcp_bind_postgresql_port" lineno="63431">
32725 +<interface name="corenet_tcp_bind_postgresql_port" lineno="63554">
32726 <summary>
32727 Bind TCP sockets to the postgresql port.
32728 </summary>
32729 @@ -49677,7 +49494,7 @@ Domain allowed access.
32730 </param>
32731 <infoflow type="none"/>
32732 </interface>
32733 -<interface name="corenet_udp_bind_postgresql_port" lineno="63451">
32734 +<interface name="corenet_udp_bind_postgresql_port" lineno="63574">
32735 <summary>
32736 Bind UDP sockets to the postgresql port.
32737 </summary>
32738 @@ -49688,7 +49505,7 @@ Domain allowed access.
32739 </param>
32740 <infoflow type="none"/>
32741 </interface>
32742 -<interface name="corenet_tcp_connect_postgresql_port" lineno="63470">
32743 +<interface name="corenet_tcp_connect_postgresql_port" lineno="63593">
32744 <summary>
32745 Make a TCP connection to the postgresql port.
32746 </summary>
32747 @@ -49698,7 +49515,7 @@ Domain allowed access.
32748 </summary>
32749 </param>
32750 </interface>
32751 -<interface name="corenet_send_postgresql_client_packets" lineno="63490">
32752 +<interface name="corenet_send_postgresql_client_packets" lineno="63613">
32753 <summary>
32754 Send postgresql_client packets.
32755 </summary>
32756 @@ -49709,7 +49526,7 @@ Domain allowed access.
32757 </param>
32758 <infoflow type="write" weight="10"/>
32759 </interface>
32760 -<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="63509">
32761 +<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="63632">
32762 <summary>
32763 Do not audit attempts to send postgresql_client packets.
32764 </summary>
32765 @@ -49720,7 +49537,7 @@ Domain to not audit.
32766 </param>
32767 <infoflow type="none"/>
32768 </interface>
32769 -<interface name="corenet_receive_postgresql_client_packets" lineno="63528">
32770 +<interface name="corenet_receive_postgresql_client_packets" lineno="63651">
32771 <summary>
32772 Receive postgresql_client packets.
32773 </summary>
32774 @@ -49731,7 +49548,7 @@ Domain allowed access.
32775 </param>
32776 <infoflow type="read" weight="10"/>
32777 </interface>
32778 -<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="63547">
32779 +<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="63670">
32780 <summary>
32781 Do not audit attempts to receive postgresql_client packets.
32782 </summary>
32783 @@ -49742,7 +49559,7 @@ Domain allowed access.
32784 </param>
32785 <infoflow type="none"/>
32786 </interface>
32787 -<interface name="corenet_sendrecv_postgresql_client_packets" lineno="63566">
32788 +<interface name="corenet_sendrecv_postgresql_client_packets" lineno="63689">
32789 <summary>
32790 Send and receive postgresql_client packets.
32791 </summary>
32792 @@ -49753,7 +49570,7 @@ Domain allowed access.
32793 </param>
32794 <infoflow type="both" weight="10"/>
32795 </interface>
32796 -<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="63582">
32797 +<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="63705">
32798 <summary>
32799 Do not audit attempts to send and receive postgresql_client packets.
32800 </summary>
32801 @@ -49764,7 +49581,7 @@ Domain to not audit.
32802 </param>
32803 <infoflow type="none"/>
32804 </interface>
32805 -<interface name="corenet_relabelto_postgresql_client_packets" lineno="63597">
32806 +<interface name="corenet_relabelto_postgresql_client_packets" lineno="63720">
32807 <summary>
32808 Relabel packets to postgresql_client the packet type.
32809 </summary>
32810 @@ -49774,7 +49591,7 @@ Domain allowed access.
32811 </summary>
32812 </param>
32813 </interface>
32814 -<interface name="corenet_send_postgresql_server_packets" lineno="63617">
32815 +<interface name="corenet_send_postgresql_server_packets" lineno="63740">
32816 <summary>
32817 Send postgresql_server packets.
32818 </summary>
32819 @@ -49785,7 +49602,7 @@ Domain allowed access.
32820 </param>
32821 <infoflow type="write" weight="10"/>
32822 </interface>
32823 -<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="63636">
32824 +<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="63759">
32825 <summary>
32826 Do not audit attempts to send postgresql_server packets.
32827 </summary>
32828 @@ -49796,7 +49613,7 @@ Domain to not audit.
32829 </param>
32830 <infoflow type="none"/>
32831 </interface>
32832 -<interface name="corenet_receive_postgresql_server_packets" lineno="63655">
32833 +<interface name="corenet_receive_postgresql_server_packets" lineno="63778">
32834 <summary>
32835 Receive postgresql_server packets.
32836 </summary>
32837 @@ -49807,7 +49624,7 @@ Domain allowed access.
32838 </param>
32839 <infoflow type="read" weight="10"/>
32840 </interface>
32841 -<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="63674">
32842 +<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="63797">
32843 <summary>
32844 Do not audit attempts to receive postgresql_server packets.
32845 </summary>
32846 @@ -49818,7 +49635,7 @@ Domain allowed access.
32847 </param>
32848 <infoflow type="none"/>
32849 </interface>
32850 -<interface name="corenet_sendrecv_postgresql_server_packets" lineno="63693">
32851 +<interface name="corenet_sendrecv_postgresql_server_packets" lineno="63816">
32852 <summary>
32853 Send and receive postgresql_server packets.
32854 </summary>
32855 @@ -49829,7 +49646,7 @@ Domain allowed access.
32856 </param>
32857 <infoflow type="both" weight="10"/>
32858 </interface>
32859 -<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="63709">
32860 +<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="63832">
32861 <summary>
32862 Do not audit attempts to send and receive postgresql_server packets.
32863 </summary>
32864 @@ -49840,7 +49657,7 @@ Domain to not audit.
32865 </param>
32866 <infoflow type="none"/>
32867 </interface>
32868 -<interface name="corenet_relabelto_postgresql_server_packets" lineno="63724">
32869 +<interface name="corenet_relabelto_postgresql_server_packets" lineno="63847">
32870 <summary>
32871 Relabel packets to postgresql_server the packet type.
32872 </summary>
32873 @@ -49850,7 +49667,7 @@ Domain allowed access.
32874 </summary>
32875 </param>
32876 </interface>
32877 -<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="63746">
32878 +<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="63869">
32879 <summary>
32880 Send and receive TCP traffic on the postgrey port.
32881 </summary>
32882 @@ -49861,7 +49678,7 @@ Domain allowed access.
32883 </param>
32884 <infoflow type="both" weight="10"/>
32885 </interface>
32886 -<interface name="corenet_udp_send_postgrey_port" lineno="63761">
32887 +<interface name="corenet_udp_send_postgrey_port" lineno="63884">
32888 <summary>
32889 Send UDP traffic on the postgrey port.
32890 </summary>
32891 @@ -49872,7 +49689,7 @@ Domain allowed access.
32892 </param>
32893 <infoflow type="write" weight="10"/>
32894 </interface>
32895 -<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="63776">
32896 +<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="63899">
32897 <summary>
32898 Do not audit attempts to send UDP traffic on the postgrey port.
32899 </summary>
32900 @@ -49883,7 +49700,7 @@ Domain to not audit.
32901 </param>
32902 <infoflow type="none"/>
32903 </interface>
32904 -<interface name="corenet_udp_receive_postgrey_port" lineno="63791">
32905 +<interface name="corenet_udp_receive_postgrey_port" lineno="63914">
32906 <summary>
32907 Receive UDP traffic on the postgrey port.
32908 </summary>
32909 @@ -49894,7 +49711,7 @@ Domain allowed access.
32910 </param>
32911 <infoflow type="read" weight="10"/>
32912 </interface>
32913 -<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="63806">
32914 +<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="63929">
32915 <summary>
32916 Do not audit attempts to receive UDP traffic on the postgrey port.
32917 </summary>
32918 @@ -49905,7 +49722,7 @@ Domain to not audit.
32919 </param>
32920 <infoflow type="none"/>
32921 </interface>
32922 -<interface name="corenet_udp_sendrecv_postgrey_port" lineno="63821">
32923 +<interface name="corenet_udp_sendrecv_postgrey_port" lineno="63944">
32924 <summary>
32925 Send and receive UDP traffic on the postgrey port.
32926 </summary>
32927 @@ -49916,7 +49733,7 @@ Domain allowed access.
32928 </param>
32929 <infoflow type="both" weight="10"/>
32930 </interface>
32931 -<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="63837">
32932 +<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="63960">
32933 <summary>
32934 Do not audit attempts to send and receive
32935 UDP traffic on the postgrey port.
32936 @@ -49928,7 +49745,7 @@ Domain to not audit.
32937 </param>
32938 <infoflow type="none"/>
32939 </interface>
32940 -<interface name="corenet_tcp_bind_postgrey_port" lineno="63852">
32941 +<interface name="corenet_tcp_bind_postgrey_port" lineno="63975">
32942 <summary>
32943 Bind TCP sockets to the postgrey port.
32944 </summary>
32945 @@ -49939,7 +49756,7 @@ Domain allowed access.
32946 </param>
32947 <infoflow type="none"/>
32948 </interface>
32949 -<interface name="corenet_udp_bind_postgrey_port" lineno="63872">
32950 +<interface name="corenet_udp_bind_postgrey_port" lineno="63995">
32951 <summary>
32952 Bind UDP sockets to the postgrey port.
32953 </summary>
32954 @@ -49950,7 +49767,7 @@ Domain allowed access.
32955 </param>
32956 <infoflow type="none"/>
32957 </interface>
32958 -<interface name="corenet_tcp_connect_postgrey_port" lineno="63891">
32959 +<interface name="corenet_tcp_connect_postgrey_port" lineno="64014">
32960 <summary>
32961 Make a TCP connection to the postgrey port.
32962 </summary>
32963 @@ -49960,7 +49777,7 @@ Domain allowed access.
32964 </summary>
32965 </param>
32966 </interface>
32967 -<interface name="corenet_send_postgrey_client_packets" lineno="63911">
32968 +<interface name="corenet_send_postgrey_client_packets" lineno="64034">
32969 <summary>
32970 Send postgrey_client packets.
32971 </summary>
32972 @@ -49971,7 +49788,7 @@ Domain allowed access.
32973 </param>
32974 <infoflow type="write" weight="10"/>
32975 </interface>
32976 -<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="63930">
32977 +<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="64053">
32978 <summary>
32979 Do not audit attempts to send postgrey_client packets.
32980 </summary>
32981 @@ -49982,7 +49799,7 @@ Domain to not audit.
32982 </param>
32983 <infoflow type="none"/>
32984 </interface>
32985 -<interface name="corenet_receive_postgrey_client_packets" lineno="63949">
32986 +<interface name="corenet_receive_postgrey_client_packets" lineno="64072">
32987 <summary>
32988 Receive postgrey_client packets.
32989 </summary>
32990 @@ -49993,7 +49810,7 @@ Domain allowed access.
32991 </param>
32992 <infoflow type="read" weight="10"/>
32993 </interface>
32994 -<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="63968">
32995 +<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="64091">
32996 <summary>
32997 Do not audit attempts to receive postgrey_client packets.
32998 </summary>
32999 @@ -50004,7 +49821,7 @@ Domain allowed access.
33000 </param>
33001 <infoflow type="none"/>
33002 </interface>
33003 -<interface name="corenet_sendrecv_postgrey_client_packets" lineno="63987">
33004 +<interface name="corenet_sendrecv_postgrey_client_packets" lineno="64110">
33005 <summary>
33006 Send and receive postgrey_client packets.
33007 </summary>
33008 @@ -50015,7 +49832,7 @@ Domain allowed access.
33009 </param>
33010 <infoflow type="both" weight="10"/>
33011 </interface>
33012 -<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="64003">
33013 +<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="64126">
33014 <summary>
33015 Do not audit attempts to send and receive postgrey_client packets.
33016 </summary>
33017 @@ -50026,7 +49843,7 @@ Domain to not audit.
33018 </param>
33019 <infoflow type="none"/>
33020 </interface>
33021 -<interface name="corenet_relabelto_postgrey_client_packets" lineno="64018">
33022 +<interface name="corenet_relabelto_postgrey_client_packets" lineno="64141">
33023 <summary>
33024 Relabel packets to postgrey_client the packet type.
33025 </summary>
33026 @@ -50036,7 +49853,7 @@ Domain allowed access.
33027 </summary>
33028 </param>
33029 </interface>
33030 -<interface name="corenet_send_postgrey_server_packets" lineno="64038">
33031 +<interface name="corenet_send_postgrey_server_packets" lineno="64161">
33032 <summary>
33033 Send postgrey_server packets.
33034 </summary>
33035 @@ -50047,7 +49864,7 @@ Domain allowed access.
33036 </param>
33037 <infoflow type="write" weight="10"/>
33038 </interface>
33039 -<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="64057">
33040 +<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="64180">
33041 <summary>
33042 Do not audit attempts to send postgrey_server packets.
33043 </summary>
33044 @@ -50058,7 +49875,7 @@ Domain to not audit.
33045 </param>
33046 <infoflow type="none"/>
33047 </interface>
33048 -<interface name="corenet_receive_postgrey_server_packets" lineno="64076">
33049 +<interface name="corenet_receive_postgrey_server_packets" lineno="64199">
33050 <summary>
33051 Receive postgrey_server packets.
33052 </summary>
33053 @@ -50069,7 +49886,7 @@ Domain allowed access.
33054 </param>
33055 <infoflow type="read" weight="10"/>
33056 </interface>
33057 -<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="64095">
33058 +<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="64218">
33059 <summary>
33060 Do not audit attempts to receive postgrey_server packets.
33061 </summary>
33062 @@ -50080,7 +49897,7 @@ Domain allowed access.
33063 </param>
33064 <infoflow type="none"/>
33065 </interface>
33066 -<interface name="corenet_sendrecv_postgrey_server_packets" lineno="64114">
33067 +<interface name="corenet_sendrecv_postgrey_server_packets" lineno="64237">
33068 <summary>
33069 Send and receive postgrey_server packets.
33070 </summary>
33071 @@ -50091,7 +49908,7 @@ Domain allowed access.
33072 </param>
33073 <infoflow type="both" weight="10"/>
33074 </interface>
33075 -<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="64130">
33076 +<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="64253">
33077 <summary>
33078 Do not audit attempts to send and receive postgrey_server packets.
33079 </summary>
33080 @@ -50102,7 +49919,7 @@ Domain to not audit.
33081 </param>
33082 <infoflow type="none"/>
33083 </interface>
33084 -<interface name="corenet_relabelto_postgrey_server_packets" lineno="64145">
33085 +<interface name="corenet_relabelto_postgrey_server_packets" lineno="64268">
33086 <summary>
33087 Relabel packets to postgrey_server the packet type.
33088 </summary>
33089 @@ -50112,7 +49929,7 @@ Domain allowed access.
33090 </summary>
33091 </param>
33092 </interface>
33093 -<interface name="corenet_tcp_sendrecv_pptp_port" lineno="64167">
33094 +<interface name="corenet_tcp_sendrecv_pptp_port" lineno="64290">
33095 <summary>
33096 Send and receive TCP traffic on the pptp port.
33097 </summary>
33098 @@ -50123,7 +49940,7 @@ Domain allowed access.
33099 </param>
33100 <infoflow type="both" weight="10"/>
33101 </interface>
33102 -<interface name="corenet_udp_send_pptp_port" lineno="64182">
33103 +<interface name="corenet_udp_send_pptp_port" lineno="64305">
33104 <summary>
33105 Send UDP traffic on the pptp port.
33106 </summary>
33107 @@ -50134,7 +49951,7 @@ Domain allowed access.
33108 </param>
33109 <infoflow type="write" weight="10"/>
33110 </interface>
33111 -<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="64197">
33112 +<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="64320">
33113 <summary>
33114 Do not audit attempts to send UDP traffic on the pptp port.
33115 </summary>
33116 @@ -50145,7 +49962,7 @@ Domain to not audit.
33117 </param>
33118 <infoflow type="none"/>
33119 </interface>
33120 -<interface name="corenet_udp_receive_pptp_port" lineno="64212">
33121 +<interface name="corenet_udp_receive_pptp_port" lineno="64335">
33122 <summary>
33123 Receive UDP traffic on the pptp port.
33124 </summary>
33125 @@ -50156,7 +49973,7 @@ Domain allowed access.
33126 </param>
33127 <infoflow type="read" weight="10"/>
33128 </interface>
33129 -<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="64227">
33130 +<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="64350">
33131 <summary>
33132 Do not audit attempts to receive UDP traffic on the pptp port.
33133 </summary>
33134 @@ -50167,7 +49984,7 @@ Domain to not audit.
33135 </param>
33136 <infoflow type="none"/>
33137 </interface>
33138 -<interface name="corenet_udp_sendrecv_pptp_port" lineno="64242">
33139 +<interface name="corenet_udp_sendrecv_pptp_port" lineno="64365">
33140 <summary>
33141 Send and receive UDP traffic on the pptp port.
33142 </summary>
33143 @@ -50178,7 +49995,7 @@ Domain allowed access.
33144 </param>
33145 <infoflow type="both" weight="10"/>
33146 </interface>
33147 -<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="64258">
33148 +<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="64381">
33149 <summary>
33150 Do not audit attempts to send and receive
33151 UDP traffic on the pptp port.
33152 @@ -50190,7 +50007,7 @@ Domain to not audit.
33153 </param>
33154 <infoflow type="none"/>
33155 </interface>
33156 -<interface name="corenet_tcp_bind_pptp_port" lineno="64273">
33157 +<interface name="corenet_tcp_bind_pptp_port" lineno="64396">
33158 <summary>
33159 Bind TCP sockets to the pptp port.
33160 </summary>
33161 @@ -50201,7 +50018,7 @@ Domain allowed access.
33162 </param>
33163 <infoflow type="none"/>
33164 </interface>
33165 -<interface name="corenet_udp_bind_pptp_port" lineno="64293">
33166 +<interface name="corenet_udp_bind_pptp_port" lineno="64416">
33167 <summary>
33168 Bind UDP sockets to the pptp port.
33169 </summary>
33170 @@ -50212,7 +50029,7 @@ Domain allowed access.
33171 </param>
33172 <infoflow type="none"/>
33173 </interface>
33174 -<interface name="corenet_tcp_connect_pptp_port" lineno="64312">
33175 +<interface name="corenet_tcp_connect_pptp_port" lineno="64435">
33176 <summary>
33177 Make a TCP connection to the pptp port.
33178 </summary>
33179 @@ -50222,7 +50039,7 @@ Domain allowed access.
33180 </summary>
33181 </param>
33182 </interface>
33183 -<interface name="corenet_send_pptp_client_packets" lineno="64332">
33184 +<interface name="corenet_send_pptp_client_packets" lineno="64455">
33185 <summary>
33186 Send pptp_client packets.
33187 </summary>
33188 @@ -50233,7 +50050,7 @@ Domain allowed access.
33189 </param>
33190 <infoflow type="write" weight="10"/>
33191 </interface>
33192 -<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="64351">
33193 +<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="64474">
33194 <summary>
33195 Do not audit attempts to send pptp_client packets.
33196 </summary>
33197 @@ -50244,7 +50061,7 @@ Domain to not audit.
33198 </param>
33199 <infoflow type="none"/>
33200 </interface>
33201 -<interface name="corenet_receive_pptp_client_packets" lineno="64370">
33202 +<interface name="corenet_receive_pptp_client_packets" lineno="64493">
33203 <summary>
33204 Receive pptp_client packets.
33205 </summary>
33206 @@ -50255,7 +50072,7 @@ Domain allowed access.
33207 </param>
33208 <infoflow type="read" weight="10"/>
33209 </interface>
33210 -<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="64389">
33211 +<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="64512">
33212 <summary>
33213 Do not audit attempts to receive pptp_client packets.
33214 </summary>
33215 @@ -50266,7 +50083,7 @@ Domain allowed access.
33216 </param>
33217 <infoflow type="none"/>
33218 </interface>
33219 -<interface name="corenet_sendrecv_pptp_client_packets" lineno="64408">
33220 +<interface name="corenet_sendrecv_pptp_client_packets" lineno="64531">
33221 <summary>
33222 Send and receive pptp_client packets.
33223 </summary>
33224 @@ -50277,7 +50094,7 @@ Domain allowed access.
33225 </param>
33226 <infoflow type="both" weight="10"/>
33227 </interface>
33228 -<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="64424">
33229 +<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="64547">
33230 <summary>
33231 Do not audit attempts to send and receive pptp_client packets.
33232 </summary>
33233 @@ -50288,7 +50105,7 @@ Domain to not audit.
33234 </param>
33235 <infoflow type="none"/>
33236 </interface>
33237 -<interface name="corenet_relabelto_pptp_client_packets" lineno="64439">
33238 +<interface name="corenet_relabelto_pptp_client_packets" lineno="64562">
33239 <summary>
33240 Relabel packets to pptp_client the packet type.
33241 </summary>
33242 @@ -50298,7 +50115,7 @@ Domain allowed access.
33243 </summary>
33244 </param>
33245 </interface>
33246 -<interface name="corenet_send_pptp_server_packets" lineno="64459">
33247 +<interface name="corenet_send_pptp_server_packets" lineno="64582">
33248 <summary>
33249 Send pptp_server packets.
33250 </summary>
33251 @@ -50309,7 +50126,7 @@ Domain allowed access.
33252 </param>
33253 <infoflow type="write" weight="10"/>
33254 </interface>
33255 -<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="64478">
33256 +<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="64601">
33257 <summary>
33258 Do not audit attempts to send pptp_server packets.
33259 </summary>
33260 @@ -50320,7 +50137,7 @@ Domain to not audit.
33261 </param>
33262 <infoflow type="none"/>
33263 </interface>
33264 -<interface name="corenet_receive_pptp_server_packets" lineno="64497">
33265 +<interface name="corenet_receive_pptp_server_packets" lineno="64620">
33266 <summary>
33267 Receive pptp_server packets.
33268 </summary>
33269 @@ -50331,7 +50148,7 @@ Domain allowed access.
33270 </param>
33271 <infoflow type="read" weight="10"/>
33272 </interface>
33273 -<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="64516">
33274 +<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="64639">
33275 <summary>
33276 Do not audit attempts to receive pptp_server packets.
33277 </summary>
33278 @@ -50342,7 +50159,7 @@ Domain allowed access.
33279 </param>
33280 <infoflow type="none"/>
33281 </interface>
33282 -<interface name="corenet_sendrecv_pptp_server_packets" lineno="64535">
33283 +<interface name="corenet_sendrecv_pptp_server_packets" lineno="64658">
33284 <summary>
33285 Send and receive pptp_server packets.
33286 </summary>
33287 @@ -50353,7 +50170,7 @@ Domain allowed access.
33288 </param>
33289 <infoflow type="both" weight="10"/>
33290 </interface>
33291 -<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="64551">
33292 +<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="64674">
33293 <summary>
33294 Do not audit attempts to send and receive pptp_server packets.
33295 </summary>
33296 @@ -50364,7 +50181,7 @@ Domain to not audit.
33297 </param>
33298 <infoflow type="none"/>
33299 </interface>
33300 -<interface name="corenet_relabelto_pptp_server_packets" lineno="64566">
33301 +<interface name="corenet_relabelto_pptp_server_packets" lineno="64689">
33302 <summary>
33303 Relabel packets to pptp_server the packet type.
33304 </summary>
33305 @@ -50374,7 +50191,7 @@ Domain allowed access.
33306 </summary>
33307 </param>
33308 </interface>
33309 -<interface name="corenet_tcp_sendrecv_prelude_port" lineno="64588">
33310 +<interface name="corenet_tcp_sendrecv_prelude_port" lineno="64711">
33311 <summary>
33312 Send and receive TCP traffic on the prelude port.
33313 </summary>
33314 @@ -50385,7 +50202,7 @@ Domain allowed access.
33315 </param>
33316 <infoflow type="both" weight="10"/>
33317 </interface>
33318 -<interface name="corenet_udp_send_prelude_port" lineno="64603">
33319 +<interface name="corenet_udp_send_prelude_port" lineno="64726">
33320 <summary>
33321 Send UDP traffic on the prelude port.
33322 </summary>
33323 @@ -50396,7 +50213,7 @@ Domain allowed access.
33324 </param>
33325 <infoflow type="write" weight="10"/>
33326 </interface>
33327 -<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="64618">
33328 +<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="64741">
33329 <summary>
33330 Do not audit attempts to send UDP traffic on the prelude port.
33331 </summary>
33332 @@ -50407,7 +50224,7 @@ Domain to not audit.
33333 </param>
33334 <infoflow type="none"/>
33335 </interface>
33336 -<interface name="corenet_udp_receive_prelude_port" lineno="64633">
33337 +<interface name="corenet_udp_receive_prelude_port" lineno="64756">
33338 <summary>
33339 Receive UDP traffic on the prelude port.
33340 </summary>
33341 @@ -50418,7 +50235,7 @@ Domain allowed access.
33342 </param>
33343 <infoflow type="read" weight="10"/>
33344 </interface>
33345 -<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="64648">
33346 +<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="64771">
33347 <summary>
33348 Do not audit attempts to receive UDP traffic on the prelude port.
33349 </summary>
33350 @@ -50429,7 +50246,7 @@ Domain to not audit.
33351 </param>
33352 <infoflow type="none"/>
33353 </interface>
33354 -<interface name="corenet_udp_sendrecv_prelude_port" lineno="64663">
33355 +<interface name="corenet_udp_sendrecv_prelude_port" lineno="64786">
33356 <summary>
33357 Send and receive UDP traffic on the prelude port.
33358 </summary>
33359 @@ -50440,7 +50257,7 @@ Domain allowed access.
33360 </param>
33361 <infoflow type="both" weight="10"/>
33362 </interface>
33363 -<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="64679">
33364 +<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="64802">
33365 <summary>
33366 Do not audit attempts to send and receive
33367 UDP traffic on the prelude port.
33368 @@ -50452,7 +50269,7 @@ Domain to not audit.
33369 </param>
33370 <infoflow type="none"/>
33371 </interface>
33372 -<interface name="corenet_tcp_bind_prelude_port" lineno="64694">
33373 +<interface name="corenet_tcp_bind_prelude_port" lineno="64817">
33374 <summary>
33375 Bind TCP sockets to the prelude port.
33376 </summary>
33377 @@ -50463,7 +50280,7 @@ Domain allowed access.
33378 </param>
33379 <infoflow type="none"/>
33380 </interface>
33381 -<interface name="corenet_udp_bind_prelude_port" lineno="64714">
33382 +<interface name="corenet_udp_bind_prelude_port" lineno="64837">
33383 <summary>
33384 Bind UDP sockets to the prelude port.
33385 </summary>
33386 @@ -50474,7 +50291,7 @@ Domain allowed access.
33387 </param>
33388 <infoflow type="none"/>
33389 </interface>
33390 -<interface name="corenet_tcp_connect_prelude_port" lineno="64733">
33391 +<interface name="corenet_tcp_connect_prelude_port" lineno="64856">
33392 <summary>
33393 Make a TCP connection to the prelude port.
33394 </summary>
33395 @@ -50484,7 +50301,7 @@ Domain allowed access.
33396 </summary>
33397 </param>
33398 </interface>
33399 -<interface name="corenet_send_prelude_client_packets" lineno="64753">
33400 +<interface name="corenet_send_prelude_client_packets" lineno="64876">
33401 <summary>
33402 Send prelude_client packets.
33403 </summary>
33404 @@ -50495,7 +50312,7 @@ Domain allowed access.
33405 </param>
33406 <infoflow type="write" weight="10"/>
33407 </interface>
33408 -<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="64772">
33409 +<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="64895">
33410 <summary>
33411 Do not audit attempts to send prelude_client packets.
33412 </summary>
33413 @@ -50506,7 +50323,7 @@ Domain to not audit.
33414 </param>
33415 <infoflow type="none"/>
33416 </interface>
33417 -<interface name="corenet_receive_prelude_client_packets" lineno="64791">
33418 +<interface name="corenet_receive_prelude_client_packets" lineno="64914">
33419 <summary>
33420 Receive prelude_client packets.
33421 </summary>
33422 @@ -50517,7 +50334,7 @@ Domain allowed access.
33423 </param>
33424 <infoflow type="read" weight="10"/>
33425 </interface>
33426 -<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="64810">
33427 +<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="64933">
33428 <summary>
33429 Do not audit attempts to receive prelude_client packets.
33430 </summary>
33431 @@ -50528,7 +50345,7 @@ Domain allowed access.
33432 </param>
33433 <infoflow type="none"/>
33434 </interface>
33435 -<interface name="corenet_sendrecv_prelude_client_packets" lineno="64829">
33436 +<interface name="corenet_sendrecv_prelude_client_packets" lineno="64952">
33437 <summary>
33438 Send and receive prelude_client packets.
33439 </summary>
33440 @@ -50539,7 +50356,7 @@ Domain allowed access.
33441 </param>
33442 <infoflow type="both" weight="10"/>
33443 </interface>
33444 -<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="64845">
33445 +<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="64968">
33446 <summary>
33447 Do not audit attempts to send and receive prelude_client packets.
33448 </summary>
33449 @@ -50550,7 +50367,7 @@ Domain to not audit.
33450 </param>
33451 <infoflow type="none"/>
33452 </interface>
33453 -<interface name="corenet_relabelto_prelude_client_packets" lineno="64860">
33454 +<interface name="corenet_relabelto_prelude_client_packets" lineno="64983">
33455 <summary>
33456 Relabel packets to prelude_client the packet type.
33457 </summary>
33458 @@ -50560,7 +50377,7 @@ Domain allowed access.
33459 </summary>
33460 </param>
33461 </interface>
33462 -<interface name="corenet_send_prelude_server_packets" lineno="64880">
33463 +<interface name="corenet_send_prelude_server_packets" lineno="65003">
33464 <summary>
33465 Send prelude_server packets.
33466 </summary>
33467 @@ -50571,7 +50388,7 @@ Domain allowed access.
33468 </param>
33469 <infoflow type="write" weight="10"/>
33470 </interface>
33471 -<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="64899">
33472 +<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="65022">
33473 <summary>
33474 Do not audit attempts to send prelude_server packets.
33475 </summary>
33476 @@ -50582,7 +50399,7 @@ Domain to not audit.
33477 </param>
33478 <infoflow type="none"/>
33479 </interface>
33480 -<interface name="corenet_receive_prelude_server_packets" lineno="64918">
33481 +<interface name="corenet_receive_prelude_server_packets" lineno="65041">
33482 <summary>
33483 Receive prelude_server packets.
33484 </summary>
33485 @@ -50593,7 +50410,7 @@ Domain allowed access.
33486 </param>
33487 <infoflow type="read" weight="10"/>
33488 </interface>
33489 -<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="64937">
33490 +<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="65060">
33491 <summary>
33492 Do not audit attempts to receive prelude_server packets.
33493 </summary>
33494 @@ -50604,7 +50421,7 @@ Domain allowed access.
33495 </param>
33496 <infoflow type="none"/>
33497 </interface>
33498 -<interface name="corenet_sendrecv_prelude_server_packets" lineno="64956">
33499 +<interface name="corenet_sendrecv_prelude_server_packets" lineno="65079">
33500 <summary>
33501 Send and receive prelude_server packets.
33502 </summary>
33503 @@ -50615,7 +50432,7 @@ Domain allowed access.
33504 </param>
33505 <infoflow type="both" weight="10"/>
33506 </interface>
33507 -<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="64972">
33508 +<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="65095">
33509 <summary>
33510 Do not audit attempts to send and receive prelude_server packets.
33511 </summary>
33512 @@ -50626,7 +50443,7 @@ Domain to not audit.
33513 </param>
33514 <infoflow type="none"/>
33515 </interface>
33516 -<interface name="corenet_relabelto_prelude_server_packets" lineno="64987">
33517 +<interface name="corenet_relabelto_prelude_server_packets" lineno="65110">
33518 <summary>
33519 Relabel packets to prelude_server the packet type.
33520 </summary>
33521 @@ -50636,7 +50453,7 @@ Domain allowed access.
33522 </summary>
33523 </param>
33524 </interface>
33525 -<interface name="corenet_tcp_sendrecv_presence_port" lineno="65009">
33526 +<interface name="corenet_tcp_sendrecv_presence_port" lineno="65132">
33527 <summary>
33528 Send and receive TCP traffic on the presence port.
33529 </summary>
33530 @@ -50647,7 +50464,7 @@ Domain allowed access.
33531 </param>
33532 <infoflow type="both" weight="10"/>
33533 </interface>
33534 -<interface name="corenet_udp_send_presence_port" lineno="65024">
33535 +<interface name="corenet_udp_send_presence_port" lineno="65147">
33536 <summary>
33537 Send UDP traffic on the presence port.
33538 </summary>
33539 @@ -50658,7 +50475,7 @@ Domain allowed access.
33540 </param>
33541 <infoflow type="write" weight="10"/>
33542 </interface>
33543 -<interface name="corenet_dontaudit_udp_send_presence_port" lineno="65039">
33544 +<interface name="corenet_dontaudit_udp_send_presence_port" lineno="65162">
33545 <summary>
33546 Do not audit attempts to send UDP traffic on the presence port.
33547 </summary>
33548 @@ -50669,7 +50486,7 @@ Domain to not audit.
33549 </param>
33550 <infoflow type="none"/>
33551 </interface>
33552 -<interface name="corenet_udp_receive_presence_port" lineno="65054">
33553 +<interface name="corenet_udp_receive_presence_port" lineno="65177">
33554 <summary>
33555 Receive UDP traffic on the presence port.
33556 </summary>
33557 @@ -50680,7 +50497,7 @@ Domain allowed access.
33558 </param>
33559 <infoflow type="read" weight="10"/>
33560 </interface>
33561 -<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="65069">
33562 +<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="65192">
33563 <summary>
33564 Do not audit attempts to receive UDP traffic on the presence port.
33565 </summary>
33566 @@ -50691,7 +50508,7 @@ Domain to not audit.
33567 </param>
33568 <infoflow type="none"/>
33569 </interface>
33570 -<interface name="corenet_udp_sendrecv_presence_port" lineno="65084">
33571 +<interface name="corenet_udp_sendrecv_presence_port" lineno="65207">
33572 <summary>
33573 Send and receive UDP traffic on the presence port.
33574 </summary>
33575 @@ -50702,7 +50519,7 @@ Domain allowed access.
33576 </param>
33577 <infoflow type="both" weight="10"/>
33578 </interface>
33579 -<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="65100">
33580 +<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="65223">
33581 <summary>
33582 Do not audit attempts to send and receive
33583 UDP traffic on the presence port.
33584 @@ -50714,7 +50531,7 @@ Domain to not audit.
33585 </param>
33586 <infoflow type="none"/>
33587 </interface>
33588 -<interface name="corenet_tcp_bind_presence_port" lineno="65115">
33589 +<interface name="corenet_tcp_bind_presence_port" lineno="65238">
33590 <summary>
33591 Bind TCP sockets to the presence port.
33592 </summary>
33593 @@ -50725,7 +50542,7 @@ Domain allowed access.
33594 </param>
33595 <infoflow type="none"/>
33596 </interface>
33597 -<interface name="corenet_udp_bind_presence_port" lineno="65135">
33598 +<interface name="corenet_udp_bind_presence_port" lineno="65258">
33599 <summary>
33600 Bind UDP sockets to the presence port.
33601 </summary>
33602 @@ -50736,7 +50553,7 @@ Domain allowed access.
33603 </param>
33604 <infoflow type="none"/>
33605 </interface>
33606 -<interface name="corenet_tcp_connect_presence_port" lineno="65154">
33607 +<interface name="corenet_tcp_connect_presence_port" lineno="65277">
33608 <summary>
33609 Make a TCP connection to the presence port.
33610 </summary>
33611 @@ -50746,7 +50563,7 @@ Domain allowed access.
33612 </summary>
33613 </param>
33614 </interface>
33615 -<interface name="corenet_send_presence_client_packets" lineno="65174">
33616 +<interface name="corenet_send_presence_client_packets" lineno="65297">
33617 <summary>
33618 Send presence_client packets.
33619 </summary>
33620 @@ -50757,7 +50574,7 @@ Domain allowed access.
33621 </param>
33622 <infoflow type="write" weight="10"/>
33623 </interface>
33624 -<interface name="corenet_dontaudit_send_presence_client_packets" lineno="65193">
33625 +<interface name="corenet_dontaudit_send_presence_client_packets" lineno="65316">
33626 <summary>
33627 Do not audit attempts to send presence_client packets.
33628 </summary>
33629 @@ -50768,7 +50585,7 @@ Domain to not audit.
33630 </param>
33631 <infoflow type="none"/>
33632 </interface>
33633 -<interface name="corenet_receive_presence_client_packets" lineno="65212">
33634 +<interface name="corenet_receive_presence_client_packets" lineno="65335">
33635 <summary>
33636 Receive presence_client packets.
33637 </summary>
33638 @@ -50779,7 +50596,7 @@ Domain allowed access.
33639 </param>
33640 <infoflow type="read" weight="10"/>
33641 </interface>
33642 -<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="65231">
33643 +<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="65354">
33644 <summary>
33645 Do not audit attempts to receive presence_client packets.
33646 </summary>
33647 @@ -50790,7 +50607,7 @@ Domain allowed access.
33648 </param>
33649 <infoflow type="none"/>
33650 </interface>
33651 -<interface name="corenet_sendrecv_presence_client_packets" lineno="65250">
33652 +<interface name="corenet_sendrecv_presence_client_packets" lineno="65373">
33653 <summary>
33654 Send and receive presence_client packets.
33655 </summary>
33656 @@ -50801,7 +50618,7 @@ Domain allowed access.
33657 </param>
33658 <infoflow type="both" weight="10"/>
33659 </interface>
33660 -<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="65266">
33661 +<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="65389">
33662 <summary>
33663 Do not audit attempts to send and receive presence_client packets.
33664 </summary>
33665 @@ -50812,7 +50629,7 @@ Domain to not audit.
33666 </param>
33667 <infoflow type="none"/>
33668 </interface>
33669 -<interface name="corenet_relabelto_presence_client_packets" lineno="65281">
33670 +<interface name="corenet_relabelto_presence_client_packets" lineno="65404">
33671 <summary>
33672 Relabel packets to presence_client the packet type.
33673 </summary>
33674 @@ -50822,7 +50639,7 @@ Domain allowed access.
33675 </summary>
33676 </param>
33677 </interface>
33678 -<interface name="corenet_send_presence_server_packets" lineno="65301">
33679 +<interface name="corenet_send_presence_server_packets" lineno="65424">
33680 <summary>
33681 Send presence_server packets.
33682 </summary>
33683 @@ -50833,7 +50650,7 @@ Domain allowed access.
33684 </param>
33685 <infoflow type="write" weight="10"/>
33686 </interface>
33687 -<interface name="corenet_dontaudit_send_presence_server_packets" lineno="65320">
33688 +<interface name="corenet_dontaudit_send_presence_server_packets" lineno="65443">
33689 <summary>
33690 Do not audit attempts to send presence_server packets.
33691 </summary>
33692 @@ -50844,7 +50661,7 @@ Domain to not audit.
33693 </param>
33694 <infoflow type="none"/>
33695 </interface>
33696 -<interface name="corenet_receive_presence_server_packets" lineno="65339">
33697 +<interface name="corenet_receive_presence_server_packets" lineno="65462">
33698 <summary>
33699 Receive presence_server packets.
33700 </summary>
33701 @@ -50855,7 +50672,7 @@ Domain allowed access.
33702 </param>
33703 <infoflow type="read" weight="10"/>
33704 </interface>
33705 -<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="65358">
33706 +<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="65481">
33707 <summary>
33708 Do not audit attempts to receive presence_server packets.
33709 </summary>
33710 @@ -50866,7 +50683,7 @@ Domain allowed access.
33711 </param>
33712 <infoflow type="none"/>
33713 </interface>
33714 -<interface name="corenet_sendrecv_presence_server_packets" lineno="65377">
33715 +<interface name="corenet_sendrecv_presence_server_packets" lineno="65500">
33716 <summary>
33717 Send and receive presence_server packets.
33718 </summary>
33719 @@ -50877,7 +50694,7 @@ Domain allowed access.
33720 </param>
33721 <infoflow type="both" weight="10"/>
33722 </interface>
33723 -<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="65393">
33724 +<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="65516">
33725 <summary>
33726 Do not audit attempts to send and receive presence_server packets.
33727 </summary>
33728 @@ -50888,7 +50705,7 @@ Domain to not audit.
33729 </param>
33730 <infoflow type="none"/>
33731 </interface>
33732 -<interface name="corenet_relabelto_presence_server_packets" lineno="65408">
33733 +<interface name="corenet_relabelto_presence_server_packets" lineno="65531">
33734 <summary>
33735 Relabel packets to presence_server the packet type.
33736 </summary>
33737 @@ -50898,7 +50715,7 @@ Domain allowed access.
33738 </summary>
33739 </param>
33740 </interface>
33741 -<interface name="corenet_tcp_sendrecv_printer_port" lineno="65430">
33742 +<interface name="corenet_tcp_sendrecv_printer_port" lineno="65553">
33743 <summary>
33744 Send and receive TCP traffic on the printer port.
33745 </summary>
33746 @@ -50909,7 +50726,7 @@ Domain allowed access.
33747 </param>
33748 <infoflow type="both" weight="10"/>
33749 </interface>
33750 -<interface name="corenet_udp_send_printer_port" lineno="65445">
33751 +<interface name="corenet_udp_send_printer_port" lineno="65568">
33752 <summary>
33753 Send UDP traffic on the printer port.
33754 </summary>
33755 @@ -50920,7 +50737,7 @@ Domain allowed access.
33756 </param>
33757 <infoflow type="write" weight="10"/>
33758 </interface>
33759 -<interface name="corenet_dontaudit_udp_send_printer_port" lineno="65460">
33760 +<interface name="corenet_dontaudit_udp_send_printer_port" lineno="65583">
33761 <summary>
33762 Do not audit attempts to send UDP traffic on the printer port.
33763 </summary>
33764 @@ -50931,7 +50748,7 @@ Domain to not audit.
33765 </param>
33766 <infoflow type="none"/>
33767 </interface>
33768 -<interface name="corenet_udp_receive_printer_port" lineno="65475">
33769 +<interface name="corenet_udp_receive_printer_port" lineno="65598">
33770 <summary>
33771 Receive UDP traffic on the printer port.
33772 </summary>
33773 @@ -50942,7 +50759,7 @@ Domain allowed access.
33774 </param>
33775 <infoflow type="read" weight="10"/>
33776 </interface>
33777 -<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="65490">
33778 +<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="65613">
33779 <summary>
33780 Do not audit attempts to receive UDP traffic on the printer port.
33781 </summary>
33782 @@ -50953,7 +50770,7 @@ Domain to not audit.
33783 </param>
33784 <infoflow type="none"/>
33785 </interface>
33786 -<interface name="corenet_udp_sendrecv_printer_port" lineno="65505">
33787 +<interface name="corenet_udp_sendrecv_printer_port" lineno="65628">
33788 <summary>
33789 Send and receive UDP traffic on the printer port.
33790 </summary>
33791 @@ -50964,7 +50781,7 @@ Domain allowed access.
33792 </param>
33793 <infoflow type="both" weight="10"/>
33794 </interface>
33795 -<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="65521">
33796 +<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="65644">
33797 <summary>
33798 Do not audit attempts to send and receive
33799 UDP traffic on the printer port.
33800 @@ -50976,7 +50793,7 @@ Domain to not audit.
33801 </param>
33802 <infoflow type="none"/>
33803 </interface>
33804 -<interface name="corenet_tcp_bind_printer_port" lineno="65536">
33805 +<interface name="corenet_tcp_bind_printer_port" lineno="65659">
33806 <summary>
33807 Bind TCP sockets to the printer port.
33808 </summary>
33809 @@ -50987,7 +50804,7 @@ Domain allowed access.
33810 </param>
33811 <infoflow type="none"/>
33812 </interface>
33813 -<interface name="corenet_udp_bind_printer_port" lineno="65556">
33814 +<interface name="corenet_udp_bind_printer_port" lineno="65679">
33815 <summary>
33816 Bind UDP sockets to the printer port.
33817 </summary>
33818 @@ -50998,7 +50815,7 @@ Domain allowed access.
33819 </param>
33820 <infoflow type="none"/>
33821 </interface>
33822 -<interface name="corenet_tcp_connect_printer_port" lineno="65575">
33823 +<interface name="corenet_tcp_connect_printer_port" lineno="65698">
33824 <summary>
33825 Make a TCP connection to the printer port.
33826 </summary>
33827 @@ -51008,7 +50825,7 @@ Domain allowed access.
33828 </summary>
33829 </param>
33830 </interface>
33831 -<interface name="corenet_send_printer_client_packets" lineno="65595">
33832 +<interface name="corenet_send_printer_client_packets" lineno="65718">
33833 <summary>
33834 Send printer_client packets.
33835 </summary>
33836 @@ -51019,7 +50836,7 @@ Domain allowed access.
33837 </param>
33838 <infoflow type="write" weight="10"/>
33839 </interface>
33840 -<interface name="corenet_dontaudit_send_printer_client_packets" lineno="65614">
33841 +<interface name="corenet_dontaudit_send_printer_client_packets" lineno="65737">
33842 <summary>
33843 Do not audit attempts to send printer_client packets.
33844 </summary>
33845 @@ -51030,7 +50847,7 @@ Domain to not audit.
33846 </param>
33847 <infoflow type="none"/>
33848 </interface>
33849 -<interface name="corenet_receive_printer_client_packets" lineno="65633">
33850 +<interface name="corenet_receive_printer_client_packets" lineno="65756">
33851 <summary>
33852 Receive printer_client packets.
33853 </summary>
33854 @@ -51041,7 +50858,7 @@ Domain allowed access.
33855 </param>
33856 <infoflow type="read" weight="10"/>
33857 </interface>
33858 -<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="65652">
33859 +<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="65775">
33860 <summary>
33861 Do not audit attempts to receive printer_client packets.
33862 </summary>
33863 @@ -51052,7 +50869,7 @@ Domain allowed access.
33864 </param>
33865 <infoflow type="none"/>
33866 </interface>
33867 -<interface name="corenet_sendrecv_printer_client_packets" lineno="65671">
33868 +<interface name="corenet_sendrecv_printer_client_packets" lineno="65794">
33869 <summary>
33870 Send and receive printer_client packets.
33871 </summary>
33872 @@ -51063,7 +50880,7 @@ Domain allowed access.
33873 </param>
33874 <infoflow type="both" weight="10"/>
33875 </interface>
33876 -<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="65687">
33877 +<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="65810">
33878 <summary>
33879 Do not audit attempts to send and receive printer_client packets.
33880 </summary>
33881 @@ -51074,7 +50891,7 @@ Domain to not audit.
33882 </param>
33883 <infoflow type="none"/>
33884 </interface>
33885 -<interface name="corenet_relabelto_printer_client_packets" lineno="65702">
33886 +<interface name="corenet_relabelto_printer_client_packets" lineno="65825">
33887 <summary>
33888 Relabel packets to printer_client the packet type.
33889 </summary>
33890 @@ -51084,7 +50901,7 @@ Domain allowed access.
33891 </summary>
33892 </param>
33893 </interface>
33894 -<interface name="corenet_send_printer_server_packets" lineno="65722">
33895 +<interface name="corenet_send_printer_server_packets" lineno="65845">
33896 <summary>
33897 Send printer_server packets.
33898 </summary>
33899 @@ -51095,7 +50912,7 @@ Domain allowed access.
33900 </param>
33901 <infoflow type="write" weight="10"/>
33902 </interface>
33903 -<interface name="corenet_dontaudit_send_printer_server_packets" lineno="65741">
33904 +<interface name="corenet_dontaudit_send_printer_server_packets" lineno="65864">
33905 <summary>
33906 Do not audit attempts to send printer_server packets.
33907 </summary>
33908 @@ -51106,7 +50923,7 @@ Domain to not audit.
33909 </param>
33910 <infoflow type="none"/>
33911 </interface>
33912 -<interface name="corenet_receive_printer_server_packets" lineno="65760">
33913 +<interface name="corenet_receive_printer_server_packets" lineno="65883">
33914 <summary>
33915 Receive printer_server packets.
33916 </summary>
33917 @@ -51117,7 +50934,7 @@ Domain allowed access.
33918 </param>
33919 <infoflow type="read" weight="10"/>
33920 </interface>
33921 -<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="65779">
33922 +<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="65902">
33923 <summary>
33924 Do not audit attempts to receive printer_server packets.
33925 </summary>
33926 @@ -51128,7 +50945,7 @@ Domain allowed access.
33927 </param>
33928 <infoflow type="none"/>
33929 </interface>
33930 -<interface name="corenet_sendrecv_printer_server_packets" lineno="65798">
33931 +<interface name="corenet_sendrecv_printer_server_packets" lineno="65921">
33932 <summary>
33933 Send and receive printer_server packets.
33934 </summary>
33935 @@ -51139,7 +50956,7 @@ Domain allowed access.
33936 </param>
33937 <infoflow type="both" weight="10"/>
33938 </interface>
33939 -<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="65814">
33940 +<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="65937">
33941 <summary>
33942 Do not audit attempts to send and receive printer_server packets.
33943 </summary>
33944 @@ -51150,7 +50967,7 @@ Domain to not audit.
33945 </param>
33946 <infoflow type="none"/>
33947 </interface>
33948 -<interface name="corenet_relabelto_printer_server_packets" lineno="65829">
33949 +<interface name="corenet_relabelto_printer_server_packets" lineno="65952">
33950 <summary>
33951 Relabel packets to printer_server the packet type.
33952 </summary>
33953 @@ -51160,7 +50977,7 @@ Domain allowed access.
33954 </summary>
33955 </param>
33956 </interface>
33957 -<interface name="corenet_tcp_sendrecv_ptal_port" lineno="65851">
33958 +<interface name="corenet_tcp_sendrecv_ptal_port" lineno="65974">
33959 <summary>
33960 Send and receive TCP traffic on the ptal port.
33961 </summary>
33962 @@ -51171,7 +50988,7 @@ Domain allowed access.
33963 </param>
33964 <infoflow type="both" weight="10"/>
33965 </interface>
33966 -<interface name="corenet_udp_send_ptal_port" lineno="65866">
33967 +<interface name="corenet_udp_send_ptal_port" lineno="65989">
33968 <summary>
33969 Send UDP traffic on the ptal port.
33970 </summary>
33971 @@ -51182,7 +50999,7 @@ Domain allowed access.
33972 </param>
33973 <infoflow type="write" weight="10"/>
33974 </interface>
33975 -<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="65881">
33976 +<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="66004">
33977 <summary>
33978 Do not audit attempts to send UDP traffic on the ptal port.
33979 </summary>
33980 @@ -51193,7 +51010,7 @@ Domain to not audit.
33981 </param>
33982 <infoflow type="none"/>
33983 </interface>
33984 -<interface name="corenet_udp_receive_ptal_port" lineno="65896">
33985 +<interface name="corenet_udp_receive_ptal_port" lineno="66019">
33986 <summary>
33987 Receive UDP traffic on the ptal port.
33988 </summary>
33989 @@ -51204,7 +51021,7 @@ Domain allowed access.
33990 </param>
33991 <infoflow type="read" weight="10"/>
33992 </interface>
33993 -<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="65911">
33994 +<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="66034">
33995 <summary>
33996 Do not audit attempts to receive UDP traffic on the ptal port.
33997 </summary>
33998 @@ -51215,7 +51032,7 @@ Domain to not audit.
33999 </param>
34000 <infoflow type="none"/>
34001 </interface>
34002 -<interface name="corenet_udp_sendrecv_ptal_port" lineno="65926">
34003 +<interface name="corenet_udp_sendrecv_ptal_port" lineno="66049">
34004 <summary>
34005 Send and receive UDP traffic on the ptal port.
34006 </summary>
34007 @@ -51226,7 +51043,7 @@ Domain allowed access.
34008 </param>
34009 <infoflow type="both" weight="10"/>
34010 </interface>
34011 -<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="65942">
34012 +<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="66065">
34013 <summary>
34014 Do not audit attempts to send and receive
34015 UDP traffic on the ptal port.
34016 @@ -51238,7 +51055,7 @@ Domain to not audit.
34017 </param>
34018 <infoflow type="none"/>
34019 </interface>
34020 -<interface name="corenet_tcp_bind_ptal_port" lineno="65957">
34021 +<interface name="corenet_tcp_bind_ptal_port" lineno="66080">
34022 <summary>
34023 Bind TCP sockets to the ptal port.
34024 </summary>
34025 @@ -51249,7 +51066,7 @@ Domain allowed access.
34026 </param>
34027 <infoflow type="none"/>
34028 </interface>
34029 -<interface name="corenet_udp_bind_ptal_port" lineno="65977">
34030 +<interface name="corenet_udp_bind_ptal_port" lineno="66100">
34031 <summary>
34032 Bind UDP sockets to the ptal port.
34033 </summary>
34034 @@ -51260,7 +51077,7 @@ Domain allowed access.
34035 </param>
34036 <infoflow type="none"/>
34037 </interface>
34038 -<interface name="corenet_tcp_connect_ptal_port" lineno="65996">
34039 +<interface name="corenet_tcp_connect_ptal_port" lineno="66119">
34040 <summary>
34041 Make a TCP connection to the ptal port.
34042 </summary>
34043 @@ -51270,7 +51087,7 @@ Domain allowed access.
34044 </summary>
34045 </param>
34046 </interface>
34047 -<interface name="corenet_send_ptal_client_packets" lineno="66016">
34048 +<interface name="corenet_send_ptal_client_packets" lineno="66139">
34049 <summary>
34050 Send ptal_client packets.
34051 </summary>
34052 @@ -51281,7 +51098,7 @@ Domain allowed access.
34053 </param>
34054 <infoflow type="write" weight="10"/>
34055 </interface>
34056 -<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="66035">
34057 +<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="66158">
34058 <summary>
34059 Do not audit attempts to send ptal_client packets.
34060 </summary>
34061 @@ -51292,7 +51109,7 @@ Domain to not audit.
34062 </param>
34063 <infoflow type="none"/>
34064 </interface>
34065 -<interface name="corenet_receive_ptal_client_packets" lineno="66054">
34066 +<interface name="corenet_receive_ptal_client_packets" lineno="66177">
34067 <summary>
34068 Receive ptal_client packets.
34069 </summary>
34070 @@ -51303,7 +51120,7 @@ Domain allowed access.
34071 </param>
34072 <infoflow type="read" weight="10"/>
34073 </interface>
34074 -<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="66073">
34075 +<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="66196">
34076 <summary>
34077 Do not audit attempts to receive ptal_client packets.
34078 </summary>
34079 @@ -51314,7 +51131,7 @@ Domain allowed access.
34080 </param>
34081 <infoflow type="none"/>
34082 </interface>
34083 -<interface name="corenet_sendrecv_ptal_client_packets" lineno="66092">
34084 +<interface name="corenet_sendrecv_ptal_client_packets" lineno="66215">
34085 <summary>
34086 Send and receive ptal_client packets.
34087 </summary>
34088 @@ -51325,7 +51142,7 @@ Domain allowed access.
34089 </param>
34090 <infoflow type="both" weight="10"/>
34091 </interface>
34092 -<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="66108">
34093 +<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="66231">
34094 <summary>
34095 Do not audit attempts to send and receive ptal_client packets.
34096 </summary>
34097 @@ -51336,7 +51153,7 @@ Domain to not audit.
34098 </param>
34099 <infoflow type="none"/>
34100 </interface>
34101 -<interface name="corenet_relabelto_ptal_client_packets" lineno="66123">
34102 +<interface name="corenet_relabelto_ptal_client_packets" lineno="66246">
34103 <summary>
34104 Relabel packets to ptal_client the packet type.
34105 </summary>
34106 @@ -51346,7 +51163,7 @@ Domain allowed access.
34107 </summary>
34108 </param>
34109 </interface>
34110 -<interface name="corenet_send_ptal_server_packets" lineno="66143">
34111 +<interface name="corenet_send_ptal_server_packets" lineno="66266">
34112 <summary>
34113 Send ptal_server packets.
34114 </summary>
34115 @@ -51357,7 +51174,7 @@ Domain allowed access.
34116 </param>
34117 <infoflow type="write" weight="10"/>
34118 </interface>
34119 -<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="66162">
34120 +<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="66285">
34121 <summary>
34122 Do not audit attempts to send ptal_server packets.
34123 </summary>
34124 @@ -51368,7 +51185,7 @@ Domain to not audit.
34125 </param>
34126 <infoflow type="none"/>
34127 </interface>
34128 -<interface name="corenet_receive_ptal_server_packets" lineno="66181">
34129 +<interface name="corenet_receive_ptal_server_packets" lineno="66304">
34130 <summary>
34131 Receive ptal_server packets.
34132 </summary>
34133 @@ -51379,7 +51196,7 @@ Domain allowed access.
34134 </param>
34135 <infoflow type="read" weight="10"/>
34136 </interface>
34137 -<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="66200">
34138 +<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="66323">
34139 <summary>
34140 Do not audit attempts to receive ptal_server packets.
34141 </summary>
34142 @@ -51390,7 +51207,7 @@ Domain allowed access.
34143 </param>
34144 <infoflow type="none"/>
34145 </interface>
34146 -<interface name="corenet_sendrecv_ptal_server_packets" lineno="66219">
34147 +<interface name="corenet_sendrecv_ptal_server_packets" lineno="66342">
34148 <summary>
34149 Send and receive ptal_server packets.
34150 </summary>
34151 @@ -51401,7 +51218,7 @@ Domain allowed access.
34152 </param>
34153 <infoflow type="both" weight="10"/>
34154 </interface>
34155 -<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="66235">
34156 +<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="66358">
34157 <summary>
34158 Do not audit attempts to send and receive ptal_server packets.
34159 </summary>
34160 @@ -51412,7 +51229,7 @@ Domain to not audit.
34161 </param>
34162 <infoflow type="none"/>
34163 </interface>
34164 -<interface name="corenet_relabelto_ptal_server_packets" lineno="66250">
34165 +<interface name="corenet_relabelto_ptal_server_packets" lineno="66373">
34166 <summary>
34167 Relabel packets to ptal_server the packet type.
34168 </summary>
34169 @@ -51422,7 +51239,7 @@ Domain allowed access.
34170 </summary>
34171 </param>
34172 </interface>
34173 -<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="66272">
34174 +<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="66395">
34175 <summary>
34176 Send and receive TCP traffic on the pulseaudio port.
34177 </summary>
34178 @@ -51433,7 +51250,7 @@ Domain allowed access.
34179 </param>
34180 <infoflow type="both" weight="10"/>
34181 </interface>
34182 -<interface name="corenet_udp_send_pulseaudio_port" lineno="66287">
34183 +<interface name="corenet_udp_send_pulseaudio_port" lineno="66410">
34184 <summary>
34185 Send UDP traffic on the pulseaudio port.
34186 </summary>
34187 @@ -51444,7 +51261,7 @@ Domain allowed access.
34188 </param>
34189 <infoflow type="write" weight="10"/>
34190 </interface>
34191 -<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="66302">
34192 +<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="66425">
34193 <summary>
34194 Do not audit attempts to send UDP traffic on the pulseaudio port.
34195 </summary>
34196 @@ -51455,7 +51272,7 @@ Domain to not audit.
34197 </param>
34198 <infoflow type="none"/>
34199 </interface>
34200 -<interface name="corenet_udp_receive_pulseaudio_port" lineno="66317">
34201 +<interface name="corenet_udp_receive_pulseaudio_port" lineno="66440">
34202 <summary>
34203 Receive UDP traffic on the pulseaudio port.
34204 </summary>
34205 @@ -51466,7 +51283,7 @@ Domain allowed access.
34206 </param>
34207 <infoflow type="read" weight="10"/>
34208 </interface>
34209 -<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="66332">
34210 +<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="66455">
34211 <summary>
34212 Do not audit attempts to receive UDP traffic on the pulseaudio port.
34213 </summary>
34214 @@ -51477,7 +51294,7 @@ Domain to not audit.
34215 </param>
34216 <infoflow type="none"/>
34217 </interface>
34218 -<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="66347">
34219 +<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="66470">
34220 <summary>
34221 Send and receive UDP traffic on the pulseaudio port.
34222 </summary>
34223 @@ -51488,7 +51305,7 @@ Domain allowed access.
34224 </param>
34225 <infoflow type="both" weight="10"/>
34226 </interface>
34227 -<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="66363">
34228 +<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="66486">
34229 <summary>
34230 Do not audit attempts to send and receive
34231 UDP traffic on the pulseaudio port.
34232 @@ -51500,7 +51317,7 @@ Domain to not audit.
34233 </param>
34234 <infoflow type="none"/>
34235 </interface>
34236 -<interface name="corenet_tcp_bind_pulseaudio_port" lineno="66378">
34237 +<interface name="corenet_tcp_bind_pulseaudio_port" lineno="66501">
34238 <summary>
34239 Bind TCP sockets to the pulseaudio port.
34240 </summary>
34241 @@ -51511,7 +51328,7 @@ Domain allowed access.
34242 </param>
34243 <infoflow type="none"/>
34244 </interface>
34245 -<interface name="corenet_udp_bind_pulseaudio_port" lineno="66398">
34246 +<interface name="corenet_udp_bind_pulseaudio_port" lineno="66521">
34247 <summary>
34248 Bind UDP sockets to the pulseaudio port.
34249 </summary>
34250 @@ -51522,7 +51339,7 @@ Domain allowed access.
34251 </param>
34252 <infoflow type="none"/>
34253 </interface>
34254 -<interface name="corenet_tcp_connect_pulseaudio_port" lineno="66417">
34255 +<interface name="corenet_tcp_connect_pulseaudio_port" lineno="66540">
34256 <summary>
34257 Make a TCP connection to the pulseaudio port.
34258 </summary>
34259 @@ -51532,7 +51349,7 @@ Domain allowed access.
34260 </summary>
34261 </param>
34262 </interface>
34263 -<interface name="corenet_send_pulseaudio_client_packets" lineno="66437">
34264 +<interface name="corenet_send_pulseaudio_client_packets" lineno="66560">
34265 <summary>
34266 Send pulseaudio_client packets.
34267 </summary>
34268 @@ -51543,7 +51360,7 @@ Domain allowed access.
34269 </param>
34270 <infoflow type="write" weight="10"/>
34271 </interface>
34272 -<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="66456">
34273 +<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="66579">
34274 <summary>
34275 Do not audit attempts to send pulseaudio_client packets.
34276 </summary>
34277 @@ -51554,7 +51371,7 @@ Domain to not audit.
34278 </param>
34279 <infoflow type="none"/>
34280 </interface>
34281 -<interface name="corenet_receive_pulseaudio_client_packets" lineno="66475">
34282 +<interface name="corenet_receive_pulseaudio_client_packets" lineno="66598">
34283 <summary>
34284 Receive pulseaudio_client packets.
34285 </summary>
34286 @@ -51565,7 +51382,7 @@ Domain allowed access.
34287 </param>
34288 <infoflow type="read" weight="10"/>
34289 </interface>
34290 -<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="66494">
34291 +<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="66617">
34292 <summary>
34293 Do not audit attempts to receive pulseaudio_client packets.
34294 </summary>
34295 @@ -51576,7 +51393,7 @@ Domain allowed access.
34296 </param>
34297 <infoflow type="none"/>
34298 </interface>
34299 -<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="66513">
34300 +<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="66636">
34301 <summary>
34302 Send and receive pulseaudio_client packets.
34303 </summary>
34304 @@ -51587,7 +51404,7 @@ Domain allowed access.
34305 </param>
34306 <infoflow type="both" weight="10"/>
34307 </interface>
34308 -<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="66529">
34309 +<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="66652">
34310 <summary>
34311 Do not audit attempts to send and receive pulseaudio_client packets.
34312 </summary>
34313 @@ -51598,7 +51415,7 @@ Domain to not audit.
34314 </param>
34315 <infoflow type="none"/>
34316 </interface>
34317 -<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="66544">
34318 +<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="66667">
34319 <summary>
34320 Relabel packets to pulseaudio_client the packet type.
34321 </summary>
34322 @@ -51608,7 +51425,7 @@ Domain allowed access.
34323 </summary>
34324 </param>
34325 </interface>
34326 -<interface name="corenet_send_pulseaudio_server_packets" lineno="66564">
34327 +<interface name="corenet_send_pulseaudio_server_packets" lineno="66687">
34328 <summary>
34329 Send pulseaudio_server packets.
34330 </summary>
34331 @@ -51619,7 +51436,7 @@ Domain allowed access.
34332 </param>
34333 <infoflow type="write" weight="10"/>
34334 </interface>
34335 -<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="66583">
34336 +<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="66706">
34337 <summary>
34338 Do not audit attempts to send pulseaudio_server packets.
34339 </summary>
34340 @@ -51630,7 +51447,7 @@ Domain to not audit.
34341 </param>
34342 <infoflow type="none"/>
34343 </interface>
34344 -<interface name="corenet_receive_pulseaudio_server_packets" lineno="66602">
34345 +<interface name="corenet_receive_pulseaudio_server_packets" lineno="66725">
34346 <summary>
34347 Receive pulseaudio_server packets.
34348 </summary>
34349 @@ -51641,7 +51458,7 @@ Domain allowed access.
34350 </param>
34351 <infoflow type="read" weight="10"/>
34352 </interface>
34353 -<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="66621">
34354 +<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="66744">
34355 <summary>
34356 Do not audit attempts to receive pulseaudio_server packets.
34357 </summary>
34358 @@ -51652,7 +51469,7 @@ Domain allowed access.
34359 </param>
34360 <infoflow type="none"/>
34361 </interface>
34362 -<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="66640">
34363 +<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="66763">
34364 <summary>
34365 Send and receive pulseaudio_server packets.
34366 </summary>
34367 @@ -51663,7 +51480,7 @@ Domain allowed access.
34368 </param>
34369 <infoflow type="both" weight="10"/>
34370 </interface>
34371 -<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="66656">
34372 +<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="66779">
34373 <summary>
34374 Do not audit attempts to send and receive pulseaudio_server packets.
34375 </summary>
34376 @@ -51674,7 +51491,7 @@ Domain to not audit.
34377 </param>
34378 <infoflow type="none"/>
34379 </interface>
34380 -<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="66671">
34381 +<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="66794">
34382 <summary>
34383 Relabel packets to pulseaudio_server the packet type.
34384 </summary>
34385 @@ -51684,7 +51501,7 @@ Domain allowed access.
34386 </summary>
34387 </param>
34388 </interface>
34389 -<interface name="corenet_tcp_sendrecv_puppet_port" lineno="66693">
34390 +<interface name="corenet_tcp_sendrecv_puppet_port" lineno="66816">
34391 <summary>
34392 Send and receive TCP traffic on the puppet port.
34393 </summary>
34394 @@ -51695,7 +51512,7 @@ Domain allowed access.
34395 </param>
34396 <infoflow type="both" weight="10"/>
34397 </interface>
34398 -<interface name="corenet_udp_send_puppet_port" lineno="66708">
34399 +<interface name="corenet_udp_send_puppet_port" lineno="66831">
34400 <summary>
34401 Send UDP traffic on the puppet port.
34402 </summary>
34403 @@ -51706,7 +51523,7 @@ Domain allowed access.
34404 </param>
34405 <infoflow type="write" weight="10"/>
34406 </interface>
34407 -<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="66723">
34408 +<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="66846">
34409 <summary>
34410 Do not audit attempts to send UDP traffic on the puppet port.
34411 </summary>
34412 @@ -51717,7 +51534,7 @@ Domain to not audit.
34413 </param>
34414 <infoflow type="none"/>
34415 </interface>
34416 -<interface name="corenet_udp_receive_puppet_port" lineno="66738">
34417 +<interface name="corenet_udp_receive_puppet_port" lineno="66861">
34418 <summary>
34419 Receive UDP traffic on the puppet port.
34420 </summary>
34421 @@ -51728,7 +51545,7 @@ Domain allowed access.
34422 </param>
34423 <infoflow type="read" weight="10"/>
34424 </interface>
34425 -<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="66753">
34426 +<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="66876">
34427 <summary>
34428 Do not audit attempts to receive UDP traffic on the puppet port.
34429 </summary>
34430 @@ -51739,7 +51556,7 @@ Domain to not audit.
34431 </param>
34432 <infoflow type="none"/>
34433 </interface>
34434 -<interface name="corenet_udp_sendrecv_puppet_port" lineno="66768">
34435 +<interface name="corenet_udp_sendrecv_puppet_port" lineno="66891">
34436 <summary>
34437 Send and receive UDP traffic on the puppet port.
34438 </summary>
34439 @@ -51750,7 +51567,7 @@ Domain allowed access.
34440 </param>
34441 <infoflow type="both" weight="10"/>
34442 </interface>
34443 -<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="66784">
34444 +<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="66907">
34445 <summary>
34446 Do not audit attempts to send and receive
34447 UDP traffic on the puppet port.
34448 @@ -51762,7 +51579,7 @@ Domain to not audit.
34449 </param>
34450 <infoflow type="none"/>
34451 </interface>
34452 -<interface name="corenet_tcp_bind_puppet_port" lineno="66799">
34453 +<interface name="corenet_tcp_bind_puppet_port" lineno="66922">
34454 <summary>
34455 Bind TCP sockets to the puppet port.
34456 </summary>
34457 @@ -51773,7 +51590,7 @@ Domain allowed access.
34458 </param>
34459 <infoflow type="none"/>
34460 </interface>
34461 -<interface name="corenet_udp_bind_puppet_port" lineno="66819">
34462 +<interface name="corenet_udp_bind_puppet_port" lineno="66942">
34463 <summary>
34464 Bind UDP sockets to the puppet port.
34465 </summary>
34466 @@ -51784,7 +51601,7 @@ Domain allowed access.
34467 </param>
34468 <infoflow type="none"/>
34469 </interface>
34470 -<interface name="corenet_tcp_connect_puppet_port" lineno="66838">
34471 +<interface name="corenet_tcp_connect_puppet_port" lineno="66961">
34472 <summary>
34473 Make a TCP connection to the puppet port.
34474 </summary>
34475 @@ -51794,7 +51611,7 @@ Domain allowed access.
34476 </summary>
34477 </param>
34478 </interface>
34479 -<interface name="corenet_send_puppet_client_packets" lineno="66858">
34480 +<interface name="corenet_send_puppet_client_packets" lineno="66981">
34481 <summary>
34482 Send puppet_client packets.
34483 </summary>
34484 @@ -51805,7 +51622,7 @@ Domain allowed access.
34485 </param>
34486 <infoflow type="write" weight="10"/>
34487 </interface>
34488 -<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="66877">
34489 +<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="67000">
34490 <summary>
34491 Do not audit attempts to send puppet_client packets.
34492 </summary>
34493 @@ -51816,7 +51633,7 @@ Domain to not audit.
34494 </param>
34495 <infoflow type="none"/>
34496 </interface>
34497 -<interface name="corenet_receive_puppet_client_packets" lineno="66896">
34498 +<interface name="corenet_receive_puppet_client_packets" lineno="67019">
34499 <summary>
34500 Receive puppet_client packets.
34501 </summary>
34502 @@ -51827,7 +51644,7 @@ Domain allowed access.
34503 </param>
34504 <infoflow type="read" weight="10"/>
34505 </interface>
34506 -<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="66915">
34507 +<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="67038">
34508 <summary>
34509 Do not audit attempts to receive puppet_client packets.
34510 </summary>
34511 @@ -51838,7 +51655,7 @@ Domain allowed access.
34512 </param>
34513 <infoflow type="none"/>
34514 </interface>
34515 -<interface name="corenet_sendrecv_puppet_client_packets" lineno="66934">
34516 +<interface name="corenet_sendrecv_puppet_client_packets" lineno="67057">
34517 <summary>
34518 Send and receive puppet_client packets.
34519 </summary>
34520 @@ -51849,7 +51666,7 @@ Domain allowed access.
34521 </param>
34522 <infoflow type="both" weight="10"/>
34523 </interface>
34524 -<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="66950">
34525 +<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="67073">
34526 <summary>
34527 Do not audit attempts to send and receive puppet_client packets.
34528 </summary>
34529 @@ -51860,7 +51677,7 @@ Domain to not audit.
34530 </param>
34531 <infoflow type="none"/>
34532 </interface>
34533 -<interface name="corenet_relabelto_puppet_client_packets" lineno="66965">
34534 +<interface name="corenet_relabelto_puppet_client_packets" lineno="67088">
34535 <summary>
34536 Relabel packets to puppet_client the packet type.
34537 </summary>
34538 @@ -51870,7 +51687,7 @@ Domain allowed access.
34539 </summary>
34540 </param>
34541 </interface>
34542 -<interface name="corenet_send_puppet_server_packets" lineno="66985">
34543 +<interface name="corenet_send_puppet_server_packets" lineno="67108">
34544 <summary>
34545 Send puppet_server packets.
34546 </summary>
34547 @@ -51881,7 +51698,7 @@ Domain allowed access.
34548 </param>
34549 <infoflow type="write" weight="10"/>
34550 </interface>
34551 -<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="67004">
34552 +<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="67127">
34553 <summary>
34554 Do not audit attempts to send puppet_server packets.
34555 </summary>
34556 @@ -51892,7 +51709,7 @@ Domain to not audit.
34557 </param>
34558 <infoflow type="none"/>
34559 </interface>
34560 -<interface name="corenet_receive_puppet_server_packets" lineno="67023">
34561 +<interface name="corenet_receive_puppet_server_packets" lineno="67146">
34562 <summary>
34563 Receive puppet_server packets.
34564 </summary>
34565 @@ -51903,7 +51720,7 @@ Domain allowed access.
34566 </param>
34567 <infoflow type="read" weight="10"/>
34568 </interface>
34569 -<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="67042">
34570 +<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="67165">
34571 <summary>
34572 Do not audit attempts to receive puppet_server packets.
34573 </summary>
34574 @@ -51914,7 +51731,7 @@ Domain allowed access.
34575 </param>
34576 <infoflow type="none"/>
34577 </interface>
34578 -<interface name="corenet_sendrecv_puppet_server_packets" lineno="67061">
34579 +<interface name="corenet_sendrecv_puppet_server_packets" lineno="67184">
34580 <summary>
34581 Send and receive puppet_server packets.
34582 </summary>
34583 @@ -51925,7 +51742,7 @@ Domain allowed access.
34584 </param>
34585 <infoflow type="both" weight="10"/>
34586 </interface>
34587 -<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="67077">
34588 +<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="67200">
34589 <summary>
34590 Do not audit attempts to send and receive puppet_server packets.
34591 </summary>
34592 @@ -51936,7 +51753,7 @@ Domain to not audit.
34593 </param>
34594 <infoflow type="none"/>
34595 </interface>
34596 -<interface name="corenet_relabelto_puppet_server_packets" lineno="67092">
34597 +<interface name="corenet_relabelto_puppet_server_packets" lineno="67215">
34598 <summary>
34599 Relabel packets to puppet_server the packet type.
34600 </summary>
34601 @@ -51946,7 +51763,7 @@ Domain allowed access.
34602 </summary>
34603 </param>
34604 </interface>
34605 -<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="67114">
34606 +<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="67237">
34607 <summary>
34608 Send and receive TCP traffic on the puppetclient port.
34609 </summary>
34610 @@ -51957,7 +51774,7 @@ Domain allowed access.
34611 </param>
34612 <infoflow type="both" weight="10"/>
34613 </interface>
34614 -<interface name="corenet_udp_send_puppetclient_port" lineno="67129">
34615 +<interface name="corenet_udp_send_puppetclient_port" lineno="67252">
34616 <summary>
34617 Send UDP traffic on the puppetclient port.
34618 </summary>
34619 @@ -51968,7 +51785,7 @@ Domain allowed access.
34620 </param>
34621 <infoflow type="write" weight="10"/>
34622 </interface>
34623 -<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="67144">
34624 +<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="67267">
34625 <summary>
34626 Do not audit attempts to send UDP traffic on the puppetclient port.
34627 </summary>
34628 @@ -51979,7 +51796,7 @@ Domain to not audit.
34629 </param>
34630 <infoflow type="none"/>
34631 </interface>
34632 -<interface name="corenet_udp_receive_puppetclient_port" lineno="67159">
34633 +<interface name="corenet_udp_receive_puppetclient_port" lineno="67282">
34634 <summary>
34635 Receive UDP traffic on the puppetclient port.
34636 </summary>
34637 @@ -51990,7 +51807,7 @@ Domain allowed access.
34638 </param>
34639 <infoflow type="read" weight="10"/>
34640 </interface>
34641 -<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="67174">
34642 +<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="67297">
34643 <summary>
34644 Do not audit attempts to receive UDP traffic on the puppetclient port.
34645 </summary>
34646 @@ -52001,7 +51818,7 @@ Domain to not audit.
34647 </param>
34648 <infoflow type="none"/>
34649 </interface>
34650 -<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="67189">
34651 +<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="67312">
34652 <summary>
34653 Send and receive UDP traffic on the puppetclient port.
34654 </summary>
34655 @@ -52012,7 +51829,7 @@ Domain allowed access.
34656 </param>
34657 <infoflow type="both" weight="10"/>
34658 </interface>
34659 -<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="67205">
34660 +<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="67328">
34661 <summary>
34662 Do not audit attempts to send and receive
34663 UDP traffic on the puppetclient port.
34664 @@ -52024,7 +51841,7 @@ Domain to not audit.
34665 </param>
34666 <infoflow type="none"/>
34667 </interface>
34668 -<interface name="corenet_tcp_bind_puppetclient_port" lineno="67220">
34669 +<interface name="corenet_tcp_bind_puppetclient_port" lineno="67343">
34670 <summary>
34671 Bind TCP sockets to the puppetclient port.
34672 </summary>
34673 @@ -52035,7 +51852,7 @@ Domain allowed access.
34674 </param>
34675 <infoflow type="none"/>
34676 </interface>
34677 -<interface name="corenet_udp_bind_puppetclient_port" lineno="67240">
34678 +<interface name="corenet_udp_bind_puppetclient_port" lineno="67363">
34679 <summary>
34680 Bind UDP sockets to the puppetclient port.
34681 </summary>
34682 @@ -52046,7 +51863,7 @@ Domain allowed access.
34683 </param>
34684 <infoflow type="none"/>
34685 </interface>
34686 -<interface name="corenet_tcp_connect_puppetclient_port" lineno="67259">
34687 +<interface name="corenet_tcp_connect_puppetclient_port" lineno="67382">
34688 <summary>
34689 Make a TCP connection to the puppetclient port.
34690 </summary>
34691 @@ -52056,7 +51873,7 @@ Domain allowed access.
34692 </summary>
34693 </param>
34694 </interface>
34695 -<interface name="corenet_send_puppetclient_client_packets" lineno="67279">
34696 +<interface name="corenet_send_puppetclient_client_packets" lineno="67402">
34697 <summary>
34698 Send puppetclient_client packets.
34699 </summary>
34700 @@ -52067,7 +51884,7 @@ Domain allowed access.
34701 </param>
34702 <infoflow type="write" weight="10"/>
34703 </interface>
34704 -<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="67298">
34705 +<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="67421">
34706 <summary>
34707 Do not audit attempts to send puppetclient_client packets.
34708 </summary>
34709 @@ -52078,7 +51895,7 @@ Domain to not audit.
34710 </param>
34711 <infoflow type="none"/>
34712 </interface>
34713 -<interface name="corenet_receive_puppetclient_client_packets" lineno="67317">
34714 +<interface name="corenet_receive_puppetclient_client_packets" lineno="67440">
34715 <summary>
34716 Receive puppetclient_client packets.
34717 </summary>
34718 @@ -52089,7 +51906,7 @@ Domain allowed access.
34719 </param>
34720 <infoflow type="read" weight="10"/>
34721 </interface>
34722 -<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="67336">
34723 +<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="67459">
34724 <summary>
34725 Do not audit attempts to receive puppetclient_client packets.
34726 </summary>
34727 @@ -52100,7 +51917,7 @@ Domain allowed access.
34728 </param>
34729 <infoflow type="none"/>
34730 </interface>
34731 -<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="67355">
34732 +<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="67478">
34733 <summary>
34734 Send and receive puppetclient_client packets.
34735 </summary>
34736 @@ -52111,7 +51928,7 @@ Domain allowed access.
34737 </param>
34738 <infoflow type="both" weight="10"/>
34739 </interface>
34740 -<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="67371">
34741 +<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="67494">
34742 <summary>
34743 Do not audit attempts to send and receive puppetclient_client packets.
34744 </summary>
34745 @@ -52122,7 +51939,7 @@ Domain to not audit.
34746 </param>
34747 <infoflow type="none"/>
34748 </interface>
34749 -<interface name="corenet_relabelto_puppetclient_client_packets" lineno="67386">
34750 +<interface name="corenet_relabelto_puppetclient_client_packets" lineno="67509">
34751 <summary>
34752 Relabel packets to puppetclient_client the packet type.
34753 </summary>
34754 @@ -52132,7 +51949,7 @@ Domain allowed access.
34755 </summary>
34756 </param>
34757 </interface>
34758 -<interface name="corenet_send_puppetclient_server_packets" lineno="67406">
34759 +<interface name="corenet_send_puppetclient_server_packets" lineno="67529">
34760 <summary>
34761 Send puppetclient_server packets.
34762 </summary>
34763 @@ -52143,7 +51960,7 @@ Domain allowed access.
34764 </param>
34765 <infoflow type="write" weight="10"/>
34766 </interface>
34767 -<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="67425">
34768 +<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="67548">
34769 <summary>
34770 Do not audit attempts to send puppetclient_server packets.
34771 </summary>
34772 @@ -52154,7 +51971,7 @@ Domain to not audit.
34773 </param>
34774 <infoflow type="none"/>
34775 </interface>
34776 -<interface name="corenet_receive_puppetclient_server_packets" lineno="67444">
34777 +<interface name="corenet_receive_puppetclient_server_packets" lineno="67567">
34778 <summary>
34779 Receive puppetclient_server packets.
34780 </summary>
34781 @@ -52165,7 +51982,7 @@ Domain allowed access.
34782 </param>
34783 <infoflow type="read" weight="10"/>
34784 </interface>
34785 -<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="67463">
34786 +<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="67586">
34787 <summary>
34788 Do not audit attempts to receive puppetclient_server packets.
34789 </summary>
34790 @@ -52176,7 +51993,7 @@ Domain allowed access.
34791 </param>
34792 <infoflow type="none"/>
34793 </interface>
34794 -<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="67482">
34795 +<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="67605">
34796 <summary>
34797 Send and receive puppetclient_server packets.
34798 </summary>
34799 @@ -52187,7 +52004,7 @@ Domain allowed access.
34800 </param>
34801 <infoflow type="both" weight="10"/>
34802 </interface>
34803 -<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="67498">
34804 +<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="67621">
34805 <summary>
34806 Do not audit attempts to send and receive puppetclient_server packets.
34807 </summary>
34808 @@ -52198,7 +52015,7 @@ Domain to not audit.
34809 </param>
34810 <infoflow type="none"/>
34811 </interface>
34812 -<interface name="corenet_relabelto_puppetclient_server_packets" lineno="67513">
34813 +<interface name="corenet_relabelto_puppetclient_server_packets" lineno="67636">
34814 <summary>
34815 Relabel packets to puppetclient_server the packet type.
34816 </summary>
34817 @@ -52208,7 +52025,7 @@ Domain allowed access.
34818 </summary>
34819 </param>
34820 </interface>
34821 -<interface name="corenet_tcp_sendrecv_pxe_port" lineno="67535">
34822 +<interface name="corenet_tcp_sendrecv_pxe_port" lineno="67658">
34823 <summary>
34824 Send and receive TCP traffic on the pxe port.
34825 </summary>
34826 @@ -52219,7 +52036,7 @@ Domain allowed access.
34827 </param>
34828 <infoflow type="both" weight="10"/>
34829 </interface>
34830 -<interface name="corenet_udp_send_pxe_port" lineno="67550">
34831 +<interface name="corenet_udp_send_pxe_port" lineno="67673">
34832 <summary>
34833 Send UDP traffic on the pxe port.
34834 </summary>
34835 @@ -52230,7 +52047,7 @@ Domain allowed access.
34836 </param>
34837 <infoflow type="write" weight="10"/>
34838 </interface>
34839 -<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="67565">
34840 +<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="67688">
34841 <summary>
34842 Do not audit attempts to send UDP traffic on the pxe port.
34843 </summary>
34844 @@ -52241,7 +52058,7 @@ Domain to not audit.
34845 </param>
34846 <infoflow type="none"/>
34847 </interface>
34848 -<interface name="corenet_udp_receive_pxe_port" lineno="67580">
34849 +<interface name="corenet_udp_receive_pxe_port" lineno="67703">
34850 <summary>
34851 Receive UDP traffic on the pxe port.
34852 </summary>
34853 @@ -52252,7 +52069,7 @@ Domain allowed access.
34854 </param>
34855 <infoflow type="read" weight="10"/>
34856 </interface>
34857 -<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="67595">
34858 +<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="67718">
34859 <summary>
34860 Do not audit attempts to receive UDP traffic on the pxe port.
34861 </summary>
34862 @@ -52263,7 +52080,7 @@ Domain to not audit.
34863 </param>
34864 <infoflow type="none"/>
34865 </interface>
34866 -<interface name="corenet_udp_sendrecv_pxe_port" lineno="67610">
34867 +<interface name="corenet_udp_sendrecv_pxe_port" lineno="67733">
34868 <summary>
34869 Send and receive UDP traffic on the pxe port.
34870 </summary>
34871 @@ -52274,7 +52091,7 @@ Domain allowed access.
34872 </param>
34873 <infoflow type="both" weight="10"/>
34874 </interface>
34875 -<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="67626">
34876 +<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="67749">
34877 <summary>
34878 Do not audit attempts to send and receive
34879 UDP traffic on the pxe port.
34880 @@ -52286,7 +52103,7 @@ Domain to not audit.
34881 </param>
34882 <infoflow type="none"/>
34883 </interface>
34884 -<interface name="corenet_tcp_bind_pxe_port" lineno="67641">
34885 +<interface name="corenet_tcp_bind_pxe_port" lineno="67764">
34886 <summary>
34887 Bind TCP sockets to the pxe port.
34888 </summary>
34889 @@ -52297,7 +52114,7 @@ Domain allowed access.
34890 </param>
34891 <infoflow type="none"/>
34892 </interface>
34893 -<interface name="corenet_udp_bind_pxe_port" lineno="67661">
34894 +<interface name="corenet_udp_bind_pxe_port" lineno="67784">
34895 <summary>
34896 Bind UDP sockets to the pxe port.
34897 </summary>
34898 @@ -52308,7 +52125,7 @@ Domain allowed access.
34899 </param>
34900 <infoflow type="none"/>
34901 </interface>
34902 -<interface name="corenet_tcp_connect_pxe_port" lineno="67680">
34903 +<interface name="corenet_tcp_connect_pxe_port" lineno="67803">
34904 <summary>
34905 Make a TCP connection to the pxe port.
34906 </summary>
34907 @@ -52318,7 +52135,7 @@ Domain allowed access.
34908 </summary>
34909 </param>
34910 </interface>
34911 -<interface name="corenet_send_pxe_client_packets" lineno="67700">
34912 +<interface name="corenet_send_pxe_client_packets" lineno="67823">
34913 <summary>
34914 Send pxe_client packets.
34915 </summary>
34916 @@ -52329,7 +52146,7 @@ Domain allowed access.
34917 </param>
34918 <infoflow type="write" weight="10"/>
34919 </interface>
34920 -<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="67719">
34921 +<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="67842">
34922 <summary>
34923 Do not audit attempts to send pxe_client packets.
34924 </summary>
34925 @@ -52340,7 +52157,7 @@ Domain to not audit.
34926 </param>
34927 <infoflow type="none"/>
34928 </interface>
34929 -<interface name="corenet_receive_pxe_client_packets" lineno="67738">
34930 +<interface name="corenet_receive_pxe_client_packets" lineno="67861">
34931 <summary>
34932 Receive pxe_client packets.
34933 </summary>
34934 @@ -52351,7 +52168,7 @@ Domain allowed access.
34935 </param>
34936 <infoflow type="read" weight="10"/>
34937 </interface>
34938 -<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="67757">
34939 +<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="67880">
34940 <summary>
34941 Do not audit attempts to receive pxe_client packets.
34942 </summary>
34943 @@ -52362,7 +52179,7 @@ Domain allowed access.
34944 </param>
34945 <infoflow type="none"/>
34946 </interface>
34947 -<interface name="corenet_sendrecv_pxe_client_packets" lineno="67776">
34948 +<interface name="corenet_sendrecv_pxe_client_packets" lineno="67899">
34949 <summary>
34950 Send and receive pxe_client packets.
34951 </summary>
34952 @@ -52373,7 +52190,7 @@ Domain allowed access.
34953 </param>
34954 <infoflow type="both" weight="10"/>
34955 </interface>
34956 -<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="67792">
34957 +<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="67915">
34958 <summary>
34959 Do not audit attempts to send and receive pxe_client packets.
34960 </summary>
34961 @@ -52384,7 +52201,7 @@ Domain to not audit.
34962 </param>
34963 <infoflow type="none"/>
34964 </interface>
34965 -<interface name="corenet_relabelto_pxe_client_packets" lineno="67807">
34966 +<interface name="corenet_relabelto_pxe_client_packets" lineno="67930">
34967 <summary>
34968 Relabel packets to pxe_client the packet type.
34969 </summary>
34970 @@ -52394,7 +52211,7 @@ Domain allowed access.
34971 </summary>
34972 </param>
34973 </interface>
34974 -<interface name="corenet_send_pxe_server_packets" lineno="67827">
34975 +<interface name="corenet_send_pxe_server_packets" lineno="67950">
34976 <summary>
34977 Send pxe_server packets.
34978 </summary>
34979 @@ -52405,7 +52222,7 @@ Domain allowed access.
34980 </param>
34981 <infoflow type="write" weight="10"/>
34982 </interface>
34983 -<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="67846">
34984 +<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="67969">
34985 <summary>
34986 Do not audit attempts to send pxe_server packets.
34987 </summary>
34988 @@ -52416,7 +52233,7 @@ Domain to not audit.
34989 </param>
34990 <infoflow type="none"/>
34991 </interface>
34992 -<interface name="corenet_receive_pxe_server_packets" lineno="67865">
34993 +<interface name="corenet_receive_pxe_server_packets" lineno="67988">
34994 <summary>
34995 Receive pxe_server packets.
34996 </summary>
34997 @@ -52427,7 +52244,7 @@ Domain allowed access.
34998 </param>
34999 <infoflow type="read" weight="10"/>
35000 </interface>
35001 -<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="67884">
35002 +<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="68007">
35003 <summary>
35004 Do not audit attempts to receive pxe_server packets.
35005 </summary>
35006 @@ -52438,7 +52255,7 @@ Domain allowed access.
35007 </param>
35008 <infoflow type="none"/>
35009 </interface>
35010 -<interface name="corenet_sendrecv_pxe_server_packets" lineno="67903">
35011 +<interface name="corenet_sendrecv_pxe_server_packets" lineno="68026">
35012 <summary>
35013 Send and receive pxe_server packets.
35014 </summary>
35015 @@ -52449,7 +52266,7 @@ Domain allowed access.
35016 </param>
35017 <infoflow type="both" weight="10"/>
35018 </interface>
35019 -<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="67919">
35020 +<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="68042">
35021 <summary>
35022 Do not audit attempts to send and receive pxe_server packets.
35023 </summary>
35024 @@ -52460,7 +52277,7 @@ Domain to not audit.
35025 </param>
35026 <infoflow type="none"/>
35027 </interface>
35028 -<interface name="corenet_relabelto_pxe_server_packets" lineno="67934">
35029 +<interface name="corenet_relabelto_pxe_server_packets" lineno="68057">
35030 <summary>
35031 Relabel packets to pxe_server the packet type.
35032 </summary>
35033 @@ -52470,7 +52287,7 @@ Domain allowed access.
35034 </summary>
35035 </param>
35036 </interface>
35037 -<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="67956">
35038 +<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="68079">
35039 <summary>
35040 Send and receive TCP traffic on the pyzor port.
35041 </summary>
35042 @@ -52481,7 +52298,7 @@ Domain allowed access.
35043 </param>
35044 <infoflow type="both" weight="10"/>
35045 </interface>
35046 -<interface name="corenet_udp_send_pyzor_port" lineno="67971">
35047 +<interface name="corenet_udp_send_pyzor_port" lineno="68094">
35048 <summary>
35049 Send UDP traffic on the pyzor port.
35050 </summary>
35051 @@ -52492,7 +52309,7 @@ Domain allowed access.
35052 </param>
35053 <infoflow type="write" weight="10"/>
35054 </interface>
35055 -<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="67986">
35056 +<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="68109">
35057 <summary>
35058 Do not audit attempts to send UDP traffic on the pyzor port.
35059 </summary>
35060 @@ -52503,7 +52320,7 @@ Domain to not audit.
35061 </param>
35062 <infoflow type="none"/>
35063 </interface>
35064 -<interface name="corenet_udp_receive_pyzor_port" lineno="68001">
35065 +<interface name="corenet_udp_receive_pyzor_port" lineno="68124">
35066 <summary>
35067 Receive UDP traffic on the pyzor port.
35068 </summary>
35069 @@ -52514,7 +52331,7 @@ Domain allowed access.
35070 </param>
35071 <infoflow type="read" weight="10"/>
35072 </interface>
35073 -<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="68016">
35074 +<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="68139">
35075 <summary>
35076 Do not audit attempts to receive UDP traffic on the pyzor port.
35077 </summary>
35078 @@ -52525,7 +52342,7 @@ Domain to not audit.
35079 </param>
35080 <infoflow type="none"/>
35081 </interface>
35082 -<interface name="corenet_udp_sendrecv_pyzor_port" lineno="68031">
35083 +<interface name="corenet_udp_sendrecv_pyzor_port" lineno="68154">
35084 <summary>
35085 Send and receive UDP traffic on the pyzor port.
35086 </summary>
35087 @@ -52536,7 +52353,7 @@ Domain allowed access.
35088 </param>
35089 <infoflow type="both" weight="10"/>
35090 </interface>
35091 -<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="68047">
35092 +<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="68170">
35093 <summary>
35094 Do not audit attempts to send and receive
35095 UDP traffic on the pyzor port.
35096 @@ -52548,7 +52365,7 @@ Domain to not audit.
35097 </param>
35098 <infoflow type="none"/>
35099 </interface>
35100 -<interface name="corenet_tcp_bind_pyzor_port" lineno="68062">
35101 +<interface name="corenet_tcp_bind_pyzor_port" lineno="68185">
35102 <summary>
35103 Bind TCP sockets to the pyzor port.
35104 </summary>
35105 @@ -52559,7 +52376,7 @@ Domain allowed access.
35106 </param>
35107 <infoflow type="none"/>
35108 </interface>
35109 -<interface name="corenet_udp_bind_pyzor_port" lineno="68082">
35110 +<interface name="corenet_udp_bind_pyzor_port" lineno="68205">
35111 <summary>
35112 Bind UDP sockets to the pyzor port.
35113 </summary>
35114 @@ -52570,7 +52387,7 @@ Domain allowed access.
35115 </param>
35116 <infoflow type="none"/>
35117 </interface>
35118 -<interface name="corenet_tcp_connect_pyzor_port" lineno="68101">
35119 +<interface name="corenet_tcp_connect_pyzor_port" lineno="68224">
35120 <summary>
35121 Make a TCP connection to the pyzor port.
35122 </summary>
35123 @@ -52580,7 +52397,7 @@ Domain allowed access.
35124 </summary>
35125 </param>
35126 </interface>
35127 -<interface name="corenet_send_pyzor_client_packets" lineno="68121">
35128 +<interface name="corenet_send_pyzor_client_packets" lineno="68244">
35129 <summary>
35130 Send pyzor_client packets.
35131 </summary>
35132 @@ -52591,7 +52408,7 @@ Domain allowed access.
35133 </param>
35134 <infoflow type="write" weight="10"/>
35135 </interface>
35136 -<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="68140">
35137 +<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="68263">
35138 <summary>
35139 Do not audit attempts to send pyzor_client packets.
35140 </summary>
35141 @@ -52602,7 +52419,7 @@ Domain to not audit.
35142 </param>
35143 <infoflow type="none"/>
35144 </interface>
35145 -<interface name="corenet_receive_pyzor_client_packets" lineno="68159">
35146 +<interface name="corenet_receive_pyzor_client_packets" lineno="68282">
35147 <summary>
35148 Receive pyzor_client packets.
35149 </summary>
35150 @@ -52613,7 +52430,7 @@ Domain allowed access.
35151 </param>
35152 <infoflow type="read" weight="10"/>
35153 </interface>
35154 -<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="68178">
35155 +<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="68301">
35156 <summary>
35157 Do not audit attempts to receive pyzor_client packets.
35158 </summary>
35159 @@ -52624,7 +52441,7 @@ Domain allowed access.
35160 </param>
35161 <infoflow type="none"/>
35162 </interface>
35163 -<interface name="corenet_sendrecv_pyzor_client_packets" lineno="68197">
35164 +<interface name="corenet_sendrecv_pyzor_client_packets" lineno="68320">
35165 <summary>
35166 Send and receive pyzor_client packets.
35167 </summary>
35168 @@ -52635,7 +52452,7 @@ Domain allowed access.
35169 </param>
35170 <infoflow type="both" weight="10"/>
35171 </interface>
35172 -<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="68213">
35173 +<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="68336">
35174 <summary>
35175 Do not audit attempts to send and receive pyzor_client packets.
35176 </summary>
35177 @@ -52646,7 +52463,7 @@ Domain to not audit.
35178 </param>
35179 <infoflow type="none"/>
35180 </interface>
35181 -<interface name="corenet_relabelto_pyzor_client_packets" lineno="68228">
35182 +<interface name="corenet_relabelto_pyzor_client_packets" lineno="68351">
35183 <summary>
35184 Relabel packets to pyzor_client the packet type.
35185 </summary>
35186 @@ -52656,7 +52473,7 @@ Domain allowed access.
35187 </summary>
35188 </param>
35189 </interface>
35190 -<interface name="corenet_send_pyzor_server_packets" lineno="68248">
35191 +<interface name="corenet_send_pyzor_server_packets" lineno="68371">
35192 <summary>
35193 Send pyzor_server packets.
35194 </summary>
35195 @@ -52667,7 +52484,7 @@ Domain allowed access.
35196 </param>
35197 <infoflow type="write" weight="10"/>
35198 </interface>
35199 -<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="68267">
35200 +<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="68390">
35201 <summary>
35202 Do not audit attempts to send pyzor_server packets.
35203 </summary>
35204 @@ -52678,7 +52495,7 @@ Domain to not audit.
35205 </param>
35206 <infoflow type="none"/>
35207 </interface>
35208 -<interface name="corenet_receive_pyzor_server_packets" lineno="68286">
35209 +<interface name="corenet_receive_pyzor_server_packets" lineno="68409">
35210 <summary>
35211 Receive pyzor_server packets.
35212 </summary>
35213 @@ -52689,7 +52506,7 @@ Domain allowed access.
35214 </param>
35215 <infoflow type="read" weight="10"/>
35216 </interface>
35217 -<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="68305">
35218 +<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="68428">
35219 <summary>
35220 Do not audit attempts to receive pyzor_server packets.
35221 </summary>
35222 @@ -52700,7 +52517,7 @@ Domain allowed access.
35223 </param>
35224 <infoflow type="none"/>
35225 </interface>
35226 -<interface name="corenet_sendrecv_pyzor_server_packets" lineno="68324">
35227 +<interface name="corenet_sendrecv_pyzor_server_packets" lineno="68447">
35228 <summary>
35229 Send and receive pyzor_server packets.
35230 </summary>
35231 @@ -52711,7 +52528,7 @@ Domain allowed access.
35232 </param>
35233 <infoflow type="both" weight="10"/>
35234 </interface>
35235 -<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="68340">
35236 +<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="68463">
35237 <summary>
35238 Do not audit attempts to send and receive pyzor_server packets.
35239 </summary>
35240 @@ -52722,7 +52539,7 @@ Domain to not audit.
35241 </param>
35242 <infoflow type="none"/>
35243 </interface>
35244 -<interface name="corenet_relabelto_pyzor_server_packets" lineno="68355">
35245 +<interface name="corenet_relabelto_pyzor_server_packets" lineno="68478">
35246 <summary>
35247 Relabel packets to pyzor_server the packet type.
35248 </summary>
35249 @@ -52732,7 +52549,7 @@ Domain allowed access.
35250 </summary>
35251 </param>
35252 </interface>
35253 -<interface name="corenet_tcp_sendrecv_radacct_port" lineno="68377">
35254 +<interface name="corenet_tcp_sendrecv_radacct_port" lineno="68500">
35255 <summary>
35256 Send and receive TCP traffic on the radacct port.
35257 </summary>
35258 @@ -52743,7 +52560,7 @@ Domain allowed access.
35259 </param>
35260 <infoflow type="both" weight="10"/>
35261 </interface>
35262 -<interface name="corenet_udp_send_radacct_port" lineno="68392">
35263 +<interface name="corenet_udp_send_radacct_port" lineno="68515">
35264 <summary>
35265 Send UDP traffic on the radacct port.
35266 </summary>
35267 @@ -52754,7 +52571,7 @@ Domain allowed access.
35268 </param>
35269 <infoflow type="write" weight="10"/>
35270 </interface>
35271 -<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="68407">
35272 +<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="68530">
35273 <summary>
35274 Do not audit attempts to send UDP traffic on the radacct port.
35275 </summary>
35276 @@ -52765,7 +52582,7 @@ Domain to not audit.
35277 </param>
35278 <infoflow type="none"/>
35279 </interface>
35280 -<interface name="corenet_udp_receive_radacct_port" lineno="68422">
35281 +<interface name="corenet_udp_receive_radacct_port" lineno="68545">
35282 <summary>
35283 Receive UDP traffic on the radacct port.
35284 </summary>
35285 @@ -52776,7 +52593,7 @@ Domain allowed access.
35286 </param>
35287 <infoflow type="read" weight="10"/>
35288 </interface>
35289 -<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="68437">
35290 +<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="68560">
35291 <summary>
35292 Do not audit attempts to receive UDP traffic on the radacct port.
35293 </summary>
35294 @@ -52787,7 +52604,7 @@ Domain to not audit.
35295 </param>
35296 <infoflow type="none"/>
35297 </interface>
35298 -<interface name="corenet_udp_sendrecv_radacct_port" lineno="68452">
35299 +<interface name="corenet_udp_sendrecv_radacct_port" lineno="68575">
35300 <summary>
35301 Send and receive UDP traffic on the radacct port.
35302 </summary>
35303 @@ -52798,7 +52615,7 @@ Domain allowed access.
35304 </param>
35305 <infoflow type="both" weight="10"/>
35306 </interface>
35307 -<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="68468">
35308 +<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="68591">
35309 <summary>
35310 Do not audit attempts to send and receive
35311 UDP traffic on the radacct port.
35312 @@ -52810,7 +52627,7 @@ Domain to not audit.
35313 </param>
35314 <infoflow type="none"/>
35315 </interface>
35316 -<interface name="corenet_tcp_bind_radacct_port" lineno="68483">
35317 +<interface name="corenet_tcp_bind_radacct_port" lineno="68606">
35318 <summary>
35319 Bind TCP sockets to the radacct port.
35320 </summary>
35321 @@ -52821,7 +52638,7 @@ Domain allowed access.
35322 </param>
35323 <infoflow type="none"/>
35324 </interface>
35325 -<interface name="corenet_udp_bind_radacct_port" lineno="68503">
35326 +<interface name="corenet_udp_bind_radacct_port" lineno="68626">
35327 <summary>
35328 Bind UDP sockets to the radacct port.
35329 </summary>
35330 @@ -52832,7 +52649,7 @@ Domain allowed access.
35331 </param>
35332 <infoflow type="none"/>
35333 </interface>
35334 -<interface name="corenet_tcp_connect_radacct_port" lineno="68522">
35335 +<interface name="corenet_tcp_connect_radacct_port" lineno="68645">
35336 <summary>
35337 Make a TCP connection to the radacct port.
35338 </summary>
35339 @@ -52842,7 +52659,7 @@ Domain allowed access.
35340 </summary>
35341 </param>
35342 </interface>
35343 -<interface name="corenet_send_radacct_client_packets" lineno="68542">
35344 +<interface name="corenet_send_radacct_client_packets" lineno="68665">
35345 <summary>
35346 Send radacct_client packets.
35347 </summary>
35348 @@ -52853,7 +52670,7 @@ Domain allowed access.
35349 </param>
35350 <infoflow type="write" weight="10"/>
35351 </interface>
35352 -<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="68561">
35353 +<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="68684">
35354 <summary>
35355 Do not audit attempts to send radacct_client packets.
35356 </summary>
35357 @@ -52864,7 +52681,7 @@ Domain to not audit.
35358 </param>
35359 <infoflow type="none"/>
35360 </interface>
35361 -<interface name="corenet_receive_radacct_client_packets" lineno="68580">
35362 +<interface name="corenet_receive_radacct_client_packets" lineno="68703">
35363 <summary>
35364 Receive radacct_client packets.
35365 </summary>
35366 @@ -52875,7 +52692,7 @@ Domain allowed access.
35367 </param>
35368 <infoflow type="read" weight="10"/>
35369 </interface>
35370 -<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="68599">
35371 +<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="68722">
35372 <summary>
35373 Do not audit attempts to receive radacct_client packets.
35374 </summary>
35375 @@ -52886,7 +52703,7 @@ Domain allowed access.
35376 </param>
35377 <infoflow type="none"/>
35378 </interface>
35379 -<interface name="corenet_sendrecv_radacct_client_packets" lineno="68618">
35380 +<interface name="corenet_sendrecv_radacct_client_packets" lineno="68741">
35381 <summary>
35382 Send and receive radacct_client packets.
35383 </summary>
35384 @@ -52897,7 +52714,7 @@ Domain allowed access.
35385 </param>
35386 <infoflow type="both" weight="10"/>
35387 </interface>
35388 -<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="68634">
35389 +<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="68757">
35390 <summary>
35391 Do not audit attempts to send and receive radacct_client packets.
35392 </summary>
35393 @@ -52908,7 +52725,7 @@ Domain to not audit.
35394 </param>
35395 <infoflow type="none"/>
35396 </interface>
35397 -<interface name="corenet_relabelto_radacct_client_packets" lineno="68649">
35398 +<interface name="corenet_relabelto_radacct_client_packets" lineno="68772">
35399 <summary>
35400 Relabel packets to radacct_client the packet type.
35401 </summary>
35402 @@ -52918,7 +52735,7 @@ Domain allowed access.
35403 </summary>
35404 </param>
35405 </interface>
35406 -<interface name="corenet_send_radacct_server_packets" lineno="68669">
35407 +<interface name="corenet_send_radacct_server_packets" lineno="68792">
35408 <summary>
35409 Send radacct_server packets.
35410 </summary>
35411 @@ -52929,7 +52746,7 @@ Domain allowed access.
35412 </param>
35413 <infoflow type="write" weight="10"/>
35414 </interface>
35415 -<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="68688">
35416 +<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="68811">
35417 <summary>
35418 Do not audit attempts to send radacct_server packets.
35419 </summary>
35420 @@ -52940,7 +52757,7 @@ Domain to not audit.
35421 </param>
35422 <infoflow type="none"/>
35423 </interface>
35424 -<interface name="corenet_receive_radacct_server_packets" lineno="68707">
35425 +<interface name="corenet_receive_radacct_server_packets" lineno="68830">
35426 <summary>
35427 Receive radacct_server packets.
35428 </summary>
35429 @@ -52951,7 +52768,7 @@ Domain allowed access.
35430 </param>
35431 <infoflow type="read" weight="10"/>
35432 </interface>
35433 -<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="68726">
35434 +<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="68849">
35435 <summary>
35436 Do not audit attempts to receive radacct_server packets.
35437 </summary>
35438 @@ -52962,7 +52779,7 @@ Domain allowed access.
35439 </param>
35440 <infoflow type="none"/>
35441 </interface>
35442 -<interface name="corenet_sendrecv_radacct_server_packets" lineno="68745">
35443 +<interface name="corenet_sendrecv_radacct_server_packets" lineno="68868">
35444 <summary>
35445 Send and receive radacct_server packets.
35446 </summary>
35447 @@ -52973,7 +52790,7 @@ Domain allowed access.
35448 </param>
35449 <infoflow type="both" weight="10"/>
35450 </interface>
35451 -<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="68761">
35452 +<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="68884">
35453 <summary>
35454 Do not audit attempts to send and receive radacct_server packets.
35455 </summary>
35456 @@ -52984,7 +52801,7 @@ Domain to not audit.
35457 </param>
35458 <infoflow type="none"/>
35459 </interface>
35460 -<interface name="corenet_relabelto_radacct_server_packets" lineno="68776">
35461 +<interface name="corenet_relabelto_radacct_server_packets" lineno="68899">
35462 <summary>
35463 Relabel packets to radacct_server the packet type.
35464 </summary>
35465 @@ -52994,7 +52811,7 @@ Domain allowed access.
35466 </summary>
35467 </param>
35468 </interface>
35469 -<interface name="corenet_tcp_sendrecv_radius_port" lineno="68798">
35470 +<interface name="corenet_tcp_sendrecv_radius_port" lineno="68921">
35471 <summary>
35472 Send and receive TCP traffic on the radius port.
35473 </summary>
35474 @@ -53005,7 +52822,7 @@ Domain allowed access.
35475 </param>
35476 <infoflow type="both" weight="10"/>
35477 </interface>
35478 -<interface name="corenet_udp_send_radius_port" lineno="68813">
35479 +<interface name="corenet_udp_send_radius_port" lineno="68936">
35480 <summary>
35481 Send UDP traffic on the radius port.
35482 </summary>
35483 @@ -53016,7 +52833,7 @@ Domain allowed access.
35484 </param>
35485 <infoflow type="write" weight="10"/>
35486 </interface>
35487 -<interface name="corenet_dontaudit_udp_send_radius_port" lineno="68828">
35488 +<interface name="corenet_dontaudit_udp_send_radius_port" lineno="68951">
35489 <summary>
35490 Do not audit attempts to send UDP traffic on the radius port.
35491 </summary>
35492 @@ -53027,7 +52844,7 @@ Domain to not audit.
35493 </param>
35494 <infoflow type="none"/>
35495 </interface>
35496 -<interface name="corenet_udp_receive_radius_port" lineno="68843">
35497 +<interface name="corenet_udp_receive_radius_port" lineno="68966">
35498 <summary>
35499 Receive UDP traffic on the radius port.
35500 </summary>
35501 @@ -53038,7 +52855,7 @@ Domain allowed access.
35502 </param>
35503 <infoflow type="read" weight="10"/>
35504 </interface>
35505 -<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="68858">
35506 +<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="68981">
35507 <summary>
35508 Do not audit attempts to receive UDP traffic on the radius port.
35509 </summary>
35510 @@ -53049,7 +52866,7 @@ Domain to not audit.
35511 </param>
35512 <infoflow type="none"/>
35513 </interface>
35514 -<interface name="corenet_udp_sendrecv_radius_port" lineno="68873">
35515 +<interface name="corenet_udp_sendrecv_radius_port" lineno="68996">
35516 <summary>
35517 Send and receive UDP traffic on the radius port.
35518 </summary>
35519 @@ -53060,7 +52877,7 @@ Domain allowed access.
35520 </param>
35521 <infoflow type="both" weight="10"/>
35522 </interface>
35523 -<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="68889">
35524 +<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="69012">
35525 <summary>
35526 Do not audit attempts to send and receive
35527 UDP traffic on the radius port.
35528 @@ -53072,7 +52889,7 @@ Domain to not audit.
35529 </param>
35530 <infoflow type="none"/>
35531 </interface>
35532 -<interface name="corenet_tcp_bind_radius_port" lineno="68904">
35533 +<interface name="corenet_tcp_bind_radius_port" lineno="69027">
35534 <summary>
35535 Bind TCP sockets to the radius port.
35536 </summary>
35537 @@ -53083,7 +52900,7 @@ Domain allowed access.
35538 </param>
35539 <infoflow type="none"/>
35540 </interface>
35541 -<interface name="corenet_udp_bind_radius_port" lineno="68924">
35542 +<interface name="corenet_udp_bind_radius_port" lineno="69047">
35543 <summary>
35544 Bind UDP sockets to the radius port.
35545 </summary>
35546 @@ -53094,7 +52911,7 @@ Domain allowed access.
35547 </param>
35548 <infoflow type="none"/>
35549 </interface>
35550 -<interface name="corenet_tcp_connect_radius_port" lineno="68943">
35551 +<interface name="corenet_tcp_connect_radius_port" lineno="69066">
35552 <summary>
35553 Make a TCP connection to the radius port.
35554 </summary>
35555 @@ -53104,7 +52921,7 @@ Domain allowed access.
35556 </summary>
35557 </param>
35558 </interface>
35559 -<interface name="corenet_send_radius_client_packets" lineno="68963">
35560 +<interface name="corenet_send_radius_client_packets" lineno="69086">
35561 <summary>
35562 Send radius_client packets.
35563 </summary>
35564 @@ -53115,7 +52932,7 @@ Domain allowed access.
35565 </param>
35566 <infoflow type="write" weight="10"/>
35567 </interface>
35568 -<interface name="corenet_dontaudit_send_radius_client_packets" lineno="68982">
35569 +<interface name="corenet_dontaudit_send_radius_client_packets" lineno="69105">
35570 <summary>
35571 Do not audit attempts to send radius_client packets.
35572 </summary>
35573 @@ -53126,7 +52943,7 @@ Domain to not audit.
35574 </param>
35575 <infoflow type="none"/>
35576 </interface>
35577 -<interface name="corenet_receive_radius_client_packets" lineno="69001">
35578 +<interface name="corenet_receive_radius_client_packets" lineno="69124">
35579 <summary>
35580 Receive radius_client packets.
35581 </summary>
35582 @@ -53137,7 +52954,7 @@ Domain allowed access.
35583 </param>
35584 <infoflow type="read" weight="10"/>
35585 </interface>
35586 -<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="69020">
35587 +<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="69143">
35588 <summary>
35589 Do not audit attempts to receive radius_client packets.
35590 </summary>
35591 @@ -53148,7 +52965,7 @@ Domain allowed access.
35592 </param>
35593 <infoflow type="none"/>
35594 </interface>
35595 -<interface name="corenet_sendrecv_radius_client_packets" lineno="69039">
35596 +<interface name="corenet_sendrecv_radius_client_packets" lineno="69162">
35597 <summary>
35598 Send and receive radius_client packets.
35599 </summary>
35600 @@ -53159,7 +52976,7 @@ Domain allowed access.
35601 </param>
35602 <infoflow type="both" weight="10"/>
35603 </interface>
35604 -<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="69055">
35605 +<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="69178">
35606 <summary>
35607 Do not audit attempts to send and receive radius_client packets.
35608 </summary>
35609 @@ -53170,7 +52987,7 @@ Domain to not audit.
35610 </param>
35611 <infoflow type="none"/>
35612 </interface>
35613 -<interface name="corenet_relabelto_radius_client_packets" lineno="69070">
35614 +<interface name="corenet_relabelto_radius_client_packets" lineno="69193">
35615 <summary>
35616 Relabel packets to radius_client the packet type.
35617 </summary>
35618 @@ -53180,7 +52997,7 @@ Domain allowed access.
35619 </summary>
35620 </param>
35621 </interface>
35622 -<interface name="corenet_send_radius_server_packets" lineno="69090">
35623 +<interface name="corenet_send_radius_server_packets" lineno="69213">
35624 <summary>
35625 Send radius_server packets.
35626 </summary>
35627 @@ -53191,7 +53008,7 @@ Domain allowed access.
35628 </param>
35629 <infoflow type="write" weight="10"/>
35630 </interface>
35631 -<interface name="corenet_dontaudit_send_radius_server_packets" lineno="69109">
35632 +<interface name="corenet_dontaudit_send_radius_server_packets" lineno="69232">
35633 <summary>
35634 Do not audit attempts to send radius_server packets.
35635 </summary>
35636 @@ -53202,7 +53019,7 @@ Domain to not audit.
35637 </param>
35638 <infoflow type="none"/>
35639 </interface>
35640 -<interface name="corenet_receive_radius_server_packets" lineno="69128">
35641 +<interface name="corenet_receive_radius_server_packets" lineno="69251">
35642 <summary>
35643 Receive radius_server packets.
35644 </summary>
35645 @@ -53213,7 +53030,7 @@ Domain allowed access.
35646 </param>
35647 <infoflow type="read" weight="10"/>
35648 </interface>
35649 -<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="69147">
35650 +<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="69270">
35651 <summary>
35652 Do not audit attempts to receive radius_server packets.
35653 </summary>
35654 @@ -53224,7 +53041,7 @@ Domain allowed access.
35655 </param>
35656 <infoflow type="none"/>
35657 </interface>
35658 -<interface name="corenet_sendrecv_radius_server_packets" lineno="69166">
35659 +<interface name="corenet_sendrecv_radius_server_packets" lineno="69289">
35660 <summary>
35661 Send and receive radius_server packets.
35662 </summary>
35663 @@ -53235,7 +53052,7 @@ Domain allowed access.
35664 </param>
35665 <infoflow type="both" weight="10"/>
35666 </interface>
35667 -<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="69182">
35668 +<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="69305">
35669 <summary>
35670 Do not audit attempts to send and receive radius_server packets.
35671 </summary>
35672 @@ -53246,7 +53063,7 @@ Domain to not audit.
35673 </param>
35674 <infoflow type="none"/>
35675 </interface>
35676 -<interface name="corenet_relabelto_radius_server_packets" lineno="69197">
35677 +<interface name="corenet_relabelto_radius_server_packets" lineno="69320">
35678 <summary>
35679 Relabel packets to radius_server the packet type.
35680 </summary>
35681 @@ -53256,7 +53073,7 @@ Domain allowed access.
35682 </summary>
35683 </param>
35684 </interface>
35685 -<interface name="corenet_tcp_sendrecv_radsec_port" lineno="69219">
35686 +<interface name="corenet_tcp_sendrecv_radsec_port" lineno="69342">
35687 <summary>
35688 Send and receive TCP traffic on the radsec port.
35689 </summary>
35690 @@ -53267,7 +53084,7 @@ Domain allowed access.
35691 </param>
35692 <infoflow type="both" weight="10"/>
35693 </interface>
35694 -<interface name="corenet_udp_send_radsec_port" lineno="69234">
35695 +<interface name="corenet_udp_send_radsec_port" lineno="69357">
35696 <summary>
35697 Send UDP traffic on the radsec port.
35698 </summary>
35699 @@ -53278,7 +53095,7 @@ Domain allowed access.
35700 </param>
35701 <infoflow type="write" weight="10"/>
35702 </interface>
35703 -<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="69249">
35704 +<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="69372">
35705 <summary>
35706 Do not audit attempts to send UDP traffic on the radsec port.
35707 </summary>
35708 @@ -53289,7 +53106,7 @@ Domain to not audit.
35709 </param>
35710 <infoflow type="none"/>
35711 </interface>
35712 -<interface name="corenet_udp_receive_radsec_port" lineno="69264">
35713 +<interface name="corenet_udp_receive_radsec_port" lineno="69387">
35714 <summary>
35715 Receive UDP traffic on the radsec port.
35716 </summary>
35717 @@ -53300,7 +53117,7 @@ Domain allowed access.
35718 </param>
35719 <infoflow type="read" weight="10"/>
35720 </interface>
35721 -<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="69279">
35722 +<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="69402">
35723 <summary>
35724 Do not audit attempts to receive UDP traffic on the radsec port.
35725 </summary>
35726 @@ -53311,7 +53128,7 @@ Domain to not audit.
35727 </param>
35728 <infoflow type="none"/>
35729 </interface>
35730 -<interface name="corenet_udp_sendrecv_radsec_port" lineno="69294">
35731 +<interface name="corenet_udp_sendrecv_radsec_port" lineno="69417">
35732 <summary>
35733 Send and receive UDP traffic on the radsec port.
35734 </summary>
35735 @@ -53322,7 +53139,7 @@ Domain allowed access.
35736 </param>
35737 <infoflow type="both" weight="10"/>
35738 </interface>
35739 -<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="69310">
35740 +<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="69433">
35741 <summary>
35742 Do not audit attempts to send and receive
35743 UDP traffic on the radsec port.
35744 @@ -53334,7 +53151,7 @@ Domain to not audit.
35745 </param>
35746 <infoflow type="none"/>
35747 </interface>
35748 -<interface name="corenet_tcp_bind_radsec_port" lineno="69325">
35749 +<interface name="corenet_tcp_bind_radsec_port" lineno="69448">
35750 <summary>
35751 Bind TCP sockets to the radsec port.
35752 </summary>
35753 @@ -53345,7 +53162,7 @@ Domain allowed access.
35754 </param>
35755 <infoflow type="none"/>
35756 </interface>
35757 -<interface name="corenet_udp_bind_radsec_port" lineno="69345">
35758 +<interface name="corenet_udp_bind_radsec_port" lineno="69468">
35759 <summary>
35760 Bind UDP sockets to the radsec port.
35761 </summary>
35762 @@ -53356,7 +53173,7 @@ Domain allowed access.
35763 </param>
35764 <infoflow type="none"/>
35765 </interface>
35766 -<interface name="corenet_tcp_connect_radsec_port" lineno="69364">
35767 +<interface name="corenet_tcp_connect_radsec_port" lineno="69487">
35768 <summary>
35769 Make a TCP connection to the radsec port.
35770 </summary>
35771 @@ -53366,7 +53183,7 @@ Domain allowed access.
35772 </summary>
35773 </param>
35774 </interface>
35775 -<interface name="corenet_send_radsec_client_packets" lineno="69384">
35776 +<interface name="corenet_send_radsec_client_packets" lineno="69507">
35777 <summary>
35778 Send radsec_client packets.
35779 </summary>
35780 @@ -53377,7 +53194,7 @@ Domain allowed access.
35781 </param>
35782 <infoflow type="write" weight="10"/>
35783 </interface>
35784 -<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="69403">
35785 +<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="69526">
35786 <summary>
35787 Do not audit attempts to send radsec_client packets.
35788 </summary>
35789 @@ -53388,7 +53205,7 @@ Domain to not audit.
35790 </param>
35791 <infoflow type="none"/>
35792 </interface>
35793 -<interface name="corenet_receive_radsec_client_packets" lineno="69422">
35794 +<interface name="corenet_receive_radsec_client_packets" lineno="69545">
35795 <summary>
35796 Receive radsec_client packets.
35797 </summary>
35798 @@ -53399,7 +53216,7 @@ Domain allowed access.
35799 </param>
35800 <infoflow type="read" weight="10"/>
35801 </interface>
35802 -<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="69441">
35803 +<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="69564">
35804 <summary>
35805 Do not audit attempts to receive radsec_client packets.
35806 </summary>
35807 @@ -53410,7 +53227,7 @@ Domain allowed access.
35808 </param>
35809 <infoflow type="none"/>
35810 </interface>
35811 -<interface name="corenet_sendrecv_radsec_client_packets" lineno="69460">
35812 +<interface name="corenet_sendrecv_radsec_client_packets" lineno="69583">
35813 <summary>
35814 Send and receive radsec_client packets.
35815 </summary>
35816 @@ -53421,7 +53238,7 @@ Domain allowed access.
35817 </param>
35818 <infoflow type="both" weight="10"/>
35819 </interface>
35820 -<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="69476">
35821 +<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="69599">
35822 <summary>
35823 Do not audit attempts to send and receive radsec_client packets.
35824 </summary>
35825 @@ -53432,7 +53249,7 @@ Domain to not audit.
35826 </param>
35827 <infoflow type="none"/>
35828 </interface>
35829 -<interface name="corenet_relabelto_radsec_client_packets" lineno="69491">
35830 +<interface name="corenet_relabelto_radsec_client_packets" lineno="69614">
35831 <summary>
35832 Relabel packets to radsec_client the packet type.
35833 </summary>
35834 @@ -53442,7 +53259,7 @@ Domain allowed access.
35835 </summary>
35836 </param>
35837 </interface>
35838 -<interface name="corenet_send_radsec_server_packets" lineno="69511">
35839 +<interface name="corenet_send_radsec_server_packets" lineno="69634">
35840 <summary>
35841 Send radsec_server packets.
35842 </summary>
35843 @@ -53453,7 +53270,7 @@ Domain allowed access.
35844 </param>
35845 <infoflow type="write" weight="10"/>
35846 </interface>
35847 -<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="69530">
35848 +<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="69653">
35849 <summary>
35850 Do not audit attempts to send radsec_server packets.
35851 </summary>
35852 @@ -53464,7 +53281,7 @@ Domain to not audit.
35853 </param>
35854 <infoflow type="none"/>
35855 </interface>
35856 -<interface name="corenet_receive_radsec_server_packets" lineno="69549">
35857 +<interface name="corenet_receive_radsec_server_packets" lineno="69672">
35858 <summary>
35859 Receive radsec_server packets.
35860 </summary>
35861 @@ -53475,7 +53292,7 @@ Domain allowed access.
35862 </param>
35863 <infoflow type="read" weight="10"/>
35864 </interface>
35865 -<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="69568">
35866 +<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="69691">
35867 <summary>
35868 Do not audit attempts to receive radsec_server packets.
35869 </summary>
35870 @@ -53486,7 +53303,7 @@ Domain allowed access.
35871 </param>
35872 <infoflow type="none"/>
35873 </interface>
35874 -<interface name="corenet_sendrecv_radsec_server_packets" lineno="69587">
35875 +<interface name="corenet_sendrecv_radsec_server_packets" lineno="69710">
35876 <summary>
35877 Send and receive radsec_server packets.
35878 </summary>
35879 @@ -53497,7 +53314,7 @@ Domain allowed access.
35880 </param>
35881 <infoflow type="both" weight="10"/>
35882 </interface>
35883 -<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="69603">
35884 +<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="69726">
35885 <summary>
35886 Do not audit attempts to send and receive radsec_server packets.
35887 </summary>
35888 @@ -53508,7 +53325,7 @@ Domain to not audit.
35889 </param>
35890 <infoflow type="none"/>
35891 </interface>
35892 -<interface name="corenet_relabelto_radsec_server_packets" lineno="69618">
35893 +<interface name="corenet_relabelto_radsec_server_packets" lineno="69741">
35894 <summary>
35895 Relabel packets to radsec_server the packet type.
35896 </summary>
35897 @@ -53518,7 +53335,7 @@ Domain allowed access.
35898 </summary>
35899 </param>
35900 </interface>
35901 -<interface name="corenet_tcp_sendrecv_razor_port" lineno="69640">
35902 +<interface name="corenet_tcp_sendrecv_razor_port" lineno="69763">
35903 <summary>
35904 Send and receive TCP traffic on the razor port.
35905 </summary>
35906 @@ -53529,7 +53346,7 @@ Domain allowed access.
35907 </param>
35908 <infoflow type="both" weight="10"/>
35909 </interface>
35910 -<interface name="corenet_udp_send_razor_port" lineno="69655">
35911 +<interface name="corenet_udp_send_razor_port" lineno="69778">
35912 <summary>
35913 Send UDP traffic on the razor port.
35914 </summary>
35915 @@ -53540,7 +53357,7 @@ Domain allowed access.
35916 </param>
35917 <infoflow type="write" weight="10"/>
35918 </interface>
35919 -<interface name="corenet_dontaudit_udp_send_razor_port" lineno="69670">
35920 +<interface name="corenet_dontaudit_udp_send_razor_port" lineno="69793">
35921 <summary>
35922 Do not audit attempts to send UDP traffic on the razor port.
35923 </summary>
35924 @@ -53551,7 +53368,7 @@ Domain to not audit.
35925 </param>
35926 <infoflow type="none"/>
35927 </interface>
35928 -<interface name="corenet_udp_receive_razor_port" lineno="69685">
35929 +<interface name="corenet_udp_receive_razor_port" lineno="69808">
35930 <summary>
35931 Receive UDP traffic on the razor port.
35932 </summary>
35933 @@ -53562,7 +53379,7 @@ Domain allowed access.
35934 </param>
35935 <infoflow type="read" weight="10"/>
35936 </interface>
35937 -<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="69700">
35938 +<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="69823">
35939 <summary>
35940 Do not audit attempts to receive UDP traffic on the razor port.
35941 </summary>
35942 @@ -53573,7 +53390,7 @@ Domain to not audit.
35943 </param>
35944 <infoflow type="none"/>
35945 </interface>
35946 -<interface name="corenet_udp_sendrecv_razor_port" lineno="69715">
35947 +<interface name="corenet_udp_sendrecv_razor_port" lineno="69838">
35948 <summary>
35949 Send and receive UDP traffic on the razor port.
35950 </summary>
35951 @@ -53584,7 +53401,7 @@ Domain allowed access.
35952 </param>
35953 <infoflow type="both" weight="10"/>
35954 </interface>
35955 -<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="69731">
35956 +<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="69854">
35957 <summary>
35958 Do not audit attempts to send and receive
35959 UDP traffic on the razor port.
35960 @@ -53596,7 +53413,7 @@ Domain to not audit.
35961 </param>
35962 <infoflow type="none"/>
35963 </interface>
35964 -<interface name="corenet_tcp_bind_razor_port" lineno="69746">
35965 +<interface name="corenet_tcp_bind_razor_port" lineno="69869">
35966 <summary>
35967 Bind TCP sockets to the razor port.
35968 </summary>
35969 @@ -53607,7 +53424,7 @@ Domain allowed access.
35970 </param>
35971 <infoflow type="none"/>
35972 </interface>
35973 -<interface name="corenet_udp_bind_razor_port" lineno="69766">
35974 +<interface name="corenet_udp_bind_razor_port" lineno="69889">
35975 <summary>
35976 Bind UDP sockets to the razor port.
35977 </summary>
35978 @@ -53618,7 +53435,7 @@ Domain allowed access.
35979 </param>
35980 <infoflow type="none"/>
35981 </interface>
35982 -<interface name="corenet_tcp_connect_razor_port" lineno="69785">
35983 +<interface name="corenet_tcp_connect_razor_port" lineno="69908">
35984 <summary>
35985 Make a TCP connection to the razor port.
35986 </summary>
35987 @@ -53628,7 +53445,7 @@ Domain allowed access.
35988 </summary>
35989 </param>
35990 </interface>
35991 -<interface name="corenet_send_razor_client_packets" lineno="69805">
35992 +<interface name="corenet_send_razor_client_packets" lineno="69928">
35993 <summary>
35994 Send razor_client packets.
35995 </summary>
35996 @@ -53639,7 +53456,7 @@ Domain allowed access.
35997 </param>
35998 <infoflow type="write" weight="10"/>
35999 </interface>
36000 -<interface name="corenet_dontaudit_send_razor_client_packets" lineno="69824">
36001 +<interface name="corenet_dontaudit_send_razor_client_packets" lineno="69947">
36002 <summary>
36003 Do not audit attempts to send razor_client packets.
36004 </summary>
36005 @@ -53650,7 +53467,7 @@ Domain to not audit.
36006 </param>
36007 <infoflow type="none"/>
36008 </interface>
36009 -<interface name="corenet_receive_razor_client_packets" lineno="69843">
36010 +<interface name="corenet_receive_razor_client_packets" lineno="69966">
36011 <summary>
36012 Receive razor_client packets.
36013 </summary>
36014 @@ -53661,7 +53478,7 @@ Domain allowed access.
36015 </param>
36016 <infoflow type="read" weight="10"/>
36017 </interface>
36018 -<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="69862">
36019 +<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="69985">
36020 <summary>
36021 Do not audit attempts to receive razor_client packets.
36022 </summary>
36023 @@ -53672,7 +53489,7 @@ Domain allowed access.
36024 </param>
36025 <infoflow type="none"/>
36026 </interface>
36027 -<interface name="corenet_sendrecv_razor_client_packets" lineno="69881">
36028 +<interface name="corenet_sendrecv_razor_client_packets" lineno="70004">
36029 <summary>
36030 Send and receive razor_client packets.
36031 </summary>
36032 @@ -53683,7 +53500,7 @@ Domain allowed access.
36033 </param>
36034 <infoflow type="both" weight="10"/>
36035 </interface>
36036 -<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="69897">
36037 +<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="70020">
36038 <summary>
36039 Do not audit attempts to send and receive razor_client packets.
36040 </summary>
36041 @@ -53694,7 +53511,7 @@ Domain to not audit.
36042 </param>
36043 <infoflow type="none"/>
36044 </interface>
36045 -<interface name="corenet_relabelto_razor_client_packets" lineno="69912">
36046 +<interface name="corenet_relabelto_razor_client_packets" lineno="70035">
36047 <summary>
36048 Relabel packets to razor_client the packet type.
36049 </summary>
36050 @@ -53704,7 +53521,7 @@ Domain allowed access.
36051 </summary>
36052 </param>
36053 </interface>
36054 -<interface name="corenet_send_razor_server_packets" lineno="69932">
36055 +<interface name="corenet_send_razor_server_packets" lineno="70055">
36056 <summary>
36057 Send razor_server packets.
36058 </summary>
36059 @@ -53715,7 +53532,7 @@ Domain allowed access.
36060 </param>
36061 <infoflow type="write" weight="10"/>
36062 </interface>
36063 -<interface name="corenet_dontaudit_send_razor_server_packets" lineno="69951">
36064 +<interface name="corenet_dontaudit_send_razor_server_packets" lineno="70074">
36065 <summary>
36066 Do not audit attempts to send razor_server packets.
36067 </summary>
36068 @@ -53726,7 +53543,7 @@ Domain to not audit.
36069 </param>
36070 <infoflow type="none"/>
36071 </interface>
36072 -<interface name="corenet_receive_razor_server_packets" lineno="69970">
36073 +<interface name="corenet_receive_razor_server_packets" lineno="70093">
36074 <summary>
36075 Receive razor_server packets.
36076 </summary>
36077 @@ -53737,7 +53554,7 @@ Domain allowed access.
36078 </param>
36079 <infoflow type="read" weight="10"/>
36080 </interface>
36081 -<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="69989">
36082 +<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="70112">
36083 <summary>
36084 Do not audit attempts to receive razor_server packets.
36085 </summary>
36086 @@ -53748,7 +53565,7 @@ Domain allowed access.
36087 </param>
36088 <infoflow type="none"/>
36089 </interface>
36090 -<interface name="corenet_sendrecv_razor_server_packets" lineno="70008">
36091 +<interface name="corenet_sendrecv_razor_server_packets" lineno="70131">
36092 <summary>
36093 Send and receive razor_server packets.
36094 </summary>
36095 @@ -53759,7 +53576,7 @@ Domain allowed access.
36096 </param>
36097 <infoflow type="both" weight="10"/>
36098 </interface>
36099 -<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="70024">
36100 +<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="70147">
36101 <summary>
36102 Do not audit attempts to send and receive razor_server packets.
36103 </summary>
36104 @@ -53770,7 +53587,7 @@ Domain to not audit.
36105 </param>
36106 <infoflow type="none"/>
36107 </interface>
36108 -<interface name="corenet_relabelto_razor_server_packets" lineno="70039">
36109 +<interface name="corenet_relabelto_razor_server_packets" lineno="70162">
36110 <summary>
36111 Relabel packets to razor_server the packet type.
36112 </summary>
36113 @@ -53780,7 +53597,7 @@ Domain allowed access.
36114 </summary>
36115 </param>
36116 </interface>
36117 -<interface name="corenet_tcp_sendrecv_redis_port" lineno="70061">
36118 +<interface name="corenet_tcp_sendrecv_redis_port" lineno="70184">
36119 <summary>
36120 Send and receive TCP traffic on the redis port.
36121 </summary>
36122 @@ -53791,7 +53608,7 @@ Domain allowed access.
36123 </param>
36124 <infoflow type="both" weight="10"/>
36125 </interface>
36126 -<interface name="corenet_udp_send_redis_port" lineno="70076">
36127 +<interface name="corenet_udp_send_redis_port" lineno="70199">
36128 <summary>
36129 Send UDP traffic on the redis port.
36130 </summary>
36131 @@ -53802,7 +53619,7 @@ Domain allowed access.
36132 </param>
36133 <infoflow type="write" weight="10"/>
36134 </interface>
36135 -<interface name="corenet_dontaudit_udp_send_redis_port" lineno="70091">
36136 +<interface name="corenet_dontaudit_udp_send_redis_port" lineno="70214">
36137 <summary>
36138 Do not audit attempts to send UDP traffic on the redis port.
36139 </summary>
36140 @@ -53813,7 +53630,7 @@ Domain to not audit.
36141 </param>
36142 <infoflow type="none"/>
36143 </interface>
36144 -<interface name="corenet_udp_receive_redis_port" lineno="70106">
36145 +<interface name="corenet_udp_receive_redis_port" lineno="70229">
36146 <summary>
36147 Receive UDP traffic on the redis port.
36148 </summary>
36149 @@ -53824,7 +53641,7 @@ Domain allowed access.
36150 </param>
36151 <infoflow type="read" weight="10"/>
36152 </interface>
36153 -<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="70121">
36154 +<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="70244">
36155 <summary>
36156 Do not audit attempts to receive UDP traffic on the redis port.
36157 </summary>
36158 @@ -53835,7 +53652,7 @@ Domain to not audit.
36159 </param>
36160 <infoflow type="none"/>
36161 </interface>
36162 -<interface name="corenet_udp_sendrecv_redis_port" lineno="70136">
36163 +<interface name="corenet_udp_sendrecv_redis_port" lineno="70259">
36164 <summary>
36165 Send and receive UDP traffic on the redis port.
36166 </summary>
36167 @@ -53846,7 +53663,7 @@ Domain allowed access.
36168 </param>
36169 <infoflow type="both" weight="10"/>
36170 </interface>
36171 -<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="70152">
36172 +<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="70275">
36173 <summary>
36174 Do not audit attempts to send and receive
36175 UDP traffic on the redis port.
36176 @@ -53858,7 +53675,7 @@ Domain to not audit.
36177 </param>
36178 <infoflow type="none"/>
36179 </interface>
36180 -<interface name="corenet_tcp_bind_redis_port" lineno="70167">
36181 +<interface name="corenet_tcp_bind_redis_port" lineno="70290">
36182 <summary>
36183 Bind TCP sockets to the redis port.
36184 </summary>
36185 @@ -53869,7 +53686,7 @@ Domain allowed access.
36186 </param>
36187 <infoflow type="none"/>
36188 </interface>
36189 -<interface name="corenet_udp_bind_redis_port" lineno="70187">
36190 +<interface name="corenet_udp_bind_redis_port" lineno="70310">
36191 <summary>
36192 Bind UDP sockets to the redis port.
36193 </summary>
36194 @@ -53880,7 +53697,7 @@ Domain allowed access.
36195 </param>
36196 <infoflow type="none"/>
36197 </interface>
36198 -<interface name="corenet_tcp_connect_redis_port" lineno="70206">
36199 +<interface name="corenet_tcp_connect_redis_port" lineno="70329">
36200 <summary>
36201 Make a TCP connection to the redis port.
36202 </summary>
36203 @@ -53890,7 +53707,7 @@ Domain allowed access.
36204 </summary>
36205 </param>
36206 </interface>
36207 -<interface name="corenet_send_redis_client_packets" lineno="70226">
36208 +<interface name="corenet_send_redis_client_packets" lineno="70349">
36209 <summary>
36210 Send redis_client packets.
36211 </summary>
36212 @@ -53901,7 +53718,7 @@ Domain allowed access.
36213 </param>
36214 <infoflow type="write" weight="10"/>
36215 </interface>
36216 -<interface name="corenet_dontaudit_send_redis_client_packets" lineno="70245">
36217 +<interface name="corenet_dontaudit_send_redis_client_packets" lineno="70368">
36218 <summary>
36219 Do not audit attempts to send redis_client packets.
36220 </summary>
36221 @@ -53912,7 +53729,7 @@ Domain to not audit.
36222 </param>
36223 <infoflow type="none"/>
36224 </interface>
36225 -<interface name="corenet_receive_redis_client_packets" lineno="70264">
36226 +<interface name="corenet_receive_redis_client_packets" lineno="70387">
36227 <summary>
36228 Receive redis_client packets.
36229 </summary>
36230 @@ -53923,7 +53740,7 @@ Domain allowed access.
36231 </param>
36232 <infoflow type="read" weight="10"/>
36233 </interface>
36234 -<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="70283">
36235 +<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="70406">
36236 <summary>
36237 Do not audit attempts to receive redis_client packets.
36238 </summary>
36239 @@ -53934,7 +53751,7 @@ Domain allowed access.
36240 </param>
36241 <infoflow type="none"/>
36242 </interface>
36243 -<interface name="corenet_sendrecv_redis_client_packets" lineno="70302">
36244 +<interface name="corenet_sendrecv_redis_client_packets" lineno="70425">
36245 <summary>
36246 Send and receive redis_client packets.
36247 </summary>
36248 @@ -53945,7 +53762,7 @@ Domain allowed access.
36249 </param>
36250 <infoflow type="both" weight="10"/>
36251 </interface>
36252 -<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="70318">
36253 +<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="70441">
36254 <summary>
36255 Do not audit attempts to send and receive redis_client packets.
36256 </summary>
36257 @@ -53956,7 +53773,7 @@ Domain to not audit.
36258 </param>
36259 <infoflow type="none"/>
36260 </interface>
36261 -<interface name="corenet_relabelto_redis_client_packets" lineno="70333">
36262 +<interface name="corenet_relabelto_redis_client_packets" lineno="70456">
36263 <summary>
36264 Relabel packets to redis_client the packet type.
36265 </summary>
36266 @@ -53966,7 +53783,7 @@ Domain allowed access.
36267 </summary>
36268 </param>
36269 </interface>
36270 -<interface name="corenet_send_redis_server_packets" lineno="70353">
36271 +<interface name="corenet_send_redis_server_packets" lineno="70476">
36272 <summary>
36273 Send redis_server packets.
36274 </summary>
36275 @@ -53977,7 +53794,7 @@ Domain allowed access.
36276 </param>
36277 <infoflow type="write" weight="10"/>
36278 </interface>
36279 -<interface name="corenet_dontaudit_send_redis_server_packets" lineno="70372">
36280 +<interface name="corenet_dontaudit_send_redis_server_packets" lineno="70495">
36281 <summary>
36282 Do not audit attempts to send redis_server packets.
36283 </summary>
36284 @@ -53988,7 +53805,7 @@ Domain to not audit.
36285 </param>
36286 <infoflow type="none"/>
36287 </interface>
36288 -<interface name="corenet_receive_redis_server_packets" lineno="70391">
36289 +<interface name="corenet_receive_redis_server_packets" lineno="70514">
36290 <summary>
36291 Receive redis_server packets.
36292 </summary>
36293 @@ -53999,7 +53816,7 @@ Domain allowed access.
36294 </param>
36295 <infoflow type="read" weight="10"/>
36296 </interface>
36297 -<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="70410">
36298 +<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="70533">
36299 <summary>
36300 Do not audit attempts to receive redis_server packets.
36301 </summary>
36302 @@ -54010,7 +53827,7 @@ Domain allowed access.
36303 </param>
36304 <infoflow type="none"/>
36305 </interface>
36306 -<interface name="corenet_sendrecv_redis_server_packets" lineno="70429">
36307 +<interface name="corenet_sendrecv_redis_server_packets" lineno="70552">
36308 <summary>
36309 Send and receive redis_server packets.
36310 </summary>
36311 @@ -54021,7 +53838,7 @@ Domain allowed access.
36312 </param>
36313 <infoflow type="both" weight="10"/>
36314 </interface>
36315 -<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="70445">
36316 +<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="70568">
36317 <summary>
36318 Do not audit attempts to send and receive redis_server packets.
36319 </summary>
36320 @@ -54032,7 +53849,7 @@ Domain to not audit.
36321 </param>
36322 <infoflow type="none"/>
36323 </interface>
36324 -<interface name="corenet_relabelto_redis_server_packets" lineno="70460">
36325 +<interface name="corenet_relabelto_redis_server_packets" lineno="70583">
36326 <summary>
36327 Relabel packets to redis_server the packet type.
36328 </summary>
36329 @@ -54042,7 +53859,7 @@ Domain allowed access.
36330 </summary>
36331 </param>
36332 </interface>
36333 -<interface name="corenet_tcp_sendrecv_repository_port" lineno="70482">
36334 +<interface name="corenet_tcp_sendrecv_repository_port" lineno="70605">
36335 <summary>
36336 Send and receive TCP traffic on the repository port.
36337 </summary>
36338 @@ -54053,7 +53870,7 @@ Domain allowed access.
36339 </param>
36340 <infoflow type="both" weight="10"/>
36341 </interface>
36342 -<interface name="corenet_udp_send_repository_port" lineno="70497">
36343 +<interface name="corenet_udp_send_repository_port" lineno="70620">
36344 <summary>
36345 Send UDP traffic on the repository port.
36346 </summary>
36347 @@ -54064,7 +53881,7 @@ Domain allowed access.
36348 </param>
36349 <infoflow type="write" weight="10"/>
36350 </interface>
36351 -<interface name="corenet_dontaudit_udp_send_repository_port" lineno="70512">
36352 +<interface name="corenet_dontaudit_udp_send_repository_port" lineno="70635">
36353 <summary>
36354 Do not audit attempts to send UDP traffic on the repository port.
36355 </summary>
36356 @@ -54075,7 +53892,7 @@ Domain to not audit.
36357 </param>
36358 <infoflow type="none"/>
36359 </interface>
36360 -<interface name="corenet_udp_receive_repository_port" lineno="70527">
36361 +<interface name="corenet_udp_receive_repository_port" lineno="70650">
36362 <summary>
36363 Receive UDP traffic on the repository port.
36364 </summary>
36365 @@ -54086,7 +53903,7 @@ Domain allowed access.
36366 </param>
36367 <infoflow type="read" weight="10"/>
36368 </interface>
36369 -<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="70542">
36370 +<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="70665">
36371 <summary>
36372 Do not audit attempts to receive UDP traffic on the repository port.
36373 </summary>
36374 @@ -54097,7 +53914,7 @@ Domain to not audit.
36375 </param>
36376 <infoflow type="none"/>
36377 </interface>
36378 -<interface name="corenet_udp_sendrecv_repository_port" lineno="70557">
36379 +<interface name="corenet_udp_sendrecv_repository_port" lineno="70680">
36380 <summary>
36381 Send and receive UDP traffic on the repository port.
36382 </summary>
36383 @@ -54108,7 +53925,7 @@ Domain allowed access.
36384 </param>
36385 <infoflow type="both" weight="10"/>
36386 </interface>
36387 -<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="70573">
36388 +<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="70696">
36389 <summary>
36390 Do not audit attempts to send and receive
36391 UDP traffic on the repository port.
36392 @@ -54120,7 +53937,7 @@ Domain to not audit.
36393 </param>
36394 <infoflow type="none"/>
36395 </interface>
36396 -<interface name="corenet_tcp_bind_repository_port" lineno="70588">
36397 +<interface name="corenet_tcp_bind_repository_port" lineno="70711">
36398 <summary>
36399 Bind TCP sockets to the repository port.
36400 </summary>
36401 @@ -54131,7 +53948,7 @@ Domain allowed access.
36402 </param>
36403 <infoflow type="none"/>
36404 </interface>
36405 -<interface name="corenet_udp_bind_repository_port" lineno="70608">
36406 +<interface name="corenet_udp_bind_repository_port" lineno="70731">
36407 <summary>
36408 Bind UDP sockets to the repository port.
36409 </summary>
36410 @@ -54142,7 +53959,7 @@ Domain allowed access.
36411 </param>
36412 <infoflow type="none"/>
36413 </interface>
36414 -<interface name="corenet_tcp_connect_repository_port" lineno="70627">
36415 +<interface name="corenet_tcp_connect_repository_port" lineno="70750">
36416 <summary>
36417 Make a TCP connection to the repository port.
36418 </summary>
36419 @@ -54152,7 +53969,7 @@ Domain allowed access.
36420 </summary>
36421 </param>
36422 </interface>
36423 -<interface name="corenet_send_repository_client_packets" lineno="70647">
36424 +<interface name="corenet_send_repository_client_packets" lineno="70770">
36425 <summary>
36426 Send repository_client packets.
36427 </summary>
36428 @@ -54163,7 +53980,7 @@ Domain allowed access.
36429 </param>
36430 <infoflow type="write" weight="10"/>
36431 </interface>
36432 -<interface name="corenet_dontaudit_send_repository_client_packets" lineno="70666">
36433 +<interface name="corenet_dontaudit_send_repository_client_packets" lineno="70789">
36434 <summary>
36435 Do not audit attempts to send repository_client packets.
36436 </summary>
36437 @@ -54174,7 +53991,7 @@ Domain to not audit.
36438 </param>
36439 <infoflow type="none"/>
36440 </interface>
36441 -<interface name="corenet_receive_repository_client_packets" lineno="70685">
36442 +<interface name="corenet_receive_repository_client_packets" lineno="70808">
36443 <summary>
36444 Receive repository_client packets.
36445 </summary>
36446 @@ -54185,7 +54002,7 @@ Domain allowed access.
36447 </param>
36448 <infoflow type="read" weight="10"/>
36449 </interface>
36450 -<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="70704">
36451 +<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="70827">
36452 <summary>
36453 Do not audit attempts to receive repository_client packets.
36454 </summary>
36455 @@ -54196,7 +54013,7 @@ Domain allowed access.
36456 </param>
36457 <infoflow type="none"/>
36458 </interface>
36459 -<interface name="corenet_sendrecv_repository_client_packets" lineno="70723">
36460 +<interface name="corenet_sendrecv_repository_client_packets" lineno="70846">
36461 <summary>
36462 Send and receive repository_client packets.
36463 </summary>
36464 @@ -54207,7 +54024,7 @@ Domain allowed access.
36465 </param>
36466 <infoflow type="both" weight="10"/>
36467 </interface>
36468 -<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="70739">
36469 +<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="70862">
36470 <summary>
36471 Do not audit attempts to send and receive repository_client packets.
36472 </summary>
36473 @@ -54218,7 +54035,7 @@ Domain to not audit.
36474 </param>
36475 <infoflow type="none"/>
36476 </interface>
36477 -<interface name="corenet_relabelto_repository_client_packets" lineno="70754">
36478 +<interface name="corenet_relabelto_repository_client_packets" lineno="70877">
36479 <summary>
36480 Relabel packets to repository_client the packet type.
36481 </summary>
36482 @@ -54228,7 +54045,7 @@ Domain allowed access.
36483 </summary>
36484 </param>
36485 </interface>
36486 -<interface name="corenet_send_repository_server_packets" lineno="70774">
36487 +<interface name="corenet_send_repository_server_packets" lineno="70897">
36488 <summary>
36489 Send repository_server packets.
36490 </summary>
36491 @@ -54239,7 +54056,7 @@ Domain allowed access.
36492 </param>
36493 <infoflow type="write" weight="10"/>
36494 </interface>
36495 -<interface name="corenet_dontaudit_send_repository_server_packets" lineno="70793">
36496 +<interface name="corenet_dontaudit_send_repository_server_packets" lineno="70916">
36497 <summary>
36498 Do not audit attempts to send repository_server packets.
36499 </summary>
36500 @@ -54250,7 +54067,7 @@ Domain to not audit.
36501 </param>
36502 <infoflow type="none"/>
36503 </interface>
36504 -<interface name="corenet_receive_repository_server_packets" lineno="70812">
36505 +<interface name="corenet_receive_repository_server_packets" lineno="70935">
36506 <summary>
36507 Receive repository_server packets.
36508 </summary>
36509 @@ -54261,7 +54078,7 @@ Domain allowed access.
36510 </param>
36511 <infoflow type="read" weight="10"/>
36512 </interface>
36513 -<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="70831">
36514 +<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="70954">
36515 <summary>
36516 Do not audit attempts to receive repository_server packets.
36517 </summary>
36518 @@ -54272,7 +54089,7 @@ Domain allowed access.
36519 </param>
36520 <infoflow type="none"/>
36521 </interface>
36522 -<interface name="corenet_sendrecv_repository_server_packets" lineno="70850">
36523 +<interface name="corenet_sendrecv_repository_server_packets" lineno="70973">
36524 <summary>
36525 Send and receive repository_server packets.
36526 </summary>
36527 @@ -54283,7 +54100,7 @@ Domain allowed access.
36528 </param>
36529 <infoflow type="both" weight="10"/>
36530 </interface>
36531 -<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="70866">
36532 +<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="70989">
36533 <summary>
36534 Do not audit attempts to send and receive repository_server packets.
36535 </summary>
36536 @@ -54294,7 +54111,7 @@ Domain to not audit.
36537 </param>
36538 <infoflow type="none"/>
36539 </interface>
36540 -<interface name="corenet_relabelto_repository_server_packets" lineno="70881">
36541 +<interface name="corenet_relabelto_repository_server_packets" lineno="71004">
36542 <summary>
36543 Relabel packets to repository_server the packet type.
36544 </summary>
36545 @@ -54304,7 +54121,7 @@ Domain allowed access.
36546 </summary>
36547 </param>
36548 </interface>
36549 -<interface name="corenet_tcp_sendrecv_ricci_port" lineno="70903">
36550 +<interface name="corenet_tcp_sendrecv_ricci_port" lineno="71026">
36551 <summary>
36552 Send and receive TCP traffic on the ricci port.
36553 </summary>
36554 @@ -54315,7 +54132,7 @@ Domain allowed access.
36555 </param>
36556 <infoflow type="both" weight="10"/>
36557 </interface>
36558 -<interface name="corenet_udp_send_ricci_port" lineno="70918">
36559 +<interface name="corenet_udp_send_ricci_port" lineno="71041">
36560 <summary>
36561 Send UDP traffic on the ricci port.
36562 </summary>
36563 @@ -54326,7 +54143,7 @@ Domain allowed access.
36564 </param>
36565 <infoflow type="write" weight="10"/>
36566 </interface>
36567 -<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="70933">
36568 +<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="71056">
36569 <summary>
36570 Do not audit attempts to send UDP traffic on the ricci port.
36571 </summary>
36572 @@ -54337,7 +54154,7 @@ Domain to not audit.
36573 </param>
36574 <infoflow type="none"/>
36575 </interface>
36576 -<interface name="corenet_udp_receive_ricci_port" lineno="70948">
36577 +<interface name="corenet_udp_receive_ricci_port" lineno="71071">
36578 <summary>
36579 Receive UDP traffic on the ricci port.
36580 </summary>
36581 @@ -54348,7 +54165,7 @@ Domain allowed access.
36582 </param>
36583 <infoflow type="read" weight="10"/>
36584 </interface>
36585 -<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="70963">
36586 +<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="71086">
36587 <summary>
36588 Do not audit attempts to receive UDP traffic on the ricci port.
36589 </summary>
36590 @@ -54359,7 +54176,7 @@ Domain to not audit.
36591 </param>
36592 <infoflow type="none"/>
36593 </interface>
36594 -<interface name="corenet_udp_sendrecv_ricci_port" lineno="70978">
36595 +<interface name="corenet_udp_sendrecv_ricci_port" lineno="71101">
36596 <summary>
36597 Send and receive UDP traffic on the ricci port.
36598 </summary>
36599 @@ -54370,7 +54187,7 @@ Domain allowed access.
36600 </param>
36601 <infoflow type="both" weight="10"/>
36602 </interface>
36603 -<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="70994">
36604 +<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="71117">
36605 <summary>
36606 Do not audit attempts to send and receive
36607 UDP traffic on the ricci port.
36608 @@ -54382,7 +54199,7 @@ Domain to not audit.
36609 </param>
36610 <infoflow type="none"/>
36611 </interface>
36612 -<interface name="corenet_tcp_bind_ricci_port" lineno="71009">
36613 +<interface name="corenet_tcp_bind_ricci_port" lineno="71132">
36614 <summary>
36615 Bind TCP sockets to the ricci port.
36616 </summary>
36617 @@ -54393,7 +54210,7 @@ Domain allowed access.
36618 </param>
36619 <infoflow type="none"/>
36620 </interface>
36621 -<interface name="corenet_udp_bind_ricci_port" lineno="71029">
36622 +<interface name="corenet_udp_bind_ricci_port" lineno="71152">
36623 <summary>
36624 Bind UDP sockets to the ricci port.
36625 </summary>
36626 @@ -54404,7 +54221,7 @@ Domain allowed access.
36627 </param>
36628 <infoflow type="none"/>
36629 </interface>
36630 -<interface name="corenet_tcp_connect_ricci_port" lineno="71048">
36631 +<interface name="corenet_tcp_connect_ricci_port" lineno="71171">
36632 <summary>
36633 Make a TCP connection to the ricci port.
36634 </summary>
36635 @@ -54414,7 +54231,7 @@ Domain allowed access.
36636 </summary>
36637 </param>
36638 </interface>
36639 -<interface name="corenet_send_ricci_client_packets" lineno="71068">
36640 +<interface name="corenet_send_ricci_client_packets" lineno="71191">
36641 <summary>
36642 Send ricci_client packets.
36643 </summary>
36644 @@ -54425,7 +54242,7 @@ Domain allowed access.
36645 </param>
36646 <infoflow type="write" weight="10"/>
36647 </interface>
36648 -<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="71087">
36649 +<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="71210">
36650 <summary>
36651 Do not audit attempts to send ricci_client packets.
36652 </summary>
36653 @@ -54436,7 +54253,7 @@ Domain to not audit.
36654 </param>
36655 <infoflow type="none"/>
36656 </interface>
36657 -<interface name="corenet_receive_ricci_client_packets" lineno="71106">
36658 +<interface name="corenet_receive_ricci_client_packets" lineno="71229">
36659 <summary>
36660 Receive ricci_client packets.
36661 </summary>
36662 @@ -54447,7 +54264,7 @@ Domain allowed access.
36663 </param>
36664 <infoflow type="read" weight="10"/>
36665 </interface>
36666 -<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="71125">
36667 +<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="71248">
36668 <summary>
36669 Do not audit attempts to receive ricci_client packets.
36670 </summary>
36671 @@ -54458,7 +54275,7 @@ Domain allowed access.
36672 </param>
36673 <infoflow type="none"/>
36674 </interface>
36675 -<interface name="corenet_sendrecv_ricci_client_packets" lineno="71144">
36676 +<interface name="corenet_sendrecv_ricci_client_packets" lineno="71267">
36677 <summary>
36678 Send and receive ricci_client packets.
36679 </summary>
36680 @@ -54469,7 +54286,7 @@ Domain allowed access.
36681 </param>
36682 <infoflow type="both" weight="10"/>
36683 </interface>
36684 -<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="71160">
36685 +<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="71283">
36686 <summary>
36687 Do not audit attempts to send and receive ricci_client packets.
36688 </summary>
36689 @@ -54480,7 +54297,7 @@ Domain to not audit.
36690 </param>
36691 <infoflow type="none"/>
36692 </interface>
36693 -<interface name="corenet_relabelto_ricci_client_packets" lineno="71175">
36694 +<interface name="corenet_relabelto_ricci_client_packets" lineno="71298">
36695 <summary>
36696 Relabel packets to ricci_client the packet type.
36697 </summary>
36698 @@ -54490,7 +54307,7 @@ Domain allowed access.
36699 </summary>
36700 </param>
36701 </interface>
36702 -<interface name="corenet_send_ricci_server_packets" lineno="71195">
36703 +<interface name="corenet_send_ricci_server_packets" lineno="71318">
36704 <summary>
36705 Send ricci_server packets.
36706 </summary>
36707 @@ -54501,7 +54318,7 @@ Domain allowed access.
36708 </param>
36709 <infoflow type="write" weight="10"/>
36710 </interface>
36711 -<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="71214">
36712 +<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="71337">
36713 <summary>
36714 Do not audit attempts to send ricci_server packets.
36715 </summary>
36716 @@ -54512,7 +54329,7 @@ Domain to not audit.
36717 </param>
36718 <infoflow type="none"/>
36719 </interface>
36720 -<interface name="corenet_receive_ricci_server_packets" lineno="71233">
36721 +<interface name="corenet_receive_ricci_server_packets" lineno="71356">
36722 <summary>
36723 Receive ricci_server packets.
36724 </summary>
36725 @@ -54523,7 +54340,7 @@ Domain allowed access.
36726 </param>
36727 <infoflow type="read" weight="10"/>
36728 </interface>
36729 -<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="71252">
36730 +<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="71375">
36731 <summary>
36732 Do not audit attempts to receive ricci_server packets.
36733 </summary>
36734 @@ -54534,7 +54351,7 @@ Domain allowed access.
36735 </param>
36736 <infoflow type="none"/>
36737 </interface>
36738 -<interface name="corenet_sendrecv_ricci_server_packets" lineno="71271">
36739 +<interface name="corenet_sendrecv_ricci_server_packets" lineno="71394">
36740 <summary>
36741 Send and receive ricci_server packets.
36742 </summary>
36743 @@ -54545,7 +54362,7 @@ Domain allowed access.
36744 </param>
36745 <infoflow type="both" weight="10"/>
36746 </interface>
36747 -<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="71287">
36748 +<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="71410">
36749 <summary>
36750 Do not audit attempts to send and receive ricci_server packets.
36751 </summary>
36752 @@ -54556,7 +54373,7 @@ Domain to not audit.
36753 </param>
36754 <infoflow type="none"/>
36755 </interface>
36756 -<interface name="corenet_relabelto_ricci_server_packets" lineno="71302">
36757 +<interface name="corenet_relabelto_ricci_server_packets" lineno="71425">
36758 <summary>
36759 Relabel packets to ricci_server the packet type.
36760 </summary>
36761 @@ -54566,7 +54383,7 @@ Domain allowed access.
36762 </summary>
36763 </param>
36764 </interface>
36765 -<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="71324">
36766 +<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="71447">
36767 <summary>
36768 Send and receive TCP traffic on the ricci_modcluster port.
36769 </summary>
36770 @@ -54577,7 +54394,7 @@ Domain allowed access.
36771 </param>
36772 <infoflow type="both" weight="10"/>
36773 </interface>
36774 -<interface name="corenet_udp_send_ricci_modcluster_port" lineno="71339">
36775 +<interface name="corenet_udp_send_ricci_modcluster_port" lineno="71462">
36776 <summary>
36777 Send UDP traffic on the ricci_modcluster port.
36778 </summary>
36779 @@ -54588,7 +54405,7 @@ Domain allowed access.
36780 </param>
36781 <infoflow type="write" weight="10"/>
36782 </interface>
36783 -<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="71354">
36784 +<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="71477">
36785 <summary>
36786 Do not audit attempts to send UDP traffic on the ricci_modcluster port.
36787 </summary>
36788 @@ -54599,7 +54416,7 @@ Domain to not audit.
36789 </param>
36790 <infoflow type="none"/>
36791 </interface>
36792 -<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="71369">
36793 +<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="71492">
36794 <summary>
36795 Receive UDP traffic on the ricci_modcluster port.
36796 </summary>
36797 @@ -54610,7 +54427,7 @@ Domain allowed access.
36798 </param>
36799 <infoflow type="read" weight="10"/>
36800 </interface>
36801 -<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="71384">
36802 +<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="71507">
36803 <summary>
36804 Do not audit attempts to receive UDP traffic on the ricci_modcluster port.
36805 </summary>
36806 @@ -54621,7 +54438,7 @@ Domain to not audit.
36807 </param>
36808 <infoflow type="none"/>
36809 </interface>
36810 -<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="71399">
36811 +<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="71522">
36812 <summary>
36813 Send and receive UDP traffic on the ricci_modcluster port.
36814 </summary>
36815 @@ -54632,7 +54449,7 @@ Domain allowed access.
36816 </param>
36817 <infoflow type="both" weight="10"/>
36818 </interface>
36819 -<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="71415">
36820 +<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="71538">
36821 <summary>
36822 Do not audit attempts to send and receive
36823 UDP traffic on the ricci_modcluster port.
36824 @@ -54644,7 +54461,7 @@ Domain to not audit.
36825 </param>
36826 <infoflow type="none"/>
36827 </interface>
36828 -<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="71430">
36829 +<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="71553">
36830 <summary>
36831 Bind TCP sockets to the ricci_modcluster port.
36832 </summary>
36833 @@ -54655,7 +54472,7 @@ Domain allowed access.
36834 </param>
36835 <infoflow type="none"/>
36836 </interface>
36837 -<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="71450">
36838 +<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="71573">
36839 <summary>
36840 Bind UDP sockets to the ricci_modcluster port.
36841 </summary>
36842 @@ -54666,7 +54483,7 @@ Domain allowed access.
36843 </param>
36844 <infoflow type="none"/>
36845 </interface>
36846 -<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="71469">
36847 +<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="71592">
36848 <summary>
36849 Make a TCP connection to the ricci_modcluster port.
36850 </summary>
36851 @@ -54676,7 +54493,7 @@ Domain allowed access.
36852 </summary>
36853 </param>
36854 </interface>
36855 -<interface name="corenet_send_ricci_modcluster_client_packets" lineno="71489">
36856 +<interface name="corenet_send_ricci_modcluster_client_packets" lineno="71612">
36857 <summary>
36858 Send ricci_modcluster_client packets.
36859 </summary>
36860 @@ -54687,7 +54504,7 @@ Domain allowed access.
36861 </param>
36862 <infoflow type="write" weight="10"/>
36863 </interface>
36864 -<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="71508">
36865 +<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="71631">
36866 <summary>
36867 Do not audit attempts to send ricci_modcluster_client packets.
36868 </summary>
36869 @@ -54698,7 +54515,7 @@ Domain to not audit.
36870 </param>
36871 <infoflow type="none"/>
36872 </interface>
36873 -<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="71527">
36874 +<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="71650">
36875 <summary>
36876 Receive ricci_modcluster_client packets.
36877 </summary>
36878 @@ -54709,7 +54526,7 @@ Domain allowed access.
36879 </param>
36880 <infoflow type="read" weight="10"/>
36881 </interface>
36882 -<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="71546">
36883 +<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="71669">
36884 <summary>
36885 Do not audit attempts to receive ricci_modcluster_client packets.
36886 </summary>
36887 @@ -54720,7 +54537,7 @@ Domain allowed access.
36888 </param>
36889 <infoflow type="none"/>
36890 </interface>
36891 -<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="71565">
36892 +<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="71688">
36893 <summary>
36894 Send and receive ricci_modcluster_client packets.
36895 </summary>
36896 @@ -54731,7 +54548,7 @@ Domain allowed access.
36897 </param>
36898 <infoflow type="both" weight="10"/>
36899 </interface>
36900 -<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="71581">
36901 +<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="71704">
36902 <summary>
36903 Do not audit attempts to send and receive ricci_modcluster_client packets.
36904 </summary>
36905 @@ -54742,7 +54559,7 @@ Domain to not audit.
36906 </param>
36907 <infoflow type="none"/>
36908 </interface>
36909 -<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="71596">
36910 +<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="71719">
36911 <summary>
36912 Relabel packets to ricci_modcluster_client the packet type.
36913 </summary>
36914 @@ -54752,7 +54569,7 @@ Domain allowed access.
36915 </summary>
36916 </param>
36917 </interface>
36918 -<interface name="corenet_send_ricci_modcluster_server_packets" lineno="71616">
36919 +<interface name="corenet_send_ricci_modcluster_server_packets" lineno="71739">
36920 <summary>
36921 Send ricci_modcluster_server packets.
36922 </summary>
36923 @@ -54763,7 +54580,7 @@ Domain allowed access.
36924 </param>
36925 <infoflow type="write" weight="10"/>
36926 </interface>
36927 -<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="71635">
36928 +<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="71758">
36929 <summary>
36930 Do not audit attempts to send ricci_modcluster_server packets.
36931 </summary>
36932 @@ -54774,7 +54591,7 @@ Domain to not audit.
36933 </param>
36934 <infoflow type="none"/>
36935 </interface>
36936 -<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="71654">
36937 +<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="71777">
36938 <summary>
36939 Receive ricci_modcluster_server packets.
36940 </summary>
36941 @@ -54785,7 +54602,7 @@ Domain allowed access.
36942 </param>
36943 <infoflow type="read" weight="10"/>
36944 </interface>
36945 -<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="71673">
36946 +<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="71796">
36947 <summary>
36948 Do not audit attempts to receive ricci_modcluster_server packets.
36949 </summary>
36950 @@ -54796,7 +54613,7 @@ Domain allowed access.
36951 </param>
36952 <infoflow type="none"/>
36953 </interface>
36954 -<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="71692">
36955 +<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="71815">
36956 <summary>
36957 Send and receive ricci_modcluster_server packets.
36958 </summary>
36959 @@ -54807,7 +54624,7 @@ Domain allowed access.
36960 </param>
36961 <infoflow type="both" weight="10"/>
36962 </interface>
36963 -<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="71708">
36964 +<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="71831">
36965 <summary>
36966 Do not audit attempts to send and receive ricci_modcluster_server packets.
36967 </summary>
36968 @@ -54818,7 +54635,7 @@ Domain to not audit.
36969 </param>
36970 <infoflow type="none"/>
36971 </interface>
36972 -<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="71723">
36973 +<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="71846">
36974 <summary>
36975 Relabel packets to ricci_modcluster_server the packet type.
36976 </summary>
36977 @@ -54828,7 +54645,7 @@ Domain allowed access.
36978 </summary>
36979 </param>
36980 </interface>
36981 -<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="71745">
36982 +<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="71868">
36983 <summary>
36984 Send and receive TCP traffic on the rlogind port.
36985 </summary>
36986 @@ -54839,7 +54656,7 @@ Domain allowed access.
36987 </param>
36988 <infoflow type="both" weight="10"/>
36989 </interface>
36990 -<interface name="corenet_udp_send_rlogind_port" lineno="71760">
36991 +<interface name="corenet_udp_send_rlogind_port" lineno="71883">
36992 <summary>
36993 Send UDP traffic on the rlogind port.
36994 </summary>
36995 @@ -54850,7 +54667,7 @@ Domain allowed access.
36996 </param>
36997 <infoflow type="write" weight="10"/>
36998 </interface>
36999 -<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="71775">
37000 +<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="71898">
37001 <summary>
37002 Do not audit attempts to send UDP traffic on the rlogind port.
37003 </summary>
37004 @@ -54861,7 +54678,7 @@ Domain to not audit.
37005 </param>
37006 <infoflow type="none"/>
37007 </interface>
37008 -<interface name="corenet_udp_receive_rlogind_port" lineno="71790">
37009 +<interface name="corenet_udp_receive_rlogind_port" lineno="71913">
37010 <summary>
37011 Receive UDP traffic on the rlogind port.
37012 </summary>
37013 @@ -54872,7 +54689,7 @@ Domain allowed access.
37014 </param>
37015 <infoflow type="read" weight="10"/>
37016 </interface>
37017 -<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="71805">
37018 +<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="71928">
37019 <summary>
37020 Do not audit attempts to receive UDP traffic on the rlogind port.
37021 </summary>
37022 @@ -54883,7 +54700,7 @@ Domain to not audit.
37023 </param>
37024 <infoflow type="none"/>
37025 </interface>
37026 -<interface name="corenet_udp_sendrecv_rlogind_port" lineno="71820">
37027 +<interface name="corenet_udp_sendrecv_rlogind_port" lineno="71943">
37028 <summary>
37029 Send and receive UDP traffic on the rlogind port.
37030 </summary>
37031 @@ -54894,7 +54711,7 @@ Domain allowed access.
37032 </param>
37033 <infoflow type="both" weight="10"/>
37034 </interface>
37035 -<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="71836">
37036 +<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="71959">
37037 <summary>
37038 Do not audit attempts to send and receive
37039 UDP traffic on the rlogind port.
37040 @@ -54906,7 +54723,7 @@ Domain to not audit.
37041 </param>
37042 <infoflow type="none"/>
37043 </interface>
37044 -<interface name="corenet_tcp_bind_rlogind_port" lineno="71851">
37045 +<interface name="corenet_tcp_bind_rlogind_port" lineno="71974">
37046 <summary>
37047 Bind TCP sockets to the rlogind port.
37048 </summary>
37049 @@ -54917,7 +54734,7 @@ Domain allowed access.
37050 </param>
37051 <infoflow type="none"/>
37052 </interface>
37053 -<interface name="corenet_udp_bind_rlogind_port" lineno="71871">
37054 +<interface name="corenet_udp_bind_rlogind_port" lineno="71994">
37055 <summary>
37056 Bind UDP sockets to the rlogind port.
37057 </summary>
37058 @@ -54928,7 +54745,7 @@ Domain allowed access.
37059 </param>
37060 <infoflow type="none"/>
37061 </interface>
37062 -<interface name="corenet_tcp_connect_rlogind_port" lineno="71890">
37063 +<interface name="corenet_tcp_connect_rlogind_port" lineno="72013">
37064 <summary>
37065 Make a TCP connection to the rlogind port.
37066 </summary>
37067 @@ -54938,7 +54755,7 @@ Domain allowed access.
37068 </summary>
37069 </param>
37070 </interface>
37071 -<interface name="corenet_send_rlogind_client_packets" lineno="71910">
37072 +<interface name="corenet_send_rlogind_client_packets" lineno="72033">
37073 <summary>
37074 Send rlogind_client packets.
37075 </summary>
37076 @@ -54949,7 +54766,7 @@ Domain allowed access.
37077 </param>
37078 <infoflow type="write" weight="10"/>
37079 </interface>
37080 -<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="71929">
37081 +<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="72052">
37082 <summary>
37083 Do not audit attempts to send rlogind_client packets.
37084 </summary>
37085 @@ -54960,7 +54777,7 @@ Domain to not audit.
37086 </param>
37087 <infoflow type="none"/>
37088 </interface>
37089 -<interface name="corenet_receive_rlogind_client_packets" lineno="71948">
37090 +<interface name="corenet_receive_rlogind_client_packets" lineno="72071">
37091 <summary>
37092 Receive rlogind_client packets.
37093 </summary>
37094 @@ -54971,7 +54788,7 @@ Domain allowed access.
37095 </param>
37096 <infoflow type="read" weight="10"/>
37097 </interface>
37098 -<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="71967">
37099 +<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="72090">
37100 <summary>
37101 Do not audit attempts to receive rlogind_client packets.
37102 </summary>
37103 @@ -54982,7 +54799,7 @@ Domain allowed access.
37104 </param>
37105 <infoflow type="none"/>
37106 </interface>
37107 -<interface name="corenet_sendrecv_rlogind_client_packets" lineno="71986">
37108 +<interface name="corenet_sendrecv_rlogind_client_packets" lineno="72109">
37109 <summary>
37110 Send and receive rlogind_client packets.
37111 </summary>
37112 @@ -54993,7 +54810,7 @@ Domain allowed access.
37113 </param>
37114 <infoflow type="both" weight="10"/>
37115 </interface>
37116 -<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="72002">
37117 +<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="72125">
37118 <summary>
37119 Do not audit attempts to send and receive rlogind_client packets.
37120 </summary>
37121 @@ -55004,7 +54821,7 @@ Domain to not audit.
37122 </param>
37123 <infoflow type="none"/>
37124 </interface>
37125 -<interface name="corenet_relabelto_rlogind_client_packets" lineno="72017">
37126 +<interface name="corenet_relabelto_rlogind_client_packets" lineno="72140">
37127 <summary>
37128 Relabel packets to rlogind_client the packet type.
37129 </summary>
37130 @@ -55014,7 +54831,7 @@ Domain allowed access.
37131 </summary>
37132 </param>
37133 </interface>
37134 -<interface name="corenet_send_rlogind_server_packets" lineno="72037">
37135 +<interface name="corenet_send_rlogind_server_packets" lineno="72160">
37136 <summary>
37137 Send rlogind_server packets.
37138 </summary>
37139 @@ -55025,7 +54842,7 @@ Domain allowed access.
37140 </param>
37141 <infoflow type="write" weight="10"/>
37142 </interface>
37143 -<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="72056">
37144 +<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="72179">
37145 <summary>
37146 Do not audit attempts to send rlogind_server packets.
37147 </summary>
37148 @@ -55036,7 +54853,7 @@ Domain to not audit.
37149 </param>
37150 <infoflow type="none"/>
37151 </interface>
37152 -<interface name="corenet_receive_rlogind_server_packets" lineno="72075">
37153 +<interface name="corenet_receive_rlogind_server_packets" lineno="72198">
37154 <summary>
37155 Receive rlogind_server packets.
37156 </summary>
37157 @@ -55047,7 +54864,7 @@ Domain allowed access.
37158 </param>
37159 <infoflow type="read" weight="10"/>
37160 </interface>
37161 -<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="72094">
37162 +<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="72217">
37163 <summary>
37164 Do not audit attempts to receive rlogind_server packets.
37165 </summary>
37166 @@ -55058,7 +54875,7 @@ Domain allowed access.
37167 </param>
37168 <infoflow type="none"/>
37169 </interface>
37170 -<interface name="corenet_sendrecv_rlogind_server_packets" lineno="72113">
37171 +<interface name="corenet_sendrecv_rlogind_server_packets" lineno="72236">
37172 <summary>
37173 Send and receive rlogind_server packets.
37174 </summary>
37175 @@ -55069,7 +54886,7 @@ Domain allowed access.
37176 </param>
37177 <infoflow type="both" weight="10"/>
37178 </interface>
37179 -<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="72129">
37180 +<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="72252">
37181 <summary>
37182 Do not audit attempts to send and receive rlogind_server packets.
37183 </summary>
37184 @@ -55080,7 +54897,7 @@ Domain to not audit.
37185 </param>
37186 <infoflow type="none"/>
37187 </interface>
37188 -<interface name="corenet_relabelto_rlogind_server_packets" lineno="72144">
37189 +<interface name="corenet_relabelto_rlogind_server_packets" lineno="72267">
37190 <summary>
37191 Relabel packets to rlogind_server the packet type.
37192 </summary>
37193 @@ -55090,7 +54907,7 @@ Domain allowed access.
37194 </summary>
37195 </param>
37196 </interface>
37197 -<interface name="corenet_tcp_sendrecv_rndc_port" lineno="72166">
37198 +<interface name="corenet_tcp_sendrecv_rndc_port" lineno="72289">
37199 <summary>
37200 Send and receive TCP traffic on the rndc port.
37201 </summary>
37202 @@ -55101,7 +54918,7 @@ Domain allowed access.
37203 </param>
37204 <infoflow type="both" weight="10"/>
37205 </interface>
37206 -<interface name="corenet_udp_send_rndc_port" lineno="72181">
37207 +<interface name="corenet_udp_send_rndc_port" lineno="72304">
37208 <summary>
37209 Send UDP traffic on the rndc port.
37210 </summary>
37211 @@ -55112,7 +54929,7 @@ Domain allowed access.
37212 </param>
37213 <infoflow type="write" weight="10"/>
37214 </interface>
37215 -<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="72196">
37216 +<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="72319">
37217 <summary>
37218 Do not audit attempts to send UDP traffic on the rndc port.
37219 </summary>
37220 @@ -55123,7 +54940,7 @@ Domain to not audit.
37221 </param>
37222 <infoflow type="none"/>
37223 </interface>
37224 -<interface name="corenet_udp_receive_rndc_port" lineno="72211">
37225 +<interface name="corenet_udp_receive_rndc_port" lineno="72334">
37226 <summary>
37227 Receive UDP traffic on the rndc port.
37228 </summary>
37229 @@ -55134,7 +54951,7 @@ Domain allowed access.
37230 </param>
37231 <infoflow type="read" weight="10"/>
37232 </interface>
37233 -<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="72226">
37234 +<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="72349">
37235 <summary>
37236 Do not audit attempts to receive UDP traffic on the rndc port.
37237 </summary>
37238 @@ -55145,7 +54962,7 @@ Domain to not audit.
37239 </param>
37240 <infoflow type="none"/>
37241 </interface>
37242 -<interface name="corenet_udp_sendrecv_rndc_port" lineno="72241">
37243 +<interface name="corenet_udp_sendrecv_rndc_port" lineno="72364">
37244 <summary>
37245 Send and receive UDP traffic on the rndc port.
37246 </summary>
37247 @@ -55156,7 +54973,7 @@ Domain allowed access.
37248 </param>
37249 <infoflow type="both" weight="10"/>
37250 </interface>
37251 -<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="72257">
37252 +<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="72380">
37253 <summary>
37254 Do not audit attempts to send and receive
37255 UDP traffic on the rndc port.
37256 @@ -55168,7 +54985,7 @@ Domain to not audit.
37257 </param>
37258 <infoflow type="none"/>
37259 </interface>
37260 -<interface name="corenet_tcp_bind_rndc_port" lineno="72272">
37261 +<interface name="corenet_tcp_bind_rndc_port" lineno="72395">
37262 <summary>
37263 Bind TCP sockets to the rndc port.
37264 </summary>
37265 @@ -55179,7 +54996,7 @@ Domain allowed access.
37266 </param>
37267 <infoflow type="none"/>
37268 </interface>
37269 -<interface name="corenet_udp_bind_rndc_port" lineno="72292">
37270 +<interface name="corenet_udp_bind_rndc_port" lineno="72415">
37271 <summary>
37272 Bind UDP sockets to the rndc port.
37273 </summary>
37274 @@ -55190,7 +55007,7 @@ Domain allowed access.
37275 </param>
37276 <infoflow type="none"/>
37277 </interface>
37278 -<interface name="corenet_tcp_connect_rndc_port" lineno="72311">
37279 +<interface name="corenet_tcp_connect_rndc_port" lineno="72434">
37280 <summary>
37281 Make a TCP connection to the rndc port.
37282 </summary>
37283 @@ -55200,7 +55017,7 @@ Domain allowed access.
37284 </summary>
37285 </param>
37286 </interface>
37287 -<interface name="corenet_send_rndc_client_packets" lineno="72331">
37288 +<interface name="corenet_send_rndc_client_packets" lineno="72454">
37289 <summary>
37290 Send rndc_client packets.
37291 </summary>
37292 @@ -55211,7 +55028,7 @@ Domain allowed access.
37293 </param>
37294 <infoflow type="write" weight="10"/>
37295 </interface>
37296 -<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="72350">
37297 +<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="72473">
37298 <summary>
37299 Do not audit attempts to send rndc_client packets.
37300 </summary>
37301 @@ -55222,7 +55039,7 @@ Domain to not audit.
37302 </param>
37303 <infoflow type="none"/>
37304 </interface>
37305 -<interface name="corenet_receive_rndc_client_packets" lineno="72369">
37306 +<interface name="corenet_receive_rndc_client_packets" lineno="72492">
37307 <summary>
37308 Receive rndc_client packets.
37309 </summary>
37310 @@ -55233,7 +55050,7 @@ Domain allowed access.
37311 </param>
37312 <infoflow type="read" weight="10"/>
37313 </interface>
37314 -<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="72388">
37315 +<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="72511">
37316 <summary>
37317 Do not audit attempts to receive rndc_client packets.
37318 </summary>
37319 @@ -55244,7 +55061,7 @@ Domain allowed access.
37320 </param>
37321 <infoflow type="none"/>
37322 </interface>
37323 -<interface name="corenet_sendrecv_rndc_client_packets" lineno="72407">
37324 +<interface name="corenet_sendrecv_rndc_client_packets" lineno="72530">
37325 <summary>
37326 Send and receive rndc_client packets.
37327 </summary>
37328 @@ -55255,7 +55072,7 @@ Domain allowed access.
37329 </param>
37330 <infoflow type="both" weight="10"/>
37331 </interface>
37332 -<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="72423">
37333 +<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="72546">
37334 <summary>
37335 Do not audit attempts to send and receive rndc_client packets.
37336 </summary>
37337 @@ -55266,7 +55083,7 @@ Domain to not audit.
37338 </param>
37339 <infoflow type="none"/>
37340 </interface>
37341 -<interface name="corenet_relabelto_rndc_client_packets" lineno="72438">
37342 +<interface name="corenet_relabelto_rndc_client_packets" lineno="72561">
37343 <summary>
37344 Relabel packets to rndc_client the packet type.
37345 </summary>
37346 @@ -55276,7 +55093,7 @@ Domain allowed access.
37347 </summary>
37348 </param>
37349 </interface>
37350 -<interface name="corenet_send_rndc_server_packets" lineno="72458">
37351 +<interface name="corenet_send_rndc_server_packets" lineno="72581">
37352 <summary>
37353 Send rndc_server packets.
37354 </summary>
37355 @@ -55287,7 +55104,7 @@ Domain allowed access.
37356 </param>
37357 <infoflow type="write" weight="10"/>
37358 </interface>
37359 -<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="72477">
37360 +<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="72600">
37361 <summary>
37362 Do not audit attempts to send rndc_server packets.
37363 </summary>
37364 @@ -55298,7 +55115,7 @@ Domain to not audit.
37365 </param>
37366 <infoflow type="none"/>
37367 </interface>
37368 -<interface name="corenet_receive_rndc_server_packets" lineno="72496">
37369 +<interface name="corenet_receive_rndc_server_packets" lineno="72619">
37370 <summary>
37371 Receive rndc_server packets.
37372 </summary>
37373 @@ -55309,7 +55126,7 @@ Domain allowed access.
37374 </param>
37375 <infoflow type="read" weight="10"/>
37376 </interface>
37377 -<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="72515">
37378 +<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="72638">
37379 <summary>
37380 Do not audit attempts to receive rndc_server packets.
37381 </summary>
37382 @@ -55320,7 +55137,7 @@ Domain allowed access.
37383 </param>
37384 <infoflow type="none"/>
37385 </interface>
37386 -<interface name="corenet_sendrecv_rndc_server_packets" lineno="72534">
37387 +<interface name="corenet_sendrecv_rndc_server_packets" lineno="72657">
37388 <summary>
37389 Send and receive rndc_server packets.
37390 </summary>
37391 @@ -55331,7 +55148,7 @@ Domain allowed access.
37392 </param>
37393 <infoflow type="both" weight="10"/>
37394 </interface>
37395 -<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="72550">
37396 +<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="72673">
37397 <summary>
37398 Do not audit attempts to send and receive rndc_server packets.
37399 </summary>
37400 @@ -55342,7 +55159,7 @@ Domain to not audit.
37401 </param>
37402 <infoflow type="none"/>
37403 </interface>
37404 -<interface name="corenet_relabelto_rndc_server_packets" lineno="72565">
37405 +<interface name="corenet_relabelto_rndc_server_packets" lineno="72688">
37406 <summary>
37407 Relabel packets to rndc_server the packet type.
37408 </summary>
37409 @@ -55352,7 +55169,7 @@ Domain allowed access.
37410 </summary>
37411 </param>
37412 </interface>
37413 -<interface name="corenet_tcp_sendrecv_router_port" lineno="72587">
37414 +<interface name="corenet_tcp_sendrecv_router_port" lineno="72710">
37415 <summary>
37416 Send and receive TCP traffic on the router port.
37417 </summary>
37418 @@ -55363,7 +55180,7 @@ Domain allowed access.
37419 </param>
37420 <infoflow type="both" weight="10"/>
37421 </interface>
37422 -<interface name="corenet_udp_send_router_port" lineno="72602">
37423 +<interface name="corenet_udp_send_router_port" lineno="72725">
37424 <summary>
37425 Send UDP traffic on the router port.
37426 </summary>
37427 @@ -55374,7 +55191,7 @@ Domain allowed access.
37428 </param>
37429 <infoflow type="write" weight="10"/>
37430 </interface>
37431 -<interface name="corenet_dontaudit_udp_send_router_port" lineno="72617">
37432 +<interface name="corenet_dontaudit_udp_send_router_port" lineno="72740">
37433 <summary>
37434 Do not audit attempts to send UDP traffic on the router port.
37435 </summary>
37436 @@ -55385,7 +55202,7 @@ Domain to not audit.
37437 </param>
37438 <infoflow type="none"/>
37439 </interface>
37440 -<interface name="corenet_udp_receive_router_port" lineno="72632">
37441 +<interface name="corenet_udp_receive_router_port" lineno="72755">
37442 <summary>
37443 Receive UDP traffic on the router port.
37444 </summary>
37445 @@ -55396,7 +55213,7 @@ Domain allowed access.
37446 </param>
37447 <infoflow type="read" weight="10"/>
37448 </interface>
37449 -<interface name="corenet_dontaudit_udp_receive_router_port" lineno="72647">
37450 +<interface name="corenet_dontaudit_udp_receive_router_port" lineno="72770">
37451 <summary>
37452 Do not audit attempts to receive UDP traffic on the router port.
37453 </summary>
37454 @@ -55407,7 +55224,7 @@ Domain to not audit.
37455 </param>
37456 <infoflow type="none"/>
37457 </interface>
37458 -<interface name="corenet_udp_sendrecv_router_port" lineno="72662">
37459 +<interface name="corenet_udp_sendrecv_router_port" lineno="72785">
37460 <summary>
37461 Send and receive UDP traffic on the router port.
37462 </summary>
37463 @@ -55418,7 +55235,7 @@ Domain allowed access.
37464 </param>
37465 <infoflow type="both" weight="10"/>
37466 </interface>
37467 -<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="72678">
37468 +<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="72801">
37469 <summary>
37470 Do not audit attempts to send and receive
37471 UDP traffic on the router port.
37472 @@ -55430,7 +55247,7 @@ Domain to not audit.
37473 </param>
37474 <infoflow type="none"/>
37475 </interface>
37476 -<interface name="corenet_tcp_bind_router_port" lineno="72693">
37477 +<interface name="corenet_tcp_bind_router_port" lineno="72816">
37478 <summary>
37479 Bind TCP sockets to the router port.
37480 </summary>
37481 @@ -55441,7 +55258,7 @@ Domain allowed access.
37482 </param>
37483 <infoflow type="none"/>
37484 </interface>
37485 -<interface name="corenet_udp_bind_router_port" lineno="72713">
37486 +<interface name="corenet_udp_bind_router_port" lineno="72836">
37487 <summary>
37488 Bind UDP sockets to the router port.
37489 </summary>
37490 @@ -55452,7 +55269,7 @@ Domain allowed access.
37491 </param>
37492 <infoflow type="none"/>
37493 </interface>
37494 -<interface name="corenet_tcp_connect_router_port" lineno="72732">
37495 +<interface name="corenet_tcp_connect_router_port" lineno="72855">
37496 <summary>
37497 Make a TCP connection to the router port.
37498 </summary>
37499 @@ -55462,7 +55279,7 @@ Domain allowed access.
37500 </summary>
37501 </param>
37502 </interface>
37503 -<interface name="corenet_send_router_client_packets" lineno="72752">
37504 +<interface name="corenet_send_router_client_packets" lineno="72875">
37505 <summary>
37506 Send router_client packets.
37507 </summary>
37508 @@ -55473,7 +55290,7 @@ Domain allowed access.
37509 </param>
37510 <infoflow type="write" weight="10"/>
37511 </interface>
37512 -<interface name="corenet_dontaudit_send_router_client_packets" lineno="72771">
37513 +<interface name="corenet_dontaudit_send_router_client_packets" lineno="72894">
37514 <summary>
37515 Do not audit attempts to send router_client packets.
37516 </summary>
37517 @@ -55484,7 +55301,7 @@ Domain to not audit.
37518 </param>
37519 <infoflow type="none"/>
37520 </interface>
37521 -<interface name="corenet_receive_router_client_packets" lineno="72790">
37522 +<interface name="corenet_receive_router_client_packets" lineno="72913">
37523 <summary>
37524 Receive router_client packets.
37525 </summary>
37526 @@ -55495,7 +55312,7 @@ Domain allowed access.
37527 </param>
37528 <infoflow type="read" weight="10"/>
37529 </interface>
37530 -<interface name="corenet_dontaudit_receive_router_client_packets" lineno="72809">
37531 +<interface name="corenet_dontaudit_receive_router_client_packets" lineno="72932">
37532 <summary>
37533 Do not audit attempts to receive router_client packets.
37534 </summary>
37535 @@ -55506,7 +55323,7 @@ Domain allowed access.
37536 </param>
37537 <infoflow type="none"/>
37538 </interface>
37539 -<interface name="corenet_sendrecv_router_client_packets" lineno="72828">
37540 +<interface name="corenet_sendrecv_router_client_packets" lineno="72951">
37541 <summary>
37542 Send and receive router_client packets.
37543 </summary>
37544 @@ -55517,7 +55334,7 @@ Domain allowed access.
37545 </param>
37546 <infoflow type="both" weight="10"/>
37547 </interface>
37548 -<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="72844">
37549 +<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="72967">
37550 <summary>
37551 Do not audit attempts to send and receive router_client packets.
37552 </summary>
37553 @@ -55528,7 +55345,7 @@ Domain to not audit.
37554 </param>
37555 <infoflow type="none"/>
37556 </interface>
37557 -<interface name="corenet_relabelto_router_client_packets" lineno="72859">
37558 +<interface name="corenet_relabelto_router_client_packets" lineno="72982">
37559 <summary>
37560 Relabel packets to router_client the packet type.
37561 </summary>
37562 @@ -55538,7 +55355,7 @@ Domain allowed access.
37563 </summary>
37564 </param>
37565 </interface>
37566 -<interface name="corenet_send_router_server_packets" lineno="72879">
37567 +<interface name="corenet_send_router_server_packets" lineno="73002">
37568 <summary>
37569 Send router_server packets.
37570 </summary>
37571 @@ -55549,7 +55366,7 @@ Domain allowed access.
37572 </param>
37573 <infoflow type="write" weight="10"/>
37574 </interface>
37575 -<interface name="corenet_dontaudit_send_router_server_packets" lineno="72898">
37576 +<interface name="corenet_dontaudit_send_router_server_packets" lineno="73021">
37577 <summary>
37578 Do not audit attempts to send router_server packets.
37579 </summary>
37580 @@ -55560,7 +55377,7 @@ Domain to not audit.
37581 </param>
37582 <infoflow type="none"/>
37583 </interface>
37584 -<interface name="corenet_receive_router_server_packets" lineno="72917">
37585 +<interface name="corenet_receive_router_server_packets" lineno="73040">
37586 <summary>
37587 Receive router_server packets.
37588 </summary>
37589 @@ -55571,7 +55388,7 @@ Domain allowed access.
37590 </param>
37591 <infoflow type="read" weight="10"/>
37592 </interface>
37593 -<interface name="corenet_dontaudit_receive_router_server_packets" lineno="72936">
37594 +<interface name="corenet_dontaudit_receive_router_server_packets" lineno="73059">
37595 <summary>
37596 Do not audit attempts to receive router_server packets.
37597 </summary>
37598 @@ -55582,7 +55399,7 @@ Domain allowed access.
37599 </param>
37600 <infoflow type="none"/>
37601 </interface>
37602 -<interface name="corenet_sendrecv_router_server_packets" lineno="72955">
37603 +<interface name="corenet_sendrecv_router_server_packets" lineno="73078">
37604 <summary>
37605 Send and receive router_server packets.
37606 </summary>
37607 @@ -55593,7 +55410,7 @@ Domain allowed access.
37608 </param>
37609 <infoflow type="both" weight="10"/>
37610 </interface>
37611 -<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="72971">
37612 +<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="73094">
37613 <summary>
37614 Do not audit attempts to send and receive router_server packets.
37615 </summary>
37616 @@ -55604,7 +55421,7 @@ Domain to not audit.
37617 </param>
37618 <infoflow type="none"/>
37619 </interface>
37620 -<interface name="corenet_relabelto_router_server_packets" lineno="72986">
37621 +<interface name="corenet_relabelto_router_server_packets" lineno="73109">
37622 <summary>
37623 Relabel packets to router_server the packet type.
37624 </summary>
37625 @@ -55614,7 +55431,7 @@ Domain allowed access.
37626 </summary>
37627 </param>
37628 </interface>
37629 -<interface name="corenet_tcp_sendrecv_rsh_port" lineno="73008">
37630 +<interface name="corenet_tcp_sendrecv_rsh_port" lineno="73131">
37631 <summary>
37632 Send and receive TCP traffic on the rsh port.
37633 </summary>
37634 @@ -55625,7 +55442,7 @@ Domain allowed access.
37635 </param>
37636 <infoflow type="both" weight="10"/>
37637 </interface>
37638 -<interface name="corenet_udp_send_rsh_port" lineno="73023">
37639 +<interface name="corenet_udp_send_rsh_port" lineno="73146">
37640 <summary>
37641 Send UDP traffic on the rsh port.
37642 </summary>
37643 @@ -55636,7 +55453,7 @@ Domain allowed access.
37644 </param>
37645 <infoflow type="write" weight="10"/>
37646 </interface>
37647 -<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="73038">
37648 +<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="73161">
37649 <summary>
37650 Do not audit attempts to send UDP traffic on the rsh port.
37651 </summary>
37652 @@ -55647,7 +55464,7 @@ Domain to not audit.
37653 </param>
37654 <infoflow type="none"/>
37655 </interface>
37656 -<interface name="corenet_udp_receive_rsh_port" lineno="73053">
37657 +<interface name="corenet_udp_receive_rsh_port" lineno="73176">
37658 <summary>
37659 Receive UDP traffic on the rsh port.
37660 </summary>
37661 @@ -55658,7 +55475,7 @@ Domain allowed access.
37662 </param>
37663 <infoflow type="read" weight="10"/>
37664 </interface>
37665 -<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="73068">
37666 +<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="73191">
37667 <summary>
37668 Do not audit attempts to receive UDP traffic on the rsh port.
37669 </summary>
37670 @@ -55669,7 +55486,7 @@ Domain to not audit.
37671 </param>
37672 <infoflow type="none"/>
37673 </interface>
37674 -<interface name="corenet_udp_sendrecv_rsh_port" lineno="73083">
37675 +<interface name="corenet_udp_sendrecv_rsh_port" lineno="73206">
37676 <summary>
37677 Send and receive UDP traffic on the rsh port.
37678 </summary>
37679 @@ -55680,7 +55497,7 @@ Domain allowed access.
37680 </param>
37681 <infoflow type="both" weight="10"/>
37682 </interface>
37683 -<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="73099">
37684 +<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="73222">
37685 <summary>
37686 Do not audit attempts to send and receive
37687 UDP traffic on the rsh port.
37688 @@ -55692,7 +55509,7 @@ Domain to not audit.
37689 </param>
37690 <infoflow type="none"/>
37691 </interface>
37692 -<interface name="corenet_tcp_bind_rsh_port" lineno="73114">
37693 +<interface name="corenet_tcp_bind_rsh_port" lineno="73237">
37694 <summary>
37695 Bind TCP sockets to the rsh port.
37696 </summary>
37697 @@ -55703,7 +55520,7 @@ Domain allowed access.
37698 </param>
37699 <infoflow type="none"/>
37700 </interface>
37701 -<interface name="corenet_udp_bind_rsh_port" lineno="73134">
37702 +<interface name="corenet_udp_bind_rsh_port" lineno="73257">
37703 <summary>
37704 Bind UDP sockets to the rsh port.
37705 </summary>
37706 @@ -55714,7 +55531,7 @@ Domain allowed access.
37707 </param>
37708 <infoflow type="none"/>
37709 </interface>
37710 -<interface name="corenet_tcp_connect_rsh_port" lineno="73153">
37711 +<interface name="corenet_tcp_connect_rsh_port" lineno="73276">
37712 <summary>
37713 Make a TCP connection to the rsh port.
37714 </summary>
37715 @@ -55724,7 +55541,7 @@ Domain allowed access.
37716 </summary>
37717 </param>
37718 </interface>
37719 -<interface name="corenet_send_rsh_client_packets" lineno="73173">
37720 +<interface name="corenet_send_rsh_client_packets" lineno="73296">
37721 <summary>
37722 Send rsh_client packets.
37723 </summary>
37724 @@ -55735,7 +55552,7 @@ Domain allowed access.
37725 </param>
37726 <infoflow type="write" weight="10"/>
37727 </interface>
37728 -<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="73192">
37729 +<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="73315">
37730 <summary>
37731 Do not audit attempts to send rsh_client packets.
37732 </summary>
37733 @@ -55746,7 +55563,7 @@ Domain to not audit.
37734 </param>
37735 <infoflow type="none"/>
37736 </interface>
37737 -<interface name="corenet_receive_rsh_client_packets" lineno="73211">
37738 +<interface name="corenet_receive_rsh_client_packets" lineno="73334">
37739 <summary>
37740 Receive rsh_client packets.
37741 </summary>
37742 @@ -55757,7 +55574,7 @@ Domain allowed access.
37743 </param>
37744 <infoflow type="read" weight="10"/>
37745 </interface>
37746 -<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="73230">
37747 +<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="73353">
37748 <summary>
37749 Do not audit attempts to receive rsh_client packets.
37750 </summary>
37751 @@ -55768,7 +55585,7 @@ Domain allowed access.
37752 </param>
37753 <infoflow type="none"/>
37754 </interface>
37755 -<interface name="corenet_sendrecv_rsh_client_packets" lineno="73249">
37756 +<interface name="corenet_sendrecv_rsh_client_packets" lineno="73372">
37757 <summary>
37758 Send and receive rsh_client packets.
37759 </summary>
37760 @@ -55779,7 +55596,7 @@ Domain allowed access.
37761 </param>
37762 <infoflow type="both" weight="10"/>
37763 </interface>
37764 -<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="73265">
37765 +<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="73388">
37766 <summary>
37767 Do not audit attempts to send and receive rsh_client packets.
37768 </summary>
37769 @@ -55790,7 +55607,7 @@ Domain to not audit.
37770 </param>
37771 <infoflow type="none"/>
37772 </interface>
37773 -<interface name="corenet_relabelto_rsh_client_packets" lineno="73280">
37774 +<interface name="corenet_relabelto_rsh_client_packets" lineno="73403">
37775 <summary>
37776 Relabel packets to rsh_client the packet type.
37777 </summary>
37778 @@ -55800,7 +55617,7 @@ Domain allowed access.
37779 </summary>
37780 </param>
37781 </interface>
37782 -<interface name="corenet_send_rsh_server_packets" lineno="73300">
37783 +<interface name="corenet_send_rsh_server_packets" lineno="73423">
37784 <summary>
37785 Send rsh_server packets.
37786 </summary>
37787 @@ -55811,7 +55628,7 @@ Domain allowed access.
37788 </param>
37789 <infoflow type="write" weight="10"/>
37790 </interface>
37791 -<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="73319">
37792 +<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="73442">
37793 <summary>
37794 Do not audit attempts to send rsh_server packets.
37795 </summary>
37796 @@ -55822,7 +55639,7 @@ Domain to not audit.
37797 </param>
37798 <infoflow type="none"/>
37799 </interface>
37800 -<interface name="corenet_receive_rsh_server_packets" lineno="73338">
37801 +<interface name="corenet_receive_rsh_server_packets" lineno="73461">
37802 <summary>
37803 Receive rsh_server packets.
37804 </summary>
37805 @@ -55833,7 +55650,7 @@ Domain allowed access.
37806 </param>
37807 <infoflow type="read" weight="10"/>
37808 </interface>
37809 -<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="73357">
37810 +<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="73480">
37811 <summary>
37812 Do not audit attempts to receive rsh_server packets.
37813 </summary>
37814 @@ -55844,7 +55661,7 @@ Domain allowed access.
37815 </param>
37816 <infoflow type="none"/>
37817 </interface>
37818 -<interface name="corenet_sendrecv_rsh_server_packets" lineno="73376">
37819 +<interface name="corenet_sendrecv_rsh_server_packets" lineno="73499">
37820 <summary>
37821 Send and receive rsh_server packets.
37822 </summary>
37823 @@ -55855,7 +55672,7 @@ Domain allowed access.
37824 </param>
37825 <infoflow type="both" weight="10"/>
37826 </interface>
37827 -<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="73392">
37828 +<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="73515">
37829 <summary>
37830 Do not audit attempts to send and receive rsh_server packets.
37831 </summary>
37832 @@ -55866,7 +55683,7 @@ Domain to not audit.
37833 </param>
37834 <infoflow type="none"/>
37835 </interface>
37836 -<interface name="corenet_relabelto_rsh_server_packets" lineno="73407">
37837 +<interface name="corenet_relabelto_rsh_server_packets" lineno="73530">
37838 <summary>
37839 Relabel packets to rsh_server the packet type.
37840 </summary>
37841 @@ -55876,7 +55693,7 @@ Domain allowed access.
37842 </summary>
37843 </param>
37844 </interface>
37845 -<interface name="corenet_tcp_sendrecv_rsync_port" lineno="73429">
37846 +<interface name="corenet_tcp_sendrecv_rsync_port" lineno="73552">
37847 <summary>
37848 Send and receive TCP traffic on the rsync port.
37849 </summary>
37850 @@ -55887,7 +55704,7 @@ Domain allowed access.
37851 </param>
37852 <infoflow type="both" weight="10"/>
37853 </interface>
37854 -<interface name="corenet_udp_send_rsync_port" lineno="73444">
37855 +<interface name="corenet_udp_send_rsync_port" lineno="73567">
37856 <summary>
37857 Send UDP traffic on the rsync port.
37858 </summary>
37859 @@ -55898,7 +55715,7 @@ Domain allowed access.
37860 </param>
37861 <infoflow type="write" weight="10"/>
37862 </interface>
37863 -<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="73459">
37864 +<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="73582">
37865 <summary>
37866 Do not audit attempts to send UDP traffic on the rsync port.
37867 </summary>
37868 @@ -55909,7 +55726,7 @@ Domain to not audit.
37869 </param>
37870 <infoflow type="none"/>
37871 </interface>
37872 -<interface name="corenet_udp_receive_rsync_port" lineno="73474">
37873 +<interface name="corenet_udp_receive_rsync_port" lineno="73597">
37874 <summary>
37875 Receive UDP traffic on the rsync port.
37876 </summary>
37877 @@ -55920,7 +55737,7 @@ Domain allowed access.
37878 </param>
37879 <infoflow type="read" weight="10"/>
37880 </interface>
37881 -<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="73489">
37882 +<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="73612">
37883 <summary>
37884 Do not audit attempts to receive UDP traffic on the rsync port.
37885 </summary>
37886 @@ -55931,7 +55748,7 @@ Domain to not audit.
37887 </param>
37888 <infoflow type="none"/>
37889 </interface>
37890 -<interface name="corenet_udp_sendrecv_rsync_port" lineno="73504">
37891 +<interface name="corenet_udp_sendrecv_rsync_port" lineno="73627">
37892 <summary>
37893 Send and receive UDP traffic on the rsync port.
37894 </summary>
37895 @@ -55942,7 +55759,7 @@ Domain allowed access.
37896 </param>
37897 <infoflow type="both" weight="10"/>
37898 </interface>
37899 -<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="73520">
37900 +<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="73643">
37901 <summary>
37902 Do not audit attempts to send and receive
37903 UDP traffic on the rsync port.
37904 @@ -55954,7 +55771,7 @@ Domain to not audit.
37905 </param>
37906 <infoflow type="none"/>
37907 </interface>
37908 -<interface name="corenet_tcp_bind_rsync_port" lineno="73535">
37909 +<interface name="corenet_tcp_bind_rsync_port" lineno="73658">
37910 <summary>
37911 Bind TCP sockets to the rsync port.
37912 </summary>
37913 @@ -55965,7 +55782,7 @@ Domain allowed access.
37914 </param>
37915 <infoflow type="none"/>
37916 </interface>
37917 -<interface name="corenet_udp_bind_rsync_port" lineno="73555">
37918 +<interface name="corenet_udp_bind_rsync_port" lineno="73678">
37919 <summary>
37920 Bind UDP sockets to the rsync port.
37921 </summary>
37922 @@ -55976,7 +55793,7 @@ Domain allowed access.
37923 </param>
37924 <infoflow type="none"/>
37925 </interface>
37926 -<interface name="corenet_tcp_connect_rsync_port" lineno="73574">
37927 +<interface name="corenet_tcp_connect_rsync_port" lineno="73697">
37928 <summary>
37929 Make a TCP connection to the rsync port.
37930 </summary>
37931 @@ -55986,7 +55803,7 @@ Domain allowed access.
37932 </summary>
37933 </param>
37934 </interface>
37935 -<interface name="corenet_send_rsync_client_packets" lineno="73594">
37936 +<interface name="corenet_send_rsync_client_packets" lineno="73717">
37937 <summary>
37938 Send rsync_client packets.
37939 </summary>
37940 @@ -55997,7 +55814,7 @@ Domain allowed access.
37941 </param>
37942 <infoflow type="write" weight="10"/>
37943 </interface>
37944 -<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="73613">
37945 +<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="73736">
37946 <summary>
37947 Do not audit attempts to send rsync_client packets.
37948 </summary>
37949 @@ -56008,7 +55825,7 @@ Domain to not audit.
37950 </param>
37951 <infoflow type="none"/>
37952 </interface>
37953 -<interface name="corenet_receive_rsync_client_packets" lineno="73632">
37954 +<interface name="corenet_receive_rsync_client_packets" lineno="73755">
37955 <summary>
37956 Receive rsync_client packets.
37957 </summary>
37958 @@ -56019,7 +55836,7 @@ Domain allowed access.
37959 </param>
37960 <infoflow type="read" weight="10"/>
37961 </interface>
37962 -<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="73651">
37963 +<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="73774">
37964 <summary>
37965 Do not audit attempts to receive rsync_client packets.
37966 </summary>
37967 @@ -56030,7 +55847,7 @@ Domain allowed access.
37968 </param>
37969 <infoflow type="none"/>
37970 </interface>
37971 -<interface name="corenet_sendrecv_rsync_client_packets" lineno="73670">
37972 +<interface name="corenet_sendrecv_rsync_client_packets" lineno="73793">
37973 <summary>
37974 Send and receive rsync_client packets.
37975 </summary>
37976 @@ -56041,7 +55858,7 @@ Domain allowed access.
37977 </param>
37978 <infoflow type="both" weight="10"/>
37979 </interface>
37980 -<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="73686">
37981 +<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="73809">
37982 <summary>
37983 Do not audit attempts to send and receive rsync_client packets.
37984 </summary>
37985 @@ -56052,7 +55869,7 @@ Domain to not audit.
37986 </param>
37987 <infoflow type="none"/>
37988 </interface>
37989 -<interface name="corenet_relabelto_rsync_client_packets" lineno="73701">
37990 +<interface name="corenet_relabelto_rsync_client_packets" lineno="73824">
37991 <summary>
37992 Relabel packets to rsync_client the packet type.
37993 </summary>
37994 @@ -56062,7 +55879,7 @@ Domain allowed access.
37995 </summary>
37996 </param>
37997 </interface>
37998 -<interface name="corenet_send_rsync_server_packets" lineno="73721">
37999 +<interface name="corenet_send_rsync_server_packets" lineno="73844">
38000 <summary>
38001 Send rsync_server packets.
38002 </summary>
38003 @@ -56073,7 +55890,7 @@ Domain allowed access.
38004 </param>
38005 <infoflow type="write" weight="10"/>
38006 </interface>
38007 -<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="73740">
38008 +<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="73863">
38009 <summary>
38010 Do not audit attempts to send rsync_server packets.
38011 </summary>
38012 @@ -56084,7 +55901,7 @@ Domain to not audit.
38013 </param>
38014 <infoflow type="none"/>
38015 </interface>
38016 -<interface name="corenet_receive_rsync_server_packets" lineno="73759">
38017 +<interface name="corenet_receive_rsync_server_packets" lineno="73882">
38018 <summary>
38019 Receive rsync_server packets.
38020 </summary>
38021 @@ -56095,7 +55912,7 @@ Domain allowed access.
38022 </param>
38023 <infoflow type="read" weight="10"/>
38024 </interface>
38025 -<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="73778">
38026 +<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="73901">
38027 <summary>
38028 Do not audit attempts to receive rsync_server packets.
38029 </summary>
38030 @@ -56106,7 +55923,7 @@ Domain allowed access.
38031 </param>
38032 <infoflow type="none"/>
38033 </interface>
38034 -<interface name="corenet_sendrecv_rsync_server_packets" lineno="73797">
38035 +<interface name="corenet_sendrecv_rsync_server_packets" lineno="73920">
38036 <summary>
38037 Send and receive rsync_server packets.
38038 </summary>
38039 @@ -56117,7 +55934,7 @@ Domain allowed access.
38040 </param>
38041 <infoflow type="both" weight="10"/>
38042 </interface>
38043 -<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="73813">
38044 +<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="73936">
38045 <summary>
38046 Do not audit attempts to send and receive rsync_server packets.
38047 </summary>
38048 @@ -56128,7 +55945,7 @@ Domain to not audit.
38049 </param>
38050 <infoflow type="none"/>
38051 </interface>
38052 -<interface name="corenet_relabelto_rsync_server_packets" lineno="73828">
38053 +<interface name="corenet_relabelto_rsync_server_packets" lineno="73951">
38054 <summary>
38055 Relabel packets to rsync_server the packet type.
38056 </summary>
38057 @@ -56138,7 +55955,7 @@ Domain allowed access.
38058 </summary>
38059 </param>
38060 </interface>
38061 -<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="73850">
38062 +<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="73973">
38063 <summary>
38064 Send and receive TCP traffic on the rtorrent port.
38065 </summary>
38066 @@ -56149,7 +55966,7 @@ Domain allowed access.
38067 </param>
38068 <infoflow type="both" weight="10"/>
38069 </interface>
38070 -<interface name="corenet_udp_send_rtorrent_port" lineno="73865">
38071 +<interface name="corenet_udp_send_rtorrent_port" lineno="73988">
38072 <summary>
38073 Send UDP traffic on the rtorrent port.
38074 </summary>
38075 @@ -56160,7 +55977,7 @@ Domain allowed access.
38076 </param>
38077 <infoflow type="write" weight="10"/>
38078 </interface>
38079 -<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="73880">
38080 +<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="74003">
38081 <summary>
38082 Do not audit attempts to send UDP traffic on the rtorrent port.
38083 </summary>
38084 @@ -56171,7 +55988,7 @@ Domain to not audit.
38085 </param>
38086 <infoflow type="none"/>
38087 </interface>
38088 -<interface name="corenet_udp_receive_rtorrent_port" lineno="73895">
38089 +<interface name="corenet_udp_receive_rtorrent_port" lineno="74018">
38090 <summary>
38091 Receive UDP traffic on the rtorrent port.
38092 </summary>
38093 @@ -56182,7 +55999,7 @@ Domain allowed access.
38094 </param>
38095 <infoflow type="read" weight="10"/>
38096 </interface>
38097 -<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="73910">
38098 +<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="74033">
38099 <summary>
38100 Do not audit attempts to receive UDP traffic on the rtorrent port.
38101 </summary>
38102 @@ -56193,7 +56010,7 @@ Domain to not audit.
38103 </param>
38104 <infoflow type="none"/>
38105 </interface>
38106 -<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="73925">
38107 +<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="74048">
38108 <summary>
38109 Send and receive UDP traffic on the rtorrent port.
38110 </summary>
38111 @@ -56204,7 +56021,7 @@ Domain allowed access.
38112 </param>
38113 <infoflow type="both" weight="10"/>
38114 </interface>
38115 -<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="73941">
38116 +<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="74064">
38117 <summary>
38118 Do not audit attempts to send and receive
38119 UDP traffic on the rtorrent port.
38120 @@ -56216,7 +56033,7 @@ Domain to not audit.
38121 </param>
38122 <infoflow type="none"/>
38123 </interface>
38124 -<interface name="corenet_tcp_bind_rtorrent_port" lineno="73956">
38125 +<interface name="corenet_tcp_bind_rtorrent_port" lineno="74079">
38126 <summary>
38127 Bind TCP sockets to the rtorrent port.
38128 </summary>
38129 @@ -56227,7 +56044,7 @@ Domain allowed access.
38130 </param>
38131 <infoflow type="none"/>
38132 </interface>
38133 -<interface name="corenet_udp_bind_rtorrent_port" lineno="73976">
38134 +<interface name="corenet_udp_bind_rtorrent_port" lineno="74099">
38135 <summary>
38136 Bind UDP sockets to the rtorrent port.
38137 </summary>
38138 @@ -56238,7 +56055,7 @@ Domain allowed access.
38139 </param>
38140 <infoflow type="none"/>
38141 </interface>
38142 -<interface name="corenet_tcp_connect_rtorrent_port" lineno="73995">
38143 +<interface name="corenet_tcp_connect_rtorrent_port" lineno="74118">
38144 <summary>
38145 Make a TCP connection to the rtorrent port.
38146 </summary>
38147 @@ -56248,7 +56065,7 @@ Domain allowed access.
38148 </summary>
38149 </param>
38150 </interface>
38151 -<interface name="corenet_send_rtorrent_client_packets" lineno="74015">
38152 +<interface name="corenet_send_rtorrent_client_packets" lineno="74138">
38153 <summary>
38154 Send rtorrent_client packets.
38155 </summary>
38156 @@ -56259,7 +56076,7 @@ Domain allowed access.
38157 </param>
38158 <infoflow type="write" weight="10"/>
38159 </interface>
38160 -<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="74034">
38161 +<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="74157">
38162 <summary>
38163 Do not audit attempts to send rtorrent_client packets.
38164 </summary>
38165 @@ -56270,7 +56087,7 @@ Domain to not audit.
38166 </param>
38167 <infoflow type="none"/>
38168 </interface>
38169 -<interface name="corenet_receive_rtorrent_client_packets" lineno="74053">
38170 +<interface name="corenet_receive_rtorrent_client_packets" lineno="74176">
38171 <summary>
38172 Receive rtorrent_client packets.
38173 </summary>
38174 @@ -56281,7 +56098,7 @@ Domain allowed access.
38175 </param>
38176 <infoflow type="read" weight="10"/>
38177 </interface>
38178 -<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="74072">
38179 +<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="74195">
38180 <summary>
38181 Do not audit attempts to receive rtorrent_client packets.
38182 </summary>
38183 @@ -56292,7 +56109,7 @@ Domain allowed access.
38184 </param>
38185 <infoflow type="none"/>
38186 </interface>
38187 -<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="74091">
38188 +<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="74214">
38189 <summary>
38190 Send and receive rtorrent_client packets.
38191 </summary>
38192 @@ -56303,7 +56120,7 @@ Domain allowed access.
38193 </param>
38194 <infoflow type="both" weight="10"/>
38195 </interface>
38196 -<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="74107">
38197 +<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="74230">
38198 <summary>
38199 Do not audit attempts to send and receive rtorrent_client packets.
38200 </summary>
38201 @@ -56314,7 +56131,7 @@ Domain to not audit.
38202 </param>
38203 <infoflow type="none"/>
38204 </interface>
38205 -<interface name="corenet_relabelto_rtorrent_client_packets" lineno="74122">
38206 +<interface name="corenet_relabelto_rtorrent_client_packets" lineno="74245">
38207 <summary>
38208 Relabel packets to rtorrent_client the packet type.
38209 </summary>
38210 @@ -56324,7 +56141,7 @@ Domain allowed access.
38211 </summary>
38212 </param>
38213 </interface>
38214 -<interface name="corenet_send_rtorrent_server_packets" lineno="74142">
38215 +<interface name="corenet_send_rtorrent_server_packets" lineno="74265">
38216 <summary>
38217 Send rtorrent_server packets.
38218 </summary>
38219 @@ -56335,7 +56152,7 @@ Domain allowed access.
38220 </param>
38221 <infoflow type="write" weight="10"/>
38222 </interface>
38223 -<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="74161">
38224 +<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="74284">
38225 <summary>
38226 Do not audit attempts to send rtorrent_server packets.
38227 </summary>
38228 @@ -56346,7 +56163,7 @@ Domain to not audit.
38229 </param>
38230 <infoflow type="none"/>
38231 </interface>
38232 -<interface name="corenet_receive_rtorrent_server_packets" lineno="74180">
38233 +<interface name="corenet_receive_rtorrent_server_packets" lineno="74303">
38234 <summary>
38235 Receive rtorrent_server packets.
38236 </summary>
38237 @@ -56357,7 +56174,7 @@ Domain allowed access.
38238 </param>
38239 <infoflow type="read" weight="10"/>
38240 </interface>
38241 -<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="74199">
38242 +<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="74322">
38243 <summary>
38244 Do not audit attempts to receive rtorrent_server packets.
38245 </summary>
38246 @@ -56368,7 +56185,7 @@ Domain allowed access.
38247 </param>
38248 <infoflow type="none"/>
38249 </interface>
38250 -<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="74218">
38251 +<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="74341">
38252 <summary>
38253 Send and receive rtorrent_server packets.
38254 </summary>
38255 @@ -56379,7 +56196,7 @@ Domain allowed access.
38256 </param>
38257 <infoflow type="both" weight="10"/>
38258 </interface>
38259 -<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="74234">
38260 +<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="74357">
38261 <summary>
38262 Do not audit attempts to send and receive rtorrent_server packets.
38263 </summary>
38264 @@ -56390,7 +56207,7 @@ Domain to not audit.
38265 </param>
38266 <infoflow type="none"/>
38267 </interface>
38268 -<interface name="corenet_relabelto_rtorrent_server_packets" lineno="74249">
38269 +<interface name="corenet_relabelto_rtorrent_server_packets" lineno="74372">
38270 <summary>
38271 Relabel packets to rtorrent_server the packet type.
38272 </summary>
38273 @@ -56400,7 +56217,7 @@ Domain allowed access.
38274 </summary>
38275 </param>
38276 </interface>
38277 -<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="74271">
38278 +<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="74394">
38279 <summary>
38280 Send and receive TCP traffic on the rtsp port.
38281 </summary>
38282 @@ -56411,7 +56228,7 @@ Domain allowed access.
38283 </param>
38284 <infoflow type="both" weight="10"/>
38285 </interface>
38286 -<interface name="corenet_udp_send_rtsp_port" lineno="74286">
38287 +<interface name="corenet_udp_send_rtsp_port" lineno="74409">
38288 <summary>
38289 Send UDP traffic on the rtsp port.
38290 </summary>
38291 @@ -56422,7 +56239,7 @@ Domain allowed access.
38292 </param>
38293 <infoflow type="write" weight="10"/>
38294 </interface>
38295 -<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="74301">
38296 +<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="74424">
38297 <summary>
38298 Do not audit attempts to send UDP traffic on the rtsp port.
38299 </summary>
38300 @@ -56433,7 +56250,7 @@ Domain to not audit.
38301 </param>
38302 <infoflow type="none"/>
38303 </interface>
38304 -<interface name="corenet_udp_receive_rtsp_port" lineno="74316">
38305 +<interface name="corenet_udp_receive_rtsp_port" lineno="74439">
38306 <summary>
38307 Receive UDP traffic on the rtsp port.
38308 </summary>
38309 @@ -56444,7 +56261,7 @@ Domain allowed access.
38310 </param>
38311 <infoflow type="read" weight="10"/>
38312 </interface>
38313 -<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="74331">
38314 +<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="74454">
38315 <summary>
38316 Do not audit attempts to receive UDP traffic on the rtsp port.
38317 </summary>
38318 @@ -56455,7 +56272,7 @@ Domain to not audit.
38319 </param>
38320 <infoflow type="none"/>
38321 </interface>
38322 -<interface name="corenet_udp_sendrecv_rtsp_port" lineno="74346">
38323 +<interface name="corenet_udp_sendrecv_rtsp_port" lineno="74469">
38324 <summary>
38325 Send and receive UDP traffic on the rtsp port.
38326 </summary>
38327 @@ -56466,7 +56283,7 @@ Domain allowed access.
38328 </param>
38329 <infoflow type="both" weight="10"/>
38330 </interface>
38331 -<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="74362">
38332 +<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="74485">
38333 <summary>
38334 Do not audit attempts to send and receive
38335 UDP traffic on the rtsp port.
38336 @@ -56478,7 +56295,7 @@ Domain to not audit.
38337 </param>
38338 <infoflow type="none"/>
38339 </interface>
38340 -<interface name="corenet_tcp_bind_rtsp_port" lineno="74377">
38341 +<interface name="corenet_tcp_bind_rtsp_port" lineno="74500">
38342 <summary>
38343 Bind TCP sockets to the rtsp port.
38344 </summary>
38345 @@ -56489,7 +56306,7 @@ Domain allowed access.
38346 </param>
38347 <infoflow type="none"/>
38348 </interface>
38349 -<interface name="corenet_udp_bind_rtsp_port" lineno="74397">
38350 +<interface name="corenet_udp_bind_rtsp_port" lineno="74520">
38351 <summary>
38352 Bind UDP sockets to the rtsp port.
38353 </summary>
38354 @@ -56500,7 +56317,7 @@ Domain allowed access.
38355 </param>
38356 <infoflow type="none"/>
38357 </interface>
38358 -<interface name="corenet_tcp_connect_rtsp_port" lineno="74416">
38359 +<interface name="corenet_tcp_connect_rtsp_port" lineno="74539">
38360 <summary>
38361 Make a TCP connection to the rtsp port.
38362 </summary>
38363 @@ -56510,7 +56327,7 @@ Domain allowed access.
38364 </summary>
38365 </param>
38366 </interface>
38367 -<interface name="corenet_send_rtsp_client_packets" lineno="74436">
38368 +<interface name="corenet_send_rtsp_client_packets" lineno="74559">
38369 <summary>
38370 Send rtsp_client packets.
38371 </summary>
38372 @@ -56521,7 +56338,7 @@ Domain allowed access.
38373 </param>
38374 <infoflow type="write" weight="10"/>
38375 </interface>
38376 -<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="74455">
38377 +<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="74578">
38378 <summary>
38379 Do not audit attempts to send rtsp_client packets.
38380 </summary>
38381 @@ -56532,7 +56349,7 @@ Domain to not audit.
38382 </param>
38383 <infoflow type="none"/>
38384 </interface>
38385 -<interface name="corenet_receive_rtsp_client_packets" lineno="74474">
38386 +<interface name="corenet_receive_rtsp_client_packets" lineno="74597">
38387 <summary>
38388 Receive rtsp_client packets.
38389 </summary>
38390 @@ -56543,7 +56360,7 @@ Domain allowed access.
38391 </param>
38392 <infoflow type="read" weight="10"/>
38393 </interface>
38394 -<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="74493">
38395 +<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="74616">
38396 <summary>
38397 Do not audit attempts to receive rtsp_client packets.
38398 </summary>
38399 @@ -56554,7 +56371,7 @@ Domain allowed access.
38400 </param>
38401 <infoflow type="none"/>
38402 </interface>
38403 -<interface name="corenet_sendrecv_rtsp_client_packets" lineno="74512">
38404 +<interface name="corenet_sendrecv_rtsp_client_packets" lineno="74635">
38405 <summary>
38406 Send and receive rtsp_client packets.
38407 </summary>
38408 @@ -56565,7 +56382,7 @@ Domain allowed access.
38409 </param>
38410 <infoflow type="both" weight="10"/>
38411 </interface>
38412 -<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="74528">
38413 +<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="74651">
38414 <summary>
38415 Do not audit attempts to send and receive rtsp_client packets.
38416 </summary>
38417 @@ -56576,7 +56393,7 @@ Domain to not audit.
38418 </param>
38419 <infoflow type="none"/>
38420 </interface>
38421 -<interface name="corenet_relabelto_rtsp_client_packets" lineno="74543">
38422 +<interface name="corenet_relabelto_rtsp_client_packets" lineno="74666">
38423 <summary>
38424 Relabel packets to rtsp_client the packet type.
38425 </summary>
38426 @@ -56586,7 +56403,7 @@ Domain allowed access.
38427 </summary>
38428 </param>
38429 </interface>
38430 -<interface name="corenet_send_rtsp_server_packets" lineno="74563">
38431 +<interface name="corenet_send_rtsp_server_packets" lineno="74686">
38432 <summary>
38433 Send rtsp_server packets.
38434 </summary>
38435 @@ -56597,7 +56414,7 @@ Domain allowed access.
38436 </param>
38437 <infoflow type="write" weight="10"/>
38438 </interface>
38439 -<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="74582">
38440 +<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="74705">
38441 <summary>
38442 Do not audit attempts to send rtsp_server packets.
38443 </summary>
38444 @@ -56608,7 +56425,7 @@ Domain to not audit.
38445 </param>
38446 <infoflow type="none"/>
38447 </interface>
38448 -<interface name="corenet_receive_rtsp_server_packets" lineno="74601">
38449 +<interface name="corenet_receive_rtsp_server_packets" lineno="74724">
38450 <summary>
38451 Receive rtsp_server packets.
38452 </summary>
38453 @@ -56619,7 +56436,7 @@ Domain allowed access.
38454 </param>
38455 <infoflow type="read" weight="10"/>
38456 </interface>
38457 -<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="74620">
38458 +<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="74743">
38459 <summary>
38460 Do not audit attempts to receive rtsp_server packets.
38461 </summary>
38462 @@ -56630,7 +56447,7 @@ Domain allowed access.
38463 </param>
38464 <infoflow type="none"/>
38465 </interface>
38466 -<interface name="corenet_sendrecv_rtsp_server_packets" lineno="74639">
38467 +<interface name="corenet_sendrecv_rtsp_server_packets" lineno="74762">
38468 <summary>
38469 Send and receive rtsp_server packets.
38470 </summary>
38471 @@ -56641,7 +56458,7 @@ Domain allowed access.
38472 </param>
38473 <infoflow type="both" weight="10"/>
38474 </interface>
38475 -<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="74655">
38476 +<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="74778">
38477 <summary>
38478 Do not audit attempts to send and receive rtsp_server packets.
38479 </summary>
38480 @@ -56652,7 +56469,7 @@ Domain to not audit.
38481 </param>
38482 <infoflow type="none"/>
38483 </interface>
38484 -<interface name="corenet_relabelto_rtsp_server_packets" lineno="74670">
38485 +<interface name="corenet_relabelto_rtsp_server_packets" lineno="74793">
38486 <summary>
38487 Relabel packets to rtsp_server the packet type.
38488 </summary>
38489 @@ -56662,7 +56479,7 @@ Domain allowed access.
38490 </summary>
38491 </param>
38492 </interface>
38493 -<interface name="corenet_tcp_sendrecv_rwho_port" lineno="74692">
38494 +<interface name="corenet_tcp_sendrecv_rwho_port" lineno="74815">
38495 <summary>
38496 Send and receive TCP traffic on the rwho port.
38497 </summary>
38498 @@ -56673,7 +56490,7 @@ Domain allowed access.
38499 </param>
38500 <infoflow type="both" weight="10"/>
38501 </interface>
38502 -<interface name="corenet_udp_send_rwho_port" lineno="74707">
38503 +<interface name="corenet_udp_send_rwho_port" lineno="74830">
38504 <summary>
38505 Send UDP traffic on the rwho port.
38506 </summary>
38507 @@ -56684,7 +56501,7 @@ Domain allowed access.
38508 </param>
38509 <infoflow type="write" weight="10"/>
38510 </interface>
38511 -<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="74722">
38512 +<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="74845">
38513 <summary>
38514 Do not audit attempts to send UDP traffic on the rwho port.
38515 </summary>
38516 @@ -56695,7 +56512,7 @@ Domain to not audit.
38517 </param>
38518 <infoflow type="none"/>
38519 </interface>
38520 -<interface name="corenet_udp_receive_rwho_port" lineno="74737">
38521 +<interface name="corenet_udp_receive_rwho_port" lineno="74860">
38522 <summary>
38523 Receive UDP traffic on the rwho port.
38524 </summary>
38525 @@ -56706,7 +56523,7 @@ Domain allowed access.
38526 </param>
38527 <infoflow type="read" weight="10"/>
38528 </interface>
38529 -<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="74752">
38530 +<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="74875">
38531 <summary>
38532 Do not audit attempts to receive UDP traffic on the rwho port.
38533 </summary>
38534 @@ -56717,7 +56534,7 @@ Domain to not audit.
38535 </param>
38536 <infoflow type="none"/>
38537 </interface>
38538 -<interface name="corenet_udp_sendrecv_rwho_port" lineno="74767">
38539 +<interface name="corenet_udp_sendrecv_rwho_port" lineno="74890">
38540 <summary>
38541 Send and receive UDP traffic on the rwho port.
38542 </summary>
38543 @@ -56728,7 +56545,7 @@ Domain allowed access.
38544 </param>
38545 <infoflow type="both" weight="10"/>
38546 </interface>
38547 -<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="74783">
38548 +<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="74906">
38549 <summary>
38550 Do not audit attempts to send and receive
38551 UDP traffic on the rwho port.
38552 @@ -56740,7 +56557,7 @@ Domain to not audit.
38553 </param>
38554 <infoflow type="none"/>
38555 </interface>
38556 -<interface name="corenet_tcp_bind_rwho_port" lineno="74798">
38557 +<interface name="corenet_tcp_bind_rwho_port" lineno="74921">
38558 <summary>
38559 Bind TCP sockets to the rwho port.
38560 </summary>
38561 @@ -56751,7 +56568,7 @@ Domain allowed access.
38562 </param>
38563 <infoflow type="none"/>
38564 </interface>
38565 -<interface name="corenet_udp_bind_rwho_port" lineno="74818">
38566 +<interface name="corenet_udp_bind_rwho_port" lineno="74941">
38567 <summary>
38568 Bind UDP sockets to the rwho port.
38569 </summary>
38570 @@ -56762,7 +56579,7 @@ Domain allowed access.
38571 </param>
38572 <infoflow type="none"/>
38573 </interface>
38574 -<interface name="corenet_tcp_connect_rwho_port" lineno="74837">
38575 +<interface name="corenet_tcp_connect_rwho_port" lineno="74960">
38576 <summary>
38577 Make a TCP connection to the rwho port.
38578 </summary>
38579 @@ -56772,7 +56589,7 @@ Domain allowed access.
38580 </summary>
38581 </param>
38582 </interface>
38583 -<interface name="corenet_send_rwho_client_packets" lineno="74857">
38584 +<interface name="corenet_send_rwho_client_packets" lineno="74980">
38585 <summary>
38586 Send rwho_client packets.
38587 </summary>
38588 @@ -56783,7 +56600,7 @@ Domain allowed access.
38589 </param>
38590 <infoflow type="write" weight="10"/>
38591 </interface>
38592 -<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="74876">
38593 +<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="74999">
38594 <summary>
38595 Do not audit attempts to send rwho_client packets.
38596 </summary>
38597 @@ -56794,7 +56611,7 @@ Domain to not audit.
38598 </param>
38599 <infoflow type="none"/>
38600 </interface>
38601 -<interface name="corenet_receive_rwho_client_packets" lineno="74895">
38602 +<interface name="corenet_receive_rwho_client_packets" lineno="75018">
38603 <summary>
38604 Receive rwho_client packets.
38605 </summary>
38606 @@ -56805,7 +56622,7 @@ Domain allowed access.
38607 </param>
38608 <infoflow type="read" weight="10"/>
38609 </interface>
38610 -<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="74914">
38611 +<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="75037">
38612 <summary>
38613 Do not audit attempts to receive rwho_client packets.
38614 </summary>
38615 @@ -56816,7 +56633,7 @@ Domain allowed access.
38616 </param>
38617 <infoflow type="none"/>
38618 </interface>
38619 -<interface name="corenet_sendrecv_rwho_client_packets" lineno="74933">
38620 +<interface name="corenet_sendrecv_rwho_client_packets" lineno="75056">
38621 <summary>
38622 Send and receive rwho_client packets.
38623 </summary>
38624 @@ -56827,7 +56644,7 @@ Domain allowed access.
38625 </param>
38626 <infoflow type="both" weight="10"/>
38627 </interface>
38628 -<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="74949">
38629 +<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="75072">
38630 <summary>
38631 Do not audit attempts to send and receive rwho_client packets.
38632 </summary>
38633 @@ -56838,7 +56655,7 @@ Domain to not audit.
38634 </param>
38635 <infoflow type="none"/>
38636 </interface>
38637 -<interface name="corenet_relabelto_rwho_client_packets" lineno="74964">
38638 +<interface name="corenet_relabelto_rwho_client_packets" lineno="75087">
38639 <summary>
38640 Relabel packets to rwho_client the packet type.
38641 </summary>
38642 @@ -56848,7 +56665,7 @@ Domain allowed access.
38643 </summary>
38644 </param>
38645 </interface>
38646 -<interface name="corenet_send_rwho_server_packets" lineno="74984">
38647 +<interface name="corenet_send_rwho_server_packets" lineno="75107">
38648 <summary>
38649 Send rwho_server packets.
38650 </summary>
38651 @@ -56859,7 +56676,7 @@ Domain allowed access.
38652 </param>
38653 <infoflow type="write" weight="10"/>
38654 </interface>
38655 -<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="75003">
38656 +<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="75126">
38657 <summary>
38658 Do not audit attempts to send rwho_server packets.
38659 </summary>
38660 @@ -56870,7 +56687,7 @@ Domain to not audit.
38661 </param>
38662 <infoflow type="none"/>
38663 </interface>
38664 -<interface name="corenet_receive_rwho_server_packets" lineno="75022">
38665 +<interface name="corenet_receive_rwho_server_packets" lineno="75145">
38666 <summary>
38667 Receive rwho_server packets.
38668 </summary>
38669 @@ -56881,7 +56698,7 @@ Domain allowed access.
38670 </param>
38671 <infoflow type="read" weight="10"/>
38672 </interface>
38673 -<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="75041">
38674 +<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="75164">
38675 <summary>
38676 Do not audit attempts to receive rwho_server packets.
38677 </summary>
38678 @@ -56892,7 +56709,7 @@ Domain allowed access.
38679 </param>
38680 <infoflow type="none"/>
38681 </interface>
38682 -<interface name="corenet_sendrecv_rwho_server_packets" lineno="75060">
38683 +<interface name="corenet_sendrecv_rwho_server_packets" lineno="75183">
38684 <summary>
38685 Send and receive rwho_server packets.
38686 </summary>
38687 @@ -56903,7 +56720,7 @@ Domain allowed access.
38688 </param>
38689 <infoflow type="both" weight="10"/>
38690 </interface>
38691 -<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="75076">
38692 +<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="75199">
38693 <summary>
38694 Do not audit attempts to send and receive rwho_server packets.
38695 </summary>
38696 @@ -56914,7 +56731,7 @@ Domain to not audit.
38697 </param>
38698 <infoflow type="none"/>
38699 </interface>
38700 -<interface name="corenet_relabelto_rwho_server_packets" lineno="75091">
38701 +<interface name="corenet_relabelto_rwho_server_packets" lineno="75214">
38702 <summary>
38703 Relabel packets to rwho_server the packet type.
38704 </summary>
38705 @@ -56924,7 +56741,7 @@ Domain allowed access.
38706 </summary>
38707 </param>
38708 </interface>
38709 -<interface name="corenet_tcp_sendrecv_salt_port" lineno="75113">
38710 +<interface name="corenet_tcp_sendrecv_salt_port" lineno="75236">
38711 <summary>
38712 Send and receive TCP traffic on the salt port.
38713 </summary>
38714 @@ -56935,7 +56752,7 @@ Domain allowed access.
38715 </param>
38716 <infoflow type="both" weight="10"/>
38717 </interface>
38718 -<interface name="corenet_udp_send_salt_port" lineno="75128">
38719 +<interface name="corenet_udp_send_salt_port" lineno="75251">
38720 <summary>
38721 Send UDP traffic on the salt port.
38722 </summary>
38723 @@ -56946,7 +56763,7 @@ Domain allowed access.
38724 </param>
38725 <infoflow type="write" weight="10"/>
38726 </interface>
38727 -<interface name="corenet_dontaudit_udp_send_salt_port" lineno="75143">
38728 +<interface name="corenet_dontaudit_udp_send_salt_port" lineno="75266">
38729 <summary>
38730 Do not audit attempts to send UDP traffic on the salt port.
38731 </summary>
38732 @@ -56957,7 +56774,7 @@ Domain to not audit.
38733 </param>
38734 <infoflow type="none"/>
38735 </interface>
38736 -<interface name="corenet_udp_receive_salt_port" lineno="75158">
38737 +<interface name="corenet_udp_receive_salt_port" lineno="75281">
38738 <summary>
38739 Receive UDP traffic on the salt port.
38740 </summary>
38741 @@ -56968,7 +56785,7 @@ Domain allowed access.
38742 </param>
38743 <infoflow type="read" weight="10"/>
38744 </interface>
38745 -<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="75173">
38746 +<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="75296">
38747 <summary>
38748 Do not audit attempts to receive UDP traffic on the salt port.
38749 </summary>
38750 @@ -56979,7 +56796,7 @@ Domain to not audit.
38751 </param>
38752 <infoflow type="none"/>
38753 </interface>
38754 -<interface name="corenet_udp_sendrecv_salt_port" lineno="75188">
38755 +<interface name="corenet_udp_sendrecv_salt_port" lineno="75311">
38756 <summary>
38757 Send and receive UDP traffic on the salt port.
38758 </summary>
38759 @@ -56990,7 +56807,7 @@ Domain allowed access.
38760 </param>
38761 <infoflow type="both" weight="10"/>
38762 </interface>
38763 -<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="75204">
38764 +<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="75327">
38765 <summary>
38766 Do not audit attempts to send and receive
38767 UDP traffic on the salt port.
38768 @@ -57002,7 +56819,7 @@ Domain to not audit.
38769 </param>
38770 <infoflow type="none"/>
38771 </interface>
38772 -<interface name="corenet_tcp_bind_salt_port" lineno="75219">
38773 +<interface name="corenet_tcp_bind_salt_port" lineno="75342">
38774 <summary>
38775 Bind TCP sockets to the salt port.
38776 </summary>
38777 @@ -57013,7 +56830,7 @@ Domain allowed access.
38778 </param>
38779 <infoflow type="none"/>
38780 </interface>
38781 -<interface name="corenet_udp_bind_salt_port" lineno="75239">
38782 +<interface name="corenet_udp_bind_salt_port" lineno="75362">
38783 <summary>
38784 Bind UDP sockets to the salt port.
38785 </summary>
38786 @@ -57024,7 +56841,7 @@ Domain allowed access.
38787 </param>
38788 <infoflow type="none"/>
38789 </interface>
38790 -<interface name="corenet_tcp_connect_salt_port" lineno="75258">
38791 +<interface name="corenet_tcp_connect_salt_port" lineno="75381">
38792 <summary>
38793 Make a TCP connection to the salt port.
38794 </summary>
38795 @@ -57034,7 +56851,7 @@ Domain allowed access.
38796 </summary>
38797 </param>
38798 </interface>
38799 -<interface name="corenet_send_salt_client_packets" lineno="75278">
38800 +<interface name="corenet_send_salt_client_packets" lineno="75401">
38801 <summary>
38802 Send salt_client packets.
38803 </summary>
38804 @@ -57045,7 +56862,7 @@ Domain allowed access.
38805 </param>
38806 <infoflow type="write" weight="10"/>
38807 </interface>
38808 -<interface name="corenet_dontaudit_send_salt_client_packets" lineno="75297">
38809 +<interface name="corenet_dontaudit_send_salt_client_packets" lineno="75420">
38810 <summary>
38811 Do not audit attempts to send salt_client packets.
38812 </summary>
38813 @@ -57056,7 +56873,7 @@ Domain to not audit.
38814 </param>
38815 <infoflow type="none"/>
38816 </interface>
38817 -<interface name="corenet_receive_salt_client_packets" lineno="75316">
38818 +<interface name="corenet_receive_salt_client_packets" lineno="75439">
38819 <summary>
38820 Receive salt_client packets.
38821 </summary>
38822 @@ -57067,7 +56884,7 @@ Domain allowed access.
38823 </param>
38824 <infoflow type="read" weight="10"/>
38825 </interface>
38826 -<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="75335">
38827 +<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="75458">
38828 <summary>
38829 Do not audit attempts to receive salt_client packets.
38830 </summary>
38831 @@ -57078,7 +56895,7 @@ Domain allowed access.
38832 </param>
38833 <infoflow type="none"/>
38834 </interface>
38835 -<interface name="corenet_sendrecv_salt_client_packets" lineno="75354">
38836 +<interface name="corenet_sendrecv_salt_client_packets" lineno="75477">
38837 <summary>
38838 Send and receive salt_client packets.
38839 </summary>
38840 @@ -57089,7 +56906,7 @@ Domain allowed access.
38841 </param>
38842 <infoflow type="both" weight="10"/>
38843 </interface>
38844 -<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="75370">
38845 +<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="75493">
38846 <summary>
38847 Do not audit attempts to send and receive salt_client packets.
38848 </summary>
38849 @@ -57100,7 +56917,7 @@ Domain to not audit.
38850 </param>
38851 <infoflow type="none"/>
38852 </interface>
38853 -<interface name="corenet_relabelto_salt_client_packets" lineno="75385">
38854 +<interface name="corenet_relabelto_salt_client_packets" lineno="75508">
38855 <summary>
38856 Relabel packets to salt_client the packet type.
38857 </summary>
38858 @@ -57110,7 +56927,7 @@ Domain allowed access.
38859 </summary>
38860 </param>
38861 </interface>
38862 -<interface name="corenet_send_salt_server_packets" lineno="75405">
38863 +<interface name="corenet_send_salt_server_packets" lineno="75528">
38864 <summary>
38865 Send salt_server packets.
38866 </summary>
38867 @@ -57121,7 +56938,7 @@ Domain allowed access.
38868 </param>
38869 <infoflow type="write" weight="10"/>
38870 </interface>
38871 -<interface name="corenet_dontaudit_send_salt_server_packets" lineno="75424">
38872 +<interface name="corenet_dontaudit_send_salt_server_packets" lineno="75547">
38873 <summary>
38874 Do not audit attempts to send salt_server packets.
38875 </summary>
38876 @@ -57132,7 +56949,7 @@ Domain to not audit.
38877 </param>
38878 <infoflow type="none"/>
38879 </interface>
38880 -<interface name="corenet_receive_salt_server_packets" lineno="75443">
38881 +<interface name="corenet_receive_salt_server_packets" lineno="75566">
38882 <summary>
38883 Receive salt_server packets.
38884 </summary>
38885 @@ -57143,7 +56960,7 @@ Domain allowed access.
38886 </param>
38887 <infoflow type="read" weight="10"/>
38888 </interface>
38889 -<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="75462">
38890 +<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="75585">
38891 <summary>
38892 Do not audit attempts to receive salt_server packets.
38893 </summary>
38894 @@ -57154,7 +56971,7 @@ Domain allowed access.
38895 </param>
38896 <infoflow type="none"/>
38897 </interface>
38898 -<interface name="corenet_sendrecv_salt_server_packets" lineno="75481">
38899 +<interface name="corenet_sendrecv_salt_server_packets" lineno="75604">
38900 <summary>
38901 Send and receive salt_server packets.
38902 </summary>
38903 @@ -57165,7 +56982,7 @@ Domain allowed access.
38904 </param>
38905 <infoflow type="both" weight="10"/>
38906 </interface>
38907 -<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="75497">
38908 +<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="75620">
38909 <summary>
38910 Do not audit attempts to send and receive salt_server packets.
38911 </summary>
38912 @@ -57176,7 +56993,7 @@ Domain to not audit.
38913 </param>
38914 <infoflow type="none"/>
38915 </interface>
38916 -<interface name="corenet_relabelto_salt_server_packets" lineno="75512">
38917 +<interface name="corenet_relabelto_salt_server_packets" lineno="75635">
38918 <summary>
38919 Relabel packets to salt_server the packet type.
38920 </summary>
38921 @@ -57186,7 +57003,7 @@ Domain allowed access.
38922 </summary>
38923 </param>
38924 </interface>
38925 -<interface name="corenet_tcp_sendrecv_sap_port" lineno="75534">
38926 +<interface name="corenet_tcp_sendrecv_sap_port" lineno="75657">
38927 <summary>
38928 Send and receive TCP traffic on the sap port.
38929 </summary>
38930 @@ -57197,7 +57014,7 @@ Domain allowed access.
38931 </param>
38932 <infoflow type="both" weight="10"/>
38933 </interface>
38934 -<interface name="corenet_udp_send_sap_port" lineno="75549">
38935 +<interface name="corenet_udp_send_sap_port" lineno="75672">
38936 <summary>
38937 Send UDP traffic on the sap port.
38938 </summary>
38939 @@ -57208,7 +57025,7 @@ Domain allowed access.
38940 </param>
38941 <infoflow type="write" weight="10"/>
38942 </interface>
38943 -<interface name="corenet_dontaudit_udp_send_sap_port" lineno="75564">
38944 +<interface name="corenet_dontaudit_udp_send_sap_port" lineno="75687">
38945 <summary>
38946 Do not audit attempts to send UDP traffic on the sap port.
38947 </summary>
38948 @@ -57219,7 +57036,7 @@ Domain to not audit.
38949 </param>
38950 <infoflow type="none"/>
38951 </interface>
38952 -<interface name="corenet_udp_receive_sap_port" lineno="75579">
38953 +<interface name="corenet_udp_receive_sap_port" lineno="75702">
38954 <summary>
38955 Receive UDP traffic on the sap port.
38956 </summary>
38957 @@ -57230,7 +57047,7 @@ Domain allowed access.
38958 </param>
38959 <infoflow type="read" weight="10"/>
38960 </interface>
38961 -<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="75594">
38962 +<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="75717">
38963 <summary>
38964 Do not audit attempts to receive UDP traffic on the sap port.
38965 </summary>
38966 @@ -57241,7 +57058,7 @@ Domain to not audit.
38967 </param>
38968 <infoflow type="none"/>
38969 </interface>
38970 -<interface name="corenet_udp_sendrecv_sap_port" lineno="75609">
38971 +<interface name="corenet_udp_sendrecv_sap_port" lineno="75732">
38972 <summary>
38973 Send and receive UDP traffic on the sap port.
38974 </summary>
38975 @@ -57252,7 +57069,7 @@ Domain allowed access.
38976 </param>
38977 <infoflow type="both" weight="10"/>
38978 </interface>
38979 -<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="75625">
38980 +<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="75748">
38981 <summary>
38982 Do not audit attempts to send and receive
38983 UDP traffic on the sap port.
38984 @@ -57264,7 +57081,7 @@ Domain to not audit.
38985 </param>
38986 <infoflow type="none"/>
38987 </interface>
38988 -<interface name="corenet_tcp_bind_sap_port" lineno="75640">
38989 +<interface name="corenet_tcp_bind_sap_port" lineno="75763">
38990 <summary>
38991 Bind TCP sockets to the sap port.
38992 </summary>
38993 @@ -57275,7 +57092,7 @@ Domain allowed access.
38994 </param>
38995 <infoflow type="none"/>
38996 </interface>
38997 -<interface name="corenet_udp_bind_sap_port" lineno="75660">
38998 +<interface name="corenet_udp_bind_sap_port" lineno="75783">
38999 <summary>
39000 Bind UDP sockets to the sap port.
39001 </summary>
39002 @@ -57286,7 +57103,7 @@ Domain allowed access.
39003 </param>
39004 <infoflow type="none"/>
39005 </interface>
39006 -<interface name="corenet_tcp_connect_sap_port" lineno="75679">
39007 +<interface name="corenet_tcp_connect_sap_port" lineno="75802">
39008 <summary>
39009 Make a TCP connection to the sap port.
39010 </summary>
39011 @@ -57296,7 +57113,7 @@ Domain allowed access.
39012 </summary>
39013 </param>
39014 </interface>
39015 -<interface name="corenet_send_sap_client_packets" lineno="75699">
39016 +<interface name="corenet_send_sap_client_packets" lineno="75822">
39017 <summary>
39018 Send sap_client packets.
39019 </summary>
39020 @@ -57307,7 +57124,7 @@ Domain allowed access.
39021 </param>
39022 <infoflow type="write" weight="10"/>
39023 </interface>
39024 -<interface name="corenet_dontaudit_send_sap_client_packets" lineno="75718">
39025 +<interface name="corenet_dontaudit_send_sap_client_packets" lineno="75841">
39026 <summary>
39027 Do not audit attempts to send sap_client packets.
39028 </summary>
39029 @@ -57318,7 +57135,7 @@ Domain to not audit.
39030 </param>
39031 <infoflow type="none"/>
39032 </interface>
39033 -<interface name="corenet_receive_sap_client_packets" lineno="75737">
39034 +<interface name="corenet_receive_sap_client_packets" lineno="75860">
39035 <summary>
39036 Receive sap_client packets.
39037 </summary>
39038 @@ -57329,7 +57146,7 @@ Domain allowed access.
39039 </param>
39040 <infoflow type="read" weight="10"/>
39041 </interface>
39042 -<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="75756">
39043 +<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="75879">
39044 <summary>
39045 Do not audit attempts to receive sap_client packets.
39046 </summary>
39047 @@ -57340,7 +57157,7 @@ Domain allowed access.
39048 </param>
39049 <infoflow type="none"/>
39050 </interface>
39051 -<interface name="corenet_sendrecv_sap_client_packets" lineno="75775">
39052 +<interface name="corenet_sendrecv_sap_client_packets" lineno="75898">
39053 <summary>
39054 Send and receive sap_client packets.
39055 </summary>
39056 @@ -57351,7 +57168,7 @@ Domain allowed access.
39057 </param>
39058 <infoflow type="both" weight="10"/>
39059 </interface>
39060 -<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="75791">
39061 +<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="75914">
39062 <summary>
39063 Do not audit attempts to send and receive sap_client packets.
39064 </summary>
39065 @@ -57362,7 +57179,7 @@ Domain to not audit.
39066 </param>
39067 <infoflow type="none"/>
39068 </interface>
39069 -<interface name="corenet_relabelto_sap_client_packets" lineno="75806">
39070 +<interface name="corenet_relabelto_sap_client_packets" lineno="75929">
39071 <summary>
39072 Relabel packets to sap_client the packet type.
39073 </summary>
39074 @@ -57372,7 +57189,7 @@ Domain allowed access.
39075 </summary>
39076 </param>
39077 </interface>
39078 -<interface name="corenet_send_sap_server_packets" lineno="75826">
39079 +<interface name="corenet_send_sap_server_packets" lineno="75949">
39080 <summary>
39081 Send sap_server packets.
39082 </summary>
39083 @@ -57383,7 +57200,7 @@ Domain allowed access.
39084 </param>
39085 <infoflow type="write" weight="10"/>
39086 </interface>
39087 -<interface name="corenet_dontaudit_send_sap_server_packets" lineno="75845">
39088 +<interface name="corenet_dontaudit_send_sap_server_packets" lineno="75968">
39089 <summary>
39090 Do not audit attempts to send sap_server packets.
39091 </summary>
39092 @@ -57394,7 +57211,7 @@ Domain to not audit.
39093 </param>
39094 <infoflow type="none"/>
39095 </interface>
39096 -<interface name="corenet_receive_sap_server_packets" lineno="75864">
39097 +<interface name="corenet_receive_sap_server_packets" lineno="75987">
39098 <summary>
39099 Receive sap_server packets.
39100 </summary>
39101 @@ -57405,7 +57222,7 @@ Domain allowed access.
39102 </param>
39103 <infoflow type="read" weight="10"/>
39104 </interface>
39105 -<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="75883">
39106 +<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="76006">
39107 <summary>
39108 Do not audit attempts to receive sap_server packets.
39109 </summary>
39110 @@ -57416,7 +57233,7 @@ Domain allowed access.
39111 </param>
39112 <infoflow type="none"/>
39113 </interface>
39114 -<interface name="corenet_sendrecv_sap_server_packets" lineno="75902">
39115 +<interface name="corenet_sendrecv_sap_server_packets" lineno="76025">
39116 <summary>
39117 Send and receive sap_server packets.
39118 </summary>
39119 @@ -57427,7 +57244,7 @@ Domain allowed access.
39120 </param>
39121 <infoflow type="both" weight="10"/>
39122 </interface>
39123 -<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="75918">
39124 +<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="76041">
39125 <summary>
39126 Do not audit attempts to send and receive sap_server packets.
39127 </summary>
39128 @@ -57438,7 +57255,7 @@ Domain to not audit.
39129 </param>
39130 <infoflow type="none"/>
39131 </interface>
39132 -<interface name="corenet_relabelto_sap_server_packets" lineno="75933">
39133 +<interface name="corenet_relabelto_sap_server_packets" lineno="76056">
39134 <summary>
39135 Relabel packets to sap_server the packet type.
39136 </summary>
39137 @@ -57448,7 +57265,7 @@ Domain allowed access.
39138 </summary>
39139 </param>
39140 </interface>
39141 -<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="75955">
39142 +<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="76078">
39143 <summary>
39144 Send and receive TCP traffic on the servistaitsm port.
39145 </summary>
39146 @@ -57459,7 +57276,7 @@ Domain allowed access.
39147 </param>
39148 <infoflow type="both" weight="10"/>
39149 </interface>
39150 -<interface name="corenet_udp_send_servistaitsm_port" lineno="75970">
39151 +<interface name="corenet_udp_send_servistaitsm_port" lineno="76093">
39152 <summary>
39153 Send UDP traffic on the servistaitsm port.
39154 </summary>
39155 @@ -57470,7 +57287,7 @@ Domain allowed access.
39156 </param>
39157 <infoflow type="write" weight="10"/>
39158 </interface>
39159 -<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="75985">
39160 +<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="76108">
39161 <summary>
39162 Do not audit attempts to send UDP traffic on the servistaitsm port.
39163 </summary>
39164 @@ -57481,7 +57298,7 @@ Domain to not audit.
39165 </param>
39166 <infoflow type="none"/>
39167 </interface>
39168 -<interface name="corenet_udp_receive_servistaitsm_port" lineno="76000">
39169 +<interface name="corenet_udp_receive_servistaitsm_port" lineno="76123">
39170 <summary>
39171 Receive UDP traffic on the servistaitsm port.
39172 </summary>
39173 @@ -57492,7 +57309,7 @@ Domain allowed access.
39174 </param>
39175 <infoflow type="read" weight="10"/>
39176 </interface>
39177 -<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="76015">
39178 +<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="76138">
39179 <summary>
39180 Do not audit attempts to receive UDP traffic on the servistaitsm port.
39181 </summary>
39182 @@ -57503,7 +57320,7 @@ Domain to not audit.
39183 </param>
39184 <infoflow type="none"/>
39185 </interface>
39186 -<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="76030">
39187 +<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="76153">
39188 <summary>
39189 Send and receive UDP traffic on the servistaitsm port.
39190 </summary>
39191 @@ -57514,7 +57331,7 @@ Domain allowed access.
39192 </param>
39193 <infoflow type="both" weight="10"/>
39194 </interface>
39195 -<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="76046">
39196 +<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="76169">
39197 <summary>
39198 Do not audit attempts to send and receive
39199 UDP traffic on the servistaitsm port.
39200 @@ -57526,7 +57343,7 @@ Domain to not audit.
39201 </param>
39202 <infoflow type="none"/>
39203 </interface>
39204 -<interface name="corenet_tcp_bind_servistaitsm_port" lineno="76061">
39205 +<interface name="corenet_tcp_bind_servistaitsm_port" lineno="76184">
39206 <summary>
39207 Bind TCP sockets to the servistaitsm port.
39208 </summary>
39209 @@ -57537,7 +57354,7 @@ Domain allowed access.
39210 </param>
39211 <infoflow type="none"/>
39212 </interface>
39213 -<interface name="corenet_udp_bind_servistaitsm_port" lineno="76081">
39214 +<interface name="corenet_udp_bind_servistaitsm_port" lineno="76204">
39215 <summary>
39216 Bind UDP sockets to the servistaitsm port.
39217 </summary>
39218 @@ -57548,7 +57365,7 @@ Domain allowed access.
39219 </param>
39220 <infoflow type="none"/>
39221 </interface>
39222 -<interface name="corenet_tcp_connect_servistaitsm_port" lineno="76100">
39223 +<interface name="corenet_tcp_connect_servistaitsm_port" lineno="76223">
39224 <summary>
39225 Make a TCP connection to the servistaitsm port.
39226 </summary>
39227 @@ -57558,7 +57375,7 @@ Domain allowed access.
39228 </summary>
39229 </param>
39230 </interface>
39231 -<interface name="corenet_send_servistaitsm_client_packets" lineno="76120">
39232 +<interface name="corenet_send_servistaitsm_client_packets" lineno="76243">
39233 <summary>
39234 Send servistaitsm_client packets.
39235 </summary>
39236 @@ -57569,7 +57386,7 @@ Domain allowed access.
39237 </param>
39238 <infoflow type="write" weight="10"/>
39239 </interface>
39240 -<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="76139">
39241 +<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="76262">
39242 <summary>
39243 Do not audit attempts to send servistaitsm_client packets.
39244 </summary>
39245 @@ -57580,7 +57397,7 @@ Domain to not audit.
39246 </param>
39247 <infoflow type="none"/>
39248 </interface>
39249 -<interface name="corenet_receive_servistaitsm_client_packets" lineno="76158">
39250 +<interface name="corenet_receive_servistaitsm_client_packets" lineno="76281">
39251 <summary>
39252 Receive servistaitsm_client packets.
39253 </summary>
39254 @@ -57591,7 +57408,7 @@ Domain allowed access.
39255 </param>
39256 <infoflow type="read" weight="10"/>
39257 </interface>
39258 -<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="76177">
39259 +<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="76300">
39260 <summary>
39261 Do not audit attempts to receive servistaitsm_client packets.
39262 </summary>
39263 @@ -57602,7 +57419,7 @@ Domain allowed access.
39264 </param>
39265 <infoflow type="none"/>
39266 </interface>
39267 -<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="76196">
39268 +<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="76319">
39269 <summary>
39270 Send and receive servistaitsm_client packets.
39271 </summary>
39272 @@ -57613,7 +57430,7 @@ Domain allowed access.
39273 </param>
39274 <infoflow type="both" weight="10"/>
39275 </interface>
39276 -<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="76212">
39277 +<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="76335">
39278 <summary>
39279 Do not audit attempts to send and receive servistaitsm_client packets.
39280 </summary>
39281 @@ -57624,7 +57441,7 @@ Domain to not audit.
39282 </param>
39283 <infoflow type="none"/>
39284 </interface>
39285 -<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="76227">
39286 +<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="76350">
39287 <summary>
39288 Relabel packets to servistaitsm_client the packet type.
39289 </summary>
39290 @@ -57634,7 +57451,7 @@ Domain allowed access.
39291 </summary>
39292 </param>
39293 </interface>
39294 -<interface name="corenet_send_servistaitsm_server_packets" lineno="76247">
39295 +<interface name="corenet_send_servistaitsm_server_packets" lineno="76370">
39296 <summary>
39297 Send servistaitsm_server packets.
39298 </summary>
39299 @@ -57645,7 +57462,7 @@ Domain allowed access.
39300 </param>
39301 <infoflow type="write" weight="10"/>
39302 </interface>
39303 -<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="76266">
39304 +<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="76389">
39305 <summary>
39306 Do not audit attempts to send servistaitsm_server packets.
39307 </summary>
39308 @@ -57656,7 +57473,7 @@ Domain to not audit.
39309 </param>
39310 <infoflow type="none"/>
39311 </interface>
39312 -<interface name="corenet_receive_servistaitsm_server_packets" lineno="76285">
39313 +<interface name="corenet_receive_servistaitsm_server_packets" lineno="76408">
39314 <summary>
39315 Receive servistaitsm_server packets.
39316 </summary>
39317 @@ -57667,7 +57484,7 @@ Domain allowed access.
39318 </param>
39319 <infoflow type="read" weight="10"/>
39320 </interface>
39321 -<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="76304">
39322 +<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="76427">
39323 <summary>
39324 Do not audit attempts to receive servistaitsm_server packets.
39325 </summary>
39326 @@ -57678,7 +57495,7 @@ Domain allowed access.
39327 </param>
39328 <infoflow type="none"/>
39329 </interface>
39330 -<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="76323">
39331 +<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="76446">
39332 <summary>
39333 Send and receive servistaitsm_server packets.
39334 </summary>
39335 @@ -57689,7 +57506,7 @@ Domain allowed access.
39336 </param>
39337 <infoflow type="both" weight="10"/>
39338 </interface>
39339 -<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="76339">
39340 +<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="76462">
39341 <summary>
39342 Do not audit attempts to send and receive servistaitsm_server packets.
39343 </summary>
39344 @@ -57700,7 +57517,7 @@ Domain to not audit.
39345 </param>
39346 <infoflow type="none"/>
39347 </interface>
39348 -<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="76354">
39349 +<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="76477">
39350 <summary>
39351 Relabel packets to servistaitsm_server the packet type.
39352 </summary>
39353 @@ -57710,7 +57527,7 @@ Domain allowed access.
39354 </summary>
39355 </param>
39356 </interface>
39357 -<interface name="corenet_tcp_sendrecv_sieve_port" lineno="76376">
39358 +<interface name="corenet_tcp_sendrecv_sieve_port" lineno="76499">
39359 <summary>
39360 Send and receive TCP traffic on the sieve port.
39361 </summary>
39362 @@ -57721,7 +57538,7 @@ Domain allowed access.
39363 </param>
39364 <infoflow type="both" weight="10"/>
39365 </interface>
39366 -<interface name="corenet_udp_send_sieve_port" lineno="76391">
39367 +<interface name="corenet_udp_send_sieve_port" lineno="76514">
39368 <summary>
39369 Send UDP traffic on the sieve port.
39370 </summary>
39371 @@ -57732,7 +57549,7 @@ Domain allowed access.
39372 </param>
39373 <infoflow type="write" weight="10"/>
39374 </interface>
39375 -<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="76406">
39376 +<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="76529">
39377 <summary>
39378 Do not audit attempts to send UDP traffic on the sieve port.
39379 </summary>
39380 @@ -57743,7 +57560,7 @@ Domain to not audit.
39381 </param>
39382 <infoflow type="none"/>
39383 </interface>
39384 -<interface name="corenet_udp_receive_sieve_port" lineno="76421">
39385 +<interface name="corenet_udp_receive_sieve_port" lineno="76544">
39386 <summary>
39387 Receive UDP traffic on the sieve port.
39388 </summary>
39389 @@ -57754,7 +57571,7 @@ Domain allowed access.
39390 </param>
39391 <infoflow type="read" weight="10"/>
39392 </interface>
39393 -<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="76436">
39394 +<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="76559">
39395 <summary>
39396 Do not audit attempts to receive UDP traffic on the sieve port.
39397 </summary>
39398 @@ -57765,7 +57582,7 @@ Domain to not audit.
39399 </param>
39400 <infoflow type="none"/>
39401 </interface>
39402 -<interface name="corenet_udp_sendrecv_sieve_port" lineno="76451">
39403 +<interface name="corenet_udp_sendrecv_sieve_port" lineno="76574">
39404 <summary>
39405 Send and receive UDP traffic on the sieve port.
39406 </summary>
39407 @@ -57776,7 +57593,7 @@ Domain allowed access.
39408 </param>
39409 <infoflow type="both" weight="10"/>
39410 </interface>
39411 -<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="76467">
39412 +<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="76590">
39413 <summary>
39414 Do not audit attempts to send and receive
39415 UDP traffic on the sieve port.
39416 @@ -57788,7 +57605,7 @@ Domain to not audit.
39417 </param>
39418 <infoflow type="none"/>
39419 </interface>
39420 -<interface name="corenet_tcp_bind_sieve_port" lineno="76482">
39421 +<interface name="corenet_tcp_bind_sieve_port" lineno="76605">
39422 <summary>
39423 Bind TCP sockets to the sieve port.
39424 </summary>
39425 @@ -57799,7 +57616,7 @@ Domain allowed access.
39426 </param>
39427 <infoflow type="none"/>
39428 </interface>
39429 -<interface name="corenet_udp_bind_sieve_port" lineno="76502">
39430 +<interface name="corenet_udp_bind_sieve_port" lineno="76625">
39431 <summary>
39432 Bind UDP sockets to the sieve port.
39433 </summary>
39434 @@ -57810,7 +57627,7 @@ Domain allowed access.
39435 </param>
39436 <infoflow type="none"/>
39437 </interface>
39438 -<interface name="corenet_tcp_connect_sieve_port" lineno="76521">
39439 +<interface name="corenet_tcp_connect_sieve_port" lineno="76644">
39440 <summary>
39441 Make a TCP connection to the sieve port.
39442 </summary>
39443 @@ -57820,7 +57637,7 @@ Domain allowed access.
39444 </summary>
39445 </param>
39446 </interface>
39447 -<interface name="corenet_send_sieve_client_packets" lineno="76541">
39448 +<interface name="corenet_send_sieve_client_packets" lineno="76664">
39449 <summary>
39450 Send sieve_client packets.
39451 </summary>
39452 @@ -57831,7 +57648,7 @@ Domain allowed access.
39453 </param>
39454 <infoflow type="write" weight="10"/>
39455 </interface>
39456 -<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="76560">
39457 +<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="76683">
39458 <summary>
39459 Do not audit attempts to send sieve_client packets.
39460 </summary>
39461 @@ -57842,7 +57659,7 @@ Domain to not audit.
39462 </param>
39463 <infoflow type="none"/>
39464 </interface>
39465 -<interface name="corenet_receive_sieve_client_packets" lineno="76579">
39466 +<interface name="corenet_receive_sieve_client_packets" lineno="76702">
39467 <summary>
39468 Receive sieve_client packets.
39469 </summary>
39470 @@ -57853,7 +57670,7 @@ Domain allowed access.
39471 </param>
39472 <infoflow type="read" weight="10"/>
39473 </interface>
39474 -<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="76598">
39475 +<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="76721">
39476 <summary>
39477 Do not audit attempts to receive sieve_client packets.
39478 </summary>
39479 @@ -57864,7 +57681,7 @@ Domain allowed access.
39480 </param>
39481 <infoflow type="none"/>
39482 </interface>
39483 -<interface name="corenet_sendrecv_sieve_client_packets" lineno="76617">
39484 +<interface name="corenet_sendrecv_sieve_client_packets" lineno="76740">
39485 <summary>
39486 Send and receive sieve_client packets.
39487 </summary>
39488 @@ -57875,7 +57692,7 @@ Domain allowed access.
39489 </param>
39490 <infoflow type="both" weight="10"/>
39491 </interface>
39492 -<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="76633">
39493 +<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="76756">
39494 <summary>
39495 Do not audit attempts to send and receive sieve_client packets.
39496 </summary>
39497 @@ -57886,7 +57703,7 @@ Domain to not audit.
39498 </param>
39499 <infoflow type="none"/>
39500 </interface>
39501 -<interface name="corenet_relabelto_sieve_client_packets" lineno="76648">
39502 +<interface name="corenet_relabelto_sieve_client_packets" lineno="76771">
39503 <summary>
39504 Relabel packets to sieve_client the packet type.
39505 </summary>
39506 @@ -57896,7 +57713,7 @@ Domain allowed access.
39507 </summary>
39508 </param>
39509 </interface>
39510 -<interface name="corenet_send_sieve_server_packets" lineno="76668">
39511 +<interface name="corenet_send_sieve_server_packets" lineno="76791">
39512 <summary>
39513 Send sieve_server packets.
39514 </summary>
39515 @@ -57907,7 +57724,7 @@ Domain allowed access.
39516 </param>
39517 <infoflow type="write" weight="10"/>
39518 </interface>
39519 -<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="76687">
39520 +<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="76810">
39521 <summary>
39522 Do not audit attempts to send sieve_server packets.
39523 </summary>
39524 @@ -57918,7 +57735,7 @@ Domain to not audit.
39525 </param>
39526 <infoflow type="none"/>
39527 </interface>
39528 -<interface name="corenet_receive_sieve_server_packets" lineno="76706">
39529 +<interface name="corenet_receive_sieve_server_packets" lineno="76829">
39530 <summary>
39531 Receive sieve_server packets.
39532 </summary>
39533 @@ -57929,7 +57746,7 @@ Domain allowed access.
39534 </param>
39535 <infoflow type="read" weight="10"/>
39536 </interface>
39537 -<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="76725">
39538 +<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="76848">
39539 <summary>
39540 Do not audit attempts to receive sieve_server packets.
39541 </summary>
39542 @@ -57940,7 +57757,7 @@ Domain allowed access.
39543 </param>
39544 <infoflow type="none"/>
39545 </interface>
39546 -<interface name="corenet_sendrecv_sieve_server_packets" lineno="76744">
39547 +<interface name="corenet_sendrecv_sieve_server_packets" lineno="76867">
39548 <summary>
39549 Send and receive sieve_server packets.
39550 </summary>
39551 @@ -57951,7 +57768,7 @@ Domain allowed access.
39552 </param>
39553 <infoflow type="both" weight="10"/>
39554 </interface>
39555 -<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="76760">
39556 +<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="76883">
39557 <summary>
39558 Do not audit attempts to send and receive sieve_server packets.
39559 </summary>
39560 @@ -57962,7 +57779,7 @@ Domain to not audit.
39561 </param>
39562 <infoflow type="none"/>
39563 </interface>
39564 -<interface name="corenet_relabelto_sieve_server_packets" lineno="76775">
39565 +<interface name="corenet_relabelto_sieve_server_packets" lineno="76898">
39566 <summary>
39567 Relabel packets to sieve_server the packet type.
39568 </summary>
39569 @@ -57972,7 +57789,7 @@ Domain allowed access.
39570 </summary>
39571 </param>
39572 </interface>
39573 -<interface name="corenet_tcp_sendrecv_sip_port" lineno="76797">
39574 +<interface name="corenet_tcp_sendrecv_sip_port" lineno="76920">
39575 <summary>
39576 Send and receive TCP traffic on the sip port.
39577 </summary>
39578 @@ -57983,7 +57800,7 @@ Domain allowed access.
39579 </param>
39580 <infoflow type="both" weight="10"/>
39581 </interface>
39582 -<interface name="corenet_udp_send_sip_port" lineno="76812">
39583 +<interface name="corenet_udp_send_sip_port" lineno="76935">
39584 <summary>
39585 Send UDP traffic on the sip port.
39586 </summary>
39587 @@ -57994,7 +57811,7 @@ Domain allowed access.
39588 </param>
39589 <infoflow type="write" weight="10"/>
39590 </interface>
39591 -<interface name="corenet_dontaudit_udp_send_sip_port" lineno="76827">
39592 +<interface name="corenet_dontaudit_udp_send_sip_port" lineno="76950">
39593 <summary>
39594 Do not audit attempts to send UDP traffic on the sip port.
39595 </summary>
39596 @@ -58005,7 +57822,7 @@ Domain to not audit.
39597 </param>
39598 <infoflow type="none"/>
39599 </interface>
39600 -<interface name="corenet_udp_receive_sip_port" lineno="76842">
39601 +<interface name="corenet_udp_receive_sip_port" lineno="76965">
39602 <summary>
39603 Receive UDP traffic on the sip port.
39604 </summary>
39605 @@ -58016,7 +57833,7 @@ Domain allowed access.
39606 </param>
39607 <infoflow type="read" weight="10"/>
39608 </interface>
39609 -<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="76857">
39610 +<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="76980">
39611 <summary>
39612 Do not audit attempts to receive UDP traffic on the sip port.
39613 </summary>
39614 @@ -58027,7 +57844,7 @@ Domain to not audit.
39615 </param>
39616 <infoflow type="none"/>
39617 </interface>
39618 -<interface name="corenet_udp_sendrecv_sip_port" lineno="76872">
39619 +<interface name="corenet_udp_sendrecv_sip_port" lineno="76995">
39620 <summary>
39621 Send and receive UDP traffic on the sip port.
39622 </summary>
39623 @@ -58038,7 +57855,7 @@ Domain allowed access.
39624 </param>
39625 <infoflow type="both" weight="10"/>
39626 </interface>
39627 -<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="76888">
39628 +<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="77011">
39629 <summary>
39630 Do not audit attempts to send and receive
39631 UDP traffic on the sip port.
39632 @@ -58050,7 +57867,7 @@ Domain to not audit.
39633 </param>
39634 <infoflow type="none"/>
39635 </interface>
39636 -<interface name="corenet_tcp_bind_sip_port" lineno="76903">
39637 +<interface name="corenet_tcp_bind_sip_port" lineno="77026">
39638 <summary>
39639 Bind TCP sockets to the sip port.
39640 </summary>
39641 @@ -58061,7 +57878,7 @@ Domain allowed access.
39642 </param>
39643 <infoflow type="none"/>
39644 </interface>
39645 -<interface name="corenet_udp_bind_sip_port" lineno="76923">
39646 +<interface name="corenet_udp_bind_sip_port" lineno="77046">
39647 <summary>
39648 Bind UDP sockets to the sip port.
39649 </summary>
39650 @@ -58072,7 +57889,7 @@ Domain allowed access.
39651 </param>
39652 <infoflow type="none"/>
39653 </interface>
39654 -<interface name="corenet_tcp_connect_sip_port" lineno="76942">
39655 +<interface name="corenet_tcp_connect_sip_port" lineno="77065">
39656 <summary>
39657 Make a TCP connection to the sip port.
39658 </summary>
39659 @@ -58082,7 +57899,7 @@ Domain allowed access.
39660 </summary>
39661 </param>
39662 </interface>
39663 -<interface name="corenet_send_sip_client_packets" lineno="76962">
39664 +<interface name="corenet_send_sip_client_packets" lineno="77085">
39665 <summary>
39666 Send sip_client packets.
39667 </summary>
39668 @@ -58093,7 +57910,7 @@ Domain allowed access.
39669 </param>
39670 <infoflow type="write" weight="10"/>
39671 </interface>
39672 -<interface name="corenet_dontaudit_send_sip_client_packets" lineno="76981">
39673 +<interface name="corenet_dontaudit_send_sip_client_packets" lineno="77104">
39674 <summary>
39675 Do not audit attempts to send sip_client packets.
39676 </summary>
39677 @@ -58104,7 +57921,7 @@ Domain to not audit.
39678 </param>
39679 <infoflow type="none"/>
39680 </interface>
39681 -<interface name="corenet_receive_sip_client_packets" lineno="77000">
39682 +<interface name="corenet_receive_sip_client_packets" lineno="77123">
39683 <summary>
39684 Receive sip_client packets.
39685 </summary>
39686 @@ -58115,7 +57932,7 @@ Domain allowed access.
39687 </param>
39688 <infoflow type="read" weight="10"/>
39689 </interface>
39690 -<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="77019">
39691 +<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="77142">
39692 <summary>
39693 Do not audit attempts to receive sip_client packets.
39694 </summary>
39695 @@ -58126,7 +57943,7 @@ Domain allowed access.
39696 </param>
39697 <infoflow type="none"/>
39698 </interface>
39699 -<interface name="corenet_sendrecv_sip_client_packets" lineno="77038">
39700 +<interface name="corenet_sendrecv_sip_client_packets" lineno="77161">
39701 <summary>
39702 Send and receive sip_client packets.
39703 </summary>
39704 @@ -58137,7 +57954,7 @@ Domain allowed access.
39705 </param>
39706 <infoflow type="both" weight="10"/>
39707 </interface>
39708 -<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="77054">
39709 +<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="77177">
39710 <summary>
39711 Do not audit attempts to send and receive sip_client packets.
39712 </summary>
39713 @@ -58148,7 +57965,7 @@ Domain to not audit.
39714 </param>
39715 <infoflow type="none"/>
39716 </interface>
39717 -<interface name="corenet_relabelto_sip_client_packets" lineno="77069">
39718 +<interface name="corenet_relabelto_sip_client_packets" lineno="77192">
39719 <summary>
39720 Relabel packets to sip_client the packet type.
39721 </summary>
39722 @@ -58158,7 +57975,7 @@ Domain allowed access.
39723 </summary>
39724 </param>
39725 </interface>
39726 -<interface name="corenet_send_sip_server_packets" lineno="77089">
39727 +<interface name="corenet_send_sip_server_packets" lineno="77212">
39728 <summary>
39729 Send sip_server packets.
39730 </summary>
39731 @@ -58169,7 +57986,7 @@ Domain allowed access.
39732 </param>
39733 <infoflow type="write" weight="10"/>
39734 </interface>
39735 -<interface name="corenet_dontaudit_send_sip_server_packets" lineno="77108">
39736 +<interface name="corenet_dontaudit_send_sip_server_packets" lineno="77231">
39737 <summary>
39738 Do not audit attempts to send sip_server packets.
39739 </summary>
39740 @@ -58180,7 +57997,7 @@ Domain to not audit.
39741 </param>
39742 <infoflow type="none"/>
39743 </interface>
39744 -<interface name="corenet_receive_sip_server_packets" lineno="77127">
39745 +<interface name="corenet_receive_sip_server_packets" lineno="77250">
39746 <summary>
39747 Receive sip_server packets.
39748 </summary>
39749 @@ -58191,7 +58008,7 @@ Domain allowed access.
39750 </param>
39751 <infoflow type="read" weight="10"/>
39752 </interface>
39753 -<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="77146">
39754 +<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="77269">
39755 <summary>
39756 Do not audit attempts to receive sip_server packets.
39757 </summary>
39758 @@ -58202,7 +58019,7 @@ Domain allowed access.
39759 </param>
39760 <infoflow type="none"/>
39761 </interface>
39762 -<interface name="corenet_sendrecv_sip_server_packets" lineno="77165">
39763 +<interface name="corenet_sendrecv_sip_server_packets" lineno="77288">
39764 <summary>
39765 Send and receive sip_server packets.
39766 </summary>
39767 @@ -58213,7 +58030,7 @@ Domain allowed access.
39768 </param>
39769 <infoflow type="both" weight="10"/>
39770 </interface>
39771 -<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="77181">
39772 +<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="77304">
39773 <summary>
39774 Do not audit attempts to send and receive sip_server packets.
39775 </summary>
39776 @@ -58224,7 +58041,7 @@ Domain to not audit.
39777 </param>
39778 <infoflow type="none"/>
39779 </interface>
39780 -<interface name="corenet_relabelto_sip_server_packets" lineno="77196">
39781 +<interface name="corenet_relabelto_sip_server_packets" lineno="77319">
39782 <summary>
39783 Relabel packets to sip_server the packet type.
39784 </summary>
39785 @@ -58234,7 +58051,7 @@ Domain allowed access.
39786 </summary>
39787 </param>
39788 </interface>
39789 -<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="77218">
39790 +<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="77341">
39791 <summary>
39792 Send and receive TCP traffic on the sixxsconfig port.
39793 </summary>
39794 @@ -58245,7 +58062,7 @@ Domain allowed access.
39795 </param>
39796 <infoflow type="both" weight="10"/>
39797 </interface>
39798 -<interface name="corenet_udp_send_sixxsconfig_port" lineno="77233">
39799 +<interface name="corenet_udp_send_sixxsconfig_port" lineno="77356">
39800 <summary>
39801 Send UDP traffic on the sixxsconfig port.
39802 </summary>
39803 @@ -58256,7 +58073,7 @@ Domain allowed access.
39804 </param>
39805 <infoflow type="write" weight="10"/>
39806 </interface>
39807 -<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="77248">
39808 +<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="77371">
39809 <summary>
39810 Do not audit attempts to send UDP traffic on the sixxsconfig port.
39811 </summary>
39812 @@ -58267,7 +58084,7 @@ Domain to not audit.
39813 </param>
39814 <infoflow type="none"/>
39815 </interface>
39816 -<interface name="corenet_udp_receive_sixxsconfig_port" lineno="77263">
39817 +<interface name="corenet_udp_receive_sixxsconfig_port" lineno="77386">
39818 <summary>
39819 Receive UDP traffic on the sixxsconfig port.
39820 </summary>
39821 @@ -58278,7 +58095,7 @@ Domain allowed access.
39822 </param>
39823 <infoflow type="read" weight="10"/>
39824 </interface>
39825 -<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="77278">
39826 +<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="77401">
39827 <summary>
39828 Do not audit attempts to receive UDP traffic on the sixxsconfig port.
39829 </summary>
39830 @@ -58289,7 +58106,7 @@ Domain to not audit.
39831 </param>
39832 <infoflow type="none"/>
39833 </interface>
39834 -<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="77293">
39835 +<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="77416">
39836 <summary>
39837 Send and receive UDP traffic on the sixxsconfig port.
39838 </summary>
39839 @@ -58300,7 +58117,7 @@ Domain allowed access.
39840 </param>
39841 <infoflow type="both" weight="10"/>
39842 </interface>
39843 -<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="77309">
39844 +<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="77432">
39845 <summary>
39846 Do not audit attempts to send and receive
39847 UDP traffic on the sixxsconfig port.
39848 @@ -58312,7 +58129,7 @@ Domain to not audit.
39849 </param>
39850 <infoflow type="none"/>
39851 </interface>
39852 -<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="77324">
39853 +<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="77447">
39854 <summary>
39855 Bind TCP sockets to the sixxsconfig port.
39856 </summary>
39857 @@ -58323,7 +58140,7 @@ Domain allowed access.
39858 </param>
39859 <infoflow type="none"/>
39860 </interface>
39861 -<interface name="corenet_udp_bind_sixxsconfig_port" lineno="77344">
39862 +<interface name="corenet_udp_bind_sixxsconfig_port" lineno="77467">
39863 <summary>
39864 Bind UDP sockets to the sixxsconfig port.
39865 </summary>
39866 @@ -58334,7 +58151,7 @@ Domain allowed access.
39867 </param>
39868 <infoflow type="none"/>
39869 </interface>
39870 -<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="77363">
39871 +<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="77486">
39872 <summary>
39873 Make a TCP connection to the sixxsconfig port.
39874 </summary>
39875 @@ -58344,7 +58161,7 @@ Domain allowed access.
39876 </summary>
39877 </param>
39878 </interface>
39879 -<interface name="corenet_send_sixxsconfig_client_packets" lineno="77383">
39880 +<interface name="corenet_send_sixxsconfig_client_packets" lineno="77506">
39881 <summary>
39882 Send sixxsconfig_client packets.
39883 </summary>
39884 @@ -58355,7 +58172,7 @@ Domain allowed access.
39885 </param>
39886 <infoflow type="write" weight="10"/>
39887 </interface>
39888 -<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="77402">
39889 +<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="77525">
39890 <summary>
39891 Do not audit attempts to send sixxsconfig_client packets.
39892 </summary>
39893 @@ -58366,7 +58183,7 @@ Domain to not audit.
39894 </param>
39895 <infoflow type="none"/>
39896 </interface>
39897 -<interface name="corenet_receive_sixxsconfig_client_packets" lineno="77421">
39898 +<interface name="corenet_receive_sixxsconfig_client_packets" lineno="77544">
39899 <summary>
39900 Receive sixxsconfig_client packets.
39901 </summary>
39902 @@ -58377,7 +58194,7 @@ Domain allowed access.
39903 </param>
39904 <infoflow type="read" weight="10"/>
39905 </interface>
39906 -<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="77440">
39907 +<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="77563">
39908 <summary>
39909 Do not audit attempts to receive sixxsconfig_client packets.
39910 </summary>
39911 @@ -58388,7 +58205,7 @@ Domain allowed access.
39912 </param>
39913 <infoflow type="none"/>
39914 </interface>
39915 -<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="77459">
39916 +<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="77582">
39917 <summary>
39918 Send and receive sixxsconfig_client packets.
39919 </summary>
39920 @@ -58399,7 +58216,7 @@ Domain allowed access.
39921 </param>
39922 <infoflow type="both" weight="10"/>
39923 </interface>
39924 -<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="77475">
39925 +<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="77598">
39926 <summary>
39927 Do not audit attempts to send and receive sixxsconfig_client packets.
39928 </summary>
39929 @@ -58410,7 +58227,7 @@ Domain to not audit.
39930 </param>
39931 <infoflow type="none"/>
39932 </interface>
39933 -<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="77490">
39934 +<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="77613">
39935 <summary>
39936 Relabel packets to sixxsconfig_client the packet type.
39937 </summary>
39938 @@ -58420,7 +58237,7 @@ Domain allowed access.
39939 </summary>
39940 </param>
39941 </interface>
39942 -<interface name="corenet_send_sixxsconfig_server_packets" lineno="77510">
39943 +<interface name="corenet_send_sixxsconfig_server_packets" lineno="77633">
39944 <summary>
39945 Send sixxsconfig_server packets.
39946 </summary>
39947 @@ -58431,7 +58248,7 @@ Domain allowed access.
39948 </param>
39949 <infoflow type="write" weight="10"/>
39950 </interface>
39951 -<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="77529">
39952 +<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="77652">
39953 <summary>
39954 Do not audit attempts to send sixxsconfig_server packets.
39955 </summary>
39956 @@ -58442,7 +58259,7 @@ Domain to not audit.
39957 </param>
39958 <infoflow type="none"/>
39959 </interface>
39960 -<interface name="corenet_receive_sixxsconfig_server_packets" lineno="77548">
39961 +<interface name="corenet_receive_sixxsconfig_server_packets" lineno="77671">
39962 <summary>
39963 Receive sixxsconfig_server packets.
39964 </summary>
39965 @@ -58453,7 +58270,7 @@ Domain allowed access.
39966 </param>
39967 <infoflow type="read" weight="10"/>
39968 </interface>
39969 -<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="77567">
39970 +<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="77690">
39971 <summary>
39972 Do not audit attempts to receive sixxsconfig_server packets.
39973 </summary>
39974 @@ -58464,7 +58281,7 @@ Domain allowed access.
39975 </param>
39976 <infoflow type="none"/>
39977 </interface>
39978 -<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="77586">
39979 +<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="77709">
39980 <summary>
39981 Send and receive sixxsconfig_server packets.
39982 </summary>
39983 @@ -58475,7 +58292,7 @@ Domain allowed access.
39984 </param>
39985 <infoflow type="both" weight="10"/>
39986 </interface>
39987 -<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="77602">
39988 +<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="77725">
39989 <summary>
39990 Do not audit attempts to send and receive sixxsconfig_server packets.
39991 </summary>
39992 @@ -58486,7 +58303,7 @@ Domain to not audit.
39993 </param>
39994 <infoflow type="none"/>
39995 </interface>
39996 -<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="77617">
39997 +<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="77740">
39998 <summary>
39999 Relabel packets to sixxsconfig_server the packet type.
40000 </summary>
40001 @@ -58496,7 +58313,7 @@ Domain allowed access.
40002 </summary>
40003 </param>
40004 </interface>
40005 -<interface name="corenet_tcp_sendrecv_smbd_port" lineno="77639">
40006 +<interface name="corenet_tcp_sendrecv_smbd_port" lineno="77762">
40007 <summary>
40008 Send and receive TCP traffic on the smbd port.
40009 </summary>
40010 @@ -58507,7 +58324,7 @@ Domain allowed access.
40011 </param>
40012 <infoflow type="both" weight="10"/>
40013 </interface>
40014 -<interface name="corenet_udp_send_smbd_port" lineno="77654">
40015 +<interface name="corenet_udp_send_smbd_port" lineno="77777">
40016 <summary>
40017 Send UDP traffic on the smbd port.
40018 </summary>
40019 @@ -58518,7 +58335,7 @@ Domain allowed access.
40020 </param>
40021 <infoflow type="write" weight="10"/>
40022 </interface>
40023 -<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="77669">
40024 +<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="77792">
40025 <summary>
40026 Do not audit attempts to send UDP traffic on the smbd port.
40027 </summary>
40028 @@ -58529,7 +58346,7 @@ Domain to not audit.
40029 </param>
40030 <infoflow type="none"/>
40031 </interface>
40032 -<interface name="corenet_udp_receive_smbd_port" lineno="77684">
40033 +<interface name="corenet_udp_receive_smbd_port" lineno="77807">
40034 <summary>
40035 Receive UDP traffic on the smbd port.
40036 </summary>
40037 @@ -58540,7 +58357,7 @@ Domain allowed access.
40038 </param>
40039 <infoflow type="read" weight="10"/>
40040 </interface>
40041 -<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="77699">
40042 +<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="77822">
40043 <summary>
40044 Do not audit attempts to receive UDP traffic on the smbd port.
40045 </summary>
40046 @@ -58551,7 +58368,7 @@ Domain to not audit.
40047 </param>
40048 <infoflow type="none"/>
40049 </interface>
40050 -<interface name="corenet_udp_sendrecv_smbd_port" lineno="77714">
40051 +<interface name="corenet_udp_sendrecv_smbd_port" lineno="77837">
40052 <summary>
40053 Send and receive UDP traffic on the smbd port.
40054 </summary>
40055 @@ -58562,7 +58379,7 @@ Domain allowed access.
40056 </param>
40057 <infoflow type="both" weight="10"/>
40058 </interface>
40059 -<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="77730">
40060 +<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="77853">
40061 <summary>
40062 Do not audit attempts to send and receive
40063 UDP traffic on the smbd port.
40064 @@ -58574,7 +58391,7 @@ Domain to not audit.
40065 </param>
40066 <infoflow type="none"/>
40067 </interface>
40068 -<interface name="corenet_tcp_bind_smbd_port" lineno="77745">
40069 +<interface name="corenet_tcp_bind_smbd_port" lineno="77868">
40070 <summary>
40071 Bind TCP sockets to the smbd port.
40072 </summary>
40073 @@ -58585,7 +58402,7 @@ Domain allowed access.
40074 </param>
40075 <infoflow type="none"/>
40076 </interface>
40077 -<interface name="corenet_udp_bind_smbd_port" lineno="77765">
40078 +<interface name="corenet_udp_bind_smbd_port" lineno="77888">
40079 <summary>
40080 Bind UDP sockets to the smbd port.
40081 </summary>
40082 @@ -58596,7 +58413,7 @@ Domain allowed access.
40083 </param>
40084 <infoflow type="none"/>
40085 </interface>
40086 -<interface name="corenet_tcp_connect_smbd_port" lineno="77784">
40087 +<interface name="corenet_tcp_connect_smbd_port" lineno="77907">
40088 <summary>
40089 Make a TCP connection to the smbd port.
40090 </summary>
40091 @@ -58606,7 +58423,7 @@ Domain allowed access.
40092 </summary>
40093 </param>
40094 </interface>
40095 -<interface name="corenet_send_smbd_client_packets" lineno="77804">
40096 +<interface name="corenet_send_smbd_client_packets" lineno="77927">
40097 <summary>
40098 Send smbd_client packets.
40099 </summary>
40100 @@ -58617,7 +58434,7 @@ Domain allowed access.
40101 </param>
40102 <infoflow type="write" weight="10"/>
40103 </interface>
40104 -<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="77823">
40105 +<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="77946">
40106 <summary>
40107 Do not audit attempts to send smbd_client packets.
40108 </summary>
40109 @@ -58628,7 +58445,7 @@ Domain to not audit.
40110 </param>
40111 <infoflow type="none"/>
40112 </interface>
40113 -<interface name="corenet_receive_smbd_client_packets" lineno="77842">
40114 +<interface name="corenet_receive_smbd_client_packets" lineno="77965">
40115 <summary>
40116 Receive smbd_client packets.
40117 </summary>
40118 @@ -58639,7 +58456,7 @@ Domain allowed access.
40119 </param>
40120 <infoflow type="read" weight="10"/>
40121 </interface>
40122 -<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="77861">
40123 +<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="77984">
40124 <summary>
40125 Do not audit attempts to receive smbd_client packets.
40126 </summary>
40127 @@ -58650,7 +58467,7 @@ Domain allowed access.
40128 </param>
40129 <infoflow type="none"/>
40130 </interface>
40131 -<interface name="corenet_sendrecv_smbd_client_packets" lineno="77880">
40132 +<interface name="corenet_sendrecv_smbd_client_packets" lineno="78003">
40133 <summary>
40134 Send and receive smbd_client packets.
40135 </summary>
40136 @@ -58661,7 +58478,7 @@ Domain allowed access.
40137 </param>
40138 <infoflow type="both" weight="10"/>
40139 </interface>
40140 -<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="77896">
40141 +<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="78019">
40142 <summary>
40143 Do not audit attempts to send and receive smbd_client packets.
40144 </summary>
40145 @@ -58672,7 +58489,7 @@ Domain to not audit.
40146 </param>
40147 <infoflow type="none"/>
40148 </interface>
40149 -<interface name="corenet_relabelto_smbd_client_packets" lineno="77911">
40150 +<interface name="corenet_relabelto_smbd_client_packets" lineno="78034">
40151 <summary>
40152 Relabel packets to smbd_client the packet type.
40153 </summary>
40154 @@ -58682,7 +58499,7 @@ Domain allowed access.
40155 </summary>
40156 </param>
40157 </interface>
40158 -<interface name="corenet_send_smbd_server_packets" lineno="77931">
40159 +<interface name="corenet_send_smbd_server_packets" lineno="78054">
40160 <summary>
40161 Send smbd_server packets.
40162 </summary>
40163 @@ -58693,7 +58510,7 @@ Domain allowed access.
40164 </param>
40165 <infoflow type="write" weight="10"/>
40166 </interface>
40167 -<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="77950">
40168 +<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="78073">
40169 <summary>
40170 Do not audit attempts to send smbd_server packets.
40171 </summary>
40172 @@ -58704,7 +58521,7 @@ Domain to not audit.
40173 </param>
40174 <infoflow type="none"/>
40175 </interface>
40176 -<interface name="corenet_receive_smbd_server_packets" lineno="77969">
40177 +<interface name="corenet_receive_smbd_server_packets" lineno="78092">
40178 <summary>
40179 Receive smbd_server packets.
40180 </summary>
40181 @@ -58715,7 +58532,7 @@ Domain allowed access.
40182 </param>
40183 <infoflow type="read" weight="10"/>
40184 </interface>
40185 -<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="77988">
40186 +<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="78111">
40187 <summary>
40188 Do not audit attempts to receive smbd_server packets.
40189 </summary>
40190 @@ -58726,7 +58543,7 @@ Domain allowed access.
40191 </param>
40192 <infoflow type="none"/>
40193 </interface>
40194 -<interface name="corenet_sendrecv_smbd_server_packets" lineno="78007">
40195 +<interface name="corenet_sendrecv_smbd_server_packets" lineno="78130">
40196 <summary>
40197 Send and receive smbd_server packets.
40198 </summary>
40199 @@ -58737,7 +58554,7 @@ Domain allowed access.
40200 </param>
40201 <infoflow type="both" weight="10"/>
40202 </interface>
40203 -<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="78023">
40204 +<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="78146">
40205 <summary>
40206 Do not audit attempts to send and receive smbd_server packets.
40207 </summary>
40208 @@ -58748,7 +58565,7 @@ Domain to not audit.
40209 </param>
40210 <infoflow type="none"/>
40211 </interface>
40212 -<interface name="corenet_relabelto_smbd_server_packets" lineno="78038">
40213 +<interface name="corenet_relabelto_smbd_server_packets" lineno="78161">
40214 <summary>
40215 Relabel packets to smbd_server the packet type.
40216 </summary>
40217 @@ -58758,7 +58575,7 @@ Domain allowed access.
40218 </summary>
40219 </param>
40220 </interface>
40221 -<interface name="corenet_tcp_sendrecv_smtp_port" lineno="78060">
40222 +<interface name="corenet_tcp_sendrecv_smtp_port" lineno="78183">
40223 <summary>
40224 Send and receive TCP traffic on the smtp port.
40225 </summary>
40226 @@ -58769,7 +58586,7 @@ Domain allowed access.
40227 </param>
40228 <infoflow type="both" weight="10"/>
40229 </interface>
40230 -<interface name="corenet_udp_send_smtp_port" lineno="78075">
40231 +<interface name="corenet_udp_send_smtp_port" lineno="78198">
40232 <summary>
40233 Send UDP traffic on the smtp port.
40234 </summary>
40235 @@ -58780,7 +58597,7 @@ Domain allowed access.
40236 </param>
40237 <infoflow type="write" weight="10"/>
40238 </interface>
40239 -<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="78090">
40240 +<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="78213">
40241 <summary>
40242 Do not audit attempts to send UDP traffic on the smtp port.
40243 </summary>
40244 @@ -58791,7 +58608,7 @@ Domain to not audit.
40245 </param>
40246 <infoflow type="none"/>
40247 </interface>
40248 -<interface name="corenet_udp_receive_smtp_port" lineno="78105">
40249 +<interface name="corenet_udp_receive_smtp_port" lineno="78228">
40250 <summary>
40251 Receive UDP traffic on the smtp port.
40252 </summary>
40253 @@ -58802,7 +58619,7 @@ Domain allowed access.
40254 </param>
40255 <infoflow type="read" weight="10"/>
40256 </interface>
40257 -<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="78120">
40258 +<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="78243">
40259 <summary>
40260 Do not audit attempts to receive UDP traffic on the smtp port.
40261 </summary>
40262 @@ -58813,7 +58630,7 @@ Domain to not audit.
40263 </param>
40264 <infoflow type="none"/>
40265 </interface>
40266 -<interface name="corenet_udp_sendrecv_smtp_port" lineno="78135">
40267 +<interface name="corenet_udp_sendrecv_smtp_port" lineno="78258">
40268 <summary>
40269 Send and receive UDP traffic on the smtp port.
40270 </summary>
40271 @@ -58824,7 +58641,7 @@ Domain allowed access.
40272 </param>
40273 <infoflow type="both" weight="10"/>
40274 </interface>
40275 -<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="78151">
40276 +<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="78274">
40277 <summary>
40278 Do not audit attempts to send and receive
40279 UDP traffic on the smtp port.
40280 @@ -58836,7 +58653,7 @@ Domain to not audit.
40281 </param>
40282 <infoflow type="none"/>
40283 </interface>
40284 -<interface name="corenet_tcp_bind_smtp_port" lineno="78166">
40285 +<interface name="corenet_tcp_bind_smtp_port" lineno="78289">
40286 <summary>
40287 Bind TCP sockets to the smtp port.
40288 </summary>
40289 @@ -58847,7 +58664,7 @@ Domain allowed access.
40290 </param>
40291 <infoflow type="none"/>
40292 </interface>
40293 -<interface name="corenet_udp_bind_smtp_port" lineno="78186">
40294 +<interface name="corenet_udp_bind_smtp_port" lineno="78309">
40295 <summary>
40296 Bind UDP sockets to the smtp port.
40297 </summary>
40298 @@ -58858,7 +58675,7 @@ Domain allowed access.
40299 </param>
40300 <infoflow type="none"/>
40301 </interface>
40302 -<interface name="corenet_tcp_connect_smtp_port" lineno="78205">
40303 +<interface name="corenet_tcp_connect_smtp_port" lineno="78328">
40304 <summary>
40305 Make a TCP connection to the smtp port.
40306 </summary>
40307 @@ -58868,7 +58685,7 @@ Domain allowed access.
40308 </summary>
40309 </param>
40310 </interface>
40311 -<interface name="corenet_send_smtp_client_packets" lineno="78225">
40312 +<interface name="corenet_send_smtp_client_packets" lineno="78348">
40313 <summary>
40314 Send smtp_client packets.
40315 </summary>
40316 @@ -58879,7 +58696,7 @@ Domain allowed access.
40317 </param>
40318 <infoflow type="write" weight="10"/>
40319 </interface>
40320 -<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="78244">
40321 +<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="78367">
40322 <summary>
40323 Do not audit attempts to send smtp_client packets.
40324 </summary>
40325 @@ -58890,7 +58707,7 @@ Domain to not audit.
40326 </param>
40327 <infoflow type="none"/>
40328 </interface>
40329 -<interface name="corenet_receive_smtp_client_packets" lineno="78263">
40330 +<interface name="corenet_receive_smtp_client_packets" lineno="78386">
40331 <summary>
40332 Receive smtp_client packets.
40333 </summary>
40334 @@ -58901,7 +58718,7 @@ Domain allowed access.
40335 </param>
40336 <infoflow type="read" weight="10"/>
40337 </interface>
40338 -<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="78282">
40339 +<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="78405">
40340 <summary>
40341 Do not audit attempts to receive smtp_client packets.
40342 </summary>
40343 @@ -58912,7 +58729,7 @@ Domain allowed access.
40344 </param>
40345 <infoflow type="none"/>
40346 </interface>
40347 -<interface name="corenet_sendrecv_smtp_client_packets" lineno="78301">
40348 +<interface name="corenet_sendrecv_smtp_client_packets" lineno="78424">
40349 <summary>
40350 Send and receive smtp_client packets.
40351 </summary>
40352 @@ -58923,7 +58740,7 @@ Domain allowed access.
40353 </param>
40354 <infoflow type="both" weight="10"/>
40355 </interface>
40356 -<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="78317">
40357 +<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="78440">
40358 <summary>
40359 Do not audit attempts to send and receive smtp_client packets.
40360 </summary>
40361 @@ -58934,7 +58751,7 @@ Domain to not audit.
40362 </param>
40363 <infoflow type="none"/>
40364 </interface>
40365 -<interface name="corenet_relabelto_smtp_client_packets" lineno="78332">
40366 +<interface name="corenet_relabelto_smtp_client_packets" lineno="78455">
40367 <summary>
40368 Relabel packets to smtp_client the packet type.
40369 </summary>
40370 @@ -58944,7 +58761,7 @@ Domain allowed access.
40371 </summary>
40372 </param>
40373 </interface>
40374 -<interface name="corenet_send_smtp_server_packets" lineno="78352">
40375 +<interface name="corenet_send_smtp_server_packets" lineno="78475">
40376 <summary>
40377 Send smtp_server packets.
40378 </summary>
40379 @@ -58955,7 +58772,7 @@ Domain allowed access.
40380 </param>
40381 <infoflow type="write" weight="10"/>
40382 </interface>
40383 -<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="78371">
40384 +<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="78494">
40385 <summary>
40386 Do not audit attempts to send smtp_server packets.
40387 </summary>
40388 @@ -58966,7 +58783,7 @@ Domain to not audit.
40389 </param>
40390 <infoflow type="none"/>
40391 </interface>
40392 -<interface name="corenet_receive_smtp_server_packets" lineno="78390">
40393 +<interface name="corenet_receive_smtp_server_packets" lineno="78513">
40394 <summary>
40395 Receive smtp_server packets.
40396 </summary>
40397 @@ -58977,7 +58794,7 @@ Domain allowed access.
40398 </param>
40399 <infoflow type="read" weight="10"/>
40400 </interface>
40401 -<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="78409">
40402 +<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="78532">
40403 <summary>
40404 Do not audit attempts to receive smtp_server packets.
40405 </summary>
40406 @@ -58988,7 +58805,7 @@ Domain allowed access.
40407 </param>
40408 <infoflow type="none"/>
40409 </interface>
40410 -<interface name="corenet_sendrecv_smtp_server_packets" lineno="78428">
40411 +<interface name="corenet_sendrecv_smtp_server_packets" lineno="78551">
40412 <summary>
40413 Send and receive smtp_server packets.
40414 </summary>
40415 @@ -58999,7 +58816,7 @@ Domain allowed access.
40416 </param>
40417 <infoflow type="both" weight="10"/>
40418 </interface>
40419 -<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="78444">
40420 +<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="78567">
40421 <summary>
40422 Do not audit attempts to send and receive smtp_server packets.
40423 </summary>
40424 @@ -59010,7 +58827,7 @@ Domain to not audit.
40425 </param>
40426 <infoflow type="none"/>
40427 </interface>
40428 -<interface name="corenet_relabelto_smtp_server_packets" lineno="78459">
40429 +<interface name="corenet_relabelto_smtp_server_packets" lineno="78582">
40430 <summary>
40431 Relabel packets to smtp_server the packet type.
40432 </summary>
40433 @@ -59020,7 +58837,7 @@ Domain allowed access.
40434 </summary>
40435 </param>
40436 </interface>
40437 -<interface name="corenet_tcp_sendrecv_snmp_port" lineno="78481">
40438 +<interface name="corenet_tcp_sendrecv_snmp_port" lineno="78604">
40439 <summary>
40440 Send and receive TCP traffic on the snmp port.
40441 </summary>
40442 @@ -59031,7 +58848,7 @@ Domain allowed access.
40443 </param>
40444 <infoflow type="both" weight="10"/>
40445 </interface>
40446 -<interface name="corenet_udp_send_snmp_port" lineno="78496">
40447 +<interface name="corenet_udp_send_snmp_port" lineno="78619">
40448 <summary>
40449 Send UDP traffic on the snmp port.
40450 </summary>
40451 @@ -59042,7 +58859,7 @@ Domain allowed access.
40452 </param>
40453 <infoflow type="write" weight="10"/>
40454 </interface>
40455 -<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="78511">
40456 +<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="78634">
40457 <summary>
40458 Do not audit attempts to send UDP traffic on the snmp port.
40459 </summary>
40460 @@ -59053,7 +58870,7 @@ Domain to not audit.
40461 </param>
40462 <infoflow type="none"/>
40463 </interface>
40464 -<interface name="corenet_udp_receive_snmp_port" lineno="78526">
40465 +<interface name="corenet_udp_receive_snmp_port" lineno="78649">
40466 <summary>
40467 Receive UDP traffic on the snmp port.
40468 </summary>
40469 @@ -59064,7 +58881,7 @@ Domain allowed access.
40470 </param>
40471 <infoflow type="read" weight="10"/>
40472 </interface>
40473 -<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="78541">
40474 +<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="78664">
40475 <summary>
40476 Do not audit attempts to receive UDP traffic on the snmp port.
40477 </summary>
40478 @@ -59075,7 +58892,7 @@ Domain to not audit.
40479 </param>
40480 <infoflow type="none"/>
40481 </interface>
40482 -<interface name="corenet_udp_sendrecv_snmp_port" lineno="78556">
40483 +<interface name="corenet_udp_sendrecv_snmp_port" lineno="78679">
40484 <summary>
40485 Send and receive UDP traffic on the snmp port.
40486 </summary>
40487 @@ -59086,7 +58903,7 @@ Domain allowed access.
40488 </param>
40489 <infoflow type="both" weight="10"/>
40490 </interface>
40491 -<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="78572">
40492 +<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="78695">
40493 <summary>
40494 Do not audit attempts to send and receive
40495 UDP traffic on the snmp port.
40496 @@ -59098,7 +58915,7 @@ Domain to not audit.
40497 </param>
40498 <infoflow type="none"/>
40499 </interface>
40500 -<interface name="corenet_tcp_bind_snmp_port" lineno="78587">
40501 +<interface name="corenet_tcp_bind_snmp_port" lineno="78710">
40502 <summary>
40503 Bind TCP sockets to the snmp port.
40504 </summary>
40505 @@ -59109,7 +58926,7 @@ Domain allowed access.
40506 </param>
40507 <infoflow type="none"/>
40508 </interface>
40509 -<interface name="corenet_udp_bind_snmp_port" lineno="78607">
40510 +<interface name="corenet_udp_bind_snmp_port" lineno="78730">
40511 <summary>
40512 Bind UDP sockets to the snmp port.
40513 </summary>
40514 @@ -59120,7 +58937,7 @@ Domain allowed access.
40515 </param>
40516 <infoflow type="none"/>
40517 </interface>
40518 -<interface name="corenet_tcp_connect_snmp_port" lineno="78626">
40519 +<interface name="corenet_tcp_connect_snmp_port" lineno="78749">
40520 <summary>
40521 Make a TCP connection to the snmp port.
40522 </summary>
40523 @@ -59130,7 +58947,7 @@ Domain allowed access.
40524 </summary>
40525 </param>
40526 </interface>
40527 -<interface name="corenet_send_snmp_client_packets" lineno="78646">
40528 +<interface name="corenet_send_snmp_client_packets" lineno="78769">
40529 <summary>
40530 Send snmp_client packets.
40531 </summary>
40532 @@ -59141,7 +58958,7 @@ Domain allowed access.
40533 </param>
40534 <infoflow type="write" weight="10"/>
40535 </interface>
40536 -<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="78665">
40537 +<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="78788">
40538 <summary>
40539 Do not audit attempts to send snmp_client packets.
40540 </summary>
40541 @@ -59152,7 +58969,7 @@ Domain to not audit.
40542 </param>
40543 <infoflow type="none"/>
40544 </interface>
40545 -<interface name="corenet_receive_snmp_client_packets" lineno="78684">
40546 +<interface name="corenet_receive_snmp_client_packets" lineno="78807">
40547 <summary>
40548 Receive snmp_client packets.
40549 </summary>
40550 @@ -59163,7 +58980,7 @@ Domain allowed access.
40551 </param>
40552 <infoflow type="read" weight="10"/>
40553 </interface>
40554 -<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="78703">
40555 +<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="78826">
40556 <summary>
40557 Do not audit attempts to receive snmp_client packets.
40558 </summary>
40559 @@ -59174,7 +58991,7 @@ Domain allowed access.
40560 </param>
40561 <infoflow type="none"/>
40562 </interface>
40563 -<interface name="corenet_sendrecv_snmp_client_packets" lineno="78722">
40564 +<interface name="corenet_sendrecv_snmp_client_packets" lineno="78845">
40565 <summary>
40566 Send and receive snmp_client packets.
40567 </summary>
40568 @@ -59185,7 +59002,7 @@ Domain allowed access.
40569 </param>
40570 <infoflow type="both" weight="10"/>
40571 </interface>
40572 -<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="78738">
40573 +<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="78861">
40574 <summary>
40575 Do not audit attempts to send and receive snmp_client packets.
40576 </summary>
40577 @@ -59196,7 +59013,7 @@ Domain to not audit.
40578 </param>
40579 <infoflow type="none"/>
40580 </interface>
40581 -<interface name="corenet_relabelto_snmp_client_packets" lineno="78753">
40582 +<interface name="corenet_relabelto_snmp_client_packets" lineno="78876">
40583 <summary>
40584 Relabel packets to snmp_client the packet type.
40585 </summary>
40586 @@ -59206,7 +59023,7 @@ Domain allowed access.
40587 </summary>
40588 </param>
40589 </interface>
40590 -<interface name="corenet_send_snmp_server_packets" lineno="78773">
40591 +<interface name="corenet_send_snmp_server_packets" lineno="78896">
40592 <summary>
40593 Send snmp_server packets.
40594 </summary>
40595 @@ -59217,7 +59034,7 @@ Domain allowed access.
40596 </param>
40597 <infoflow type="write" weight="10"/>
40598 </interface>
40599 -<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="78792">
40600 +<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="78915">
40601 <summary>
40602 Do not audit attempts to send snmp_server packets.
40603 </summary>
40604 @@ -59228,7 +59045,7 @@ Domain to not audit.
40605 </param>
40606 <infoflow type="none"/>
40607 </interface>
40608 -<interface name="corenet_receive_snmp_server_packets" lineno="78811">
40609 +<interface name="corenet_receive_snmp_server_packets" lineno="78934">
40610 <summary>
40611 Receive snmp_server packets.
40612 </summary>
40613 @@ -59239,7 +59056,7 @@ Domain allowed access.
40614 </param>
40615 <infoflow type="read" weight="10"/>
40616 </interface>
40617 -<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="78830">
40618 +<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="78953">
40619 <summary>
40620 Do not audit attempts to receive snmp_server packets.
40621 </summary>
40622 @@ -59250,7 +59067,7 @@ Domain allowed access.
40623 </param>
40624 <infoflow type="none"/>
40625 </interface>
40626 -<interface name="corenet_sendrecv_snmp_server_packets" lineno="78849">
40627 +<interface name="corenet_sendrecv_snmp_server_packets" lineno="78972">
40628 <summary>
40629 Send and receive snmp_server packets.
40630 </summary>
40631 @@ -59261,7 +59078,7 @@ Domain allowed access.
40632 </param>
40633 <infoflow type="both" weight="10"/>
40634 </interface>
40635 -<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="78865">
40636 +<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="78988">
40637 <summary>
40638 Do not audit attempts to send and receive snmp_server packets.
40639 </summary>
40640 @@ -59272,7 +59089,7 @@ Domain to not audit.
40641 </param>
40642 <infoflow type="none"/>
40643 </interface>
40644 -<interface name="corenet_relabelto_snmp_server_packets" lineno="78880">
40645 +<interface name="corenet_relabelto_snmp_server_packets" lineno="79003">
40646 <summary>
40647 Relabel packets to snmp_server the packet type.
40648 </summary>
40649 @@ -59282,7 +59099,7 @@ Domain allowed access.
40650 </summary>
40651 </param>
40652 </interface>
40653 -<interface name="corenet_tcp_sendrecv_socks_port" lineno="78902">
40654 +<interface name="corenet_tcp_sendrecv_socks_port" lineno="79025">
40655 <summary>
40656 Send and receive TCP traffic on the socks port.
40657 </summary>
40658 @@ -59293,7 +59110,7 @@ Domain allowed access.
40659 </param>
40660 <infoflow type="both" weight="10"/>
40661 </interface>
40662 -<interface name="corenet_udp_send_socks_port" lineno="78917">
40663 +<interface name="corenet_udp_send_socks_port" lineno="79040">
40664 <summary>
40665 Send UDP traffic on the socks port.
40666 </summary>
40667 @@ -59304,7 +59121,7 @@ Domain allowed access.
40668 </param>
40669 <infoflow type="write" weight="10"/>
40670 </interface>
40671 -<interface name="corenet_dontaudit_udp_send_socks_port" lineno="78932">
40672 +<interface name="corenet_dontaudit_udp_send_socks_port" lineno="79055">
40673 <summary>
40674 Do not audit attempts to send UDP traffic on the socks port.
40675 </summary>
40676 @@ -59315,7 +59132,7 @@ Domain to not audit.
40677 </param>
40678 <infoflow type="none"/>
40679 </interface>
40680 -<interface name="corenet_udp_receive_socks_port" lineno="78947">
40681 +<interface name="corenet_udp_receive_socks_port" lineno="79070">
40682 <summary>
40683 Receive UDP traffic on the socks port.
40684 </summary>
40685 @@ -59326,7 +59143,7 @@ Domain allowed access.
40686 </param>
40687 <infoflow type="read" weight="10"/>
40688 </interface>
40689 -<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="78962">
40690 +<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="79085">
40691 <summary>
40692 Do not audit attempts to receive UDP traffic on the socks port.
40693 </summary>
40694 @@ -59337,7 +59154,7 @@ Domain to not audit.
40695 </param>
40696 <infoflow type="none"/>
40697 </interface>
40698 -<interface name="corenet_udp_sendrecv_socks_port" lineno="78977">
40699 +<interface name="corenet_udp_sendrecv_socks_port" lineno="79100">
40700 <summary>
40701 Send and receive UDP traffic on the socks port.
40702 </summary>
40703 @@ -59348,7 +59165,7 @@ Domain allowed access.
40704 </param>
40705 <infoflow type="both" weight="10"/>
40706 </interface>
40707 -<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="78993">
40708 +<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="79116">
40709 <summary>
40710 Do not audit attempts to send and receive
40711 UDP traffic on the socks port.
40712 @@ -59360,7 +59177,7 @@ Domain to not audit.
40713 </param>
40714 <infoflow type="none"/>
40715 </interface>
40716 -<interface name="corenet_tcp_bind_socks_port" lineno="79008">
40717 +<interface name="corenet_tcp_bind_socks_port" lineno="79131">
40718 <summary>
40719 Bind TCP sockets to the socks port.
40720 </summary>
40721 @@ -59371,7 +59188,7 @@ Domain allowed access.
40722 </param>
40723 <infoflow type="none"/>
40724 </interface>
40725 -<interface name="corenet_udp_bind_socks_port" lineno="79028">
40726 +<interface name="corenet_udp_bind_socks_port" lineno="79151">
40727 <summary>
40728 Bind UDP sockets to the socks port.
40729 </summary>
40730 @@ -59382,7 +59199,7 @@ Domain allowed access.
40731 </param>
40732 <infoflow type="none"/>
40733 </interface>
40734 -<interface name="corenet_tcp_connect_socks_port" lineno="79047">
40735 +<interface name="corenet_tcp_connect_socks_port" lineno="79170">
40736 <summary>
40737 Make a TCP connection to the socks port.
40738 </summary>
40739 @@ -59392,7 +59209,7 @@ Domain allowed access.
40740 </summary>
40741 </param>
40742 </interface>
40743 -<interface name="corenet_send_socks_client_packets" lineno="79067">
40744 +<interface name="corenet_send_socks_client_packets" lineno="79190">
40745 <summary>
40746 Send socks_client packets.
40747 </summary>
40748 @@ -59403,7 +59220,7 @@ Domain allowed access.
40749 </param>
40750 <infoflow type="write" weight="10"/>
40751 </interface>
40752 -<interface name="corenet_dontaudit_send_socks_client_packets" lineno="79086">
40753 +<interface name="corenet_dontaudit_send_socks_client_packets" lineno="79209">
40754 <summary>
40755 Do not audit attempts to send socks_client packets.
40756 </summary>
40757 @@ -59414,7 +59231,7 @@ Domain to not audit.
40758 </param>
40759 <infoflow type="none"/>
40760 </interface>
40761 -<interface name="corenet_receive_socks_client_packets" lineno="79105">
40762 +<interface name="corenet_receive_socks_client_packets" lineno="79228">
40763 <summary>
40764 Receive socks_client packets.
40765 </summary>
40766 @@ -59425,7 +59242,7 @@ Domain allowed access.
40767 </param>
40768 <infoflow type="read" weight="10"/>
40769 </interface>
40770 -<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="79124">
40771 +<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="79247">
40772 <summary>
40773 Do not audit attempts to receive socks_client packets.
40774 </summary>
40775 @@ -59436,7 +59253,7 @@ Domain allowed access.
40776 </param>
40777 <infoflow type="none"/>
40778 </interface>
40779 -<interface name="corenet_sendrecv_socks_client_packets" lineno="79143">
40780 +<interface name="corenet_sendrecv_socks_client_packets" lineno="79266">
40781 <summary>
40782 Send and receive socks_client packets.
40783 </summary>
40784 @@ -59447,7 +59264,7 @@ Domain allowed access.
40785 </param>
40786 <infoflow type="both" weight="10"/>
40787 </interface>
40788 -<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="79159">
40789 +<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="79282">
40790 <summary>
40791 Do not audit attempts to send and receive socks_client packets.
40792 </summary>
40793 @@ -59458,7 +59275,7 @@ Domain to not audit.
40794 </param>
40795 <infoflow type="none"/>
40796 </interface>
40797 -<interface name="corenet_relabelto_socks_client_packets" lineno="79174">
40798 +<interface name="corenet_relabelto_socks_client_packets" lineno="79297">
40799 <summary>
40800 Relabel packets to socks_client the packet type.
40801 </summary>
40802 @@ -59468,7 +59285,7 @@ Domain allowed access.
40803 </summary>
40804 </param>
40805 </interface>
40806 -<interface name="corenet_send_socks_server_packets" lineno="79194">
40807 +<interface name="corenet_send_socks_server_packets" lineno="79317">
40808 <summary>
40809 Send socks_server packets.
40810 </summary>
40811 @@ -59479,7 +59296,7 @@ Domain allowed access.
40812 </param>
40813 <infoflow type="write" weight="10"/>
40814 </interface>
40815 -<interface name="corenet_dontaudit_send_socks_server_packets" lineno="79213">
40816 +<interface name="corenet_dontaudit_send_socks_server_packets" lineno="79336">
40817 <summary>
40818 Do not audit attempts to send socks_server packets.
40819 </summary>
40820 @@ -59490,7 +59307,7 @@ Domain to not audit.
40821 </param>
40822 <infoflow type="none"/>
40823 </interface>
40824 -<interface name="corenet_receive_socks_server_packets" lineno="79232">
40825 +<interface name="corenet_receive_socks_server_packets" lineno="79355">
40826 <summary>
40827 Receive socks_server packets.
40828 </summary>
40829 @@ -59501,7 +59318,7 @@ Domain allowed access.
40830 </param>
40831 <infoflow type="read" weight="10"/>
40832 </interface>
40833 -<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="79251">
40834 +<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="79374">
40835 <summary>
40836 Do not audit attempts to receive socks_server packets.
40837 </summary>
40838 @@ -59512,7 +59329,7 @@ Domain allowed access.
40839 </param>
40840 <infoflow type="none"/>
40841 </interface>
40842 -<interface name="corenet_sendrecv_socks_server_packets" lineno="79270">
40843 +<interface name="corenet_sendrecv_socks_server_packets" lineno="79393">
40844 <summary>
40845 Send and receive socks_server packets.
40846 </summary>
40847 @@ -59523,7 +59340,7 @@ Domain allowed access.
40848 </param>
40849 <infoflow type="both" weight="10"/>
40850 </interface>
40851 -<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="79286">
40852 +<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="79409">
40853 <summary>
40854 Do not audit attempts to send and receive socks_server packets.
40855 </summary>
40856 @@ -59534,7 +59351,7 @@ Domain to not audit.
40857 </param>
40858 <infoflow type="none"/>
40859 </interface>
40860 -<interface name="corenet_relabelto_socks_server_packets" lineno="79301">
40861 +<interface name="corenet_relabelto_socks_server_packets" lineno="79424">
40862 <summary>
40863 Relabel packets to socks_server the packet type.
40864 </summary>
40865 @@ -59544,7 +59361,7 @@ Domain allowed access.
40866 </summary>
40867 </param>
40868 </interface>
40869 -<interface name="corenet_tcp_sendrecv_soundd_port" lineno="79323">
40870 +<interface name="corenet_tcp_sendrecv_soundd_port" lineno="79446">
40871 <summary>
40872 Send and receive TCP traffic on the soundd port.
40873 </summary>
40874 @@ -59555,7 +59372,7 @@ Domain allowed access.
40875 </param>
40876 <infoflow type="both" weight="10"/>
40877 </interface>
40878 -<interface name="corenet_udp_send_soundd_port" lineno="79338">
40879 +<interface name="corenet_udp_send_soundd_port" lineno="79461">
40880 <summary>
40881 Send UDP traffic on the soundd port.
40882 </summary>
40883 @@ -59566,7 +59383,7 @@ Domain allowed access.
40884 </param>
40885 <infoflow type="write" weight="10"/>
40886 </interface>
40887 -<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="79353">
40888 +<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="79476">
40889 <summary>
40890 Do not audit attempts to send UDP traffic on the soundd port.
40891 </summary>
40892 @@ -59577,7 +59394,7 @@ Domain to not audit.
40893 </param>
40894 <infoflow type="none"/>
40895 </interface>
40896 -<interface name="corenet_udp_receive_soundd_port" lineno="79368">
40897 +<interface name="corenet_udp_receive_soundd_port" lineno="79491">
40898 <summary>
40899 Receive UDP traffic on the soundd port.
40900 </summary>
40901 @@ -59588,7 +59405,7 @@ Domain allowed access.
40902 </param>
40903 <infoflow type="read" weight="10"/>
40904 </interface>
40905 -<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="79383">
40906 +<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="79506">
40907 <summary>
40908 Do not audit attempts to receive UDP traffic on the soundd port.
40909 </summary>
40910 @@ -59599,7 +59416,7 @@ Domain to not audit.
40911 </param>
40912 <infoflow type="none"/>
40913 </interface>
40914 -<interface name="corenet_udp_sendrecv_soundd_port" lineno="79398">
40915 +<interface name="corenet_udp_sendrecv_soundd_port" lineno="79521">
40916 <summary>
40917 Send and receive UDP traffic on the soundd port.
40918 </summary>
40919 @@ -59610,7 +59427,7 @@ Domain allowed access.
40920 </param>
40921 <infoflow type="both" weight="10"/>
40922 </interface>
40923 -<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="79414">
40924 +<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="79537">
40925 <summary>
40926 Do not audit attempts to send and receive
40927 UDP traffic on the soundd port.
40928 @@ -59622,7 +59439,7 @@ Domain to not audit.
40929 </param>
40930 <infoflow type="none"/>
40931 </interface>
40932 -<interface name="corenet_tcp_bind_soundd_port" lineno="79429">
40933 +<interface name="corenet_tcp_bind_soundd_port" lineno="79552">
40934 <summary>
40935 Bind TCP sockets to the soundd port.
40936 </summary>
40937 @@ -59633,7 +59450,7 @@ Domain allowed access.
40938 </param>
40939 <infoflow type="none"/>
40940 </interface>
40941 -<interface name="corenet_udp_bind_soundd_port" lineno="79449">
40942 +<interface name="corenet_udp_bind_soundd_port" lineno="79572">
40943 <summary>
40944 Bind UDP sockets to the soundd port.
40945 </summary>
40946 @@ -59644,7 +59461,7 @@ Domain allowed access.
40947 </param>
40948 <infoflow type="none"/>
40949 </interface>
40950 -<interface name="corenet_tcp_connect_soundd_port" lineno="79468">
40951 +<interface name="corenet_tcp_connect_soundd_port" lineno="79591">
40952 <summary>
40953 Make a TCP connection to the soundd port.
40954 </summary>
40955 @@ -59654,7 +59471,7 @@ Domain allowed access.
40956 </summary>
40957 </param>
40958 </interface>
40959 -<interface name="corenet_send_soundd_client_packets" lineno="79488">
40960 +<interface name="corenet_send_soundd_client_packets" lineno="79611">
40961 <summary>
40962 Send soundd_client packets.
40963 </summary>
40964 @@ -59665,7 +59482,7 @@ Domain allowed access.
40965 </param>
40966 <infoflow type="write" weight="10"/>
40967 </interface>
40968 -<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="79507">
40969 +<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="79630">
40970 <summary>
40971 Do not audit attempts to send soundd_client packets.
40972 </summary>
40973 @@ -59676,7 +59493,7 @@ Domain to not audit.
40974 </param>
40975 <infoflow type="none"/>
40976 </interface>
40977 -<interface name="corenet_receive_soundd_client_packets" lineno="79526">
40978 +<interface name="corenet_receive_soundd_client_packets" lineno="79649">
40979 <summary>
40980 Receive soundd_client packets.
40981 </summary>
40982 @@ -59687,7 +59504,7 @@ Domain allowed access.
40983 </param>
40984 <infoflow type="read" weight="10"/>
40985 </interface>
40986 -<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="79545">
40987 +<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="79668">
40988 <summary>
40989 Do not audit attempts to receive soundd_client packets.
40990 </summary>
40991 @@ -59698,7 +59515,7 @@ Domain allowed access.
40992 </param>
40993 <infoflow type="none"/>
40994 </interface>
40995 -<interface name="corenet_sendrecv_soundd_client_packets" lineno="79564">
40996 +<interface name="corenet_sendrecv_soundd_client_packets" lineno="79687">
40997 <summary>
40998 Send and receive soundd_client packets.
40999 </summary>
41000 @@ -59709,7 +59526,7 @@ Domain allowed access.
41001 </param>
41002 <infoflow type="both" weight="10"/>
41003 </interface>
41004 -<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="79580">
41005 +<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="79703">
41006 <summary>
41007 Do not audit attempts to send and receive soundd_client packets.
41008 </summary>
41009 @@ -59720,7 +59537,7 @@ Domain to not audit.
41010 </param>
41011 <infoflow type="none"/>
41012 </interface>
41013 -<interface name="corenet_relabelto_soundd_client_packets" lineno="79595">
41014 +<interface name="corenet_relabelto_soundd_client_packets" lineno="79718">
41015 <summary>
41016 Relabel packets to soundd_client the packet type.
41017 </summary>
41018 @@ -59730,7 +59547,7 @@ Domain allowed access.
41019 </summary>
41020 </param>
41021 </interface>
41022 -<interface name="corenet_send_soundd_server_packets" lineno="79615">
41023 +<interface name="corenet_send_soundd_server_packets" lineno="79738">
41024 <summary>
41025 Send soundd_server packets.
41026 </summary>
41027 @@ -59741,7 +59558,7 @@ Domain allowed access.
41028 </param>
41029 <infoflow type="write" weight="10"/>
41030 </interface>
41031 -<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="79634">
41032 +<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="79757">
41033 <summary>
41034 Do not audit attempts to send soundd_server packets.
41035 </summary>
41036 @@ -59752,7 +59569,7 @@ Domain to not audit.
41037 </param>
41038 <infoflow type="none"/>
41039 </interface>
41040 -<interface name="corenet_receive_soundd_server_packets" lineno="79653">
41041 +<interface name="corenet_receive_soundd_server_packets" lineno="79776">
41042 <summary>
41043 Receive soundd_server packets.
41044 </summary>
41045 @@ -59763,7 +59580,7 @@ Domain allowed access.
41046 </param>
41047 <infoflow type="read" weight="10"/>
41048 </interface>
41049 -<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="79672">
41050 +<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="79795">
41051 <summary>
41052 Do not audit attempts to receive soundd_server packets.
41053 </summary>
41054 @@ -59774,7 +59591,7 @@ Domain allowed access.
41055 </param>
41056 <infoflow type="none"/>
41057 </interface>
41058 -<interface name="corenet_sendrecv_soundd_server_packets" lineno="79691">
41059 +<interface name="corenet_sendrecv_soundd_server_packets" lineno="79814">
41060 <summary>
41061 Send and receive soundd_server packets.
41062 </summary>
41063 @@ -59785,7 +59602,7 @@ Domain allowed access.
41064 </param>
41065 <infoflow type="both" weight="10"/>
41066 </interface>
41067 -<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="79707">
41068 +<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="79830">
41069 <summary>
41070 Do not audit attempts to send and receive soundd_server packets.
41071 </summary>
41072 @@ -59796,7 +59613,7 @@ Domain to not audit.
41073 </param>
41074 <infoflow type="none"/>
41075 </interface>
41076 -<interface name="corenet_relabelto_soundd_server_packets" lineno="79722">
41077 +<interface name="corenet_relabelto_soundd_server_packets" lineno="79845">
41078 <summary>
41079 Relabel packets to soundd_server the packet type.
41080 </summary>
41081 @@ -59806,7 +59623,7 @@ Domain allowed access.
41082 </summary>
41083 </param>
41084 </interface>
41085 -<interface name="corenet_tcp_sendrecv_spamd_port" lineno="79744">
41086 +<interface name="corenet_tcp_sendrecv_spamd_port" lineno="79867">
41087 <summary>
41088 Send and receive TCP traffic on the spamd port.
41089 </summary>
41090 @@ -59817,7 +59634,7 @@ Domain allowed access.
41091 </param>
41092 <infoflow type="both" weight="10"/>
41093 </interface>
41094 -<interface name="corenet_udp_send_spamd_port" lineno="79759">
41095 +<interface name="corenet_udp_send_spamd_port" lineno="79882">
41096 <summary>
41097 Send UDP traffic on the spamd port.
41098 </summary>
41099 @@ -59828,7 +59645,7 @@ Domain allowed access.
41100 </param>
41101 <infoflow type="write" weight="10"/>
41102 </interface>
41103 -<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="79774">
41104 +<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="79897">
41105 <summary>
41106 Do not audit attempts to send UDP traffic on the spamd port.
41107 </summary>
41108 @@ -59839,7 +59656,7 @@ Domain to not audit.
41109 </param>
41110 <infoflow type="none"/>
41111 </interface>
41112 -<interface name="corenet_udp_receive_spamd_port" lineno="79789">
41113 +<interface name="corenet_udp_receive_spamd_port" lineno="79912">
41114 <summary>
41115 Receive UDP traffic on the spamd port.
41116 </summary>
41117 @@ -59850,7 +59667,7 @@ Domain allowed access.
41118 </param>
41119 <infoflow type="read" weight="10"/>
41120 </interface>
41121 -<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="79804">
41122 +<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="79927">
41123 <summary>
41124 Do not audit attempts to receive UDP traffic on the spamd port.
41125 </summary>
41126 @@ -59861,7 +59678,7 @@ Domain to not audit.
41127 </param>
41128 <infoflow type="none"/>
41129 </interface>
41130 -<interface name="corenet_udp_sendrecv_spamd_port" lineno="79819">
41131 +<interface name="corenet_udp_sendrecv_spamd_port" lineno="79942">
41132 <summary>
41133 Send and receive UDP traffic on the spamd port.
41134 </summary>
41135 @@ -59872,7 +59689,7 @@ Domain allowed access.
41136 </param>
41137 <infoflow type="both" weight="10"/>
41138 </interface>
41139 -<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="79835">
41140 +<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="79958">
41141 <summary>
41142 Do not audit attempts to send and receive
41143 UDP traffic on the spamd port.
41144 @@ -59884,7 +59701,7 @@ Domain to not audit.
41145 </param>
41146 <infoflow type="none"/>
41147 </interface>
41148 -<interface name="corenet_tcp_bind_spamd_port" lineno="79850">
41149 +<interface name="corenet_tcp_bind_spamd_port" lineno="79973">
41150 <summary>
41151 Bind TCP sockets to the spamd port.
41152 </summary>
41153 @@ -59895,7 +59712,7 @@ Domain allowed access.
41154 </param>
41155 <infoflow type="none"/>
41156 </interface>
41157 -<interface name="corenet_udp_bind_spamd_port" lineno="79870">
41158 +<interface name="corenet_udp_bind_spamd_port" lineno="79993">
41159 <summary>
41160 Bind UDP sockets to the spamd port.
41161 </summary>
41162 @@ -59906,7 +59723,7 @@ Domain allowed access.
41163 </param>
41164 <infoflow type="none"/>
41165 </interface>
41166 -<interface name="corenet_tcp_connect_spamd_port" lineno="79889">
41167 +<interface name="corenet_tcp_connect_spamd_port" lineno="80012">
41168 <summary>
41169 Make a TCP connection to the spamd port.
41170 </summary>
41171 @@ -59916,7 +59733,7 @@ Domain allowed access.
41172 </summary>
41173 </param>
41174 </interface>
41175 -<interface name="corenet_send_spamd_client_packets" lineno="79909">
41176 +<interface name="corenet_send_spamd_client_packets" lineno="80032">
41177 <summary>
41178 Send spamd_client packets.
41179 </summary>
41180 @@ -59927,7 +59744,7 @@ Domain allowed access.
41181 </param>
41182 <infoflow type="write" weight="10"/>
41183 </interface>
41184 -<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="79928">
41185 +<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="80051">
41186 <summary>
41187 Do not audit attempts to send spamd_client packets.
41188 </summary>
41189 @@ -59938,7 +59755,7 @@ Domain to not audit.
41190 </param>
41191 <infoflow type="none"/>
41192 </interface>
41193 -<interface name="corenet_receive_spamd_client_packets" lineno="79947">
41194 +<interface name="corenet_receive_spamd_client_packets" lineno="80070">
41195 <summary>
41196 Receive spamd_client packets.
41197 </summary>
41198 @@ -59949,7 +59766,7 @@ Domain allowed access.
41199 </param>
41200 <infoflow type="read" weight="10"/>
41201 </interface>
41202 -<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="79966">
41203 +<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="80089">
41204 <summary>
41205 Do not audit attempts to receive spamd_client packets.
41206 </summary>
41207 @@ -59960,7 +59777,7 @@ Domain allowed access.
41208 </param>
41209 <infoflow type="none"/>
41210 </interface>
41211 -<interface name="corenet_sendrecv_spamd_client_packets" lineno="79985">
41212 +<interface name="corenet_sendrecv_spamd_client_packets" lineno="80108">
41213 <summary>
41214 Send and receive spamd_client packets.
41215 </summary>
41216 @@ -59971,7 +59788,7 @@ Domain allowed access.
41217 </param>
41218 <infoflow type="both" weight="10"/>
41219 </interface>
41220 -<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="80001">
41221 +<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="80124">
41222 <summary>
41223 Do not audit attempts to send and receive spamd_client packets.
41224 </summary>
41225 @@ -59982,7 +59799,7 @@ Domain to not audit.
41226 </param>
41227 <infoflow type="none"/>
41228 </interface>
41229 -<interface name="corenet_relabelto_spamd_client_packets" lineno="80016">
41230 +<interface name="corenet_relabelto_spamd_client_packets" lineno="80139">
41231 <summary>
41232 Relabel packets to spamd_client the packet type.
41233 </summary>
41234 @@ -59992,7 +59809,7 @@ Domain allowed access.
41235 </summary>
41236 </param>
41237 </interface>
41238 -<interface name="corenet_send_spamd_server_packets" lineno="80036">
41239 +<interface name="corenet_send_spamd_server_packets" lineno="80159">
41240 <summary>
41241 Send spamd_server packets.
41242 </summary>
41243 @@ -60003,7 +59820,7 @@ Domain allowed access.
41244 </param>
41245 <infoflow type="write" weight="10"/>
41246 </interface>
41247 -<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="80055">
41248 +<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="80178">
41249 <summary>
41250 Do not audit attempts to send spamd_server packets.
41251 </summary>
41252 @@ -60014,7 +59831,7 @@ Domain to not audit.
41253 </param>
41254 <infoflow type="none"/>
41255 </interface>
41256 -<interface name="corenet_receive_spamd_server_packets" lineno="80074">
41257 +<interface name="corenet_receive_spamd_server_packets" lineno="80197">
41258 <summary>
41259 Receive spamd_server packets.
41260 </summary>
41261 @@ -60025,7 +59842,7 @@ Domain allowed access.
41262 </param>
41263 <infoflow type="read" weight="10"/>
41264 </interface>
41265 -<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="80093">
41266 +<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="80216">
41267 <summary>
41268 Do not audit attempts to receive spamd_server packets.
41269 </summary>
41270 @@ -60036,7 +59853,7 @@ Domain allowed access.
41271 </param>
41272 <infoflow type="none"/>
41273 </interface>
41274 -<interface name="corenet_sendrecv_spamd_server_packets" lineno="80112">
41275 +<interface name="corenet_sendrecv_spamd_server_packets" lineno="80235">
41276 <summary>
41277 Send and receive spamd_server packets.
41278 </summary>
41279 @@ -60047,7 +59864,7 @@ Domain allowed access.
41280 </param>
41281 <infoflow type="both" weight="10"/>
41282 </interface>
41283 -<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="80128">
41284 +<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="80251">
41285 <summary>
41286 Do not audit attempts to send and receive spamd_server packets.
41287 </summary>
41288 @@ -60058,7 +59875,7 @@ Domain to not audit.
41289 </param>
41290 <infoflow type="none"/>
41291 </interface>
41292 -<interface name="corenet_relabelto_spamd_server_packets" lineno="80143">
41293 +<interface name="corenet_relabelto_spamd_server_packets" lineno="80266">
41294 <summary>
41295 Relabel packets to spamd_server the packet type.
41296 </summary>
41297 @@ -60068,7 +59885,7 @@ Domain allowed access.
41298 </summary>
41299 </param>
41300 </interface>
41301 -<interface name="corenet_tcp_sendrecv_speech_port" lineno="80165">
41302 +<interface name="corenet_tcp_sendrecv_speech_port" lineno="80288">
41303 <summary>
41304 Send and receive TCP traffic on the speech port.
41305 </summary>
41306 @@ -60079,7 +59896,7 @@ Domain allowed access.
41307 </param>
41308 <infoflow type="both" weight="10"/>
41309 </interface>
41310 -<interface name="corenet_udp_send_speech_port" lineno="80180">
41311 +<interface name="corenet_udp_send_speech_port" lineno="80303">
41312 <summary>
41313 Send UDP traffic on the speech port.
41314 </summary>
41315 @@ -60090,7 +59907,7 @@ Domain allowed access.
41316 </param>
41317 <infoflow type="write" weight="10"/>
41318 </interface>
41319 -<interface name="corenet_dontaudit_udp_send_speech_port" lineno="80195">
41320 +<interface name="corenet_dontaudit_udp_send_speech_port" lineno="80318">
41321 <summary>
41322 Do not audit attempts to send UDP traffic on the speech port.
41323 </summary>
41324 @@ -60101,7 +59918,7 @@ Domain to not audit.
41325 </param>
41326 <infoflow type="none"/>
41327 </interface>
41328 -<interface name="corenet_udp_receive_speech_port" lineno="80210">
41329 +<interface name="corenet_udp_receive_speech_port" lineno="80333">
41330 <summary>
41331 Receive UDP traffic on the speech port.
41332 </summary>
41333 @@ -60112,7 +59929,7 @@ Domain allowed access.
41334 </param>
41335 <infoflow type="read" weight="10"/>
41336 </interface>
41337 -<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="80225">
41338 +<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="80348">
41339 <summary>
41340 Do not audit attempts to receive UDP traffic on the speech port.
41341 </summary>
41342 @@ -60123,7 +59940,7 @@ Domain to not audit.
41343 </param>
41344 <infoflow type="none"/>
41345 </interface>
41346 -<interface name="corenet_udp_sendrecv_speech_port" lineno="80240">
41347 +<interface name="corenet_udp_sendrecv_speech_port" lineno="80363">
41348 <summary>
41349 Send and receive UDP traffic on the speech port.
41350 </summary>
41351 @@ -60134,7 +59951,7 @@ Domain allowed access.
41352 </param>
41353 <infoflow type="both" weight="10"/>
41354 </interface>
41355 -<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="80256">
41356 +<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="80379">
41357 <summary>
41358 Do not audit attempts to send and receive
41359 UDP traffic on the speech port.
41360 @@ -60146,7 +59963,7 @@ Domain to not audit.
41361 </param>
41362 <infoflow type="none"/>
41363 </interface>
41364 -<interface name="corenet_tcp_bind_speech_port" lineno="80271">
41365 +<interface name="corenet_tcp_bind_speech_port" lineno="80394">
41366 <summary>
41367 Bind TCP sockets to the speech port.
41368 </summary>
41369 @@ -60157,7 +59974,7 @@ Domain allowed access.
41370 </param>
41371 <infoflow type="none"/>
41372 </interface>
41373 -<interface name="corenet_udp_bind_speech_port" lineno="80291">
41374 +<interface name="corenet_udp_bind_speech_port" lineno="80414">
41375 <summary>
41376 Bind UDP sockets to the speech port.
41377 </summary>
41378 @@ -60168,7 +59985,7 @@ Domain allowed access.
41379 </param>
41380 <infoflow type="none"/>
41381 </interface>
41382 -<interface name="corenet_tcp_connect_speech_port" lineno="80310">
41383 +<interface name="corenet_tcp_connect_speech_port" lineno="80433">
41384 <summary>
41385 Make a TCP connection to the speech port.
41386 </summary>
41387 @@ -60178,7 +59995,7 @@ Domain allowed access.
41388 </summary>
41389 </param>
41390 </interface>
41391 -<interface name="corenet_send_speech_client_packets" lineno="80330">
41392 +<interface name="corenet_send_speech_client_packets" lineno="80453">
41393 <summary>
41394 Send speech_client packets.
41395 </summary>
41396 @@ -60189,7 +60006,7 @@ Domain allowed access.
41397 </param>
41398 <infoflow type="write" weight="10"/>
41399 </interface>
41400 -<interface name="corenet_dontaudit_send_speech_client_packets" lineno="80349">
41401 +<interface name="corenet_dontaudit_send_speech_client_packets" lineno="80472">
41402 <summary>
41403 Do not audit attempts to send speech_client packets.
41404 </summary>
41405 @@ -60200,7 +60017,7 @@ Domain to not audit.
41406 </param>
41407 <infoflow type="none"/>
41408 </interface>
41409 -<interface name="corenet_receive_speech_client_packets" lineno="80368">
41410 +<interface name="corenet_receive_speech_client_packets" lineno="80491">
41411 <summary>
41412 Receive speech_client packets.
41413 </summary>
41414 @@ -60211,7 +60028,7 @@ Domain allowed access.
41415 </param>
41416 <infoflow type="read" weight="10"/>
41417 </interface>
41418 -<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="80387">
41419 +<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="80510">
41420 <summary>
41421 Do not audit attempts to receive speech_client packets.
41422 </summary>
41423 @@ -60222,7 +60039,7 @@ Domain allowed access.
41424 </param>
41425 <infoflow type="none"/>
41426 </interface>
41427 -<interface name="corenet_sendrecv_speech_client_packets" lineno="80406">
41428 +<interface name="corenet_sendrecv_speech_client_packets" lineno="80529">
41429 <summary>
41430 Send and receive speech_client packets.
41431 </summary>
41432 @@ -60233,7 +60050,7 @@ Domain allowed access.
41433 </param>
41434 <infoflow type="both" weight="10"/>
41435 </interface>
41436 -<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="80422">
41437 +<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="80545">
41438 <summary>
41439 Do not audit attempts to send and receive speech_client packets.
41440 </summary>
41441 @@ -60244,7 +60061,7 @@ Domain to not audit.
41442 </param>
41443 <infoflow type="none"/>
41444 </interface>
41445 -<interface name="corenet_relabelto_speech_client_packets" lineno="80437">
41446 +<interface name="corenet_relabelto_speech_client_packets" lineno="80560">
41447 <summary>
41448 Relabel packets to speech_client the packet type.
41449 </summary>
41450 @@ -60254,7 +60071,7 @@ Domain allowed access.
41451 </summary>
41452 </param>
41453 </interface>
41454 -<interface name="corenet_send_speech_server_packets" lineno="80457">
41455 +<interface name="corenet_send_speech_server_packets" lineno="80580">
41456 <summary>
41457 Send speech_server packets.
41458 </summary>
41459 @@ -60265,7 +60082,7 @@ Domain allowed access.
41460 </param>
41461 <infoflow type="write" weight="10"/>
41462 </interface>
41463 -<interface name="corenet_dontaudit_send_speech_server_packets" lineno="80476">
41464 +<interface name="corenet_dontaudit_send_speech_server_packets" lineno="80599">
41465 <summary>
41466 Do not audit attempts to send speech_server packets.
41467 </summary>
41468 @@ -60276,7 +60093,7 @@ Domain to not audit.
41469 </param>
41470 <infoflow type="none"/>
41471 </interface>
41472 -<interface name="corenet_receive_speech_server_packets" lineno="80495">
41473 +<interface name="corenet_receive_speech_server_packets" lineno="80618">
41474 <summary>
41475 Receive speech_server packets.
41476 </summary>
41477 @@ -60287,7 +60104,7 @@ Domain allowed access.
41478 </param>
41479 <infoflow type="read" weight="10"/>
41480 </interface>
41481 -<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="80514">
41482 +<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="80637">
41483 <summary>
41484 Do not audit attempts to receive speech_server packets.
41485 </summary>
41486 @@ -60298,7 +60115,7 @@ Domain allowed access.
41487 </param>
41488 <infoflow type="none"/>
41489 </interface>
41490 -<interface name="corenet_sendrecv_speech_server_packets" lineno="80533">
41491 +<interface name="corenet_sendrecv_speech_server_packets" lineno="80656">
41492 <summary>
41493 Send and receive speech_server packets.
41494 </summary>
41495 @@ -60309,7 +60126,7 @@ Domain allowed access.
41496 </param>
41497 <infoflow type="both" weight="10"/>
41498 </interface>
41499 -<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="80549">
41500 +<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="80672">
41501 <summary>
41502 Do not audit attempts to send and receive speech_server packets.
41503 </summary>
41504 @@ -60320,7 +60137,7 @@ Domain to not audit.
41505 </param>
41506 <infoflow type="none"/>
41507 </interface>
41508 -<interface name="corenet_relabelto_speech_server_packets" lineno="80564">
41509 +<interface name="corenet_relabelto_speech_server_packets" lineno="80687">
41510 <summary>
41511 Relabel packets to speech_server the packet type.
41512 </summary>
41513 @@ -60330,7 +60147,7 @@ Domain allowed access.
41514 </summary>
41515 </param>
41516 </interface>
41517 -<interface name="corenet_tcp_sendrecv_squid_port" lineno="80586">
41518 +<interface name="corenet_tcp_sendrecv_squid_port" lineno="80709">
41519 <summary>
41520 Send and receive TCP traffic on the squid port.
41521 </summary>
41522 @@ -60341,7 +60158,7 @@ Domain allowed access.
41523 </param>
41524 <infoflow type="both" weight="10"/>
41525 </interface>
41526 -<interface name="corenet_udp_send_squid_port" lineno="80601">
41527 +<interface name="corenet_udp_send_squid_port" lineno="80724">
41528 <summary>
41529 Send UDP traffic on the squid port.
41530 </summary>
41531 @@ -60352,7 +60169,7 @@ Domain allowed access.
41532 </param>
41533 <infoflow type="write" weight="10"/>
41534 </interface>
41535 -<interface name="corenet_dontaudit_udp_send_squid_port" lineno="80616">
41536 +<interface name="corenet_dontaudit_udp_send_squid_port" lineno="80739">
41537 <summary>
41538 Do not audit attempts to send UDP traffic on the squid port.
41539 </summary>
41540 @@ -60363,7 +60180,7 @@ Domain to not audit.
41541 </param>
41542 <infoflow type="none"/>
41543 </interface>
41544 -<interface name="corenet_udp_receive_squid_port" lineno="80631">
41545 +<interface name="corenet_udp_receive_squid_port" lineno="80754">
41546 <summary>
41547 Receive UDP traffic on the squid port.
41548 </summary>
41549 @@ -60374,7 +60191,7 @@ Domain allowed access.
41550 </param>
41551 <infoflow type="read" weight="10"/>
41552 </interface>
41553 -<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="80646">
41554 +<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="80769">
41555 <summary>
41556 Do not audit attempts to receive UDP traffic on the squid port.
41557 </summary>
41558 @@ -60385,7 +60202,7 @@ Domain to not audit.
41559 </param>
41560 <infoflow type="none"/>
41561 </interface>
41562 -<interface name="corenet_udp_sendrecv_squid_port" lineno="80661">
41563 +<interface name="corenet_udp_sendrecv_squid_port" lineno="80784">
41564 <summary>
41565 Send and receive UDP traffic on the squid port.
41566 </summary>
41567 @@ -60396,7 +60213,7 @@ Domain allowed access.
41568 </param>
41569 <infoflow type="both" weight="10"/>
41570 </interface>
41571 -<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="80677">
41572 +<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="80800">
41573 <summary>
41574 Do not audit attempts to send and receive
41575 UDP traffic on the squid port.
41576 @@ -60408,7 +60225,7 @@ Domain to not audit.
41577 </param>
41578 <infoflow type="none"/>
41579 </interface>
41580 -<interface name="corenet_tcp_bind_squid_port" lineno="80692">
41581 +<interface name="corenet_tcp_bind_squid_port" lineno="80815">
41582 <summary>
41583 Bind TCP sockets to the squid port.
41584 </summary>
41585 @@ -60419,7 +60236,7 @@ Domain allowed access.
41586 </param>
41587 <infoflow type="none"/>
41588 </interface>
41589 -<interface name="corenet_udp_bind_squid_port" lineno="80712">
41590 +<interface name="corenet_udp_bind_squid_port" lineno="80835">
41591 <summary>
41592 Bind UDP sockets to the squid port.
41593 </summary>
41594 @@ -60430,7 +60247,7 @@ Domain allowed access.
41595 </param>
41596 <infoflow type="none"/>
41597 </interface>
41598 -<interface name="corenet_tcp_connect_squid_port" lineno="80731">
41599 +<interface name="corenet_tcp_connect_squid_port" lineno="80854">
41600 <summary>
41601 Make a TCP connection to the squid port.
41602 </summary>
41603 @@ -60440,7 +60257,7 @@ Domain allowed access.
41604 </summary>
41605 </param>
41606 </interface>
41607 -<interface name="corenet_send_squid_client_packets" lineno="80751">
41608 +<interface name="corenet_send_squid_client_packets" lineno="80874">
41609 <summary>
41610 Send squid_client packets.
41611 </summary>
41612 @@ -60451,7 +60268,7 @@ Domain allowed access.
41613 </param>
41614 <infoflow type="write" weight="10"/>
41615 </interface>
41616 -<interface name="corenet_dontaudit_send_squid_client_packets" lineno="80770">
41617 +<interface name="corenet_dontaudit_send_squid_client_packets" lineno="80893">
41618 <summary>
41619 Do not audit attempts to send squid_client packets.
41620 </summary>
41621 @@ -60462,7 +60279,7 @@ Domain to not audit.
41622 </param>
41623 <infoflow type="none"/>
41624 </interface>
41625 -<interface name="corenet_receive_squid_client_packets" lineno="80789">
41626 +<interface name="corenet_receive_squid_client_packets" lineno="80912">
41627 <summary>
41628 Receive squid_client packets.
41629 </summary>
41630 @@ -60473,7 +60290,7 @@ Domain allowed access.
41631 </param>
41632 <infoflow type="read" weight="10"/>
41633 </interface>
41634 -<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="80808">
41635 +<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="80931">
41636 <summary>
41637 Do not audit attempts to receive squid_client packets.
41638 </summary>
41639 @@ -60484,7 +60301,7 @@ Domain allowed access.
41640 </param>
41641 <infoflow type="none"/>
41642 </interface>
41643 -<interface name="corenet_sendrecv_squid_client_packets" lineno="80827">
41644 +<interface name="corenet_sendrecv_squid_client_packets" lineno="80950">
41645 <summary>
41646 Send and receive squid_client packets.
41647 </summary>
41648 @@ -60495,7 +60312,7 @@ Domain allowed access.
41649 </param>
41650 <infoflow type="both" weight="10"/>
41651 </interface>
41652 -<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="80843">
41653 +<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="80966">
41654 <summary>
41655 Do not audit attempts to send and receive squid_client packets.
41656 </summary>
41657 @@ -60506,7 +60323,7 @@ Domain to not audit.
41658 </param>
41659 <infoflow type="none"/>
41660 </interface>
41661 -<interface name="corenet_relabelto_squid_client_packets" lineno="80858">
41662 +<interface name="corenet_relabelto_squid_client_packets" lineno="80981">
41663 <summary>
41664 Relabel packets to squid_client the packet type.
41665 </summary>
41666 @@ -60516,7 +60333,7 @@ Domain allowed access.
41667 </summary>
41668 </param>
41669 </interface>
41670 -<interface name="corenet_send_squid_server_packets" lineno="80878">
41671 +<interface name="corenet_send_squid_server_packets" lineno="81001">
41672 <summary>
41673 Send squid_server packets.
41674 </summary>
41675 @@ -60527,7 +60344,7 @@ Domain allowed access.
41676 </param>
41677 <infoflow type="write" weight="10"/>
41678 </interface>
41679 -<interface name="corenet_dontaudit_send_squid_server_packets" lineno="80897">
41680 +<interface name="corenet_dontaudit_send_squid_server_packets" lineno="81020">
41681 <summary>
41682 Do not audit attempts to send squid_server packets.
41683 </summary>
41684 @@ -60538,7 +60355,7 @@ Domain to not audit.
41685 </param>
41686 <infoflow type="none"/>
41687 </interface>
41688 -<interface name="corenet_receive_squid_server_packets" lineno="80916">
41689 +<interface name="corenet_receive_squid_server_packets" lineno="81039">
41690 <summary>
41691 Receive squid_server packets.
41692 </summary>
41693 @@ -60549,7 +60366,7 @@ Domain allowed access.
41694 </param>
41695 <infoflow type="read" weight="10"/>
41696 </interface>
41697 -<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="80935">
41698 +<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="81058">
41699 <summary>
41700 Do not audit attempts to receive squid_server packets.
41701 </summary>
41702 @@ -60560,7 +60377,7 @@ Domain allowed access.
41703 </param>
41704 <infoflow type="none"/>
41705 </interface>
41706 -<interface name="corenet_sendrecv_squid_server_packets" lineno="80954">
41707 +<interface name="corenet_sendrecv_squid_server_packets" lineno="81077">
41708 <summary>
41709 Send and receive squid_server packets.
41710 </summary>
41711 @@ -60571,7 +60388,7 @@ Domain allowed access.
41712 </param>
41713 <infoflow type="both" weight="10"/>
41714 </interface>
41715 -<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="80970">
41716 +<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="81093">
41717 <summary>
41718 Do not audit attempts to send and receive squid_server packets.
41719 </summary>
41720 @@ -60582,7 +60399,7 @@ Domain to not audit.
41721 </param>
41722 <infoflow type="none"/>
41723 </interface>
41724 -<interface name="corenet_relabelto_squid_server_packets" lineno="80985">
41725 +<interface name="corenet_relabelto_squid_server_packets" lineno="81108">
41726 <summary>
41727 Relabel packets to squid_server the packet type.
41728 </summary>
41729 @@ -60592,7 +60409,7 @@ Domain allowed access.
41730 </summary>
41731 </param>
41732 </interface>
41733 -<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="81007">
41734 +<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="81130">
41735 <summary>
41736 Send and receive TCP traffic on the ssdp port.
41737 </summary>
41738 @@ -60603,7 +60420,7 @@ Domain allowed access.
41739 </param>
41740 <infoflow type="both" weight="10"/>
41741 </interface>
41742 -<interface name="corenet_udp_send_ssdp_port" lineno="81022">
41743 +<interface name="corenet_udp_send_ssdp_port" lineno="81145">
41744 <summary>
41745 Send UDP traffic on the ssdp port.
41746 </summary>
41747 @@ -60614,7 +60431,7 @@ Domain allowed access.
41748 </param>
41749 <infoflow type="write" weight="10"/>
41750 </interface>
41751 -<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="81037">
41752 +<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="81160">
41753 <summary>
41754 Do not audit attempts to send UDP traffic on the ssdp port.
41755 </summary>
41756 @@ -60625,7 +60442,7 @@ Domain to not audit.
41757 </param>
41758 <infoflow type="none"/>
41759 </interface>
41760 -<interface name="corenet_udp_receive_ssdp_port" lineno="81052">
41761 +<interface name="corenet_udp_receive_ssdp_port" lineno="81175">
41762 <summary>
41763 Receive UDP traffic on the ssdp port.
41764 </summary>
41765 @@ -60636,7 +60453,7 @@ Domain allowed access.
41766 </param>
41767 <infoflow type="read" weight="10"/>
41768 </interface>
41769 -<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="81067">
41770 +<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="81190">
41771 <summary>
41772 Do not audit attempts to receive UDP traffic on the ssdp port.
41773 </summary>
41774 @@ -60647,7 +60464,7 @@ Domain to not audit.
41775 </param>
41776 <infoflow type="none"/>
41777 </interface>
41778 -<interface name="corenet_udp_sendrecv_ssdp_port" lineno="81082">
41779 +<interface name="corenet_udp_sendrecv_ssdp_port" lineno="81205">
41780 <summary>
41781 Send and receive UDP traffic on the ssdp port.
41782 </summary>
41783 @@ -60658,7 +60475,7 @@ Domain allowed access.
41784 </param>
41785 <infoflow type="both" weight="10"/>
41786 </interface>
41787 -<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="81098">
41788 +<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="81221">
41789 <summary>
41790 Do not audit attempts to send and receive
41791 UDP traffic on the ssdp port.
41792 @@ -60670,7 +60487,7 @@ Domain to not audit.
41793 </param>
41794 <infoflow type="none"/>
41795 </interface>
41796 -<interface name="corenet_tcp_bind_ssdp_port" lineno="81113">
41797 +<interface name="corenet_tcp_bind_ssdp_port" lineno="81236">
41798 <summary>
41799 Bind TCP sockets to the ssdp port.
41800 </summary>
41801 @@ -60681,7 +60498,7 @@ Domain allowed access.
41802 </param>
41803 <infoflow type="none"/>
41804 </interface>
41805 -<interface name="corenet_udp_bind_ssdp_port" lineno="81133">
41806 +<interface name="corenet_udp_bind_ssdp_port" lineno="81256">
41807 <summary>
41808 Bind UDP sockets to the ssdp port.
41809 </summary>
41810 @@ -60692,7 +60509,7 @@ Domain allowed access.
41811 </param>
41812 <infoflow type="none"/>
41813 </interface>
41814 -<interface name="corenet_tcp_connect_ssdp_port" lineno="81152">
41815 +<interface name="corenet_tcp_connect_ssdp_port" lineno="81275">
41816 <summary>
41817 Make a TCP connection to the ssdp port.
41818 </summary>
41819 @@ -60702,7 +60519,7 @@ Domain allowed access.
41820 </summary>
41821 </param>
41822 </interface>
41823 -<interface name="corenet_send_ssdp_client_packets" lineno="81172">
41824 +<interface name="corenet_send_ssdp_client_packets" lineno="81295">
41825 <summary>
41826 Send ssdp_client packets.
41827 </summary>
41828 @@ -60713,7 +60530,7 @@ Domain allowed access.
41829 </param>
41830 <infoflow type="write" weight="10"/>
41831 </interface>
41832 -<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="81191">
41833 +<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="81314">
41834 <summary>
41835 Do not audit attempts to send ssdp_client packets.
41836 </summary>
41837 @@ -60724,7 +60541,7 @@ Domain to not audit.
41838 </param>
41839 <infoflow type="none"/>
41840 </interface>
41841 -<interface name="corenet_receive_ssdp_client_packets" lineno="81210">
41842 +<interface name="corenet_receive_ssdp_client_packets" lineno="81333">
41843 <summary>
41844 Receive ssdp_client packets.
41845 </summary>
41846 @@ -60735,7 +60552,7 @@ Domain allowed access.
41847 </param>
41848 <infoflow type="read" weight="10"/>
41849 </interface>
41850 -<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="81229">
41851 +<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="81352">
41852 <summary>
41853 Do not audit attempts to receive ssdp_client packets.
41854 </summary>
41855 @@ -60746,7 +60563,7 @@ Domain allowed access.
41856 </param>
41857 <infoflow type="none"/>
41858 </interface>
41859 -<interface name="corenet_sendrecv_ssdp_client_packets" lineno="81248">
41860 +<interface name="corenet_sendrecv_ssdp_client_packets" lineno="81371">
41861 <summary>
41862 Send and receive ssdp_client packets.
41863 </summary>
41864 @@ -60757,7 +60574,7 @@ Domain allowed access.
41865 </param>
41866 <infoflow type="both" weight="10"/>
41867 </interface>
41868 -<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="81264">
41869 +<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="81387">
41870 <summary>
41871 Do not audit attempts to send and receive ssdp_client packets.
41872 </summary>
41873 @@ -60768,7 +60585,7 @@ Domain to not audit.
41874 </param>
41875 <infoflow type="none"/>
41876 </interface>
41877 -<interface name="corenet_relabelto_ssdp_client_packets" lineno="81279">
41878 +<interface name="corenet_relabelto_ssdp_client_packets" lineno="81402">
41879 <summary>
41880 Relabel packets to ssdp_client the packet type.
41881 </summary>
41882 @@ -60778,7 +60595,7 @@ Domain allowed access.
41883 </summary>
41884 </param>
41885 </interface>
41886 -<interface name="corenet_send_ssdp_server_packets" lineno="81299">
41887 +<interface name="corenet_send_ssdp_server_packets" lineno="81422">
41888 <summary>
41889 Send ssdp_server packets.
41890 </summary>
41891 @@ -60789,7 +60606,7 @@ Domain allowed access.
41892 </param>
41893 <infoflow type="write" weight="10"/>
41894 </interface>
41895 -<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="81318">
41896 +<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="81441">
41897 <summary>
41898 Do not audit attempts to send ssdp_server packets.
41899 </summary>
41900 @@ -60800,7 +60617,7 @@ Domain to not audit.
41901 </param>
41902 <infoflow type="none"/>
41903 </interface>
41904 -<interface name="corenet_receive_ssdp_server_packets" lineno="81337">
41905 +<interface name="corenet_receive_ssdp_server_packets" lineno="81460">
41906 <summary>
41907 Receive ssdp_server packets.
41908 </summary>
41909 @@ -60811,7 +60628,7 @@ Domain allowed access.
41910 </param>
41911 <infoflow type="read" weight="10"/>
41912 </interface>
41913 -<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="81356">
41914 +<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="81479">
41915 <summary>
41916 Do not audit attempts to receive ssdp_server packets.
41917 </summary>
41918 @@ -60822,7 +60639,7 @@ Domain allowed access.
41919 </param>
41920 <infoflow type="none"/>
41921 </interface>
41922 -<interface name="corenet_sendrecv_ssdp_server_packets" lineno="81375">
41923 +<interface name="corenet_sendrecv_ssdp_server_packets" lineno="81498">
41924 <summary>
41925 Send and receive ssdp_server packets.
41926 </summary>
41927 @@ -60833,7 +60650,7 @@ Domain allowed access.
41928 </param>
41929 <infoflow type="both" weight="10"/>
41930 </interface>
41931 -<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="81391">
41932 +<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="81514">
41933 <summary>
41934 Do not audit attempts to send and receive ssdp_server packets.
41935 </summary>
41936 @@ -60844,7 +60661,7 @@ Domain to not audit.
41937 </param>
41938 <infoflow type="none"/>
41939 </interface>
41940 -<interface name="corenet_relabelto_ssdp_server_packets" lineno="81406">
41941 +<interface name="corenet_relabelto_ssdp_server_packets" lineno="81529">
41942 <summary>
41943 Relabel packets to ssdp_server the packet type.
41944 </summary>
41945 @@ -60854,7 +60671,7 @@ Domain allowed access.
41946 </summary>
41947 </param>
41948 </interface>
41949 -<interface name="corenet_tcp_sendrecv_ssh_port" lineno="81428">
41950 +<interface name="corenet_tcp_sendrecv_ssh_port" lineno="81551">
41951 <summary>
41952 Send and receive TCP traffic on the ssh port.
41953 </summary>
41954 @@ -60865,7 +60682,7 @@ Domain allowed access.
41955 </param>
41956 <infoflow type="both" weight="10"/>
41957 </interface>
41958 -<interface name="corenet_udp_send_ssh_port" lineno="81443">
41959 +<interface name="corenet_udp_send_ssh_port" lineno="81566">
41960 <summary>
41961 Send UDP traffic on the ssh port.
41962 </summary>
41963 @@ -60876,7 +60693,7 @@ Domain allowed access.
41964 </param>
41965 <infoflow type="write" weight="10"/>
41966 </interface>
41967 -<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="81458">
41968 +<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="81581">
41969 <summary>
41970 Do not audit attempts to send UDP traffic on the ssh port.
41971 </summary>
41972 @@ -60887,7 +60704,7 @@ Domain to not audit.
41973 </param>
41974 <infoflow type="none"/>
41975 </interface>
41976 -<interface name="corenet_udp_receive_ssh_port" lineno="81473">
41977 +<interface name="corenet_udp_receive_ssh_port" lineno="81596">
41978 <summary>
41979 Receive UDP traffic on the ssh port.
41980 </summary>
41981 @@ -60898,7 +60715,7 @@ Domain allowed access.
41982 </param>
41983 <infoflow type="read" weight="10"/>
41984 </interface>
41985 -<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="81488">
41986 +<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="81611">
41987 <summary>
41988 Do not audit attempts to receive UDP traffic on the ssh port.
41989 </summary>
41990 @@ -60909,7 +60726,7 @@ Domain to not audit.
41991 </param>
41992 <infoflow type="none"/>
41993 </interface>
41994 -<interface name="corenet_udp_sendrecv_ssh_port" lineno="81503">
41995 +<interface name="corenet_udp_sendrecv_ssh_port" lineno="81626">
41996 <summary>
41997 Send and receive UDP traffic on the ssh port.
41998 </summary>
41999 @@ -60920,7 +60737,7 @@ Domain allowed access.
42000 </param>
42001 <infoflow type="both" weight="10"/>
42002 </interface>
42003 -<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="81519">
42004 +<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="81642">
42005 <summary>
42006 Do not audit attempts to send and receive
42007 UDP traffic on the ssh port.
42008 @@ -60932,7 +60749,7 @@ Domain to not audit.
42009 </param>
42010 <infoflow type="none"/>
42011 </interface>
42012 -<interface name="corenet_tcp_bind_ssh_port" lineno="81534">
42013 +<interface name="corenet_tcp_bind_ssh_port" lineno="81657">
42014 <summary>
42015 Bind TCP sockets to the ssh port.
42016 </summary>
42017 @@ -60943,7 +60760,7 @@ Domain allowed access.
42018 </param>
42019 <infoflow type="none"/>
42020 </interface>
42021 -<interface name="corenet_udp_bind_ssh_port" lineno="81554">
42022 +<interface name="corenet_udp_bind_ssh_port" lineno="81677">
42023 <summary>
42024 Bind UDP sockets to the ssh port.
42025 </summary>
42026 @@ -60954,7 +60771,7 @@ Domain allowed access.
42027 </param>
42028 <infoflow type="none"/>
42029 </interface>
42030 -<interface name="corenet_tcp_connect_ssh_port" lineno="81573">
42031 +<interface name="corenet_tcp_connect_ssh_port" lineno="81696">
42032 <summary>
42033 Make a TCP connection to the ssh port.
42034 </summary>
42035 @@ -60964,7 +60781,7 @@ Domain allowed access.
42036 </summary>
42037 </param>
42038 </interface>
42039 -<interface name="corenet_send_ssh_client_packets" lineno="81593">
42040 +<interface name="corenet_send_ssh_client_packets" lineno="81716">
42041 <summary>
42042 Send ssh_client packets.
42043 </summary>
42044 @@ -60975,7 +60792,7 @@ Domain allowed access.
42045 </param>
42046 <infoflow type="write" weight="10"/>
42047 </interface>
42048 -<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="81612">
42049 +<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="81735">
42050 <summary>
42051 Do not audit attempts to send ssh_client packets.
42052 </summary>
42053 @@ -60986,7 +60803,7 @@ Domain to not audit.
42054 </param>
42055 <infoflow type="none"/>
42056 </interface>
42057 -<interface name="corenet_receive_ssh_client_packets" lineno="81631">
42058 +<interface name="corenet_receive_ssh_client_packets" lineno="81754">
42059 <summary>
42060 Receive ssh_client packets.
42061 </summary>
42062 @@ -60997,7 +60814,7 @@ Domain allowed access.
42063 </param>
42064 <infoflow type="read" weight="10"/>
42065 </interface>
42066 -<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="81650">
42067 +<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="81773">
42068 <summary>
42069 Do not audit attempts to receive ssh_client packets.
42070 </summary>
42071 @@ -61008,7 +60825,7 @@ Domain allowed access.
42072 </param>
42073 <infoflow type="none"/>
42074 </interface>
42075 -<interface name="corenet_sendrecv_ssh_client_packets" lineno="81669">
42076 +<interface name="corenet_sendrecv_ssh_client_packets" lineno="81792">
42077 <summary>
42078 Send and receive ssh_client packets.
42079 </summary>
42080 @@ -61019,7 +60836,7 @@ Domain allowed access.
42081 </param>
42082 <infoflow type="both" weight="10"/>
42083 </interface>
42084 -<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="81685">
42085 +<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="81808">
42086 <summary>
42087 Do not audit attempts to send and receive ssh_client packets.
42088 </summary>
42089 @@ -61030,7 +60847,7 @@ Domain to not audit.
42090 </param>
42091 <infoflow type="none"/>
42092 </interface>
42093 -<interface name="corenet_relabelto_ssh_client_packets" lineno="81700">
42094 +<interface name="corenet_relabelto_ssh_client_packets" lineno="81823">
42095 <summary>
42096 Relabel packets to ssh_client the packet type.
42097 </summary>
42098 @@ -61040,7 +60857,7 @@ Domain allowed access.
42099 </summary>
42100 </param>
42101 </interface>
42102 -<interface name="corenet_send_ssh_server_packets" lineno="81720">
42103 +<interface name="corenet_send_ssh_server_packets" lineno="81843">
42104 <summary>
42105 Send ssh_server packets.
42106 </summary>
42107 @@ -61051,7 +60868,7 @@ Domain allowed access.
42108 </param>
42109 <infoflow type="write" weight="10"/>
42110 </interface>
42111 -<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="81739">
42112 +<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="81862">
42113 <summary>
42114 Do not audit attempts to send ssh_server packets.
42115 </summary>
42116 @@ -61062,7 +60879,7 @@ Domain to not audit.
42117 </param>
42118 <infoflow type="none"/>
42119 </interface>
42120 -<interface name="corenet_receive_ssh_server_packets" lineno="81758">
42121 +<interface name="corenet_receive_ssh_server_packets" lineno="81881">
42122 <summary>
42123 Receive ssh_server packets.
42124 </summary>
42125 @@ -61073,7 +60890,7 @@ Domain allowed access.
42126 </param>
42127 <infoflow type="read" weight="10"/>
42128 </interface>
42129 -<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="81777">
42130 +<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="81900">
42131 <summary>
42132 Do not audit attempts to receive ssh_server packets.
42133 </summary>
42134 @@ -61084,7 +60901,7 @@ Domain allowed access.
42135 </param>
42136 <infoflow type="none"/>
42137 </interface>
42138 -<interface name="corenet_sendrecv_ssh_server_packets" lineno="81796">
42139 +<interface name="corenet_sendrecv_ssh_server_packets" lineno="81919">
42140 <summary>
42141 Send and receive ssh_server packets.
42142 </summary>
42143 @@ -61095,7 +60912,7 @@ Domain allowed access.
42144 </param>
42145 <infoflow type="both" weight="10"/>
42146 </interface>
42147 -<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="81812">
42148 +<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="81935">
42149 <summary>
42150 Do not audit attempts to send and receive ssh_server packets.
42151 </summary>
42152 @@ -61106,7 +60923,7 @@ Domain to not audit.
42153 </param>
42154 <infoflow type="none"/>
42155 </interface>
42156 -<interface name="corenet_relabelto_ssh_server_packets" lineno="81827">
42157 +<interface name="corenet_relabelto_ssh_server_packets" lineno="81950">
42158 <summary>
42159 Relabel packets to ssh_server the packet type.
42160 </summary>
42161 @@ -61116,7 +60933,7 @@ Domain allowed access.
42162 </summary>
42163 </param>
42164 </interface>
42165 -<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="81849">
42166 +<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="81972">
42167 <summary>
42168 Send and receive TCP traffic on the stunnel port.
42169 </summary>
42170 @@ -61127,7 +60944,7 @@ Domain allowed access.
42171 </param>
42172 <infoflow type="both" weight="10"/>
42173 </interface>
42174 -<interface name="corenet_udp_send_stunnel_port" lineno="81864">
42175 +<interface name="corenet_udp_send_stunnel_port" lineno="81987">
42176 <summary>
42177 Send UDP traffic on the stunnel port.
42178 </summary>
42179 @@ -61138,7 +60955,7 @@ Domain allowed access.
42180 </param>
42181 <infoflow type="write" weight="10"/>
42182 </interface>
42183 -<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="81879">
42184 +<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="82002">
42185 <summary>
42186 Do not audit attempts to send UDP traffic on the stunnel port.
42187 </summary>
42188 @@ -61149,7 +60966,7 @@ Domain to not audit.
42189 </param>
42190 <infoflow type="none"/>
42191 </interface>
42192 -<interface name="corenet_udp_receive_stunnel_port" lineno="81894">
42193 +<interface name="corenet_udp_receive_stunnel_port" lineno="82017">
42194 <summary>
42195 Receive UDP traffic on the stunnel port.
42196 </summary>
42197 @@ -61160,7 +60977,7 @@ Domain allowed access.
42198 </param>
42199 <infoflow type="read" weight="10"/>
42200 </interface>
42201 -<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="81909">
42202 +<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="82032">
42203 <summary>
42204 Do not audit attempts to receive UDP traffic on the stunnel port.
42205 </summary>
42206 @@ -61171,7 +60988,7 @@ Domain to not audit.
42207 </param>
42208 <infoflow type="none"/>
42209 </interface>
42210 -<interface name="corenet_udp_sendrecv_stunnel_port" lineno="81924">
42211 +<interface name="corenet_udp_sendrecv_stunnel_port" lineno="82047">
42212 <summary>
42213 Send and receive UDP traffic on the stunnel port.
42214 </summary>
42215 @@ -61182,7 +60999,7 @@ Domain allowed access.
42216 </param>
42217 <infoflow type="both" weight="10"/>
42218 </interface>
42219 -<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="81940">
42220 +<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="82063">
42221 <summary>
42222 Do not audit attempts to send and receive
42223 UDP traffic on the stunnel port.
42224 @@ -61194,7 +61011,7 @@ Domain to not audit.
42225 </param>
42226 <infoflow type="none"/>
42227 </interface>
42228 -<interface name="corenet_tcp_bind_stunnel_port" lineno="81955">
42229 +<interface name="corenet_tcp_bind_stunnel_port" lineno="82078">
42230 <summary>
42231 Bind TCP sockets to the stunnel port.
42232 </summary>
42233 @@ -61205,7 +61022,7 @@ Domain allowed access.
42234 </param>
42235 <infoflow type="none"/>
42236 </interface>
42237 -<interface name="corenet_udp_bind_stunnel_port" lineno="81975">
42238 +<interface name="corenet_udp_bind_stunnel_port" lineno="82098">
42239 <summary>
42240 Bind UDP sockets to the stunnel port.
42241 </summary>
42242 @@ -61216,7 +61033,7 @@ Domain allowed access.
42243 </param>
42244 <infoflow type="none"/>
42245 </interface>
42246 -<interface name="corenet_tcp_connect_stunnel_port" lineno="81994">
42247 +<interface name="corenet_tcp_connect_stunnel_port" lineno="82117">
42248 <summary>
42249 Make a TCP connection to the stunnel port.
42250 </summary>
42251 @@ -61226,7 +61043,7 @@ Domain allowed access.
42252 </summary>
42253 </param>
42254 </interface>
42255 -<interface name="corenet_send_stunnel_client_packets" lineno="82014">
42256 +<interface name="corenet_send_stunnel_client_packets" lineno="82137">
42257 <summary>
42258 Send stunnel_client packets.
42259 </summary>
42260 @@ -61237,7 +61054,7 @@ Domain allowed access.
42261 </param>
42262 <infoflow type="write" weight="10"/>
42263 </interface>
42264 -<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="82033">
42265 +<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="82156">
42266 <summary>
42267 Do not audit attempts to send stunnel_client packets.
42268 </summary>
42269 @@ -61248,7 +61065,7 @@ Domain to not audit.
42270 </param>
42271 <infoflow type="none"/>
42272 </interface>
42273 -<interface name="corenet_receive_stunnel_client_packets" lineno="82052">
42274 +<interface name="corenet_receive_stunnel_client_packets" lineno="82175">
42275 <summary>
42276 Receive stunnel_client packets.
42277 </summary>
42278 @@ -61259,7 +61076,7 @@ Domain allowed access.
42279 </param>
42280 <infoflow type="read" weight="10"/>
42281 </interface>
42282 -<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="82071">
42283 +<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="82194">
42284 <summary>
42285 Do not audit attempts to receive stunnel_client packets.
42286 </summary>
42287 @@ -61270,7 +61087,7 @@ Domain allowed access.
42288 </param>
42289 <infoflow type="none"/>
42290 </interface>
42291 -<interface name="corenet_sendrecv_stunnel_client_packets" lineno="82090">
42292 +<interface name="corenet_sendrecv_stunnel_client_packets" lineno="82213">
42293 <summary>
42294 Send and receive stunnel_client packets.
42295 </summary>
42296 @@ -61281,7 +61098,7 @@ Domain allowed access.
42297 </param>
42298 <infoflow type="both" weight="10"/>
42299 </interface>
42300 -<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="82106">
42301 +<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="82229">
42302 <summary>
42303 Do not audit attempts to send and receive stunnel_client packets.
42304 </summary>
42305 @@ -61292,7 +61109,7 @@ Domain to not audit.
42306 </param>
42307 <infoflow type="none"/>
42308 </interface>
42309 -<interface name="corenet_relabelto_stunnel_client_packets" lineno="82121">
42310 +<interface name="corenet_relabelto_stunnel_client_packets" lineno="82244">
42311 <summary>
42312 Relabel packets to stunnel_client the packet type.
42313 </summary>
42314 @@ -61302,7 +61119,7 @@ Domain allowed access.
42315 </summary>
42316 </param>
42317 </interface>
42318 -<interface name="corenet_send_stunnel_server_packets" lineno="82141">
42319 +<interface name="corenet_send_stunnel_server_packets" lineno="82264">
42320 <summary>
42321 Send stunnel_server packets.
42322 </summary>
42323 @@ -61313,7 +61130,7 @@ Domain allowed access.
42324 </param>
42325 <infoflow type="write" weight="10"/>
42326 </interface>
42327 -<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="82160">
42328 +<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="82283">
42329 <summary>
42330 Do not audit attempts to send stunnel_server packets.
42331 </summary>
42332 @@ -61324,7 +61141,7 @@ Domain to not audit.
42333 </param>
42334 <infoflow type="none"/>
42335 </interface>
42336 -<interface name="corenet_receive_stunnel_server_packets" lineno="82179">
42337 +<interface name="corenet_receive_stunnel_server_packets" lineno="82302">
42338 <summary>
42339 Receive stunnel_server packets.
42340 </summary>
42341 @@ -61335,7 +61152,7 @@ Domain allowed access.
42342 </param>
42343 <infoflow type="read" weight="10"/>
42344 </interface>
42345 -<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="82198">
42346 +<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="82321">
42347 <summary>
42348 Do not audit attempts to receive stunnel_server packets.
42349 </summary>
42350 @@ -61346,7 +61163,7 @@ Domain allowed access.
42351 </param>
42352 <infoflow type="none"/>
42353 </interface>
42354 -<interface name="corenet_sendrecv_stunnel_server_packets" lineno="82217">
42355 +<interface name="corenet_sendrecv_stunnel_server_packets" lineno="82340">
42356 <summary>
42357 Send and receive stunnel_server packets.
42358 </summary>
42359 @@ -61357,7 +61174,7 @@ Domain allowed access.
42360 </param>
42361 <infoflow type="both" weight="10"/>
42362 </interface>
42363 -<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="82233">
42364 +<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="82356">
42365 <summary>
42366 Do not audit attempts to send and receive stunnel_server packets.
42367 </summary>
42368 @@ -61368,7 +61185,7 @@ Domain to not audit.
42369 </param>
42370 <infoflow type="none"/>
42371 </interface>
42372 -<interface name="corenet_relabelto_stunnel_server_packets" lineno="82248">
42373 +<interface name="corenet_relabelto_stunnel_server_packets" lineno="82371">
42374 <summary>
42375 Relabel packets to stunnel_server the packet type.
42376 </summary>
42377 @@ -61378,7 +61195,7 @@ Domain allowed access.
42378 </summary>
42379 </param>
42380 </interface>
42381 -<interface name="corenet_tcp_sendrecv_svn_port" lineno="82270">
42382 +<interface name="corenet_tcp_sendrecv_svn_port" lineno="82393">
42383 <summary>
42384 Send and receive TCP traffic on the svn port.
42385 </summary>
42386 @@ -61389,7 +61206,7 @@ Domain allowed access.
42387 </param>
42388 <infoflow type="both" weight="10"/>
42389 </interface>
42390 -<interface name="corenet_udp_send_svn_port" lineno="82285">
42391 +<interface name="corenet_udp_send_svn_port" lineno="82408">
42392 <summary>
42393 Send UDP traffic on the svn port.
42394 </summary>
42395 @@ -61400,7 +61217,7 @@ Domain allowed access.
42396 </param>
42397 <infoflow type="write" weight="10"/>
42398 </interface>
42399 -<interface name="corenet_dontaudit_udp_send_svn_port" lineno="82300">
42400 +<interface name="corenet_dontaudit_udp_send_svn_port" lineno="82423">
42401 <summary>
42402 Do not audit attempts to send UDP traffic on the svn port.
42403 </summary>
42404 @@ -61411,7 +61228,7 @@ Domain to not audit.
42405 </param>
42406 <infoflow type="none"/>
42407 </interface>
42408 -<interface name="corenet_udp_receive_svn_port" lineno="82315">
42409 +<interface name="corenet_udp_receive_svn_port" lineno="82438">
42410 <summary>
42411 Receive UDP traffic on the svn port.
42412 </summary>
42413 @@ -61422,7 +61239,7 @@ Domain allowed access.
42414 </param>
42415 <infoflow type="read" weight="10"/>
42416 </interface>
42417 -<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="82330">
42418 +<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="82453">
42419 <summary>
42420 Do not audit attempts to receive UDP traffic on the svn port.
42421 </summary>
42422 @@ -61433,7 +61250,7 @@ Domain to not audit.
42423 </param>
42424 <infoflow type="none"/>
42425 </interface>
42426 -<interface name="corenet_udp_sendrecv_svn_port" lineno="82345">
42427 +<interface name="corenet_udp_sendrecv_svn_port" lineno="82468">
42428 <summary>
42429 Send and receive UDP traffic on the svn port.
42430 </summary>
42431 @@ -61444,7 +61261,7 @@ Domain allowed access.
42432 </param>
42433 <infoflow type="both" weight="10"/>
42434 </interface>
42435 -<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="82361">
42436 +<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="82484">
42437 <summary>
42438 Do not audit attempts to send and receive
42439 UDP traffic on the svn port.
42440 @@ -61456,7 +61273,7 @@ Domain to not audit.
42441 </param>
42442 <infoflow type="none"/>
42443 </interface>
42444 -<interface name="corenet_tcp_bind_svn_port" lineno="82376">
42445 +<interface name="corenet_tcp_bind_svn_port" lineno="82499">
42446 <summary>
42447 Bind TCP sockets to the svn port.
42448 </summary>
42449 @@ -61467,7 +61284,7 @@ Domain allowed access.
42450 </param>
42451 <infoflow type="none"/>
42452 </interface>
42453 -<interface name="corenet_udp_bind_svn_port" lineno="82396">
42454 +<interface name="corenet_udp_bind_svn_port" lineno="82519">
42455 <summary>
42456 Bind UDP sockets to the svn port.
42457 </summary>
42458 @@ -61478,7 +61295,7 @@ Domain allowed access.
42459 </param>
42460 <infoflow type="none"/>
42461 </interface>
42462 -<interface name="corenet_tcp_connect_svn_port" lineno="82415">
42463 +<interface name="corenet_tcp_connect_svn_port" lineno="82538">
42464 <summary>
42465 Make a TCP connection to the svn port.
42466 </summary>
42467 @@ -61488,7 +61305,7 @@ Domain allowed access.
42468 </summary>
42469 </param>
42470 </interface>
42471 -<interface name="corenet_send_svn_client_packets" lineno="82435">
42472 +<interface name="corenet_send_svn_client_packets" lineno="82558">
42473 <summary>
42474 Send svn_client packets.
42475 </summary>
42476 @@ -61499,7 +61316,7 @@ Domain allowed access.
42477 </param>
42478 <infoflow type="write" weight="10"/>
42479 </interface>
42480 -<interface name="corenet_dontaudit_send_svn_client_packets" lineno="82454">
42481 +<interface name="corenet_dontaudit_send_svn_client_packets" lineno="82577">
42482 <summary>
42483 Do not audit attempts to send svn_client packets.
42484 </summary>
42485 @@ -61510,7 +61327,7 @@ Domain to not audit.
42486 </param>
42487 <infoflow type="none"/>
42488 </interface>
42489 -<interface name="corenet_receive_svn_client_packets" lineno="82473">
42490 +<interface name="corenet_receive_svn_client_packets" lineno="82596">
42491 <summary>
42492 Receive svn_client packets.
42493 </summary>
42494 @@ -61521,7 +61338,7 @@ Domain allowed access.
42495 </param>
42496 <infoflow type="read" weight="10"/>
42497 </interface>
42498 -<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="82492">
42499 +<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="82615">
42500 <summary>
42501 Do not audit attempts to receive svn_client packets.
42502 </summary>
42503 @@ -61532,7 +61349,7 @@ Domain allowed access.
42504 </param>
42505 <infoflow type="none"/>
42506 </interface>
42507 -<interface name="corenet_sendrecv_svn_client_packets" lineno="82511">
42508 +<interface name="corenet_sendrecv_svn_client_packets" lineno="82634">
42509 <summary>
42510 Send and receive svn_client packets.
42511 </summary>
42512 @@ -61543,7 +61360,7 @@ Domain allowed access.
42513 </param>
42514 <infoflow type="both" weight="10"/>
42515 </interface>
42516 -<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="82527">
42517 +<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="82650">
42518 <summary>
42519 Do not audit attempts to send and receive svn_client packets.
42520 </summary>
42521 @@ -61554,7 +61371,7 @@ Domain to not audit.
42522 </param>
42523 <infoflow type="none"/>
42524 </interface>
42525 -<interface name="corenet_relabelto_svn_client_packets" lineno="82542">
42526 +<interface name="corenet_relabelto_svn_client_packets" lineno="82665">
42527 <summary>
42528 Relabel packets to svn_client the packet type.
42529 </summary>
42530 @@ -61564,7 +61381,7 @@ Domain allowed access.
42531 </summary>
42532 </param>
42533 </interface>
42534 -<interface name="corenet_send_svn_server_packets" lineno="82562">
42535 +<interface name="corenet_send_svn_server_packets" lineno="82685">
42536 <summary>
42537 Send svn_server packets.
42538 </summary>
42539 @@ -61575,7 +61392,7 @@ Domain allowed access.
42540 </param>
42541 <infoflow type="write" weight="10"/>
42542 </interface>
42543 -<interface name="corenet_dontaudit_send_svn_server_packets" lineno="82581">
42544 +<interface name="corenet_dontaudit_send_svn_server_packets" lineno="82704">
42545 <summary>
42546 Do not audit attempts to send svn_server packets.
42547 </summary>
42548 @@ -61586,7 +61403,7 @@ Domain to not audit.
42549 </param>
42550 <infoflow type="none"/>
42551 </interface>
42552 -<interface name="corenet_receive_svn_server_packets" lineno="82600">
42553 +<interface name="corenet_receive_svn_server_packets" lineno="82723">
42554 <summary>
42555 Receive svn_server packets.
42556 </summary>
42557 @@ -61597,7 +61414,7 @@ Domain allowed access.
42558 </param>
42559 <infoflow type="read" weight="10"/>
42560 </interface>
42561 -<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="82619">
42562 +<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="82742">
42563 <summary>
42564 Do not audit attempts to receive svn_server packets.
42565 </summary>
42566 @@ -61608,7 +61425,7 @@ Domain allowed access.
42567 </param>
42568 <infoflow type="none"/>
42569 </interface>
42570 -<interface name="corenet_sendrecv_svn_server_packets" lineno="82638">
42571 +<interface name="corenet_sendrecv_svn_server_packets" lineno="82761">
42572 <summary>
42573 Send and receive svn_server packets.
42574 </summary>
42575 @@ -61619,7 +61436,7 @@ Domain allowed access.
42576 </param>
42577 <infoflow type="both" weight="10"/>
42578 </interface>
42579 -<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="82654">
42580 +<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="82777">
42581 <summary>
42582 Do not audit attempts to send and receive svn_server packets.
42583 </summary>
42584 @@ -61630,7 +61447,7 @@ Domain to not audit.
42585 </param>
42586 <infoflow type="none"/>
42587 </interface>
42588 -<interface name="corenet_relabelto_svn_server_packets" lineno="82669">
42589 +<interface name="corenet_relabelto_svn_server_packets" lineno="82792">
42590 <summary>
42591 Relabel packets to svn_server the packet type.
42592 </summary>
42593 @@ -61640,7 +61457,7 @@ Domain allowed access.
42594 </summary>
42595 </param>
42596 </interface>
42597 -<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="82691">
42598 +<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="82814">
42599 <summary>
42600 Send and receive TCP traffic on the svrloc port.
42601 </summary>
42602 @@ -61651,7 +61468,7 @@ Domain allowed access.
42603 </param>
42604 <infoflow type="both" weight="10"/>
42605 </interface>
42606 -<interface name="corenet_udp_send_svrloc_port" lineno="82706">
42607 +<interface name="corenet_udp_send_svrloc_port" lineno="82829">
42608 <summary>
42609 Send UDP traffic on the svrloc port.
42610 </summary>
42611 @@ -61662,7 +61479,7 @@ Domain allowed access.
42612 </param>
42613 <infoflow type="write" weight="10"/>
42614 </interface>
42615 -<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="82721">
42616 +<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="82844">
42617 <summary>
42618 Do not audit attempts to send UDP traffic on the svrloc port.
42619 </summary>
42620 @@ -61673,7 +61490,7 @@ Domain to not audit.
42621 </param>
42622 <infoflow type="none"/>
42623 </interface>
42624 -<interface name="corenet_udp_receive_svrloc_port" lineno="82736">
42625 +<interface name="corenet_udp_receive_svrloc_port" lineno="82859">
42626 <summary>
42627 Receive UDP traffic on the svrloc port.
42628 </summary>
42629 @@ -61684,7 +61501,7 @@ Domain allowed access.
42630 </param>
42631 <infoflow type="read" weight="10"/>
42632 </interface>
42633 -<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="82751">
42634 +<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="82874">
42635 <summary>
42636 Do not audit attempts to receive UDP traffic on the svrloc port.
42637 </summary>
42638 @@ -61695,7 +61512,7 @@ Domain to not audit.
42639 </param>
42640 <infoflow type="none"/>
42641 </interface>
42642 -<interface name="corenet_udp_sendrecv_svrloc_port" lineno="82766">
42643 +<interface name="corenet_udp_sendrecv_svrloc_port" lineno="82889">
42644 <summary>
42645 Send and receive UDP traffic on the svrloc port.
42646 </summary>
42647 @@ -61706,7 +61523,7 @@ Domain allowed access.
42648 </param>
42649 <infoflow type="both" weight="10"/>
42650 </interface>
42651 -<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="82782">
42652 +<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="82905">
42653 <summary>
42654 Do not audit attempts to send and receive
42655 UDP traffic on the svrloc port.
42656 @@ -61718,7 +61535,7 @@ Domain to not audit.
42657 </param>
42658 <infoflow type="none"/>
42659 </interface>
42660 -<interface name="corenet_tcp_bind_svrloc_port" lineno="82797">
42661 +<interface name="corenet_tcp_bind_svrloc_port" lineno="82920">
42662 <summary>
42663 Bind TCP sockets to the svrloc port.
42664 </summary>
42665 @@ -61729,7 +61546,7 @@ Domain allowed access.
42666 </param>
42667 <infoflow type="none"/>
42668 </interface>
42669 -<interface name="corenet_udp_bind_svrloc_port" lineno="82817">
42670 +<interface name="corenet_udp_bind_svrloc_port" lineno="82940">
42671 <summary>
42672 Bind UDP sockets to the svrloc port.
42673 </summary>
42674 @@ -61740,7 +61557,7 @@ Domain allowed access.
42675 </param>
42676 <infoflow type="none"/>
42677 </interface>
42678 -<interface name="corenet_tcp_connect_svrloc_port" lineno="82836">
42679 +<interface name="corenet_tcp_connect_svrloc_port" lineno="82959">
42680 <summary>
42681 Make a TCP connection to the svrloc port.
42682 </summary>
42683 @@ -61750,7 +61567,7 @@ Domain allowed access.
42684 </summary>
42685 </param>
42686 </interface>
42687 -<interface name="corenet_send_svrloc_client_packets" lineno="82856">
42688 +<interface name="corenet_send_svrloc_client_packets" lineno="82979">
42689 <summary>
42690 Send svrloc_client packets.
42691 </summary>
42692 @@ -61761,7 +61578,7 @@ Domain allowed access.
42693 </param>
42694 <infoflow type="write" weight="10"/>
42695 </interface>
42696 -<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="82875">
42697 +<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="82998">
42698 <summary>
42699 Do not audit attempts to send svrloc_client packets.
42700 </summary>
42701 @@ -61772,7 +61589,7 @@ Domain to not audit.
42702 </param>
42703 <infoflow type="none"/>
42704 </interface>
42705 -<interface name="corenet_receive_svrloc_client_packets" lineno="82894">
42706 +<interface name="corenet_receive_svrloc_client_packets" lineno="83017">
42707 <summary>
42708 Receive svrloc_client packets.
42709 </summary>
42710 @@ -61783,7 +61600,7 @@ Domain allowed access.
42711 </param>
42712 <infoflow type="read" weight="10"/>
42713 </interface>
42714 -<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="82913">
42715 +<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="83036">
42716 <summary>
42717 Do not audit attempts to receive svrloc_client packets.
42718 </summary>
42719 @@ -61794,7 +61611,7 @@ Domain allowed access.
42720 </param>
42721 <infoflow type="none"/>
42722 </interface>
42723 -<interface name="corenet_sendrecv_svrloc_client_packets" lineno="82932">
42724 +<interface name="corenet_sendrecv_svrloc_client_packets" lineno="83055">
42725 <summary>
42726 Send and receive svrloc_client packets.
42727 </summary>
42728 @@ -61805,7 +61622,7 @@ Domain allowed access.
42729 </param>
42730 <infoflow type="both" weight="10"/>
42731 </interface>
42732 -<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="82948">
42733 +<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="83071">
42734 <summary>
42735 Do not audit attempts to send and receive svrloc_client packets.
42736 </summary>
42737 @@ -61816,7 +61633,7 @@ Domain to not audit.
42738 </param>
42739 <infoflow type="none"/>
42740 </interface>
42741 -<interface name="corenet_relabelto_svrloc_client_packets" lineno="82963">
42742 +<interface name="corenet_relabelto_svrloc_client_packets" lineno="83086">
42743 <summary>
42744 Relabel packets to svrloc_client the packet type.
42745 </summary>
42746 @@ -61826,7 +61643,7 @@ Domain allowed access.
42747 </summary>
42748 </param>
42749 </interface>
42750 -<interface name="corenet_send_svrloc_server_packets" lineno="82983">
42751 +<interface name="corenet_send_svrloc_server_packets" lineno="83106">
42752 <summary>
42753 Send svrloc_server packets.
42754 </summary>
42755 @@ -61837,7 +61654,7 @@ Domain allowed access.
42756 </param>
42757 <infoflow type="write" weight="10"/>
42758 </interface>
42759 -<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="83002">
42760 +<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="83125">
42761 <summary>
42762 Do not audit attempts to send svrloc_server packets.
42763 </summary>
42764 @@ -61848,7 +61665,7 @@ Domain to not audit.
42765 </param>
42766 <infoflow type="none"/>
42767 </interface>
42768 -<interface name="corenet_receive_svrloc_server_packets" lineno="83021">
42769 +<interface name="corenet_receive_svrloc_server_packets" lineno="83144">
42770 <summary>
42771 Receive svrloc_server packets.
42772 </summary>
42773 @@ -61859,7 +61676,7 @@ Domain allowed access.
42774 </param>
42775 <infoflow type="read" weight="10"/>
42776 </interface>
42777 -<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="83040">
42778 +<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="83163">
42779 <summary>
42780 Do not audit attempts to receive svrloc_server packets.
42781 </summary>
42782 @@ -61870,7 +61687,7 @@ Domain allowed access.
42783 </param>
42784 <infoflow type="none"/>
42785 </interface>
42786 -<interface name="corenet_sendrecv_svrloc_server_packets" lineno="83059">
42787 +<interface name="corenet_sendrecv_svrloc_server_packets" lineno="83182">
42788 <summary>
42789 Send and receive svrloc_server packets.
42790 </summary>
42791 @@ -61881,7 +61698,7 @@ Domain allowed access.
42792 </param>
42793 <infoflow type="both" weight="10"/>
42794 </interface>
42795 -<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="83075">
42796 +<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="83198">
42797 <summary>
42798 Do not audit attempts to send and receive svrloc_server packets.
42799 </summary>
42800 @@ -61892,7 +61709,7 @@ Domain to not audit.
42801 </param>
42802 <infoflow type="none"/>
42803 </interface>
42804 -<interface name="corenet_relabelto_svrloc_server_packets" lineno="83090">
42805 +<interface name="corenet_relabelto_svrloc_server_packets" lineno="83213">
42806 <summary>
42807 Relabel packets to svrloc_server the packet type.
42808 </summary>
42809 @@ -61902,7 +61719,7 @@ Domain allowed access.
42810 </summary>
42811 </param>
42812 </interface>
42813 -<interface name="corenet_tcp_sendrecv_swat_port" lineno="83112">
42814 +<interface name="corenet_tcp_sendrecv_swat_port" lineno="83235">
42815 <summary>
42816 Send and receive TCP traffic on the swat port.
42817 </summary>
42818 @@ -61913,7 +61730,7 @@ Domain allowed access.
42819 </param>
42820 <infoflow type="both" weight="10"/>
42821 </interface>
42822 -<interface name="corenet_udp_send_swat_port" lineno="83127">
42823 +<interface name="corenet_udp_send_swat_port" lineno="83250">
42824 <summary>
42825 Send UDP traffic on the swat port.
42826 </summary>
42827 @@ -61924,7 +61741,7 @@ Domain allowed access.
42828 </param>
42829 <infoflow type="write" weight="10"/>
42830 </interface>
42831 -<interface name="corenet_dontaudit_udp_send_swat_port" lineno="83142">
42832 +<interface name="corenet_dontaudit_udp_send_swat_port" lineno="83265">
42833 <summary>
42834 Do not audit attempts to send UDP traffic on the swat port.
42835 </summary>
42836 @@ -61935,7 +61752,7 @@ Domain to not audit.
42837 </param>
42838 <infoflow type="none"/>
42839 </interface>
42840 -<interface name="corenet_udp_receive_swat_port" lineno="83157">
42841 +<interface name="corenet_udp_receive_swat_port" lineno="83280">
42842 <summary>
42843 Receive UDP traffic on the swat port.
42844 </summary>
42845 @@ -61946,7 +61763,7 @@ Domain allowed access.
42846 </param>
42847 <infoflow type="read" weight="10"/>
42848 </interface>
42849 -<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="83172">
42850 +<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="83295">
42851 <summary>
42852 Do not audit attempts to receive UDP traffic on the swat port.
42853 </summary>
42854 @@ -61957,7 +61774,7 @@ Domain to not audit.
42855 </param>
42856 <infoflow type="none"/>
42857 </interface>
42858 -<interface name="corenet_udp_sendrecv_swat_port" lineno="83187">
42859 +<interface name="corenet_udp_sendrecv_swat_port" lineno="83310">
42860 <summary>
42861 Send and receive UDP traffic on the swat port.
42862 </summary>
42863 @@ -61968,7 +61785,7 @@ Domain allowed access.
42864 </param>
42865 <infoflow type="both" weight="10"/>
42866 </interface>
42867 -<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="83203">
42868 +<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="83326">
42869 <summary>
42870 Do not audit attempts to send and receive
42871 UDP traffic on the swat port.
42872 @@ -61980,7 +61797,7 @@ Domain to not audit.
42873 </param>
42874 <infoflow type="none"/>
42875 </interface>
42876 -<interface name="corenet_tcp_bind_swat_port" lineno="83218">
42877 +<interface name="corenet_tcp_bind_swat_port" lineno="83341">
42878 <summary>
42879 Bind TCP sockets to the swat port.
42880 </summary>
42881 @@ -61991,7 +61808,7 @@ Domain allowed access.
42882 </param>
42883 <infoflow type="none"/>
42884 </interface>
42885 -<interface name="corenet_udp_bind_swat_port" lineno="83238">
42886 +<interface name="corenet_udp_bind_swat_port" lineno="83361">
42887 <summary>
42888 Bind UDP sockets to the swat port.
42889 </summary>
42890 @@ -62002,7 +61819,7 @@ Domain allowed access.
42891 </param>
42892 <infoflow type="none"/>
42893 </interface>
42894 -<interface name="corenet_tcp_connect_swat_port" lineno="83257">
42895 +<interface name="corenet_tcp_connect_swat_port" lineno="83380">
42896 <summary>
42897 Make a TCP connection to the swat port.
42898 </summary>
42899 @@ -62012,7 +61829,7 @@ Domain allowed access.
42900 </summary>
42901 </param>
42902 </interface>
42903 -<interface name="corenet_send_swat_client_packets" lineno="83277">
42904 +<interface name="corenet_send_swat_client_packets" lineno="83400">
42905 <summary>
42906 Send swat_client packets.
42907 </summary>
42908 @@ -62023,7 +61840,7 @@ Domain allowed access.
42909 </param>
42910 <infoflow type="write" weight="10"/>
42911 </interface>
42912 -<interface name="corenet_dontaudit_send_swat_client_packets" lineno="83296">
42913 +<interface name="corenet_dontaudit_send_swat_client_packets" lineno="83419">
42914 <summary>
42915 Do not audit attempts to send swat_client packets.
42916 </summary>
42917 @@ -62034,7 +61851,7 @@ Domain to not audit.
42918 </param>
42919 <infoflow type="none"/>
42920 </interface>
42921 -<interface name="corenet_receive_swat_client_packets" lineno="83315">
42922 +<interface name="corenet_receive_swat_client_packets" lineno="83438">
42923 <summary>
42924 Receive swat_client packets.
42925 </summary>
42926 @@ -62045,7 +61862,7 @@ Domain allowed access.
42927 </param>
42928 <infoflow type="read" weight="10"/>
42929 </interface>
42930 -<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="83334">
42931 +<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="83457">
42932 <summary>
42933 Do not audit attempts to receive swat_client packets.
42934 </summary>
42935 @@ -62056,7 +61873,7 @@ Domain allowed access.
42936 </param>
42937 <infoflow type="none"/>
42938 </interface>
42939 -<interface name="corenet_sendrecv_swat_client_packets" lineno="83353">
42940 +<interface name="corenet_sendrecv_swat_client_packets" lineno="83476">
42941 <summary>
42942 Send and receive swat_client packets.
42943 </summary>
42944 @@ -62067,7 +61884,7 @@ Domain allowed access.
42945 </param>
42946 <infoflow type="both" weight="10"/>
42947 </interface>
42948 -<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="83369">
42949 +<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="83492">
42950 <summary>
42951 Do not audit attempts to send and receive swat_client packets.
42952 </summary>
42953 @@ -62078,7 +61895,7 @@ Domain to not audit.
42954 </param>
42955 <infoflow type="none"/>
42956 </interface>
42957 -<interface name="corenet_relabelto_swat_client_packets" lineno="83384">
42958 +<interface name="corenet_relabelto_swat_client_packets" lineno="83507">
42959 <summary>
42960 Relabel packets to swat_client the packet type.
42961 </summary>
42962 @@ -62088,7 +61905,7 @@ Domain allowed access.
42963 </summary>
42964 </param>
42965 </interface>
42966 -<interface name="corenet_send_swat_server_packets" lineno="83404">
42967 +<interface name="corenet_send_swat_server_packets" lineno="83527">
42968 <summary>
42969 Send swat_server packets.
42970 </summary>
42971 @@ -62099,7 +61916,7 @@ Domain allowed access.
42972 </param>
42973 <infoflow type="write" weight="10"/>
42974 </interface>
42975 -<interface name="corenet_dontaudit_send_swat_server_packets" lineno="83423">
42976 +<interface name="corenet_dontaudit_send_swat_server_packets" lineno="83546">
42977 <summary>
42978 Do not audit attempts to send swat_server packets.
42979 </summary>
42980 @@ -62110,7 +61927,7 @@ Domain to not audit.
42981 </param>
42982 <infoflow type="none"/>
42983 </interface>
42984 -<interface name="corenet_receive_swat_server_packets" lineno="83442">
42985 +<interface name="corenet_receive_swat_server_packets" lineno="83565">
42986 <summary>
42987 Receive swat_server packets.
42988 </summary>
42989 @@ -62121,7 +61938,7 @@ Domain allowed access.
42990 </param>
42991 <infoflow type="read" weight="10"/>
42992 </interface>
42993 -<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="83461">
42994 +<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="83584">
42995 <summary>
42996 Do not audit attempts to receive swat_server packets.
42997 </summary>
42998 @@ -62132,7 +61949,7 @@ Domain allowed access.
42999 </param>
43000 <infoflow type="none"/>
43001 </interface>
43002 -<interface name="corenet_sendrecv_swat_server_packets" lineno="83480">
43003 +<interface name="corenet_sendrecv_swat_server_packets" lineno="83603">
43004 <summary>
43005 Send and receive swat_server packets.
43006 </summary>
43007 @@ -62143,7 +61960,7 @@ Domain allowed access.
43008 </param>
43009 <infoflow type="both" weight="10"/>
43010 </interface>
43011 -<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="83496">
43012 +<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="83619">
43013 <summary>
43014 Do not audit attempts to send and receive swat_server packets.
43015 </summary>
43016 @@ -62154,7 +61971,7 @@ Domain to not audit.
43017 </param>
43018 <infoflow type="none"/>
43019 </interface>
43020 -<interface name="corenet_relabelto_swat_server_packets" lineno="83511">
43021 +<interface name="corenet_relabelto_swat_server_packets" lineno="83634">
43022 <summary>
43023 Relabel packets to swat_server the packet type.
43024 </summary>
43025 @@ -62164,7 +61981,7 @@ Domain allowed access.
43026 </summary>
43027 </param>
43028 </interface>
43029 -<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="83533">
43030 +<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="83656">
43031 <summary>
43032 Send and receive TCP traffic on the syncthing port.
43033 </summary>
43034 @@ -62175,7 +61992,7 @@ Domain allowed access.
43035 </param>
43036 <infoflow type="both" weight="10"/>
43037 </interface>
43038 -<interface name="corenet_udp_send_syncthing_port" lineno="83548">
43039 +<interface name="corenet_udp_send_syncthing_port" lineno="83671">
43040 <summary>
43041 Send UDP traffic on the syncthing port.
43042 </summary>
43043 @@ -62186,7 +62003,7 @@ Domain allowed access.
43044 </param>
43045 <infoflow type="write" weight="10"/>
43046 </interface>
43047 -<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="83563">
43048 +<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="83686">
43049 <summary>
43050 Do not audit attempts to send UDP traffic on the syncthing port.
43051 </summary>
43052 @@ -62197,7 +62014,7 @@ Domain to not audit.
43053 </param>
43054 <infoflow type="none"/>
43055 </interface>
43056 -<interface name="corenet_udp_receive_syncthing_port" lineno="83578">
43057 +<interface name="corenet_udp_receive_syncthing_port" lineno="83701">
43058 <summary>
43059 Receive UDP traffic on the syncthing port.
43060 </summary>
43061 @@ -62208,7 +62025,7 @@ Domain allowed access.
43062 </param>
43063 <infoflow type="read" weight="10"/>
43064 </interface>
43065 -<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="83593">
43066 +<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="83716">
43067 <summary>
43068 Do not audit attempts to receive UDP traffic on the syncthing port.
43069 </summary>
43070 @@ -62219,7 +62036,7 @@ Domain to not audit.
43071 </param>
43072 <infoflow type="none"/>
43073 </interface>
43074 -<interface name="corenet_udp_sendrecv_syncthing_port" lineno="83608">
43075 +<interface name="corenet_udp_sendrecv_syncthing_port" lineno="83731">
43076 <summary>
43077 Send and receive UDP traffic on the syncthing port.
43078 </summary>
43079 @@ -62230,7 +62047,7 @@ Domain allowed access.
43080 </param>
43081 <infoflow type="both" weight="10"/>
43082 </interface>
43083 -<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="83624">
43084 +<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="83747">
43085 <summary>
43086 Do not audit attempts to send and receive
43087 UDP traffic on the syncthing port.
43088 @@ -62242,7 +62059,7 @@ Domain to not audit.
43089 </param>
43090 <infoflow type="none"/>
43091 </interface>
43092 -<interface name="corenet_tcp_bind_syncthing_port" lineno="83639">
43093 +<interface name="corenet_tcp_bind_syncthing_port" lineno="83762">
43094 <summary>
43095 Bind TCP sockets to the syncthing port.
43096 </summary>
43097 @@ -62253,7 +62070,7 @@ Domain allowed access.
43098 </param>
43099 <infoflow type="none"/>
43100 </interface>
43101 -<interface name="corenet_udp_bind_syncthing_port" lineno="83659">
43102 +<interface name="corenet_udp_bind_syncthing_port" lineno="83782">
43103 <summary>
43104 Bind UDP sockets to the syncthing port.
43105 </summary>
43106 @@ -62264,7 +62081,7 @@ Domain allowed access.
43107 </param>
43108 <infoflow type="none"/>
43109 </interface>
43110 -<interface name="corenet_tcp_connect_syncthing_port" lineno="83678">
43111 +<interface name="corenet_tcp_connect_syncthing_port" lineno="83801">
43112 <summary>
43113 Make a TCP connection to the syncthing port.
43114 </summary>
43115 @@ -62274,7 +62091,7 @@ Domain allowed access.
43116 </summary>
43117 </param>
43118 </interface>
43119 -<interface name="corenet_send_syncthing_client_packets" lineno="83698">
43120 +<interface name="corenet_send_syncthing_client_packets" lineno="83821">
43121 <summary>
43122 Send syncthing_client packets.
43123 </summary>
43124 @@ -62285,7 +62102,7 @@ Domain allowed access.
43125 </param>
43126 <infoflow type="write" weight="10"/>
43127 </interface>
43128 -<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="83717">
43129 +<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="83840">
43130 <summary>
43131 Do not audit attempts to send syncthing_client packets.
43132 </summary>
43133 @@ -62296,7 +62113,7 @@ Domain to not audit.
43134 </param>
43135 <infoflow type="none"/>
43136 </interface>
43137 -<interface name="corenet_receive_syncthing_client_packets" lineno="83736">
43138 +<interface name="corenet_receive_syncthing_client_packets" lineno="83859">
43139 <summary>
43140 Receive syncthing_client packets.
43141 </summary>
43142 @@ -62307,7 +62124,7 @@ Domain allowed access.
43143 </param>
43144 <infoflow type="read" weight="10"/>
43145 </interface>
43146 -<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="83755">
43147 +<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="83878">
43148 <summary>
43149 Do not audit attempts to receive syncthing_client packets.
43150 </summary>
43151 @@ -62318,7 +62135,7 @@ Domain allowed access.
43152 </param>
43153 <infoflow type="none"/>
43154 </interface>
43155 -<interface name="corenet_sendrecv_syncthing_client_packets" lineno="83774">
43156 +<interface name="corenet_sendrecv_syncthing_client_packets" lineno="83897">
43157 <summary>
43158 Send and receive syncthing_client packets.
43159 </summary>
43160 @@ -62329,7 +62146,7 @@ Domain allowed access.
43161 </param>
43162 <infoflow type="both" weight="10"/>
43163 </interface>
43164 -<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="83790">
43165 +<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="83913">
43166 <summary>
43167 Do not audit attempts to send and receive syncthing_client packets.
43168 </summary>
43169 @@ -62340,7 +62157,7 @@ Domain to not audit.
43170 </param>
43171 <infoflow type="none"/>
43172 </interface>
43173 -<interface name="corenet_relabelto_syncthing_client_packets" lineno="83805">
43174 +<interface name="corenet_relabelto_syncthing_client_packets" lineno="83928">
43175 <summary>
43176 Relabel packets to syncthing_client the packet type.
43177 </summary>
43178 @@ -62350,7 +62167,7 @@ Domain allowed access.
43179 </summary>
43180 </param>
43181 </interface>
43182 -<interface name="corenet_send_syncthing_server_packets" lineno="83825">
43183 +<interface name="corenet_send_syncthing_server_packets" lineno="83948">
43184 <summary>
43185 Send syncthing_server packets.
43186 </summary>
43187 @@ -62361,7 +62178,7 @@ Domain allowed access.
43188 </param>
43189 <infoflow type="write" weight="10"/>
43190 </interface>
43191 -<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="83844">
43192 +<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="83967">
43193 <summary>
43194 Do not audit attempts to send syncthing_server packets.
43195 </summary>
43196 @@ -62372,7 +62189,7 @@ Domain to not audit.
43197 </param>
43198 <infoflow type="none"/>
43199 </interface>
43200 -<interface name="corenet_receive_syncthing_server_packets" lineno="83863">
43201 +<interface name="corenet_receive_syncthing_server_packets" lineno="83986">
43202 <summary>
43203 Receive syncthing_server packets.
43204 </summary>
43205 @@ -62383,7 +62200,7 @@ Domain allowed access.
43206 </param>
43207 <infoflow type="read" weight="10"/>
43208 </interface>
43209 -<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="83882">
43210 +<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="84005">
43211 <summary>
43212 Do not audit attempts to receive syncthing_server packets.
43213 </summary>
43214 @@ -62394,7 +62211,7 @@ Domain allowed access.
43215 </param>
43216 <infoflow type="none"/>
43217 </interface>
43218 -<interface name="corenet_sendrecv_syncthing_server_packets" lineno="83901">
43219 +<interface name="corenet_sendrecv_syncthing_server_packets" lineno="84024">
43220 <summary>
43221 Send and receive syncthing_server packets.
43222 </summary>
43223 @@ -62405,7 +62222,7 @@ Domain allowed access.
43224 </param>
43225 <infoflow type="both" weight="10"/>
43226 </interface>
43227 -<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="83917">
43228 +<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="84040">
43229 <summary>
43230 Do not audit attempts to send and receive syncthing_server packets.
43231 </summary>
43232 @@ -62416,7 +62233,7 @@ Domain to not audit.
43233 </param>
43234 <infoflow type="none"/>
43235 </interface>
43236 -<interface name="corenet_relabelto_syncthing_server_packets" lineno="83932">
43237 +<interface name="corenet_relabelto_syncthing_server_packets" lineno="84055">
43238 <summary>
43239 Relabel packets to syncthing_server the packet type.
43240 </summary>
43241 @@ -62426,7 +62243,7 @@ Domain allowed access.
43242 </summary>
43243 </param>
43244 </interface>
43245 -<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="83954">
43246 +<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="84077">
43247 <summary>
43248 Send and receive TCP traffic on the syncthing_admin port.
43249 </summary>
43250 @@ -62437,7 +62254,7 @@ Domain allowed access.
43251 </param>
43252 <infoflow type="both" weight="10"/>
43253 </interface>
43254 -<interface name="corenet_udp_send_syncthing_admin_port" lineno="83969">
43255 +<interface name="corenet_udp_send_syncthing_admin_port" lineno="84092">
43256 <summary>
43257 Send UDP traffic on the syncthing_admin port.
43258 </summary>
43259 @@ -62448,7 +62265,7 @@ Domain allowed access.
43260 </param>
43261 <infoflow type="write" weight="10"/>
43262 </interface>
43263 -<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="83984">
43264 +<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="84107">
43265 <summary>
43266 Do not audit attempts to send UDP traffic on the syncthing_admin port.
43267 </summary>
43268 @@ -62459,7 +62276,7 @@ Domain to not audit.
43269 </param>
43270 <infoflow type="none"/>
43271 </interface>
43272 -<interface name="corenet_udp_receive_syncthing_admin_port" lineno="83999">
43273 +<interface name="corenet_udp_receive_syncthing_admin_port" lineno="84122">
43274 <summary>
43275 Receive UDP traffic on the syncthing_admin port.
43276 </summary>
43277 @@ -62470,7 +62287,7 @@ Domain allowed access.
43278 </param>
43279 <infoflow type="read" weight="10"/>
43280 </interface>
43281 -<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="84014">
43282 +<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="84137">
43283 <summary>
43284 Do not audit attempts to receive UDP traffic on the syncthing_admin port.
43285 </summary>
43286 @@ -62481,7 +62298,7 @@ Domain to not audit.
43287 </param>
43288 <infoflow type="none"/>
43289 </interface>
43290 -<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="84029">
43291 +<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="84152">
43292 <summary>
43293 Send and receive UDP traffic on the syncthing_admin port.
43294 </summary>
43295 @@ -62492,7 +62309,7 @@ Domain allowed access.
43296 </param>
43297 <infoflow type="both" weight="10"/>
43298 </interface>
43299 -<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="84045">
43300 +<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="84168">
43301 <summary>
43302 Do not audit attempts to send and receive
43303 UDP traffic on the syncthing_admin port.
43304 @@ -62504,7 +62321,7 @@ Domain to not audit.
43305 </param>
43306 <infoflow type="none"/>
43307 </interface>
43308 -<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="84060">
43309 +<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="84183">
43310 <summary>
43311 Bind TCP sockets to the syncthing_admin port.
43312 </summary>
43313 @@ -62515,7 +62332,7 @@ Domain allowed access.
43314 </param>
43315 <infoflow type="none"/>
43316 </interface>
43317 -<interface name="corenet_udp_bind_syncthing_admin_port" lineno="84080">
43318 +<interface name="corenet_udp_bind_syncthing_admin_port" lineno="84203">
43319 <summary>
43320 Bind UDP sockets to the syncthing_admin port.
43321 </summary>
43322 @@ -62526,7 +62343,7 @@ Domain allowed access.
43323 </param>
43324 <infoflow type="none"/>
43325 </interface>
43326 -<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="84099">
43327 +<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="84222">
43328 <summary>
43329 Make a TCP connection to the syncthing_admin port.
43330 </summary>
43331 @@ -62536,7 +62353,7 @@ Domain allowed access.
43332 </summary>
43333 </param>
43334 </interface>
43335 -<interface name="corenet_send_syncthing_admin_client_packets" lineno="84119">
43336 +<interface name="corenet_send_syncthing_admin_client_packets" lineno="84242">
43337 <summary>
43338 Send syncthing_admin_client packets.
43339 </summary>
43340 @@ -62547,7 +62364,7 @@ Domain allowed access.
43341 </param>
43342 <infoflow type="write" weight="10"/>
43343 </interface>
43344 -<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="84138">
43345 +<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="84261">
43346 <summary>
43347 Do not audit attempts to send syncthing_admin_client packets.
43348 </summary>
43349 @@ -62558,7 +62375,7 @@ Domain to not audit.
43350 </param>
43351 <infoflow type="none"/>
43352 </interface>
43353 -<interface name="corenet_receive_syncthing_admin_client_packets" lineno="84157">
43354 +<interface name="corenet_receive_syncthing_admin_client_packets" lineno="84280">
43355 <summary>
43356 Receive syncthing_admin_client packets.
43357 </summary>
43358 @@ -62569,7 +62386,7 @@ Domain allowed access.
43359 </param>
43360 <infoflow type="read" weight="10"/>
43361 </interface>
43362 -<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="84176">
43363 +<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="84299">
43364 <summary>
43365 Do not audit attempts to receive syncthing_admin_client packets.
43366 </summary>
43367 @@ -62580,7 +62397,7 @@ Domain allowed access.
43368 </param>
43369 <infoflow type="none"/>
43370 </interface>
43371 -<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="84195">
43372 +<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="84318">
43373 <summary>
43374 Send and receive syncthing_admin_client packets.
43375 </summary>
43376 @@ -62591,7 +62408,7 @@ Domain allowed access.
43377 </param>
43378 <infoflow type="both" weight="10"/>
43379 </interface>
43380 -<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="84211">
43381 +<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="84334">
43382 <summary>
43383 Do not audit attempts to send and receive syncthing_admin_client packets.
43384 </summary>
43385 @@ -62602,7 +62419,7 @@ Domain to not audit.
43386 </param>
43387 <infoflow type="none"/>
43388 </interface>
43389 -<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="84226">
43390 +<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="84349">
43391 <summary>
43392 Relabel packets to syncthing_admin_client the packet type.
43393 </summary>
43394 @@ -62612,7 +62429,7 @@ Domain allowed access.
43395 </summary>
43396 </param>
43397 </interface>
43398 -<interface name="corenet_send_syncthing_admin_server_packets" lineno="84246">
43399 +<interface name="corenet_send_syncthing_admin_server_packets" lineno="84369">
43400 <summary>
43401 Send syncthing_admin_server packets.
43402 </summary>
43403 @@ -62623,7 +62440,7 @@ Domain allowed access.
43404 </param>
43405 <infoflow type="write" weight="10"/>
43406 </interface>
43407 -<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="84265">
43408 +<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="84388">
43409 <summary>
43410 Do not audit attempts to send syncthing_admin_server packets.
43411 </summary>
43412 @@ -62634,7 +62451,7 @@ Domain to not audit.
43413 </param>
43414 <infoflow type="none"/>
43415 </interface>
43416 -<interface name="corenet_receive_syncthing_admin_server_packets" lineno="84284">
43417 +<interface name="corenet_receive_syncthing_admin_server_packets" lineno="84407">
43418 <summary>
43419 Receive syncthing_admin_server packets.
43420 </summary>
43421 @@ -62645,7 +62462,7 @@ Domain allowed access.
43422 </param>
43423 <infoflow type="read" weight="10"/>
43424 </interface>
43425 -<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="84303">
43426 +<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="84426">
43427 <summary>
43428 Do not audit attempts to receive syncthing_admin_server packets.
43429 </summary>
43430 @@ -62656,7 +62473,7 @@ Domain allowed access.
43431 </param>
43432 <infoflow type="none"/>
43433 </interface>
43434 -<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="84322">
43435 +<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="84445">
43436 <summary>
43437 Send and receive syncthing_admin_server packets.
43438 </summary>
43439 @@ -62667,7 +62484,7 @@ Domain allowed access.
43440 </param>
43441 <infoflow type="both" weight="10"/>
43442 </interface>
43443 -<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="84338">
43444 +<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="84461">
43445 <summary>
43446 Do not audit attempts to send and receive syncthing_admin_server packets.
43447 </summary>
43448 @@ -62678,7 +62495,7 @@ Domain to not audit.
43449 </param>
43450 <infoflow type="none"/>
43451 </interface>
43452 -<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="84353">
43453 +<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="84476">
43454 <summary>
43455 Relabel packets to syncthing_admin_server the packet type.
43456 </summary>
43457 @@ -62688,7 +62505,7 @@ Domain allowed access.
43458 </summary>
43459 </param>
43460 </interface>
43461 -<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="84375">
43462 +<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="84498">
43463 <summary>
43464 Send and receive TCP traffic on the syncthing_discovery port.
43465 </summary>
43466 @@ -62699,7 +62516,7 @@ Domain allowed access.
43467 </param>
43468 <infoflow type="both" weight="10"/>
43469 </interface>
43470 -<interface name="corenet_udp_send_syncthing_discovery_port" lineno="84390">
43471 +<interface name="corenet_udp_send_syncthing_discovery_port" lineno="84513">
43472 <summary>
43473 Send UDP traffic on the syncthing_discovery port.
43474 </summary>
43475 @@ -62710,7 +62527,7 @@ Domain allowed access.
43476 </param>
43477 <infoflow type="write" weight="10"/>
43478 </interface>
43479 -<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="84405">
43480 +<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="84528">
43481 <summary>
43482 Do not audit attempts to send UDP traffic on the syncthing_discovery port.
43483 </summary>
43484 @@ -62721,7 +62538,7 @@ Domain to not audit.
43485 </param>
43486 <infoflow type="none"/>
43487 </interface>
43488 -<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="84420">
43489 +<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="84543">
43490 <summary>
43491 Receive UDP traffic on the syncthing_discovery port.
43492 </summary>
43493 @@ -62732,7 +62549,7 @@ Domain allowed access.
43494 </param>
43495 <infoflow type="read" weight="10"/>
43496 </interface>
43497 -<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="84435">
43498 +<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="84558">
43499 <summary>
43500 Do not audit attempts to receive UDP traffic on the syncthing_discovery port.
43501 </summary>
43502 @@ -62743,7 +62560,7 @@ Domain to not audit.
43503 </param>
43504 <infoflow type="none"/>
43505 </interface>
43506 -<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="84450">
43507 +<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="84573">
43508 <summary>
43509 Send and receive UDP traffic on the syncthing_discovery port.
43510 </summary>
43511 @@ -62754,7 +62571,7 @@ Domain allowed access.
43512 </param>
43513 <infoflow type="both" weight="10"/>
43514 </interface>
43515 -<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="84466">
43516 +<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="84589">
43517 <summary>
43518 Do not audit attempts to send and receive
43519 UDP traffic on the syncthing_discovery port.
43520 @@ -62766,7 +62583,7 @@ Domain to not audit.
43521 </param>
43522 <infoflow type="none"/>
43523 </interface>
43524 -<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="84481">
43525 +<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="84604">
43526 <summary>
43527 Bind TCP sockets to the syncthing_discovery port.
43528 </summary>
43529 @@ -62777,7 +62594,7 @@ Domain allowed access.
43530 </param>
43531 <infoflow type="none"/>
43532 </interface>
43533 -<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="84501">
43534 +<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="84624">
43535 <summary>
43536 Bind UDP sockets to the syncthing_discovery port.
43537 </summary>
43538 @@ -62788,7 +62605,7 @@ Domain allowed access.
43539 </param>
43540 <infoflow type="none"/>
43541 </interface>
43542 -<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="84520">
43543 +<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="84643">
43544 <summary>
43545 Make a TCP connection to the syncthing_discovery port.
43546 </summary>
43547 @@ -62798,7 +62615,7 @@ Domain allowed access.
43548 </summary>
43549 </param>
43550 </interface>
43551 -<interface name="corenet_send_syncthing_discovery_client_packets" lineno="84540">
43552 +<interface name="corenet_send_syncthing_discovery_client_packets" lineno="84663">
43553 <summary>
43554 Send syncthing_discovery_client packets.
43555 </summary>
43556 @@ -62809,7 +62626,7 @@ Domain allowed access.
43557 </param>
43558 <infoflow type="write" weight="10"/>
43559 </interface>
43560 -<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="84559">
43561 +<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="84682">
43562 <summary>
43563 Do not audit attempts to send syncthing_discovery_client packets.
43564 </summary>
43565 @@ -62820,7 +62637,7 @@ Domain to not audit.
43566 </param>
43567 <infoflow type="none"/>
43568 </interface>
43569 -<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="84578">
43570 +<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="84701">
43571 <summary>
43572 Receive syncthing_discovery_client packets.
43573 </summary>
43574 @@ -62831,7 +62648,7 @@ Domain allowed access.
43575 </param>
43576 <infoflow type="read" weight="10"/>
43577 </interface>
43578 -<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="84597">
43579 +<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="84720">
43580 <summary>
43581 Do not audit attempts to receive syncthing_discovery_client packets.
43582 </summary>
43583 @@ -62842,7 +62659,7 @@ Domain allowed access.
43584 </param>
43585 <infoflow type="none"/>
43586 </interface>
43587 -<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="84616">
43588 +<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="84739">
43589 <summary>
43590 Send and receive syncthing_discovery_client packets.
43591 </summary>
43592 @@ -62853,7 +62670,7 @@ Domain allowed access.
43593 </param>
43594 <infoflow type="both" weight="10"/>
43595 </interface>
43596 -<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="84632">
43597 +<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="84755">
43598 <summary>
43599 Do not audit attempts to send and receive syncthing_discovery_client packets.
43600 </summary>
43601 @@ -62864,7 +62681,7 @@ Domain to not audit.
43602 </param>
43603 <infoflow type="none"/>
43604 </interface>
43605 -<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="84647">
43606 +<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="84770">
43607 <summary>
43608 Relabel packets to syncthing_discovery_client the packet type.
43609 </summary>
43610 @@ -62874,7 +62691,7 @@ Domain allowed access.
43611 </summary>
43612 </param>
43613 </interface>
43614 -<interface name="corenet_send_syncthing_discovery_server_packets" lineno="84667">
43615 +<interface name="corenet_send_syncthing_discovery_server_packets" lineno="84790">
43616 <summary>
43617 Send syncthing_discovery_server packets.
43618 </summary>
43619 @@ -62885,7 +62702,7 @@ Domain allowed access.
43620 </param>
43621 <infoflow type="write" weight="10"/>
43622 </interface>
43623 -<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="84686">
43624 +<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="84809">
43625 <summary>
43626 Do not audit attempts to send syncthing_discovery_server packets.
43627 </summary>
43628 @@ -62896,7 +62713,7 @@ Domain to not audit.
43629 </param>
43630 <infoflow type="none"/>
43631 </interface>
43632 -<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="84705">
43633 +<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="84828">
43634 <summary>
43635 Receive syncthing_discovery_server packets.
43636 </summary>
43637 @@ -62907,7 +62724,7 @@ Domain allowed access.
43638 </param>
43639 <infoflow type="read" weight="10"/>
43640 </interface>
43641 -<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="84724">
43642 +<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="84847">
43643 <summary>
43644 Do not audit attempts to receive syncthing_discovery_server packets.
43645 </summary>
43646 @@ -62918,7 +62735,7 @@ Domain allowed access.
43647 </param>
43648 <infoflow type="none"/>
43649 </interface>
43650 -<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="84743">
43651 +<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="84866">
43652 <summary>
43653 Send and receive syncthing_discovery_server packets.
43654 </summary>
43655 @@ -62929,7 +62746,7 @@ Domain allowed access.
43656 </param>
43657 <infoflow type="both" weight="10"/>
43658 </interface>
43659 -<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="84759">
43660 +<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="84882">
43661 <summary>
43662 Do not audit attempts to send and receive syncthing_discovery_server packets.
43663 </summary>
43664 @@ -62940,7 +62757,7 @@ Domain to not audit.
43665 </param>
43666 <infoflow type="none"/>
43667 </interface>
43668 -<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="84774">
43669 +<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="84897">
43670 <summary>
43671 Relabel packets to syncthing_discovery_server the packet type.
43672 </summary>
43673 @@ -62950,7 +62767,7 @@ Domain allowed access.
43674 </summary>
43675 </param>
43676 </interface>
43677 -<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="84796">
43678 +<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="84919">
43679 <summary>
43680 Send and receive TCP traffic on the sype_transport port.
43681 </summary>
43682 @@ -62961,7 +62778,7 @@ Domain allowed access.
43683 </param>
43684 <infoflow type="both" weight="10"/>
43685 </interface>
43686 -<interface name="corenet_udp_send_sype_transport_port" lineno="84811">
43687 +<interface name="corenet_udp_send_sype_transport_port" lineno="84934">
43688 <summary>
43689 Send UDP traffic on the sype_transport port.
43690 </summary>
43691 @@ -62972,7 +62789,7 @@ Domain allowed access.
43692 </param>
43693 <infoflow type="write" weight="10"/>
43694 </interface>
43695 -<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="84826">
43696 +<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="84949">
43697 <summary>
43698 Do not audit attempts to send UDP traffic on the sype_transport port.
43699 </summary>
43700 @@ -62983,7 +62800,7 @@ Domain to not audit.
43701 </param>
43702 <infoflow type="none"/>
43703 </interface>
43704 -<interface name="corenet_udp_receive_sype_transport_port" lineno="84841">
43705 +<interface name="corenet_udp_receive_sype_transport_port" lineno="84964">
43706 <summary>
43707 Receive UDP traffic on the sype_transport port.
43708 </summary>
43709 @@ -62994,7 +62811,7 @@ Domain allowed access.
43710 </param>
43711 <infoflow type="read" weight="10"/>
43712 </interface>
43713 -<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="84856">
43714 +<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="84979">
43715 <summary>
43716 Do not audit attempts to receive UDP traffic on the sype_transport port.
43717 </summary>
43718 @@ -63005,7 +62822,7 @@ Domain to not audit.
43719 </param>
43720 <infoflow type="none"/>
43721 </interface>
43722 -<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="84871">
43723 +<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="84994">
43724 <summary>
43725 Send and receive UDP traffic on the sype_transport port.
43726 </summary>
43727 @@ -63016,7 +62833,7 @@ Domain allowed access.
43728 </param>
43729 <infoflow type="both" weight="10"/>
43730 </interface>
43731 -<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="84887">
43732 +<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="85010">
43733 <summary>
43734 Do not audit attempts to send and receive
43735 UDP traffic on the sype_transport port.
43736 @@ -63028,7 +62845,7 @@ Domain to not audit.
43737 </param>
43738 <infoflow type="none"/>
43739 </interface>
43740 -<interface name="corenet_tcp_bind_sype_transport_port" lineno="84902">
43741 +<interface name="corenet_tcp_bind_sype_transport_port" lineno="85025">
43742 <summary>
43743 Bind TCP sockets to the sype_transport port.
43744 </summary>
43745 @@ -63039,7 +62856,7 @@ Domain allowed access.
43746 </param>
43747 <infoflow type="none"/>
43748 </interface>
43749 -<interface name="corenet_udp_bind_sype_transport_port" lineno="84922">
43750 +<interface name="corenet_udp_bind_sype_transport_port" lineno="85045">
43751 <summary>
43752 Bind UDP sockets to the sype_transport port.
43753 </summary>
43754 @@ -63050,7 +62867,7 @@ Domain allowed access.
43755 </param>
43756 <infoflow type="none"/>
43757 </interface>
43758 -<interface name="corenet_tcp_connect_sype_transport_port" lineno="84941">
43759 +<interface name="corenet_tcp_connect_sype_transport_port" lineno="85064">
43760 <summary>
43761 Make a TCP connection to the sype_transport port.
43762 </summary>
43763 @@ -63060,7 +62877,7 @@ Domain allowed access.
43764 </summary>
43765 </param>
43766 </interface>
43767 -<interface name="corenet_send_sype_transport_client_packets" lineno="84961">
43768 +<interface name="corenet_send_sype_transport_client_packets" lineno="85084">
43769 <summary>
43770 Send sype_transport_client packets.
43771 </summary>
43772 @@ -63071,7 +62888,7 @@ Domain allowed access.
43773 </param>
43774 <infoflow type="write" weight="10"/>
43775 </interface>
43776 -<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="84980">
43777 +<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="85103">
43778 <summary>
43779 Do not audit attempts to send sype_transport_client packets.
43780 </summary>
43781 @@ -63082,7 +62899,7 @@ Domain to not audit.
43782 </param>
43783 <infoflow type="none"/>
43784 </interface>
43785 -<interface name="corenet_receive_sype_transport_client_packets" lineno="84999">
43786 +<interface name="corenet_receive_sype_transport_client_packets" lineno="85122">
43787 <summary>
43788 Receive sype_transport_client packets.
43789 </summary>
43790 @@ -63093,7 +62910,7 @@ Domain allowed access.
43791 </param>
43792 <infoflow type="read" weight="10"/>
43793 </interface>
43794 -<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="85018">
43795 +<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="85141">
43796 <summary>
43797 Do not audit attempts to receive sype_transport_client packets.
43798 </summary>
43799 @@ -63104,7 +62921,7 @@ Domain allowed access.
43800 </param>
43801 <infoflow type="none"/>
43802 </interface>
43803 -<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="85037">
43804 +<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="85160">
43805 <summary>
43806 Send and receive sype_transport_client packets.
43807 </summary>
43808 @@ -63115,7 +62932,7 @@ Domain allowed access.
43809 </param>
43810 <infoflow type="both" weight="10"/>
43811 </interface>
43812 -<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="85053">
43813 +<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="85176">
43814 <summary>
43815 Do not audit attempts to send and receive sype_transport_client packets.
43816 </summary>
43817 @@ -63126,7 +62943,7 @@ Domain to not audit.
43818 </param>
43819 <infoflow type="none"/>
43820 </interface>
43821 -<interface name="corenet_relabelto_sype_transport_client_packets" lineno="85068">
43822 +<interface name="corenet_relabelto_sype_transport_client_packets" lineno="85191">
43823 <summary>
43824 Relabel packets to sype_transport_client the packet type.
43825 </summary>
43826 @@ -63136,7 +62953,7 @@ Domain allowed access.
43827 </summary>
43828 </param>
43829 </interface>
43830 -<interface name="corenet_send_sype_transport_server_packets" lineno="85088">
43831 +<interface name="corenet_send_sype_transport_server_packets" lineno="85211">
43832 <summary>
43833 Send sype_transport_server packets.
43834 </summary>
43835 @@ -63147,7 +62964,7 @@ Domain allowed access.
43836 </param>
43837 <infoflow type="write" weight="10"/>
43838 </interface>
43839 -<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="85107">
43840 +<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="85230">
43841 <summary>
43842 Do not audit attempts to send sype_transport_server packets.
43843 </summary>
43844 @@ -63158,7 +62975,7 @@ Domain to not audit.
43845 </param>
43846 <infoflow type="none"/>
43847 </interface>
43848 -<interface name="corenet_receive_sype_transport_server_packets" lineno="85126">
43849 +<interface name="corenet_receive_sype_transport_server_packets" lineno="85249">
43850 <summary>
43851 Receive sype_transport_server packets.
43852 </summary>
43853 @@ -63169,7 +62986,7 @@ Domain allowed access.
43854 </param>
43855 <infoflow type="read" weight="10"/>
43856 </interface>
43857 -<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="85145">
43858 +<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="85268">
43859 <summary>
43860 Do not audit attempts to receive sype_transport_server packets.
43861 </summary>
43862 @@ -63180,7 +62997,7 @@ Domain allowed access.
43863 </param>
43864 <infoflow type="none"/>
43865 </interface>
43866 -<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="85164">
43867 +<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="85287">
43868 <summary>
43869 Send and receive sype_transport_server packets.
43870 </summary>
43871 @@ -63191,7 +63008,7 @@ Domain allowed access.
43872 </param>
43873 <infoflow type="both" weight="10"/>
43874 </interface>
43875 -<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="85180">
43876 +<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="85303">
43877 <summary>
43878 Do not audit attempts to send and receive sype_transport_server packets.
43879 </summary>
43880 @@ -63202,7 +63019,7 @@ Domain to not audit.
43881 </param>
43882 <infoflow type="none"/>
43883 </interface>
43884 -<interface name="corenet_relabelto_sype_transport_server_packets" lineno="85195">
43885 +<interface name="corenet_relabelto_sype_transport_server_packets" lineno="85318">
43886 <summary>
43887 Relabel packets to sype_transport_server the packet type.
43888 </summary>
43889 @@ -63212,7 +63029,7 @@ Domain allowed access.
43890 </summary>
43891 </param>
43892 </interface>
43893 -<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="85217">
43894 +<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="85340">
43895 <summary>
43896 Send and receive TCP traffic on the syslogd port.
43897 </summary>
43898 @@ -63223,7 +63040,7 @@ Domain allowed access.
43899 </param>
43900 <infoflow type="both" weight="10"/>
43901 </interface>
43902 -<interface name="corenet_udp_send_syslogd_port" lineno="85232">
43903 +<interface name="corenet_udp_send_syslogd_port" lineno="85355">
43904 <summary>
43905 Send UDP traffic on the syslogd port.
43906 </summary>
43907 @@ -63234,7 +63051,7 @@ Domain allowed access.
43908 </param>
43909 <infoflow type="write" weight="10"/>
43910 </interface>
43911 -<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="85247">
43912 +<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="85370">
43913 <summary>
43914 Do not audit attempts to send UDP traffic on the syslogd port.
43915 </summary>
43916 @@ -63245,7 +63062,7 @@ Domain to not audit.
43917 </param>
43918 <infoflow type="none"/>
43919 </interface>
43920 -<interface name="corenet_udp_receive_syslogd_port" lineno="85262">
43921 +<interface name="corenet_udp_receive_syslogd_port" lineno="85385">
43922 <summary>
43923 Receive UDP traffic on the syslogd port.
43924 </summary>
43925 @@ -63256,7 +63073,7 @@ Domain allowed access.
43926 </param>
43927 <infoflow type="read" weight="10"/>
43928 </interface>
43929 -<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="85277">
43930 +<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="85400">
43931 <summary>
43932 Do not audit attempts to receive UDP traffic on the syslogd port.
43933 </summary>
43934 @@ -63267,7 +63084,7 @@ Domain to not audit.
43935 </param>
43936 <infoflow type="none"/>
43937 </interface>
43938 -<interface name="corenet_udp_sendrecv_syslogd_port" lineno="85292">
43939 +<interface name="corenet_udp_sendrecv_syslogd_port" lineno="85415">
43940 <summary>
43941 Send and receive UDP traffic on the syslogd port.
43942 </summary>
43943 @@ -63278,7 +63095,7 @@ Domain allowed access.
43944 </param>
43945 <infoflow type="both" weight="10"/>
43946 </interface>
43947 -<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="85308">
43948 +<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="85431">
43949 <summary>
43950 Do not audit attempts to send and receive
43951 UDP traffic on the syslogd port.
43952 @@ -63290,7 +63107,7 @@ Domain to not audit.
43953 </param>
43954 <infoflow type="none"/>
43955 </interface>
43956 -<interface name="corenet_tcp_bind_syslogd_port" lineno="85323">
43957 +<interface name="corenet_tcp_bind_syslogd_port" lineno="85446">
43958 <summary>
43959 Bind TCP sockets to the syslogd port.
43960 </summary>
43961 @@ -63301,7 +63118,7 @@ Domain allowed access.
43962 </param>
43963 <infoflow type="none"/>
43964 </interface>
43965 -<interface name="corenet_udp_bind_syslogd_port" lineno="85343">
43966 +<interface name="corenet_udp_bind_syslogd_port" lineno="85466">
43967 <summary>
43968 Bind UDP sockets to the syslogd port.
43969 </summary>
43970 @@ -63312,7 +63129,7 @@ Domain allowed access.
43971 </param>
43972 <infoflow type="none"/>
43973 </interface>
43974 -<interface name="corenet_tcp_connect_syslogd_port" lineno="85362">
43975 +<interface name="corenet_tcp_connect_syslogd_port" lineno="85485">
43976 <summary>
43977 Make a TCP connection to the syslogd port.
43978 </summary>
43979 @@ -63322,7 +63139,7 @@ Domain allowed access.
43980 </summary>
43981 </param>
43982 </interface>
43983 -<interface name="corenet_send_syslogd_client_packets" lineno="85382">
43984 +<interface name="corenet_send_syslogd_client_packets" lineno="85505">
43985 <summary>
43986 Send syslogd_client packets.
43987 </summary>
43988 @@ -63333,7 +63150,7 @@ Domain allowed access.
43989 </param>
43990 <infoflow type="write" weight="10"/>
43991 </interface>
43992 -<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="85401">
43993 +<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="85524">
43994 <summary>
43995 Do not audit attempts to send syslogd_client packets.
43996 </summary>
43997 @@ -63344,7 +63161,7 @@ Domain to not audit.
43998 </param>
43999 <infoflow type="none"/>
44000 </interface>
44001 -<interface name="corenet_receive_syslogd_client_packets" lineno="85420">
44002 +<interface name="corenet_receive_syslogd_client_packets" lineno="85543">
44003 <summary>
44004 Receive syslogd_client packets.
44005 </summary>
44006 @@ -63355,7 +63172,7 @@ Domain allowed access.
44007 </param>
44008 <infoflow type="read" weight="10"/>
44009 </interface>
44010 -<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="85439">
44011 +<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="85562">
44012 <summary>
44013 Do not audit attempts to receive syslogd_client packets.
44014 </summary>
44015 @@ -63366,7 +63183,7 @@ Domain allowed access.
44016 </param>
44017 <infoflow type="none"/>
44018 </interface>
44019 -<interface name="corenet_sendrecv_syslogd_client_packets" lineno="85458">
44020 +<interface name="corenet_sendrecv_syslogd_client_packets" lineno="85581">
44021 <summary>
44022 Send and receive syslogd_client packets.
44023 </summary>
44024 @@ -63377,7 +63194,7 @@ Domain allowed access.
44025 </param>
44026 <infoflow type="both" weight="10"/>
44027 </interface>
44028 -<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="85474">
44029 +<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="85597">
44030 <summary>
44031 Do not audit attempts to send and receive syslogd_client packets.
44032 </summary>
44033 @@ -63388,7 +63205,7 @@ Domain to not audit.
44034 </param>
44035 <infoflow type="none"/>
44036 </interface>
44037 -<interface name="corenet_relabelto_syslogd_client_packets" lineno="85489">
44038 +<interface name="corenet_relabelto_syslogd_client_packets" lineno="85612">
44039 <summary>
44040 Relabel packets to syslogd_client the packet type.
44041 </summary>
44042 @@ -63398,7 +63215,7 @@ Domain allowed access.
44043 </summary>
44044 </param>
44045 </interface>
44046 -<interface name="corenet_send_syslogd_server_packets" lineno="85509">
44047 +<interface name="corenet_send_syslogd_server_packets" lineno="85632">
44048 <summary>
44049 Send syslogd_server packets.
44050 </summary>
44051 @@ -63409,7 +63226,7 @@ Domain allowed access.
44052 </param>
44053 <infoflow type="write" weight="10"/>
44054 </interface>
44055 -<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="85528">
44056 +<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="85651">
44057 <summary>
44058 Do not audit attempts to send syslogd_server packets.
44059 </summary>
44060 @@ -63420,7 +63237,7 @@ Domain to not audit.
44061 </param>
44062 <infoflow type="none"/>
44063 </interface>
44064 -<interface name="corenet_receive_syslogd_server_packets" lineno="85547">
44065 +<interface name="corenet_receive_syslogd_server_packets" lineno="85670">
44066 <summary>
44067 Receive syslogd_server packets.
44068 </summary>
44069 @@ -63431,7 +63248,7 @@ Domain allowed access.
44070 </param>
44071 <infoflow type="read" weight="10"/>
44072 </interface>
44073 -<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="85566">
44074 +<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="85689">
44075 <summary>
44076 Do not audit attempts to receive syslogd_server packets.
44077 </summary>
44078 @@ -63442,7 +63259,7 @@ Domain allowed access.
44079 </param>
44080 <infoflow type="none"/>
44081 </interface>
44082 -<interface name="corenet_sendrecv_syslogd_server_packets" lineno="85585">
44083 +<interface name="corenet_sendrecv_syslogd_server_packets" lineno="85708">
44084 <summary>
44085 Send and receive syslogd_server packets.
44086 </summary>
44087 @@ -63453,7 +63270,7 @@ Domain allowed access.
44088 </param>
44089 <infoflow type="both" weight="10"/>
44090 </interface>
44091 -<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="85601">
44092 +<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="85724">
44093 <summary>
44094 Do not audit attempts to send and receive syslogd_server packets.
44095 </summary>
44096 @@ -63464,7 +63281,7 @@ Domain to not audit.
44097 </param>
44098 <infoflow type="none"/>
44099 </interface>
44100 -<interface name="corenet_relabelto_syslogd_server_packets" lineno="85616">
44101 +<interface name="corenet_relabelto_syslogd_server_packets" lineno="85739">
44102 <summary>
44103 Relabel packets to syslogd_server the packet type.
44104 </summary>
44105 @@ -63474,7 +63291,7 @@ Domain allowed access.
44106 </summary>
44107 </param>
44108 </interface>
44109 -<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="85638">
44110 +<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="85761">
44111 <summary>
44112 Send and receive TCP traffic on the syslog_tls port.
44113 </summary>
44114 @@ -63485,7 +63302,7 @@ Domain allowed access.
44115 </param>
44116 <infoflow type="both" weight="10"/>
44117 </interface>
44118 -<interface name="corenet_udp_send_syslog_tls_port" lineno="85653">
44119 +<interface name="corenet_udp_send_syslog_tls_port" lineno="85776">
44120 <summary>
44121 Send UDP traffic on the syslog_tls port.
44122 </summary>
44123 @@ -63496,7 +63313,7 @@ Domain allowed access.
44124 </param>
44125 <infoflow type="write" weight="10"/>
44126 </interface>
44127 -<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="85668">
44128 +<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="85791">
44129 <summary>
44130 Do not audit attempts to send UDP traffic on the syslog_tls port.
44131 </summary>
44132 @@ -63507,7 +63324,7 @@ Domain to not audit.
44133 </param>
44134 <infoflow type="none"/>
44135 </interface>
44136 -<interface name="corenet_udp_receive_syslog_tls_port" lineno="85683">
44137 +<interface name="corenet_udp_receive_syslog_tls_port" lineno="85806">
44138 <summary>
44139 Receive UDP traffic on the syslog_tls port.
44140 </summary>
44141 @@ -63518,7 +63335,7 @@ Domain allowed access.
44142 </param>
44143 <infoflow type="read" weight="10"/>
44144 </interface>
44145 -<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="85698">
44146 +<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="85821">
44147 <summary>
44148 Do not audit attempts to receive UDP traffic on the syslog_tls port.
44149 </summary>
44150 @@ -63529,7 +63346,7 @@ Domain to not audit.
44151 </param>
44152 <infoflow type="none"/>
44153 </interface>
44154 -<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="85713">
44155 +<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="85836">
44156 <summary>
44157 Send and receive UDP traffic on the syslog_tls port.
44158 </summary>
44159 @@ -63540,7 +63357,7 @@ Domain allowed access.
44160 </param>
44161 <infoflow type="both" weight="10"/>
44162 </interface>
44163 -<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="85729">
44164 +<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="85852">
44165 <summary>
44166 Do not audit attempts to send and receive
44167 UDP traffic on the syslog_tls port.
44168 @@ -63552,7 +63369,7 @@ Domain to not audit.
44169 </param>
44170 <infoflow type="none"/>
44171 </interface>
44172 -<interface name="corenet_tcp_bind_syslog_tls_port" lineno="85744">
44173 +<interface name="corenet_tcp_bind_syslog_tls_port" lineno="85867">
44174 <summary>
44175 Bind TCP sockets to the syslog_tls port.
44176 </summary>
44177 @@ -63563,7 +63380,7 @@ Domain allowed access.
44178 </param>
44179 <infoflow type="none"/>
44180 </interface>
44181 -<interface name="corenet_udp_bind_syslog_tls_port" lineno="85764">
44182 +<interface name="corenet_udp_bind_syslog_tls_port" lineno="85887">
44183 <summary>
44184 Bind UDP sockets to the syslog_tls port.
44185 </summary>
44186 @@ -63574,7 +63391,7 @@ Domain allowed access.
44187 </param>
44188 <infoflow type="none"/>
44189 </interface>
44190 -<interface name="corenet_tcp_connect_syslog_tls_port" lineno="85783">
44191 +<interface name="corenet_tcp_connect_syslog_tls_port" lineno="85906">
44192 <summary>
44193 Make a TCP connection to the syslog_tls port.
44194 </summary>
44195 @@ -63584,7 +63401,7 @@ Domain allowed access.
44196 </summary>
44197 </param>
44198 </interface>
44199 -<interface name="corenet_send_syslog_tls_client_packets" lineno="85803">
44200 +<interface name="corenet_send_syslog_tls_client_packets" lineno="85926">
44201 <summary>
44202 Send syslog_tls_client packets.
44203 </summary>
44204 @@ -63595,7 +63412,7 @@ Domain allowed access.
44205 </param>
44206 <infoflow type="write" weight="10"/>
44207 </interface>
44208 -<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="85822">
44209 +<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="85945">
44210 <summary>
44211 Do not audit attempts to send syslog_tls_client packets.
44212 </summary>
44213 @@ -63606,7 +63423,7 @@ Domain to not audit.
44214 </param>
44215 <infoflow type="none"/>
44216 </interface>
44217 -<interface name="corenet_receive_syslog_tls_client_packets" lineno="85841">
44218 +<interface name="corenet_receive_syslog_tls_client_packets" lineno="85964">
44219 <summary>
44220 Receive syslog_tls_client packets.
44221 </summary>
44222 @@ -63617,7 +63434,7 @@ Domain allowed access.
44223 </param>
44224 <infoflow type="read" weight="10"/>
44225 </interface>
44226 -<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="85860">
44227 +<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="85983">
44228 <summary>
44229 Do not audit attempts to receive syslog_tls_client packets.
44230 </summary>
44231 @@ -63628,7 +63445,7 @@ Domain allowed access.
44232 </param>
44233 <infoflow type="none"/>
44234 </interface>
44235 -<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="85879">
44236 +<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="86002">
44237 <summary>
44238 Send and receive syslog_tls_client packets.
44239 </summary>
44240 @@ -63639,7 +63456,7 @@ Domain allowed access.
44241 </param>
44242 <infoflow type="both" weight="10"/>
44243 </interface>
44244 -<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="85895">
44245 +<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="86018">
44246 <summary>
44247 Do not audit attempts to send and receive syslog_tls_client packets.
44248 </summary>
44249 @@ -63650,7 +63467,7 @@ Domain to not audit.
44250 </param>
44251 <infoflow type="none"/>
44252 </interface>
44253 -<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="85910">
44254 +<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="86033">
44255 <summary>
44256 Relabel packets to syslog_tls_client the packet type.
44257 </summary>
44258 @@ -63660,7 +63477,7 @@ Domain allowed access.
44259 </summary>
44260 </param>
44261 </interface>
44262 -<interface name="corenet_send_syslog_tls_server_packets" lineno="85930">
44263 +<interface name="corenet_send_syslog_tls_server_packets" lineno="86053">
44264 <summary>
44265 Send syslog_tls_server packets.
44266 </summary>
44267 @@ -63671,7 +63488,7 @@ Domain allowed access.
44268 </param>
44269 <infoflow type="write" weight="10"/>
44270 </interface>
44271 -<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="85949">
44272 +<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="86072">
44273 <summary>
44274 Do not audit attempts to send syslog_tls_server packets.
44275 </summary>
44276 @@ -63682,7 +63499,7 @@ Domain to not audit.
44277 </param>
44278 <infoflow type="none"/>
44279 </interface>
44280 -<interface name="corenet_receive_syslog_tls_server_packets" lineno="85968">
44281 +<interface name="corenet_receive_syslog_tls_server_packets" lineno="86091">
44282 <summary>
44283 Receive syslog_tls_server packets.
44284 </summary>
44285 @@ -63693,7 +63510,7 @@ Domain allowed access.
44286 </param>
44287 <infoflow type="read" weight="10"/>
44288 </interface>
44289 -<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="85987">
44290 +<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="86110">
44291 <summary>
44292 Do not audit attempts to receive syslog_tls_server packets.
44293 </summary>
44294 @@ -63704,7 +63521,7 @@ Domain allowed access.
44295 </param>
44296 <infoflow type="none"/>
44297 </interface>
44298 -<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="86006">
44299 +<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="86129">
44300 <summary>
44301 Send and receive syslog_tls_server packets.
44302 </summary>
44303 @@ -63715,7 +63532,7 @@ Domain allowed access.
44304 </param>
44305 <infoflow type="both" weight="10"/>
44306 </interface>
44307 -<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="86022">
44308 +<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="86145">
44309 <summary>
44310 Do not audit attempts to send and receive syslog_tls_server packets.
44311 </summary>
44312 @@ -63726,7 +63543,7 @@ Domain to not audit.
44313 </param>
44314 <infoflow type="none"/>
44315 </interface>
44316 -<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="86037">
44317 +<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="86160">
44318 <summary>
44319 Relabel packets to syslog_tls_server the packet type.
44320 </summary>
44321 @@ -63736,7 +63553,7 @@ Domain allowed access.
44322 </summary>
44323 </param>
44324 </interface>
44325 -<interface name="corenet_tcp_sendrecv_tcs_port" lineno="86059">
44326 +<interface name="corenet_tcp_sendrecv_tcs_port" lineno="86182">
44327 <summary>
44328 Send and receive TCP traffic on the tcs port.
44329 </summary>
44330 @@ -63747,7 +63564,7 @@ Domain allowed access.
44331 </param>
44332 <infoflow type="both" weight="10"/>
44333 </interface>
44334 -<interface name="corenet_udp_send_tcs_port" lineno="86074">
44335 +<interface name="corenet_udp_send_tcs_port" lineno="86197">
44336 <summary>
44337 Send UDP traffic on the tcs port.
44338 </summary>
44339 @@ -63758,7 +63575,7 @@ Domain allowed access.
44340 </param>
44341 <infoflow type="write" weight="10"/>
44342 </interface>
44343 -<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="86089">
44344 +<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="86212">
44345 <summary>
44346 Do not audit attempts to send UDP traffic on the tcs port.
44347 </summary>
44348 @@ -63769,7 +63586,7 @@ Domain to not audit.
44349 </param>
44350 <infoflow type="none"/>
44351 </interface>
44352 -<interface name="corenet_udp_receive_tcs_port" lineno="86104">
44353 +<interface name="corenet_udp_receive_tcs_port" lineno="86227">
44354 <summary>
44355 Receive UDP traffic on the tcs port.
44356 </summary>
44357 @@ -63780,7 +63597,7 @@ Domain allowed access.
44358 </param>
44359 <infoflow type="read" weight="10"/>
44360 </interface>
44361 -<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="86119">
44362 +<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="86242">
44363 <summary>
44364 Do not audit attempts to receive UDP traffic on the tcs port.
44365 </summary>
44366 @@ -63791,7 +63608,7 @@ Domain to not audit.
44367 </param>
44368 <infoflow type="none"/>
44369 </interface>
44370 -<interface name="corenet_udp_sendrecv_tcs_port" lineno="86134">
44371 +<interface name="corenet_udp_sendrecv_tcs_port" lineno="86257">
44372 <summary>
44373 Send and receive UDP traffic on the tcs port.
44374 </summary>
44375 @@ -63802,7 +63619,7 @@ Domain allowed access.
44376 </param>
44377 <infoflow type="both" weight="10"/>
44378 </interface>
44379 -<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="86150">
44380 +<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="86273">
44381 <summary>
44382 Do not audit attempts to send and receive
44383 UDP traffic on the tcs port.
44384 @@ -63814,7 +63631,7 @@ Domain to not audit.
44385 </param>
44386 <infoflow type="none"/>
44387 </interface>
44388 -<interface name="corenet_tcp_bind_tcs_port" lineno="86165">
44389 +<interface name="corenet_tcp_bind_tcs_port" lineno="86288">
44390 <summary>
44391 Bind TCP sockets to the tcs port.
44392 </summary>
44393 @@ -63825,7 +63642,7 @@ Domain allowed access.
44394 </param>
44395 <infoflow type="none"/>
44396 </interface>
44397 -<interface name="corenet_udp_bind_tcs_port" lineno="86185">
44398 +<interface name="corenet_udp_bind_tcs_port" lineno="86308">
44399 <summary>
44400 Bind UDP sockets to the tcs port.
44401 </summary>
44402 @@ -63836,7 +63653,7 @@ Domain allowed access.
44403 </param>
44404 <infoflow type="none"/>
44405 </interface>
44406 -<interface name="corenet_tcp_connect_tcs_port" lineno="86204">
44407 +<interface name="corenet_tcp_connect_tcs_port" lineno="86327">
44408 <summary>
44409 Make a TCP connection to the tcs port.
44410 </summary>
44411 @@ -63846,7 +63663,7 @@ Domain allowed access.
44412 </summary>
44413 </param>
44414 </interface>
44415 -<interface name="corenet_send_tcs_client_packets" lineno="86224">
44416 +<interface name="corenet_send_tcs_client_packets" lineno="86347">
44417 <summary>
44418 Send tcs_client packets.
44419 </summary>
44420 @@ -63857,7 +63674,7 @@ Domain allowed access.
44421 </param>
44422 <infoflow type="write" weight="10"/>
44423 </interface>
44424 -<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="86243">
44425 +<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="86366">
44426 <summary>
44427 Do not audit attempts to send tcs_client packets.
44428 </summary>
44429 @@ -63868,7 +63685,7 @@ Domain to not audit.
44430 </param>
44431 <infoflow type="none"/>
44432 </interface>
44433 -<interface name="corenet_receive_tcs_client_packets" lineno="86262">
44434 +<interface name="corenet_receive_tcs_client_packets" lineno="86385">
44435 <summary>
44436 Receive tcs_client packets.
44437 </summary>
44438 @@ -63879,7 +63696,7 @@ Domain allowed access.
44439 </param>
44440 <infoflow type="read" weight="10"/>
44441 </interface>
44442 -<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="86281">
44443 +<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="86404">
44444 <summary>
44445 Do not audit attempts to receive tcs_client packets.
44446 </summary>
44447 @@ -63890,7 +63707,7 @@ Domain allowed access.
44448 </param>
44449 <infoflow type="none"/>
44450 </interface>
44451 -<interface name="corenet_sendrecv_tcs_client_packets" lineno="86300">
44452 +<interface name="corenet_sendrecv_tcs_client_packets" lineno="86423">
44453 <summary>
44454 Send and receive tcs_client packets.
44455 </summary>
44456 @@ -63901,7 +63718,7 @@ Domain allowed access.
44457 </param>
44458 <infoflow type="both" weight="10"/>
44459 </interface>
44460 -<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="86316">
44461 +<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="86439">
44462 <summary>
44463 Do not audit attempts to send and receive tcs_client packets.
44464 </summary>
44465 @@ -63912,7 +63729,7 @@ Domain to not audit.
44466 </param>
44467 <infoflow type="none"/>
44468 </interface>
44469 -<interface name="corenet_relabelto_tcs_client_packets" lineno="86331">
44470 +<interface name="corenet_relabelto_tcs_client_packets" lineno="86454">
44471 <summary>
44472 Relabel packets to tcs_client the packet type.
44473 </summary>
44474 @@ -63922,7 +63739,7 @@ Domain allowed access.
44475 </summary>
44476 </param>
44477 </interface>
44478 -<interface name="corenet_send_tcs_server_packets" lineno="86351">
44479 +<interface name="corenet_send_tcs_server_packets" lineno="86474">
44480 <summary>
44481 Send tcs_server packets.
44482 </summary>
44483 @@ -63933,7 +63750,7 @@ Domain allowed access.
44484 </param>
44485 <infoflow type="write" weight="10"/>
44486 </interface>
44487 -<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="86370">
44488 +<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="86493">
44489 <summary>
44490 Do not audit attempts to send tcs_server packets.
44491 </summary>
44492 @@ -63944,7 +63761,7 @@ Domain to not audit.
44493 </param>
44494 <infoflow type="none"/>
44495 </interface>
44496 -<interface name="corenet_receive_tcs_server_packets" lineno="86389">
44497 +<interface name="corenet_receive_tcs_server_packets" lineno="86512">
44498 <summary>
44499 Receive tcs_server packets.
44500 </summary>
44501 @@ -63955,7 +63772,7 @@ Domain allowed access.
44502 </param>
44503 <infoflow type="read" weight="10"/>
44504 </interface>
44505 -<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="86408">
44506 +<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="86531">
44507 <summary>
44508 Do not audit attempts to receive tcs_server packets.
44509 </summary>
44510 @@ -63966,7 +63783,7 @@ Domain allowed access.
44511 </param>
44512 <infoflow type="none"/>
44513 </interface>
44514 -<interface name="corenet_sendrecv_tcs_server_packets" lineno="86427">
44515 +<interface name="corenet_sendrecv_tcs_server_packets" lineno="86550">
44516 <summary>
44517 Send and receive tcs_server packets.
44518 </summary>
44519 @@ -63977,7 +63794,7 @@ Domain allowed access.
44520 </param>
44521 <infoflow type="both" weight="10"/>
44522 </interface>
44523 -<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="86443">
44524 +<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="86566">
44525 <summary>
44526 Do not audit attempts to send and receive tcs_server packets.
44527 </summary>
44528 @@ -63988,7 +63805,7 @@ Domain to not audit.
44529 </param>
44530 <infoflow type="none"/>
44531 </interface>
44532 -<interface name="corenet_relabelto_tcs_server_packets" lineno="86458">
44533 +<interface name="corenet_relabelto_tcs_server_packets" lineno="86581">
44534 <summary>
44535 Relabel packets to tcs_server the packet type.
44536 </summary>
44537 @@ -63998,7 +63815,7 @@ Domain allowed access.
44538 </summary>
44539 </param>
44540 </interface>
44541 -<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="86480">
44542 +<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="86603">
44543 <summary>
44544 Send and receive TCP traffic on the telnetd port.
44545 </summary>
44546 @@ -64009,7 +63826,7 @@ Domain allowed access.
44547 </param>
44548 <infoflow type="both" weight="10"/>
44549 </interface>
44550 -<interface name="corenet_udp_send_telnetd_port" lineno="86495">
44551 +<interface name="corenet_udp_send_telnetd_port" lineno="86618">
44552 <summary>
44553 Send UDP traffic on the telnetd port.
44554 </summary>
44555 @@ -64020,7 +63837,7 @@ Domain allowed access.
44556 </param>
44557 <infoflow type="write" weight="10"/>
44558 </interface>
44559 -<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="86510">
44560 +<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="86633">
44561 <summary>
44562 Do not audit attempts to send UDP traffic on the telnetd port.
44563 </summary>
44564 @@ -64031,7 +63848,7 @@ Domain to not audit.
44565 </param>
44566 <infoflow type="none"/>
44567 </interface>
44568 -<interface name="corenet_udp_receive_telnetd_port" lineno="86525">
44569 +<interface name="corenet_udp_receive_telnetd_port" lineno="86648">
44570 <summary>
44571 Receive UDP traffic on the telnetd port.
44572 </summary>
44573 @@ -64042,7 +63859,7 @@ Domain allowed access.
44574 </param>
44575 <infoflow type="read" weight="10"/>
44576 </interface>
44577 -<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="86540">
44578 +<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="86663">
44579 <summary>
44580 Do not audit attempts to receive UDP traffic on the telnetd port.
44581 </summary>
44582 @@ -64053,7 +63870,7 @@ Domain to not audit.
44583 </param>
44584 <infoflow type="none"/>
44585 </interface>
44586 -<interface name="corenet_udp_sendrecv_telnetd_port" lineno="86555">
44587 +<interface name="corenet_udp_sendrecv_telnetd_port" lineno="86678">
44588 <summary>
44589 Send and receive UDP traffic on the telnetd port.
44590 </summary>
44591 @@ -64064,7 +63881,7 @@ Domain allowed access.
44592 </param>
44593 <infoflow type="both" weight="10"/>
44594 </interface>
44595 -<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="86571">
44596 +<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="86694">
44597 <summary>
44598 Do not audit attempts to send and receive
44599 UDP traffic on the telnetd port.
44600 @@ -64076,7 +63893,7 @@ Domain to not audit.
44601 </param>
44602 <infoflow type="none"/>
44603 </interface>
44604 -<interface name="corenet_tcp_bind_telnetd_port" lineno="86586">
44605 +<interface name="corenet_tcp_bind_telnetd_port" lineno="86709">
44606 <summary>
44607 Bind TCP sockets to the telnetd port.
44608 </summary>
44609 @@ -64087,7 +63904,7 @@ Domain allowed access.
44610 </param>
44611 <infoflow type="none"/>
44612 </interface>
44613 -<interface name="corenet_udp_bind_telnetd_port" lineno="86606">
44614 +<interface name="corenet_udp_bind_telnetd_port" lineno="86729">
44615 <summary>
44616 Bind UDP sockets to the telnetd port.
44617 </summary>
44618 @@ -64098,7 +63915,7 @@ Domain allowed access.
44619 </param>
44620 <infoflow type="none"/>
44621 </interface>
44622 -<interface name="corenet_tcp_connect_telnetd_port" lineno="86625">
44623 +<interface name="corenet_tcp_connect_telnetd_port" lineno="86748">
44624 <summary>
44625 Make a TCP connection to the telnetd port.
44626 </summary>
44627 @@ -64108,7 +63925,7 @@ Domain allowed access.
44628 </summary>
44629 </param>
44630 </interface>
44631 -<interface name="corenet_send_telnetd_client_packets" lineno="86645">
44632 +<interface name="corenet_send_telnetd_client_packets" lineno="86768">
44633 <summary>
44634 Send telnetd_client packets.
44635 </summary>
44636 @@ -64119,7 +63936,7 @@ Domain allowed access.
44637 </param>
44638 <infoflow type="write" weight="10"/>
44639 </interface>
44640 -<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="86664">
44641 +<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="86787">
44642 <summary>
44643 Do not audit attempts to send telnetd_client packets.
44644 </summary>
44645 @@ -64130,7 +63947,7 @@ Domain to not audit.
44646 </param>
44647 <infoflow type="none"/>
44648 </interface>
44649 -<interface name="corenet_receive_telnetd_client_packets" lineno="86683">
44650 +<interface name="corenet_receive_telnetd_client_packets" lineno="86806">
44651 <summary>
44652 Receive telnetd_client packets.
44653 </summary>
44654 @@ -64141,7 +63958,7 @@ Domain allowed access.
44655 </param>
44656 <infoflow type="read" weight="10"/>
44657 </interface>
44658 -<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="86702">
44659 +<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="86825">
44660 <summary>
44661 Do not audit attempts to receive telnetd_client packets.
44662 </summary>
44663 @@ -64152,7 +63969,7 @@ Domain allowed access.
44664 </param>
44665 <infoflow type="none"/>
44666 </interface>
44667 -<interface name="corenet_sendrecv_telnetd_client_packets" lineno="86721">
44668 +<interface name="corenet_sendrecv_telnetd_client_packets" lineno="86844">
44669 <summary>
44670 Send and receive telnetd_client packets.
44671 </summary>
44672 @@ -64163,7 +63980,7 @@ Domain allowed access.
44673 </param>
44674 <infoflow type="both" weight="10"/>
44675 </interface>
44676 -<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="86737">
44677 +<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="86860">
44678 <summary>
44679 Do not audit attempts to send and receive telnetd_client packets.
44680 </summary>
44681 @@ -64174,7 +63991,7 @@ Domain to not audit.
44682 </param>
44683 <infoflow type="none"/>
44684 </interface>
44685 -<interface name="corenet_relabelto_telnetd_client_packets" lineno="86752">
44686 +<interface name="corenet_relabelto_telnetd_client_packets" lineno="86875">
44687 <summary>
44688 Relabel packets to telnetd_client the packet type.
44689 </summary>
44690 @@ -64184,7 +64001,7 @@ Domain allowed access.
44691 </summary>
44692 </param>
44693 </interface>
44694 -<interface name="corenet_send_telnetd_server_packets" lineno="86772">
44695 +<interface name="corenet_send_telnetd_server_packets" lineno="86895">
44696 <summary>
44697 Send telnetd_server packets.
44698 </summary>
44699 @@ -64195,7 +64012,7 @@ Domain allowed access.
44700 </param>
44701 <infoflow type="write" weight="10"/>
44702 </interface>
44703 -<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="86791">
44704 +<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="86914">
44705 <summary>
44706 Do not audit attempts to send telnetd_server packets.
44707 </summary>
44708 @@ -64206,7 +64023,7 @@ Domain to not audit.
44709 </param>
44710 <infoflow type="none"/>
44711 </interface>
44712 -<interface name="corenet_receive_telnetd_server_packets" lineno="86810">
44713 +<interface name="corenet_receive_telnetd_server_packets" lineno="86933">
44714 <summary>
44715 Receive telnetd_server packets.
44716 </summary>
44717 @@ -64217,7 +64034,7 @@ Domain allowed access.
44718 </param>
44719 <infoflow type="read" weight="10"/>
44720 </interface>
44721 -<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="86829">
44722 +<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="86952">
44723 <summary>
44724 Do not audit attempts to receive telnetd_server packets.
44725 </summary>
44726 @@ -64228,7 +64045,7 @@ Domain allowed access.
44727 </param>
44728 <infoflow type="none"/>
44729 </interface>
44730 -<interface name="corenet_sendrecv_telnetd_server_packets" lineno="86848">
44731 +<interface name="corenet_sendrecv_telnetd_server_packets" lineno="86971">
44732 <summary>
44733 Send and receive telnetd_server packets.
44734 </summary>
44735 @@ -64239,7 +64056,7 @@ Domain allowed access.
44736 </param>
44737 <infoflow type="both" weight="10"/>
44738 </interface>
44739 -<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="86864">
44740 +<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="86987">
44741 <summary>
44742 Do not audit attempts to send and receive telnetd_server packets.
44743 </summary>
44744 @@ -64250,7 +64067,7 @@ Domain to not audit.
44745 </param>
44746 <infoflow type="none"/>
44747 </interface>
44748 -<interface name="corenet_relabelto_telnetd_server_packets" lineno="86879">
44749 +<interface name="corenet_relabelto_telnetd_server_packets" lineno="87002">
44750 <summary>
44751 Relabel packets to telnetd_server the packet type.
44752 </summary>
44753 @@ -64260,7 +64077,7 @@ Domain allowed access.
44754 </summary>
44755 </param>
44756 </interface>
44757 -<interface name="corenet_tcp_sendrecv_tftp_port" lineno="86901">
44758 +<interface name="corenet_tcp_sendrecv_tftp_port" lineno="87024">
44759 <summary>
44760 Send and receive TCP traffic on the tftp port.
44761 </summary>
44762 @@ -64271,7 +64088,7 @@ Domain allowed access.
44763 </param>
44764 <infoflow type="both" weight="10"/>
44765 </interface>
44766 -<interface name="corenet_udp_send_tftp_port" lineno="86916">
44767 +<interface name="corenet_udp_send_tftp_port" lineno="87039">
44768 <summary>
44769 Send UDP traffic on the tftp port.
44770 </summary>
44771 @@ -64282,7 +64099,7 @@ Domain allowed access.
44772 </param>
44773 <infoflow type="write" weight="10"/>
44774 </interface>
44775 -<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="86931">
44776 +<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="87054">
44777 <summary>
44778 Do not audit attempts to send UDP traffic on the tftp port.
44779 </summary>
44780 @@ -64293,7 +64110,7 @@ Domain to not audit.
44781 </param>
44782 <infoflow type="none"/>
44783 </interface>
44784 -<interface name="corenet_udp_receive_tftp_port" lineno="86946">
44785 +<interface name="corenet_udp_receive_tftp_port" lineno="87069">
44786 <summary>
44787 Receive UDP traffic on the tftp port.
44788 </summary>
44789 @@ -64304,7 +64121,7 @@ Domain allowed access.
44790 </param>
44791 <infoflow type="read" weight="10"/>
44792 </interface>
44793 -<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="86961">
44794 +<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="87084">
44795 <summary>
44796 Do not audit attempts to receive UDP traffic on the tftp port.
44797 </summary>
44798 @@ -64315,7 +64132,7 @@ Domain to not audit.
44799 </param>
44800 <infoflow type="none"/>
44801 </interface>
44802 -<interface name="corenet_udp_sendrecv_tftp_port" lineno="86976">
44803 +<interface name="corenet_udp_sendrecv_tftp_port" lineno="87099">
44804 <summary>
44805 Send and receive UDP traffic on the tftp port.
44806 </summary>
44807 @@ -64326,7 +64143,7 @@ Domain allowed access.
44808 </param>
44809 <infoflow type="both" weight="10"/>
44810 </interface>
44811 -<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="86992">
44812 +<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="87115">
44813 <summary>
44814 Do not audit attempts to send and receive
44815 UDP traffic on the tftp port.
44816 @@ -64338,7 +64155,7 @@ Domain to not audit.
44817 </param>
44818 <infoflow type="none"/>
44819 </interface>
44820 -<interface name="corenet_tcp_bind_tftp_port" lineno="87007">
44821 +<interface name="corenet_tcp_bind_tftp_port" lineno="87130">
44822 <summary>
44823 Bind TCP sockets to the tftp port.
44824 </summary>
44825 @@ -64349,7 +64166,7 @@ Domain allowed access.
44826 </param>
44827 <infoflow type="none"/>
44828 </interface>
44829 -<interface name="corenet_udp_bind_tftp_port" lineno="87027">
44830 +<interface name="corenet_udp_bind_tftp_port" lineno="87150">
44831 <summary>
44832 Bind UDP sockets to the tftp port.
44833 </summary>
44834 @@ -64360,7 +64177,7 @@ Domain allowed access.
44835 </param>
44836 <infoflow type="none"/>
44837 </interface>
44838 -<interface name="corenet_tcp_connect_tftp_port" lineno="87046">
44839 +<interface name="corenet_tcp_connect_tftp_port" lineno="87169">
44840 <summary>
44841 Make a TCP connection to the tftp port.
44842 </summary>
44843 @@ -64370,7 +64187,7 @@ Domain allowed access.
44844 </summary>
44845 </param>
44846 </interface>
44847 -<interface name="corenet_send_tftp_client_packets" lineno="87066">
44848 +<interface name="corenet_send_tftp_client_packets" lineno="87189">
44849 <summary>
44850 Send tftp_client packets.
44851 </summary>
44852 @@ -64381,7 +64198,7 @@ Domain allowed access.
44853 </param>
44854 <infoflow type="write" weight="10"/>
44855 </interface>
44856 -<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="87085">
44857 +<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="87208">
44858 <summary>
44859 Do not audit attempts to send tftp_client packets.
44860 </summary>
44861 @@ -64392,7 +64209,7 @@ Domain to not audit.
44862 </param>
44863 <infoflow type="none"/>
44864 </interface>
44865 -<interface name="corenet_receive_tftp_client_packets" lineno="87104">
44866 +<interface name="corenet_receive_tftp_client_packets" lineno="87227">
44867 <summary>
44868 Receive tftp_client packets.
44869 </summary>
44870 @@ -64403,7 +64220,7 @@ Domain allowed access.
44871 </param>
44872 <infoflow type="read" weight="10"/>
44873 </interface>
44874 -<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="87123">
44875 +<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="87246">
44876 <summary>
44877 Do not audit attempts to receive tftp_client packets.
44878 </summary>
44879 @@ -64414,7 +64231,7 @@ Domain allowed access.
44880 </param>
44881 <infoflow type="none"/>
44882 </interface>
44883 -<interface name="corenet_sendrecv_tftp_client_packets" lineno="87142">
44884 +<interface name="corenet_sendrecv_tftp_client_packets" lineno="87265">
44885 <summary>
44886 Send and receive tftp_client packets.
44887 </summary>
44888 @@ -64425,7 +64242,7 @@ Domain allowed access.
44889 </param>
44890 <infoflow type="both" weight="10"/>
44891 </interface>
44892 -<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="87158">
44893 +<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="87281">
44894 <summary>
44895 Do not audit attempts to send and receive tftp_client packets.
44896 </summary>
44897 @@ -64436,7 +64253,7 @@ Domain to not audit.
44898 </param>
44899 <infoflow type="none"/>
44900 </interface>
44901 -<interface name="corenet_relabelto_tftp_client_packets" lineno="87173">
44902 +<interface name="corenet_relabelto_tftp_client_packets" lineno="87296">
44903 <summary>
44904 Relabel packets to tftp_client the packet type.
44905 </summary>
44906 @@ -64446,7 +64263,7 @@ Domain allowed access.
44907 </summary>
44908 </param>
44909 </interface>
44910 -<interface name="corenet_send_tftp_server_packets" lineno="87193">
44911 +<interface name="corenet_send_tftp_server_packets" lineno="87316">
44912 <summary>
44913 Send tftp_server packets.
44914 </summary>
44915 @@ -64457,7 +64274,7 @@ Domain allowed access.
44916 </param>
44917 <infoflow type="write" weight="10"/>
44918 </interface>
44919 -<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="87212">
44920 +<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="87335">
44921 <summary>
44922 Do not audit attempts to send tftp_server packets.
44923 </summary>
44924 @@ -64468,7 +64285,7 @@ Domain to not audit.
44925 </param>
44926 <infoflow type="none"/>
44927 </interface>
44928 -<interface name="corenet_receive_tftp_server_packets" lineno="87231">
44929 +<interface name="corenet_receive_tftp_server_packets" lineno="87354">
44930 <summary>
44931 Receive tftp_server packets.
44932 </summary>
44933 @@ -64479,7 +64296,7 @@ Domain allowed access.
44934 </param>
44935 <infoflow type="read" weight="10"/>
44936 </interface>
44937 -<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="87250">
44938 +<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="87373">
44939 <summary>
44940 Do not audit attempts to receive tftp_server packets.
44941 </summary>
44942 @@ -64490,7 +64307,7 @@ Domain allowed access.
44943 </param>
44944 <infoflow type="none"/>
44945 </interface>
44946 -<interface name="corenet_sendrecv_tftp_server_packets" lineno="87269">
44947 +<interface name="corenet_sendrecv_tftp_server_packets" lineno="87392">
44948 <summary>
44949 Send and receive tftp_server packets.
44950 </summary>
44951 @@ -64501,7 +64318,7 @@ Domain allowed access.
44952 </param>
44953 <infoflow type="both" weight="10"/>
44954 </interface>
44955 -<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="87285">
44956 +<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="87408">
44957 <summary>
44958 Do not audit attempts to send and receive tftp_server packets.
44959 </summary>
44960 @@ -64512,7 +64329,7 @@ Domain to not audit.
44961 </param>
44962 <infoflow type="none"/>
44963 </interface>
44964 -<interface name="corenet_relabelto_tftp_server_packets" lineno="87300">
44965 +<interface name="corenet_relabelto_tftp_server_packets" lineno="87423">
44966 <summary>
44967 Relabel packets to tftp_server the packet type.
44968 </summary>
44969 @@ -64522,7 +64339,7 @@ Domain allowed access.
44970 </summary>
44971 </param>
44972 </interface>
44973 -<interface name="corenet_tcp_sendrecv_tor_port" lineno="87322">
44974 +<interface name="corenet_tcp_sendrecv_tor_port" lineno="87445">
44975 <summary>
44976 Send and receive TCP traffic on the tor port.
44977 </summary>
44978 @@ -64533,7 +64350,7 @@ Domain allowed access.
44979 </param>
44980 <infoflow type="both" weight="10"/>
44981 </interface>
44982 -<interface name="corenet_udp_send_tor_port" lineno="87337">
44983 +<interface name="corenet_udp_send_tor_port" lineno="87460">
44984 <summary>
44985 Send UDP traffic on the tor port.
44986 </summary>
44987 @@ -64544,7 +64361,7 @@ Domain allowed access.
44988 </param>
44989 <infoflow type="write" weight="10"/>
44990 </interface>
44991 -<interface name="corenet_dontaudit_udp_send_tor_port" lineno="87352">
44992 +<interface name="corenet_dontaudit_udp_send_tor_port" lineno="87475">
44993 <summary>
44994 Do not audit attempts to send UDP traffic on the tor port.
44995 </summary>
44996 @@ -64555,7 +64372,7 @@ Domain to not audit.
44997 </param>
44998 <infoflow type="none"/>
44999 </interface>
45000 -<interface name="corenet_udp_receive_tor_port" lineno="87367">
45001 +<interface name="corenet_udp_receive_tor_port" lineno="87490">
45002 <summary>
45003 Receive UDP traffic on the tor port.
45004 </summary>
45005 @@ -64566,7 +64383,7 @@ Domain allowed access.
45006 </param>
45007 <infoflow type="read" weight="10"/>
45008 </interface>
45009 -<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="87382">
45010 +<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="87505">
45011 <summary>
45012 Do not audit attempts to receive UDP traffic on the tor port.
45013 </summary>
45014 @@ -64577,7 +64394,7 @@ Domain to not audit.
45015 </param>
45016 <infoflow type="none"/>
45017 </interface>
45018 -<interface name="corenet_udp_sendrecv_tor_port" lineno="87397">
45019 +<interface name="corenet_udp_sendrecv_tor_port" lineno="87520">
45020 <summary>
45021 Send and receive UDP traffic on the tor port.
45022 </summary>
45023 @@ -64588,7 +64405,7 @@ Domain allowed access.
45024 </param>
45025 <infoflow type="both" weight="10"/>
45026 </interface>
45027 -<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="87413">
45028 +<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="87536">
45029 <summary>
45030 Do not audit attempts to send and receive
45031 UDP traffic on the tor port.
45032 @@ -64600,7 +64417,7 @@ Domain to not audit.
45033 </param>
45034 <infoflow type="none"/>
45035 </interface>
45036 -<interface name="corenet_tcp_bind_tor_port" lineno="87428">
45037 +<interface name="corenet_tcp_bind_tor_port" lineno="87551">
45038 <summary>
45039 Bind TCP sockets to the tor port.
45040 </summary>
45041 @@ -64611,7 +64428,7 @@ Domain allowed access.
45042 </param>
45043 <infoflow type="none"/>
45044 </interface>
45045 -<interface name="corenet_udp_bind_tor_port" lineno="87448">
45046 +<interface name="corenet_udp_bind_tor_port" lineno="87571">
45047 <summary>
45048 Bind UDP sockets to the tor port.
45049 </summary>
45050 @@ -64622,7 +64439,7 @@ Domain allowed access.
45051 </param>
45052 <infoflow type="none"/>
45053 </interface>
45054 -<interface name="corenet_tcp_connect_tor_port" lineno="87467">
45055 +<interface name="corenet_tcp_connect_tor_port" lineno="87590">
45056 <summary>
45057 Make a TCP connection to the tor port.
45058 </summary>
45059 @@ -64632,7 +64449,7 @@ Domain allowed access.
45060 </summary>
45061 </param>
45062 </interface>
45063 -<interface name="corenet_send_tor_client_packets" lineno="87487">
45064 +<interface name="corenet_send_tor_client_packets" lineno="87610">
45065 <summary>
45066 Send tor_client packets.
45067 </summary>
45068 @@ -64643,7 +64460,7 @@ Domain allowed access.
45069 </param>
45070 <infoflow type="write" weight="10"/>
45071 </interface>
45072 -<interface name="corenet_dontaudit_send_tor_client_packets" lineno="87506">
45073 +<interface name="corenet_dontaudit_send_tor_client_packets" lineno="87629">
45074 <summary>
45075 Do not audit attempts to send tor_client packets.
45076 </summary>
45077 @@ -64654,7 +64471,7 @@ Domain to not audit.
45078 </param>
45079 <infoflow type="none"/>
45080 </interface>
45081 -<interface name="corenet_receive_tor_client_packets" lineno="87525">
45082 +<interface name="corenet_receive_tor_client_packets" lineno="87648">
45083 <summary>
45084 Receive tor_client packets.
45085 </summary>
45086 @@ -64665,7 +64482,7 @@ Domain allowed access.
45087 </param>
45088 <infoflow type="read" weight="10"/>
45089 </interface>
45090 -<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="87544">
45091 +<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="87667">
45092 <summary>
45093 Do not audit attempts to receive tor_client packets.
45094 </summary>
45095 @@ -64676,7 +64493,7 @@ Domain allowed access.
45096 </param>
45097 <infoflow type="none"/>
45098 </interface>
45099 -<interface name="corenet_sendrecv_tor_client_packets" lineno="87563">
45100 +<interface name="corenet_sendrecv_tor_client_packets" lineno="87686">
45101 <summary>
45102 Send and receive tor_client packets.
45103 </summary>
45104 @@ -64687,7 +64504,7 @@ Domain allowed access.
45105 </param>
45106 <infoflow type="both" weight="10"/>
45107 </interface>
45108 -<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="87579">
45109 +<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="87702">
45110 <summary>
45111 Do not audit attempts to send and receive tor_client packets.
45112 </summary>
45113 @@ -64698,7 +64515,7 @@ Domain to not audit.
45114 </param>
45115 <infoflow type="none"/>
45116 </interface>
45117 -<interface name="corenet_relabelto_tor_client_packets" lineno="87594">
45118 +<interface name="corenet_relabelto_tor_client_packets" lineno="87717">
45119 <summary>
45120 Relabel packets to tor_client the packet type.
45121 </summary>
45122 @@ -64708,7 +64525,7 @@ Domain allowed access.
45123 </summary>
45124 </param>
45125 </interface>
45126 -<interface name="corenet_send_tor_server_packets" lineno="87614">
45127 +<interface name="corenet_send_tor_server_packets" lineno="87737">
45128 <summary>
45129 Send tor_server packets.
45130 </summary>
45131 @@ -64719,7 +64536,7 @@ Domain allowed access.
45132 </param>
45133 <infoflow type="write" weight="10"/>
45134 </interface>
45135 -<interface name="corenet_dontaudit_send_tor_server_packets" lineno="87633">
45136 +<interface name="corenet_dontaudit_send_tor_server_packets" lineno="87756">
45137 <summary>
45138 Do not audit attempts to send tor_server packets.
45139 </summary>
45140 @@ -64730,7 +64547,7 @@ Domain to not audit.
45141 </param>
45142 <infoflow type="none"/>
45143 </interface>
45144 -<interface name="corenet_receive_tor_server_packets" lineno="87652">
45145 +<interface name="corenet_receive_tor_server_packets" lineno="87775">
45146 <summary>
45147 Receive tor_server packets.
45148 </summary>
45149 @@ -64741,7 +64558,7 @@ Domain allowed access.
45150 </param>
45151 <infoflow type="read" weight="10"/>
45152 </interface>
45153 -<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="87671">
45154 +<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="87794">
45155 <summary>
45156 Do not audit attempts to receive tor_server packets.
45157 </summary>
45158 @@ -64752,7 +64569,7 @@ Domain allowed access.
45159 </param>
45160 <infoflow type="none"/>
45161 </interface>
45162 -<interface name="corenet_sendrecv_tor_server_packets" lineno="87690">
45163 +<interface name="corenet_sendrecv_tor_server_packets" lineno="87813">
45164 <summary>
45165 Send and receive tor_server packets.
45166 </summary>
45167 @@ -64763,7 +64580,7 @@ Domain allowed access.
45168 </param>
45169 <infoflow type="both" weight="10"/>
45170 </interface>
45171 -<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="87706">
45172 +<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="87829">
45173 <summary>
45174 Do not audit attempts to send and receive tor_server packets.
45175 </summary>
45176 @@ -64774,7 +64591,7 @@ Domain to not audit.
45177 </param>
45178 <infoflow type="none"/>
45179 </interface>
45180 -<interface name="corenet_relabelto_tor_server_packets" lineno="87721">
45181 +<interface name="corenet_relabelto_tor_server_packets" lineno="87844">
45182 <summary>
45183 Relabel packets to tor_server the packet type.
45184 </summary>
45185 @@ -64784,7 +64601,7 @@ Domain allowed access.
45186 </summary>
45187 </param>
45188 </interface>
45189 -<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="87743">
45190 +<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="87866">
45191 <summary>
45192 Send and receive TCP traffic on the traceroute port.
45193 </summary>
45194 @@ -64795,7 +64612,7 @@ Domain allowed access.
45195 </param>
45196 <infoflow type="both" weight="10"/>
45197 </interface>
45198 -<interface name="corenet_udp_send_traceroute_port" lineno="87758">
45199 +<interface name="corenet_udp_send_traceroute_port" lineno="87881">
45200 <summary>
45201 Send UDP traffic on the traceroute port.
45202 </summary>
45203 @@ -64806,7 +64623,7 @@ Domain allowed access.
45204 </param>
45205 <infoflow type="write" weight="10"/>
45206 </interface>
45207 -<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="87773">
45208 +<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="87896">
45209 <summary>
45210 Do not audit attempts to send UDP traffic on the traceroute port.
45211 </summary>
45212 @@ -64817,7 +64634,7 @@ Domain to not audit.
45213 </param>
45214 <infoflow type="none"/>
45215 </interface>
45216 -<interface name="corenet_udp_receive_traceroute_port" lineno="87788">
45217 +<interface name="corenet_udp_receive_traceroute_port" lineno="87911">
45218 <summary>
45219 Receive UDP traffic on the traceroute port.
45220 </summary>
45221 @@ -64828,7 +64645,7 @@ Domain allowed access.
45222 </param>
45223 <infoflow type="read" weight="10"/>
45224 </interface>
45225 -<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="87803">
45226 +<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="87926">
45227 <summary>
45228 Do not audit attempts to receive UDP traffic on the traceroute port.
45229 </summary>
45230 @@ -64839,7 +64656,7 @@ Domain to not audit.
45231 </param>
45232 <infoflow type="none"/>
45233 </interface>
45234 -<interface name="corenet_udp_sendrecv_traceroute_port" lineno="87818">
45235 +<interface name="corenet_udp_sendrecv_traceroute_port" lineno="87941">
45236 <summary>
45237 Send and receive UDP traffic on the traceroute port.
45238 </summary>
45239 @@ -64850,7 +64667,7 @@ Domain allowed access.
45240 </param>
45241 <infoflow type="both" weight="10"/>
45242 </interface>
45243 -<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="87834">
45244 +<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="87957">
45245 <summary>
45246 Do not audit attempts to send and receive
45247 UDP traffic on the traceroute port.
45248 @@ -64862,7 +64679,7 @@ Domain to not audit.
45249 </param>
45250 <infoflow type="none"/>
45251 </interface>
45252 -<interface name="corenet_tcp_bind_traceroute_port" lineno="87849">
45253 +<interface name="corenet_tcp_bind_traceroute_port" lineno="87972">
45254 <summary>
45255 Bind TCP sockets to the traceroute port.
45256 </summary>
45257 @@ -64873,7 +64690,7 @@ Domain allowed access.
45258 </param>
45259 <infoflow type="none"/>
45260 </interface>
45261 -<interface name="corenet_udp_bind_traceroute_port" lineno="87869">
45262 +<interface name="corenet_udp_bind_traceroute_port" lineno="87992">
45263 <summary>
45264 Bind UDP sockets to the traceroute port.
45265 </summary>
45266 @@ -64884,7 +64701,7 @@ Domain allowed access.
45267 </param>
45268 <infoflow type="none"/>
45269 </interface>
45270 -<interface name="corenet_tcp_connect_traceroute_port" lineno="87888">
45271 +<interface name="corenet_tcp_connect_traceroute_port" lineno="88011">
45272 <summary>
45273 Make a TCP connection to the traceroute port.
45274 </summary>
45275 @@ -64894,7 +64711,7 @@ Domain allowed access.
45276 </summary>
45277 </param>
45278 </interface>
45279 -<interface name="corenet_send_traceroute_client_packets" lineno="87908">
45280 +<interface name="corenet_send_traceroute_client_packets" lineno="88031">
45281 <summary>
45282 Send traceroute_client packets.
45283 </summary>
45284 @@ -64905,7 +64722,7 @@ Domain allowed access.
45285 </param>
45286 <infoflow type="write" weight="10"/>
45287 </interface>
45288 -<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="87927">
45289 +<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="88050">
45290 <summary>
45291 Do not audit attempts to send traceroute_client packets.
45292 </summary>
45293 @@ -64916,7 +64733,7 @@ Domain to not audit.
45294 </param>
45295 <infoflow type="none"/>
45296 </interface>
45297 -<interface name="corenet_receive_traceroute_client_packets" lineno="87946">
45298 +<interface name="corenet_receive_traceroute_client_packets" lineno="88069">
45299 <summary>
45300 Receive traceroute_client packets.
45301 </summary>
45302 @@ -64927,7 +64744,7 @@ Domain allowed access.
45303 </param>
45304 <infoflow type="read" weight="10"/>
45305 </interface>
45306 -<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="87965">
45307 +<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="88088">
45308 <summary>
45309 Do not audit attempts to receive traceroute_client packets.
45310 </summary>
45311 @@ -64938,7 +64755,7 @@ Domain allowed access.
45312 </param>
45313 <infoflow type="none"/>
45314 </interface>
45315 -<interface name="corenet_sendrecv_traceroute_client_packets" lineno="87984">
45316 +<interface name="corenet_sendrecv_traceroute_client_packets" lineno="88107">
45317 <summary>
45318 Send and receive traceroute_client packets.
45319 </summary>
45320 @@ -64949,7 +64766,7 @@ Domain allowed access.
45321 </param>
45322 <infoflow type="both" weight="10"/>
45323 </interface>
45324 -<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="88000">
45325 +<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="88123">
45326 <summary>
45327 Do not audit attempts to send and receive traceroute_client packets.
45328 </summary>
45329 @@ -64960,7 +64777,7 @@ Domain to not audit.
45330 </param>
45331 <infoflow type="none"/>
45332 </interface>
45333 -<interface name="corenet_relabelto_traceroute_client_packets" lineno="88015">
45334 +<interface name="corenet_relabelto_traceroute_client_packets" lineno="88138">
45335 <summary>
45336 Relabel packets to traceroute_client the packet type.
45337 </summary>
45338 @@ -64970,7 +64787,7 @@ Domain allowed access.
45339 </summary>
45340 </param>
45341 </interface>
45342 -<interface name="corenet_send_traceroute_server_packets" lineno="88035">
45343 +<interface name="corenet_send_traceroute_server_packets" lineno="88158">
45344 <summary>
45345 Send traceroute_server packets.
45346 </summary>
45347 @@ -64981,7 +64798,7 @@ Domain allowed access.
45348 </param>
45349 <infoflow type="write" weight="10"/>
45350 </interface>
45351 -<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="88054">
45352 +<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="88177">
45353 <summary>
45354 Do not audit attempts to send traceroute_server packets.
45355 </summary>
45356 @@ -64992,7 +64809,7 @@ Domain to not audit.
45357 </param>
45358 <infoflow type="none"/>
45359 </interface>
45360 -<interface name="corenet_receive_traceroute_server_packets" lineno="88073">
45361 +<interface name="corenet_receive_traceroute_server_packets" lineno="88196">
45362 <summary>
45363 Receive traceroute_server packets.
45364 </summary>
45365 @@ -65003,7 +64820,7 @@ Domain allowed access.
45366 </param>
45367 <infoflow type="read" weight="10"/>
45368 </interface>
45369 -<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="88092">
45370 +<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="88215">
45371 <summary>
45372 Do not audit attempts to receive traceroute_server packets.
45373 </summary>
45374 @@ -65014,7 +64831,7 @@ Domain allowed access.
45375 </param>
45376 <infoflow type="none"/>
45377 </interface>
45378 -<interface name="corenet_sendrecv_traceroute_server_packets" lineno="88111">
45379 +<interface name="corenet_sendrecv_traceroute_server_packets" lineno="88234">
45380 <summary>
45381 Send and receive traceroute_server packets.
45382 </summary>
45383 @@ -65025,7 +64842,7 @@ Domain allowed access.
45384 </param>
45385 <infoflow type="both" weight="10"/>
45386 </interface>
45387 -<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="88127">
45388 +<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="88250">
45389 <summary>
45390 Do not audit attempts to send and receive traceroute_server packets.
45391 </summary>
45392 @@ -65036,7 +64853,7 @@ Domain to not audit.
45393 </param>
45394 <infoflow type="none"/>
45395 </interface>
45396 -<interface name="corenet_relabelto_traceroute_server_packets" lineno="88142">
45397 +<interface name="corenet_relabelto_traceroute_server_packets" lineno="88265">
45398 <summary>
45399 Relabel packets to traceroute_server the packet type.
45400 </summary>
45401 @@ -65046,7 +64863,7 @@ Domain allowed access.
45402 </summary>
45403 </param>
45404 </interface>
45405 -<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="88164">
45406 +<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="88287">
45407 <summary>
45408 Send and receive TCP traffic on the transproxy port.
45409 </summary>
45410 @@ -65057,7 +64874,7 @@ Domain allowed access.
45411 </param>
45412 <infoflow type="both" weight="10"/>
45413 </interface>
45414 -<interface name="corenet_udp_send_transproxy_port" lineno="88179">
45415 +<interface name="corenet_udp_send_transproxy_port" lineno="88302">
45416 <summary>
45417 Send UDP traffic on the transproxy port.
45418 </summary>
45419 @@ -65068,7 +64885,7 @@ Domain allowed access.
45420 </param>
45421 <infoflow type="write" weight="10"/>
45422 </interface>
45423 -<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="88194">
45424 +<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="88317">
45425 <summary>
45426 Do not audit attempts to send UDP traffic on the transproxy port.
45427 </summary>
45428 @@ -65079,7 +64896,7 @@ Domain to not audit.
45429 </param>
45430 <infoflow type="none"/>
45431 </interface>
45432 -<interface name="corenet_udp_receive_transproxy_port" lineno="88209">
45433 +<interface name="corenet_udp_receive_transproxy_port" lineno="88332">
45434 <summary>
45435 Receive UDP traffic on the transproxy port.
45436 </summary>
45437 @@ -65090,7 +64907,7 @@ Domain allowed access.
45438 </param>
45439 <infoflow type="read" weight="10"/>
45440 </interface>
45441 -<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="88224">
45442 +<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="88347">
45443 <summary>
45444 Do not audit attempts to receive UDP traffic on the transproxy port.
45445 </summary>
45446 @@ -65101,7 +64918,7 @@ Domain to not audit.
45447 </param>
45448 <infoflow type="none"/>
45449 </interface>
45450 -<interface name="corenet_udp_sendrecv_transproxy_port" lineno="88239">
45451 +<interface name="corenet_udp_sendrecv_transproxy_port" lineno="88362">
45452 <summary>
45453 Send and receive UDP traffic on the transproxy port.
45454 </summary>
45455 @@ -65112,7 +64929,7 @@ Domain allowed access.
45456 </param>
45457 <infoflow type="both" weight="10"/>
45458 </interface>
45459 -<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="88255">
45460 +<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="88378">
45461 <summary>
45462 Do not audit attempts to send and receive
45463 UDP traffic on the transproxy port.
45464 @@ -65124,7 +64941,7 @@ Domain to not audit.
45465 </param>
45466 <infoflow type="none"/>
45467 </interface>
45468 -<interface name="corenet_tcp_bind_transproxy_port" lineno="88270">
45469 +<interface name="corenet_tcp_bind_transproxy_port" lineno="88393">
45470 <summary>
45471 Bind TCP sockets to the transproxy port.
45472 </summary>
45473 @@ -65135,7 +64952,7 @@ Domain allowed access.
45474 </param>
45475 <infoflow type="none"/>
45476 </interface>
45477 -<interface name="corenet_udp_bind_transproxy_port" lineno="88290">
45478 +<interface name="corenet_udp_bind_transproxy_port" lineno="88413">
45479 <summary>
45480 Bind UDP sockets to the transproxy port.
45481 </summary>
45482 @@ -65146,7 +64963,7 @@ Domain allowed access.
45483 </param>
45484 <infoflow type="none"/>
45485 </interface>
45486 -<interface name="corenet_tcp_connect_transproxy_port" lineno="88309">
45487 +<interface name="corenet_tcp_connect_transproxy_port" lineno="88432">
45488 <summary>
45489 Make a TCP connection to the transproxy port.
45490 </summary>
45491 @@ -65156,7 +64973,7 @@ Domain allowed access.
45492 </summary>
45493 </param>
45494 </interface>
45495 -<interface name="corenet_send_transproxy_client_packets" lineno="88329">
45496 +<interface name="corenet_send_transproxy_client_packets" lineno="88452">
45497 <summary>
45498 Send transproxy_client packets.
45499 </summary>
45500 @@ -65167,7 +64984,7 @@ Domain allowed access.
45501 </param>
45502 <infoflow type="write" weight="10"/>
45503 </interface>
45504 -<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="88348">
45505 +<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="88471">
45506 <summary>
45507 Do not audit attempts to send transproxy_client packets.
45508 </summary>
45509 @@ -65178,7 +64995,7 @@ Domain to not audit.
45510 </param>
45511 <infoflow type="none"/>
45512 </interface>
45513 -<interface name="corenet_receive_transproxy_client_packets" lineno="88367">
45514 +<interface name="corenet_receive_transproxy_client_packets" lineno="88490">
45515 <summary>
45516 Receive transproxy_client packets.
45517 </summary>
45518 @@ -65189,7 +65006,7 @@ Domain allowed access.
45519 </param>
45520 <infoflow type="read" weight="10"/>
45521 </interface>
45522 -<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="88386">
45523 +<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="88509">
45524 <summary>
45525 Do not audit attempts to receive transproxy_client packets.
45526 </summary>
45527 @@ -65200,7 +65017,7 @@ Domain allowed access.
45528 </param>
45529 <infoflow type="none"/>
45530 </interface>
45531 -<interface name="corenet_sendrecv_transproxy_client_packets" lineno="88405">
45532 +<interface name="corenet_sendrecv_transproxy_client_packets" lineno="88528">
45533 <summary>
45534 Send and receive transproxy_client packets.
45535 </summary>
45536 @@ -65211,7 +65028,7 @@ Domain allowed access.
45537 </param>
45538 <infoflow type="both" weight="10"/>
45539 </interface>
45540 -<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="88421">
45541 +<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="88544">
45542 <summary>
45543 Do not audit attempts to send and receive transproxy_client packets.
45544 </summary>
45545 @@ -65222,7 +65039,7 @@ Domain to not audit.
45546 </param>
45547 <infoflow type="none"/>
45548 </interface>
45549 -<interface name="corenet_relabelto_transproxy_client_packets" lineno="88436">
45550 +<interface name="corenet_relabelto_transproxy_client_packets" lineno="88559">
45551 <summary>
45552 Relabel packets to transproxy_client the packet type.
45553 </summary>
45554 @@ -65232,7 +65049,7 @@ Domain allowed access.
45555 </summary>
45556 </param>
45557 </interface>
45558 -<interface name="corenet_send_transproxy_server_packets" lineno="88456">
45559 +<interface name="corenet_send_transproxy_server_packets" lineno="88579">
45560 <summary>
45561 Send transproxy_server packets.
45562 </summary>
45563 @@ -65243,7 +65060,7 @@ Domain allowed access.
45564 </param>
45565 <infoflow type="write" weight="10"/>
45566 </interface>
45567 -<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="88475">
45568 +<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="88598">
45569 <summary>
45570 Do not audit attempts to send transproxy_server packets.
45571 </summary>
45572 @@ -65254,7 +65071,7 @@ Domain to not audit.
45573 </param>
45574 <infoflow type="none"/>
45575 </interface>
45576 -<interface name="corenet_receive_transproxy_server_packets" lineno="88494">
45577 +<interface name="corenet_receive_transproxy_server_packets" lineno="88617">
45578 <summary>
45579 Receive transproxy_server packets.
45580 </summary>
45581 @@ -65265,7 +65082,7 @@ Domain allowed access.
45582 </param>
45583 <infoflow type="read" weight="10"/>
45584 </interface>
45585 -<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="88513">
45586 +<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="88636">
45587 <summary>
45588 Do not audit attempts to receive transproxy_server packets.
45589 </summary>
45590 @@ -65276,7 +65093,7 @@ Domain allowed access.
45591 </param>
45592 <infoflow type="none"/>
45593 </interface>
45594 -<interface name="corenet_sendrecv_transproxy_server_packets" lineno="88532">
45595 +<interface name="corenet_sendrecv_transproxy_server_packets" lineno="88655">
45596 <summary>
45597 Send and receive transproxy_server packets.
45598 </summary>
45599 @@ -65287,7 +65104,7 @@ Domain allowed access.
45600 </param>
45601 <infoflow type="both" weight="10"/>
45602 </interface>
45603 -<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="88548">
45604 +<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="88671">
45605 <summary>
45606 Do not audit attempts to send and receive transproxy_server packets.
45607 </summary>
45608 @@ -65298,7 +65115,7 @@ Domain to not audit.
45609 </param>
45610 <infoflow type="none"/>
45611 </interface>
45612 -<interface name="corenet_relabelto_transproxy_server_packets" lineno="88563">
45613 +<interface name="corenet_relabelto_transproxy_server_packets" lineno="88686">
45614 <summary>
45615 Relabel packets to transproxy_server the packet type.
45616 </summary>
45617 @@ -65308,7 +65125,7 @@ Domain allowed access.
45618 </summary>
45619 </param>
45620 </interface>
45621 -<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="88585">
45622 +<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="88708">
45623 <summary>
45624 Send and receive TCP traffic on the trisoap port.
45625 </summary>
45626 @@ -65319,7 +65136,7 @@ Domain allowed access.
45627 </param>
45628 <infoflow type="both" weight="10"/>
45629 </interface>
45630 -<interface name="corenet_udp_send_trisoap_port" lineno="88600">
45631 +<interface name="corenet_udp_send_trisoap_port" lineno="88723">
45632 <summary>
45633 Send UDP traffic on the trisoap port.
45634 </summary>
45635 @@ -65330,7 +65147,7 @@ Domain allowed access.
45636 </param>
45637 <infoflow type="write" weight="10"/>
45638 </interface>
45639 -<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="88615">
45640 +<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="88738">
45641 <summary>
45642 Do not audit attempts to send UDP traffic on the trisoap port.
45643 </summary>
45644 @@ -65341,7 +65158,7 @@ Domain to not audit.
45645 </param>
45646 <infoflow type="none"/>
45647 </interface>
45648 -<interface name="corenet_udp_receive_trisoap_port" lineno="88630">
45649 +<interface name="corenet_udp_receive_trisoap_port" lineno="88753">
45650 <summary>
45651 Receive UDP traffic on the trisoap port.
45652 </summary>
45653 @@ -65352,7 +65169,7 @@ Domain allowed access.
45654 </param>
45655 <infoflow type="read" weight="10"/>
45656 </interface>
45657 -<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="88645">
45658 +<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="88768">
45659 <summary>
45660 Do not audit attempts to receive UDP traffic on the trisoap port.
45661 </summary>
45662 @@ -65363,7 +65180,7 @@ Domain to not audit.
45663 </param>
45664 <infoflow type="none"/>
45665 </interface>
45666 -<interface name="corenet_udp_sendrecv_trisoap_port" lineno="88660">
45667 +<interface name="corenet_udp_sendrecv_trisoap_port" lineno="88783">
45668 <summary>
45669 Send and receive UDP traffic on the trisoap port.
45670 </summary>
45671 @@ -65374,7 +65191,7 @@ Domain allowed access.
45672 </param>
45673 <infoflow type="both" weight="10"/>
45674 </interface>
45675 -<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="88676">
45676 +<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="88799">
45677 <summary>
45678 Do not audit attempts to send and receive
45679 UDP traffic on the trisoap port.
45680 @@ -65386,7 +65203,7 @@ Domain to not audit.
45681 </param>
45682 <infoflow type="none"/>
45683 </interface>
45684 -<interface name="corenet_tcp_bind_trisoap_port" lineno="88691">
45685 +<interface name="corenet_tcp_bind_trisoap_port" lineno="88814">
45686 <summary>
45687 Bind TCP sockets to the trisoap port.
45688 </summary>
45689 @@ -65397,7 +65214,7 @@ Domain allowed access.
45690 </param>
45691 <infoflow type="none"/>
45692 </interface>
45693 -<interface name="corenet_udp_bind_trisoap_port" lineno="88711">
45694 +<interface name="corenet_udp_bind_trisoap_port" lineno="88834">
45695 <summary>
45696 Bind UDP sockets to the trisoap port.
45697 </summary>
45698 @@ -65408,7 +65225,7 @@ Domain allowed access.
45699 </param>
45700 <infoflow type="none"/>
45701 </interface>
45702 -<interface name="corenet_tcp_connect_trisoap_port" lineno="88730">
45703 +<interface name="corenet_tcp_connect_trisoap_port" lineno="88853">
45704 <summary>
45705 Make a TCP connection to the trisoap port.
45706 </summary>
45707 @@ -65418,7 +65235,7 @@ Domain allowed access.
45708 </summary>
45709 </param>
45710 </interface>
45711 -<interface name="corenet_send_trisoap_client_packets" lineno="88750">
45712 +<interface name="corenet_send_trisoap_client_packets" lineno="88873">
45713 <summary>
45714 Send trisoap_client packets.
45715 </summary>
45716 @@ -65429,7 +65246,7 @@ Domain allowed access.
45717 </param>
45718 <infoflow type="write" weight="10"/>
45719 </interface>
45720 -<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="88769">
45721 +<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="88892">
45722 <summary>
45723 Do not audit attempts to send trisoap_client packets.
45724 </summary>
45725 @@ -65440,7 +65257,7 @@ Domain to not audit.
45726 </param>
45727 <infoflow type="none"/>
45728 </interface>
45729 -<interface name="corenet_receive_trisoap_client_packets" lineno="88788">
45730 +<interface name="corenet_receive_trisoap_client_packets" lineno="88911">
45731 <summary>
45732 Receive trisoap_client packets.
45733 </summary>
45734 @@ -65451,7 +65268,7 @@ Domain allowed access.
45735 </param>
45736 <infoflow type="read" weight="10"/>
45737 </interface>
45738 -<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="88807">
45739 +<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="88930">
45740 <summary>
45741 Do not audit attempts to receive trisoap_client packets.
45742 </summary>
45743 @@ -65462,7 +65279,7 @@ Domain allowed access.
45744 </param>
45745 <infoflow type="none"/>
45746 </interface>
45747 -<interface name="corenet_sendrecv_trisoap_client_packets" lineno="88826">
45748 +<interface name="corenet_sendrecv_trisoap_client_packets" lineno="88949">
45749 <summary>
45750 Send and receive trisoap_client packets.
45751 </summary>
45752 @@ -65473,7 +65290,7 @@ Domain allowed access.
45753 </param>
45754 <infoflow type="both" weight="10"/>
45755 </interface>
45756 -<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="88842">
45757 +<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="88965">
45758 <summary>
45759 Do not audit attempts to send and receive trisoap_client packets.
45760 </summary>
45761 @@ -65484,7 +65301,7 @@ Domain to not audit.
45762 </param>
45763 <infoflow type="none"/>
45764 </interface>
45765 -<interface name="corenet_relabelto_trisoap_client_packets" lineno="88857">
45766 +<interface name="corenet_relabelto_trisoap_client_packets" lineno="88980">
45767 <summary>
45768 Relabel packets to trisoap_client the packet type.
45769 </summary>
45770 @@ -65494,7 +65311,7 @@ Domain allowed access.
45771 </summary>
45772 </param>
45773 </interface>
45774 -<interface name="corenet_send_trisoap_server_packets" lineno="88877">
45775 +<interface name="corenet_send_trisoap_server_packets" lineno="89000">
45776 <summary>
45777 Send trisoap_server packets.
45778 </summary>
45779 @@ -65505,7 +65322,7 @@ Domain allowed access.
45780 </param>
45781 <infoflow type="write" weight="10"/>
45782 </interface>
45783 -<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="88896">
45784 +<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="89019">
45785 <summary>
45786 Do not audit attempts to send trisoap_server packets.
45787 </summary>
45788 @@ -65516,7 +65333,7 @@ Domain to not audit.
45789 </param>
45790 <infoflow type="none"/>
45791 </interface>
45792 -<interface name="corenet_receive_trisoap_server_packets" lineno="88915">
45793 +<interface name="corenet_receive_trisoap_server_packets" lineno="89038">
45794 <summary>
45795 Receive trisoap_server packets.
45796 </summary>
45797 @@ -65527,7 +65344,7 @@ Domain allowed access.
45798 </param>
45799 <infoflow type="read" weight="10"/>
45800 </interface>
45801 -<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="88934">
45802 +<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="89057">
45803 <summary>
45804 Do not audit attempts to receive trisoap_server packets.
45805 </summary>
45806 @@ -65538,7 +65355,7 @@ Domain allowed access.
45807 </param>
45808 <infoflow type="none"/>
45809 </interface>
45810 -<interface name="corenet_sendrecv_trisoap_server_packets" lineno="88953">
45811 +<interface name="corenet_sendrecv_trisoap_server_packets" lineno="89076">
45812 <summary>
45813 Send and receive trisoap_server packets.
45814 </summary>
45815 @@ -65549,7 +65366,7 @@ Domain allowed access.
45816 </param>
45817 <infoflow type="both" weight="10"/>
45818 </interface>
45819 -<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="88969">
45820 +<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="89092">
45821 <summary>
45822 Do not audit attempts to send and receive trisoap_server packets.
45823 </summary>
45824 @@ -65560,7 +65377,7 @@ Domain to not audit.
45825 </param>
45826 <infoflow type="none"/>
45827 </interface>
45828 -<interface name="corenet_relabelto_trisoap_server_packets" lineno="88984">
45829 +<interface name="corenet_relabelto_trisoap_server_packets" lineno="89107">
45830 <summary>
45831 Relabel packets to trisoap_server the packet type.
45832 </summary>
45833 @@ -65570,7 +65387,7 @@ Domain allowed access.
45834 </summary>
45835 </param>
45836 </interface>
45837 -<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="89006">
45838 +<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="89129">
45839 <summary>
45840 Send and receive TCP traffic on the trivnet1 port.
45841 </summary>
45842 @@ -65581,7 +65398,7 @@ Domain allowed access.
45843 </param>
45844 <infoflow type="both" weight="10"/>
45845 </interface>
45846 -<interface name="corenet_udp_send_trivnet1_port" lineno="89021">
45847 +<interface name="corenet_udp_send_trivnet1_port" lineno="89144">
45848 <summary>
45849 Send UDP traffic on the trivnet1 port.
45850 </summary>
45851 @@ -65592,7 +65409,7 @@ Domain allowed access.
45852 </param>
45853 <infoflow type="write" weight="10"/>
45854 </interface>
45855 -<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="89036">
45856 +<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="89159">
45857 <summary>
45858 Do not audit attempts to send UDP traffic on the trivnet1 port.
45859 </summary>
45860 @@ -65603,7 +65420,7 @@ Domain to not audit.
45861 </param>
45862 <infoflow type="none"/>
45863 </interface>
45864 -<interface name="corenet_udp_receive_trivnet1_port" lineno="89051">
45865 +<interface name="corenet_udp_receive_trivnet1_port" lineno="89174">
45866 <summary>
45867 Receive UDP traffic on the trivnet1 port.
45868 </summary>
45869 @@ -65614,7 +65431,7 @@ Domain allowed access.
45870 </param>
45871 <infoflow type="read" weight="10"/>
45872 </interface>
45873 -<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="89066">
45874 +<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="89189">
45875 <summary>
45876 Do not audit attempts to receive UDP traffic on the trivnet1 port.
45877 </summary>
45878 @@ -65625,7 +65442,7 @@ Domain to not audit.
45879 </param>
45880 <infoflow type="none"/>
45881 </interface>
45882 -<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="89081">
45883 +<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="89204">
45884 <summary>
45885 Send and receive UDP traffic on the trivnet1 port.
45886 </summary>
45887 @@ -65636,7 +65453,7 @@ Domain allowed access.
45888 </param>
45889 <infoflow type="both" weight="10"/>
45890 </interface>
45891 -<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="89097">
45892 +<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="89220">
45893 <summary>
45894 Do not audit attempts to send and receive
45895 UDP traffic on the trivnet1 port.
45896 @@ -65648,7 +65465,7 @@ Domain to not audit.
45897 </param>
45898 <infoflow type="none"/>
45899 </interface>
45900 -<interface name="corenet_tcp_bind_trivnet1_port" lineno="89112">
45901 +<interface name="corenet_tcp_bind_trivnet1_port" lineno="89235">
45902 <summary>
45903 Bind TCP sockets to the trivnet1 port.
45904 </summary>
45905 @@ -65659,7 +65476,7 @@ Domain allowed access.
45906 </param>
45907 <infoflow type="none"/>
45908 </interface>
45909 -<interface name="corenet_udp_bind_trivnet1_port" lineno="89132">
45910 +<interface name="corenet_udp_bind_trivnet1_port" lineno="89255">
45911 <summary>
45912 Bind UDP sockets to the trivnet1 port.
45913 </summary>
45914 @@ -65670,7 +65487,7 @@ Domain allowed access.
45915 </param>
45916 <infoflow type="none"/>
45917 </interface>
45918 -<interface name="corenet_tcp_connect_trivnet1_port" lineno="89151">
45919 +<interface name="corenet_tcp_connect_trivnet1_port" lineno="89274">
45920 <summary>
45921 Make a TCP connection to the trivnet1 port.
45922 </summary>
45923 @@ -65680,7 +65497,7 @@ Domain allowed access.
45924 </summary>
45925 </param>
45926 </interface>
45927 -<interface name="corenet_send_trivnet1_client_packets" lineno="89171">
45928 +<interface name="corenet_send_trivnet1_client_packets" lineno="89294">
45929 <summary>
45930 Send trivnet1_client packets.
45931 </summary>
45932 @@ -65691,7 +65508,7 @@ Domain allowed access.
45933 </param>
45934 <infoflow type="write" weight="10"/>
45935 </interface>
45936 -<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="89190">
45937 +<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="89313">
45938 <summary>
45939 Do not audit attempts to send trivnet1_client packets.
45940 </summary>
45941 @@ -65702,7 +65519,7 @@ Domain to not audit.
45942 </param>
45943 <infoflow type="none"/>
45944 </interface>
45945 -<interface name="corenet_receive_trivnet1_client_packets" lineno="89209">
45946 +<interface name="corenet_receive_trivnet1_client_packets" lineno="89332">
45947 <summary>
45948 Receive trivnet1_client packets.
45949 </summary>
45950 @@ -65713,7 +65530,7 @@ Domain allowed access.
45951 </param>
45952 <infoflow type="read" weight="10"/>
45953 </interface>
45954 -<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="89228">
45955 +<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="89351">
45956 <summary>
45957 Do not audit attempts to receive trivnet1_client packets.
45958 </summary>
45959 @@ -65724,7 +65541,7 @@ Domain allowed access.
45960 </param>
45961 <infoflow type="none"/>
45962 </interface>
45963 -<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="89247">
45964 +<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="89370">
45965 <summary>
45966 Send and receive trivnet1_client packets.
45967 </summary>
45968 @@ -65735,7 +65552,7 @@ Domain allowed access.
45969 </param>
45970 <infoflow type="both" weight="10"/>
45971 </interface>
45972 -<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="89263">
45973 +<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="89386">
45974 <summary>
45975 Do not audit attempts to send and receive trivnet1_client packets.
45976 </summary>
45977 @@ -65746,7 +65563,7 @@ Domain to not audit.
45978 </param>
45979 <infoflow type="none"/>
45980 </interface>
45981 -<interface name="corenet_relabelto_trivnet1_client_packets" lineno="89278">
45982 +<interface name="corenet_relabelto_trivnet1_client_packets" lineno="89401">
45983 <summary>
45984 Relabel packets to trivnet1_client the packet type.
45985 </summary>
45986 @@ -65756,7 +65573,7 @@ Domain allowed access.
45987 </summary>
45988 </param>
45989 </interface>
45990 -<interface name="corenet_send_trivnet1_server_packets" lineno="89298">
45991 +<interface name="corenet_send_trivnet1_server_packets" lineno="89421">
45992 <summary>
45993 Send trivnet1_server packets.
45994 </summary>
45995 @@ -65767,7 +65584,7 @@ Domain allowed access.
45996 </param>
45997 <infoflow type="write" weight="10"/>
45998 </interface>
45999 -<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="89317">
46000 +<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="89440">
46001 <summary>
46002 Do not audit attempts to send trivnet1_server packets.
46003 </summary>
46004 @@ -65778,7 +65595,7 @@ Domain to not audit.
46005 </param>
46006 <infoflow type="none"/>
46007 </interface>
46008 -<interface name="corenet_receive_trivnet1_server_packets" lineno="89336">
46009 +<interface name="corenet_receive_trivnet1_server_packets" lineno="89459">
46010 <summary>
46011 Receive trivnet1_server packets.
46012 </summary>
46013 @@ -65789,7 +65606,7 @@ Domain allowed access.
46014 </param>
46015 <infoflow type="read" weight="10"/>
46016 </interface>
46017 -<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="89355">
46018 +<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="89478">
46019 <summary>
46020 Do not audit attempts to receive trivnet1_server packets.
46021 </summary>
46022 @@ -65800,7 +65617,7 @@ Domain allowed access.
46023 </param>
46024 <infoflow type="none"/>
46025 </interface>
46026 -<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="89374">
46027 +<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="89497">
46028 <summary>
46029 Send and receive trivnet1_server packets.
46030 </summary>
46031 @@ -65811,7 +65628,7 @@ Domain allowed access.
46032 </param>
46033 <infoflow type="both" weight="10"/>
46034 </interface>
46035 -<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="89390">
46036 +<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="89513">
46037 <summary>
46038 Do not audit attempts to send and receive trivnet1_server packets.
46039 </summary>
46040 @@ -65822,7 +65639,7 @@ Domain to not audit.
46041 </param>
46042 <infoflow type="none"/>
46043 </interface>
46044 -<interface name="corenet_relabelto_trivnet1_server_packets" lineno="89405">
46045 +<interface name="corenet_relabelto_trivnet1_server_packets" lineno="89528">
46046 <summary>
46047 Relabel packets to trivnet1_server the packet type.
46048 </summary>
46049 @@ -65832,7 +65649,7 @@ Domain allowed access.
46050 </summary>
46051 </param>
46052 </interface>
46053 -<interface name="corenet_tcp_sendrecv_ups_port" lineno="89427">
46054 +<interface name="corenet_tcp_sendrecv_ups_port" lineno="89550">
46055 <summary>
46056 Send and receive TCP traffic on the ups port.
46057 </summary>
46058 @@ -65843,7 +65660,7 @@ Domain allowed access.
46059 </param>
46060 <infoflow type="both" weight="10"/>
46061 </interface>
46062 -<interface name="corenet_udp_send_ups_port" lineno="89442">
46063 +<interface name="corenet_udp_send_ups_port" lineno="89565">
46064 <summary>
46065 Send UDP traffic on the ups port.
46066 </summary>
46067 @@ -65854,7 +65671,7 @@ Domain allowed access.
46068 </param>
46069 <infoflow type="write" weight="10"/>
46070 </interface>
46071 -<interface name="corenet_dontaudit_udp_send_ups_port" lineno="89457">
46072 +<interface name="corenet_dontaudit_udp_send_ups_port" lineno="89580">
46073 <summary>
46074 Do not audit attempts to send UDP traffic on the ups port.
46075 </summary>
46076 @@ -65865,7 +65682,7 @@ Domain to not audit.
46077 </param>
46078 <infoflow type="none"/>
46079 </interface>
46080 -<interface name="corenet_udp_receive_ups_port" lineno="89472">
46081 +<interface name="corenet_udp_receive_ups_port" lineno="89595">
46082 <summary>
46083 Receive UDP traffic on the ups port.
46084 </summary>
46085 @@ -65876,7 +65693,7 @@ Domain allowed access.
46086 </param>
46087 <infoflow type="read" weight="10"/>
46088 </interface>
46089 -<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="89487">
46090 +<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="89610">
46091 <summary>
46092 Do not audit attempts to receive UDP traffic on the ups port.
46093 </summary>
46094 @@ -65887,7 +65704,7 @@ Domain to not audit.
46095 </param>
46096 <infoflow type="none"/>
46097 </interface>
46098 -<interface name="corenet_udp_sendrecv_ups_port" lineno="89502">
46099 +<interface name="corenet_udp_sendrecv_ups_port" lineno="89625">
46100 <summary>
46101 Send and receive UDP traffic on the ups port.
46102 </summary>
46103 @@ -65898,7 +65715,7 @@ Domain allowed access.
46104 </param>
46105 <infoflow type="both" weight="10"/>
46106 </interface>
46107 -<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="89518">
46108 +<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="89641">
46109 <summary>
46110 Do not audit attempts to send and receive
46111 UDP traffic on the ups port.
46112 @@ -65910,7 +65727,7 @@ Domain to not audit.
46113 </param>
46114 <infoflow type="none"/>
46115 </interface>
46116 -<interface name="corenet_tcp_bind_ups_port" lineno="89533">
46117 +<interface name="corenet_tcp_bind_ups_port" lineno="89656">
46118 <summary>
46119 Bind TCP sockets to the ups port.
46120 </summary>
46121 @@ -65921,7 +65738,7 @@ Domain allowed access.
46122 </param>
46123 <infoflow type="none"/>
46124 </interface>
46125 -<interface name="corenet_udp_bind_ups_port" lineno="89553">
46126 +<interface name="corenet_udp_bind_ups_port" lineno="89676">
46127 <summary>
46128 Bind UDP sockets to the ups port.
46129 </summary>
46130 @@ -65932,7 +65749,7 @@ Domain allowed access.
46131 </param>
46132 <infoflow type="none"/>
46133 </interface>
46134 -<interface name="corenet_tcp_connect_ups_port" lineno="89572">
46135 +<interface name="corenet_tcp_connect_ups_port" lineno="89695">
46136 <summary>
46137 Make a TCP connection to the ups port.
46138 </summary>
46139 @@ -65942,7 +65759,7 @@ Domain allowed access.
46140 </summary>
46141 </param>
46142 </interface>
46143 -<interface name="corenet_send_ups_client_packets" lineno="89592">
46144 +<interface name="corenet_send_ups_client_packets" lineno="89715">
46145 <summary>
46146 Send ups_client packets.
46147 </summary>
46148 @@ -65953,7 +65770,7 @@ Domain allowed access.
46149 </param>
46150 <infoflow type="write" weight="10"/>
46151 </interface>
46152 -<interface name="corenet_dontaudit_send_ups_client_packets" lineno="89611">
46153 +<interface name="corenet_dontaudit_send_ups_client_packets" lineno="89734">
46154 <summary>
46155 Do not audit attempts to send ups_client packets.
46156 </summary>
46157 @@ -65964,7 +65781,7 @@ Domain to not audit.
46158 </param>
46159 <infoflow type="none"/>
46160 </interface>
46161 -<interface name="corenet_receive_ups_client_packets" lineno="89630">
46162 +<interface name="corenet_receive_ups_client_packets" lineno="89753">
46163 <summary>
46164 Receive ups_client packets.
46165 </summary>
46166 @@ -65975,7 +65792,7 @@ Domain allowed access.
46167 </param>
46168 <infoflow type="read" weight="10"/>
46169 </interface>
46170 -<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="89649">
46171 +<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="89772">
46172 <summary>
46173 Do not audit attempts to receive ups_client packets.
46174 </summary>
46175 @@ -65986,7 +65803,7 @@ Domain allowed access.
46176 </param>
46177 <infoflow type="none"/>
46178 </interface>
46179 -<interface name="corenet_sendrecv_ups_client_packets" lineno="89668">
46180 +<interface name="corenet_sendrecv_ups_client_packets" lineno="89791">
46181 <summary>
46182 Send and receive ups_client packets.
46183 </summary>
46184 @@ -65997,7 +65814,7 @@ Domain allowed access.
46185 </param>
46186 <infoflow type="both" weight="10"/>
46187 </interface>
46188 -<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="89684">
46189 +<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="89807">
46190 <summary>
46191 Do not audit attempts to send and receive ups_client packets.
46192 </summary>
46193 @@ -66008,7 +65825,7 @@ Domain to not audit.
46194 </param>
46195 <infoflow type="none"/>
46196 </interface>
46197 -<interface name="corenet_relabelto_ups_client_packets" lineno="89699">
46198 +<interface name="corenet_relabelto_ups_client_packets" lineno="89822">
46199 <summary>
46200 Relabel packets to ups_client the packet type.
46201 </summary>
46202 @@ -66018,7 +65835,7 @@ Domain allowed access.
46203 </summary>
46204 </param>
46205 </interface>
46206 -<interface name="corenet_send_ups_server_packets" lineno="89719">
46207 +<interface name="corenet_send_ups_server_packets" lineno="89842">
46208 <summary>
46209 Send ups_server packets.
46210 </summary>
46211 @@ -66029,7 +65846,7 @@ Domain allowed access.
46212 </param>
46213 <infoflow type="write" weight="10"/>
46214 </interface>
46215 -<interface name="corenet_dontaudit_send_ups_server_packets" lineno="89738">
46216 +<interface name="corenet_dontaudit_send_ups_server_packets" lineno="89861">
46217 <summary>
46218 Do not audit attempts to send ups_server packets.
46219 </summary>
46220 @@ -66040,7 +65857,7 @@ Domain to not audit.
46221 </param>
46222 <infoflow type="none"/>
46223 </interface>
46224 -<interface name="corenet_receive_ups_server_packets" lineno="89757">
46225 +<interface name="corenet_receive_ups_server_packets" lineno="89880">
46226 <summary>
46227 Receive ups_server packets.
46228 </summary>
46229 @@ -66051,7 +65868,7 @@ Domain allowed access.
46230 </param>
46231 <infoflow type="read" weight="10"/>
46232 </interface>
46233 -<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="89776">
46234 +<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="89899">
46235 <summary>
46236 Do not audit attempts to receive ups_server packets.
46237 </summary>
46238 @@ -66062,7 +65879,7 @@ Domain allowed access.
46239 </param>
46240 <infoflow type="none"/>
46241 </interface>
46242 -<interface name="corenet_sendrecv_ups_server_packets" lineno="89795">
46243 +<interface name="corenet_sendrecv_ups_server_packets" lineno="89918">
46244 <summary>
46245 Send and receive ups_server packets.
46246 </summary>
46247 @@ -66073,7 +65890,7 @@ Domain allowed access.
46248 </param>
46249 <infoflow type="both" weight="10"/>
46250 </interface>
46251 -<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="89811">
46252 +<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="89934">
46253 <summary>
46254 Do not audit attempts to send and receive ups_server packets.
46255 </summary>
46256 @@ -66084,7 +65901,7 @@ Domain to not audit.
46257 </param>
46258 <infoflow type="none"/>
46259 </interface>
46260 -<interface name="corenet_relabelto_ups_server_packets" lineno="89826">
46261 +<interface name="corenet_relabelto_ups_server_packets" lineno="89949">
46262 <summary>
46263 Relabel packets to ups_server the packet type.
46264 </summary>
46265 @@ -66094,7 +65911,7 @@ Domain allowed access.
46266 </summary>
46267 </param>
46268 </interface>
46269 -<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="89848">
46270 +<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="89971">
46271 <summary>
46272 Send and receive TCP traffic on the utcpserver port.
46273 </summary>
46274 @@ -66105,7 +65922,7 @@ Domain allowed access.
46275 </param>
46276 <infoflow type="both" weight="10"/>
46277 </interface>
46278 -<interface name="corenet_udp_send_utcpserver_port" lineno="89863">
46279 +<interface name="corenet_udp_send_utcpserver_port" lineno="89986">
46280 <summary>
46281 Send UDP traffic on the utcpserver port.
46282 </summary>
46283 @@ -66116,7 +65933,7 @@ Domain allowed access.
46284 </param>
46285 <infoflow type="write" weight="10"/>
46286 </interface>
46287 -<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="89878">
46288 +<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="90001">
46289 <summary>
46290 Do not audit attempts to send UDP traffic on the utcpserver port.
46291 </summary>
46292 @@ -66127,7 +65944,7 @@ Domain to not audit.
46293 </param>
46294 <infoflow type="none"/>
46295 </interface>
46296 -<interface name="corenet_udp_receive_utcpserver_port" lineno="89893">
46297 +<interface name="corenet_udp_receive_utcpserver_port" lineno="90016">
46298 <summary>
46299 Receive UDP traffic on the utcpserver port.
46300 </summary>
46301 @@ -66138,7 +65955,7 @@ Domain allowed access.
46302 </param>
46303 <infoflow type="read" weight="10"/>
46304 </interface>
46305 -<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="89908">
46306 +<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="90031">
46307 <summary>
46308 Do not audit attempts to receive UDP traffic on the utcpserver port.
46309 </summary>
46310 @@ -66149,7 +65966,7 @@ Domain to not audit.
46311 </param>
46312 <infoflow type="none"/>
46313 </interface>
46314 -<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="89923">
46315 +<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="90046">
46316 <summary>
46317 Send and receive UDP traffic on the utcpserver port.
46318 </summary>
46319 @@ -66160,7 +65977,7 @@ Domain allowed access.
46320 </param>
46321 <infoflow type="both" weight="10"/>
46322 </interface>
46323 -<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="89939">
46324 +<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="90062">
46325 <summary>
46326 Do not audit attempts to send and receive
46327 UDP traffic on the utcpserver port.
46328 @@ -66172,7 +65989,7 @@ Domain to not audit.
46329 </param>
46330 <infoflow type="none"/>
46331 </interface>
46332 -<interface name="corenet_tcp_bind_utcpserver_port" lineno="89954">
46333 +<interface name="corenet_tcp_bind_utcpserver_port" lineno="90077">
46334 <summary>
46335 Bind TCP sockets to the utcpserver port.
46336 </summary>
46337 @@ -66183,7 +66000,7 @@ Domain allowed access.
46338 </param>
46339 <infoflow type="none"/>
46340 </interface>
46341 -<interface name="corenet_udp_bind_utcpserver_port" lineno="89974">
46342 +<interface name="corenet_udp_bind_utcpserver_port" lineno="90097">
46343 <summary>
46344 Bind UDP sockets to the utcpserver port.
46345 </summary>
46346 @@ -66194,7 +66011,7 @@ Domain allowed access.
46347 </param>
46348 <infoflow type="none"/>
46349 </interface>
46350 -<interface name="corenet_tcp_connect_utcpserver_port" lineno="89993">
46351 +<interface name="corenet_tcp_connect_utcpserver_port" lineno="90116">
46352 <summary>
46353 Make a TCP connection to the utcpserver port.
46354 </summary>
46355 @@ -66204,7 +66021,7 @@ Domain allowed access.
46356 </summary>
46357 </param>
46358 </interface>
46359 -<interface name="corenet_send_utcpserver_client_packets" lineno="90013">
46360 +<interface name="corenet_send_utcpserver_client_packets" lineno="90136">
46361 <summary>
46362 Send utcpserver_client packets.
46363 </summary>
46364 @@ -66215,7 +66032,7 @@ Domain allowed access.
46365 </param>
46366 <infoflow type="write" weight="10"/>
46367 </interface>
46368 -<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="90032">
46369 +<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="90155">
46370 <summary>
46371 Do not audit attempts to send utcpserver_client packets.
46372 </summary>
46373 @@ -66226,7 +66043,7 @@ Domain to not audit.
46374 </param>
46375 <infoflow type="none"/>
46376 </interface>
46377 -<interface name="corenet_receive_utcpserver_client_packets" lineno="90051">
46378 +<interface name="corenet_receive_utcpserver_client_packets" lineno="90174">
46379 <summary>
46380 Receive utcpserver_client packets.
46381 </summary>
46382 @@ -66237,7 +66054,7 @@ Domain allowed access.
46383 </param>
46384 <infoflow type="read" weight="10"/>
46385 </interface>
46386 -<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="90070">
46387 +<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="90193">
46388 <summary>
46389 Do not audit attempts to receive utcpserver_client packets.
46390 </summary>
46391 @@ -66248,7 +66065,7 @@ Domain allowed access.
46392 </param>
46393 <infoflow type="none"/>
46394 </interface>
46395 -<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="90089">
46396 +<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="90212">
46397 <summary>
46398 Send and receive utcpserver_client packets.
46399 </summary>
46400 @@ -66259,7 +66076,7 @@ Domain allowed access.
46401 </param>
46402 <infoflow type="both" weight="10"/>
46403 </interface>
46404 -<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="90105">
46405 +<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="90228">
46406 <summary>
46407 Do not audit attempts to send and receive utcpserver_client packets.
46408 </summary>
46409 @@ -66270,7 +66087,7 @@ Domain to not audit.
46410 </param>
46411 <infoflow type="none"/>
46412 </interface>
46413 -<interface name="corenet_relabelto_utcpserver_client_packets" lineno="90120">
46414 +<interface name="corenet_relabelto_utcpserver_client_packets" lineno="90243">
46415 <summary>
46416 Relabel packets to utcpserver_client the packet type.
46417 </summary>
46418 @@ -66280,7 +66097,7 @@ Domain allowed access.
46419 </summary>
46420 </param>
46421 </interface>
46422 -<interface name="corenet_send_utcpserver_server_packets" lineno="90140">
46423 +<interface name="corenet_send_utcpserver_server_packets" lineno="90263">
46424 <summary>
46425 Send utcpserver_server packets.
46426 </summary>
46427 @@ -66291,7 +66108,7 @@ Domain allowed access.
46428 </param>
46429 <infoflow type="write" weight="10"/>
46430 </interface>
46431 -<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="90159">
46432 +<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="90282">
46433 <summary>
46434 Do not audit attempts to send utcpserver_server packets.
46435 </summary>
46436 @@ -66302,7 +66119,7 @@ Domain to not audit.
46437 </param>
46438 <infoflow type="none"/>
46439 </interface>
46440 -<interface name="corenet_receive_utcpserver_server_packets" lineno="90178">
46441 +<interface name="corenet_receive_utcpserver_server_packets" lineno="90301">
46442 <summary>
46443 Receive utcpserver_server packets.
46444 </summary>
46445 @@ -66313,7 +66130,7 @@ Domain allowed access.
46446 </param>
46447 <infoflow type="read" weight="10"/>
46448 </interface>
46449 -<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="90197">
46450 +<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="90320">
46451 <summary>
46452 Do not audit attempts to receive utcpserver_server packets.
46453 </summary>
46454 @@ -66324,7 +66141,7 @@ Domain allowed access.
46455 </param>
46456 <infoflow type="none"/>
46457 </interface>
46458 -<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="90216">
46459 +<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="90339">
46460 <summary>
46461 Send and receive utcpserver_server packets.
46462 </summary>
46463 @@ -66335,7 +66152,7 @@ Domain allowed access.
46464 </param>
46465 <infoflow type="both" weight="10"/>
46466 </interface>
46467 -<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="90232">
46468 +<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="90355">
46469 <summary>
46470 Do not audit attempts to send and receive utcpserver_server packets.
46471 </summary>
46472 @@ -66346,7 +66163,7 @@ Domain to not audit.
46473 </param>
46474 <infoflow type="none"/>
46475 </interface>
46476 -<interface name="corenet_relabelto_utcpserver_server_packets" lineno="90247">
46477 +<interface name="corenet_relabelto_utcpserver_server_packets" lineno="90370">
46478 <summary>
46479 Relabel packets to utcpserver_server the packet type.
46480 </summary>
46481 @@ -66356,7 +66173,7 @@ Domain allowed access.
46482 </summary>
46483 </param>
46484 </interface>
46485 -<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="90269">
46486 +<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="90392">
46487 <summary>
46488 Send and receive TCP traffic on the uucpd port.
46489 </summary>
46490 @@ -66367,7 +66184,7 @@ Domain allowed access.
46491 </param>
46492 <infoflow type="both" weight="10"/>
46493 </interface>
46494 -<interface name="corenet_udp_send_uucpd_port" lineno="90284">
46495 +<interface name="corenet_udp_send_uucpd_port" lineno="90407">
46496 <summary>
46497 Send UDP traffic on the uucpd port.
46498 </summary>
46499 @@ -66378,7 +66195,7 @@ Domain allowed access.
46500 </param>
46501 <infoflow type="write" weight="10"/>
46502 </interface>
46503 -<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="90299">
46504 +<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="90422">
46505 <summary>
46506 Do not audit attempts to send UDP traffic on the uucpd port.
46507 </summary>
46508 @@ -66389,7 +66206,7 @@ Domain to not audit.
46509 </param>
46510 <infoflow type="none"/>
46511 </interface>
46512 -<interface name="corenet_udp_receive_uucpd_port" lineno="90314">
46513 +<interface name="corenet_udp_receive_uucpd_port" lineno="90437">
46514 <summary>
46515 Receive UDP traffic on the uucpd port.
46516 </summary>
46517 @@ -66400,7 +66217,7 @@ Domain allowed access.
46518 </param>
46519 <infoflow type="read" weight="10"/>
46520 </interface>
46521 -<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="90329">
46522 +<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="90452">
46523 <summary>
46524 Do not audit attempts to receive UDP traffic on the uucpd port.
46525 </summary>
46526 @@ -66411,7 +66228,7 @@ Domain to not audit.
46527 </param>
46528 <infoflow type="none"/>
46529 </interface>
46530 -<interface name="corenet_udp_sendrecv_uucpd_port" lineno="90344">
46531 +<interface name="corenet_udp_sendrecv_uucpd_port" lineno="90467">
46532 <summary>
46533 Send and receive UDP traffic on the uucpd port.
46534 </summary>
46535 @@ -66422,7 +66239,7 @@ Domain allowed access.
46536 </param>
46537 <infoflow type="both" weight="10"/>
46538 </interface>
46539 -<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="90360">
46540 +<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="90483">
46541 <summary>
46542 Do not audit attempts to send and receive
46543 UDP traffic on the uucpd port.
46544 @@ -66434,7 +66251,7 @@ Domain to not audit.
46545 </param>
46546 <infoflow type="none"/>
46547 </interface>
46548 -<interface name="corenet_tcp_bind_uucpd_port" lineno="90375">
46549 +<interface name="corenet_tcp_bind_uucpd_port" lineno="90498">
46550 <summary>
46551 Bind TCP sockets to the uucpd port.
46552 </summary>
46553 @@ -66445,7 +66262,7 @@ Domain allowed access.
46554 </param>
46555 <infoflow type="none"/>
46556 </interface>
46557 -<interface name="corenet_udp_bind_uucpd_port" lineno="90395">
46558 +<interface name="corenet_udp_bind_uucpd_port" lineno="90518">
46559 <summary>
46560 Bind UDP sockets to the uucpd port.
46561 </summary>
46562 @@ -66456,7 +66273,7 @@ Domain allowed access.
46563 </param>
46564 <infoflow type="none"/>
46565 </interface>
46566 -<interface name="corenet_tcp_connect_uucpd_port" lineno="90414">
46567 +<interface name="corenet_tcp_connect_uucpd_port" lineno="90537">
46568 <summary>
46569 Make a TCP connection to the uucpd port.
46570 </summary>
46571 @@ -66466,7 +66283,7 @@ Domain allowed access.
46572 </summary>
46573 </param>
46574 </interface>
46575 -<interface name="corenet_send_uucpd_client_packets" lineno="90434">
46576 +<interface name="corenet_send_uucpd_client_packets" lineno="90557">
46577 <summary>
46578 Send uucpd_client packets.
46579 </summary>
46580 @@ -66477,7 +66294,7 @@ Domain allowed access.
46581 </param>
46582 <infoflow type="write" weight="10"/>
46583 </interface>
46584 -<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="90453">
46585 +<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="90576">
46586 <summary>
46587 Do not audit attempts to send uucpd_client packets.
46588 </summary>
46589 @@ -66488,7 +66305,7 @@ Domain to not audit.
46590 </param>
46591 <infoflow type="none"/>
46592 </interface>
46593 -<interface name="corenet_receive_uucpd_client_packets" lineno="90472">
46594 +<interface name="corenet_receive_uucpd_client_packets" lineno="90595">
46595 <summary>
46596 Receive uucpd_client packets.
46597 </summary>
46598 @@ -66499,7 +66316,7 @@ Domain allowed access.
46599 </param>
46600 <infoflow type="read" weight="10"/>
46601 </interface>
46602 -<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="90491">
46603 +<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="90614">
46604 <summary>
46605 Do not audit attempts to receive uucpd_client packets.
46606 </summary>
46607 @@ -66510,7 +66327,7 @@ Domain allowed access.
46608 </param>
46609 <infoflow type="none"/>
46610 </interface>
46611 -<interface name="corenet_sendrecv_uucpd_client_packets" lineno="90510">
46612 +<interface name="corenet_sendrecv_uucpd_client_packets" lineno="90633">
46613 <summary>
46614 Send and receive uucpd_client packets.
46615 </summary>
46616 @@ -66521,7 +66338,7 @@ Domain allowed access.
46617 </param>
46618 <infoflow type="both" weight="10"/>
46619 </interface>
46620 -<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="90526">
46621 +<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="90649">
46622 <summary>
46623 Do not audit attempts to send and receive uucpd_client packets.
46624 </summary>
46625 @@ -66532,7 +66349,7 @@ Domain to not audit.
46626 </param>
46627 <infoflow type="none"/>
46628 </interface>
46629 -<interface name="corenet_relabelto_uucpd_client_packets" lineno="90541">
46630 +<interface name="corenet_relabelto_uucpd_client_packets" lineno="90664">
46631 <summary>
46632 Relabel packets to uucpd_client the packet type.
46633 </summary>
46634 @@ -66542,7 +66359,7 @@ Domain allowed access.
46635 </summary>
46636 </param>
46637 </interface>
46638 -<interface name="corenet_send_uucpd_server_packets" lineno="90561">
46639 +<interface name="corenet_send_uucpd_server_packets" lineno="90684">
46640 <summary>
46641 Send uucpd_server packets.
46642 </summary>
46643 @@ -66553,7 +66370,7 @@ Domain allowed access.
46644 </param>
46645 <infoflow type="write" weight="10"/>
46646 </interface>
46647 -<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="90580">
46648 +<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="90703">
46649 <summary>
46650 Do not audit attempts to send uucpd_server packets.
46651 </summary>
46652 @@ -66564,7 +66381,7 @@ Domain to not audit.
46653 </param>
46654 <infoflow type="none"/>
46655 </interface>
46656 -<interface name="corenet_receive_uucpd_server_packets" lineno="90599">
46657 +<interface name="corenet_receive_uucpd_server_packets" lineno="90722">
46658 <summary>
46659 Receive uucpd_server packets.
46660 </summary>
46661 @@ -66575,7 +66392,7 @@ Domain allowed access.
46662 </param>
46663 <infoflow type="read" weight="10"/>
46664 </interface>
46665 -<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="90618">
46666 +<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="90741">
46667 <summary>
46668 Do not audit attempts to receive uucpd_server packets.
46669 </summary>
46670 @@ -66586,7 +66403,7 @@ Domain allowed access.
46671 </param>
46672 <infoflow type="none"/>
46673 </interface>
46674 -<interface name="corenet_sendrecv_uucpd_server_packets" lineno="90637">
46675 +<interface name="corenet_sendrecv_uucpd_server_packets" lineno="90760">
46676 <summary>
46677 Send and receive uucpd_server packets.
46678 </summary>
46679 @@ -66597,7 +66414,7 @@ Domain allowed access.
46680 </param>
46681 <infoflow type="both" weight="10"/>
46682 </interface>
46683 -<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="90653">
46684 +<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="90776">
46685 <summary>
46686 Do not audit attempts to send and receive uucpd_server packets.
46687 </summary>
46688 @@ -66608,7 +66425,7 @@ Domain to not audit.
46689 </param>
46690 <infoflow type="none"/>
46691 </interface>
46692 -<interface name="corenet_relabelto_uucpd_server_packets" lineno="90668">
46693 +<interface name="corenet_relabelto_uucpd_server_packets" lineno="90791">
46694 <summary>
46695 Relabel packets to uucpd_server the packet type.
46696 </summary>
46697 @@ -66618,7 +66435,7 @@ Domain allowed access.
46698 </summary>
46699 </param>
46700 </interface>
46701 -<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="90690">
46702 +<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="90813">
46703 <summary>
46704 Send and receive TCP traffic on the varnishd port.
46705 </summary>
46706 @@ -66629,7 +66446,7 @@ Domain allowed access.
46707 </param>
46708 <infoflow type="both" weight="10"/>
46709 </interface>
46710 -<interface name="corenet_udp_send_varnishd_port" lineno="90705">
46711 +<interface name="corenet_udp_send_varnishd_port" lineno="90828">
46712 <summary>
46713 Send UDP traffic on the varnishd port.
46714 </summary>
46715 @@ -66640,7 +66457,7 @@ Domain allowed access.
46716 </param>
46717 <infoflow type="write" weight="10"/>
46718 </interface>
46719 -<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="90720">
46720 +<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="90843">
46721 <summary>
46722 Do not audit attempts to send UDP traffic on the varnishd port.
46723 </summary>
46724 @@ -66651,7 +66468,7 @@ Domain to not audit.
46725 </param>
46726 <infoflow type="none"/>
46727 </interface>
46728 -<interface name="corenet_udp_receive_varnishd_port" lineno="90735">
46729 +<interface name="corenet_udp_receive_varnishd_port" lineno="90858">
46730 <summary>
46731 Receive UDP traffic on the varnishd port.
46732 </summary>
46733 @@ -66662,7 +66479,7 @@ Domain allowed access.
46734 </param>
46735 <infoflow type="read" weight="10"/>
46736 </interface>
46737 -<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="90750">
46738 +<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="90873">
46739 <summary>
46740 Do not audit attempts to receive UDP traffic on the varnishd port.
46741 </summary>
46742 @@ -66673,7 +66490,7 @@ Domain to not audit.
46743 </param>
46744 <infoflow type="none"/>
46745 </interface>
46746 -<interface name="corenet_udp_sendrecv_varnishd_port" lineno="90765">
46747 +<interface name="corenet_udp_sendrecv_varnishd_port" lineno="90888">
46748 <summary>
46749 Send and receive UDP traffic on the varnishd port.
46750 </summary>
46751 @@ -66684,7 +66501,7 @@ Domain allowed access.
46752 </param>
46753 <infoflow type="both" weight="10"/>
46754 </interface>
46755 -<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="90781">
46756 +<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="90904">
46757 <summary>
46758 Do not audit attempts to send and receive
46759 UDP traffic on the varnishd port.
46760 @@ -66696,7 +66513,7 @@ Domain to not audit.
46761 </param>
46762 <infoflow type="none"/>
46763 </interface>
46764 -<interface name="corenet_tcp_bind_varnishd_port" lineno="90796">
46765 +<interface name="corenet_tcp_bind_varnishd_port" lineno="90919">
46766 <summary>
46767 Bind TCP sockets to the varnishd port.
46768 </summary>
46769 @@ -66707,7 +66524,7 @@ Domain allowed access.
46770 </param>
46771 <infoflow type="none"/>
46772 </interface>
46773 -<interface name="corenet_udp_bind_varnishd_port" lineno="90816">
46774 +<interface name="corenet_udp_bind_varnishd_port" lineno="90939">
46775 <summary>
46776 Bind UDP sockets to the varnishd port.
46777 </summary>
46778 @@ -66718,7 +66535,7 @@ Domain allowed access.
46779 </param>
46780 <infoflow type="none"/>
46781 </interface>
46782 -<interface name="corenet_tcp_connect_varnishd_port" lineno="90835">
46783 +<interface name="corenet_tcp_connect_varnishd_port" lineno="90958">
46784 <summary>
46785 Make a TCP connection to the varnishd port.
46786 </summary>
46787 @@ -66728,7 +66545,7 @@ Domain allowed access.
46788 </summary>
46789 </param>
46790 </interface>
46791 -<interface name="corenet_send_varnishd_client_packets" lineno="90855">
46792 +<interface name="corenet_send_varnishd_client_packets" lineno="90978">
46793 <summary>
46794 Send varnishd_client packets.
46795 </summary>
46796 @@ -66739,7 +66556,7 @@ Domain allowed access.
46797 </param>
46798 <infoflow type="write" weight="10"/>
46799 </interface>
46800 -<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="90874">
46801 +<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="90997">
46802 <summary>
46803 Do not audit attempts to send varnishd_client packets.
46804 </summary>
46805 @@ -66750,7 +66567,7 @@ Domain to not audit.
46806 </param>
46807 <infoflow type="none"/>
46808 </interface>
46809 -<interface name="corenet_receive_varnishd_client_packets" lineno="90893">
46810 +<interface name="corenet_receive_varnishd_client_packets" lineno="91016">
46811 <summary>
46812 Receive varnishd_client packets.
46813 </summary>
46814 @@ -66761,7 +66578,7 @@ Domain allowed access.
46815 </param>
46816 <infoflow type="read" weight="10"/>
46817 </interface>
46818 -<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="90912">
46819 +<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="91035">
46820 <summary>
46821 Do not audit attempts to receive varnishd_client packets.
46822 </summary>
46823 @@ -66772,7 +66589,7 @@ Domain allowed access.
46824 </param>
46825 <infoflow type="none"/>
46826 </interface>
46827 -<interface name="corenet_sendrecv_varnishd_client_packets" lineno="90931">
46828 +<interface name="corenet_sendrecv_varnishd_client_packets" lineno="91054">
46829 <summary>
46830 Send and receive varnishd_client packets.
46831 </summary>
46832 @@ -66783,7 +66600,7 @@ Domain allowed access.
46833 </param>
46834 <infoflow type="both" weight="10"/>
46835 </interface>
46836 -<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="90947">
46837 +<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="91070">
46838 <summary>
46839 Do not audit attempts to send and receive varnishd_client packets.
46840 </summary>
46841 @@ -66794,7 +66611,7 @@ Domain to not audit.
46842 </param>
46843 <infoflow type="none"/>
46844 </interface>
46845 -<interface name="corenet_relabelto_varnishd_client_packets" lineno="90962">
46846 +<interface name="corenet_relabelto_varnishd_client_packets" lineno="91085">
46847 <summary>
46848 Relabel packets to varnishd_client the packet type.
46849 </summary>
46850 @@ -66804,7 +66621,7 @@ Domain allowed access.
46851 </summary>
46852 </param>
46853 </interface>
46854 -<interface name="corenet_send_varnishd_server_packets" lineno="90982">
46855 +<interface name="corenet_send_varnishd_server_packets" lineno="91105">
46856 <summary>
46857 Send varnishd_server packets.
46858 </summary>
46859 @@ -66815,7 +66632,7 @@ Domain allowed access.
46860 </param>
46861 <infoflow type="write" weight="10"/>
46862 </interface>
46863 -<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="91001">
46864 +<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="91124">
46865 <summary>
46866 Do not audit attempts to send varnishd_server packets.
46867 </summary>
46868 @@ -66826,7 +66643,7 @@ Domain to not audit.
46869 </param>
46870 <infoflow type="none"/>
46871 </interface>
46872 -<interface name="corenet_receive_varnishd_server_packets" lineno="91020">
46873 +<interface name="corenet_receive_varnishd_server_packets" lineno="91143">
46874 <summary>
46875 Receive varnishd_server packets.
46876 </summary>
46877 @@ -66837,7 +66654,7 @@ Domain allowed access.
46878 </param>
46879 <infoflow type="read" weight="10"/>
46880 </interface>
46881 -<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="91039">
46882 +<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="91162">
46883 <summary>
46884 Do not audit attempts to receive varnishd_server packets.
46885 </summary>
46886 @@ -66848,7 +66665,7 @@ Domain allowed access.
46887 </param>
46888 <infoflow type="none"/>
46889 </interface>
46890 -<interface name="corenet_sendrecv_varnishd_server_packets" lineno="91058">
46891 +<interface name="corenet_sendrecv_varnishd_server_packets" lineno="91181">
46892 <summary>
46893 Send and receive varnishd_server packets.
46894 </summary>
46895 @@ -66859,7 +66676,7 @@ Domain allowed access.
46896 </param>
46897 <infoflow type="both" weight="10"/>
46898 </interface>
46899 -<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="91074">
46900 +<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="91197">
46901 <summary>
46902 Do not audit attempts to send and receive varnishd_server packets.
46903 </summary>
46904 @@ -66870,7 +66687,7 @@ Domain to not audit.
46905 </param>
46906 <infoflow type="none"/>
46907 </interface>
46908 -<interface name="corenet_relabelto_varnishd_server_packets" lineno="91089">
46909 +<interface name="corenet_relabelto_varnishd_server_packets" lineno="91212">
46910 <summary>
46911 Relabel packets to varnishd_server the packet type.
46912 </summary>
46913 @@ -66880,7 +66697,7 @@ Domain allowed access.
46914 </summary>
46915 </param>
46916 </interface>
46917 -<interface name="corenet_tcp_sendrecv_virt_port" lineno="91111">
46918 +<interface name="corenet_tcp_sendrecv_virt_port" lineno="91234">
46919 <summary>
46920 Send and receive TCP traffic on the virt port.
46921 </summary>
46922 @@ -66891,7 +66708,7 @@ Domain allowed access.
46923 </param>
46924 <infoflow type="both" weight="10"/>
46925 </interface>
46926 -<interface name="corenet_udp_send_virt_port" lineno="91126">
46927 +<interface name="corenet_udp_send_virt_port" lineno="91249">
46928 <summary>
46929 Send UDP traffic on the virt port.
46930 </summary>
46931 @@ -66902,7 +66719,7 @@ Domain allowed access.
46932 </param>
46933 <infoflow type="write" weight="10"/>
46934 </interface>
46935 -<interface name="corenet_dontaudit_udp_send_virt_port" lineno="91141">
46936 +<interface name="corenet_dontaudit_udp_send_virt_port" lineno="91264">
46937 <summary>
46938 Do not audit attempts to send UDP traffic on the virt port.
46939 </summary>
46940 @@ -66913,7 +66730,7 @@ Domain to not audit.
46941 </param>
46942 <infoflow type="none"/>
46943 </interface>
46944 -<interface name="corenet_udp_receive_virt_port" lineno="91156">
46945 +<interface name="corenet_udp_receive_virt_port" lineno="91279">
46946 <summary>
46947 Receive UDP traffic on the virt port.
46948 </summary>
46949 @@ -66924,7 +66741,7 @@ Domain allowed access.
46950 </param>
46951 <infoflow type="read" weight="10"/>
46952 </interface>
46953 -<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="91171">
46954 +<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="91294">
46955 <summary>
46956 Do not audit attempts to receive UDP traffic on the virt port.
46957 </summary>
46958 @@ -66935,7 +66752,7 @@ Domain to not audit.
46959 </param>
46960 <infoflow type="none"/>
46961 </interface>
46962 -<interface name="corenet_udp_sendrecv_virt_port" lineno="91186">
46963 +<interface name="corenet_udp_sendrecv_virt_port" lineno="91309">
46964 <summary>
46965 Send and receive UDP traffic on the virt port.
46966 </summary>
46967 @@ -66946,7 +66763,7 @@ Domain allowed access.
46968 </param>
46969 <infoflow type="both" weight="10"/>
46970 </interface>
46971 -<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="91202">
46972 +<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="91325">
46973 <summary>
46974 Do not audit attempts to send and receive
46975 UDP traffic on the virt port.
46976 @@ -66958,7 +66775,7 @@ Domain to not audit.
46977 </param>
46978 <infoflow type="none"/>
46979 </interface>
46980 -<interface name="corenet_tcp_bind_virt_port" lineno="91217">
46981 +<interface name="corenet_tcp_bind_virt_port" lineno="91340">
46982 <summary>
46983 Bind TCP sockets to the virt port.
46984 </summary>
46985 @@ -66969,7 +66786,7 @@ Domain allowed access.
46986 </param>
46987 <infoflow type="none"/>
46988 </interface>
46989 -<interface name="corenet_udp_bind_virt_port" lineno="91237">
46990 +<interface name="corenet_udp_bind_virt_port" lineno="91360">
46991 <summary>
46992 Bind UDP sockets to the virt port.
46993 </summary>
46994 @@ -66980,7 +66797,7 @@ Domain allowed access.
46995 </param>
46996 <infoflow type="none"/>
46997 </interface>
46998 -<interface name="corenet_tcp_connect_virt_port" lineno="91256">
46999 +<interface name="corenet_tcp_connect_virt_port" lineno="91379">
47000 <summary>
47001 Make a TCP connection to the virt port.
47002 </summary>
47003 @@ -66990,7 +66807,7 @@ Domain allowed access.
47004 </summary>
47005 </param>
47006 </interface>
47007 -<interface name="corenet_send_virt_client_packets" lineno="91276">
47008 +<interface name="corenet_send_virt_client_packets" lineno="91399">
47009 <summary>
47010 Send virt_client packets.
47011 </summary>
47012 @@ -67001,7 +66818,7 @@ Domain allowed access.
47013 </param>
47014 <infoflow type="write" weight="10"/>
47015 </interface>
47016 -<interface name="corenet_dontaudit_send_virt_client_packets" lineno="91295">
47017 +<interface name="corenet_dontaudit_send_virt_client_packets" lineno="91418">
47018 <summary>
47019 Do not audit attempts to send virt_client packets.
47020 </summary>
47021 @@ -67012,7 +66829,7 @@ Domain to not audit.
47022 </param>
47023 <infoflow type="none"/>
47024 </interface>
47025 -<interface name="corenet_receive_virt_client_packets" lineno="91314">
47026 +<interface name="corenet_receive_virt_client_packets" lineno="91437">
47027 <summary>
47028 Receive virt_client packets.
47029 </summary>
47030 @@ -67023,7 +66840,7 @@ Domain allowed access.
47031 </param>
47032 <infoflow type="read" weight="10"/>
47033 </interface>
47034 -<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="91333">
47035 +<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="91456">
47036 <summary>
47037 Do not audit attempts to receive virt_client packets.
47038 </summary>
47039 @@ -67034,7 +66851,7 @@ Domain allowed access.
47040 </param>
47041 <infoflow type="none"/>
47042 </interface>
47043 -<interface name="corenet_sendrecv_virt_client_packets" lineno="91352">
47044 +<interface name="corenet_sendrecv_virt_client_packets" lineno="91475">
47045 <summary>
47046 Send and receive virt_client packets.
47047 </summary>
47048 @@ -67045,7 +66862,7 @@ Domain allowed access.
47049 </param>
47050 <infoflow type="both" weight="10"/>
47051 </interface>
47052 -<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="91368">
47053 +<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="91491">
47054 <summary>
47055 Do not audit attempts to send and receive virt_client packets.
47056 </summary>
47057 @@ -67056,7 +66873,7 @@ Domain to not audit.
47058 </param>
47059 <infoflow type="none"/>
47060 </interface>
47061 -<interface name="corenet_relabelto_virt_client_packets" lineno="91383">
47062 +<interface name="corenet_relabelto_virt_client_packets" lineno="91506">
47063 <summary>
47064 Relabel packets to virt_client the packet type.
47065 </summary>
47066 @@ -67066,7 +66883,7 @@ Domain allowed access.
47067 </summary>
47068 </param>
47069 </interface>
47070 -<interface name="corenet_send_virt_server_packets" lineno="91403">
47071 +<interface name="corenet_send_virt_server_packets" lineno="91526">
47072 <summary>
47073 Send virt_server packets.
47074 </summary>
47075 @@ -67077,7 +66894,7 @@ Domain allowed access.
47076 </param>
47077 <infoflow type="write" weight="10"/>
47078 </interface>
47079 -<interface name="corenet_dontaudit_send_virt_server_packets" lineno="91422">
47080 +<interface name="corenet_dontaudit_send_virt_server_packets" lineno="91545">
47081 <summary>
47082 Do not audit attempts to send virt_server packets.
47083 </summary>
47084 @@ -67088,7 +66905,7 @@ Domain to not audit.
47085 </param>
47086 <infoflow type="none"/>
47087 </interface>
47088 -<interface name="corenet_receive_virt_server_packets" lineno="91441">
47089 +<interface name="corenet_receive_virt_server_packets" lineno="91564">
47090 <summary>
47091 Receive virt_server packets.
47092 </summary>
47093 @@ -67099,7 +66916,7 @@ Domain allowed access.
47094 </param>
47095 <infoflow type="read" weight="10"/>
47096 </interface>
47097 -<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="91460">
47098 +<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="91583">
47099 <summary>
47100 Do not audit attempts to receive virt_server packets.
47101 </summary>
47102 @@ -67110,7 +66927,7 @@ Domain allowed access.
47103 </param>
47104 <infoflow type="none"/>
47105 </interface>
47106 -<interface name="corenet_sendrecv_virt_server_packets" lineno="91479">
47107 +<interface name="corenet_sendrecv_virt_server_packets" lineno="91602">
47108 <summary>
47109 Send and receive virt_server packets.
47110 </summary>
47111 @@ -67121,7 +66938,7 @@ Domain allowed access.
47112 </param>
47113 <infoflow type="both" weight="10"/>
47114 </interface>
47115 -<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="91495">
47116 +<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="91618">
47117 <summary>
47118 Do not audit attempts to send and receive virt_server packets.
47119 </summary>
47120 @@ -67132,7 +66949,7 @@ Domain to not audit.
47121 </param>
47122 <infoflow type="none"/>
47123 </interface>
47124 -<interface name="corenet_relabelto_virt_server_packets" lineno="91510">
47125 +<interface name="corenet_relabelto_virt_server_packets" lineno="91633">
47126 <summary>
47127 Relabel packets to virt_server the packet type.
47128 </summary>
47129 @@ -67142,7 +66959,7 @@ Domain allowed access.
47130 </summary>
47131 </param>
47132 </interface>
47133 -<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="91532">
47134 +<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="91655">
47135 <summary>
47136 Send and receive TCP traffic on the virtual_places port.
47137 </summary>
47138 @@ -67153,7 +66970,7 @@ Domain allowed access.
47139 </param>
47140 <infoflow type="both" weight="10"/>
47141 </interface>
47142 -<interface name="corenet_udp_send_virtual_places_port" lineno="91547">
47143 +<interface name="corenet_udp_send_virtual_places_port" lineno="91670">
47144 <summary>
47145 Send UDP traffic on the virtual_places port.
47146 </summary>
47147 @@ -67164,7 +66981,7 @@ Domain allowed access.
47148 </param>
47149 <infoflow type="write" weight="10"/>
47150 </interface>
47151 -<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="91562">
47152 +<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="91685">
47153 <summary>
47154 Do not audit attempts to send UDP traffic on the virtual_places port.
47155 </summary>
47156 @@ -67175,7 +66992,7 @@ Domain to not audit.
47157 </param>
47158 <infoflow type="none"/>
47159 </interface>
47160 -<interface name="corenet_udp_receive_virtual_places_port" lineno="91577">
47161 +<interface name="corenet_udp_receive_virtual_places_port" lineno="91700">
47162 <summary>
47163 Receive UDP traffic on the virtual_places port.
47164 </summary>
47165 @@ -67186,7 +67003,7 @@ Domain allowed access.
47166 </param>
47167 <infoflow type="read" weight="10"/>
47168 </interface>
47169 -<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="91592">
47170 +<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="91715">
47171 <summary>
47172 Do not audit attempts to receive UDP traffic on the virtual_places port.
47173 </summary>
47174 @@ -67197,7 +67014,7 @@ Domain to not audit.
47175 </param>
47176 <infoflow type="none"/>
47177 </interface>
47178 -<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="91607">
47179 +<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="91730">
47180 <summary>
47181 Send and receive UDP traffic on the virtual_places port.
47182 </summary>
47183 @@ -67208,7 +67025,7 @@ Domain allowed access.
47184 </param>
47185 <infoflow type="both" weight="10"/>
47186 </interface>
47187 -<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="91623">
47188 +<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="91746">
47189 <summary>
47190 Do not audit attempts to send and receive
47191 UDP traffic on the virtual_places port.
47192 @@ -67220,7 +67037,7 @@ Domain to not audit.
47193 </param>
47194 <infoflow type="none"/>
47195 </interface>
47196 -<interface name="corenet_tcp_bind_virtual_places_port" lineno="91638">
47197 +<interface name="corenet_tcp_bind_virtual_places_port" lineno="91761">
47198 <summary>
47199 Bind TCP sockets to the virtual_places port.
47200 </summary>
47201 @@ -67231,7 +67048,7 @@ Domain allowed access.
47202 </param>
47203 <infoflow type="none"/>
47204 </interface>
47205 -<interface name="corenet_udp_bind_virtual_places_port" lineno="91658">
47206 +<interface name="corenet_udp_bind_virtual_places_port" lineno="91781">
47207 <summary>
47208 Bind UDP sockets to the virtual_places port.
47209 </summary>
47210 @@ -67242,7 +67059,7 @@ Domain allowed access.
47211 </param>
47212 <infoflow type="none"/>
47213 </interface>
47214 -<interface name="corenet_tcp_connect_virtual_places_port" lineno="91677">
47215 +<interface name="corenet_tcp_connect_virtual_places_port" lineno="91800">
47216 <summary>
47217 Make a TCP connection to the virtual_places port.
47218 </summary>
47219 @@ -67252,7 +67069,7 @@ Domain allowed access.
47220 </summary>
47221 </param>
47222 </interface>
47223 -<interface name="corenet_send_virtual_places_client_packets" lineno="91697">
47224 +<interface name="corenet_send_virtual_places_client_packets" lineno="91820">
47225 <summary>
47226 Send virtual_places_client packets.
47227 </summary>
47228 @@ -67263,7 +67080,7 @@ Domain allowed access.
47229 </param>
47230 <infoflow type="write" weight="10"/>
47231 </interface>
47232 -<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="91716">
47233 +<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="91839">
47234 <summary>
47235 Do not audit attempts to send virtual_places_client packets.
47236 </summary>
47237 @@ -67274,7 +67091,7 @@ Domain to not audit.
47238 </param>
47239 <infoflow type="none"/>
47240 </interface>
47241 -<interface name="corenet_receive_virtual_places_client_packets" lineno="91735">
47242 +<interface name="corenet_receive_virtual_places_client_packets" lineno="91858">
47243 <summary>
47244 Receive virtual_places_client packets.
47245 </summary>
47246 @@ -67285,7 +67102,7 @@ Domain allowed access.
47247 </param>
47248 <infoflow type="read" weight="10"/>
47249 </interface>
47250 -<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="91754">
47251 +<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="91877">
47252 <summary>
47253 Do not audit attempts to receive virtual_places_client packets.
47254 </summary>
47255 @@ -67296,7 +67113,7 @@ Domain allowed access.
47256 </param>
47257 <infoflow type="none"/>
47258 </interface>
47259 -<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="91773">
47260 +<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="91896">
47261 <summary>
47262 Send and receive virtual_places_client packets.
47263 </summary>
47264 @@ -67307,7 +67124,7 @@ Domain allowed access.
47265 </param>
47266 <infoflow type="both" weight="10"/>
47267 </interface>
47268 -<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="91789">
47269 +<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="91912">
47270 <summary>
47271 Do not audit attempts to send and receive virtual_places_client packets.
47272 </summary>
47273 @@ -67318,7 +67135,7 @@ Domain to not audit.
47274 </param>
47275 <infoflow type="none"/>
47276 </interface>
47277 -<interface name="corenet_relabelto_virtual_places_client_packets" lineno="91804">
47278 +<interface name="corenet_relabelto_virtual_places_client_packets" lineno="91927">
47279 <summary>
47280 Relabel packets to virtual_places_client the packet type.
47281 </summary>
47282 @@ -67328,7 +67145,7 @@ Domain allowed access.
47283 </summary>
47284 </param>
47285 </interface>
47286 -<interface name="corenet_send_virtual_places_server_packets" lineno="91824">
47287 +<interface name="corenet_send_virtual_places_server_packets" lineno="91947">
47288 <summary>
47289 Send virtual_places_server packets.
47290 </summary>
47291 @@ -67339,7 +67156,7 @@ Domain allowed access.
47292 </param>
47293 <infoflow type="write" weight="10"/>
47294 </interface>
47295 -<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="91843">
47296 +<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="91966">
47297 <summary>
47298 Do not audit attempts to send virtual_places_server packets.
47299 </summary>
47300 @@ -67350,7 +67167,7 @@ Domain to not audit.
47301 </param>
47302 <infoflow type="none"/>
47303 </interface>
47304 -<interface name="corenet_receive_virtual_places_server_packets" lineno="91862">
47305 +<interface name="corenet_receive_virtual_places_server_packets" lineno="91985">
47306 <summary>
47307 Receive virtual_places_server packets.
47308 </summary>
47309 @@ -67361,7 +67178,7 @@ Domain allowed access.
47310 </param>
47311 <infoflow type="read" weight="10"/>
47312 </interface>
47313 -<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="91881">
47314 +<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="92004">
47315 <summary>
47316 Do not audit attempts to receive virtual_places_server packets.
47317 </summary>
47318 @@ -67372,7 +67189,7 @@ Domain allowed access.
47319 </param>
47320 <infoflow type="none"/>
47321 </interface>
47322 -<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="91900">
47323 +<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="92023">
47324 <summary>
47325 Send and receive virtual_places_server packets.
47326 </summary>
47327 @@ -67383,7 +67200,7 @@ Domain allowed access.
47328 </param>
47329 <infoflow type="both" weight="10"/>
47330 </interface>
47331 -<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="91916">
47332 +<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="92039">
47333 <summary>
47334 Do not audit attempts to send and receive virtual_places_server packets.
47335 </summary>
47336 @@ -67394,7 +67211,7 @@ Domain to not audit.
47337 </param>
47338 <infoflow type="none"/>
47339 </interface>
47340 -<interface name="corenet_relabelto_virtual_places_server_packets" lineno="91931">
47341 +<interface name="corenet_relabelto_virtual_places_server_packets" lineno="92054">
47342 <summary>
47343 Relabel packets to virtual_places_server the packet type.
47344 </summary>
47345 @@ -67404,7 +67221,7 @@ Domain allowed access.
47346 </summary>
47347 </param>
47348 </interface>
47349 -<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="91953">
47350 +<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="92076">
47351 <summary>
47352 Send and receive TCP traffic on the virt_migration port.
47353 </summary>
47354 @@ -67415,7 +67232,7 @@ Domain allowed access.
47355 </param>
47356 <infoflow type="both" weight="10"/>
47357 </interface>
47358 -<interface name="corenet_udp_send_virt_migration_port" lineno="91968">
47359 +<interface name="corenet_udp_send_virt_migration_port" lineno="92091">
47360 <summary>
47361 Send UDP traffic on the virt_migration port.
47362 </summary>
47363 @@ -67426,7 +67243,7 @@ Domain allowed access.
47364 </param>
47365 <infoflow type="write" weight="10"/>
47366 </interface>
47367 -<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="91983">
47368 +<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="92106">
47369 <summary>
47370 Do not audit attempts to send UDP traffic on the virt_migration port.
47371 </summary>
47372 @@ -67437,7 +67254,7 @@ Domain to not audit.
47373 </param>
47374 <infoflow type="none"/>
47375 </interface>
47376 -<interface name="corenet_udp_receive_virt_migration_port" lineno="91998">
47377 +<interface name="corenet_udp_receive_virt_migration_port" lineno="92121">
47378 <summary>
47379 Receive UDP traffic on the virt_migration port.
47380 </summary>
47381 @@ -67448,7 +67265,7 @@ Domain allowed access.
47382 </param>
47383 <infoflow type="read" weight="10"/>
47384 </interface>
47385 -<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="92013">
47386 +<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="92136">
47387 <summary>
47388 Do not audit attempts to receive UDP traffic on the virt_migration port.
47389 </summary>
47390 @@ -67459,7 +67276,7 @@ Domain to not audit.
47391 </param>
47392 <infoflow type="none"/>
47393 </interface>
47394 -<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="92028">
47395 +<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="92151">
47396 <summary>
47397 Send and receive UDP traffic on the virt_migration port.
47398 </summary>
47399 @@ -67470,7 +67287,7 @@ Domain allowed access.
47400 </param>
47401 <infoflow type="both" weight="10"/>
47402 </interface>
47403 -<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="92044">
47404 +<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="92167">
47405 <summary>
47406 Do not audit attempts to send and receive
47407 UDP traffic on the virt_migration port.
47408 @@ -67482,7 +67299,7 @@ Domain to not audit.
47409 </param>
47410 <infoflow type="none"/>
47411 </interface>
47412 -<interface name="corenet_tcp_bind_virt_migration_port" lineno="92059">
47413 +<interface name="corenet_tcp_bind_virt_migration_port" lineno="92182">
47414 <summary>
47415 Bind TCP sockets to the virt_migration port.
47416 </summary>
47417 @@ -67493,7 +67310,7 @@ Domain allowed access.
47418 </param>
47419 <infoflow type="none"/>
47420 </interface>
47421 -<interface name="corenet_udp_bind_virt_migration_port" lineno="92079">
47422 +<interface name="corenet_udp_bind_virt_migration_port" lineno="92202">
47423 <summary>
47424 Bind UDP sockets to the virt_migration port.
47425 </summary>
47426 @@ -67504,7 +67321,7 @@ Domain allowed access.
47427 </param>
47428 <infoflow type="none"/>
47429 </interface>
47430 -<interface name="corenet_tcp_connect_virt_migration_port" lineno="92098">
47431 +<interface name="corenet_tcp_connect_virt_migration_port" lineno="92221">
47432 <summary>
47433 Make a TCP connection to the virt_migration port.
47434 </summary>
47435 @@ -67514,7 +67331,7 @@ Domain allowed access.
47436 </summary>
47437 </param>
47438 </interface>
47439 -<interface name="corenet_send_virt_migration_client_packets" lineno="92118">
47440 +<interface name="corenet_send_virt_migration_client_packets" lineno="92241">
47441 <summary>
47442 Send virt_migration_client packets.
47443 </summary>
47444 @@ -67525,7 +67342,7 @@ Domain allowed access.
47445 </param>
47446 <infoflow type="write" weight="10"/>
47447 </interface>
47448 -<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="92137">
47449 +<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="92260">
47450 <summary>
47451 Do not audit attempts to send virt_migration_client packets.
47452 </summary>
47453 @@ -67536,7 +67353,7 @@ Domain to not audit.
47454 </param>
47455 <infoflow type="none"/>
47456 </interface>
47457 -<interface name="corenet_receive_virt_migration_client_packets" lineno="92156">
47458 +<interface name="corenet_receive_virt_migration_client_packets" lineno="92279">
47459 <summary>
47460 Receive virt_migration_client packets.
47461 </summary>
47462 @@ -67547,7 +67364,7 @@ Domain allowed access.
47463 </param>
47464 <infoflow type="read" weight="10"/>
47465 </interface>
47466 -<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="92175">
47467 +<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="92298">
47468 <summary>
47469 Do not audit attempts to receive virt_migration_client packets.
47470 </summary>
47471 @@ -67558,7 +67375,7 @@ Domain allowed access.
47472 </param>
47473 <infoflow type="none"/>
47474 </interface>
47475 -<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="92194">
47476 +<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="92317">
47477 <summary>
47478 Send and receive virt_migration_client packets.
47479 </summary>
47480 @@ -67569,7 +67386,7 @@ Domain allowed access.
47481 </param>
47482 <infoflow type="both" weight="10"/>
47483 </interface>
47484 -<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="92210">
47485 +<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="92333">
47486 <summary>
47487 Do not audit attempts to send and receive virt_migration_client packets.
47488 </summary>
47489 @@ -67580,7 +67397,7 @@ Domain to not audit.
47490 </param>
47491 <infoflow type="none"/>
47492 </interface>
47493 -<interface name="corenet_relabelto_virt_migration_client_packets" lineno="92225">
47494 +<interface name="corenet_relabelto_virt_migration_client_packets" lineno="92348">
47495 <summary>
47496 Relabel packets to virt_migration_client the packet type.
47497 </summary>
47498 @@ -67590,7 +67407,7 @@ Domain allowed access.
47499 </summary>
47500 </param>
47501 </interface>
47502 -<interface name="corenet_send_virt_migration_server_packets" lineno="92245">
47503 +<interface name="corenet_send_virt_migration_server_packets" lineno="92368">
47504 <summary>
47505 Send virt_migration_server packets.
47506 </summary>
47507 @@ -67601,7 +67418,7 @@ Domain allowed access.
47508 </param>
47509 <infoflow type="write" weight="10"/>
47510 </interface>
47511 -<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="92264">
47512 +<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="92387">
47513 <summary>
47514 Do not audit attempts to send virt_migration_server packets.
47515 </summary>
47516 @@ -67612,7 +67429,7 @@ Domain to not audit.
47517 </param>
47518 <infoflow type="none"/>
47519 </interface>
47520 -<interface name="corenet_receive_virt_migration_server_packets" lineno="92283">
47521 +<interface name="corenet_receive_virt_migration_server_packets" lineno="92406">
47522 <summary>
47523 Receive virt_migration_server packets.
47524 </summary>
47525 @@ -67623,7 +67440,7 @@ Domain allowed access.
47526 </param>
47527 <infoflow type="read" weight="10"/>
47528 </interface>
47529 -<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="92302">
47530 +<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="92425">
47531 <summary>
47532 Do not audit attempts to receive virt_migration_server packets.
47533 </summary>
47534 @@ -67634,7 +67451,7 @@ Domain allowed access.
47535 </param>
47536 <infoflow type="none"/>
47537 </interface>
47538 -<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="92321">
47539 +<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="92444">
47540 <summary>
47541 Send and receive virt_migration_server packets.
47542 </summary>
47543 @@ -67645,7 +67462,7 @@ Domain allowed access.
47544 </param>
47545 <infoflow type="both" weight="10"/>
47546 </interface>
47547 -<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="92337">
47548 +<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="92460">
47549 <summary>
47550 Do not audit attempts to send and receive virt_migration_server packets.
47551 </summary>
47552 @@ -67656,7 +67473,7 @@ Domain to not audit.
47553 </param>
47554 <infoflow type="none"/>
47555 </interface>
47556 -<interface name="corenet_relabelto_virt_migration_server_packets" lineno="92352">
47557 +<interface name="corenet_relabelto_virt_migration_server_packets" lineno="92475">
47558 <summary>
47559 Relabel packets to virt_migration_server the packet type.
47560 </summary>
47561 @@ -67666,7 +67483,7 @@ Domain allowed access.
47562 </summary>
47563 </param>
47564 </interface>
47565 -<interface name="corenet_tcp_sendrecv_vnc_port" lineno="92374">
47566 +<interface name="corenet_tcp_sendrecv_vnc_port" lineno="92497">
47567 <summary>
47568 Send and receive TCP traffic on the vnc port.
47569 </summary>
47570 @@ -67677,7 +67494,7 @@ Domain allowed access.
47571 </param>
47572 <infoflow type="both" weight="10"/>
47573 </interface>
47574 -<interface name="corenet_udp_send_vnc_port" lineno="92389">
47575 +<interface name="corenet_udp_send_vnc_port" lineno="92512">
47576 <summary>
47577 Send UDP traffic on the vnc port.
47578 </summary>
47579 @@ -67688,7 +67505,7 @@ Domain allowed access.
47580 </param>
47581 <infoflow type="write" weight="10"/>
47582 </interface>
47583 -<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="92404">
47584 +<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="92527">
47585 <summary>
47586 Do not audit attempts to send UDP traffic on the vnc port.
47587 </summary>
47588 @@ -67699,7 +67516,7 @@ Domain to not audit.
47589 </param>
47590 <infoflow type="none"/>
47591 </interface>
47592 -<interface name="corenet_udp_receive_vnc_port" lineno="92419">
47593 +<interface name="corenet_udp_receive_vnc_port" lineno="92542">
47594 <summary>
47595 Receive UDP traffic on the vnc port.
47596 </summary>
47597 @@ -67710,7 +67527,7 @@ Domain allowed access.
47598 </param>
47599 <infoflow type="read" weight="10"/>
47600 </interface>
47601 -<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="92434">
47602 +<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="92557">
47603 <summary>
47604 Do not audit attempts to receive UDP traffic on the vnc port.
47605 </summary>
47606 @@ -67721,7 +67538,7 @@ Domain to not audit.
47607 </param>
47608 <infoflow type="none"/>
47609 </interface>
47610 -<interface name="corenet_udp_sendrecv_vnc_port" lineno="92449">
47611 +<interface name="corenet_udp_sendrecv_vnc_port" lineno="92572">
47612 <summary>
47613 Send and receive UDP traffic on the vnc port.
47614 </summary>
47615 @@ -67732,7 +67549,7 @@ Domain allowed access.
47616 </param>
47617 <infoflow type="both" weight="10"/>
47618 </interface>
47619 -<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="92465">
47620 +<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="92588">
47621 <summary>
47622 Do not audit attempts to send and receive
47623 UDP traffic on the vnc port.
47624 @@ -67744,7 +67561,7 @@ Domain to not audit.
47625 </param>
47626 <infoflow type="none"/>
47627 </interface>
47628 -<interface name="corenet_tcp_bind_vnc_port" lineno="92480">
47629 +<interface name="corenet_tcp_bind_vnc_port" lineno="92603">
47630 <summary>
47631 Bind TCP sockets to the vnc port.
47632 </summary>
47633 @@ -67755,7 +67572,7 @@ Domain allowed access.
47634 </param>
47635 <infoflow type="none"/>
47636 </interface>
47637 -<interface name="corenet_udp_bind_vnc_port" lineno="92500">
47638 +<interface name="corenet_udp_bind_vnc_port" lineno="92623">
47639 <summary>
47640 Bind UDP sockets to the vnc port.
47641 </summary>
47642 @@ -67766,7 +67583,7 @@ Domain allowed access.
47643 </param>
47644 <infoflow type="none"/>
47645 </interface>
47646 -<interface name="corenet_tcp_connect_vnc_port" lineno="92519">
47647 +<interface name="corenet_tcp_connect_vnc_port" lineno="92642">
47648 <summary>
47649 Make a TCP connection to the vnc port.
47650 </summary>
47651 @@ -67776,7 +67593,7 @@ Domain allowed access.
47652 </summary>
47653 </param>
47654 </interface>
47655 -<interface name="corenet_send_vnc_client_packets" lineno="92539">
47656 +<interface name="corenet_send_vnc_client_packets" lineno="92662">
47657 <summary>
47658 Send vnc_client packets.
47659 </summary>
47660 @@ -67787,7 +67604,7 @@ Domain allowed access.
47661 </param>
47662 <infoflow type="write" weight="10"/>
47663 </interface>
47664 -<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="92558">
47665 +<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="92681">
47666 <summary>
47667 Do not audit attempts to send vnc_client packets.
47668 </summary>
47669 @@ -67798,7 +67615,7 @@ Domain to not audit.
47670 </param>
47671 <infoflow type="none"/>
47672 </interface>
47673 -<interface name="corenet_receive_vnc_client_packets" lineno="92577">
47674 +<interface name="corenet_receive_vnc_client_packets" lineno="92700">
47675 <summary>
47676 Receive vnc_client packets.
47677 </summary>
47678 @@ -67809,7 +67626,7 @@ Domain allowed access.
47679 </param>
47680 <infoflow type="read" weight="10"/>
47681 </interface>
47682 -<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="92596">
47683 +<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="92719">
47684 <summary>
47685 Do not audit attempts to receive vnc_client packets.
47686 </summary>
47687 @@ -67820,7 +67637,7 @@ Domain allowed access.
47688 </param>
47689 <infoflow type="none"/>
47690 </interface>
47691 -<interface name="corenet_sendrecv_vnc_client_packets" lineno="92615">
47692 +<interface name="corenet_sendrecv_vnc_client_packets" lineno="92738">
47693 <summary>
47694 Send and receive vnc_client packets.
47695 </summary>
47696 @@ -67831,7 +67648,7 @@ Domain allowed access.
47697 </param>
47698 <infoflow type="both" weight="10"/>
47699 </interface>
47700 -<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="92631">
47701 +<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="92754">
47702 <summary>
47703 Do not audit attempts to send and receive vnc_client packets.
47704 </summary>
47705 @@ -67842,7 +67659,7 @@ Domain to not audit.
47706 </param>
47707 <infoflow type="none"/>
47708 </interface>
47709 -<interface name="corenet_relabelto_vnc_client_packets" lineno="92646">
47710 +<interface name="corenet_relabelto_vnc_client_packets" lineno="92769">
47711 <summary>
47712 Relabel packets to vnc_client the packet type.
47713 </summary>
47714 @@ -67852,7 +67669,7 @@ Domain allowed access.
47715 </summary>
47716 </param>
47717 </interface>
47718 -<interface name="corenet_send_vnc_server_packets" lineno="92666">
47719 +<interface name="corenet_send_vnc_server_packets" lineno="92789">
47720 <summary>
47721 Send vnc_server packets.
47722 </summary>
47723 @@ -67863,7 +67680,7 @@ Domain allowed access.
47724 </param>
47725 <infoflow type="write" weight="10"/>
47726 </interface>
47727 -<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="92685">
47728 +<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="92808">
47729 <summary>
47730 Do not audit attempts to send vnc_server packets.
47731 </summary>
47732 @@ -67874,7 +67691,7 @@ Domain to not audit.
47733 </param>
47734 <infoflow type="none"/>
47735 </interface>
47736 -<interface name="corenet_receive_vnc_server_packets" lineno="92704">
47737 +<interface name="corenet_receive_vnc_server_packets" lineno="92827">
47738 <summary>
47739 Receive vnc_server packets.
47740 </summary>
47741 @@ -67885,7 +67702,7 @@ Domain allowed access.
47742 </param>
47743 <infoflow type="read" weight="10"/>
47744 </interface>
47745 -<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="92723">
47746 +<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="92846">
47747 <summary>
47748 Do not audit attempts to receive vnc_server packets.
47749 </summary>
47750 @@ -67896,7 +67713,7 @@ Domain allowed access.
47751 </param>
47752 <infoflow type="none"/>
47753 </interface>
47754 -<interface name="corenet_sendrecv_vnc_server_packets" lineno="92742">
47755 +<interface name="corenet_sendrecv_vnc_server_packets" lineno="92865">
47756 <summary>
47757 Send and receive vnc_server packets.
47758 </summary>
47759 @@ -67907,7 +67724,7 @@ Domain allowed access.
47760 </param>
47761 <infoflow type="both" weight="10"/>
47762 </interface>
47763 -<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="92758">
47764 +<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="92881">
47765 <summary>
47766 Do not audit attempts to send and receive vnc_server packets.
47767 </summary>
47768 @@ -67918,7 +67735,7 @@ Domain to not audit.
47769 </param>
47770 <infoflow type="none"/>
47771 </interface>
47772 -<interface name="corenet_relabelto_vnc_server_packets" lineno="92773">
47773 +<interface name="corenet_relabelto_vnc_server_packets" lineno="92896">
47774 <summary>
47775 Relabel packets to vnc_server the packet type.
47776 </summary>
47777 @@ -67928,7 +67745,7 @@ Domain allowed access.
47778 </summary>
47779 </param>
47780 </interface>
47781 -<interface name="corenet_tcp_sendrecv_wccp_port" lineno="92795">
47782 +<interface name="corenet_tcp_sendrecv_wccp_port" lineno="92918">
47783 <summary>
47784 Send and receive TCP traffic on the wccp port.
47785 </summary>
47786 @@ -67939,7 +67756,7 @@ Domain allowed access.
47787 </param>
47788 <infoflow type="both" weight="10"/>
47789 </interface>
47790 -<interface name="corenet_udp_send_wccp_port" lineno="92810">
47791 +<interface name="corenet_udp_send_wccp_port" lineno="92933">
47792 <summary>
47793 Send UDP traffic on the wccp port.
47794 </summary>
47795 @@ -67950,7 +67767,7 @@ Domain allowed access.
47796 </param>
47797 <infoflow type="write" weight="10"/>
47798 </interface>
47799 -<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="92825">
47800 +<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="92948">
47801 <summary>
47802 Do not audit attempts to send UDP traffic on the wccp port.
47803 </summary>
47804 @@ -67961,7 +67778,7 @@ Domain to not audit.
47805 </param>
47806 <infoflow type="none"/>
47807 </interface>
47808 -<interface name="corenet_udp_receive_wccp_port" lineno="92840">
47809 +<interface name="corenet_udp_receive_wccp_port" lineno="92963">
47810 <summary>
47811 Receive UDP traffic on the wccp port.
47812 </summary>
47813 @@ -67972,7 +67789,7 @@ Domain allowed access.
47814 </param>
47815 <infoflow type="read" weight="10"/>
47816 </interface>
47817 -<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="92855">
47818 +<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="92978">
47819 <summary>
47820 Do not audit attempts to receive UDP traffic on the wccp port.
47821 </summary>
47822 @@ -67983,7 +67800,7 @@ Domain to not audit.
47823 </param>
47824 <infoflow type="none"/>
47825 </interface>
47826 -<interface name="corenet_udp_sendrecv_wccp_port" lineno="92870">
47827 +<interface name="corenet_udp_sendrecv_wccp_port" lineno="92993">
47828 <summary>
47829 Send and receive UDP traffic on the wccp port.
47830 </summary>
47831 @@ -67994,7 +67811,7 @@ Domain allowed access.
47832 </param>
47833 <infoflow type="both" weight="10"/>
47834 </interface>
47835 -<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="92886">
47836 +<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="93009">
47837 <summary>
47838 Do not audit attempts to send and receive
47839 UDP traffic on the wccp port.
47840 @@ -68006,7 +67823,7 @@ Domain to not audit.
47841 </param>
47842 <infoflow type="none"/>
47843 </interface>
47844 -<interface name="corenet_tcp_bind_wccp_port" lineno="92901">
47845 +<interface name="corenet_tcp_bind_wccp_port" lineno="93024">
47846 <summary>
47847 Bind TCP sockets to the wccp port.
47848 </summary>
47849 @@ -68017,7 +67834,7 @@ Domain allowed access.
47850 </param>
47851 <infoflow type="none"/>
47852 </interface>
47853 -<interface name="corenet_udp_bind_wccp_port" lineno="92921">
47854 +<interface name="corenet_udp_bind_wccp_port" lineno="93044">
47855 <summary>
47856 Bind UDP sockets to the wccp port.
47857 </summary>
47858 @@ -68028,7 +67845,7 @@ Domain allowed access.
47859 </param>
47860 <infoflow type="none"/>
47861 </interface>
47862 -<interface name="corenet_tcp_connect_wccp_port" lineno="92940">
47863 +<interface name="corenet_tcp_connect_wccp_port" lineno="93063">
47864 <summary>
47865 Make a TCP connection to the wccp port.
47866 </summary>
47867 @@ -68038,7 +67855,7 @@ Domain allowed access.
47868 </summary>
47869 </param>
47870 </interface>
47871 -<interface name="corenet_send_wccp_client_packets" lineno="92960">
47872 +<interface name="corenet_send_wccp_client_packets" lineno="93083">
47873 <summary>
47874 Send wccp_client packets.
47875 </summary>
47876 @@ -68049,7 +67866,7 @@ Domain allowed access.
47877 </param>
47878 <infoflow type="write" weight="10"/>
47879 </interface>
47880 -<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="92979">
47881 +<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="93102">
47882 <summary>
47883 Do not audit attempts to send wccp_client packets.
47884 </summary>
47885 @@ -68060,7 +67877,7 @@ Domain to not audit.
47886 </param>
47887 <infoflow type="none"/>
47888 </interface>
47889 -<interface name="corenet_receive_wccp_client_packets" lineno="92998">
47890 +<interface name="corenet_receive_wccp_client_packets" lineno="93121">
47891 <summary>
47892 Receive wccp_client packets.
47893 </summary>
47894 @@ -68071,7 +67888,7 @@ Domain allowed access.
47895 </param>
47896 <infoflow type="read" weight="10"/>
47897 </interface>
47898 -<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="93017">
47899 +<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="93140">
47900 <summary>
47901 Do not audit attempts to receive wccp_client packets.
47902 </summary>
47903 @@ -68082,7 +67899,7 @@ Domain allowed access.
47904 </param>
47905 <infoflow type="none"/>
47906 </interface>
47907 -<interface name="corenet_sendrecv_wccp_client_packets" lineno="93036">
47908 +<interface name="corenet_sendrecv_wccp_client_packets" lineno="93159">
47909 <summary>
47910 Send and receive wccp_client packets.
47911 </summary>
47912 @@ -68093,7 +67910,7 @@ Domain allowed access.
47913 </param>
47914 <infoflow type="both" weight="10"/>
47915 </interface>
47916 -<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="93052">
47917 +<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="93175">
47918 <summary>
47919 Do not audit attempts to send and receive wccp_client packets.
47920 </summary>
47921 @@ -68104,7 +67921,7 @@ Domain to not audit.
47922 </param>
47923 <infoflow type="none"/>
47924 </interface>
47925 -<interface name="corenet_relabelto_wccp_client_packets" lineno="93067">
47926 +<interface name="corenet_relabelto_wccp_client_packets" lineno="93190">
47927 <summary>
47928 Relabel packets to wccp_client the packet type.
47929 </summary>
47930 @@ -68114,7 +67931,7 @@ Domain allowed access.
47931 </summary>
47932 </param>
47933 </interface>
47934 -<interface name="corenet_send_wccp_server_packets" lineno="93087">
47935 +<interface name="corenet_send_wccp_server_packets" lineno="93210">
47936 <summary>
47937 Send wccp_server packets.
47938 </summary>
47939 @@ -68125,7 +67942,7 @@ Domain allowed access.
47940 </param>
47941 <infoflow type="write" weight="10"/>
47942 </interface>
47943 -<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="93106">
47944 +<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="93229">
47945 <summary>
47946 Do not audit attempts to send wccp_server packets.
47947 </summary>
47948 @@ -68136,7 +67953,7 @@ Domain to not audit.
47949 </param>
47950 <infoflow type="none"/>
47951 </interface>
47952 -<interface name="corenet_receive_wccp_server_packets" lineno="93125">
47953 +<interface name="corenet_receive_wccp_server_packets" lineno="93248">
47954 <summary>
47955 Receive wccp_server packets.
47956 </summary>
47957 @@ -68147,7 +67964,7 @@ Domain allowed access.
47958 </param>
47959 <infoflow type="read" weight="10"/>
47960 </interface>
47961 -<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="93144">
47962 +<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="93267">
47963 <summary>
47964 Do not audit attempts to receive wccp_server packets.
47965 </summary>
47966 @@ -68158,7 +67975,7 @@ Domain allowed access.
47967 </param>
47968 <infoflow type="none"/>
47969 </interface>
47970 -<interface name="corenet_sendrecv_wccp_server_packets" lineno="93163">
47971 +<interface name="corenet_sendrecv_wccp_server_packets" lineno="93286">
47972 <summary>
47973 Send and receive wccp_server packets.
47974 </summary>
47975 @@ -68169,7 +67986,7 @@ Domain allowed access.
47976 </param>
47977 <infoflow type="both" weight="10"/>
47978 </interface>
47979 -<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="93179">
47980 +<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="93302">
47981 <summary>
47982 Do not audit attempts to send and receive wccp_server packets.
47983 </summary>
47984 @@ -68180,7 +67997,7 @@ Domain to not audit.
47985 </param>
47986 <infoflow type="none"/>
47987 </interface>
47988 -<interface name="corenet_relabelto_wccp_server_packets" lineno="93194">
47989 +<interface name="corenet_relabelto_wccp_server_packets" lineno="93317">
47990 <summary>
47991 Relabel packets to wccp_server the packet type.
47992 </summary>
47993 @@ -68190,7 +68007,7 @@ Domain allowed access.
47994 </summary>
47995 </param>
47996 </interface>
47997 -<interface name="corenet_tcp_sendrecv_websm_port" lineno="93216">
47998 +<interface name="corenet_tcp_sendrecv_websm_port" lineno="93339">
47999 <summary>
48000 Send and receive TCP traffic on the websm port.
48001 </summary>
48002 @@ -68201,7 +68018,7 @@ Domain allowed access.
48003 </param>
48004 <infoflow type="both" weight="10"/>
48005 </interface>
48006 -<interface name="corenet_udp_send_websm_port" lineno="93231">
48007 +<interface name="corenet_udp_send_websm_port" lineno="93354">
48008 <summary>
48009 Send UDP traffic on the websm port.
48010 </summary>
48011 @@ -68212,7 +68029,7 @@ Domain allowed access.
48012 </param>
48013 <infoflow type="write" weight="10"/>
48014 </interface>
48015 -<interface name="corenet_dontaudit_udp_send_websm_port" lineno="93246">
48016 +<interface name="corenet_dontaudit_udp_send_websm_port" lineno="93369">
48017 <summary>
48018 Do not audit attempts to send UDP traffic on the websm port.
48019 </summary>
48020 @@ -68223,7 +68040,7 @@ Domain to not audit.
48021 </param>
48022 <infoflow type="none"/>
48023 </interface>
48024 -<interface name="corenet_udp_receive_websm_port" lineno="93261">
48025 +<interface name="corenet_udp_receive_websm_port" lineno="93384">
48026 <summary>
48027 Receive UDP traffic on the websm port.
48028 </summary>
48029 @@ -68234,7 +68051,7 @@ Domain allowed access.
48030 </param>
48031 <infoflow type="read" weight="10"/>
48032 </interface>
48033 -<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="93276">
48034 +<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="93399">
48035 <summary>
48036 Do not audit attempts to receive UDP traffic on the websm port.
48037 </summary>
48038 @@ -68245,7 +68062,7 @@ Domain to not audit.
48039 </param>
48040 <infoflow type="none"/>
48041 </interface>
48042 -<interface name="corenet_udp_sendrecv_websm_port" lineno="93291">
48043 +<interface name="corenet_udp_sendrecv_websm_port" lineno="93414">
48044 <summary>
48045 Send and receive UDP traffic on the websm port.
48046 </summary>
48047 @@ -68256,7 +68073,7 @@ Domain allowed access.
48048 </param>
48049 <infoflow type="both" weight="10"/>
48050 </interface>
48051 -<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="93307">
48052 +<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="93430">
48053 <summary>
48054 Do not audit attempts to send and receive
48055 UDP traffic on the websm port.
48056 @@ -68268,7 +68085,7 @@ Domain to not audit.
48057 </param>
48058 <infoflow type="none"/>
48059 </interface>
48060 -<interface name="corenet_tcp_bind_websm_port" lineno="93322">
48061 +<interface name="corenet_tcp_bind_websm_port" lineno="93445">
48062 <summary>
48063 Bind TCP sockets to the websm port.
48064 </summary>
48065 @@ -68279,7 +68096,7 @@ Domain allowed access.
48066 </param>
48067 <infoflow type="none"/>
48068 </interface>
48069 -<interface name="corenet_udp_bind_websm_port" lineno="93342">
48070 +<interface name="corenet_udp_bind_websm_port" lineno="93465">
48071 <summary>
48072 Bind UDP sockets to the websm port.
48073 </summary>
48074 @@ -68290,7 +68107,7 @@ Domain allowed access.
48075 </param>
48076 <infoflow type="none"/>
48077 </interface>
48078 -<interface name="corenet_tcp_connect_websm_port" lineno="93361">
48079 +<interface name="corenet_tcp_connect_websm_port" lineno="93484">
48080 <summary>
48081 Make a TCP connection to the websm port.
48082 </summary>
48083 @@ -68300,7 +68117,7 @@ Domain allowed access.
48084 </summary>
48085 </param>
48086 </interface>
48087 -<interface name="corenet_send_websm_client_packets" lineno="93381">
48088 +<interface name="corenet_send_websm_client_packets" lineno="93504">
48089 <summary>
48090 Send websm_client packets.
48091 </summary>
48092 @@ -68311,7 +68128,7 @@ Domain allowed access.
48093 </param>
48094 <infoflow type="write" weight="10"/>
48095 </interface>
48096 -<interface name="corenet_dontaudit_send_websm_client_packets" lineno="93400">
48097 +<interface name="corenet_dontaudit_send_websm_client_packets" lineno="93523">
48098 <summary>
48099 Do not audit attempts to send websm_client packets.
48100 </summary>
48101 @@ -68322,7 +68139,7 @@ Domain to not audit.
48102 </param>
48103 <infoflow type="none"/>
48104 </interface>
48105 -<interface name="corenet_receive_websm_client_packets" lineno="93419">
48106 +<interface name="corenet_receive_websm_client_packets" lineno="93542">
48107 <summary>
48108 Receive websm_client packets.
48109 </summary>
48110 @@ -68333,7 +68150,7 @@ Domain allowed access.
48111 </param>
48112 <infoflow type="read" weight="10"/>
48113 </interface>
48114 -<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="93438">
48115 +<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="93561">
48116 <summary>
48117 Do not audit attempts to receive websm_client packets.
48118 </summary>
48119 @@ -68344,7 +68161,7 @@ Domain allowed access.
48120 </param>
48121 <infoflow type="none"/>
48122 </interface>
48123 -<interface name="corenet_sendrecv_websm_client_packets" lineno="93457">
48124 +<interface name="corenet_sendrecv_websm_client_packets" lineno="93580">
48125 <summary>
48126 Send and receive websm_client packets.
48127 </summary>
48128 @@ -68355,7 +68172,7 @@ Domain allowed access.
48129 </param>
48130 <infoflow type="both" weight="10"/>
48131 </interface>
48132 -<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="93473">
48133 +<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="93596">
48134 <summary>
48135 Do not audit attempts to send and receive websm_client packets.
48136 </summary>
48137 @@ -68366,7 +68183,7 @@ Domain to not audit.
48138 </param>
48139 <infoflow type="none"/>
48140 </interface>
48141 -<interface name="corenet_relabelto_websm_client_packets" lineno="93488">
48142 +<interface name="corenet_relabelto_websm_client_packets" lineno="93611">
48143 <summary>
48144 Relabel packets to websm_client the packet type.
48145 </summary>
48146 @@ -68376,7 +68193,7 @@ Domain allowed access.
48147 </summary>
48148 </param>
48149 </interface>
48150 -<interface name="corenet_send_websm_server_packets" lineno="93508">
48151 +<interface name="corenet_send_websm_server_packets" lineno="93631">
48152 <summary>
48153 Send websm_server packets.
48154 </summary>
48155 @@ -68387,7 +68204,7 @@ Domain allowed access.
48156 </param>
48157 <infoflow type="write" weight="10"/>
48158 </interface>
48159 -<interface name="corenet_dontaudit_send_websm_server_packets" lineno="93527">
48160 +<interface name="corenet_dontaudit_send_websm_server_packets" lineno="93650">
48161 <summary>
48162 Do not audit attempts to send websm_server packets.
48163 </summary>
48164 @@ -68398,7 +68215,7 @@ Domain to not audit.
48165 </param>
48166 <infoflow type="none"/>
48167 </interface>
48168 -<interface name="corenet_receive_websm_server_packets" lineno="93546">
48169 +<interface name="corenet_receive_websm_server_packets" lineno="93669">
48170 <summary>
48171 Receive websm_server packets.
48172 </summary>
48173 @@ -68409,7 +68226,7 @@ Domain allowed access.
48174 </param>
48175 <infoflow type="read" weight="10"/>
48176 </interface>
48177 -<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="93565">
48178 +<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="93688">
48179 <summary>
48180 Do not audit attempts to receive websm_server packets.
48181 </summary>
48182 @@ -68420,7 +68237,7 @@ Domain allowed access.
48183 </param>
48184 <infoflow type="none"/>
48185 </interface>
48186 -<interface name="corenet_sendrecv_websm_server_packets" lineno="93584">
48187 +<interface name="corenet_sendrecv_websm_server_packets" lineno="93707">
48188 <summary>
48189 Send and receive websm_server packets.
48190 </summary>
48191 @@ -68431,7 +68248,7 @@ Domain allowed access.
48192 </param>
48193 <infoflow type="both" weight="10"/>
48194 </interface>
48195 -<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="93600">
48196 +<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="93723">
48197 <summary>
48198 Do not audit attempts to send and receive websm_server packets.
48199 </summary>
48200 @@ -68442,7 +68259,7 @@ Domain to not audit.
48201 </param>
48202 <infoflow type="none"/>
48203 </interface>
48204 -<interface name="corenet_relabelto_websm_server_packets" lineno="93615">
48205 +<interface name="corenet_relabelto_websm_server_packets" lineno="93738">
48206 <summary>
48207 Relabel packets to websm_server the packet type.
48208 </summary>
48209 @@ -68452,7 +68269,7 @@ Domain allowed access.
48210 </summary>
48211 </param>
48212 </interface>
48213 -<interface name="corenet_tcp_sendrecv_whois_port" lineno="93637">
48214 +<interface name="corenet_tcp_sendrecv_whois_port" lineno="93760">
48215 <summary>
48216 Send and receive TCP traffic on the whois port.
48217 </summary>
48218 @@ -68463,7 +68280,7 @@ Domain allowed access.
48219 </param>
48220 <infoflow type="both" weight="10"/>
48221 </interface>
48222 -<interface name="corenet_udp_send_whois_port" lineno="93652">
48223 +<interface name="corenet_udp_send_whois_port" lineno="93775">
48224 <summary>
48225 Send UDP traffic on the whois port.
48226 </summary>
48227 @@ -68474,7 +68291,7 @@ Domain allowed access.
48228 </param>
48229 <infoflow type="write" weight="10"/>
48230 </interface>
48231 -<interface name="corenet_dontaudit_udp_send_whois_port" lineno="93667">
48232 +<interface name="corenet_dontaudit_udp_send_whois_port" lineno="93790">
48233 <summary>
48234 Do not audit attempts to send UDP traffic on the whois port.
48235 </summary>
48236 @@ -68485,7 +68302,7 @@ Domain to not audit.
48237 </param>
48238 <infoflow type="none"/>
48239 </interface>
48240 -<interface name="corenet_udp_receive_whois_port" lineno="93682">
48241 +<interface name="corenet_udp_receive_whois_port" lineno="93805">
48242 <summary>
48243 Receive UDP traffic on the whois port.
48244 </summary>
48245 @@ -68496,7 +68313,7 @@ Domain allowed access.
48246 </param>
48247 <infoflow type="read" weight="10"/>
48248 </interface>
48249 -<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="93697">
48250 +<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="93820">
48251 <summary>
48252 Do not audit attempts to receive UDP traffic on the whois port.
48253 </summary>
48254 @@ -68507,7 +68324,7 @@ Domain to not audit.
48255 </param>
48256 <infoflow type="none"/>
48257 </interface>
48258 -<interface name="corenet_udp_sendrecv_whois_port" lineno="93712">
48259 +<interface name="corenet_udp_sendrecv_whois_port" lineno="93835">
48260 <summary>
48261 Send and receive UDP traffic on the whois port.
48262 </summary>
48263 @@ -68518,7 +68335,7 @@ Domain allowed access.
48264 </param>
48265 <infoflow type="both" weight="10"/>
48266 </interface>
48267 -<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="93728">
48268 +<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="93851">
48269 <summary>
48270 Do not audit attempts to send and receive
48271 UDP traffic on the whois port.
48272 @@ -68530,7 +68347,7 @@ Domain to not audit.
48273 </param>
48274 <infoflow type="none"/>
48275 </interface>
48276 -<interface name="corenet_tcp_bind_whois_port" lineno="93743">
48277 +<interface name="corenet_tcp_bind_whois_port" lineno="93866">
48278 <summary>
48279 Bind TCP sockets to the whois port.
48280 </summary>
48281 @@ -68541,7 +68358,7 @@ Domain allowed access.
48282 </param>
48283 <infoflow type="none"/>
48284 </interface>
48285 -<interface name="corenet_udp_bind_whois_port" lineno="93763">
48286 +<interface name="corenet_udp_bind_whois_port" lineno="93886">
48287 <summary>
48288 Bind UDP sockets to the whois port.
48289 </summary>
48290 @@ -68552,7 +68369,7 @@ Domain allowed access.
48291 </param>
48292 <infoflow type="none"/>
48293 </interface>
48294 -<interface name="corenet_tcp_connect_whois_port" lineno="93782">
48295 +<interface name="corenet_tcp_connect_whois_port" lineno="93905">
48296 <summary>
48297 Make a TCP connection to the whois port.
48298 </summary>
48299 @@ -68562,7 +68379,7 @@ Domain allowed access.
48300 </summary>
48301 </param>
48302 </interface>
48303 -<interface name="corenet_send_whois_client_packets" lineno="93802">
48304 +<interface name="corenet_send_whois_client_packets" lineno="93925">
48305 <summary>
48306 Send whois_client packets.
48307 </summary>
48308 @@ -68573,7 +68390,7 @@ Domain allowed access.
48309 </param>
48310 <infoflow type="write" weight="10"/>
48311 </interface>
48312 -<interface name="corenet_dontaudit_send_whois_client_packets" lineno="93821">
48313 +<interface name="corenet_dontaudit_send_whois_client_packets" lineno="93944">
48314 <summary>
48315 Do not audit attempts to send whois_client packets.
48316 </summary>
48317 @@ -68584,7 +68401,7 @@ Domain to not audit.
48318 </param>
48319 <infoflow type="none"/>
48320 </interface>
48321 -<interface name="corenet_receive_whois_client_packets" lineno="93840">
48322 +<interface name="corenet_receive_whois_client_packets" lineno="93963">
48323 <summary>
48324 Receive whois_client packets.
48325 </summary>
48326 @@ -68595,7 +68412,7 @@ Domain allowed access.
48327 </param>
48328 <infoflow type="read" weight="10"/>
48329 </interface>
48330 -<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="93859">
48331 +<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="93982">
48332 <summary>
48333 Do not audit attempts to receive whois_client packets.
48334 </summary>
48335 @@ -68606,7 +68423,7 @@ Domain allowed access.
48336 </param>
48337 <infoflow type="none"/>
48338 </interface>
48339 -<interface name="corenet_sendrecv_whois_client_packets" lineno="93878">
48340 +<interface name="corenet_sendrecv_whois_client_packets" lineno="94001">
48341 <summary>
48342 Send and receive whois_client packets.
48343 </summary>
48344 @@ -68617,7 +68434,7 @@ Domain allowed access.
48345 </param>
48346 <infoflow type="both" weight="10"/>
48347 </interface>
48348 -<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="93894">
48349 +<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="94017">
48350 <summary>
48351 Do not audit attempts to send and receive whois_client packets.
48352 </summary>
48353 @@ -68628,7 +68445,7 @@ Domain to not audit.
48354 </param>
48355 <infoflow type="none"/>
48356 </interface>
48357 -<interface name="corenet_relabelto_whois_client_packets" lineno="93909">
48358 +<interface name="corenet_relabelto_whois_client_packets" lineno="94032">
48359 <summary>
48360 Relabel packets to whois_client the packet type.
48361 </summary>
48362 @@ -68638,7 +68455,7 @@ Domain allowed access.
48363 </summary>
48364 </param>
48365 </interface>
48366 -<interface name="corenet_send_whois_server_packets" lineno="93929">
48367 +<interface name="corenet_send_whois_server_packets" lineno="94052">
48368 <summary>
48369 Send whois_server packets.
48370 </summary>
48371 @@ -68649,7 +68466,7 @@ Domain allowed access.
48372 </param>
48373 <infoflow type="write" weight="10"/>
48374 </interface>
48375 -<interface name="corenet_dontaudit_send_whois_server_packets" lineno="93948">
48376 +<interface name="corenet_dontaudit_send_whois_server_packets" lineno="94071">
48377 <summary>
48378 Do not audit attempts to send whois_server packets.
48379 </summary>
48380 @@ -68660,7 +68477,7 @@ Domain to not audit.
48381 </param>
48382 <infoflow type="none"/>
48383 </interface>
48384 -<interface name="corenet_receive_whois_server_packets" lineno="93967">
48385 +<interface name="corenet_receive_whois_server_packets" lineno="94090">
48386 <summary>
48387 Receive whois_server packets.
48388 </summary>
48389 @@ -68671,7 +68488,7 @@ Domain allowed access.
48390 </param>
48391 <infoflow type="read" weight="10"/>
48392 </interface>
48393 -<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="93986">
48394 +<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="94109">
48395 <summary>
48396 Do not audit attempts to receive whois_server packets.
48397 </summary>
48398 @@ -68682,7 +68499,7 @@ Domain allowed access.
48399 </param>
48400 <infoflow type="none"/>
48401 </interface>
48402 -<interface name="corenet_sendrecv_whois_server_packets" lineno="94005">
48403 +<interface name="corenet_sendrecv_whois_server_packets" lineno="94128">
48404 <summary>
48405 Send and receive whois_server packets.
48406 </summary>
48407 @@ -68693,7 +68510,7 @@ Domain allowed access.
48408 </param>
48409 <infoflow type="both" weight="10"/>
48410 </interface>
48411 -<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="94021">
48412 +<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="94144">
48413 <summary>
48414 Do not audit attempts to send and receive whois_server packets.
48415 </summary>
48416 @@ -68704,7 +68521,7 @@ Domain to not audit.
48417 </param>
48418 <infoflow type="none"/>
48419 </interface>
48420 -<interface name="corenet_relabelto_whois_server_packets" lineno="94036">
48421 +<interface name="corenet_relabelto_whois_server_packets" lineno="94159">
48422 <summary>
48423 Relabel packets to whois_server the packet type.
48424 </summary>
48425 @@ -68714,7 +68531,7 @@ Domain allowed access.
48426 </summary>
48427 </param>
48428 </interface>
48429 -<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="94058">
48430 +<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="94181">
48431 <summary>
48432 Send and receive TCP traffic on the winshadow port.
48433 </summary>
48434 @@ -68725,7 +68542,7 @@ Domain allowed access.
48435 </param>
48436 <infoflow type="both" weight="10"/>
48437 </interface>
48438 -<interface name="corenet_udp_send_winshadow_port" lineno="94073">
48439 +<interface name="corenet_udp_send_winshadow_port" lineno="94196">
48440 <summary>
48441 Send UDP traffic on the winshadow port.
48442 </summary>
48443 @@ -68736,7 +68553,7 @@ Domain allowed access.
48444 </param>
48445 <infoflow type="write" weight="10"/>
48446 </interface>
48447 -<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="94088">
48448 +<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="94211">
48449 <summary>
48450 Do not audit attempts to send UDP traffic on the winshadow port.
48451 </summary>
48452 @@ -68747,7 +68564,7 @@ Domain to not audit.
48453 </param>
48454 <infoflow type="none"/>
48455 </interface>
48456 -<interface name="corenet_udp_receive_winshadow_port" lineno="94103">
48457 +<interface name="corenet_udp_receive_winshadow_port" lineno="94226">
48458 <summary>
48459 Receive UDP traffic on the winshadow port.
48460 </summary>
48461 @@ -68758,7 +68575,7 @@ Domain allowed access.
48462 </param>
48463 <infoflow type="read" weight="10"/>
48464 </interface>
48465 -<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="94118">
48466 +<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="94241">
48467 <summary>
48468 Do not audit attempts to receive UDP traffic on the winshadow port.
48469 </summary>
48470 @@ -68769,7 +68586,7 @@ Domain to not audit.
48471 </param>
48472 <infoflow type="none"/>
48473 </interface>
48474 -<interface name="corenet_udp_sendrecv_winshadow_port" lineno="94133">
48475 +<interface name="corenet_udp_sendrecv_winshadow_port" lineno="94256">
48476 <summary>
48477 Send and receive UDP traffic on the winshadow port.
48478 </summary>
48479 @@ -68780,7 +68597,7 @@ Domain allowed access.
48480 </param>
48481 <infoflow type="both" weight="10"/>
48482 </interface>
48483 -<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="94149">
48484 +<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="94272">
48485 <summary>
48486 Do not audit attempts to send and receive
48487 UDP traffic on the winshadow port.
48488 @@ -68792,7 +68609,7 @@ Domain to not audit.
48489 </param>
48490 <infoflow type="none"/>
48491 </interface>
48492 -<interface name="corenet_tcp_bind_winshadow_port" lineno="94164">
48493 +<interface name="corenet_tcp_bind_winshadow_port" lineno="94287">
48494 <summary>
48495 Bind TCP sockets to the winshadow port.
48496 </summary>
48497 @@ -68803,7 +68620,7 @@ Domain allowed access.
48498 </param>
48499 <infoflow type="none"/>
48500 </interface>
48501 -<interface name="corenet_udp_bind_winshadow_port" lineno="94184">
48502 +<interface name="corenet_udp_bind_winshadow_port" lineno="94307">
48503 <summary>
48504 Bind UDP sockets to the winshadow port.
48505 </summary>
48506 @@ -68814,7 +68631,7 @@ Domain allowed access.
48507 </param>
48508 <infoflow type="none"/>
48509 </interface>
48510 -<interface name="corenet_tcp_connect_winshadow_port" lineno="94203">
48511 +<interface name="corenet_tcp_connect_winshadow_port" lineno="94326">
48512 <summary>
48513 Make a TCP connection to the winshadow port.
48514 </summary>
48515 @@ -68824,7 +68641,7 @@ Domain allowed access.
48516 </summary>
48517 </param>
48518 </interface>
48519 -<interface name="corenet_send_winshadow_client_packets" lineno="94223">
48520 +<interface name="corenet_send_winshadow_client_packets" lineno="94346">
48521 <summary>
48522 Send winshadow_client packets.
48523 </summary>
48524 @@ -68835,7 +68652,7 @@ Domain allowed access.
48525 </param>
48526 <infoflow type="write" weight="10"/>
48527 </interface>
48528 -<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="94242">
48529 +<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="94365">
48530 <summary>
48531 Do not audit attempts to send winshadow_client packets.
48532 </summary>
48533 @@ -68846,7 +68663,7 @@ Domain to not audit.
48534 </param>
48535 <infoflow type="none"/>
48536 </interface>
48537 -<interface name="corenet_receive_winshadow_client_packets" lineno="94261">
48538 +<interface name="corenet_receive_winshadow_client_packets" lineno="94384">
48539 <summary>
48540 Receive winshadow_client packets.
48541 </summary>
48542 @@ -68857,7 +68674,7 @@ Domain allowed access.
48543 </param>
48544 <infoflow type="read" weight="10"/>
48545 </interface>
48546 -<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="94280">
48547 +<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="94403">
48548 <summary>
48549 Do not audit attempts to receive winshadow_client packets.
48550 </summary>
48551 @@ -68868,7 +68685,7 @@ Domain allowed access.
48552 </param>
48553 <infoflow type="none"/>
48554 </interface>
48555 -<interface name="corenet_sendrecv_winshadow_client_packets" lineno="94299">
48556 +<interface name="corenet_sendrecv_winshadow_client_packets" lineno="94422">
48557 <summary>
48558 Send and receive winshadow_client packets.
48559 </summary>
48560 @@ -68879,7 +68696,7 @@ Domain allowed access.
48561 </param>
48562 <infoflow type="both" weight="10"/>
48563 </interface>
48564 -<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="94315">
48565 +<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="94438">
48566 <summary>
48567 Do not audit attempts to send and receive winshadow_client packets.
48568 </summary>
48569 @@ -68890,7 +68707,7 @@ Domain to not audit.
48570 </param>
48571 <infoflow type="none"/>
48572 </interface>
48573 -<interface name="corenet_relabelto_winshadow_client_packets" lineno="94330">
48574 +<interface name="corenet_relabelto_winshadow_client_packets" lineno="94453">
48575 <summary>
48576 Relabel packets to winshadow_client the packet type.
48577 </summary>
48578 @@ -68900,7 +68717,7 @@ Domain allowed access.
48579 </summary>
48580 </param>
48581 </interface>
48582 -<interface name="corenet_send_winshadow_server_packets" lineno="94350">
48583 +<interface name="corenet_send_winshadow_server_packets" lineno="94473">
48584 <summary>
48585 Send winshadow_server packets.
48586 </summary>
48587 @@ -68911,7 +68728,7 @@ Domain allowed access.
48588 </param>
48589 <infoflow type="write" weight="10"/>
48590 </interface>
48591 -<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="94369">
48592 +<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="94492">
48593 <summary>
48594 Do not audit attempts to send winshadow_server packets.
48595 </summary>
48596 @@ -68922,7 +68739,7 @@ Domain to not audit.
48597 </param>
48598 <infoflow type="none"/>
48599 </interface>
48600 -<interface name="corenet_receive_winshadow_server_packets" lineno="94388">
48601 +<interface name="corenet_receive_winshadow_server_packets" lineno="94511">
48602 <summary>
48603 Receive winshadow_server packets.
48604 </summary>
48605 @@ -68933,7 +68750,7 @@ Domain allowed access.
48606 </param>
48607 <infoflow type="read" weight="10"/>
48608 </interface>
48609 -<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="94407">
48610 +<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="94530">
48611 <summary>
48612 Do not audit attempts to receive winshadow_server packets.
48613 </summary>
48614 @@ -68944,7 +68761,7 @@ Domain allowed access.
48615 </param>
48616 <infoflow type="none"/>
48617 </interface>
48618 -<interface name="corenet_sendrecv_winshadow_server_packets" lineno="94426">
48619 +<interface name="corenet_sendrecv_winshadow_server_packets" lineno="94549">
48620 <summary>
48621 Send and receive winshadow_server packets.
48622 </summary>
48623 @@ -68955,7 +68772,7 @@ Domain allowed access.
48624 </param>
48625 <infoflow type="both" weight="10"/>
48626 </interface>
48627 -<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="94442">
48628 +<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="94565">
48629 <summary>
48630 Do not audit attempts to send and receive winshadow_server packets.
48631 </summary>
48632 @@ -68966,7 +68783,7 @@ Domain to not audit.
48633 </param>
48634 <infoflow type="none"/>
48635 </interface>
48636 -<interface name="corenet_relabelto_winshadow_server_packets" lineno="94457">
48637 +<interface name="corenet_relabelto_winshadow_server_packets" lineno="94580">
48638 <summary>
48639 Relabel packets to winshadow_server the packet type.
48640 </summary>
48641 @@ -68976,7 +68793,7 @@ Domain allowed access.
48642 </summary>
48643 </param>
48644 </interface>
48645 -<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="94479">
48646 +<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="94602">
48647 <summary>
48648 Send and receive TCP traffic on the wsdapi port.
48649 </summary>
48650 @@ -68987,7 +68804,7 @@ Domain allowed access.
48651 </param>
48652 <infoflow type="both" weight="10"/>
48653 </interface>
48654 -<interface name="corenet_udp_send_wsdapi_port" lineno="94494">
48655 +<interface name="corenet_udp_send_wsdapi_port" lineno="94617">
48656 <summary>
48657 Send UDP traffic on the wsdapi port.
48658 </summary>
48659 @@ -68998,7 +68815,7 @@ Domain allowed access.
48660 </param>
48661 <infoflow type="write" weight="10"/>
48662 </interface>
48663 -<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="94509">
48664 +<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="94632">
48665 <summary>
48666 Do not audit attempts to send UDP traffic on the wsdapi port.
48667 </summary>
48668 @@ -69009,7 +68826,7 @@ Domain to not audit.
48669 </param>
48670 <infoflow type="none"/>
48671 </interface>
48672 -<interface name="corenet_udp_receive_wsdapi_port" lineno="94524">
48673 +<interface name="corenet_udp_receive_wsdapi_port" lineno="94647">
48674 <summary>
48675 Receive UDP traffic on the wsdapi port.
48676 </summary>
48677 @@ -69020,7 +68837,7 @@ Domain allowed access.
48678 </param>
48679 <infoflow type="read" weight="10"/>
48680 </interface>
48681 -<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="94539">
48682 +<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="94662">
48683 <summary>
48684 Do not audit attempts to receive UDP traffic on the wsdapi port.
48685 </summary>
48686 @@ -69031,7 +68848,7 @@ Domain to not audit.
48687 </param>
48688 <infoflow type="none"/>
48689 </interface>
48690 -<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="94554">
48691 +<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="94677">
48692 <summary>
48693 Send and receive UDP traffic on the wsdapi port.
48694 </summary>
48695 @@ -69042,7 +68859,7 @@ Domain allowed access.
48696 </param>
48697 <infoflow type="both" weight="10"/>
48698 </interface>
48699 -<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="94570">
48700 +<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="94693">
48701 <summary>
48702 Do not audit attempts to send and receive
48703 UDP traffic on the wsdapi port.
48704 @@ -69054,7 +68871,7 @@ Domain to not audit.
48705 </param>
48706 <infoflow type="none"/>
48707 </interface>
48708 -<interface name="corenet_tcp_bind_wsdapi_port" lineno="94585">
48709 +<interface name="corenet_tcp_bind_wsdapi_port" lineno="94708">
48710 <summary>
48711 Bind TCP sockets to the wsdapi port.
48712 </summary>
48713 @@ -69065,7 +68882,7 @@ Domain allowed access.
48714 </param>
48715 <infoflow type="none"/>
48716 </interface>
48717 -<interface name="corenet_udp_bind_wsdapi_port" lineno="94605">
48718 +<interface name="corenet_udp_bind_wsdapi_port" lineno="94728">
48719 <summary>
48720 Bind UDP sockets to the wsdapi port.
48721 </summary>
48722 @@ -69076,7 +68893,7 @@ Domain allowed access.
48723 </param>
48724 <infoflow type="none"/>
48725 </interface>
48726 -<interface name="corenet_tcp_connect_wsdapi_port" lineno="94624">
48727 +<interface name="corenet_tcp_connect_wsdapi_port" lineno="94747">
48728 <summary>
48729 Make a TCP connection to the wsdapi port.
48730 </summary>
48731 @@ -69086,7 +68903,7 @@ Domain allowed access.
48732 </summary>
48733 </param>
48734 </interface>
48735 -<interface name="corenet_send_wsdapi_client_packets" lineno="94644">
48736 +<interface name="corenet_send_wsdapi_client_packets" lineno="94767">
48737 <summary>
48738 Send wsdapi_client packets.
48739 </summary>
48740 @@ -69097,7 +68914,7 @@ Domain allowed access.
48741 </param>
48742 <infoflow type="write" weight="10"/>
48743 </interface>
48744 -<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="94663">
48745 +<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="94786">
48746 <summary>
48747 Do not audit attempts to send wsdapi_client packets.
48748 </summary>
48749 @@ -69108,7 +68925,7 @@ Domain to not audit.
48750 </param>
48751 <infoflow type="none"/>
48752 </interface>
48753 -<interface name="corenet_receive_wsdapi_client_packets" lineno="94682">
48754 +<interface name="corenet_receive_wsdapi_client_packets" lineno="94805">
48755 <summary>
48756 Receive wsdapi_client packets.
48757 </summary>
48758 @@ -69119,7 +68936,7 @@ Domain allowed access.
48759 </param>
48760 <infoflow type="read" weight="10"/>
48761 </interface>
48762 -<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="94701">
48763 +<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="94824">
48764 <summary>
48765 Do not audit attempts to receive wsdapi_client packets.
48766 </summary>
48767 @@ -69130,7 +68947,7 @@ Domain allowed access.
48768 </param>
48769 <infoflow type="none"/>
48770 </interface>
48771 -<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="94720">
48772 +<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="94843">
48773 <summary>
48774 Send and receive wsdapi_client packets.
48775 </summary>
48776 @@ -69141,7 +68958,7 @@ Domain allowed access.
48777 </param>
48778 <infoflow type="both" weight="10"/>
48779 </interface>
48780 -<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="94736">
48781 +<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="94859">
48782 <summary>
48783 Do not audit attempts to send and receive wsdapi_client packets.
48784 </summary>
48785 @@ -69152,7 +68969,7 @@ Domain to not audit.
48786 </param>
48787 <infoflow type="none"/>
48788 </interface>
48789 -<interface name="corenet_relabelto_wsdapi_client_packets" lineno="94751">
48790 +<interface name="corenet_relabelto_wsdapi_client_packets" lineno="94874">
48791 <summary>
48792 Relabel packets to wsdapi_client the packet type.
48793 </summary>
48794 @@ -69162,7 +68979,7 @@ Domain allowed access.
48795 </summary>
48796 </param>
48797 </interface>
48798 -<interface name="corenet_send_wsdapi_server_packets" lineno="94771">
48799 +<interface name="corenet_send_wsdapi_server_packets" lineno="94894">
48800 <summary>
48801 Send wsdapi_server packets.
48802 </summary>
48803 @@ -69173,7 +68990,7 @@ Domain allowed access.
48804 </param>
48805 <infoflow type="write" weight="10"/>
48806 </interface>
48807 -<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="94790">
48808 +<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="94913">
48809 <summary>
48810 Do not audit attempts to send wsdapi_server packets.
48811 </summary>
48812 @@ -69184,7 +69001,7 @@ Domain to not audit.
48813 </param>
48814 <infoflow type="none"/>
48815 </interface>
48816 -<interface name="corenet_receive_wsdapi_server_packets" lineno="94809">
48817 +<interface name="corenet_receive_wsdapi_server_packets" lineno="94932">
48818 <summary>
48819 Receive wsdapi_server packets.
48820 </summary>
48821 @@ -69195,7 +69012,7 @@ Domain allowed access.
48822 </param>
48823 <infoflow type="read" weight="10"/>
48824 </interface>
48825 -<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="94828">
48826 +<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="94951">
48827 <summary>
48828 Do not audit attempts to receive wsdapi_server packets.
48829 </summary>
48830 @@ -69206,7 +69023,7 @@ Domain allowed access.
48831 </param>
48832 <infoflow type="none"/>
48833 </interface>
48834 -<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="94847">
48835 +<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="94970">
48836 <summary>
48837 Send and receive wsdapi_server packets.
48838 </summary>
48839 @@ -69217,7 +69034,7 @@ Domain allowed access.
48840 </param>
48841 <infoflow type="both" weight="10"/>
48842 </interface>
48843 -<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="94863">
48844 +<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="94986">
48845 <summary>
48846 Do not audit attempts to send and receive wsdapi_server packets.
48847 </summary>
48848 @@ -69228,7 +69045,7 @@ Domain to not audit.
48849 </param>
48850 <infoflow type="none"/>
48851 </interface>
48852 -<interface name="corenet_relabelto_wsdapi_server_packets" lineno="94878">
48853 +<interface name="corenet_relabelto_wsdapi_server_packets" lineno="95001">
48854 <summary>
48855 Relabel packets to wsdapi_server the packet type.
48856 </summary>
48857 @@ -69238,7 +69055,7 @@ Domain allowed access.
48858 </summary>
48859 </param>
48860 </interface>
48861 -<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="94900">
48862 +<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="95023">
48863 <summary>
48864 Send and receive TCP traffic on the wsicopy port.
48865 </summary>
48866 @@ -69249,7 +69066,7 @@ Domain allowed access.
48867 </param>
48868 <infoflow type="both" weight="10"/>
48869 </interface>
48870 -<interface name="corenet_udp_send_wsicopy_port" lineno="94915">
48871 +<interface name="corenet_udp_send_wsicopy_port" lineno="95038">
48872 <summary>
48873 Send UDP traffic on the wsicopy port.
48874 </summary>
48875 @@ -69260,7 +69077,7 @@ Domain allowed access.
48876 </param>
48877 <infoflow type="write" weight="10"/>
48878 </interface>
48879 -<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="94930">
48880 +<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="95053">
48881 <summary>
48882 Do not audit attempts to send UDP traffic on the wsicopy port.
48883 </summary>
48884 @@ -69271,7 +69088,7 @@ Domain to not audit.
48885 </param>
48886 <infoflow type="none"/>
48887 </interface>
48888 -<interface name="corenet_udp_receive_wsicopy_port" lineno="94945">
48889 +<interface name="corenet_udp_receive_wsicopy_port" lineno="95068">
48890 <summary>
48891 Receive UDP traffic on the wsicopy port.
48892 </summary>
48893 @@ -69282,7 +69099,7 @@ Domain allowed access.
48894 </param>
48895 <infoflow type="read" weight="10"/>
48896 </interface>
48897 -<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="94960">
48898 +<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="95083">
48899 <summary>
48900 Do not audit attempts to receive UDP traffic on the wsicopy port.
48901 </summary>
48902 @@ -69293,7 +69110,7 @@ Domain to not audit.
48903 </param>
48904 <infoflow type="none"/>
48905 </interface>
48906 -<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="94975">
48907 +<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="95098">
48908 <summary>
48909 Send and receive UDP traffic on the wsicopy port.
48910 </summary>
48911 @@ -69304,7 +69121,7 @@ Domain allowed access.
48912 </param>
48913 <infoflow type="both" weight="10"/>
48914 </interface>
48915 -<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="94991">
48916 +<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="95114">
48917 <summary>
48918 Do not audit attempts to send and receive
48919 UDP traffic on the wsicopy port.
48920 @@ -69316,7 +69133,7 @@ Domain to not audit.
48921 </param>
48922 <infoflow type="none"/>
48923 </interface>
48924 -<interface name="corenet_tcp_bind_wsicopy_port" lineno="95006">
48925 +<interface name="corenet_tcp_bind_wsicopy_port" lineno="95129">
48926 <summary>
48927 Bind TCP sockets to the wsicopy port.
48928 </summary>
48929 @@ -69327,7 +69144,7 @@ Domain allowed access.
48930 </param>
48931 <infoflow type="none"/>
48932 </interface>
48933 -<interface name="corenet_udp_bind_wsicopy_port" lineno="95026">
48934 +<interface name="corenet_udp_bind_wsicopy_port" lineno="95149">
48935 <summary>
48936 Bind UDP sockets to the wsicopy port.
48937 </summary>
48938 @@ -69338,7 +69155,7 @@ Domain allowed access.
48939 </param>
48940 <infoflow type="none"/>
48941 </interface>
48942 -<interface name="corenet_tcp_connect_wsicopy_port" lineno="95045">
48943 +<interface name="corenet_tcp_connect_wsicopy_port" lineno="95168">
48944 <summary>
48945 Make a TCP connection to the wsicopy port.
48946 </summary>
48947 @@ -69348,7 +69165,7 @@ Domain allowed access.
48948 </summary>
48949 </param>
48950 </interface>
48951 -<interface name="corenet_send_wsicopy_client_packets" lineno="95065">
48952 +<interface name="corenet_send_wsicopy_client_packets" lineno="95188">
48953 <summary>
48954 Send wsicopy_client packets.
48955 </summary>
48956 @@ -69359,7 +69176,7 @@ Domain allowed access.
48957 </param>
48958 <infoflow type="write" weight="10"/>
48959 </interface>
48960 -<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="95084">
48961 +<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="95207">
48962 <summary>
48963 Do not audit attempts to send wsicopy_client packets.
48964 </summary>
48965 @@ -69370,7 +69187,7 @@ Domain to not audit.
48966 </param>
48967 <infoflow type="none"/>
48968 </interface>
48969 -<interface name="corenet_receive_wsicopy_client_packets" lineno="95103">
48970 +<interface name="corenet_receive_wsicopy_client_packets" lineno="95226">
48971 <summary>
48972 Receive wsicopy_client packets.
48973 </summary>
48974 @@ -69381,7 +69198,7 @@ Domain allowed access.
48975 </param>
48976 <infoflow type="read" weight="10"/>
48977 </interface>
48978 -<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="95122">
48979 +<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="95245">
48980 <summary>
48981 Do not audit attempts to receive wsicopy_client packets.
48982 </summary>
48983 @@ -69392,7 +69209,7 @@ Domain allowed access.
48984 </param>
48985 <infoflow type="none"/>
48986 </interface>
48987 -<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="95141">
48988 +<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="95264">
48989 <summary>
48990 Send and receive wsicopy_client packets.
48991 </summary>
48992 @@ -69403,7 +69220,7 @@ Domain allowed access.
48993 </param>
48994 <infoflow type="both" weight="10"/>
48995 </interface>
48996 -<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="95157">
48997 +<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="95280">
48998 <summary>
48999 Do not audit attempts to send and receive wsicopy_client packets.
49000 </summary>
49001 @@ -69414,7 +69231,7 @@ Domain to not audit.
49002 </param>
49003 <infoflow type="none"/>
49004 </interface>
49005 -<interface name="corenet_relabelto_wsicopy_client_packets" lineno="95172">
49006 +<interface name="corenet_relabelto_wsicopy_client_packets" lineno="95295">
49007 <summary>
49008 Relabel packets to wsicopy_client the packet type.
49009 </summary>
49010 @@ -69424,7 +69241,7 @@ Domain allowed access.
49011 </summary>
49012 </param>
49013 </interface>
49014 -<interface name="corenet_send_wsicopy_server_packets" lineno="95192">
49015 +<interface name="corenet_send_wsicopy_server_packets" lineno="95315">
49016 <summary>
49017 Send wsicopy_server packets.
49018 </summary>
49019 @@ -69435,7 +69252,7 @@ Domain allowed access.
49020 </param>
49021 <infoflow type="write" weight="10"/>
49022 </interface>
49023 -<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="95211">
49024 +<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="95334">
49025 <summary>
49026 Do not audit attempts to send wsicopy_server packets.
49027 </summary>
49028 @@ -69446,7 +69263,7 @@ Domain to not audit.
49029 </param>
49030 <infoflow type="none"/>
49031 </interface>
49032 -<interface name="corenet_receive_wsicopy_server_packets" lineno="95230">
49033 +<interface name="corenet_receive_wsicopy_server_packets" lineno="95353">
49034 <summary>
49035 Receive wsicopy_server packets.
49036 </summary>
49037 @@ -69457,7 +69274,7 @@ Domain allowed access.
49038 </param>
49039 <infoflow type="read" weight="10"/>
49040 </interface>
49041 -<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="95249">
49042 +<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="95372">
49043 <summary>
49044 Do not audit attempts to receive wsicopy_server packets.
49045 </summary>
49046 @@ -69468,7 +69285,7 @@ Domain allowed access.
49047 </param>
49048 <infoflow type="none"/>
49049 </interface>
49050 -<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="95268">
49051 +<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="95391">
49052 <summary>
49053 Send and receive wsicopy_server packets.
49054 </summary>
49055 @@ -69479,7 +69296,7 @@ Domain allowed access.
49056 </param>
49057 <infoflow type="both" weight="10"/>
49058 </interface>
49059 -<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="95284">
49060 +<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="95407">
49061 <summary>
49062 Do not audit attempts to send and receive wsicopy_server packets.
49063 </summary>
49064 @@ -69490,7 +69307,7 @@ Domain to not audit.
49065 </param>
49066 <infoflow type="none"/>
49067 </interface>
49068 -<interface name="corenet_relabelto_wsicopy_server_packets" lineno="95299">
49069 +<interface name="corenet_relabelto_wsicopy_server_packets" lineno="95422">
49070 <summary>
49071 Relabel packets to wsicopy_server the packet type.
49072 </summary>
49073 @@ -69500,7 +69317,7 @@ Domain allowed access.
49074 </summary>
49075 </param>
49076 </interface>
49077 -<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="95321">
49078 +<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="95444">
49079 <summary>
49080 Send and receive TCP traffic on the xdmcp port.
49081 </summary>
49082 @@ -69511,7 +69328,7 @@ Domain allowed access.
49083 </param>
49084 <infoflow type="both" weight="10"/>
49085 </interface>
49086 -<interface name="corenet_udp_send_xdmcp_port" lineno="95336">
49087 +<interface name="corenet_udp_send_xdmcp_port" lineno="95459">
49088 <summary>
49089 Send UDP traffic on the xdmcp port.
49090 </summary>
49091 @@ -69522,7 +69339,7 @@ Domain allowed access.
49092 </param>
49093 <infoflow type="write" weight="10"/>
49094 </interface>
49095 -<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="95351">
49096 +<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="95474">
49097 <summary>
49098 Do not audit attempts to send UDP traffic on the xdmcp port.
49099 </summary>
49100 @@ -69533,7 +69350,7 @@ Domain to not audit.
49101 </param>
49102 <infoflow type="none"/>
49103 </interface>
49104 -<interface name="corenet_udp_receive_xdmcp_port" lineno="95366">
49105 +<interface name="corenet_udp_receive_xdmcp_port" lineno="95489">
49106 <summary>
49107 Receive UDP traffic on the xdmcp port.
49108 </summary>
49109 @@ -69544,7 +69361,7 @@ Domain allowed access.
49110 </param>
49111 <infoflow type="read" weight="10"/>
49112 </interface>
49113 -<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="95381">
49114 +<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="95504">
49115 <summary>
49116 Do not audit attempts to receive UDP traffic on the xdmcp port.
49117 </summary>
49118 @@ -69555,7 +69372,7 @@ Domain to not audit.
49119 </param>
49120 <infoflow type="none"/>
49121 </interface>
49122 -<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="95396">
49123 +<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="95519">
49124 <summary>
49125 Send and receive UDP traffic on the xdmcp port.
49126 </summary>
49127 @@ -69566,7 +69383,7 @@ Domain allowed access.
49128 </param>
49129 <infoflow type="both" weight="10"/>
49130 </interface>
49131 -<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="95412">
49132 +<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="95535">
49133 <summary>
49134 Do not audit attempts to send and receive
49135 UDP traffic on the xdmcp port.
49136 @@ -69578,7 +69395,7 @@ Domain to not audit.
49137 </param>
49138 <infoflow type="none"/>
49139 </interface>
49140 -<interface name="corenet_tcp_bind_xdmcp_port" lineno="95427">
49141 +<interface name="corenet_tcp_bind_xdmcp_port" lineno="95550">
49142 <summary>
49143 Bind TCP sockets to the xdmcp port.
49144 </summary>
49145 @@ -69589,7 +69406,7 @@ Domain allowed access.
49146 </param>
49147 <infoflow type="none"/>
49148 </interface>
49149 -<interface name="corenet_udp_bind_xdmcp_port" lineno="95447">
49150 +<interface name="corenet_udp_bind_xdmcp_port" lineno="95570">
49151 <summary>
49152 Bind UDP sockets to the xdmcp port.
49153 </summary>
49154 @@ -69600,7 +69417,7 @@ Domain allowed access.
49155 </param>
49156 <infoflow type="none"/>
49157 </interface>
49158 -<interface name="corenet_tcp_connect_xdmcp_port" lineno="95466">
49159 +<interface name="corenet_tcp_connect_xdmcp_port" lineno="95589">
49160 <summary>
49161 Make a TCP connection to the xdmcp port.
49162 </summary>
49163 @@ -69610,7 +69427,7 @@ Domain allowed access.
49164 </summary>
49165 </param>
49166 </interface>
49167 -<interface name="corenet_send_xdmcp_client_packets" lineno="95486">
49168 +<interface name="corenet_send_xdmcp_client_packets" lineno="95609">
49169 <summary>
49170 Send xdmcp_client packets.
49171 </summary>
49172 @@ -69621,7 +69438,7 @@ Domain allowed access.
49173 </param>
49174 <infoflow type="write" weight="10"/>
49175 </interface>
49176 -<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="95505">
49177 +<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="95628">
49178 <summary>
49179 Do not audit attempts to send xdmcp_client packets.
49180 </summary>
49181 @@ -69632,7 +69449,7 @@ Domain to not audit.
49182 </param>
49183 <infoflow type="none"/>
49184 </interface>
49185 -<interface name="corenet_receive_xdmcp_client_packets" lineno="95524">
49186 +<interface name="corenet_receive_xdmcp_client_packets" lineno="95647">
49187 <summary>
49188 Receive xdmcp_client packets.
49189 </summary>
49190 @@ -69643,7 +69460,7 @@ Domain allowed access.
49191 </param>
49192 <infoflow type="read" weight="10"/>
49193 </interface>
49194 -<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="95543">
49195 +<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="95666">
49196 <summary>
49197 Do not audit attempts to receive xdmcp_client packets.
49198 </summary>
49199 @@ -69654,7 +69471,7 @@ Domain allowed access.
49200 </param>
49201 <infoflow type="none"/>
49202 </interface>
49203 -<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="95562">
49204 +<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="95685">
49205 <summary>
49206 Send and receive xdmcp_client packets.
49207 </summary>
49208 @@ -69665,7 +69482,7 @@ Domain allowed access.
49209 </param>
49210 <infoflow type="both" weight="10"/>
49211 </interface>
49212 -<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="95578">
49213 +<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="95701">
49214 <summary>
49215 Do not audit attempts to send and receive xdmcp_client packets.
49216 </summary>
49217 @@ -69676,7 +69493,7 @@ Domain to not audit.
49218 </param>
49219 <infoflow type="none"/>
49220 </interface>
49221 -<interface name="corenet_relabelto_xdmcp_client_packets" lineno="95593">
49222 +<interface name="corenet_relabelto_xdmcp_client_packets" lineno="95716">
49223 <summary>
49224 Relabel packets to xdmcp_client the packet type.
49225 </summary>
49226 @@ -69686,7 +69503,7 @@ Domain allowed access.
49227 </summary>
49228 </param>
49229 </interface>
49230 -<interface name="corenet_send_xdmcp_server_packets" lineno="95613">
49231 +<interface name="corenet_send_xdmcp_server_packets" lineno="95736">
49232 <summary>
49233 Send xdmcp_server packets.
49234 </summary>
49235 @@ -69697,7 +69514,7 @@ Domain allowed access.
49236 </param>
49237 <infoflow type="write" weight="10"/>
49238 </interface>
49239 -<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="95632">
49240 +<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="95755">
49241 <summary>
49242 Do not audit attempts to send xdmcp_server packets.
49243 </summary>
49244 @@ -69708,7 +69525,7 @@ Domain to not audit.
49245 </param>
49246 <infoflow type="none"/>
49247 </interface>
49248 -<interface name="corenet_receive_xdmcp_server_packets" lineno="95651">
49249 +<interface name="corenet_receive_xdmcp_server_packets" lineno="95774">
49250 <summary>
49251 Receive xdmcp_server packets.
49252 </summary>
49253 @@ -69719,7 +69536,7 @@ Domain allowed access.
49254 </param>
49255 <infoflow type="read" weight="10"/>
49256 </interface>
49257 -<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="95670">
49258 +<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="95793">
49259 <summary>
49260 Do not audit attempts to receive xdmcp_server packets.
49261 </summary>
49262 @@ -69730,7 +69547,7 @@ Domain allowed access.
49263 </param>
49264 <infoflow type="none"/>
49265 </interface>
49266 -<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="95689">
49267 +<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="95812">
49268 <summary>
49269 Send and receive xdmcp_server packets.
49270 </summary>
49271 @@ -69741,7 +69558,7 @@ Domain allowed access.
49272 </param>
49273 <infoflow type="both" weight="10"/>
49274 </interface>
49275 -<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="95705">
49276 +<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="95828">
49277 <summary>
49278 Do not audit attempts to send and receive xdmcp_server packets.
49279 </summary>
49280 @@ -69752,7 +69569,7 @@ Domain to not audit.
49281 </param>
49282 <infoflow type="none"/>
49283 </interface>
49284 -<interface name="corenet_relabelto_xdmcp_server_packets" lineno="95720">
49285 +<interface name="corenet_relabelto_xdmcp_server_packets" lineno="95843">
49286 <summary>
49287 Relabel packets to xdmcp_server the packet type.
49288 </summary>
49289 @@ -69762,7 +69579,7 @@ Domain allowed access.
49290 </summary>
49291 </param>
49292 </interface>
49293 -<interface name="corenet_tcp_sendrecv_xen_port" lineno="95742">
49294 +<interface name="corenet_tcp_sendrecv_xen_port" lineno="95865">
49295 <summary>
49296 Send and receive TCP traffic on the xen port.
49297 </summary>
49298 @@ -69773,7 +69590,7 @@ Domain allowed access.
49299 </param>
49300 <infoflow type="both" weight="10"/>
49301 </interface>
49302 -<interface name="corenet_udp_send_xen_port" lineno="95757">
49303 +<interface name="corenet_udp_send_xen_port" lineno="95880">
49304 <summary>
49305 Send UDP traffic on the xen port.
49306 </summary>
49307 @@ -69784,7 +69601,7 @@ Domain allowed access.
49308 </param>
49309 <infoflow type="write" weight="10"/>
49310 </interface>
49311 -<interface name="corenet_dontaudit_udp_send_xen_port" lineno="95772">
49312 +<interface name="corenet_dontaudit_udp_send_xen_port" lineno="95895">
49313 <summary>
49314 Do not audit attempts to send UDP traffic on the xen port.
49315 </summary>
49316 @@ -69795,7 +69612,7 @@ Domain to not audit.
49317 </param>
49318 <infoflow type="none"/>
49319 </interface>
49320 -<interface name="corenet_udp_receive_xen_port" lineno="95787">
49321 +<interface name="corenet_udp_receive_xen_port" lineno="95910">
49322 <summary>
49323 Receive UDP traffic on the xen port.
49324 </summary>
49325 @@ -69806,7 +69623,7 @@ Domain allowed access.
49326 </param>
49327 <infoflow type="read" weight="10"/>
49328 </interface>
49329 -<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="95802">
49330 +<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="95925">
49331 <summary>
49332 Do not audit attempts to receive UDP traffic on the xen port.
49333 </summary>
49334 @@ -69817,7 +69634,7 @@ Domain to not audit.
49335 </param>
49336 <infoflow type="none"/>
49337 </interface>
49338 -<interface name="corenet_udp_sendrecv_xen_port" lineno="95817">
49339 +<interface name="corenet_udp_sendrecv_xen_port" lineno="95940">
49340 <summary>
49341 Send and receive UDP traffic on the xen port.
49342 </summary>
49343 @@ -69828,7 +69645,7 @@ Domain allowed access.
49344 </param>
49345 <infoflow type="both" weight="10"/>
49346 </interface>
49347 -<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="95833">
49348 +<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="95956">
49349 <summary>
49350 Do not audit attempts to send and receive
49351 UDP traffic on the xen port.
49352 @@ -69840,7 +69657,7 @@ Domain to not audit.
49353 </param>
49354 <infoflow type="none"/>
49355 </interface>
49356 -<interface name="corenet_tcp_bind_xen_port" lineno="95848">
49357 +<interface name="corenet_tcp_bind_xen_port" lineno="95971">
49358 <summary>
49359 Bind TCP sockets to the xen port.
49360 </summary>
49361 @@ -69851,7 +69668,7 @@ Domain allowed access.
49362 </param>
49363 <infoflow type="none"/>
49364 </interface>
49365 -<interface name="corenet_udp_bind_xen_port" lineno="95868">
49366 +<interface name="corenet_udp_bind_xen_port" lineno="95991">
49367 <summary>
49368 Bind UDP sockets to the xen port.
49369 </summary>
49370 @@ -69862,7 +69679,7 @@ Domain allowed access.
49371 </param>
49372 <infoflow type="none"/>
49373 </interface>
49374 -<interface name="corenet_tcp_connect_xen_port" lineno="95887">
49375 +<interface name="corenet_tcp_connect_xen_port" lineno="96010">
49376 <summary>
49377 Make a TCP connection to the xen port.
49378 </summary>
49379 @@ -69872,7 +69689,7 @@ Domain allowed access.
49380 </summary>
49381 </param>
49382 </interface>
49383 -<interface name="corenet_send_xen_client_packets" lineno="95907">
49384 +<interface name="corenet_send_xen_client_packets" lineno="96030">
49385 <summary>
49386 Send xen_client packets.
49387 </summary>
49388 @@ -69883,7 +69700,7 @@ Domain allowed access.
49389 </param>
49390 <infoflow type="write" weight="10"/>
49391 </interface>
49392 -<interface name="corenet_dontaudit_send_xen_client_packets" lineno="95926">
49393 +<interface name="corenet_dontaudit_send_xen_client_packets" lineno="96049">
49394 <summary>
49395 Do not audit attempts to send xen_client packets.
49396 </summary>
49397 @@ -69894,7 +69711,7 @@ Domain to not audit.
49398 </param>
49399 <infoflow type="none"/>
49400 </interface>
49401 -<interface name="corenet_receive_xen_client_packets" lineno="95945">
49402 +<interface name="corenet_receive_xen_client_packets" lineno="96068">
49403 <summary>
49404 Receive xen_client packets.
49405 </summary>
49406 @@ -69905,7 +69722,7 @@ Domain allowed access.
49407 </param>
49408 <infoflow type="read" weight="10"/>
49409 </interface>
49410 -<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="95964">
49411 +<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="96087">
49412 <summary>
49413 Do not audit attempts to receive xen_client packets.
49414 </summary>
49415 @@ -69916,7 +69733,7 @@ Domain allowed access.
49416 </param>
49417 <infoflow type="none"/>
49418 </interface>
49419 -<interface name="corenet_sendrecv_xen_client_packets" lineno="95983">
49420 +<interface name="corenet_sendrecv_xen_client_packets" lineno="96106">
49421 <summary>
49422 Send and receive xen_client packets.
49423 </summary>
49424 @@ -69927,7 +69744,7 @@ Domain allowed access.
49425 </param>
49426 <infoflow type="both" weight="10"/>
49427 </interface>
49428 -<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="95999">
49429 +<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="96122">
49430 <summary>
49431 Do not audit attempts to send and receive xen_client packets.
49432 </summary>
49433 @@ -69938,7 +69755,7 @@ Domain to not audit.
49434 </param>
49435 <infoflow type="none"/>
49436 </interface>
49437 -<interface name="corenet_relabelto_xen_client_packets" lineno="96014">
49438 +<interface name="corenet_relabelto_xen_client_packets" lineno="96137">
49439 <summary>
49440 Relabel packets to xen_client the packet type.
49441 </summary>
49442 @@ -69948,7 +69765,7 @@ Domain allowed access.
49443 </summary>
49444 </param>
49445 </interface>
49446 -<interface name="corenet_send_xen_server_packets" lineno="96034">
49447 +<interface name="corenet_send_xen_server_packets" lineno="96157">
49448 <summary>
49449 Send xen_server packets.
49450 </summary>
49451 @@ -69959,7 +69776,7 @@ Domain allowed access.
49452 </param>
49453 <infoflow type="write" weight="10"/>
49454 </interface>
49455 -<interface name="corenet_dontaudit_send_xen_server_packets" lineno="96053">
49456 +<interface name="corenet_dontaudit_send_xen_server_packets" lineno="96176">
49457 <summary>
49458 Do not audit attempts to send xen_server packets.
49459 </summary>
49460 @@ -69970,7 +69787,7 @@ Domain to not audit.
49461 </param>
49462 <infoflow type="none"/>
49463 </interface>
49464 -<interface name="corenet_receive_xen_server_packets" lineno="96072">
49465 +<interface name="corenet_receive_xen_server_packets" lineno="96195">
49466 <summary>
49467 Receive xen_server packets.
49468 </summary>
49469 @@ -69981,7 +69798,7 @@ Domain allowed access.
49470 </param>
49471 <infoflow type="read" weight="10"/>
49472 </interface>
49473 -<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="96091">
49474 +<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="96214">
49475 <summary>
49476 Do not audit attempts to receive xen_server packets.
49477 </summary>
49478 @@ -69992,7 +69809,7 @@ Domain allowed access.
49479 </param>
49480 <infoflow type="none"/>
49481 </interface>
49482 -<interface name="corenet_sendrecv_xen_server_packets" lineno="96110">
49483 +<interface name="corenet_sendrecv_xen_server_packets" lineno="96233">
49484 <summary>
49485 Send and receive xen_server packets.
49486 </summary>
49487 @@ -70003,7 +69820,7 @@ Domain allowed access.
49488 </param>
49489 <infoflow type="both" weight="10"/>
49490 </interface>
49491 -<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="96126">
49492 +<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="96249">
49493 <summary>
49494 Do not audit attempts to send and receive xen_server packets.
49495 </summary>
49496 @@ -70014,7 +69831,7 @@ Domain to not audit.
49497 </param>
49498 <infoflow type="none"/>
49499 </interface>
49500 -<interface name="corenet_relabelto_xen_server_packets" lineno="96141">
49501 +<interface name="corenet_relabelto_xen_server_packets" lineno="96264">
49502 <summary>
49503 Relabel packets to xen_server the packet type.
49504 </summary>
49505 @@ -70024,7 +69841,7 @@ Domain allowed access.
49506 </summary>
49507 </param>
49508 </interface>
49509 -<interface name="corenet_tcp_sendrecv_xfs_port" lineno="96163">
49510 +<interface name="corenet_tcp_sendrecv_xfs_port" lineno="96286">
49511 <summary>
49512 Send and receive TCP traffic on the xfs port.
49513 </summary>
49514 @@ -70035,7 +69852,7 @@ Domain allowed access.
49515 </param>
49516 <infoflow type="both" weight="10"/>
49517 </interface>
49518 -<interface name="corenet_udp_send_xfs_port" lineno="96178">
49519 +<interface name="corenet_udp_send_xfs_port" lineno="96301">
49520 <summary>
49521 Send UDP traffic on the xfs port.
49522 </summary>
49523 @@ -70046,7 +69863,7 @@ Domain allowed access.
49524 </param>
49525 <infoflow type="write" weight="10"/>
49526 </interface>
49527 -<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="96193">
49528 +<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="96316">
49529 <summary>
49530 Do not audit attempts to send UDP traffic on the xfs port.
49531 </summary>
49532 @@ -70057,7 +69874,7 @@ Domain to not audit.
49533 </param>
49534 <infoflow type="none"/>
49535 </interface>
49536 -<interface name="corenet_udp_receive_xfs_port" lineno="96208">
49537 +<interface name="corenet_udp_receive_xfs_port" lineno="96331">
49538 <summary>
49539 Receive UDP traffic on the xfs port.
49540 </summary>
49541 @@ -70068,7 +69885,7 @@ Domain allowed access.
49542 </param>
49543 <infoflow type="read" weight="10"/>
49544 </interface>
49545 -<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="96223">
49546 +<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="96346">
49547 <summary>
49548 Do not audit attempts to receive UDP traffic on the xfs port.
49549 </summary>
49550 @@ -70079,7 +69896,7 @@ Domain to not audit.
49551 </param>
49552 <infoflow type="none"/>
49553 </interface>
49554 -<interface name="corenet_udp_sendrecv_xfs_port" lineno="96238">
49555 +<interface name="corenet_udp_sendrecv_xfs_port" lineno="96361">
49556 <summary>
49557 Send and receive UDP traffic on the xfs port.
49558 </summary>
49559 @@ -70090,7 +69907,7 @@ Domain allowed access.
49560 </param>
49561 <infoflow type="both" weight="10"/>
49562 </interface>
49563 -<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="96254">
49564 +<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="96377">
49565 <summary>
49566 Do not audit attempts to send and receive
49567 UDP traffic on the xfs port.
49568 @@ -70102,7 +69919,7 @@ Domain to not audit.
49569 </param>
49570 <infoflow type="none"/>
49571 </interface>
49572 -<interface name="corenet_tcp_bind_xfs_port" lineno="96269">
49573 +<interface name="corenet_tcp_bind_xfs_port" lineno="96392">
49574 <summary>
49575 Bind TCP sockets to the xfs port.
49576 </summary>
49577 @@ -70113,7 +69930,7 @@ Domain allowed access.
49578 </param>
49579 <infoflow type="none"/>
49580 </interface>
49581 -<interface name="corenet_udp_bind_xfs_port" lineno="96289">
49582 +<interface name="corenet_udp_bind_xfs_port" lineno="96412">
49583 <summary>
49584 Bind UDP sockets to the xfs port.
49585 </summary>
49586 @@ -70124,7 +69941,7 @@ Domain allowed access.
49587 </param>
49588 <infoflow type="none"/>
49589 </interface>
49590 -<interface name="corenet_tcp_connect_xfs_port" lineno="96308">
49591 +<interface name="corenet_tcp_connect_xfs_port" lineno="96431">
49592 <summary>
49593 Make a TCP connection to the xfs port.
49594 </summary>
49595 @@ -70134,7 +69951,7 @@ Domain allowed access.
49596 </summary>
49597 </param>
49598 </interface>
49599 -<interface name="corenet_send_xfs_client_packets" lineno="96328">
49600 +<interface name="corenet_send_xfs_client_packets" lineno="96451">
49601 <summary>
49602 Send xfs_client packets.
49603 </summary>
49604 @@ -70145,7 +69962,7 @@ Domain allowed access.
49605 </param>
49606 <infoflow type="write" weight="10"/>
49607 </interface>
49608 -<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="96347">
49609 +<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="96470">
49610 <summary>
49611 Do not audit attempts to send xfs_client packets.
49612 </summary>
49613 @@ -70156,7 +69973,7 @@ Domain to not audit.
49614 </param>
49615 <infoflow type="none"/>
49616 </interface>
49617 -<interface name="corenet_receive_xfs_client_packets" lineno="96366">
49618 +<interface name="corenet_receive_xfs_client_packets" lineno="96489">
49619 <summary>
49620 Receive xfs_client packets.
49621 </summary>
49622 @@ -70167,7 +69984,7 @@ Domain allowed access.
49623 </param>
49624 <infoflow type="read" weight="10"/>
49625 </interface>
49626 -<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="96385">
49627 +<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="96508">
49628 <summary>
49629 Do not audit attempts to receive xfs_client packets.
49630 </summary>
49631 @@ -70178,7 +69995,7 @@ Domain allowed access.
49632 </param>
49633 <infoflow type="none"/>
49634 </interface>
49635 -<interface name="corenet_sendrecv_xfs_client_packets" lineno="96404">
49636 +<interface name="corenet_sendrecv_xfs_client_packets" lineno="96527">
49637 <summary>
49638 Send and receive xfs_client packets.
49639 </summary>
49640 @@ -70189,7 +70006,7 @@ Domain allowed access.
49641 </param>
49642 <infoflow type="both" weight="10"/>
49643 </interface>
49644 -<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="96420">
49645 +<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="96543">
49646 <summary>
49647 Do not audit attempts to send and receive xfs_client packets.
49648 </summary>
49649 @@ -70200,7 +70017,7 @@ Domain to not audit.
49650 </param>
49651 <infoflow type="none"/>
49652 </interface>
49653 -<interface name="corenet_relabelto_xfs_client_packets" lineno="96435">
49654 +<interface name="corenet_relabelto_xfs_client_packets" lineno="96558">
49655 <summary>
49656 Relabel packets to xfs_client the packet type.
49657 </summary>
49658 @@ -70210,7 +70027,7 @@ Domain allowed access.
49659 </summary>
49660 </param>
49661 </interface>
49662 -<interface name="corenet_send_xfs_server_packets" lineno="96455">
49663 +<interface name="corenet_send_xfs_server_packets" lineno="96578">
49664 <summary>
49665 Send xfs_server packets.
49666 </summary>
49667 @@ -70221,7 +70038,7 @@ Domain allowed access.
49668 </param>
49669 <infoflow type="write" weight="10"/>
49670 </interface>
49671 -<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="96474">
49672 +<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="96597">
49673 <summary>
49674 Do not audit attempts to send xfs_server packets.
49675 </summary>
49676 @@ -70232,7 +70049,7 @@ Domain to not audit.
49677 </param>
49678 <infoflow type="none"/>
49679 </interface>
49680 -<interface name="corenet_receive_xfs_server_packets" lineno="96493">
49681 +<interface name="corenet_receive_xfs_server_packets" lineno="96616">
49682 <summary>
49683 Receive xfs_server packets.
49684 </summary>
49685 @@ -70243,7 +70060,7 @@ Domain allowed access.
49686 </param>
49687 <infoflow type="read" weight="10"/>
49688 </interface>
49689 -<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="96512">
49690 +<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="96635">
49691 <summary>
49692 Do not audit attempts to receive xfs_server packets.
49693 </summary>
49694 @@ -70254,7 +70071,7 @@ Domain allowed access.
49695 </param>
49696 <infoflow type="none"/>
49697 </interface>
49698 -<interface name="corenet_sendrecv_xfs_server_packets" lineno="96531">
49699 +<interface name="corenet_sendrecv_xfs_server_packets" lineno="96654">
49700 <summary>
49701 Send and receive xfs_server packets.
49702 </summary>
49703 @@ -70265,7 +70082,7 @@ Domain allowed access.
49704 </param>
49705 <infoflow type="both" weight="10"/>
49706 </interface>
49707 -<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="96547">
49708 +<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="96670">
49709 <summary>
49710 Do not audit attempts to send and receive xfs_server packets.
49711 </summary>
49712 @@ -70276,7 +70093,7 @@ Domain to not audit.
49713 </param>
49714 <infoflow type="none"/>
49715 </interface>
49716 -<interface name="corenet_relabelto_xfs_server_packets" lineno="96562">
49717 +<interface name="corenet_relabelto_xfs_server_packets" lineno="96685">
49718 <summary>
49719 Relabel packets to xfs_server the packet type.
49720 </summary>
49721 @@ -70286,7 +70103,7 @@ Domain allowed access.
49722 </summary>
49723 </param>
49724 </interface>
49725 -<interface name="corenet_tcp_sendrecv_xserver_port" lineno="96584">
49726 +<interface name="corenet_tcp_sendrecv_xserver_port" lineno="96707">
49727 <summary>
49728 Send and receive TCP traffic on the xserver port.
49729 </summary>
49730 @@ -70297,7 +70114,7 @@ Domain allowed access.
49731 </param>
49732 <infoflow type="both" weight="10"/>
49733 </interface>
49734 -<interface name="corenet_udp_send_xserver_port" lineno="96599">
49735 +<interface name="corenet_udp_send_xserver_port" lineno="96722">
49736 <summary>
49737 Send UDP traffic on the xserver port.
49738 </summary>
49739 @@ -70308,7 +70125,7 @@ Domain allowed access.
49740 </param>
49741 <infoflow type="write" weight="10"/>
49742 </interface>
49743 -<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="96614">
49744 +<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="96737">
49745 <summary>
49746 Do not audit attempts to send UDP traffic on the xserver port.
49747 </summary>
49748 @@ -70319,7 +70136,7 @@ Domain to not audit.
49749 </param>
49750 <infoflow type="none"/>
49751 </interface>
49752 -<interface name="corenet_udp_receive_xserver_port" lineno="96629">
49753 +<interface name="corenet_udp_receive_xserver_port" lineno="96752">
49754 <summary>
49755 Receive UDP traffic on the xserver port.
49756 </summary>
49757 @@ -70330,7 +70147,7 @@ Domain allowed access.
49758 </param>
49759 <infoflow type="read" weight="10"/>
49760 </interface>
49761 -<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="96644">
49762 +<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="96767">
49763 <summary>
49764 Do not audit attempts to receive UDP traffic on the xserver port.
49765 </summary>
49766 @@ -70341,7 +70158,7 @@ Domain to not audit.
49767 </param>
49768 <infoflow type="none"/>
49769 </interface>
49770 -<interface name="corenet_udp_sendrecv_xserver_port" lineno="96659">
49771 +<interface name="corenet_udp_sendrecv_xserver_port" lineno="96782">
49772 <summary>
49773 Send and receive UDP traffic on the xserver port.
49774 </summary>
49775 @@ -70352,7 +70169,7 @@ Domain allowed access.
49776 </param>
49777 <infoflow type="both" weight="10"/>
49778 </interface>
49779 -<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="96675">
49780 +<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="96798">
49781 <summary>
49782 Do not audit attempts to send and receive
49783 UDP traffic on the xserver port.
49784 @@ -70364,7 +70181,7 @@ Domain to not audit.
49785 </param>
49786 <infoflow type="none"/>
49787 </interface>
49788 -<interface name="corenet_tcp_bind_xserver_port" lineno="96690">
49789 +<interface name="corenet_tcp_bind_xserver_port" lineno="96813">
49790 <summary>
49791 Bind TCP sockets to the xserver port.
49792 </summary>
49793 @@ -70375,7 +70192,7 @@ Domain allowed access.
49794 </param>
49795 <infoflow type="none"/>
49796 </interface>
49797 -<interface name="corenet_udp_bind_xserver_port" lineno="96710">
49798 +<interface name="corenet_udp_bind_xserver_port" lineno="96833">
49799 <summary>
49800 Bind UDP sockets to the xserver port.
49801 </summary>
49802 @@ -70386,7 +70203,7 @@ Domain allowed access.
49803 </param>
49804 <infoflow type="none"/>
49805 </interface>
49806 -<interface name="corenet_tcp_connect_xserver_port" lineno="96729">
49807 +<interface name="corenet_tcp_connect_xserver_port" lineno="96852">
49808 <summary>
49809 Make a TCP connection to the xserver port.
49810 </summary>
49811 @@ -70396,7 +70213,7 @@ Domain allowed access.
49812 </summary>
49813 </param>
49814 </interface>
49815 -<interface name="corenet_send_xserver_client_packets" lineno="96749">
49816 +<interface name="corenet_send_xserver_client_packets" lineno="96872">
49817 <summary>
49818 Send xserver_client packets.
49819 </summary>
49820 @@ -70407,7 +70224,7 @@ Domain allowed access.
49821 </param>
49822 <infoflow type="write" weight="10"/>
49823 </interface>
49824 -<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="96768">
49825 +<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="96891">
49826 <summary>
49827 Do not audit attempts to send xserver_client packets.
49828 </summary>
49829 @@ -70418,7 +70235,7 @@ Domain to not audit.
49830 </param>
49831 <infoflow type="none"/>
49832 </interface>
49833 -<interface name="corenet_receive_xserver_client_packets" lineno="96787">
49834 +<interface name="corenet_receive_xserver_client_packets" lineno="96910">
49835 <summary>
49836 Receive xserver_client packets.
49837 </summary>
49838 @@ -70429,7 +70246,7 @@ Domain allowed access.
49839 </param>
49840 <infoflow type="read" weight="10"/>
49841 </interface>
49842 -<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="96806">
49843 +<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="96929">
49844 <summary>
49845 Do not audit attempts to receive xserver_client packets.
49846 </summary>
49847 @@ -70440,7 +70257,7 @@ Domain allowed access.
49848 </param>
49849 <infoflow type="none"/>
49850 </interface>
49851 -<interface name="corenet_sendrecv_xserver_client_packets" lineno="96825">
49852 +<interface name="corenet_sendrecv_xserver_client_packets" lineno="96948">
49853 <summary>
49854 Send and receive xserver_client packets.
49855 </summary>
49856 @@ -70451,7 +70268,7 @@ Domain allowed access.
49857 </param>
49858 <infoflow type="both" weight="10"/>
49859 </interface>
49860 -<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="96841">
49861 +<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="96964">
49862 <summary>
49863 Do not audit attempts to send and receive xserver_client packets.
49864 </summary>
49865 @@ -70462,7 +70279,7 @@ Domain to not audit.
49866 </param>
49867 <infoflow type="none"/>
49868 </interface>
49869 -<interface name="corenet_relabelto_xserver_client_packets" lineno="96856">
49870 +<interface name="corenet_relabelto_xserver_client_packets" lineno="96979">
49871 <summary>
49872 Relabel packets to xserver_client the packet type.
49873 </summary>
49874 @@ -70472,7 +70289,7 @@ Domain allowed access.
49875 </summary>
49876 </param>
49877 </interface>
49878 -<interface name="corenet_send_xserver_server_packets" lineno="96876">
49879 +<interface name="corenet_send_xserver_server_packets" lineno="96999">
49880 <summary>
49881 Send xserver_server packets.
49882 </summary>
49883 @@ -70483,7 +70300,7 @@ Domain allowed access.
49884 </param>
49885 <infoflow type="write" weight="10"/>
49886 </interface>
49887 -<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="96895">
49888 +<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="97018">
49889 <summary>
49890 Do not audit attempts to send xserver_server packets.
49891 </summary>
49892 @@ -70494,7 +70311,7 @@ Domain to not audit.
49893 </param>
49894 <infoflow type="none"/>
49895 </interface>
49896 -<interface name="corenet_receive_xserver_server_packets" lineno="96914">
49897 +<interface name="corenet_receive_xserver_server_packets" lineno="97037">
49898 <summary>
49899 Receive xserver_server packets.
49900 </summary>
49901 @@ -70505,7 +70322,7 @@ Domain allowed access.
49902 </param>
49903 <infoflow type="read" weight="10"/>
49904 </interface>
49905 -<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="96933">
49906 +<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="97056">
49907 <summary>
49908 Do not audit attempts to receive xserver_server packets.
49909 </summary>
49910 @@ -70516,7 +70333,7 @@ Domain allowed access.
49911 </param>
49912 <infoflow type="none"/>
49913 </interface>
49914 -<interface name="corenet_sendrecv_xserver_server_packets" lineno="96952">
49915 +<interface name="corenet_sendrecv_xserver_server_packets" lineno="97075">
49916 <summary>
49917 Send and receive xserver_server packets.
49918 </summary>
49919 @@ -70527,7 +70344,7 @@ Domain allowed access.
49920 </param>
49921 <infoflow type="both" weight="10"/>
49922 </interface>
49923 -<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="96968">
49924 +<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="97091">
49925 <summary>
49926 Do not audit attempts to send and receive xserver_server packets.
49927 </summary>
49928 @@ -70538,7 +70355,7 @@ Domain to not audit.
49929 </param>
49930 <infoflow type="none"/>
49931 </interface>
49932 -<interface name="corenet_relabelto_xserver_server_packets" lineno="96983">
49933 +<interface name="corenet_relabelto_xserver_server_packets" lineno="97106">
49934 <summary>
49935 Relabel packets to xserver_server the packet type.
49936 </summary>
49937 @@ -70548,7 +70365,7 @@ Domain allowed access.
49938 </summary>
49939 </param>
49940 </interface>
49941 -<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="97005">
49942 +<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="97128">
49943 <summary>
49944 Send and receive TCP traffic on the zarafa port.
49945 </summary>
49946 @@ -70559,7 +70376,7 @@ Domain allowed access.
49947 </param>
49948 <infoflow type="both" weight="10"/>
49949 </interface>
49950 -<interface name="corenet_udp_send_zarafa_port" lineno="97020">
49951 +<interface name="corenet_udp_send_zarafa_port" lineno="97143">
49952 <summary>
49953 Send UDP traffic on the zarafa port.
49954 </summary>
49955 @@ -70570,7 +70387,7 @@ Domain allowed access.
49956 </param>
49957 <infoflow type="write" weight="10"/>
49958 </interface>
49959 -<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="97035">
49960 +<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="97158">
49961 <summary>
49962 Do not audit attempts to send UDP traffic on the zarafa port.
49963 </summary>
49964 @@ -70581,7 +70398,7 @@ Domain to not audit.
49965 </param>
49966 <infoflow type="none"/>
49967 </interface>
49968 -<interface name="corenet_udp_receive_zarafa_port" lineno="97050">
49969 +<interface name="corenet_udp_receive_zarafa_port" lineno="97173">
49970 <summary>
49971 Receive UDP traffic on the zarafa port.
49972 </summary>
49973 @@ -70592,7 +70409,7 @@ Domain allowed access.
49974 </param>
49975 <infoflow type="read" weight="10"/>
49976 </interface>
49977 -<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="97065">
49978 +<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="97188">
49979 <summary>
49980 Do not audit attempts to receive UDP traffic on the zarafa port.
49981 </summary>
49982 @@ -70603,7 +70420,7 @@ Domain to not audit.
49983 </param>
49984 <infoflow type="none"/>
49985 </interface>
49986 -<interface name="corenet_udp_sendrecv_zarafa_port" lineno="97080">
49987 +<interface name="corenet_udp_sendrecv_zarafa_port" lineno="97203">
49988 <summary>
49989 Send and receive UDP traffic on the zarafa port.
49990 </summary>
49991 @@ -70614,7 +70431,7 @@ Domain allowed access.
49992 </param>
49993 <infoflow type="both" weight="10"/>
49994 </interface>
49995 -<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="97096">
49996 +<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="97219">
49997 <summary>
49998 Do not audit attempts to send and receive
49999 UDP traffic on the zarafa port.
50000 @@ -70626,7 +70443,7 @@ Domain to not audit.
50001 </param>
50002 <infoflow type="none"/>
50003 </interface>
50004 -<interface name="corenet_tcp_bind_zarafa_port" lineno="97111">
50005 +<interface name="corenet_tcp_bind_zarafa_port" lineno="97234">
50006 <summary>
50007 Bind TCP sockets to the zarafa port.
50008 </summary>
50009 @@ -70637,7 +70454,7 @@ Domain allowed access.
50010 </param>
50011 <infoflow type="none"/>
50012 </interface>
50013 -<interface name="corenet_udp_bind_zarafa_port" lineno="97131">
50014 +<interface name="corenet_udp_bind_zarafa_port" lineno="97254">
50015 <summary>
50016 Bind UDP sockets to the zarafa port.
50017 </summary>
50018 @@ -70648,7 +70465,7 @@ Domain allowed access.
50019 </param>
50020 <infoflow type="none"/>
50021 </interface>
50022 -<interface name="corenet_tcp_connect_zarafa_port" lineno="97150">
50023 +<interface name="corenet_tcp_connect_zarafa_port" lineno="97273">
50024 <summary>
50025 Make a TCP connection to the zarafa port.
50026 </summary>
50027 @@ -70658,7 +70475,7 @@ Domain allowed access.
50028 </summary>
50029 </param>
50030 </interface>
50031 -<interface name="corenet_send_zarafa_client_packets" lineno="97170">
50032 +<interface name="corenet_send_zarafa_client_packets" lineno="97293">
50033 <summary>
50034 Send zarafa_client packets.
50035 </summary>
50036 @@ -70669,7 +70486,7 @@ Domain allowed access.
50037 </param>
50038 <infoflow type="write" weight="10"/>
50039 </interface>
50040 -<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="97189">
50041 +<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="97312">
50042 <summary>
50043 Do not audit attempts to send zarafa_client packets.
50044 </summary>
50045 @@ -70680,7 +70497,7 @@ Domain to not audit.
50046 </param>
50047 <infoflow type="none"/>
50048 </interface>
50049 -<interface name="corenet_receive_zarafa_client_packets" lineno="97208">
50050 +<interface name="corenet_receive_zarafa_client_packets" lineno="97331">
50051 <summary>
50052 Receive zarafa_client packets.
50053 </summary>
50054 @@ -70691,7 +70508,7 @@ Domain allowed access.
50055 </param>
50056 <infoflow type="read" weight="10"/>
50057 </interface>
50058 -<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="97227">
50059 +<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="97350">
50060 <summary>
50061 Do not audit attempts to receive zarafa_client packets.
50062 </summary>
50063 @@ -70702,7 +70519,7 @@ Domain allowed access.
50064 </param>
50065 <infoflow type="none"/>
50066 </interface>
50067 -<interface name="corenet_sendrecv_zarafa_client_packets" lineno="97246">
50068 +<interface name="corenet_sendrecv_zarafa_client_packets" lineno="97369">
50069 <summary>
50070 Send and receive zarafa_client packets.
50071 </summary>
50072 @@ -70713,7 +70530,7 @@ Domain allowed access.
50073 </param>
50074 <infoflow type="both" weight="10"/>
50075 </interface>
50076 -<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="97262">
50077 +<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="97385">
50078 <summary>
50079 Do not audit attempts to send and receive zarafa_client packets.
50080 </summary>
50081 @@ -70724,7 +70541,7 @@ Domain to not audit.
50082 </param>
50083 <infoflow type="none"/>
50084 </interface>
50085 -<interface name="corenet_relabelto_zarafa_client_packets" lineno="97277">
50086 +<interface name="corenet_relabelto_zarafa_client_packets" lineno="97400">
50087 <summary>
50088 Relabel packets to zarafa_client the packet type.
50089 </summary>
50090 @@ -70734,7 +70551,7 @@ Domain allowed access.
50091 </summary>
50092 </param>
50093 </interface>
50094 -<interface name="corenet_send_zarafa_server_packets" lineno="97297">
50095 +<interface name="corenet_send_zarafa_server_packets" lineno="97420">
50096 <summary>
50097 Send zarafa_server packets.
50098 </summary>
50099 @@ -70745,7 +70562,7 @@ Domain allowed access.
50100 </param>
50101 <infoflow type="write" weight="10"/>
50102 </interface>
50103 -<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="97316">
50104 +<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="97439">
50105 <summary>
50106 Do not audit attempts to send zarafa_server packets.
50107 </summary>
50108 @@ -70756,7 +70573,7 @@ Domain to not audit.
50109 </param>
50110 <infoflow type="none"/>
50111 </interface>
50112 -<interface name="corenet_receive_zarafa_server_packets" lineno="97335">
50113 +<interface name="corenet_receive_zarafa_server_packets" lineno="97458">
50114 <summary>
50115 Receive zarafa_server packets.
50116 </summary>
50117 @@ -70767,7 +70584,7 @@ Domain allowed access.
50118 </param>
50119 <infoflow type="read" weight="10"/>
50120 </interface>
50121 -<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="97354">
50122 +<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="97477">
50123 <summary>
50124 Do not audit attempts to receive zarafa_server packets.
50125 </summary>
50126 @@ -70778,7 +70595,7 @@ Domain allowed access.
50127 </param>
50128 <infoflow type="none"/>
50129 </interface>
50130 -<interface name="corenet_sendrecv_zarafa_server_packets" lineno="97373">
50131 +<interface name="corenet_sendrecv_zarafa_server_packets" lineno="97496">
50132 <summary>
50133 Send and receive zarafa_server packets.
50134 </summary>
50135 @@ -70789,7 +70606,7 @@ Domain allowed access.
50136 </param>
50137 <infoflow type="both" weight="10"/>
50138 </interface>
50139 -<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="97389">
50140 +<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="97512">
50141 <summary>
50142 Do not audit attempts to send and receive zarafa_server packets.
50143 </summary>
50144 @@ -70800,7 +70617,7 @@ Domain to not audit.
50145 </param>
50146 <infoflow type="none"/>
50147 </interface>
50148 -<interface name="corenet_relabelto_zarafa_server_packets" lineno="97404">
50149 +<interface name="corenet_relabelto_zarafa_server_packets" lineno="97527">
50150 <summary>
50151 Relabel packets to zarafa_server the packet type.
50152 </summary>
50153 @@ -70810,7 +70627,7 @@ Domain allowed access.
50154 </summary>
50155 </param>
50156 </interface>
50157 -<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="97426">
50158 +<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="97549">
50159 <summary>
50160 Send and receive TCP traffic on the zabbix port.
50161 </summary>
50162 @@ -70821,7 +70638,7 @@ Domain allowed access.
50163 </param>
50164 <infoflow type="both" weight="10"/>
50165 </interface>
50166 -<interface name="corenet_udp_send_zabbix_port" lineno="97441">
50167 +<interface name="corenet_udp_send_zabbix_port" lineno="97564">
50168 <summary>
50169 Send UDP traffic on the zabbix port.
50170 </summary>
50171 @@ -70832,7 +70649,7 @@ Domain allowed access.
50172 </param>
50173 <infoflow type="write" weight="10"/>
50174 </interface>
50175 -<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="97456">
50176 +<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="97579">
50177 <summary>
50178 Do not audit attempts to send UDP traffic on the zabbix port.
50179 </summary>
50180 @@ -70843,7 +70660,7 @@ Domain to not audit.
50181 </param>
50182 <infoflow type="none"/>
50183 </interface>
50184 -<interface name="corenet_udp_receive_zabbix_port" lineno="97471">
50185 +<interface name="corenet_udp_receive_zabbix_port" lineno="97594">
50186 <summary>
50187 Receive UDP traffic on the zabbix port.
50188 </summary>
50189 @@ -70854,7 +70671,7 @@ Domain allowed access.
50190 </param>
50191 <infoflow type="read" weight="10"/>
50192 </interface>
50193 -<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="97486">
50194 +<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="97609">
50195 <summary>
50196 Do not audit attempts to receive UDP traffic on the zabbix port.
50197 </summary>
50198 @@ -70865,7 +70682,7 @@ Domain to not audit.
50199 </param>
50200 <infoflow type="none"/>
50201 </interface>
50202 -<interface name="corenet_udp_sendrecv_zabbix_port" lineno="97501">
50203 +<interface name="corenet_udp_sendrecv_zabbix_port" lineno="97624">
50204 <summary>
50205 Send and receive UDP traffic on the zabbix port.
50206 </summary>
50207 @@ -70876,7 +70693,7 @@ Domain allowed access.
50208 </param>
50209 <infoflow type="both" weight="10"/>
50210 </interface>
50211 -<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="97517">
50212 +<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="97640">
50213 <summary>
50214 Do not audit attempts to send and receive
50215 UDP traffic on the zabbix port.
50216 @@ -70888,7 +70705,7 @@ Domain to not audit.
50217 </param>
50218 <infoflow type="none"/>
50219 </interface>
50220 -<interface name="corenet_tcp_bind_zabbix_port" lineno="97532">
50221 +<interface name="corenet_tcp_bind_zabbix_port" lineno="97655">
50222 <summary>
50223 Bind TCP sockets to the zabbix port.
50224 </summary>
50225 @@ -70899,7 +70716,7 @@ Domain allowed access.
50226 </param>
50227 <infoflow type="none"/>
50228 </interface>
50229 -<interface name="corenet_udp_bind_zabbix_port" lineno="97552">
50230 +<interface name="corenet_udp_bind_zabbix_port" lineno="97675">
50231 <summary>
50232 Bind UDP sockets to the zabbix port.
50233 </summary>
50234 @@ -70910,7 +70727,7 @@ Domain allowed access.
50235 </param>
50236 <infoflow type="none"/>
50237 </interface>
50238 -<interface name="corenet_tcp_connect_zabbix_port" lineno="97571">
50239 +<interface name="corenet_tcp_connect_zabbix_port" lineno="97694">
50240 <summary>
50241 Make a TCP connection to the zabbix port.
50242 </summary>
50243 @@ -70920,7 +70737,7 @@ Domain allowed access.
50244 </summary>
50245 </param>
50246 </interface>
50247 -<interface name="corenet_send_zabbix_client_packets" lineno="97591">
50248 +<interface name="corenet_send_zabbix_client_packets" lineno="97714">
50249 <summary>
50250 Send zabbix_client packets.
50251 </summary>
50252 @@ -70931,7 +70748,7 @@ Domain allowed access.
50253 </param>
50254 <infoflow type="write" weight="10"/>
50255 </interface>
50256 -<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="97610">
50257 +<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="97733">
50258 <summary>
50259 Do not audit attempts to send zabbix_client packets.
50260 </summary>
50261 @@ -70942,7 +70759,7 @@ Domain to not audit.
50262 </param>
50263 <infoflow type="none"/>
50264 </interface>
50265 -<interface name="corenet_receive_zabbix_client_packets" lineno="97629">
50266 +<interface name="corenet_receive_zabbix_client_packets" lineno="97752">
50267 <summary>
50268 Receive zabbix_client packets.
50269 </summary>
50270 @@ -70953,7 +70770,7 @@ Domain allowed access.
50271 </param>
50272 <infoflow type="read" weight="10"/>
50273 </interface>
50274 -<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="97648">
50275 +<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="97771">
50276 <summary>
50277 Do not audit attempts to receive zabbix_client packets.
50278 </summary>
50279 @@ -70964,7 +70781,7 @@ Domain allowed access.
50280 </param>
50281 <infoflow type="none"/>
50282 </interface>
50283 -<interface name="corenet_sendrecv_zabbix_client_packets" lineno="97667">
50284 +<interface name="corenet_sendrecv_zabbix_client_packets" lineno="97790">
50285 <summary>
50286 Send and receive zabbix_client packets.
50287 </summary>
50288 @@ -70975,7 +70792,7 @@ Domain allowed access.
50289 </param>
50290 <infoflow type="both" weight="10"/>
50291 </interface>
50292 -<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="97683">
50293 +<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="97806">
50294 <summary>
50295 Do not audit attempts to send and receive zabbix_client packets.
50296 </summary>
50297 @@ -70986,7 +70803,7 @@ Domain to not audit.
50298 </param>
50299 <infoflow type="none"/>
50300 </interface>
50301 -<interface name="corenet_relabelto_zabbix_client_packets" lineno="97698">
50302 +<interface name="corenet_relabelto_zabbix_client_packets" lineno="97821">
50303 <summary>
50304 Relabel packets to zabbix_client the packet type.
50305 </summary>
50306 @@ -70996,7 +70813,7 @@ Domain allowed access.
50307 </summary>
50308 </param>
50309 </interface>
50310 -<interface name="corenet_send_zabbix_server_packets" lineno="97718">
50311 +<interface name="corenet_send_zabbix_server_packets" lineno="97841">
50312 <summary>
50313 Send zabbix_server packets.
50314 </summary>
50315 @@ -71007,7 +70824,7 @@ Domain allowed access.
50316 </param>
50317 <infoflow type="write" weight="10"/>
50318 </interface>
50319 -<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="97737">
50320 +<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="97860">
50321 <summary>
50322 Do not audit attempts to send zabbix_server packets.
50323 </summary>
50324 @@ -71018,7 +70835,7 @@ Domain to not audit.
50325 </param>
50326 <infoflow type="none"/>
50327 </interface>
50328 -<interface name="corenet_receive_zabbix_server_packets" lineno="97756">
50329 +<interface name="corenet_receive_zabbix_server_packets" lineno="97879">
50330 <summary>
50331 Receive zabbix_server packets.
50332 </summary>
50333 @@ -71029,7 +70846,7 @@ Domain allowed access.
50334 </param>
50335 <infoflow type="read" weight="10"/>
50336 </interface>
50337 -<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="97775">
50338 +<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="97898">
50339 <summary>
50340 Do not audit attempts to receive zabbix_server packets.
50341 </summary>
50342 @@ -71040,7 +70857,7 @@ Domain allowed access.
50343 </param>
50344 <infoflow type="none"/>
50345 </interface>
50346 -<interface name="corenet_sendrecv_zabbix_server_packets" lineno="97794">
50347 +<interface name="corenet_sendrecv_zabbix_server_packets" lineno="97917">
50348 <summary>
50349 Send and receive zabbix_server packets.
50350 </summary>
50351 @@ -71051,7 +70868,7 @@ Domain allowed access.
50352 </param>
50353 <infoflow type="both" weight="10"/>
50354 </interface>
50355 -<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="97810">
50356 +<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="97933">
50357 <summary>
50358 Do not audit attempts to send and receive zabbix_server packets.
50359 </summary>
50360 @@ -71062,7 +70879,7 @@ Domain to not audit.
50361 </param>
50362 <infoflow type="none"/>
50363 </interface>
50364 -<interface name="corenet_relabelto_zabbix_server_packets" lineno="97825">
50365 +<interface name="corenet_relabelto_zabbix_server_packets" lineno="97948">
50366 <summary>
50367 Relabel packets to zabbix_server the packet type.
50368 </summary>
50369 @@ -71072,7 +70889,7 @@ Domain allowed access.
50370 </summary>
50371 </param>
50372 </interface>
50373 -<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="97847">
50374 +<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="97970">
50375 <summary>
50376 Send and receive TCP traffic on the zabbix_agent port.
50377 </summary>
50378 @@ -71083,7 +70900,7 @@ Domain allowed access.
50379 </param>
50380 <infoflow type="both" weight="10"/>
50381 </interface>
50382 -<interface name="corenet_udp_send_zabbix_agent_port" lineno="97862">
50383 +<interface name="corenet_udp_send_zabbix_agent_port" lineno="97985">
50384 <summary>
50385 Send UDP traffic on the zabbix_agent port.
50386 </summary>
50387 @@ -71094,7 +70911,7 @@ Domain allowed access.
50388 </param>
50389 <infoflow type="write" weight="10"/>
50390 </interface>
50391 -<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="97877">
50392 +<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="98000">
50393 <summary>
50394 Do not audit attempts to send UDP traffic on the zabbix_agent port.
50395 </summary>
50396 @@ -71105,7 +70922,7 @@ Domain to not audit.
50397 </param>
50398 <infoflow type="none"/>
50399 </interface>
50400 -<interface name="corenet_udp_receive_zabbix_agent_port" lineno="97892">
50401 +<interface name="corenet_udp_receive_zabbix_agent_port" lineno="98015">
50402 <summary>
50403 Receive UDP traffic on the zabbix_agent port.
50404 </summary>
50405 @@ -71116,7 +70933,7 @@ Domain allowed access.
50406 </param>
50407 <infoflow type="read" weight="10"/>
50408 </interface>
50409 -<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="97907">
50410 +<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="98030">
50411 <summary>
50412 Do not audit attempts to receive UDP traffic on the zabbix_agent port.
50413 </summary>
50414 @@ -71127,7 +70944,7 @@ Domain to not audit.
50415 </param>
50416 <infoflow type="none"/>
50417 </interface>
50418 -<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="97922">
50419 +<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="98045">
50420 <summary>
50421 Send and receive UDP traffic on the zabbix_agent port.
50422 </summary>
50423 @@ -71138,7 +70955,7 @@ Domain allowed access.
50424 </param>
50425 <infoflow type="both" weight="10"/>
50426 </interface>
50427 -<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="97938">
50428 +<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="98061">
50429 <summary>
50430 Do not audit attempts to send and receive
50431 UDP traffic on the zabbix_agent port.
50432 @@ -71150,7 +70967,7 @@ Domain to not audit.
50433 </param>
50434 <infoflow type="none"/>
50435 </interface>
50436 -<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="97953">
50437 +<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="98076">
50438 <summary>
50439 Bind TCP sockets to the zabbix_agent port.
50440 </summary>
50441 @@ -71161,7 +70978,7 @@ Domain allowed access.
50442 </param>
50443 <infoflow type="none"/>
50444 </interface>
50445 -<interface name="corenet_udp_bind_zabbix_agent_port" lineno="97973">
50446 +<interface name="corenet_udp_bind_zabbix_agent_port" lineno="98096">
50447 <summary>
50448 Bind UDP sockets to the zabbix_agent port.
50449 </summary>
50450 @@ -71172,7 +70989,7 @@ Domain allowed access.
50451 </param>
50452 <infoflow type="none"/>
50453 </interface>
50454 -<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="97992">
50455 +<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="98115">
50456 <summary>
50457 Make a TCP connection to the zabbix_agent port.
50458 </summary>
50459 @@ -71182,7 +70999,7 @@ Domain allowed access.
50460 </summary>
50461 </param>
50462 </interface>
50463 -<interface name="corenet_send_zabbix_agent_client_packets" lineno="98012">
50464 +<interface name="corenet_send_zabbix_agent_client_packets" lineno="98135">
50465 <summary>
50466 Send zabbix_agent_client packets.
50467 </summary>
50468 @@ -71193,7 +71010,7 @@ Domain allowed access.
50469 </param>
50470 <infoflow type="write" weight="10"/>
50471 </interface>
50472 -<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="98031">
50473 +<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="98154">
50474 <summary>
50475 Do not audit attempts to send zabbix_agent_client packets.
50476 </summary>
50477 @@ -71204,7 +71021,7 @@ Domain to not audit.
50478 </param>
50479 <infoflow type="none"/>
50480 </interface>
50481 -<interface name="corenet_receive_zabbix_agent_client_packets" lineno="98050">
50482 +<interface name="corenet_receive_zabbix_agent_client_packets" lineno="98173">
50483 <summary>
50484 Receive zabbix_agent_client packets.
50485 </summary>
50486 @@ -71215,7 +71032,7 @@ Domain allowed access.
50487 </param>
50488 <infoflow type="read" weight="10"/>
50489 </interface>
50490 -<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="98069">
50491 +<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="98192">
50492 <summary>
50493 Do not audit attempts to receive zabbix_agent_client packets.
50494 </summary>
50495 @@ -71226,7 +71043,7 @@ Domain allowed access.
50496 </param>
50497 <infoflow type="none"/>
50498 </interface>
50499 -<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="98088">
50500 +<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="98211">
50501 <summary>
50502 Send and receive zabbix_agent_client packets.
50503 </summary>
50504 @@ -71237,7 +71054,7 @@ Domain allowed access.
50505 </param>
50506 <infoflow type="both" weight="10"/>
50507 </interface>
50508 -<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="98104">
50509 +<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="98227">
50510 <summary>
50511 Do not audit attempts to send and receive zabbix_agent_client packets.
50512 </summary>
50513 @@ -71248,7 +71065,7 @@ Domain to not audit.
50514 </param>
50515 <infoflow type="none"/>
50516 </interface>
50517 -<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="98119">
50518 +<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="98242">
50519 <summary>
50520 Relabel packets to zabbix_agent_client the packet type.
50521 </summary>
50522 @@ -71258,7 +71075,7 @@ Domain allowed access.
50523 </summary>
50524 </param>
50525 </interface>
50526 -<interface name="corenet_send_zabbix_agent_server_packets" lineno="98139">
50527 +<interface name="corenet_send_zabbix_agent_server_packets" lineno="98262">
50528 <summary>
50529 Send zabbix_agent_server packets.
50530 </summary>
50531 @@ -71269,7 +71086,7 @@ Domain allowed access.
50532 </param>
50533 <infoflow type="write" weight="10"/>
50534 </interface>
50535 -<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="98158">
50536 +<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="98281">
50537 <summary>
50538 Do not audit attempts to send zabbix_agent_server packets.
50539 </summary>
50540 @@ -71280,7 +71097,7 @@ Domain to not audit.
50541 </param>
50542 <infoflow type="none"/>
50543 </interface>
50544 -<interface name="corenet_receive_zabbix_agent_server_packets" lineno="98177">
50545 +<interface name="corenet_receive_zabbix_agent_server_packets" lineno="98300">
50546 <summary>
50547 Receive zabbix_agent_server packets.
50548 </summary>
50549 @@ -71291,7 +71108,7 @@ Domain allowed access.
50550 </param>
50551 <infoflow type="read" weight="10"/>
50552 </interface>
50553 -<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="98196">
50554 +<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="98319">
50555 <summary>
50556 Do not audit attempts to receive zabbix_agent_server packets.
50557 </summary>
50558 @@ -71302,7 +71119,7 @@ Domain allowed access.
50559 </param>
50560 <infoflow type="none"/>
50561 </interface>
50562 -<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="98215">
50563 +<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="98338">
50564 <summary>
50565 Send and receive zabbix_agent_server packets.
50566 </summary>
50567 @@ -71313,7 +71130,7 @@ Domain allowed access.
50568 </param>
50569 <infoflow type="both" weight="10"/>
50570 </interface>
50571 -<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="98231">
50572 +<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="98354">
50573 <summary>
50574 Do not audit attempts to send and receive zabbix_agent_server packets.
50575 </summary>
50576 @@ -71324,7 +71141,7 @@ Domain to not audit.
50577 </param>
50578 <infoflow type="none"/>
50579 </interface>
50580 -<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="98246">
50581 +<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="98369">
50582 <summary>
50583 Relabel packets to zabbix_agent_server the packet type.
50584 </summary>
50585 @@ -71334,7 +71151,7 @@ Domain allowed access.
50586 </summary>
50587 </param>
50588 </interface>
50589 -<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="98268">
50590 +<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="98391">
50591 <summary>
50592 Send and receive TCP traffic on the zookeeper_client port.
50593 </summary>
50594 @@ -71345,7 +71162,7 @@ Domain allowed access.
50595 </param>
50596 <infoflow type="both" weight="10"/>
50597 </interface>
50598 -<interface name="corenet_udp_send_zookeeper_client_port" lineno="98283">
50599 +<interface name="corenet_udp_send_zookeeper_client_port" lineno="98406">
50600 <summary>
50601 Send UDP traffic on the zookeeper_client port.
50602 </summary>
50603 @@ -71356,7 +71173,7 @@ Domain allowed access.
50604 </param>
50605 <infoflow type="write" weight="10"/>
50606 </interface>
50607 -<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="98298">
50608 +<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="98421">
50609 <summary>
50610 Do not audit attempts to send UDP traffic on the zookeeper_client port.
50611 </summary>
50612 @@ -71367,7 +71184,7 @@ Domain to not audit.
50613 </param>
50614 <infoflow type="none"/>
50615 </interface>
50616 -<interface name="corenet_udp_receive_zookeeper_client_port" lineno="98313">
50617 +<interface name="corenet_udp_receive_zookeeper_client_port" lineno="98436">
50618 <summary>
50619 Receive UDP traffic on the zookeeper_client port.
50620 </summary>
50621 @@ -71378,7 +71195,7 @@ Domain allowed access.
50622 </param>
50623 <infoflow type="read" weight="10"/>
50624 </interface>
50625 -<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="98328">
50626 +<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="98451">
50627 <summary>
50628 Do not audit attempts to receive UDP traffic on the zookeeper_client port.
50629 </summary>
50630 @@ -71389,7 +71206,7 @@ Domain to not audit.
50631 </param>
50632 <infoflow type="none"/>
50633 </interface>
50634 -<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="98343">
50635 +<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="98466">
50636 <summary>
50637 Send and receive UDP traffic on the zookeeper_client port.
50638 </summary>
50639 @@ -71400,7 +71217,7 @@ Domain allowed access.
50640 </param>
50641 <infoflow type="both" weight="10"/>
50642 </interface>
50643 -<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="98359">
50644 +<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="98482">
50645 <summary>
50646 Do not audit attempts to send and receive
50647 UDP traffic on the zookeeper_client port.
50648 @@ -71412,7 +71229,7 @@ Domain to not audit.
50649 </param>
50650 <infoflow type="none"/>
50651 </interface>
50652 -<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="98374">
50653 +<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="98497">
50654 <summary>
50655 Bind TCP sockets to the zookeeper_client port.
50656 </summary>
50657 @@ -71423,7 +71240,7 @@ Domain allowed access.
50658 </param>
50659 <infoflow type="none"/>
50660 </interface>
50661 -<interface name="corenet_udp_bind_zookeeper_client_port" lineno="98394">
50662 +<interface name="corenet_udp_bind_zookeeper_client_port" lineno="98517">
50663 <summary>
50664 Bind UDP sockets to the zookeeper_client port.
50665 </summary>
50666 @@ -71434,7 +71251,7 @@ Domain allowed access.
50667 </param>
50668 <infoflow type="none"/>
50669 </interface>
50670 -<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="98413">
50671 +<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="98536">
50672 <summary>
50673 Make a TCP connection to the zookeeper_client port.
50674 </summary>
50675 @@ -71444,7 +71261,7 @@ Domain allowed access.
50676 </summary>
50677 </param>
50678 </interface>
50679 -<interface name="corenet_send_zookeeper_client_client_packets" lineno="98433">
50680 +<interface name="corenet_send_zookeeper_client_client_packets" lineno="98556">
50681 <summary>
50682 Send zookeeper_client_client packets.
50683 </summary>
50684 @@ -71455,7 +71272,7 @@ Domain allowed access.
50685 </param>
50686 <infoflow type="write" weight="10"/>
50687 </interface>
50688 -<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="98452">
50689 +<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="98575">
50690 <summary>
50691 Do not audit attempts to send zookeeper_client_client packets.
50692 </summary>
50693 @@ -71466,7 +71283,7 @@ Domain to not audit.
50694 </param>
50695 <infoflow type="none"/>
50696 </interface>
50697 -<interface name="corenet_receive_zookeeper_client_client_packets" lineno="98471">
50698 +<interface name="corenet_receive_zookeeper_client_client_packets" lineno="98594">
50699 <summary>
50700 Receive zookeeper_client_client packets.
50701 </summary>
50702 @@ -71477,7 +71294,7 @@ Domain allowed access.
50703 </param>
50704 <infoflow type="read" weight="10"/>
50705 </interface>
50706 -<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="98490">
50707 +<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="98613">
50708 <summary>
50709 Do not audit attempts to receive zookeeper_client_client packets.
50710 </summary>
50711 @@ -71488,7 +71305,7 @@ Domain allowed access.
50712 </param>
50713 <infoflow type="none"/>
50714 </interface>
50715 -<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="98509">
50716 +<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="98632">
50717 <summary>
50718 Send and receive zookeeper_client_client packets.
50719 </summary>
50720 @@ -71499,7 +71316,7 @@ Domain allowed access.
50721 </param>
50722 <infoflow type="both" weight="10"/>
50723 </interface>
50724 -<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="98525">
50725 +<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="98648">
50726 <summary>
50727 Do not audit attempts to send and receive zookeeper_client_client packets.
50728 </summary>
50729 @@ -71510,7 +71327,7 @@ Domain to not audit.
50730 </param>
50731 <infoflow type="none"/>
50732 </interface>
50733 -<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="98540">
50734 +<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="98663">
50735 <summary>
50736 Relabel packets to zookeeper_client_client the packet type.
50737 </summary>
50738 @@ -71520,7 +71337,7 @@ Domain allowed access.
50739 </summary>
50740 </param>
50741 </interface>
50742 -<interface name="corenet_send_zookeeper_client_server_packets" lineno="98560">
50743 +<interface name="corenet_send_zookeeper_client_server_packets" lineno="98683">
50744 <summary>
50745 Send zookeeper_client_server packets.
50746 </summary>
50747 @@ -71531,7 +71348,7 @@ Domain allowed access.
50748 </param>
50749 <infoflow type="write" weight="10"/>
50750 </interface>
50751 -<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="98579">
50752 +<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="98702">
50753 <summary>
50754 Do not audit attempts to send zookeeper_client_server packets.
50755 </summary>
50756 @@ -71542,7 +71359,7 @@ Domain to not audit.
50757 </param>
50758 <infoflow type="none"/>
50759 </interface>
50760 -<interface name="corenet_receive_zookeeper_client_server_packets" lineno="98598">
50761 +<interface name="corenet_receive_zookeeper_client_server_packets" lineno="98721">
50762 <summary>
50763 Receive zookeeper_client_server packets.
50764 </summary>
50765 @@ -71553,7 +71370,7 @@ Domain allowed access.
50766 </param>
50767 <infoflow type="read" weight="10"/>
50768 </interface>
50769 -<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="98617">
50770 +<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="98740">
50771 <summary>
50772 Do not audit attempts to receive zookeeper_client_server packets.
50773 </summary>
50774 @@ -71564,7 +71381,7 @@ Domain allowed access.
50775 </param>
50776 <infoflow type="none"/>
50777 </interface>
50778 -<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="98636">
50779 +<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="98759">
50780 <summary>
50781 Send and receive zookeeper_client_server packets.
50782 </summary>
50783 @@ -71575,7 +71392,7 @@ Domain allowed access.
50784 </param>
50785 <infoflow type="both" weight="10"/>
50786 </interface>
50787 -<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="98652">
50788 +<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="98775">
50789 <summary>
50790 Do not audit attempts to send and receive zookeeper_client_server packets.
50791 </summary>
50792 @@ -71586,7 +71403,7 @@ Domain to not audit.
50793 </param>
50794 <infoflow type="none"/>
50795 </interface>
50796 -<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="98667">
50797 +<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="98790">
50798 <summary>
50799 Relabel packets to zookeeper_client_server the packet type.
50800 </summary>
50801 @@ -71596,7 +71413,7 @@ Domain allowed access.
50802 </summary>
50803 </param>
50804 </interface>
50805 -<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="98689">
50806 +<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="98812">
50807 <summary>
50808 Send and receive TCP traffic on the zookeeper_election port.
50809 </summary>
50810 @@ -71607,7 +71424,7 @@ Domain allowed access.
50811 </param>
50812 <infoflow type="both" weight="10"/>
50813 </interface>
50814 -<interface name="corenet_udp_send_zookeeper_election_port" lineno="98704">
50815 +<interface name="corenet_udp_send_zookeeper_election_port" lineno="98827">
50816 <summary>
50817 Send UDP traffic on the zookeeper_election port.
50818 </summary>
50819 @@ -71618,7 +71435,7 @@ Domain allowed access.
50820 </param>
50821 <infoflow type="write" weight="10"/>
50822 </interface>
50823 -<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="98719">
50824 +<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="98842">
50825 <summary>
50826 Do not audit attempts to send UDP traffic on the zookeeper_election port.
50827 </summary>
50828 @@ -71629,7 +71446,7 @@ Domain to not audit.
50829 </param>
50830 <infoflow type="none"/>
50831 </interface>
50832 -<interface name="corenet_udp_receive_zookeeper_election_port" lineno="98734">
50833 +<interface name="corenet_udp_receive_zookeeper_election_port" lineno="98857">
50834 <summary>
50835 Receive UDP traffic on the zookeeper_election port.
50836 </summary>
50837 @@ -71640,7 +71457,7 @@ Domain allowed access.
50838 </param>
50839 <infoflow type="read" weight="10"/>
50840 </interface>
50841 -<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="98749">
50842 +<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="98872">
50843 <summary>
50844 Do not audit attempts to receive UDP traffic on the zookeeper_election port.
50845 </summary>
50846 @@ -71651,7 +71468,7 @@ Domain to not audit.
50847 </param>
50848 <infoflow type="none"/>
50849 </interface>
50850 -<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="98764">
50851 +<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="98887">
50852 <summary>
50853 Send and receive UDP traffic on the zookeeper_election port.
50854 </summary>
50855 @@ -71662,7 +71479,7 @@ Domain allowed access.
50856 </param>
50857 <infoflow type="both" weight="10"/>
50858 </interface>
50859 -<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="98780">
50860 +<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="98903">
50861 <summary>
50862 Do not audit attempts to send and receive
50863 UDP traffic on the zookeeper_election port.
50864 @@ -71674,7 +71491,7 @@ Domain to not audit.
50865 </param>
50866 <infoflow type="none"/>
50867 </interface>
50868 -<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="98795">
50869 +<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="98918">
50870 <summary>
50871 Bind TCP sockets to the zookeeper_election port.
50872 </summary>
50873 @@ -71685,7 +71502,7 @@ Domain allowed access.
50874 </param>
50875 <infoflow type="none"/>
50876 </interface>
50877 -<interface name="corenet_udp_bind_zookeeper_election_port" lineno="98815">
50878 +<interface name="corenet_udp_bind_zookeeper_election_port" lineno="98938">
50879 <summary>
50880 Bind UDP sockets to the zookeeper_election port.
50881 </summary>
50882 @@ -71696,7 +71513,7 @@ Domain allowed access.
50883 </param>
50884 <infoflow type="none"/>
50885 </interface>
50886 -<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="98834">
50887 +<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="98957">
50888 <summary>
50889 Make a TCP connection to the zookeeper_election port.
50890 </summary>
50891 @@ -71706,7 +71523,7 @@ Domain allowed access.
50892 </summary>
50893 </param>
50894 </interface>
50895 -<interface name="corenet_send_zookeeper_election_client_packets" lineno="98854">
50896 +<interface name="corenet_send_zookeeper_election_client_packets" lineno="98977">
50897 <summary>
50898 Send zookeeper_election_client packets.
50899 </summary>
50900 @@ -71717,7 +71534,7 @@ Domain allowed access.
50901 </param>
50902 <infoflow type="write" weight="10"/>
50903 </interface>
50904 -<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="98873">
50905 +<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="98996">
50906 <summary>
50907 Do not audit attempts to send zookeeper_election_client packets.
50908 </summary>
50909 @@ -71728,7 +71545,7 @@ Domain to not audit.
50910 </param>
50911 <infoflow type="none"/>
50912 </interface>
50913 -<interface name="corenet_receive_zookeeper_election_client_packets" lineno="98892">
50914 +<interface name="corenet_receive_zookeeper_election_client_packets" lineno="99015">
50915 <summary>
50916 Receive zookeeper_election_client packets.
50917 </summary>
50918 @@ -71739,7 +71556,7 @@ Domain allowed access.
50919 </param>
50920 <infoflow type="read" weight="10"/>
50921 </interface>
50922 -<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="98911">
50923 +<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="99034">
50924 <summary>
50925 Do not audit attempts to receive zookeeper_election_client packets.
50926 </summary>
50927 @@ -71750,7 +71567,7 @@ Domain allowed access.
50928 </param>
50929 <infoflow type="none"/>
50930 </interface>
50931 -<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="98930">
50932 +<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="99053">
50933 <summary>
50934 Send and receive zookeeper_election_client packets.
50935 </summary>
50936 @@ -71761,7 +71578,7 @@ Domain allowed access.
50937 </param>
50938 <infoflow type="both" weight="10"/>
50939 </interface>
50940 -<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="98946">
50941 +<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="99069">
50942 <summary>
50943 Do not audit attempts to send and receive zookeeper_election_client packets.
50944 </summary>
50945 @@ -71772,7 +71589,7 @@ Domain to not audit.
50946 </param>
50947 <infoflow type="none"/>
50948 </interface>
50949 -<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="98961">
50950 +<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="99084">
50951 <summary>
50952 Relabel packets to zookeeper_election_client the packet type.
50953 </summary>
50954 @@ -71782,7 +71599,7 @@ Domain allowed access.
50955 </summary>
50956 </param>
50957 </interface>
50958 -<interface name="corenet_send_zookeeper_election_server_packets" lineno="98981">
50959 +<interface name="corenet_send_zookeeper_election_server_packets" lineno="99104">
50960 <summary>
50961 Send zookeeper_election_server packets.
50962 </summary>
50963 @@ -71793,7 +71610,7 @@ Domain allowed access.
50964 </param>
50965 <infoflow type="write" weight="10"/>
50966 </interface>
50967 -<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="99000">
50968 +<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="99123">
50969 <summary>
50970 Do not audit attempts to send zookeeper_election_server packets.
50971 </summary>
50972 @@ -71804,7 +71621,7 @@ Domain to not audit.
50973 </param>
50974 <infoflow type="none"/>
50975 </interface>
50976 -<interface name="corenet_receive_zookeeper_election_server_packets" lineno="99019">
50977 +<interface name="corenet_receive_zookeeper_election_server_packets" lineno="99142">
50978 <summary>
50979 Receive zookeeper_election_server packets.
50980 </summary>
50981 @@ -71815,7 +71632,7 @@ Domain allowed access.
50982 </param>
50983 <infoflow type="read" weight="10"/>
50984 </interface>
50985 -<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="99038">
50986 +<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="99161">
50987 <summary>
50988 Do not audit attempts to receive zookeeper_election_server packets.
50989 </summary>
50990 @@ -71826,7 +71643,7 @@ Domain allowed access.
50991 </param>
50992 <infoflow type="none"/>
50993 </interface>
50994 -<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="99057">
50995 +<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="99180">
50996 <summary>
50997 Send and receive zookeeper_election_server packets.
50998 </summary>
50999 @@ -71837,7 +71654,7 @@ Domain allowed access.
51000 </param>
51001 <infoflow type="both" weight="10"/>
51002 </interface>
51003 -<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="99073">
51004 +<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="99196">
51005 <summary>
51006 Do not audit attempts to send and receive zookeeper_election_server packets.
51007 </summary>
51008 @@ -71848,7 +71665,7 @@ Domain to not audit.
51009 </param>
51010 <infoflow type="none"/>
51011 </interface>
51012 -<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="99088">
51013 +<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="99211">
51014 <summary>
51015 Relabel packets to zookeeper_election_server the packet type.
51016 </summary>
51017 @@ -71858,7 +71675,7 @@ Domain allowed access.
51018 </summary>
51019 </param>
51020 </interface>
51021 -<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="99110">
51022 +<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="99233">
51023 <summary>
51024 Send and receive TCP traffic on the zookeeper_leader port.
51025 </summary>
51026 @@ -71869,7 +71686,7 @@ Domain allowed access.
51027 </param>
51028 <infoflow type="both" weight="10"/>
51029 </interface>
51030 -<interface name="corenet_udp_send_zookeeper_leader_port" lineno="99125">
51031 +<interface name="corenet_udp_send_zookeeper_leader_port" lineno="99248">
51032 <summary>
51033 Send UDP traffic on the zookeeper_leader port.
51034 </summary>
51035 @@ -71880,7 +71697,7 @@ Domain allowed access.
51036 </param>
51037 <infoflow type="write" weight="10"/>
51038 </interface>
51039 -<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="99140">
51040 +<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="99263">
51041 <summary>
51042 Do not audit attempts to send UDP traffic on the zookeeper_leader port.
51043 </summary>
51044 @@ -71891,7 +71708,7 @@ Domain to not audit.
51045 </param>
51046 <infoflow type="none"/>
51047 </interface>
51048 -<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="99155">
51049 +<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="99278">
51050 <summary>
51051 Receive UDP traffic on the zookeeper_leader port.
51052 </summary>
51053 @@ -71902,7 +71719,7 @@ Domain allowed access.
51054 </param>
51055 <infoflow type="read" weight="10"/>
51056 </interface>
51057 -<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="99170">
51058 +<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="99293">
51059 <summary>
51060 Do not audit attempts to receive UDP traffic on the zookeeper_leader port.
51061 </summary>
51062 @@ -71913,7 +71730,7 @@ Domain to not audit.
51063 </param>
51064 <infoflow type="none"/>
51065 </interface>
51066 -<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="99185">
51067 +<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="99308">
51068 <summary>
51069 Send and receive UDP traffic on the zookeeper_leader port.
51070 </summary>
51071 @@ -71924,7 +71741,7 @@ Domain allowed access.
51072 </param>
51073 <infoflow type="both" weight="10"/>
51074 </interface>
51075 -<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="99201">
51076 +<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="99324">
51077 <summary>
51078 Do not audit attempts to send and receive
51079 UDP traffic on the zookeeper_leader port.
51080 @@ -71936,7 +71753,7 @@ Domain to not audit.
51081 </param>
51082 <infoflow type="none"/>
51083 </interface>
51084 -<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="99216">
51085 +<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="99339">
51086 <summary>
51087 Bind TCP sockets to the zookeeper_leader port.
51088 </summary>
51089 @@ -71947,7 +71764,7 @@ Domain allowed access.
51090 </param>
51091 <infoflow type="none"/>
51092 </interface>
51093 -<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="99236">
51094 +<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="99359">
51095 <summary>
51096 Bind UDP sockets to the zookeeper_leader port.
51097 </summary>
51098 @@ -71958,7 +71775,7 @@ Domain allowed access.
51099 </param>
51100 <infoflow type="none"/>
51101 </interface>
51102 -<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="99255">
51103 +<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="99378">
51104 <summary>
51105 Make a TCP connection to the zookeeper_leader port.
51106 </summary>
51107 @@ -71968,7 +71785,7 @@ Domain allowed access.
51108 </summary>
51109 </param>
51110 </interface>
51111 -<interface name="corenet_send_zookeeper_leader_client_packets" lineno="99275">
51112 +<interface name="corenet_send_zookeeper_leader_client_packets" lineno="99398">
51113 <summary>
51114 Send zookeeper_leader_client packets.
51115 </summary>
51116 @@ -71979,7 +71796,7 @@ Domain allowed access.
51117 </param>
51118 <infoflow type="write" weight="10"/>
51119 </interface>
51120 -<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="99294">
51121 +<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="99417">
51122 <summary>
51123 Do not audit attempts to send zookeeper_leader_client packets.
51124 </summary>
51125 @@ -71990,7 +71807,7 @@ Domain to not audit.
51126 </param>
51127 <infoflow type="none"/>
51128 </interface>
51129 -<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="99313">
51130 +<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="99436">
51131 <summary>
51132 Receive zookeeper_leader_client packets.
51133 </summary>
51134 @@ -72001,7 +71818,7 @@ Domain allowed access.
51135 </param>
51136 <infoflow type="read" weight="10"/>
51137 </interface>
51138 -<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="99332">
51139 +<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="99455">
51140 <summary>
51141 Do not audit attempts to receive zookeeper_leader_client packets.
51142 </summary>
51143 @@ -72012,7 +71829,7 @@ Domain allowed access.
51144 </param>
51145 <infoflow type="none"/>
51146 </interface>
51147 -<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="99351">
51148 +<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="99474">
51149 <summary>
51150 Send and receive zookeeper_leader_client packets.
51151 </summary>
51152 @@ -72023,7 +71840,7 @@ Domain allowed access.
51153 </param>
51154 <infoflow type="both" weight="10"/>
51155 </interface>
51156 -<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="99367">
51157 +<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="99490">
51158 <summary>
51159 Do not audit attempts to send and receive zookeeper_leader_client packets.
51160 </summary>
51161 @@ -72034,7 +71851,7 @@ Domain to not audit.
51162 </param>
51163 <infoflow type="none"/>
51164 </interface>
51165 -<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="99382">
51166 +<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="99505">
51167 <summary>
51168 Relabel packets to zookeeper_leader_client the packet type.
51169 </summary>
51170 @@ -72044,7 +71861,7 @@ Domain allowed access.
51171 </summary>
51172 </param>
51173 </interface>
51174 -<interface name="corenet_send_zookeeper_leader_server_packets" lineno="99402">
51175 +<interface name="corenet_send_zookeeper_leader_server_packets" lineno="99525">
51176 <summary>
51177 Send zookeeper_leader_server packets.
51178 </summary>
51179 @@ -72055,7 +71872,7 @@ Domain allowed access.
51180 </param>
51181 <infoflow type="write" weight="10"/>
51182 </interface>
51183 -<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="99421">
51184 +<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="99544">
51185 <summary>
51186 Do not audit attempts to send zookeeper_leader_server packets.
51187 </summary>
51188 @@ -72066,7 +71883,7 @@ Domain to not audit.
51189 </param>
51190 <infoflow type="none"/>
51191 </interface>
51192 -<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="99440">
51193 +<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="99563">
51194 <summary>
51195 Receive zookeeper_leader_server packets.
51196 </summary>
51197 @@ -72077,7 +71894,7 @@ Domain allowed access.
51198 </param>
51199 <infoflow type="read" weight="10"/>
51200 </interface>
51201 -<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="99459">
51202 +<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="99582">
51203 <summary>
51204 Do not audit attempts to receive zookeeper_leader_server packets.
51205 </summary>
51206 @@ -72088,7 +71905,7 @@ Domain allowed access.
51207 </param>
51208 <infoflow type="none"/>
51209 </interface>
51210 -<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="99478">
51211 +<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="99601">
51212 <summary>
51213 Send and receive zookeeper_leader_server packets.
51214 </summary>
51215 @@ -72099,7 +71916,7 @@ Domain allowed access.
51216 </param>
51217 <infoflow type="both" weight="10"/>
51218 </interface>
51219 -<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="99494">
51220 +<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="99617">
51221 <summary>
51222 Do not audit attempts to send and receive zookeeper_leader_server packets.
51223 </summary>
51224 @@ -72110,7 +71927,7 @@ Domain to not audit.
51225 </param>
51226 <infoflow type="none"/>
51227 </interface>
51228 -<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="99509">
51229 +<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="99632">
51230 <summary>
51231 Relabel packets to zookeeper_leader_server the packet type.
51232 </summary>
51233 @@ -72120,7 +71937,7 @@ Domain allowed access.
51234 </summary>
51235 </param>
51236 </interface>
51237 -<interface name="corenet_tcp_sendrecv_zebra_port" lineno="99531">
51238 +<interface name="corenet_tcp_sendrecv_zebra_port" lineno="99654">
51239 <summary>
51240 Send and receive TCP traffic on the zebra port.
51241 </summary>
51242 @@ -72131,7 +71948,7 @@ Domain allowed access.
51243 </param>
51244 <infoflow type="both" weight="10"/>
51245 </interface>
51246 -<interface name="corenet_udp_send_zebra_port" lineno="99546">
51247 +<interface name="corenet_udp_send_zebra_port" lineno="99669">
51248 <summary>
51249 Send UDP traffic on the zebra port.
51250 </summary>
51251 @@ -72142,7 +71959,7 @@ Domain allowed access.
51252 </param>
51253 <infoflow type="write" weight="10"/>
51254 </interface>
51255 -<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="99561">
51256 +<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="99684">
51257 <summary>
51258 Do not audit attempts to send UDP traffic on the zebra port.
51259 </summary>
51260 @@ -72153,7 +71970,7 @@ Domain to not audit.
51261 </param>
51262 <infoflow type="none"/>
51263 </interface>
51264 -<interface name="corenet_udp_receive_zebra_port" lineno="99576">
51265 +<interface name="corenet_udp_receive_zebra_port" lineno="99699">
51266 <summary>
51267 Receive UDP traffic on the zebra port.
51268 </summary>
51269 @@ -72164,7 +71981,7 @@ Domain allowed access.
51270 </param>
51271 <infoflow type="read" weight="10"/>
51272 </interface>
51273 -<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="99591">
51274 +<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="99714">
51275 <summary>
51276 Do not audit attempts to receive UDP traffic on the zebra port.
51277 </summary>
51278 @@ -72175,7 +71992,7 @@ Domain to not audit.
51279 </param>
51280 <infoflow type="none"/>
51281 </interface>
51282 -<interface name="corenet_udp_sendrecv_zebra_port" lineno="99606">
51283 +<interface name="corenet_udp_sendrecv_zebra_port" lineno="99729">
51284 <summary>
51285 Send and receive UDP traffic on the zebra port.
51286 </summary>
51287 @@ -72186,7 +72003,7 @@ Domain allowed access.
51288 </param>
51289 <infoflow type="both" weight="10"/>
51290 </interface>
51291 -<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="99622">
51292 +<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="99745">
51293 <summary>
51294 Do not audit attempts to send and receive
51295 UDP traffic on the zebra port.
51296 @@ -72198,7 +72015,7 @@ Domain to not audit.
51297 </param>
51298 <infoflow type="none"/>
51299 </interface>
51300 -<interface name="corenet_tcp_bind_zebra_port" lineno="99637">
51301 +<interface name="corenet_tcp_bind_zebra_port" lineno="99760">
51302 <summary>
51303 Bind TCP sockets to the zebra port.
51304 </summary>
51305 @@ -72209,7 +72026,7 @@ Domain allowed access.
51306 </param>
51307 <infoflow type="none"/>
51308 </interface>
51309 -<interface name="corenet_udp_bind_zebra_port" lineno="99657">
51310 +<interface name="corenet_udp_bind_zebra_port" lineno="99780">
51311 <summary>
51312 Bind UDP sockets to the zebra port.
51313 </summary>
51314 @@ -72220,7 +72037,7 @@ Domain allowed access.
51315 </param>
51316 <infoflow type="none"/>
51317 </interface>
51318 -<interface name="corenet_tcp_connect_zebra_port" lineno="99676">
51319 +<interface name="corenet_tcp_connect_zebra_port" lineno="99799">
51320 <summary>
51321 Make a TCP connection to the zebra port.
51322 </summary>
51323 @@ -72230,7 +72047,7 @@ Domain allowed access.
51324 </summary>
51325 </param>
51326 </interface>
51327 -<interface name="corenet_send_zebra_client_packets" lineno="99696">
51328 +<interface name="corenet_send_zebra_client_packets" lineno="99819">
51329 <summary>
51330 Send zebra_client packets.
51331 </summary>
51332 @@ -72241,7 +72058,7 @@ Domain allowed access.
51333 </param>
51334 <infoflow type="write" weight="10"/>
51335 </interface>
51336 -<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="99715">
51337 +<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="99838">
51338 <summary>
51339 Do not audit attempts to send zebra_client packets.
51340 </summary>
51341 @@ -72252,7 +72069,7 @@ Domain to not audit.
51342 </param>
51343 <infoflow type="none"/>
51344 </interface>
51345 -<interface name="corenet_receive_zebra_client_packets" lineno="99734">
51346 +<interface name="corenet_receive_zebra_client_packets" lineno="99857">
51347 <summary>
51348 Receive zebra_client packets.
51349 </summary>
51350 @@ -72263,7 +72080,7 @@ Domain allowed access.
51351 </param>
51352 <infoflow type="read" weight="10"/>
51353 </interface>
51354 -<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="99753">
51355 +<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="99876">
51356 <summary>
51357 Do not audit attempts to receive zebra_client packets.
51358 </summary>
51359 @@ -72274,7 +72091,7 @@ Domain allowed access.
51360 </param>
51361 <infoflow type="none"/>
51362 </interface>
51363 -<interface name="corenet_sendrecv_zebra_client_packets" lineno="99772">
51364 +<interface name="corenet_sendrecv_zebra_client_packets" lineno="99895">
51365 <summary>
51366 Send and receive zebra_client packets.
51367 </summary>
51368 @@ -72285,7 +72102,7 @@ Domain allowed access.
51369 </param>
51370 <infoflow type="both" weight="10"/>
51371 </interface>
51372 -<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="99788">
51373 +<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="99911">
51374 <summary>
51375 Do not audit attempts to send and receive zebra_client packets.
51376 </summary>
51377 @@ -72296,7 +72113,7 @@ Domain to not audit.
51378 </param>
51379 <infoflow type="none"/>
51380 </interface>
51381 -<interface name="corenet_relabelto_zebra_client_packets" lineno="99803">
51382 +<interface name="corenet_relabelto_zebra_client_packets" lineno="99926">
51383 <summary>
51384 Relabel packets to zebra_client the packet type.
51385 </summary>
51386 @@ -72306,7 +72123,7 @@ Domain allowed access.
51387 </summary>
51388 </param>
51389 </interface>
51390 -<interface name="corenet_send_zebra_server_packets" lineno="99823">
51391 +<interface name="corenet_send_zebra_server_packets" lineno="99946">
51392 <summary>
51393 Send zebra_server packets.
51394 </summary>
51395 @@ -72317,7 +72134,7 @@ Domain allowed access.
51396 </param>
51397 <infoflow type="write" weight="10"/>
51398 </interface>
51399 -<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="99842">
51400 +<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="99965">
51401 <summary>
51402 Do not audit attempts to send zebra_server packets.
51403 </summary>
51404 @@ -72328,7 +72145,7 @@ Domain to not audit.
51405 </param>
51406 <infoflow type="none"/>
51407 </interface>
51408 -<interface name="corenet_receive_zebra_server_packets" lineno="99861">
51409 +<interface name="corenet_receive_zebra_server_packets" lineno="99984">
51410 <summary>
51411 Receive zebra_server packets.
51412 </summary>
51413 @@ -72339,7 +72156,7 @@ Domain allowed access.
51414 </param>
51415 <infoflow type="read" weight="10"/>
51416 </interface>
51417 -<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="99880">
51418 +<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="100003">
51419 <summary>
51420 Do not audit attempts to receive zebra_server packets.
51421 </summary>
51422 @@ -72350,7 +72167,7 @@ Domain allowed access.
51423 </param>
51424 <infoflow type="none"/>
51425 </interface>
51426 -<interface name="corenet_sendrecv_zebra_server_packets" lineno="99899">
51427 +<interface name="corenet_sendrecv_zebra_server_packets" lineno="100022">
51428 <summary>
51429 Send and receive zebra_server packets.
51430 </summary>
51431 @@ -72361,7 +72178,7 @@ Domain allowed access.
51432 </param>
51433 <infoflow type="both" weight="10"/>
51434 </interface>
51435 -<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="99915">
51436 +<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="100038">
51437 <summary>
51438 Do not audit attempts to send and receive zebra_server packets.
51439 </summary>
51440 @@ -72372,7 +72189,7 @@ Domain to not audit.
51441 </param>
51442 <infoflow type="none"/>
51443 </interface>
51444 -<interface name="corenet_relabelto_zebra_server_packets" lineno="99930">
51445 +<interface name="corenet_relabelto_zebra_server_packets" lineno="100053">
51446 <summary>
51447 Relabel packets to zebra_server the packet type.
51448 </summary>
51449 @@ -72382,7 +72199,7 @@ Domain allowed access.
51450 </summary>
51451 </param>
51452 </interface>
51453 -<interface name="corenet_tcp_sendrecv_zented_port" lineno="99952">
51454 +<interface name="corenet_tcp_sendrecv_zented_port" lineno="100075">
51455 <summary>
51456 Send and receive TCP traffic on the zented port.
51457 </summary>
51458 @@ -72393,7 +72210,7 @@ Domain allowed access.
51459 </param>
51460 <infoflow type="both" weight="10"/>
51461 </interface>
51462 -<interface name="corenet_udp_send_zented_port" lineno="99967">
51463 +<interface name="corenet_udp_send_zented_port" lineno="100090">
51464 <summary>
51465 Send UDP traffic on the zented port.
51466 </summary>
51467 @@ -72404,7 +72221,7 @@ Domain allowed access.
51468 </param>
51469 <infoflow type="write" weight="10"/>
51470 </interface>
51471 -<interface name="corenet_dontaudit_udp_send_zented_port" lineno="99982">
51472 +<interface name="corenet_dontaudit_udp_send_zented_port" lineno="100105">
51473 <summary>
51474 Do not audit attempts to send UDP traffic on the zented port.
51475 </summary>
51476 @@ -72415,7 +72232,7 @@ Domain to not audit.
51477 </param>
51478 <infoflow type="none"/>
51479 </interface>
51480 -<interface name="corenet_udp_receive_zented_port" lineno="99997">
51481 +<interface name="corenet_udp_receive_zented_port" lineno="100120">
51482 <summary>
51483 Receive UDP traffic on the zented port.
51484 </summary>
51485 @@ -72426,7 +72243,7 @@ Domain allowed access.
51486 </param>
51487 <infoflow type="read" weight="10"/>
51488 </interface>
51489 -<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="100012">
51490 +<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="100135">
51491 <summary>
51492 Do not audit attempts to receive UDP traffic on the zented port.
51493 </summary>
51494 @@ -72437,7 +72254,7 @@ Domain to not audit.
51495 </param>
51496 <infoflow type="none"/>
51497 </interface>
51498 -<interface name="corenet_udp_sendrecv_zented_port" lineno="100027">
51499 +<interface name="corenet_udp_sendrecv_zented_port" lineno="100150">
51500 <summary>
51501 Send and receive UDP traffic on the zented port.
51502 </summary>
51503 @@ -72448,7 +72265,7 @@ Domain allowed access.
51504 </param>
51505 <infoflow type="both" weight="10"/>
51506 </interface>
51507 -<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="100043">
51508 +<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="100166">
51509 <summary>
51510 Do not audit attempts to send and receive
51511 UDP traffic on the zented port.
51512 @@ -72460,7 +72277,7 @@ Domain to not audit.
51513 </param>
51514 <infoflow type="none"/>
51515 </interface>
51516 -<interface name="corenet_tcp_bind_zented_port" lineno="100058">
51517 +<interface name="corenet_tcp_bind_zented_port" lineno="100181">
51518 <summary>
51519 Bind TCP sockets to the zented port.
51520 </summary>
51521 @@ -72471,7 +72288,7 @@ Domain allowed access.
51522 </param>
51523 <infoflow type="none"/>
51524 </interface>
51525 -<interface name="corenet_udp_bind_zented_port" lineno="100078">
51526 +<interface name="corenet_udp_bind_zented_port" lineno="100201">
51527 <summary>
51528 Bind UDP sockets to the zented port.
51529 </summary>
51530 @@ -72482,7 +72299,7 @@ Domain allowed access.
51531 </param>
51532 <infoflow type="none"/>
51533 </interface>
51534 -<interface name="corenet_tcp_connect_zented_port" lineno="100097">
51535 +<interface name="corenet_tcp_connect_zented_port" lineno="100220">
51536 <summary>
51537 Make a TCP connection to the zented port.
51538 </summary>
51539 @@ -72492,7 +72309,7 @@ Domain allowed access.
51540 </summary>
51541 </param>
51542 </interface>
51543 -<interface name="corenet_send_zented_client_packets" lineno="100117">
51544 +<interface name="corenet_send_zented_client_packets" lineno="100240">
51545 <summary>
51546 Send zented_client packets.
51547 </summary>
51548 @@ -72503,7 +72320,7 @@ Domain allowed access.
51549 </param>
51550 <infoflow type="write" weight="10"/>
51551 </interface>
51552 -<interface name="corenet_dontaudit_send_zented_client_packets" lineno="100136">
51553 +<interface name="corenet_dontaudit_send_zented_client_packets" lineno="100259">
51554 <summary>
51555 Do not audit attempts to send zented_client packets.
51556 </summary>
51557 @@ -72514,7 +72331,7 @@ Domain to not audit.
51558 </param>
51559 <infoflow type="none"/>
51560 </interface>
51561 -<interface name="corenet_receive_zented_client_packets" lineno="100155">
51562 +<interface name="corenet_receive_zented_client_packets" lineno="100278">
51563 <summary>
51564 Receive zented_client packets.
51565 </summary>
51566 @@ -72525,7 +72342,7 @@ Domain allowed access.
51567 </param>
51568 <infoflow type="read" weight="10"/>
51569 </interface>
51570 -<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="100174">
51571 +<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="100297">
51572 <summary>
51573 Do not audit attempts to receive zented_client packets.
51574 </summary>
51575 @@ -72536,7 +72353,7 @@ Domain allowed access.
51576 </param>
51577 <infoflow type="none"/>
51578 </interface>
51579 -<interface name="corenet_sendrecv_zented_client_packets" lineno="100193">
51580 +<interface name="corenet_sendrecv_zented_client_packets" lineno="100316">
51581 <summary>
51582 Send and receive zented_client packets.
51583 </summary>
51584 @@ -72547,7 +72364,7 @@ Domain allowed access.
51585 </param>
51586 <infoflow type="both" weight="10"/>
51587 </interface>
51588 -<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="100209">
51589 +<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="100332">
51590 <summary>
51591 Do not audit attempts to send and receive zented_client packets.
51592 </summary>
51593 @@ -72558,7 +72375,7 @@ Domain to not audit.
51594 </param>
51595 <infoflow type="none"/>
51596 </interface>
51597 -<interface name="corenet_relabelto_zented_client_packets" lineno="100224">
51598 +<interface name="corenet_relabelto_zented_client_packets" lineno="100347">
51599 <summary>
51600 Relabel packets to zented_client the packet type.
51601 </summary>
51602 @@ -72568,7 +72385,7 @@ Domain allowed access.
51603 </summary>
51604 </param>
51605 </interface>
51606 -<interface name="corenet_send_zented_server_packets" lineno="100244">
51607 +<interface name="corenet_send_zented_server_packets" lineno="100367">
51608 <summary>
51609 Send zented_server packets.
51610 </summary>
51611 @@ -72579,7 +72396,7 @@ Domain allowed access.
51612 </param>
51613 <infoflow type="write" weight="10"/>
51614 </interface>
51615 -<interface name="corenet_dontaudit_send_zented_server_packets" lineno="100263">
51616 +<interface name="corenet_dontaudit_send_zented_server_packets" lineno="100386">
51617 <summary>
51618 Do not audit attempts to send zented_server packets.
51619 </summary>
51620 @@ -72590,7 +72407,7 @@ Domain to not audit.
51621 </param>
51622 <infoflow type="none"/>
51623 </interface>
51624 -<interface name="corenet_receive_zented_server_packets" lineno="100282">
51625 +<interface name="corenet_receive_zented_server_packets" lineno="100405">
51626 <summary>
51627 Receive zented_server packets.
51628 </summary>
51629 @@ -72601,7 +72418,7 @@ Domain allowed access.
51630 </param>
51631 <infoflow type="read" weight="10"/>
51632 </interface>
51633 -<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="100301">
51634 +<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="100424">
51635 <summary>
51636 Do not audit attempts to receive zented_server packets.
51637 </summary>
51638 @@ -72612,7 +72429,7 @@ Domain allowed access.
51639 </param>
51640 <infoflow type="none"/>
51641 </interface>
51642 -<interface name="corenet_sendrecv_zented_server_packets" lineno="100320">
51643 +<interface name="corenet_sendrecv_zented_server_packets" lineno="100443">
51644 <summary>
51645 Send and receive zented_server packets.
51646 </summary>
51647 @@ -72623,7 +72440,7 @@ Domain allowed access.
51648 </param>
51649 <infoflow type="both" weight="10"/>
51650 </interface>
51651 -<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="100336">
51652 +<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="100459">
51653 <summary>
51654 Do not audit attempts to send and receive zented_server packets.
51655 </summary>
51656 @@ -72634,7 +72451,7 @@ Domain to not audit.
51657 </param>
51658 <infoflow type="none"/>
51659 </interface>
51660 -<interface name="corenet_relabelto_zented_server_packets" lineno="100351">
51661 +<interface name="corenet_relabelto_zented_server_packets" lineno="100474">
51662 <summary>
51663 Relabel packets to zented_server the packet type.
51664 </summary>
51665 @@ -72644,7 +72461,7 @@ Domain allowed access.
51666 </summary>
51667 </param>
51668 </interface>
51669 -<interface name="corenet_tcp_sendrecv_zope_port" lineno="100373">
51670 +<interface name="corenet_tcp_sendrecv_zope_port" lineno="100496">
51671 <summary>
51672 Send and receive TCP traffic on the zope port.
51673 </summary>
51674 @@ -72655,7 +72472,7 @@ Domain allowed access.
51675 </param>
51676 <infoflow type="both" weight="10"/>
51677 </interface>
51678 -<interface name="corenet_udp_send_zope_port" lineno="100388">
51679 +<interface name="corenet_udp_send_zope_port" lineno="100511">
51680 <summary>
51681 Send UDP traffic on the zope port.
51682 </summary>
51683 @@ -72666,7 +72483,7 @@ Domain allowed access.
51684 </param>
51685 <infoflow type="write" weight="10"/>
51686 </interface>
51687 -<interface name="corenet_dontaudit_udp_send_zope_port" lineno="100403">
51688 +<interface name="corenet_dontaudit_udp_send_zope_port" lineno="100526">
51689 <summary>
51690 Do not audit attempts to send UDP traffic on the zope port.
51691 </summary>
51692 @@ -72677,7 +72494,7 @@ Domain to not audit.
51693 </param>
51694 <infoflow type="none"/>
51695 </interface>
51696 -<interface name="corenet_udp_receive_zope_port" lineno="100418">
51697 +<interface name="corenet_udp_receive_zope_port" lineno="100541">
51698 <summary>
51699 Receive UDP traffic on the zope port.
51700 </summary>
51701 @@ -72688,7 +72505,7 @@ Domain allowed access.
51702 </param>
51703 <infoflow type="read" weight="10"/>
51704 </interface>
51705 -<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="100433">
51706 +<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="100556">
51707 <summary>
51708 Do not audit attempts to receive UDP traffic on the zope port.
51709 </summary>
51710 @@ -72699,7 +72516,7 @@ Domain to not audit.
51711 </param>
51712 <infoflow type="none"/>
51713 </interface>
51714 -<interface name="corenet_udp_sendrecv_zope_port" lineno="100448">
51715 +<interface name="corenet_udp_sendrecv_zope_port" lineno="100571">
51716 <summary>
51717 Send and receive UDP traffic on the zope port.
51718 </summary>
51719 @@ -72710,7 +72527,7 @@ Domain allowed access.
51720 </param>
51721 <infoflow type="both" weight="10"/>
51722 </interface>
51723 -<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="100464">
51724 +<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="100587">
51725 <summary>
51726 Do not audit attempts to send and receive
51727 UDP traffic on the zope port.
51728 @@ -72722,7 +72539,7 @@ Domain to not audit.
51729 </param>
51730 <infoflow type="none"/>
51731 </interface>
51732 -<interface name="corenet_tcp_bind_zope_port" lineno="100479">
51733 +<interface name="corenet_tcp_bind_zope_port" lineno="100602">
51734 <summary>
51735 Bind TCP sockets to the zope port.
51736 </summary>
51737 @@ -72733,7 +72550,7 @@ Domain allowed access.
51738 </param>
51739 <infoflow type="none"/>
51740 </interface>
51741 -<interface name="corenet_udp_bind_zope_port" lineno="100499">
51742 +<interface name="corenet_udp_bind_zope_port" lineno="100622">
51743 <summary>
51744 Bind UDP sockets to the zope port.
51745 </summary>
51746 @@ -72744,7 +72561,7 @@ Domain allowed access.
51747 </param>
51748 <infoflow type="none"/>
51749 </interface>
51750 -<interface name="corenet_tcp_connect_zope_port" lineno="100518">
51751 +<interface name="corenet_tcp_connect_zope_port" lineno="100641">
51752 <summary>
51753 Make a TCP connection to the zope port.
51754 </summary>
51755 @@ -72754,7 +72571,7 @@ Domain allowed access.
51756 </summary>
51757 </param>
51758 </interface>
51759 -<interface name="corenet_send_zope_client_packets" lineno="100538">
51760 +<interface name="corenet_send_zope_client_packets" lineno="100661">
51761 <summary>
51762 Send zope_client packets.
51763 </summary>
51764 @@ -72765,7 +72582,7 @@ Domain allowed access.
51765 </param>
51766 <infoflow type="write" weight="10"/>
51767 </interface>
51768 -<interface name="corenet_dontaudit_send_zope_client_packets" lineno="100557">
51769 +<interface name="corenet_dontaudit_send_zope_client_packets" lineno="100680">
51770 <summary>
51771 Do not audit attempts to send zope_client packets.
51772 </summary>
51773 @@ -72776,7 +72593,7 @@ Domain to not audit.
51774 </param>
51775 <infoflow type="none"/>
51776 </interface>
51777 -<interface name="corenet_receive_zope_client_packets" lineno="100576">
51778 +<interface name="corenet_receive_zope_client_packets" lineno="100699">
51779 <summary>
51780 Receive zope_client packets.
51781 </summary>
51782 @@ -72787,7 +72604,7 @@ Domain allowed access.
51783 </param>
51784 <infoflow type="read" weight="10"/>
51785 </interface>
51786 -<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="100595">
51787 +<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="100718">
51788 <summary>
51789 Do not audit attempts to receive zope_client packets.
51790 </summary>
51791 @@ -72798,7 +72615,7 @@ Domain allowed access.
51792 </param>
51793 <infoflow type="none"/>
51794 </interface>
51795 -<interface name="corenet_sendrecv_zope_client_packets" lineno="100614">
51796 +<interface name="corenet_sendrecv_zope_client_packets" lineno="100737">
51797 <summary>
51798 Send and receive zope_client packets.
51799 </summary>
51800 @@ -72809,7 +72626,7 @@ Domain allowed access.
51801 </param>
51802 <infoflow type="both" weight="10"/>
51803 </interface>
51804 -<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="100630">
51805 +<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="100753">
51806 <summary>
51807 Do not audit attempts to send and receive zope_client packets.
51808 </summary>
51809 @@ -72820,7 +72637,7 @@ Domain to not audit.
51810 </param>
51811 <infoflow type="none"/>
51812 </interface>
51813 -<interface name="corenet_relabelto_zope_client_packets" lineno="100645">
51814 +<interface name="corenet_relabelto_zope_client_packets" lineno="100768">
51815 <summary>
51816 Relabel packets to zope_client the packet type.
51817 </summary>
51818 @@ -72830,7 +72647,7 @@ Domain allowed access.
51819 </summary>
51820 </param>
51821 </interface>
51822 -<interface name="corenet_send_zope_server_packets" lineno="100665">
51823 +<interface name="corenet_send_zope_server_packets" lineno="100788">
51824 <summary>
51825 Send zope_server packets.
51826 </summary>
51827 @@ -72841,7 +72658,7 @@ Domain allowed access.
51828 </param>
51829 <infoflow type="write" weight="10"/>
51830 </interface>
51831 -<interface name="corenet_dontaudit_send_zope_server_packets" lineno="100684">
51832 +<interface name="corenet_dontaudit_send_zope_server_packets" lineno="100807">
51833 <summary>
51834 Do not audit attempts to send zope_server packets.
51835 </summary>
51836 @@ -72852,7 +72669,7 @@ Domain to not audit.
51837 </param>
51838 <infoflow type="none"/>
51839 </interface>
51840 -<interface name="corenet_receive_zope_server_packets" lineno="100703">
51841 +<interface name="corenet_receive_zope_server_packets" lineno="100826">
51842 <summary>
51843 Receive zope_server packets.
51844 </summary>
51845 @@ -72863,7 +72680,7 @@ Domain allowed access.
51846 </param>
51847 <infoflow type="read" weight="10"/>
51848 </interface>
51849 -<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="100722">
51850 +<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="100845">
51851 <summary>
51852 Do not audit attempts to receive zope_server packets.
51853 </summary>
51854 @@ -72874,7 +72691,7 @@ Domain allowed access.
51855 </param>
51856 <infoflow type="none"/>
51857 </interface>
51858 -<interface name="corenet_sendrecv_zope_server_packets" lineno="100741">
51859 +<interface name="corenet_sendrecv_zope_server_packets" lineno="100864">
51860 <summary>
51861 Send and receive zope_server packets.
51862 </summary>
51863 @@ -72885,7 +72702,7 @@ Domain allowed access.
51864 </param>
51865 <infoflow type="both" weight="10"/>
51866 </interface>
51867 -<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="100757">
51868 +<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="100880">
51869 <summary>
51870 Do not audit attempts to send and receive zope_server packets.
51871 </summary>
51872 @@ -72896,7 +72713,7 @@ Domain to not audit.
51873 </param>
51874 <infoflow type="none"/>
51875 </interface>
51876 -<interface name="corenet_relabelto_zope_server_packets" lineno="100772">
51877 +<interface name="corenet_relabelto_zope_server_packets" lineno="100895">
51878 <summary>
51879 Relabel packets to zope_server the packet type.
51880 </summary>
51881 @@ -72906,7 +72723,7 @@ Domain allowed access.
51882 </summary>
51883 </param>
51884 </interface>
51885 -<interface name="corenet_tcp_sendrecv_lo_if" lineno="100795">
51886 +<interface name="corenet_tcp_sendrecv_lo_if" lineno="100918">
51887 <summary>
51888 Send and receive TCP network traffic on the lo interface.
51889 </summary>
51890 @@ -72917,7 +72734,7 @@ Domain allowed access.
51891 </param>
51892 <infoflow type="both" weight="10"/>
51893 </interface>
51894 -<interface name="corenet_udp_send_lo_if" lineno="100814">
51895 +<interface name="corenet_udp_send_lo_if" lineno="100937">
51896 <summary>
51897 Send UDP network traffic on the lo interface.
51898 </summary>
51899 @@ -72928,7 +72745,7 @@ Domain allowed access.
51900 </param>
51901 <infoflow type="write" weight="10"/>
51902 </interface>
51903 -<interface name="corenet_udp_receive_lo_if" lineno="100833">
51904 +<interface name="corenet_udp_receive_lo_if" lineno="100956">
51905 <summary>
51906 Receive UDP network traffic on the lo interface.
51907 </summary>
51908 @@ -72939,7 +72756,7 @@ Domain allowed access.
51909 </param>
51910 <infoflow type="read" weight="10"/>
51911 </interface>
51912 -<interface name="corenet_udp_sendrecv_lo_if" lineno="100852">
51913 +<interface name="corenet_udp_sendrecv_lo_if" lineno="100975">
51914 <summary>
51915 Send and receive UDP network traffic on the lo interface.
51916 </summary>
51917 @@ -72950,7 +72767,7 @@ Domain allowed access.
51918 </param>
51919 <infoflow type="both" weight="10"/>
51920 </interface>
51921 -<interface name="corenet_raw_send_lo_if" lineno="100868">
51922 +<interface name="corenet_raw_send_lo_if" lineno="100991">
51923 <summary>
51924 Send raw IP packets on the lo interface.
51925 </summary>
51926 @@ -72961,7 +72778,7 @@ Domain allowed access.
51927 </param>
51928 <infoflow type="write" weight="10"/>
51929 </interface>
51930 -<interface name="corenet_raw_receive_lo_if" lineno="100887">
51931 +<interface name="corenet_raw_receive_lo_if" lineno="101010">
51932 <summary>
51933 Receive raw IP packets on the lo interface.
51934 </summary>
51935 @@ -72972,7 +72789,7 @@ Domain allowed access.
51936 </param>
51937 <infoflow type="read" weight="10"/>
51938 </interface>
51939 -<interface name="corenet_raw_sendrecv_lo_if" lineno="100906">
51940 +<interface name="corenet_raw_sendrecv_lo_if" lineno="101029">
51941 <summary>
51942 Send and receive raw IP packets on the lo interface.
51943 </summary>
51944 @@ -74220,7 +74037,27 @@ Domain allowed access.
51945 </summary>
51946 </param>
51947 </interface>
51948 -<interface name="dev_getattr_framebuffer_dev" lineno="2200">
51949 +<interface name="dev_ioctl_input_dev" lineno="2200">
51950 +<summary>
51951 +IOCTL the input event devices (/dev/input).
51952 +</summary>
51953 +<param name="domain">
51954 +<summary>
51955 +Domain allowed access.
51956 +</summary>
51957 +</param>
51958 +</interface>
51959 +<interface name="dev_rw_ipmi_dev" lineno="2218">
51960 +<summary>
51961 +Read and write ipmi devices (/dev/ipmi*).
51962 +</summary>
51963 +<param name="domain">
51964 +<summary>
51965 +Domain allowed access.
51966 +</summary>
51967 +</param>
51968 +</interface>
51969 +<interface name="dev_getattr_framebuffer_dev" lineno="2236">
51970 <summary>
51971 Get the attributes of the framebuffer device node.
51972 </summary>
51973 @@ -74230,7 +74067,7 @@ Domain allowed access.
51974 </summary>
51975 </param>
51976 </interface>
51977 -<interface name="dev_setattr_framebuffer_dev" lineno="2218">
51978 +<interface name="dev_setattr_framebuffer_dev" lineno="2254">
51979 <summary>
51980 Set the attributes of the framebuffer device node.
51981 </summary>
51982 @@ -74240,7 +74077,7 @@ Domain allowed access.
51983 </summary>
51984 </param>
51985 </interface>
51986 -<interface name="dev_dontaudit_setattr_framebuffer_dev" lineno="2237">
51987 +<interface name="dev_dontaudit_setattr_framebuffer_dev" lineno="2273">
51988 <summary>
51989 Dot not audit attempts to set the attributes
51990 of the framebuffer device node.
51991 @@ -74251,7 +74088,7 @@ Domain to not audit.
51992 </summary>
51993 </param>
51994 </interface>
51995 -<interface name="dev_read_framebuffer" lineno="2255">
51996 +<interface name="dev_read_framebuffer" lineno="2291">
51997 <summary>
51998 Read the framebuffer.
51999 </summary>
52000 @@ -74261,7 +74098,7 @@ Domain allowed access.
52001 </summary>
52002 </param>
52003 </interface>
52004 -<interface name="dev_dontaudit_read_framebuffer" lineno="2273">
52005 +<interface name="dev_dontaudit_read_framebuffer" lineno="2309">
52006 <summary>
52007 Do not audit attempts to read the framebuffer.
52008 </summary>
52009 @@ -74271,7 +74108,7 @@ Domain to not audit.
52010 </summary>
52011 </param>
52012 </interface>
52013 -<interface name="dev_write_framebuffer" lineno="2291">
52014 +<interface name="dev_write_framebuffer" lineno="2327">
52015 <summary>
52016 Write the framebuffer.
52017 </summary>
52018 @@ -74281,7 +74118,7 @@ Domain allowed access.
52019 </summary>
52020 </param>
52021 </interface>
52022 -<interface name="dev_rw_framebuffer" lineno="2309">
52023 +<interface name="dev_rw_framebuffer" lineno="2345">
52024 <summary>
52025 Read and write the framebuffer.
52026 </summary>
52027 @@ -74291,7 +74128,7 @@ Domain allowed access.
52028 </summary>
52029 </param>
52030 </interface>
52031 -<interface name="dev_read_kmsg" lineno="2327">
52032 +<interface name="dev_read_kmsg" lineno="2363">
52033 <summary>
52034 Read the kernel messages
52035 </summary>
52036 @@ -74301,7 +74138,7 @@ Domain allowed access.
52037 </summary>
52038 </param>
52039 </interface>
52040 -<interface name="dev_dontaudit_read_kmsg" lineno="2345">
52041 +<interface name="dev_dontaudit_read_kmsg" lineno="2381">
52042 <summary>
52043 Do not audit attempts to read the kernel messages
52044 </summary>
52045 @@ -74311,7 +74148,7 @@ Domain to not audit.
52046 </summary>
52047 </param>
52048 </interface>
52049 -<interface name="dev_write_kmsg" lineno="2363">
52050 +<interface name="dev_write_kmsg" lineno="2399">
52051 <summary>
52052 Write to the kernel messages device
52053 </summary>
52054 @@ -74321,7 +74158,7 @@ Domain allowed access.
52055 </summary>
52056 </param>
52057 </interface>
52058 -<interface name="dev_rw_kmsg" lineno="2381">
52059 +<interface name="dev_rw_kmsg" lineno="2417">
52060 <summary>
52061 Read and write to the kernel messages device
52062 </summary>
52063 @@ -74331,7 +74168,7 @@ Domain allowed access.
52064 </summary>
52065 </param>
52066 </interface>
52067 -<interface name="dev_mounton_kmsg" lineno="2399">
52068 +<interface name="dev_mounton_kmsg" lineno="2435">
52069 <summary>
52070 Mount on the kernel messages device
52071 </summary>
52072 @@ -74341,7 +74178,7 @@ Domain allowed access.
52073 </summary>
52074 </param>
52075 </interface>
52076 -<interface name="dev_getattr_ksm_dev" lineno="2417">
52077 +<interface name="dev_getattr_ksm_dev" lineno="2453">
52078 <summary>
52079 Get the attributes of the ksm devices.
52080 </summary>
52081 @@ -74351,7 +74188,7 @@ Domain allowed access.
52082 </summary>
52083 </param>
52084 </interface>
52085 -<interface name="dev_setattr_ksm_dev" lineno="2435">
52086 +<interface name="dev_setattr_ksm_dev" lineno="2471">
52087 <summary>
52088 Set the attributes of the ksm devices.
52089 </summary>
52090 @@ -74361,7 +74198,7 @@ Domain allowed access.
52091 </summary>
52092 </param>
52093 </interface>
52094 -<interface name="dev_read_ksm" lineno="2453">
52095 +<interface name="dev_read_ksm" lineno="2489">
52096 <summary>
52097 Read the ksm devices.
52098 </summary>
52099 @@ -74371,7 +74208,7 @@ Domain allowed access.
52100 </summary>
52101 </param>
52102 </interface>
52103 -<interface name="dev_rw_ksm" lineno="2471">
52104 +<interface name="dev_rw_ksm" lineno="2507">
52105 <summary>
52106 Read and write to ksm devices.
52107 </summary>
52108 @@ -74381,7 +74218,7 @@ Domain allowed access.
52109 </summary>
52110 </param>
52111 </interface>
52112 -<interface name="dev_getattr_kvm_dev" lineno="2489">
52113 +<interface name="dev_getattr_kvm_dev" lineno="2525">
52114 <summary>
52115 Get the attributes of the kvm devices.
52116 </summary>
52117 @@ -74391,7 +74228,7 @@ Domain allowed access.
52118 </summary>
52119 </param>
52120 </interface>
52121 -<interface name="dev_setattr_kvm_dev" lineno="2507">
52122 +<interface name="dev_setattr_kvm_dev" lineno="2543">
52123 <summary>
52124 Set the attributes of the kvm devices.
52125 </summary>
52126 @@ -74401,7 +74238,7 @@ Domain allowed access.
52127 </summary>
52128 </param>
52129 </interface>
52130 -<interface name="dev_read_kvm" lineno="2525">
52131 +<interface name="dev_read_kvm" lineno="2561">
52132 <summary>
52133 Read the kvm devices.
52134 </summary>
52135 @@ -74411,7 +74248,7 @@ Domain allowed access.
52136 </summary>
52137 </param>
52138 </interface>
52139 -<interface name="dev_rw_kvm" lineno="2543">
52140 +<interface name="dev_rw_kvm" lineno="2579">
52141 <summary>
52142 Read and write to kvm devices.
52143 </summary>
52144 @@ -74421,7 +74258,7 @@ Domain allowed access.
52145 </summary>
52146 </param>
52147 </interface>
52148 -<interface name="dev_read_lirc" lineno="2561">
52149 +<interface name="dev_read_lirc" lineno="2597">
52150 <summary>
52151 Read the lirc device.
52152 </summary>
52153 @@ -74431,7 +74268,7 @@ Domain allowed access.
52154 </summary>
52155 </param>
52156 </interface>
52157 -<interface name="dev_rw_lirc" lineno="2579">
52158 +<interface name="dev_rw_lirc" lineno="2615">
52159 <summary>
52160 Read and write the lirc device.
52161 </summary>
52162 @@ -74441,7 +74278,7 @@ Domain allowed access.
52163 </summary>
52164 </param>
52165 </interface>
52166 -<interface name="dev_filetrans_lirc" lineno="2603">
52167 +<interface name="dev_filetrans_lirc" lineno="2639">
52168 <summary>
52169 Automatic type transition to the type
52170 for lirc device nodes when created in /dev.
52171 @@ -74457,7 +74294,7 @@ The name of the object being created.
52172 </summary>
52173 </param>
52174 </interface>
52175 -<interface name="dev_rw_loop_control" lineno="2621">
52176 +<interface name="dev_rw_loop_control" lineno="2657">
52177 <summary>
52178 Read and write the loop-control device.
52179 </summary>
52180 @@ -74467,7 +74304,7 @@ Domain allowed access.
52181 </summary>
52182 </param>
52183 </interface>
52184 -<interface name="dev_getattr_lvm_control" lineno="2639">
52185 +<interface name="dev_getattr_lvm_control" lineno="2675">
52186 <summary>
52187 Get the attributes of the lvm comtrol device.
52188 </summary>
52189 @@ -74477,7 +74314,7 @@ Domain allowed access.
52190 </summary>
52191 </param>
52192 </interface>
52193 -<interface name="dev_read_lvm_control" lineno="2657">
52194 +<interface name="dev_read_lvm_control" lineno="2693">
52195 <summary>
52196 Read the lvm comtrol device.
52197 </summary>
52198 @@ -74487,7 +74324,7 @@ Domain allowed access.
52199 </summary>
52200 </param>
52201 </interface>
52202 -<interface name="dev_rw_lvm_control" lineno="2675">
52203 +<interface name="dev_rw_lvm_control" lineno="2711">
52204 <summary>
52205 Read and write the lvm control device.
52206 </summary>
52207 @@ -74497,7 +74334,7 @@ Domain allowed access.
52208 </summary>
52209 </param>
52210 </interface>
52211 -<interface name="dev_dontaudit_rw_lvm_control" lineno="2693">
52212 +<interface name="dev_dontaudit_rw_lvm_control" lineno="2729">
52213 <summary>
52214 Do not audit attempts to read and write lvm control device.
52215 </summary>
52216 @@ -74507,7 +74344,7 @@ Domain to not audit.
52217 </summary>
52218 </param>
52219 </interface>
52220 -<interface name="dev_delete_lvm_control_dev" lineno="2711">
52221 +<interface name="dev_delete_lvm_control_dev" lineno="2747">
52222 <summary>
52223 Delete the lvm control device.
52224 </summary>
52225 @@ -74517,7 +74354,7 @@ Domain allowed access.
52226 </summary>
52227 </param>
52228 </interface>
52229 -<interface name="dev_dontaudit_getattr_memory_dev" lineno="2729">
52230 +<interface name="dev_dontaudit_getattr_memory_dev" lineno="2765">
52231 <summary>
52232 dontaudit getattr raw memory devices (e.g. /dev/mem).
52233 </summary>
52234 @@ -74527,9 +74364,12 @@ Domain to not audit.
52235 </summary>
52236 </param>
52237 </interface>
52238 -<interface name="dev_read_raw_memory" lineno="2747">
52239 +<interface name="dev_read_raw_memory" lineno="2786">
52240 <summary>
52241 Read raw memory devices (e.g. /dev/mem).
52242 +This is extremely dangerous as it can bypass the
52243 +SELinux protections, and should only be used by trusted
52244 +domains.
52245 </summary>
52246 <param name="domain">
52247 <summary>
52248 @@ -74537,10 +74377,31 @@ Domain allowed access.
52249 </summary>
52250 </param>
52251 </interface>
52252 -<interface name="dev_dontaudit_read_raw_memory" lineno="2770">
52253 +<interface name="dev_read_raw_memory_cond" lineno="2816">
52254 +<summary>
52255 +Read raw memory devices (e.g. /dev/mem) if a tunable is set.
52256 +This is extremely dangerous as it can bypass the
52257 +SELinux protections, and should only be used by trusted
52258 +domains.
52259 +</summary>
52260 +<param name="domain">
52261 +<summary>
52262 +Domain allowed access.
52263 +</summary>
52264 +</param>
52265 +<param name="tunable">
52266 +<summary>
52267 +Tunable to depend on
52268 +</summary>
52269 +</param>
52270 +</interface>
52271 +<interface name="dev_dontaudit_read_raw_memory" lineno="2843">
52272 <summary>
52273 Do not audit attempts to read raw memory devices
52274 (e.g. /dev/mem).
52275 +This is extremely dangerous as it can bypass the
52276 +SELinux protections, and should only be used by trusted
52277 +domains.
52278 </summary>
52279 <param name="domain">
52280 <summary>
52281 @@ -74548,9 +74409,12 @@ Domain to not audit.
52282 </summary>
52283 </param>
52284 </interface>
52285 -<interface name="dev_write_raw_memory" lineno="2788">
52286 +<interface name="dev_write_raw_memory" lineno="2864">
52287 <summary>
52288 Write raw memory devices (e.g. /dev/mem).
52289 +This is extremely dangerous as it can bypass the
52290 +SELinux protections, and should only be used by trusted
52291 +domains.
52292 </summary>
52293 <param name="domain">
52294 <summary>
52295 @@ -74558,9 +74422,30 @@ Domain allowed access.
52296 </summary>
52297 </param>
52298 </interface>
52299 -<interface name="dev_rx_raw_memory" lineno="2810">
52300 +<interface name="dev_write_raw_memory_cond" lineno="2894">
52301 +<summary>
52302 +Write raw memory devices (e.g. /dev/mem) if a tunable is set.
52303 +This is extremely dangerous as it can bypass the
52304 +SELinux protections, and should only be used by trusted
52305 +domains.
52306 +</summary>
52307 +<param name="domain">
52308 +<summary>
52309 +Domain allowed access.
52310 +</summary>
52311 +</param>
52312 +<param name="tunable">
52313 +<summary>
52314 +Tunable to depend on
52315 +</summary>
52316 +</param>
52317 +</interface>
52318 +<interface name="dev_rx_raw_memory" lineno="2920">
52319 <summary>
52320 Read and execute raw memory devices (e.g. /dev/mem).
52321 +This is extremely dangerous as it can bypass the
52322 +SELinux protections, and should only be used by trusted
52323 +domains.
52324 </summary>
52325 <param name="domain">
52326 <summary>
52327 @@ -74568,9 +74453,12 @@ Domain allowed access.
52328 </summary>
52329 </param>
52330 </interface>
52331 -<interface name="dev_wx_raw_memory" lineno="2829">
52332 +<interface name="dev_wx_raw_memory" lineno="2942">
52333 <summary>
52334 Write and execute raw memory devices (e.g. /dev/mem).
52335 +This is extremely dangerous as it can bypass the
52336 +SELinux protections, and should only be used by trusted
52337 +domains.
52338 </summary>
52339 <param name="domain">
52340 <summary>
52341 @@ -74578,7 +74466,25 @@ Domain allowed access.
52342 </summary>
52343 </param>
52344 </interface>
52345 -<interface name="dev_getattr_misc_dev" lineno="2848">
52346 +<interface name="dev_wx_raw_memory_cond" lineno="2969">
52347 +<summary>
52348 +Write and execute raw memory devices (e.g. /dev/mem) if a tunable is set.
52349 +This is extremely dangerous as it can bypass the
52350 +SELinux protections, and should only be used by trusted
52351 +domains.
52352 +</summary>
52353 +<param name="domain">
52354 +<summary>
52355 +Domain allowed access.
52356 +</summary>
52357 +</param>
52358 +<param name="tunable">
52359 +<summary>
52360 +Tunable to depend on
52361 +</summary>
52362 +</param>
52363 +</interface>
52364 +<interface name="dev_getattr_misc_dev" lineno="2992">
52365 <summary>
52366 Get the attributes of miscellaneous devices.
52367 </summary>
52368 @@ -74588,7 +74494,7 @@ Domain allowed access.
52369 </summary>
52370 </param>
52371 </interface>
52372 -<interface name="dev_dontaudit_getattr_misc_dev" lineno="2867">
52373 +<interface name="dev_dontaudit_getattr_misc_dev" lineno="3011">
52374 <summary>
52375 Do not audit attempts to get the attributes
52376 of miscellaneous devices.
52377 @@ -74599,7 +74505,7 @@ Domain to not audit.
52378 </summary>
52379 </param>
52380 </interface>
52381 -<interface name="dev_setattr_misc_dev" lineno="2885">
52382 +<interface name="dev_setattr_misc_dev" lineno="3029">
52383 <summary>
52384 Set the attributes of miscellaneous devices.
52385 </summary>
52386 @@ -74609,7 +74515,7 @@ Domain allowed access.
52387 </summary>
52388 </param>
52389 </interface>
52390 -<interface name="dev_dontaudit_setattr_misc_dev" lineno="2904">
52391 +<interface name="dev_dontaudit_setattr_misc_dev" lineno="3048">
52392 <summary>
52393 Do not audit attempts to set the attributes
52394 of miscellaneous devices.
52395 @@ -74620,7 +74526,7 @@ Domain to not audit.
52396 </summary>
52397 </param>
52398 </interface>
52399 -<interface name="dev_read_misc" lineno="2922">
52400 +<interface name="dev_read_misc" lineno="3066">
52401 <summary>
52402 Read miscellaneous devices.
52403 </summary>
52404 @@ -74630,7 +74536,7 @@ Domain allowed access.
52405 </summary>
52406 </param>
52407 </interface>
52408 -<interface name="dev_write_misc" lineno="2940">
52409 +<interface name="dev_write_misc" lineno="3084">
52410 <summary>
52411 Write miscellaneous devices.
52412 </summary>
52413 @@ -74640,7 +74546,7 @@ Domain allowed access.
52414 </summary>
52415 </param>
52416 </interface>
52417 -<interface name="dev_dontaudit_rw_misc" lineno="2958">
52418 +<interface name="dev_dontaudit_rw_misc" lineno="3102">
52419 <summary>
52420 Do not audit attempts to read and write miscellaneous devices.
52421 </summary>
52422 @@ -74650,7 +74556,7 @@ Domain allowed access.
52423 </summary>
52424 </param>
52425 </interface>
52426 -<interface name="dev_getattr_modem_dev" lineno="2976">
52427 +<interface name="dev_getattr_modem_dev" lineno="3120">
52428 <summary>
52429 Get the attributes of the modem devices.
52430 </summary>
52431 @@ -74660,7 +74566,7 @@ Domain allowed access.
52432 </summary>
52433 </param>
52434 </interface>
52435 -<interface name="dev_setattr_modem_dev" lineno="2994">
52436 +<interface name="dev_setattr_modem_dev" lineno="3138">
52437 <summary>
52438 Set the attributes of the modem devices.
52439 </summary>
52440 @@ -74670,7 +74576,7 @@ Domain allowed access.
52441 </summary>
52442 </param>
52443 </interface>
52444 -<interface name="dev_read_modem" lineno="3012">
52445 +<interface name="dev_read_modem" lineno="3156">
52446 <summary>
52447 Read the modem devices.
52448 </summary>
52449 @@ -74680,7 +74586,7 @@ Domain allowed access.
52450 </summary>
52451 </param>
52452 </interface>
52453 -<interface name="dev_rw_modem" lineno="3030">
52454 +<interface name="dev_rw_modem" lineno="3174">
52455 <summary>
52456 Read and write to modem devices.
52457 </summary>
52458 @@ -74690,7 +74596,7 @@ Domain allowed access.
52459 </summary>
52460 </param>
52461 </interface>
52462 -<interface name="dev_getattr_mouse_dev" lineno="3048">
52463 +<interface name="dev_getattr_mouse_dev" lineno="3192">
52464 <summary>
52465 Get the attributes of the mouse devices.
52466 </summary>
52467 @@ -74700,7 +74606,7 @@ Domain allowed access.
52468 </summary>
52469 </param>
52470 </interface>
52471 -<interface name="dev_setattr_mouse_dev" lineno="3066">
52472 +<interface name="dev_setattr_mouse_dev" lineno="3210">
52473 <summary>
52474 Set the attributes of the mouse devices.
52475 </summary>
52476 @@ -74710,7 +74616,7 @@ Domain allowed access.
52477 </summary>
52478 </param>
52479 </interface>
52480 -<interface name="dev_read_mouse" lineno="3084">
52481 +<interface name="dev_read_mouse" lineno="3228">
52482 <summary>
52483 Read the mouse devices.
52484 </summary>
52485 @@ -74720,7 +74626,7 @@ Domain allowed access.
52486 </summary>
52487 </param>
52488 </interface>
52489 -<interface name="dev_rw_mouse" lineno="3102">
52490 +<interface name="dev_rw_mouse" lineno="3246">
52491 <summary>
52492 Read and write to mouse devices.
52493 </summary>
52494 @@ -74730,7 +74636,7 @@ Domain allowed access.
52495 </summary>
52496 </param>
52497 </interface>
52498 -<interface name="dev_getattr_mtrr_dev" lineno="3121">
52499 +<interface name="dev_getattr_mtrr_dev" lineno="3265">
52500 <summary>
52501 Get the attributes of the memory type range
52502 registers (MTRR) device.
52503 @@ -74741,7 +74647,7 @@ Domain allowed access.
52504 </summary>
52505 </param>
52506 </interface>
52507 -<interface name="dev_dontaudit_write_mtrr" lineno="3141">
52508 +<interface name="dev_dontaudit_write_mtrr" lineno="3285">
52509 <summary>
52510 Do not audit attempts to write the memory type
52511 range registers (MTRR).
52512 @@ -74752,7 +74658,7 @@ Domain to not audit.
52513 </summary>
52514 </param>
52515 </interface>
52516 -<interface name="dev_rw_mtrr" lineno="3160">
52517 +<interface name="dev_rw_mtrr" lineno="3304">
52518 <summary>
52519 Read and write the memory type range registers (MTRR).
52520 </summary>
52521 @@ -74762,7 +74668,7 @@ Domain allowed access.
52522 </summary>
52523 </param>
52524 </interface>
52525 -<interface name="dev_getattr_netcontrol_dev" lineno="3179">
52526 +<interface name="dev_getattr_netcontrol_dev" lineno="3323">
52527 <summary>
52528 Get the attributes of the network control device (Deprecated)
52529 </summary>
52530 @@ -74772,7 +74678,7 @@ Domain allowed access.
52531 </summary>
52532 </param>
52533 </interface>
52534 -<interface name="dev_read_netcontrol" lineno="3194">
52535 +<interface name="dev_read_netcontrol" lineno="3338">
52536 <summary>
52537 Read the network control identity. (Deprecated)
52538 </summary>
52539 @@ -74782,7 +74688,7 @@ Domain allowed access.
52540 </summary>
52541 </param>
52542 </interface>
52543 -<interface name="dev_rw_netcontrol" lineno="3209">
52544 +<interface name="dev_rw_netcontrol" lineno="3353">
52545 <summary>
52546 Read and write the the network control device. (Deprecated)
52547 </summary>
52548 @@ -74792,7 +74698,7 @@ Domain allowed access.
52549 </summary>
52550 </param>
52551 </interface>
52552 -<interface name="dev_getattr_null_dev" lineno="3224">
52553 +<interface name="dev_getattr_null_dev" lineno="3368">
52554 <summary>
52555 Get the attributes of the null device nodes.
52556 </summary>
52557 @@ -74802,7 +74708,7 @@ Domain allowed access.
52558 </summary>
52559 </param>
52560 </interface>
52561 -<interface name="dev_setattr_null_dev" lineno="3242">
52562 +<interface name="dev_setattr_null_dev" lineno="3386">
52563 <summary>
52564 Set the attributes of the null device nodes.
52565 </summary>
52566 @@ -74812,7 +74718,7 @@ Domain allowed access.
52567 </summary>
52568 </param>
52569 </interface>
52570 -<interface name="dev_delete_null" lineno="3260">
52571 +<interface name="dev_delete_null" lineno="3404">
52572 <summary>
52573 Delete the null device (/dev/null).
52574 </summary>
52575 @@ -74822,7 +74728,7 @@ Domain allowed access.
52576 </summary>
52577 </param>
52578 </interface>
52579 -<interface name="dev_rw_null" lineno="3278">
52580 +<interface name="dev_rw_null" lineno="3422">
52581 <summary>
52582 Read and write to the null device (/dev/null).
52583 </summary>
52584 @@ -74832,7 +74738,7 @@ Domain allowed access.
52585 </summary>
52586 </param>
52587 </interface>
52588 -<interface name="dev_create_null_dev" lineno="3296">
52589 +<interface name="dev_create_null_dev" lineno="3440">
52590 <summary>
52591 Create the null device (/dev/null).
52592 </summary>
52593 @@ -74842,7 +74748,7 @@ Domain allowed access.
52594 </summary>
52595 </param>
52596 </interface>
52597 -<interface name="dev_manage_null_service" lineno="3315">
52598 +<interface name="dev_manage_null_service" lineno="3459">
52599 <summary>
52600 Manage services with script type null_device_t for when
52601 /lib/systemd/system/something.service is a link to /dev/null
52602 @@ -74853,7 +74759,7 @@ Domain allowed access.
52603 </summary>
52604 </param>
52605 </interface>
52606 -<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3335">
52607 +<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3479">
52608 <summary>
52609 Do not audit attempts to get the attributes
52610 of the BIOS non-volatile RAM device.
52611 @@ -74864,7 +74770,7 @@ Domain to not audit.
52612 </summary>
52613 </param>
52614 </interface>
52615 -<interface name="dev_rw_nvram" lineno="3353">
52616 +<interface name="dev_rw_nvram" lineno="3497">
52617 <summary>
52618 Read and write BIOS non-volatile RAM.
52619 </summary>
52620 @@ -74874,7 +74780,7 @@ Domain allowed access.
52621 </summary>
52622 </param>
52623 </interface>
52624 -<interface name="dev_getattr_printer_dev" lineno="3371">
52625 +<interface name="dev_getattr_printer_dev" lineno="3515">
52626 <summary>
52627 Get the attributes of the printer device nodes.
52628 </summary>
52629 @@ -74884,7 +74790,7 @@ Domain allowed access.
52630 </summary>
52631 </param>
52632 </interface>
52633 -<interface name="dev_setattr_printer_dev" lineno="3389">
52634 +<interface name="dev_setattr_printer_dev" lineno="3533">
52635 <summary>
52636 Set the attributes of the printer device nodes.
52637 </summary>
52638 @@ -74894,7 +74800,7 @@ Domain allowed access.
52639 </summary>
52640 </param>
52641 </interface>
52642 -<interface name="dev_append_printer" lineno="3408">
52643 +<interface name="dev_append_printer" lineno="3552">
52644 <summary>
52645 Append the printer device.
52646 </summary>
52647 @@ -74904,7 +74810,7 @@ Domain allowed access.
52648 </summary>
52649 </param>
52650 </interface>
52651 -<interface name="dev_rw_printer" lineno="3426">
52652 +<interface name="dev_rw_printer" lineno="3570">
52653 <summary>
52654 Read and write the printer device.
52655 </summary>
52656 @@ -74914,7 +74820,7 @@ Domain allowed access.
52657 </summary>
52658 </param>
52659 </interface>
52660 -<interface name="dev_getattr_pmqos_dev" lineno="3444">
52661 +<interface name="dev_getattr_pmqos_dev" lineno="3588">
52662 <summary>
52663 Get the attributes of PM QoS devices
52664 </summary>
52665 @@ -74924,7 +74830,7 @@ Domain allowed access.
52666 </summary>
52667 </param>
52668 </interface>
52669 -<interface name="dev_read_pmqos" lineno="3462">
52670 +<interface name="dev_read_pmqos" lineno="3606">
52671 <summary>
52672 Read the PM QoS devices.
52673 </summary>
52674 @@ -74934,7 +74840,7 @@ Domain allowed access.
52675 </summary>
52676 </param>
52677 </interface>
52678 -<interface name="dev_rw_pmqos" lineno="3480">
52679 +<interface name="dev_rw_pmqos" lineno="3624">
52680 <summary>
52681 Read and write the the PM QoS devices.
52682 </summary>
52683 @@ -74944,17 +74850,7 @@ Domain allowed access.
52684 </summary>
52685 </param>
52686 </interface>
52687 -<interface name="dev_read_printk" lineno="3498">
52688 -<summary>
52689 -Read printk devices (e.g., /dev/kmsg /dev/mcelog)
52690 -</summary>
52691 -<param name="domain" unused="true">
52692 -<summary>
52693 -Domain allowed access.
52694 -</summary>
52695 -</param>
52696 -</interface>
52697 -<interface name="dev_getattr_qemu_dev" lineno="3513">
52698 +<interface name="dev_getattr_qemu_dev" lineno="3643">
52699 <summary>
52700 Get the attributes of the QEMU
52701 microcode and id interfaces.
52702 @@ -74965,7 +74861,7 @@ Domain allowed access.
52703 </summary>
52704 </param>
52705 </interface>
52706 -<interface name="dev_setattr_qemu_dev" lineno="3532">
52707 +<interface name="dev_setattr_qemu_dev" lineno="3662">
52708 <summary>
52709 Set the attributes of the QEMU
52710 microcode and id interfaces.
52711 @@ -74976,7 +74872,7 @@ Domain allowed access.
52712 </summary>
52713 </param>
52714 </interface>
52715 -<interface name="dev_read_qemu" lineno="3550">
52716 +<interface name="dev_read_qemu" lineno="3680">
52717 <summary>
52718 Read the QEMU device
52719 </summary>
52720 @@ -74986,7 +74882,7 @@ Domain allowed access.
52721 </summary>
52722 </param>
52723 </interface>
52724 -<interface name="dev_rw_qemu" lineno="3568">
52725 +<interface name="dev_rw_qemu" lineno="3698">
52726 <summary>
52727 Read and write the the QEMU device.
52728 </summary>
52729 @@ -74996,7 +74892,7 @@ Domain allowed access.
52730 </summary>
52731 </param>
52732 </interface>
52733 -<interface name="dev_read_rand" lineno="3602">
52734 +<interface name="dev_read_rand" lineno="3732">
52735 <summary>
52736 Read from random number generator
52737 devices (e.g., /dev/random).
52738 @@ -75022,7 +74918,7 @@ Domain allowed access.
52739 </param>
52740 <infoflow type="read" weight="10"/>
52741 </interface>
52742 -<interface name="dev_dontaudit_read_rand" lineno="3621">
52743 +<interface name="dev_dontaudit_read_rand" lineno="3751">
52744 <summary>
52745 Do not audit attempts to read from random
52746 number generator devices (e.g., /dev/random)
52747 @@ -75033,7 +74929,7 @@ Domain to not audit.
52748 </summary>
52749 </param>
52750 </interface>
52751 -<interface name="dev_dontaudit_append_rand" lineno="3640">
52752 +<interface name="dev_dontaudit_append_rand" lineno="3770">
52753 <summary>
52754 Do not audit attempts to append to random
52755 number generator devices (e.g., /dev/random)
52756 @@ -75044,7 +74940,7 @@ Domain to not audit.
52757 </summary>
52758 </param>
52759 </interface>
52760 -<interface name="dev_write_rand" lineno="3660">
52761 +<interface name="dev_write_rand" lineno="3790">
52762 <summary>
52763 Write to the random device (e.g., /dev/random). This adds
52764 entropy used to generate the random data read from the
52765 @@ -75056,7 +74952,17 @@ Domain allowed access.
52766 </summary>
52767 </param>
52768 </interface>
52769 -<interface name="dev_read_realtime_clock" lineno="3678">
52770 +<interface name="dev_create_rand_dev" lineno="3808">
52771 +<summary>
52772 +Create the random device (/dev/random).
52773 +</summary>
52774 +<param name="domain">
52775 +<summary>
52776 +Domain allowed access.
52777 +</summary>
52778 +</param>
52779 +</interface>
52780 +<interface name="dev_read_realtime_clock" lineno="3826">
52781 <summary>
52782 Read the realtime clock (/dev/rtc).
52783 </summary>
52784 @@ -75066,7 +74972,7 @@ Domain allowed access.
52785 </summary>
52786 </param>
52787 </interface>
52788 -<interface name="dev_write_realtime_clock" lineno="3696">
52789 +<interface name="dev_write_realtime_clock" lineno="3844">
52790 <summary>
52791 Set the realtime clock (/dev/rtc).
52792 </summary>
52793 @@ -75076,7 +74982,7 @@ Domain allowed access.
52794 </summary>
52795 </param>
52796 </interface>
52797 -<interface name="dev_rw_realtime_clock" lineno="3716">
52798 +<interface name="dev_rw_realtime_clock" lineno="3864">
52799 <summary>
52800 Read and set the realtime clock (/dev/rtc).
52801 </summary>
52802 @@ -75086,7 +74992,7 @@ Domain allowed access.
52803 </summary>
52804 </param>
52805 </interface>
52806 -<interface name="dev_getattr_scanner_dev" lineno="3731">
52807 +<interface name="dev_getattr_scanner_dev" lineno="3879">
52808 <summary>
52809 Get the attributes of the scanner device.
52810 </summary>
52811 @@ -75096,7 +75002,7 @@ Domain allowed access.
52812 </summary>
52813 </param>
52814 </interface>
52815 -<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3750">
52816 +<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3898">
52817 <summary>
52818 Do not audit attempts to get the attributes of
52819 the scanner device.
52820 @@ -75107,7 +75013,7 @@ Domain to not audit.
52821 </summary>
52822 </param>
52823 </interface>
52824 -<interface name="dev_setattr_scanner_dev" lineno="3768">
52825 +<interface name="dev_setattr_scanner_dev" lineno="3916">
52826 <summary>
52827 Set the attributes of the scanner device.
52828 </summary>
52829 @@ -75117,7 +75023,7 @@ Domain allowed access.
52830 </summary>
52831 </param>
52832 </interface>
52833 -<interface name="dev_dontaudit_setattr_scanner_dev" lineno="3787">
52834 +<interface name="dev_dontaudit_setattr_scanner_dev" lineno="3935">
52835 <summary>
52836 Do not audit attempts to set the attributes of
52837 the scanner device.
52838 @@ -75128,7 +75034,7 @@ Domain to not audit.
52839 </summary>
52840 </param>
52841 </interface>
52842 -<interface name="dev_rw_scanner" lineno="3805">
52843 +<interface name="dev_rw_scanner" lineno="3953">
52844 <summary>
52845 Read and write the scanner device.
52846 </summary>
52847 @@ -75138,7 +75044,7 @@ Domain allowed access.
52848 </summary>
52849 </param>
52850 </interface>
52851 -<interface name="dev_getattr_sound_dev" lineno="3823">
52852 +<interface name="dev_getattr_sound_dev" lineno="3971">
52853 <summary>
52854 Get the attributes of the sound devices.
52855 </summary>
52856 @@ -75148,7 +75054,7 @@ Domain allowed access.
52857 </summary>
52858 </param>
52859 </interface>
52860 -<interface name="dev_setattr_sound_dev" lineno="3841">
52861 +<interface name="dev_setattr_sound_dev" lineno="3989">
52862 <summary>
52863 Set the attributes of the sound devices.
52864 </summary>
52865 @@ -75158,7 +75064,7 @@ Domain allowed access.
52866 </summary>
52867 </param>
52868 </interface>
52869 -<interface name="dev_read_sound" lineno="3859">
52870 +<interface name="dev_read_sound" lineno="4007">
52871 <summary>
52872 Read the sound devices.
52873 </summary>
52874 @@ -75168,7 +75074,7 @@ Domain allowed access.
52875 </summary>
52876 </param>
52877 </interface>
52878 -<interface name="dev_write_sound" lineno="3878">
52879 +<interface name="dev_write_sound" lineno="4026">
52880 <summary>
52881 Write the sound devices.
52882 </summary>
52883 @@ -75178,7 +75084,7 @@ Domain allowed access.
52884 </summary>
52885 </param>
52886 </interface>
52887 -<interface name="dev_read_sound_mixer" lineno="3897">
52888 +<interface name="dev_read_sound_mixer" lineno="4045">
52889 <summary>
52890 Read the sound mixer devices.
52891 </summary>
52892 @@ -75188,7 +75094,7 @@ Domain allowed access.
52893 </summary>
52894 </param>
52895 </interface>
52896 -<interface name="dev_write_sound_mixer" lineno="3916">
52897 +<interface name="dev_write_sound_mixer" lineno="4064">
52898 <summary>
52899 Write the sound mixer devices.
52900 </summary>
52901 @@ -75198,7 +75104,7 @@ Domain allowed access.
52902 </summary>
52903 </param>
52904 </interface>
52905 -<interface name="dev_getattr_power_mgmt_dev" lineno="3935">
52906 +<interface name="dev_getattr_power_mgmt_dev" lineno="4083">
52907 <summary>
52908 Get the attributes of the the power management device.
52909 </summary>
52910 @@ -75208,7 +75114,7 @@ Domain allowed access.
52911 </summary>
52912 </param>
52913 </interface>
52914 -<interface name="dev_setattr_power_mgmt_dev" lineno="3953">
52915 +<interface name="dev_setattr_power_mgmt_dev" lineno="4101">
52916 <summary>
52917 Set the attributes of the the power management device.
52918 </summary>
52919 @@ -75218,7 +75124,7 @@ Domain allowed access.
52920 </summary>
52921 </param>
52922 </interface>
52923 -<interface name="dev_rw_power_management" lineno="3971">
52924 +<interface name="dev_rw_power_management" lineno="4119">
52925 <summary>
52926 Read and write the the power management device.
52927 </summary>
52928 @@ -75228,7 +75134,7 @@ Domain allowed access.
52929 </summary>
52930 </param>
52931 </interface>
52932 -<interface name="dev_getattr_smartcard_dev" lineno="3989">
52933 +<interface name="dev_getattr_smartcard_dev" lineno="4137">
52934 <summary>
52935 Getattr on smartcard devices
52936 </summary>
52937 @@ -75238,7 +75144,7 @@ Domain allowed access.
52938 </summary>
52939 </param>
52940 </interface>
52941 -<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4008">
52942 +<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4156">
52943 <summary>
52944 dontaudit getattr on smartcard devices
52945 </summary>
52946 @@ -75248,7 +75154,7 @@ Domain to not audit.
52947 </summary>
52948 </param>
52949 </interface>
52950 -<interface name="dev_rw_smartcard" lineno="4027">
52951 +<interface name="dev_rw_smartcard" lineno="4175">
52952 <summary>
52953 Read and write smartcard devices.
52954 </summary>
52955 @@ -75258,7 +75164,7 @@ Domain allowed access.
52956 </summary>
52957 </param>
52958 </interface>
52959 -<interface name="dev_manage_smartcard" lineno="4045">
52960 +<interface name="dev_manage_smartcard" lineno="4193">
52961 <summary>
52962 Create, read, write, and delete smartcard devices.
52963 </summary>
52964 @@ -75268,7 +75174,17 @@ Domain allowed access.
52965 </summary>
52966 </param>
52967 </interface>
52968 -<interface name="dev_mounton_sysfs" lineno="4063">
52969 +<interface name="dev_rw_sysdig" lineno="4211">
52970 +<summary>
52971 +Read, write and map the sysdig device.
52972 +</summary>
52973 +<param name="domain">
52974 +<summary>
52975 +Domain allowed access.
52976 +</summary>
52977 +</param>
52978 +</interface>
52979 +<interface name="dev_mounton_sysfs" lineno="4230">
52980 <summary>
52981 Mount a filesystem on sysfs.
52982 </summary>
52983 @@ -75278,7 +75194,7 @@ Domain allow access.
52984 </summary>
52985 </param>
52986 </interface>
52987 -<interface name="dev_associate_sysfs" lineno="4081">
52988 +<interface name="dev_associate_sysfs" lineno="4248">
52989 <summary>
52990 Associate a file to a sysfs filesystem.
52991 </summary>
52992 @@ -75288,7 +75204,7 @@ The type of the file to be associated to sysfs.
52993 </summary>
52994 </param>
52995 </interface>
52996 -<interface name="dev_getattr_sysfs_dirs" lineno="4099">
52997 +<interface name="dev_getattr_sysfs_dirs" lineno="4266">
52998 <summary>
52999 Get the attributes of sysfs directories.
53000 </summary>
53001 @@ -75298,7 +75214,7 @@ Domain allowed access.
53002 </summary>
53003 </param>
53004 </interface>
53005 -<interface name="dev_getattr_sysfs" lineno="4117">
53006 +<interface name="dev_getattr_sysfs" lineno="4284">
53007 <summary>
53008 Get the attributes of sysfs filesystem
53009 </summary>
53010 @@ -75308,7 +75224,7 @@ Domain allowed access.
53011 </summary>
53012 </param>
53013 </interface>
53014 -<interface name="dev_mount_sysfs" lineno="4135">
53015 +<interface name="dev_mount_sysfs" lineno="4302">
53016 <summary>
53017 mount a sysfs filesystem
53018 </summary>
53019 @@ -75318,7 +75234,7 @@ Domain allowed access.
53020 </summary>
53021 </param>
53022 </interface>
53023 -<interface name="dev_dontaudit_getattr_sysfs" lineno="4153">
53024 +<interface name="dev_dontaudit_getattr_sysfs" lineno="4320">
53025 <summary>
53026 Do not audit getting the attributes of sysfs filesystem
53027 </summary>
53028 @@ -75328,7 +75244,7 @@ Domain to dontaudit access from
53029 </summary>
53030 </param>
53031 </interface>
53032 -<interface name="dev_dontaudit_read_sysfs" lineno="4171">
53033 +<interface name="dev_dontaudit_read_sysfs" lineno="4338">
53034 <summary>
53035 Dont audit attempts to read hardware state information
53036 </summary>
53037 @@ -75338,7 +75254,7 @@ Domain for which the attempts do not need to be audited
53038 </summary>
53039 </param>
53040 </interface>
53041 -<interface name="dev_mounton_sysfs_dirs" lineno="4191">
53042 +<interface name="dev_mounton_sysfs_dirs" lineno="4358">
53043 <summary>
53044 mounton sysfs directories.
53045 </summary>
53046 @@ -75348,7 +75264,7 @@ Domain allowed access.
53047 </summary>
53048 </param>
53049 </interface>
53050 -<interface name="dev_search_sysfs" lineno="4209">
53051 +<interface name="dev_search_sysfs" lineno="4376">
53052 <summary>
53053 Search the sysfs directories.
53054 </summary>
53055 @@ -75358,7 +75274,7 @@ Domain allowed access.
53056 </summary>
53057 </param>
53058 </interface>
53059 -<interface name="dev_dontaudit_search_sysfs" lineno="4227">
53060 +<interface name="dev_dontaudit_search_sysfs" lineno="4394">
53061 <summary>
53062 Do not audit attempts to search sysfs.
53063 </summary>
53064 @@ -75368,7 +75284,7 @@ Domain to not audit.
53065 </summary>
53066 </param>
53067 </interface>
53068 -<interface name="dev_list_sysfs" lineno="4245">
53069 +<interface name="dev_list_sysfs" lineno="4412">
53070 <summary>
53071 List the contents of the sysfs directories.
53072 </summary>
53073 @@ -75378,7 +75294,7 @@ Domain allowed access.
53074 </summary>
53075 </param>
53076 </interface>
53077 -<interface name="dev_write_sysfs_dirs" lineno="4264">
53078 +<interface name="dev_write_sysfs_dirs" lineno="4431">
53079 <summary>
53080 Write in a sysfs directories.
53081 </summary>
53082 @@ -75388,7 +75304,7 @@ Domain allowed access.
53083 </summary>
53084 </param>
53085 </interface>
53086 -<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4282">
53087 +<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4449">
53088 <summary>
53089 Do not audit attempts to write in a sysfs directory.
53090 </summary>
53091 @@ -75398,7 +75314,7 @@ Domain to not audit.
53092 </summary>
53093 </param>
53094 </interface>
53095 -<interface name="dev_manage_sysfs_dirs" lineno="4301">
53096 +<interface name="dev_manage_sysfs_dirs" lineno="4468">
53097 <summary>
53098 Create, read, write, and delete sysfs
53099 directories.
53100 @@ -75409,7 +75325,7 @@ Domain allowed access.
53101 </summary>
53102 </param>
53103 </interface>
53104 -<interface name="dev_read_sysfs" lineno="4328">
53105 +<interface name="dev_read_sysfs" lineno="4495">
53106 <summary>
53107 Read hardware state information.
53108 </summary>
53109 @@ -75428,7 +75344,24 @@ Domain allowed access.
53110 </param>
53111 <infoflow type="read" weight="10"/>
53112 </interface>
53113 -<interface name="dev_rw_sysfs" lineno="4349">
53114 +<interface name="dev_write_sysfs" lineno="4523">
53115 +<summary>
53116 +Write to hardware state information.
53117 +</summary>
53118 +<desc>
53119 +<p>
53120 +Allow the specified domain to write to the sysfs
53121 +filesystem.
53122 +</p>
53123 +</desc>
53124 +<param name="domain">
53125 +<summary>
53126 +Domain allowed access.
53127 +</summary>
53128 +</param>
53129 +<infoflow type="read" weight="10"/>
53130 +</interface>
53131 +<interface name="dev_rw_sysfs" lineno="4542">
53132 <summary>
53133 Allow caller to modify hardware state information.
53134 </summary>
53135 @@ -75438,7 +75371,7 @@ Domain allowed access.
53136 </summary>
53137 </param>
53138 </interface>
53139 -<interface name="dev_create_sysfs_files" lineno="4370">
53140 +<interface name="dev_create_sysfs_files" lineno="4563">
53141 <summary>
53142 Add a sysfs file
53143 </summary>
53144 @@ -75448,7 +75381,7 @@ Domain allowed access.
53145 </summary>
53146 </param>
53147 </interface>
53148 -<interface name="dev_relabel_sysfs_dirs" lineno="4388">
53149 +<interface name="dev_relabel_sysfs_dirs" lineno="4581">
53150 <summary>
53151 Relabel hardware state directories.
53152 </summary>
53153 @@ -75458,7 +75391,7 @@ Domain allowed access.
53154 </summary>
53155 </param>
53156 </interface>
53157 -<interface name="dev_relabel_all_sysfs" lineno="4406">
53158 +<interface name="dev_relabel_all_sysfs" lineno="4599">
53159 <summary>
53160 Relabel from/to all sysfs types.
53161 </summary>
53162 @@ -75468,7 +75401,7 @@ Domain allowed access.
53163 </summary>
53164 </param>
53165 </interface>
53166 -<interface name="dev_setattr_all_sysfs" lineno="4426">
53167 +<interface name="dev_setattr_all_sysfs" lineno="4619">
53168 <summary>
53169 Set the attributes of sysfs files, directories and symlinks.
53170 </summary>
53171 @@ -75478,7 +75411,7 @@ Domain allowed access.
53172 </summary>
53173 </param>
53174 </interface>
53175 -<interface name="dev_rw_tpm" lineno="4446">
53176 +<interface name="dev_rw_tpm" lineno="4639">
53177 <summary>
53178 Read and write the TPM device.
53179 </summary>
53180 @@ -75488,7 +75421,7 @@ Domain allowed access.
53181 </summary>
53182 </param>
53183 </interface>
53184 -<interface name="dev_read_urand" lineno="4487">
53185 +<interface name="dev_read_urand" lineno="4680">
53186 <summary>
53187 Read from pseudo random number generator devices (e.g., /dev/urandom).
53188 </summary>
53189 @@ -75521,7 +75454,7 @@ Domain allowed access.
53190 </param>
53191 <infoflow type="read" weight="10"/>
53192 </interface>
53193 -<interface name="dev_dontaudit_read_urand" lineno="4506">
53194 +<interface name="dev_dontaudit_read_urand" lineno="4699">
53195 <summary>
53196 Do not audit attempts to read from pseudo
53197 random devices (e.g., /dev/urandom)
53198 @@ -75532,7 +75465,7 @@ Domain to not audit.
53199 </summary>
53200 </param>
53201 </interface>
53202 -<interface name="dev_write_urand" lineno="4525">
53203 +<interface name="dev_write_urand" lineno="4718">
53204 <summary>
53205 Write to the pseudo random device (e.g., /dev/urandom). This
53206 sets the random number generator seed.
53207 @@ -75543,7 +75476,17 @@ Domain allowed access.
53208 </summary>
53209 </param>
53210 </interface>
53211 -<interface name="dev_getattr_generic_usb_dev" lineno="4543">
53212 +<interface name="dev_create_urand_dev" lineno="4736">
53213 +<summary>
53214 +Create the urandom device (/dev/urandom).
53215 +</summary>
53216 +<param name="domain">
53217 +<summary>
53218 +Domain allowed access.
53219 +</summary>
53220 +</param>
53221 +</interface>
53222 +<interface name="dev_getattr_generic_usb_dev" lineno="4754">
53223 <summary>
53224 Getattr generic the USB devices.
53225 </summary>
53226 @@ -75553,7 +75496,7 @@ Domain allowed access.
53227 </summary>
53228 </param>
53229 </interface>
53230 -<interface name="dev_setattr_generic_usb_dev" lineno="4561">
53231 +<interface name="dev_setattr_generic_usb_dev" lineno="4772">
53232 <summary>
53233 Setattr generic the USB devices.
53234 </summary>
53235 @@ -75563,7 +75506,7 @@ Domain allowed access.
53236 </summary>
53237 </param>
53238 </interface>
53239 -<interface name="dev_read_generic_usb_dev" lineno="4579">
53240 +<interface name="dev_read_generic_usb_dev" lineno="4790">
53241 <summary>
53242 Read generic the USB devices.
53243 </summary>
53244 @@ -75573,7 +75516,7 @@ Domain allowed access.
53245 </summary>
53246 </param>
53247 </interface>
53248 -<interface name="dev_rw_generic_usb_dev" lineno="4597">
53249 +<interface name="dev_rw_generic_usb_dev" lineno="4808">
53250 <summary>
53251 Read and write generic the USB devices.
53252 </summary>
53253 @@ -75583,7 +75526,7 @@ Domain allowed access.
53254 </summary>
53255 </param>
53256 </interface>
53257 -<interface name="dev_relabel_generic_usb_dev" lineno="4615">
53258 +<interface name="dev_relabel_generic_usb_dev" lineno="4826">
53259 <summary>
53260 Relabel generic the USB devices.
53261 </summary>
53262 @@ -75593,7 +75536,7 @@ Domain allowed access.
53263 </summary>
53264 </param>
53265 </interface>
53266 -<interface name="dev_read_usbmon_dev" lineno="4633">
53267 +<interface name="dev_read_usbmon_dev" lineno="4844">
53268 <summary>
53269 Read USB monitor devices.
53270 </summary>
53271 @@ -75603,7 +75546,7 @@ Domain allowed access.
53272 </summary>
53273 </param>
53274 </interface>
53275 -<interface name="dev_write_usbmon_dev" lineno="4651">
53276 +<interface name="dev_write_usbmon_dev" lineno="4862">
53277 <summary>
53278 Write USB monitor devices.
53279 </summary>
53280 @@ -75613,7 +75556,7 @@ Domain allowed access.
53281 </summary>
53282 </param>
53283 </interface>
53284 -<interface name="dev_mount_usbfs" lineno="4669">
53285 +<interface name="dev_mount_usbfs" lineno="4880">
53286 <summary>
53287 Mount a usbfs filesystem.
53288 </summary>
53289 @@ -75623,7 +75566,7 @@ Domain allowed access.
53290 </summary>
53291 </param>
53292 </interface>
53293 -<interface name="dev_associate_usbfs" lineno="4687">
53294 +<interface name="dev_associate_usbfs" lineno="4898">
53295 <summary>
53296 Associate a file to a usbfs filesystem.
53297 </summary>
53298 @@ -75633,7 +75576,7 @@ The type of the file to be associated to usbfs.
53299 </summary>
53300 </param>
53301 </interface>
53302 -<interface name="dev_getattr_usbfs_dirs" lineno="4705">
53303 +<interface name="dev_getattr_usbfs_dirs" lineno="4916">
53304 <summary>
53305 Get the attributes of a directory in the usb filesystem.
53306 </summary>
53307 @@ -75643,7 +75586,7 @@ Domain allowed access.
53308 </summary>
53309 </param>
53310 </interface>
53311 -<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="4724">
53312 +<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="4935">
53313 <summary>
53314 Do not audit attempts to get the attributes
53315 of a directory in the usb filesystem.
53316 @@ -75654,7 +75597,7 @@ Domain to not audit.
53317 </summary>
53318 </param>
53319 </interface>
53320 -<interface name="dev_search_usbfs" lineno="4742">
53321 +<interface name="dev_search_usbfs" lineno="4953">
53322 <summary>
53323 Search the directory containing USB hardware information.
53324 </summary>
53325 @@ -75664,7 +75607,7 @@ Domain allowed access.
53326 </summary>
53327 </param>
53328 </interface>
53329 -<interface name="dev_list_usbfs" lineno="4760">
53330 +<interface name="dev_list_usbfs" lineno="4971">
53331 <summary>
53332 Allow caller to get a list of usb hardware.
53333 </summary>
53334 @@ -75674,7 +75617,7 @@ Domain allowed access.
53335 </summary>
53336 </param>
53337 </interface>
53338 -<interface name="dev_setattr_usbfs_files" lineno="4781">
53339 +<interface name="dev_setattr_usbfs_files" lineno="4992">
53340 <summary>
53341 Set the attributes of usbfs filesystem.
53342 </summary>
53343 @@ -75684,7 +75627,7 @@ Domain allowed access.
53344 </summary>
53345 </param>
53346 </interface>
53347 -<interface name="dev_read_usbfs" lineno="4801">
53348 +<interface name="dev_read_usbfs" lineno="5012">
53349 <summary>
53350 Read USB hardware information using
53351 the usbfs filesystem interface.
53352 @@ -75695,7 +75638,7 @@ Domain allowed access.
53353 </summary>
53354 </param>
53355 </interface>
53356 -<interface name="dev_rw_usbfs" lineno="4821">
53357 +<interface name="dev_rw_usbfs" lineno="5032">
53358 <summary>
53359 Allow caller to modify usb hardware configuration files.
53360 </summary>
53361 @@ -75705,7 +75648,7 @@ Domain allowed access.
53362 </summary>
53363 </param>
53364 </interface>
53365 -<interface name="dev_getattr_video_dev" lineno="4841">
53366 +<interface name="dev_getattr_video_dev" lineno="5052">
53367 <summary>
53368 Get the attributes of video4linux devices.
53369 </summary>
53370 @@ -75715,7 +75658,7 @@ Domain allowed access.
53371 </summary>
53372 </param>
53373 </interface>
53374 -<interface name="dev_rw_userio_dev" lineno="4859">
53375 +<interface name="dev_rw_userio_dev" lineno="5070">
53376 <summary>
53377 Read and write userio device.
53378 </summary>
53379 @@ -75725,7 +75668,7 @@ Domain allowed access.
53380 </summary>
53381 </param>
53382 </interface>
53383 -<interface name="dev_dontaudit_getattr_video_dev" lineno="4878">
53384 +<interface name="dev_dontaudit_getattr_video_dev" lineno="5089">
53385 <summary>
53386 Do not audit attempts to get the attributes
53387 of video4linux device nodes.
53388 @@ -75736,7 +75679,7 @@ Domain to not audit.
53389 </summary>
53390 </param>
53391 </interface>
53392 -<interface name="dev_setattr_video_dev" lineno="4896">
53393 +<interface name="dev_setattr_video_dev" lineno="5107">
53394 <summary>
53395 Set the attributes of video4linux device nodes.
53396 </summary>
53397 @@ -75746,7 +75689,7 @@ Domain allowed access.
53398 </summary>
53399 </param>
53400 </interface>
53401 -<interface name="dev_dontaudit_setattr_video_dev" lineno="4915">
53402 +<interface name="dev_dontaudit_setattr_video_dev" lineno="5126">
53403 <summary>
53404 Do not audit attempts to set the attributes
53405 of video4linux device nodes.
53406 @@ -75757,7 +75700,7 @@ Domain to not audit.
53407 </summary>
53408 </param>
53409 </interface>
53410 -<interface name="dev_read_video_dev" lineno="4933">
53411 +<interface name="dev_read_video_dev" lineno="5144">
53412 <summary>
53413 Read the video4linux devices.
53414 </summary>
53415 @@ -75767,7 +75710,7 @@ Domain allowed access.
53416 </summary>
53417 </param>
53418 </interface>
53419 -<interface name="dev_write_video_dev" lineno="4951">
53420 +<interface name="dev_write_video_dev" lineno="5162">
53421 <summary>
53422 Write the video4linux devices.
53423 </summary>
53424 @@ -75777,7 +75720,7 @@ Domain allowed access.
53425 </summary>
53426 </param>
53427 </interface>
53428 -<interface name="dev_rw_vfio_dev" lineno="4969">
53429 +<interface name="dev_rw_vfio_dev" lineno="5180">
53430 <summary>
53431 Read and write vfio devices.
53432 </summary>
53433 @@ -75787,7 +75730,7 @@ Domain allowed access.
53434 </summary>
53435 </param>
53436 </interface>
53437 -<interface name="dev_relabelfrom_vfio_dev" lineno="4987">
53438 +<interface name="dev_relabelfrom_vfio_dev" lineno="5198">
53439 <summary>
53440 Relabel vfio devices.
53441 </summary>
53442 @@ -75797,7 +75740,7 @@ Domain allowed access.
53443 </summary>
53444 </param>
53445 </interface>
53446 -<interface name="dev_rw_vhost" lineno="5005">
53447 +<interface name="dev_rw_vhost" lineno="5216">
53448 <summary>
53449 Allow read/write the vhost devices
53450 </summary>
53451 @@ -75807,7 +75750,7 @@ Domain allowed access.
53452 </summary>
53453 </param>
53454 </interface>
53455 -<interface name="dev_rw_vmware" lineno="5023">
53456 +<interface name="dev_rw_vmware" lineno="5234">
53457 <summary>
53458 Read and write VMWare devices.
53459 </summary>
53460 @@ -75817,7 +75760,7 @@ Domain allowed access.
53461 </summary>
53462 </param>
53463 </interface>
53464 -<interface name="dev_rwx_vmware" lineno="5041">
53465 +<interface name="dev_rwx_vmware" lineno="5252">
53466 <summary>
53467 Read, write, and mmap VMWare devices.
53468 </summary>
53469 @@ -75827,7 +75770,7 @@ Domain allowed access.
53470 </summary>
53471 </param>
53472 </interface>
53473 -<interface name="dev_read_watchdog" lineno="5060">
53474 +<interface name="dev_read_watchdog" lineno="5271">
53475 <summary>
53476 Read from watchdog devices.
53477 </summary>
53478 @@ -75837,7 +75780,7 @@ Domain allowed access.
53479 </summary>
53480 </param>
53481 </interface>
53482 -<interface name="dev_write_watchdog" lineno="5078">
53483 +<interface name="dev_write_watchdog" lineno="5289">
53484 <summary>
53485 Write to watchdog devices.
53486 </summary>
53487 @@ -75847,7 +75790,17 @@ Domain allowed access.
53488 </summary>
53489 </param>
53490 </interface>
53491 -<interface name="dev_rw_wireless" lineno="5096">
53492 +<interface name="dev_read_wireless" lineno="5307">
53493 +<summary>
53494 +Read the wireless device.
53495 +</summary>
53496 +<param name="domain">
53497 +<summary>
53498 +Domain allowed access.
53499 +</summary>
53500 +</param>
53501 +</interface>
53502 +<interface name="dev_rw_wireless" lineno="5325">
53503 <summary>
53504 Read and write the the wireless device.
53505 </summary>
53506 @@ -75857,7 +75810,7 @@ Domain allowed access.
53507 </summary>
53508 </param>
53509 </interface>
53510 -<interface name="dev_manage_wireless" lineno="5114">
53511 +<interface name="dev_manage_wireless" lineno="5343">
53512 <summary>
53513 manage the wireless device.
53514 </summary>
53515 @@ -75867,7 +75820,7 @@ Domain allowed access.
53516 </summary>
53517 </param>
53518 </interface>
53519 -<interface name="dev_rw_xen" lineno="5132">
53520 +<interface name="dev_rw_xen" lineno="5361">
53521 <summary>
53522 Read and write Xen devices.
53523 </summary>
53524 @@ -75877,7 +75830,7 @@ Domain allowed access.
53525 </summary>
53526 </param>
53527 </interface>
53528 -<interface name="dev_manage_xen" lineno="5151">
53529 +<interface name="dev_manage_xen" lineno="5380">
53530 <summary>
53531 Create, read, write, and delete Xen devices.
53532 </summary>
53533 @@ -75887,7 +75840,7 @@ Domain allowed access.
53534 </summary>
53535 </param>
53536 </interface>
53537 -<interface name="dev_filetrans_xen" lineno="5175">
53538 +<interface name="dev_filetrans_xen" lineno="5404">
53539 <summary>
53540 Automatic type transition to the type
53541 for xen device nodes when created in /dev.
53542 @@ -75903,7 +75856,7 @@ The name of the object being created.
53543 </summary>
53544 </param>
53545 </interface>
53546 -<interface name="dev_getattr_xserver_misc_dev" lineno="5193">
53547 +<interface name="dev_getattr_xserver_misc_dev" lineno="5422">
53548 <summary>
53549 Get the attributes of X server miscellaneous devices.
53550 </summary>
53551 @@ -75913,7 +75866,7 @@ Domain allowed access.
53552 </summary>
53553 </param>
53554 </interface>
53555 -<interface name="dev_setattr_xserver_misc_dev" lineno="5211">
53556 +<interface name="dev_setattr_xserver_misc_dev" lineno="5440">
53557 <summary>
53558 Set the attributes of X server miscellaneous devices.
53559 </summary>
53560 @@ -75923,7 +75876,7 @@ Domain allowed access.
53561 </summary>
53562 </param>
53563 </interface>
53564 -<interface name="dev_rw_xserver_misc" lineno="5229">
53565 +<interface name="dev_rw_xserver_misc" lineno="5458">
53566 <summary>
53567 Read and write X server miscellaneous devices.
53568 </summary>
53569 @@ -75933,7 +75886,7 @@ Domain allowed access.
53570 </summary>
53571 </param>
53572 </interface>
53573 -<interface name="dev_map_xserver_misc" lineno="5247">
53574 +<interface name="dev_map_xserver_misc" lineno="5476">
53575 <summary>
53576 Map X server miscellaneous devices.
53577 </summary>
53578 @@ -75943,7 +75896,7 @@ Domain allowed access.
53579 </summary>
53580 </param>
53581 </interface>
53582 -<interface name="dev_rw_zero" lineno="5265">
53583 +<interface name="dev_rw_zero" lineno="5494">
53584 <summary>
53585 Read and write to the zero device (/dev/zero).
53586 </summary>
53587 @@ -75953,7 +75906,7 @@ Domain allowed access.
53588 </summary>
53589 </param>
53590 </interface>
53591 -<interface name="dev_rwx_zero" lineno="5283">
53592 +<interface name="dev_rwx_zero" lineno="5512">
53593 <summary>
53594 Read, write, and execute the zero device (/dev/zero).
53595 </summary>
53596 @@ -75963,7 +75916,7 @@ Domain allowed access.
53597 </summary>
53598 </param>
53599 </interface>
53600 -<interface name="dev_execmod_zero" lineno="5302">
53601 +<interface name="dev_execmod_zero" lineno="5531">
53602 <summary>
53603 Execmod the zero device (/dev/zero).
53604 </summary>
53605 @@ -75973,7 +75926,7 @@ Domain allowed access.
53606 </summary>
53607 </param>
53608 </interface>
53609 -<interface name="dev_create_zero_dev" lineno="5321">
53610 +<interface name="dev_create_zero_dev" lineno="5550">
53611 <summary>
53612 Create the zero device (/dev/zero).
53613 </summary>
53614 @@ -75983,7 +75936,7 @@ Domain allowed access.
53615 </summary>
53616 </param>
53617 </interface>
53618 -<interface name="dev_read_cpu_online" lineno="5344">
53619 +<interface name="dev_read_cpu_online" lineno="5573">
53620 <summary>
53621 Read cpu online hardware state information
53622 </summary>
53623 @@ -75998,7 +75951,7 @@ Domain allowed access.
53624 </summary>
53625 </param>
53626 </interface>
53627 -<interface name="dev_unconfined" lineno="5364">
53628 +<interface name="dev_unconfined" lineno="5593">
53629 <summary>
53630 Unconfined access to devices.
53631 </summary>
53632 @@ -76008,7 +75961,7 @@ Domain allowed access.
53633 </summary>
53634 </param>
53635 </interface>
53636 -<interface name="dev_relabel_cpu_online" lineno="5384">
53637 +<interface name="dev_relabel_cpu_online" lineno="5613">
53638 <summary>
53639 Relabel cpu online hardware state information.
53640 </summary>
53641 @@ -76018,7 +75971,7 @@ Domain allowed access.
53642 </summary>
53643 </param>
53644 </interface>
53645 -<interface name="dev_dontaudit_read_usbmon_dev" lineno="5403">
53646 +<interface name="dev_dontaudit_read_usbmon_dev" lineno="5632">
53647 <summary>
53648 Dont audit attempts to read usbmon devices
53649 </summary>
53650 @@ -76146,7 +76099,7 @@ Domain allowed access.
53651 </interface>
53652 <interface name="domain_system_change_exemption" lineno="198">
53653 <summary>
53654 -Makes caller and execption to the constraint
53655 +Makes caller and exception to the constraint
53656 preventing changing to the system user
53657 identity and system role.
53658 </summary>
53659 @@ -76669,7 +76622,7 @@ Domain to not audit.
53660 </interface>
53661 <interface name="domain_dontaudit_getattr_all_key_sockets" lineno="1052">
53662 <summary>
53663 -Do not audit attempts to get attribues of
53664 +Do not audit attempts to get attributes of
53665 all domains IPSEC key management sockets.
53666 </summary>
53667 <param name="domain">
53668 @@ -76680,7 +76633,7 @@ Domain to not audit.
53669 </interface>
53670 <interface name="domain_dontaudit_getattr_all_packet_sockets" lineno="1071">
53671 <summary>
53672 -Do not audit attempts to get attribues of
53673 +Do not audit attempts to get attributes of
53674 all domains packet sockets.
53675 </summary>
53676 <param name="domain">
53677 @@ -76691,7 +76644,7 @@ Domain to not audit.
53678 </interface>
53679 <interface name="domain_dontaudit_getattr_all_raw_sockets" lineno="1090">
53680 <summary>
53681 -Do not audit attempts to get attribues of
53682 +Do not audit attempts to get attributes of
53683 all domains raw sockets.
53684 </summary>
53685 <param name="domain">
53686 @@ -76928,7 +76881,25 @@ Domain allowed access.
53687 </summary>
53688 </param>
53689 </interface>
53690 -<interface name="domain_unconfined_signal" lineno="1500">
53691 +<interface name="domain_public_key" lineno="1508">
53692 +<summary>
53693 +Allow all domains to search specified type keys.
53694 +</summary>
53695 +<desc>
53696 +<p>
53697 +When setting up IMA/EVM key(s) are added to the
53698 +kernel keyring but the type of the key is the domain
53699 +adding the key. This interface will allow all domains
53700 +search the key so IMA/EVM validation can happen.
53701 +</p>
53702 +</desc>
53703 +<param name="type">
53704 +<summary>
53705 +Type of key to be searched.
53706 +</summary>
53707 +</param>
53708 +</interface>
53709 +<interface name="domain_unconfined_signal" lineno="1526">
53710 <summary>
53711 Send generic signals to the unconfined domain.
53712 </summary>
53713 @@ -76938,7 +76909,7 @@ Domain allowed access.
53714 </summary>
53715 </param>
53716 </interface>
53717 -<interface name="domain_unconfined" lineno="1518">
53718 +<interface name="domain_unconfined" lineno="1544">
53719 <summary>
53720 Unconfined access to domains.
53721 </summary>
53722 @@ -76948,7 +76919,7 @@ Domain allowed access.
53723 </summary>
53724 </param>
53725 </interface>
53726 -<interface name="domain_dontaudit_getsched_all_domains" lineno="1546">
53727 +<interface name="domain_dontaudit_getsched_all_domains" lineno="1572">
53728 <summary>
53729 Do not audit getting the scheduler information of all domains.
53730 </summary>
53731 @@ -77021,7 +76992,7 @@ Related interfaces:
53732 <li>files_config_files()</li>
53733 <li>files_lock_file()</li>
53734 <li>files_mountpoint()</li>
53735 -<li>files_pid_file()</li>
53736 +<li>files_runtime_file()</li>
53737 <li>files_security_file()</li>
53738 <li>files_security_mountpoint()</li>
53739 <li>files_tmp_file()</li>
53740 @@ -77106,6 +77077,45 @@ Type to be used for mount points.
53741 <interface name="files_pid_file" lineno="231">
53742 <summary>
53743 Make the specified type usable for
53744 +runtime process ID files. (Deprecated)
53745 +</summary>
53746 +<desc>
53747 +<p>
53748 +Make the specified type usable for runtime process ID files,
53749 +typically found in /var/run.
53750 +This will also make the type usable for files, making
53751 +calls to files_type() redundant. Failure to use this interface
53752 +for a PID file type may result in problems with starting
53753 +or stopping services.
53754 +</p>
53755 +<p>
53756 +Related interfaces:
53757 +</p>
53758 +<ul>
53759 +<li>files_runtime_filetrans()</li>
53760 +</ul>
53761 +<p>
53762 +Example usage with a domain that can create and
53763 +write its PID file with a private PID file type in the
53764 +/var/run directory:
53765 +</p>
53766 +<p>
53767 +type mypidfile_t;
53768 +files_runtime_file(mypidfile_t)
53769 +allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms };
53770 +files_runtime_filetrans(mydomain_t, mypidfile_t, file)
53771 +</p>
53772 +</desc>
53773 +<param name="type">
53774 +<summary>
53775 +Type to be used for PID files.
53776 +</summary>
53777 +</param>
53778 +<infoflow type="none"/>
53779 +</interface>
53780 +<interface name="files_runtime_file" lineno="275">
53781 +<summary>
53782 +Make the specified type usable for
53783 runtime process ID files.
53784 </summary>
53785 <desc>
53786 @@ -77121,7 +77131,7 @@ or stopping services.
53787 Related interfaces:
53788 </p>
53789 <ul>
53790 -<li>files_pid_filetrans()</li>
53791 +<li>files_runtime_filetrans()</li>
53792 </ul>
53793 <p>
53794 Example usage with a domain that can create and
53795 @@ -77130,9 +77140,9 @@ write its PID file with a private PID file type in the
53796 </p>
53797 <p>
53798 type mypidfile_t;
53799 -files_pid_file(mypidfile_t)
53800 +files_runtime_file(mypidfile_t)
53801 allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms };
53802 -files_pid_filetrans(mydomain_t, mypidfile_t, file)
53803 +files_runtime_filetrans(mydomain_t, mypidfile_t, file)
53804 </p>
53805 </desc>
53806 <param name="type">
53807 @@ -77142,7 +77152,7 @@ Type to be used for PID files.
53808 </param>
53809 <infoflow type="none"/>
53810 </interface>
53811 -<interface name="files_config_file" lineno="271">
53812 +<interface name="files_config_file" lineno="315">
53813 <summary>
53814 Make the specified type a
53815 configuration file.
53816 @@ -77173,7 +77183,7 @@ Type to be used as a configuration file.
53817 </param>
53818 <infoflow type="none"/>
53819 </interface>
53820 -<interface name="files_poly" lineno="291">
53821 +<interface name="files_poly" lineno="335">
53822 <summary>
53823 Make the specified type a
53824 polyinstantiated directory.
53825 @@ -77185,7 +77195,7 @@ polyinstantiated directory.
53826 </summary>
53827 </param>
53828 </interface>
53829 -<interface name="files_poly_parent" lineno="312">
53830 +<interface name="files_poly_parent" lineno="356">
53831 <summary>
53832 Make the specified type a parent
53833 of a polyinstantiated directory.
53834 @@ -77197,7 +77207,7 @@ parent directory.
53835 </summary>
53836 </param>
53837 </interface>
53838 -<interface name="files_poly_member" lineno="333">
53839 +<interface name="files_poly_member" lineno="377">
53840 <summary>
53841 Make the specified type a
53842 polyinstantiation member directory.
53843 @@ -77209,7 +77219,7 @@ member directory.
53844 </summary>
53845 </param>
53846 </interface>
53847 -<interface name="files_poly_member_tmp" lineno="360">
53848 +<interface name="files_poly_member_tmp" lineno="404">
53849 <summary>
53850 Make the domain use the specified
53851 type of polyinstantiated directory.
53852 @@ -77227,7 +77237,7 @@ member directory.
53853 </summary>
53854 </param>
53855 </interface>
53856 -<interface name="files_tmp_file" lineno="407">
53857 +<interface name="files_tmp_file" lineno="451">
53858 <summary>
53859 Make the specified type a file
53860 used for temporary files.
53861 @@ -77266,7 +77276,7 @@ temporary file.
53862 </param>
53863 <infoflow type="none"/>
53864 </interface>
53865 -<interface name="files_tmpfs_file" lineno="428">
53866 +<interface name="files_tmpfs_file" lineno="472">
53867 <summary>
53868 Transform the type into a file, for use on a
53869 virtual memory filesystem (tmpfs).
53870 @@ -77277,7 +77287,7 @@ The type to be transformed.
53871 </summary>
53872 </param>
53873 </interface>
53874 -<interface name="files_getattr_all_dirs" lineno="447">
53875 +<interface name="files_getattr_all_dirs" lineno="491">
53876 <summary>
53877 Get the attributes of all directories.
53878 </summary>
53879 @@ -77287,7 +77297,7 @@ Domain allowed access.
53880 </summary>
53881 </param>
53882 </interface>
53883 -<interface name="files_dontaudit_getattr_all_dirs" lineno="466">
53884 +<interface name="files_dontaudit_getattr_all_dirs" lineno="510">
53885 <summary>
53886 Do not audit attempts to get the attributes
53887 of all directories.
53888 @@ -77298,7 +77308,7 @@ Domain to not audit.
53889 </summary>
53890 </param>
53891 </interface>
53892 -<interface name="files_list_non_security" lineno="484">
53893 +<interface name="files_list_non_security" lineno="528">
53894 <summary>
53895 List all non-security directories.
53896 </summary>
53897 @@ -77308,7 +77318,7 @@ Domain allowed access.
53898 </summary>
53899 </param>
53900 </interface>
53901 -<interface name="files_dontaudit_list_non_security" lineno="503">
53902 +<interface name="files_dontaudit_list_non_security" lineno="547">
53903 <summary>
53904 Do not audit attempts to list all
53905 non-security directories.
53906 @@ -77319,7 +77329,7 @@ Domain to not audit.
53907 </summary>
53908 </param>
53909 </interface>
53910 -<interface name="files_mounton_non_security" lineno="522">
53911 +<interface name="files_mounton_non_security" lineno="566">
53912 <summary>
53913 Mount a filesystem on all non-security
53914 directories and files.
53915 @@ -77330,7 +77340,7 @@ Domain allowed access.
53916 </summary>
53917 </param>
53918 </interface>
53919 -<interface name="files_write_non_security_dirs" lineno="541">
53920 +<interface name="files_write_non_security_dirs" lineno="585">
53921 <summary>
53922 Allow attempts to modify any directory
53923 </summary>
53924 @@ -77340,7 +77350,7 @@ Domain allowed access.
53925 </summary>
53926 </param>
53927 </interface>
53928 -<interface name="files_manage_non_security_dirs" lineno="559">
53929 +<interface name="files_manage_non_security_dirs" lineno="603">
53930 <summary>
53931 Allow attempts to manage non-security directories
53932 </summary>
53933 @@ -77350,7 +77360,7 @@ Domain allowed access.
53934 </summary>
53935 </param>
53936 </interface>
53937 -<interface name="files_relabel_non_security_dirs" lineno="577">
53938 +<interface name="files_relabel_non_security_dirs" lineno="621">
53939 <summary>
53940 Relabel from/to non-security directories.
53941 </summary>
53942 @@ -77360,7 +77370,7 @@ Domain allowed access.
53943 </summary>
53944 </param>
53945 </interface>
53946 -<interface name="files_getattr_all_files" lineno="595">
53947 +<interface name="files_getattr_all_files" lineno="639">
53948 <summary>
53949 Get the attributes of all files.
53950 </summary>
53951 @@ -77370,7 +77380,7 @@ Domain allowed access.
53952 </summary>
53953 </param>
53954 </interface>
53955 -<interface name="files_dontaudit_getattr_all_files" lineno="615">
53956 +<interface name="files_dontaudit_getattr_all_files" lineno="659">
53957 <summary>
53958 Do not audit attempts to get the attributes
53959 of all files.
53960 @@ -77381,7 +77391,7 @@ Domain to not audit.
53961 </summary>
53962 </param>
53963 </interface>
53964 -<interface name="files_dontaudit_getattr_non_security_files" lineno="634">
53965 +<interface name="files_dontaudit_getattr_non_security_files" lineno="678">
53966 <summary>
53967 Do not audit attempts to get the attributes
53968 of non security files.
53969 @@ -77392,7 +77402,7 @@ Domain to not audit.
53970 </summary>
53971 </param>
53972 </interface>
53973 -<interface name="files_manage_non_security_files" lineno="653">
53974 +<interface name="files_manage_non_security_files" lineno="697">
53975 <summary>
53976 Create, read, write, and delete all non-security files.
53977 </summary>
53978 @@ -77403,7 +77413,7 @@ Domain allowed access.
53979 </param>
53980 <rolecap/>
53981 </interface>
53982 -<interface name="files_relabel_non_security_files" lineno="672">
53983 +<interface name="files_relabel_non_security_files" lineno="716">
53984 <summary>
53985 Relabel from/to all non-security files.
53986 </summary>
53987 @@ -77414,7 +77424,7 @@ Domain allowed access.
53988 </param>
53989 <rolecap/>
53990 </interface>
53991 -<interface name="files_read_all_files" lineno="690">
53992 +<interface name="files_read_all_files" lineno="734">
53993 <summary>
53994 Read all files.
53995 </summary>
53996 @@ -77424,7 +77434,7 @@ Domain allowed access.
53997 </summary>
53998 </param>
53999 </interface>
54000 -<interface name="files_execmod_all_files" lineno="721">
54001 +<interface name="files_execmod_all_files" lineno="765">
54002 <summary>
54003 Allow shared library text relocations in all files.
54004 </summary>
54005 @@ -77442,7 +77452,7 @@ Domain allowed access.
54006 </summary>
54007 </param>
54008 </interface>
54009 -<interface name="files_read_non_security_files" lineno="740">
54010 +<interface name="files_read_non_security_files" lineno="784">
54011 <summary>
54012 Read all non-security files.
54013 </summary>
54014 @@ -77453,7 +77463,7 @@ Domain allowed access.
54015 </param>
54016 <rolecap/>
54017 </interface>
54018 -<interface name="files_read_all_dirs_except" lineno="766">
54019 +<interface name="files_read_all_dirs_except" lineno="810">
54020 <summary>
54021 Read all directories on the filesystem, except
54022 the listed exceptions.
54023 @@ -77470,7 +77480,7 @@ must be negated by the caller.
54024 </summary>
54025 </param>
54026 </interface>
54027 -<interface name="files_read_all_files_except" lineno="791">
54028 +<interface name="files_read_all_files_except" lineno="835">
54029 <summary>
54030 Read all files on the filesystem, except
54031 the listed exceptions.
54032 @@ -77487,7 +77497,7 @@ must be negated by the caller.
54033 </summary>
54034 </param>
54035 </interface>
54036 -<interface name="files_read_all_symlinks_except" lineno="816">
54037 +<interface name="files_read_all_symlinks_except" lineno="860">
54038 <summary>
54039 Read all symbolic links on the filesystem, except
54040 the listed exceptions.
54041 @@ -77504,7 +77514,7 @@ must be negated by the caller.
54042 </summary>
54043 </param>
54044 </interface>
54045 -<interface name="files_getattr_all_symlinks" lineno="834">
54046 +<interface name="files_getattr_all_symlinks" lineno="878">
54047 <summary>
54048 Get the attributes of all symbolic links.
54049 </summary>
54050 @@ -77514,7 +77524,7 @@ Domain allowed access.
54051 </summary>
54052 </param>
54053 </interface>
54054 -<interface name="files_dontaudit_getattr_all_symlinks" lineno="853">
54055 +<interface name="files_dontaudit_getattr_all_symlinks" lineno="897">
54056 <summary>
54057 Do not audit attempts to get the attributes
54058 of all symbolic links.
54059 @@ -77525,7 +77535,7 @@ Domain to not audit.
54060 </summary>
54061 </param>
54062 </interface>
54063 -<interface name="files_dontaudit_read_all_symlinks" lineno="871">
54064 +<interface name="files_dontaudit_read_all_symlinks" lineno="915">
54065 <summary>
54066 Do not audit attempts to read all symbolic links.
54067 </summary>
54068 @@ -77535,7 +77545,7 @@ Domain to not audit.
54069 </summary>
54070 </param>
54071 </interface>
54072 -<interface name="files_dontaudit_getattr_non_security_symlinks" lineno="890">
54073 +<interface name="files_dontaudit_getattr_non_security_symlinks" lineno="934">
54074 <summary>
54075 Do not audit attempts to get the attributes
54076 of non security symbolic links.
54077 @@ -77546,7 +77556,7 @@ Domain to not audit.
54078 </summary>
54079 </param>
54080 </interface>
54081 -<interface name="files_dontaudit_getattr_non_security_blk_files" lineno="909">
54082 +<interface name="files_dontaudit_getattr_non_security_blk_files" lineno="953">
54083 <summary>
54084 Do not audit attempts to get the attributes
54085 of non security block devices.
54086 @@ -77557,7 +77567,7 @@ Domain to not audit.
54087 </summary>
54088 </param>
54089 </interface>
54090 -<interface name="files_dontaudit_getattr_non_security_chr_files" lineno="928">
54091 +<interface name="files_dontaudit_getattr_non_security_chr_files" lineno="972">
54092 <summary>
54093 Do not audit attempts to get the attributes
54094 of non security character devices.
54095 @@ -77568,7 +77578,7 @@ Domain to not audit.
54096 </summary>
54097 </param>
54098 </interface>
54099 -<interface name="files_read_all_symlinks" lineno="947">
54100 +<interface name="files_read_all_symlinks" lineno="991">
54101 <summary>
54102 Read all symbolic links.
54103 </summary>
54104 @@ -77579,7 +77589,7 @@ Domain allowed access.
54105 </param>
54106 <rolecap/>
54107 </interface>
54108 -<interface name="files_getattr_all_pipes" lineno="966">
54109 +<interface name="files_getattr_all_pipes" lineno="1010">
54110 <summary>
54111 Get the attributes of all named pipes.
54112 </summary>
54113 @@ -77589,7 +77599,7 @@ Domain allowed access.
54114 </summary>
54115 </param>
54116 </interface>
54117 -<interface name="files_dontaudit_getattr_all_pipes" lineno="986">
54118 +<interface name="files_dontaudit_getattr_all_pipes" lineno="1030">
54119 <summary>
54120 Do not audit attempts to get the attributes
54121 of all named pipes.
54122 @@ -77600,7 +77610,7 @@ Domain to not audit.
54123 </summary>
54124 </param>
54125 </interface>
54126 -<interface name="files_dontaudit_getattr_non_security_pipes" lineno="1005">
54127 +<interface name="files_dontaudit_getattr_non_security_pipes" lineno="1049">
54128 <summary>
54129 Do not audit attempts to get the attributes
54130 of non security named pipes.
54131 @@ -77611,7 +77621,7 @@ Domain to not audit.
54132 </summary>
54133 </param>
54134 </interface>
54135 -<interface name="files_getattr_all_sockets" lineno="1023">
54136 +<interface name="files_getattr_all_sockets" lineno="1067">
54137 <summary>
54138 Get the attributes of all named sockets.
54139 </summary>
54140 @@ -77621,7 +77631,7 @@ Domain allowed access.
54141 </summary>
54142 </param>
54143 </interface>
54144 -<interface name="files_dontaudit_getattr_all_sockets" lineno="1043">
54145 +<interface name="files_dontaudit_getattr_all_sockets" lineno="1087">
54146 <summary>
54147 Do not audit attempts to get the attributes
54148 of all named sockets.
54149 @@ -77632,7 +77642,7 @@ Domain to not audit.
54150 </summary>
54151 </param>
54152 </interface>
54153 -<interface name="files_dontaudit_getattr_non_security_sockets" lineno="1062">
54154 +<interface name="files_dontaudit_getattr_non_security_sockets" lineno="1106">
54155 <summary>
54156 Do not audit attempts to get the attributes
54157 of non security named sockets.
54158 @@ -77643,7 +77653,7 @@ Domain to not audit.
54159 </summary>
54160 </param>
54161 </interface>
54162 -<interface name="files_read_all_blk_files" lineno="1080">
54163 +<interface name="files_read_all_blk_files" lineno="1124">
54164 <summary>
54165 Read all block nodes with file types.
54166 </summary>
54167 @@ -77653,7 +77663,7 @@ Domain allowed access.
54168 </summary>
54169 </param>
54170 </interface>
54171 -<interface name="files_read_all_chr_files" lineno="1098">
54172 +<interface name="files_read_all_chr_files" lineno="1142">
54173 <summary>
54174 Read all character nodes with file types.
54175 </summary>
54176 @@ -77663,7 +77673,7 @@ Domain allowed access.
54177 </summary>
54178 </param>
54179 </interface>
54180 -<interface name="files_relabel_all_files" lineno="1124">
54181 +<interface name="files_relabel_all_files" lineno="1168">
54182 <summary>
54183 Relabel all files on the filesystem, except
54184 the listed exceptions.
54185 @@ -77681,7 +77691,7 @@ must be negated by the caller.
54186 </param>
54187 <rolecap/>
54188 </interface>
54189 -<interface name="files_rw_all_files" lineno="1162">
54190 +<interface name="files_rw_all_files" lineno="1206">
54191 <summary>
54192 rw all files on the filesystem, except
54193 the listed exceptions.
54194 @@ -77699,7 +77709,7 @@ must be negated by the caller.
54195 </param>
54196 <rolecap/>
54197 </interface>
54198 -<interface name="files_manage_all_files" lineno="1188">
54199 +<interface name="files_manage_all_files" lineno="1232">
54200 <summary>
54201 Manage all files on the filesystem, except
54202 the listed exceptions.
54203 @@ -77717,7 +77727,7 @@ must be negated by the caller.
54204 </param>
54205 <rolecap/>
54206 </interface>
54207 -<interface name="files_search_all" lineno="1215">
54208 +<interface name="files_search_all" lineno="1259">
54209 <summary>
54210 Search the contents of all directories on
54211 extended attribute filesystems.
54212 @@ -77728,7 +77738,7 @@ Domain allowed access.
54213 </summary>
54214 </param>
54215 </interface>
54216 -<interface name="files_list_all" lineno="1234">
54217 +<interface name="files_list_all" lineno="1278">
54218 <summary>
54219 List the contents of all directories on
54220 extended attribute filesystems.
54221 @@ -77739,7 +77749,7 @@ Domain allowed access.
54222 </summary>
54223 </param>
54224 </interface>
54225 -<interface name="files_create_all_files_as" lineno="1252">
54226 +<interface name="files_create_all_files_as" lineno="1296">
54227 <summary>
54228 Create all files as is.
54229 </summary>
54230 @@ -77749,7 +77759,7 @@ Domain allowed access.
54231 </summary>
54232 </param>
54233 </interface>
54234 -<interface name="files_dontaudit_search_all_dirs" lineno="1272">
54235 +<interface name="files_dontaudit_search_all_dirs" lineno="1316">
54236 <summary>
54237 Do not audit attempts to search the
54238 contents of any directories on extended
54239 @@ -77761,7 +77771,7 @@ Domain to not audit.
54240 </summary>
54241 </param>
54242 </interface>
54243 -<interface name="files_getattr_all_file_type_fs" lineno="1295">
54244 +<interface name="files_getattr_all_file_type_fs" lineno="1339">
54245 <summary>
54246 Get the attributes of all filesystems
54247 with the type of a file.
54248 @@ -77772,7 +77782,7 @@ Domain allowed access.
54249 </summary>
54250 </param>
54251 </interface>
54252 -<interface name="files_relabelto_all_file_type_fs" lineno="1313">
54253 +<interface name="files_relabelto_all_file_type_fs" lineno="1357">
54254 <summary>
54255 Relabel a filesystem to the type of a file.
54256 </summary>
54257 @@ -77782,7 +77792,7 @@ Domain allowed access.
54258 </summary>
54259 </param>
54260 </interface>
54261 -<interface name="files_relabel_all_file_type_fs" lineno="1331">
54262 +<interface name="files_relabel_all_file_type_fs" lineno="1375">
54263 <summary>
54264 Relabel a filesystem to and from the type of a file.
54265 </summary>
54266 @@ -77792,7 +77802,7 @@ Domain allowed access.
54267 </summary>
54268 </param>
54269 </interface>
54270 -<interface name="files_mount_all_file_type_fs" lineno="1349">
54271 +<interface name="files_mount_all_file_type_fs" lineno="1393">
54272 <summary>
54273 Mount all filesystems with the type of a file.
54274 </summary>
54275 @@ -77802,7 +77812,7 @@ Domain allowed access.
54276 </summary>
54277 </param>
54278 </interface>
54279 -<interface name="files_unmount_all_file_type_fs" lineno="1367">
54280 +<interface name="files_unmount_all_file_type_fs" lineno="1411">
54281 <summary>
54282 Unmount all filesystems with the type of a file.
54283 </summary>
54284 @@ -77812,7 +77822,7 @@ Domain allowed access.
54285 </summary>
54286 </param>
54287 </interface>
54288 -<interface name="files_list_non_auth_dirs" lineno="1386">
54289 +<interface name="files_list_non_auth_dirs" lineno="1430">
54290 <summary>
54291 Read all non-authentication related
54292 directories.
54293 @@ -77823,7 +77833,7 @@ Domain allowed access.
54294 </summary>
54295 </param>
54296 </interface>
54297 -<interface name="files_read_non_auth_files" lineno="1405">
54298 +<interface name="files_read_non_auth_files" lineno="1449">
54299 <summary>
54300 Read all non-authentication related
54301 files.
54302 @@ -77834,7 +77844,7 @@ Domain allowed access.
54303 </summary>
54304 </param>
54305 </interface>
54306 -<interface name="files_read_non_auth_symlinks" lineno="1424">
54307 +<interface name="files_read_non_auth_symlinks" lineno="1468">
54308 <summary>
54309 Read all non-authentication related
54310 symbolic links.
54311 @@ -77845,7 +77855,7 @@ Domain allowed access.
54312 </summary>
54313 </param>
54314 </interface>
54315 -<interface name="files_rw_non_auth_files" lineno="1442">
54316 +<interface name="files_rw_non_auth_files" lineno="1486">
54317 <summary>
54318 rw non-authentication related files.
54319 </summary>
54320 @@ -77855,7 +77865,7 @@ Domain allowed access.
54321 </summary>
54322 </param>
54323 </interface>
54324 -<interface name="files_manage_non_auth_files" lineno="1462">
54325 +<interface name="files_manage_non_auth_files" lineno="1506">
54326 <summary>
54327 Manage non-authentication related
54328 files.
54329 @@ -77867,7 +77877,7 @@ Domain allowed access.
54330 </param>
54331 <rolecap/>
54332 </interface>
54333 -<interface name="files_map_non_auth_files" lineno="1490">
54334 +<interface name="files_map_non_auth_files" lineno="1534">
54335 <summary>
54336 Mmap non-authentication related
54337 files.
54338 @@ -77879,7 +77889,7 @@ Domain allowed access.
54339 </param>
54340 <rolecap/>
54341 </interface>
54342 -<interface name="files_relabel_non_auth_files" lineno="1510">
54343 +<interface name="files_relabel_non_auth_files" lineno="1554">
54344 <summary>
54345 Relabel all non-authentication related
54346 files.
54347 @@ -77891,7 +77901,7 @@ Domain allowed access.
54348 </param>
54349 <rolecap/>
54350 </interface>
54351 -<interface name="files_manage_config_dirs" lineno="1543">
54352 +<interface name="files_manage_config_dirs" lineno="1587">
54353 <summary>
54354 Manage all configuration directories on filesystem
54355 </summary>
54356 @@ -77902,7 +77912,7 @@ Domain allowed access.
54357 </param>
54358
54359 </interface>
54360 -<interface name="files_relabel_config_dirs" lineno="1562">
54361 +<interface name="files_relabel_config_dirs" lineno="1606">
54362 <summary>
54363 Relabel configuration directories
54364 </summary>
54365 @@ -77913,7 +77923,7 @@ Domain allowed access.
54366 </param>
54367
54368 </interface>
54369 -<interface name="files_read_config_files" lineno="1580">
54370 +<interface name="files_read_config_files" lineno="1624">
54371 <summary>
54372 Read config files in /etc.
54373 </summary>
54374 @@ -77923,7 +77933,7 @@ Domain allowed access.
54375 </summary>
54376 </param>
54377 </interface>
54378 -<interface name="files_manage_config_files" lineno="1601">
54379 +<interface name="files_manage_config_files" lineno="1645">
54380 <summary>
54381 Manage all configuration files on filesystem
54382 </summary>
54383 @@ -77934,7 +77944,7 @@ Domain allowed access.
54384 </param>
54385
54386 </interface>
54387 -<interface name="files_relabel_config_files" lineno="1620">
54388 +<interface name="files_relabel_config_files" lineno="1664">
54389 <summary>
54390 Relabel configuration files
54391 </summary>
54392 @@ -77945,7 +77955,7 @@ Domain allowed access.
54393 </param>
54394
54395 </interface>
54396 -<interface name="files_mounton_all_mountpoints" lineno="1638">
54397 +<interface name="files_mounton_all_mountpoints" lineno="1682">
54398 <summary>
54399 Mount a filesystem on all mount points.
54400 </summary>
54401 @@ -77955,7 +77965,7 @@ Domain allowed access.
54402 </summary>
54403 </param>
54404 </interface>
54405 -<interface name="files_getattr_all_mountpoints" lineno="1657">
54406 +<interface name="files_getattr_all_mountpoints" lineno="1703">
54407 <summary>
54408 Get the attributes of all mount points.
54409 </summary>
54410 @@ -77965,7 +77975,7 @@ Domain allowed access.
54411 </summary>
54412 </param>
54413 </interface>
54414 -<interface name="files_setattr_all_mountpoints" lineno="1675">
54415 +<interface name="files_setattr_all_mountpoints" lineno="1721">
54416 <summary>
54417 Set the attributes of all mount points.
54418 </summary>
54419 @@ -77975,7 +77985,7 @@ Domain allowed access.
54420 </summary>
54421 </param>
54422 </interface>
54423 -<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1693">
54424 +<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1739">
54425 <summary>
54426 Do not audit attempts to set the attributes on all mount points.
54427 </summary>
54428 @@ -77985,7 +77995,7 @@ Domain to not audit.
54429 </summary>
54430 </param>
54431 </interface>
54432 -<interface name="files_search_all_mountpoints" lineno="1711">
54433 +<interface name="files_search_all_mountpoints" lineno="1757">
54434 <summary>
54435 Search all mount points.
54436 </summary>
54437 @@ -77995,7 +78005,7 @@ Domain allowed access.
54438 </summary>
54439 </param>
54440 </interface>
54441 -<interface name="files_dontaudit_search_all_mountpoints" lineno="1729">
54442 +<interface name="files_dontaudit_search_all_mountpoints" lineno="1775">
54443 <summary>
54444 Do not audit searching of all mount points.
54445 </summary>
54446 @@ -78005,7 +78015,7 @@ Domain to not audit.
54447 </summary>
54448 </param>
54449 </interface>
54450 -<interface name="files_list_all_mountpoints" lineno="1747">
54451 +<interface name="files_list_all_mountpoints" lineno="1793">
54452 <summary>
54453 List all mount points.
54454 </summary>
54455 @@ -78015,7 +78025,7 @@ Domain allowed access.
54456 </summary>
54457 </param>
54458 </interface>
54459 -<interface name="files_dontaudit_list_all_mountpoints" lineno="1765">
54460 +<interface name="files_dontaudit_list_all_mountpoints" lineno="1811">
54461 <summary>
54462 Do not audit listing of all mount points.
54463 </summary>
54464 @@ -78025,7 +78035,7 @@ Domain to not audit.
54465 </summary>
54466 </param>
54467 </interface>
54468 -<interface name="files_dontaudit_write_all_mountpoints" lineno="1783">
54469 +<interface name="files_dontaudit_write_all_mountpoints" lineno="1829">
54470 <summary>
54471 Do not audit attempts to write to mount points.
54472 </summary>
54473 @@ -78035,7 +78045,7 @@ Domain to not audit.
54474 </summary>
54475 </param>
54476 </interface>
54477 -<interface name="files_list_root" lineno="1801">
54478 +<interface name="files_list_root" lineno="1847">
54479 <summary>
54480 List the contents of the root directory.
54481 </summary>
54482 @@ -78045,7 +78055,7 @@ Domain allowed access.
54483 </summary>
54484 </param>
54485 </interface>
54486 -<interface name="files_delete_root_symlinks" lineno="1821">
54487 +<interface name="files_delete_root_symlinks" lineno="1867">
54488 <summary>
54489 Delete symbolic links in the
54490 root directory.
54491 @@ -78056,7 +78066,7 @@ Domain allowed access.
54492 </summary>
54493 </param>
54494 </interface>
54495 -<interface name="files_dontaudit_write_root_dirs" lineno="1839">
54496 +<interface name="files_dontaudit_write_root_dirs" lineno="1885">
54497 <summary>
54498 Do not audit attempts to write to / dirs.
54499 </summary>
54500 @@ -78066,7 +78076,7 @@ Domain to not audit.
54501 </summary>
54502 </param>
54503 </interface>
54504 -<interface name="files_dontaudit_rw_root_dir" lineno="1858">
54505 +<interface name="files_dontaudit_rw_root_dir" lineno="1904">
54506 <summary>
54507 Do not audit attempts to write
54508 files in the root directory.
54509 @@ -78077,7 +78087,7 @@ Domain to not audit.
54510 </summary>
54511 </param>
54512 </interface>
54513 -<interface name="files_watch_root_dirs" lineno="1876">
54514 +<interface name="files_watch_root_dirs" lineno="1922">
54515 <summary>
54516 Watch the root directory.
54517 </summary>
54518 @@ -78087,7 +78097,7 @@ Domain allowed access.
54519 </summary>
54520 </param>
54521 </interface>
54522 -<interface name="files_root_filetrans" lineno="1910">
54523 +<interface name="files_root_filetrans" lineno="1956">
54524 <summary>
54525 Create an object in the root directory, with a private
54526 type using a type transition.
54527 @@ -78113,7 +78123,7 @@ The name of the object being created.
54528 </summary>
54529 </param>
54530 </interface>
54531 -<interface name="files_dontaudit_read_root_files" lineno="1929">
54532 +<interface name="files_dontaudit_read_root_files" lineno="1975">
54533 <summary>
54534 Do not audit attempts to read files in
54535 the root directory.
54536 @@ -78124,7 +78134,7 @@ Domain to not audit.
54537 </summary>
54538 </param>
54539 </interface>
54540 -<interface name="files_dontaudit_rw_root_files" lineno="1948">
54541 +<interface name="files_dontaudit_rw_root_files" lineno="1994">
54542 <summary>
54543 Do not audit attempts to read or write
54544 files in the root directory.
54545 @@ -78135,7 +78145,7 @@ Domain to not audit.
54546 </summary>
54547 </param>
54548 </interface>
54549 -<interface name="files_dontaudit_rw_root_chr_files" lineno="1967">
54550 +<interface name="files_dontaudit_rw_root_chr_files" lineno="2013">
54551 <summary>
54552 Do not audit attempts to read or write
54553 character device nodes in the root directory.
54554 @@ -78146,7 +78156,7 @@ Domain to not audit.
54555 </summary>
54556 </param>
54557 </interface>
54558 -<interface name="files_delete_root_chr_files" lineno="1986">
54559 +<interface name="files_delete_root_chr_files" lineno="2032">
54560 <summary>
54561 Delete character device nodes in
54562 the root directory.
54563 @@ -78157,7 +78167,7 @@ Domain allowed access.
54564 </summary>
54565 </param>
54566 </interface>
54567 -<interface name="files_delete_root_files" lineno="2004">
54568 +<interface name="files_delete_root_files" lineno="2050">
54569 <summary>
54570 Delete files in the root directory.
54571 </summary>
54572 @@ -78167,7 +78177,7 @@ Domain allowed access.
54573 </summary>
54574 </param>
54575 </interface>
54576 -<interface name="files_exec_root_files" lineno="2022">
54577 +<interface name="files_exec_root_files" lineno="2068">
54578 <summary>
54579 Execute files in the root directory.
54580 </summary>
54581 @@ -78177,7 +78187,7 @@ Domain allowed access.
54582 </summary>
54583 </param>
54584 </interface>
54585 -<interface name="files_delete_root_dir_entry" lineno="2040">
54586 +<interface name="files_delete_root_dir_entry" lineno="2086">
54587 <summary>
54588 Remove entries from the root directory.
54589 </summary>
54590 @@ -78187,7 +78197,7 @@ Domain allowed access.
54591 </summary>
54592 </param>
54593 </interface>
54594 -<interface name="files_manage_root_dir" lineno="2058">
54595 +<interface name="files_manage_root_dir" lineno="2104">
54596 <summary>
54597 Manage the root directory.
54598 </summary>
54599 @@ -78197,7 +78207,7 @@ Domain allowed access.
54600 </summary>
54601 </param>
54602 </interface>
54603 -<interface name="files_getattr_rootfs" lineno="2077">
54604 +<interface name="files_getattr_rootfs" lineno="2123">
54605 <summary>
54606 Get the attributes of a rootfs
54607 file system.
54608 @@ -78208,7 +78218,7 @@ Domain allowed access.
54609 </summary>
54610 </param>
54611 </interface>
54612 -<interface name="files_associate_rootfs" lineno="2095">
54613 +<interface name="files_associate_rootfs" lineno="2141">
54614 <summary>
54615 Associate to root file system.
54616 </summary>
54617 @@ -78218,7 +78228,7 @@ Type of the file to associate.
54618 </summary>
54619 </param>
54620 </interface>
54621 -<interface name="files_relabel_rootfs" lineno="2113">
54622 +<interface name="files_relabel_rootfs" lineno="2159">
54623 <summary>
54624 Relabel to and from rootfs file system.
54625 </summary>
54626 @@ -78228,7 +78238,7 @@ Domain allowed access.
54627 </summary>
54628 </param>
54629 </interface>
54630 -<interface name="files_unmount_rootfs" lineno="2131">
54631 +<interface name="files_unmount_rootfs" lineno="2177">
54632 <summary>
54633 Unmount a rootfs filesystem.
54634 </summary>
54635 @@ -78238,7 +78248,7 @@ Domain allowed access.
54636 </summary>
54637 </param>
54638 </interface>
54639 -<interface name="files_mounton_root" lineno="2149">
54640 +<interface name="files_mounton_root" lineno="2195">
54641 <summary>
54642 Mount on the root directory (/)
54643 </summary>
54644 @@ -78248,7 +78258,7 @@ Domain allowed access.
54645 </summary>
54646 </param>
54647 </interface>
54648 -<interface name="files_getattr_boot_dirs" lineno="2167">
54649 +<interface name="files_getattr_boot_dirs" lineno="2213">
54650 <summary>
54651 Get attributes of the /boot directory.
54652 </summary>
54653 @@ -78258,7 +78268,7 @@ Domain allowed access.
54654 </summary>
54655 </param>
54656 </interface>
54657 -<interface name="files_dontaudit_getattr_boot_dirs" lineno="2186">
54658 +<interface name="files_dontaudit_getattr_boot_dirs" lineno="2232">
54659 <summary>
54660 Do not audit attempts to get attributes
54661 of the /boot directory.
54662 @@ -78269,7 +78279,7 @@ Domain to not audit.
54663 </summary>
54664 </param>
54665 </interface>
54666 -<interface name="files_search_boot" lineno="2204">
54667 +<interface name="files_search_boot" lineno="2250">
54668 <summary>
54669 Search the /boot directory.
54670 </summary>
54671 @@ -78279,7 +78289,7 @@ Domain allowed access.
54672 </summary>
54673 </param>
54674 </interface>
54675 -<interface name="files_dontaudit_search_boot" lineno="2222">
54676 +<interface name="files_dontaudit_search_boot" lineno="2268">
54677 <summary>
54678 Do not audit attempts to search the /boot directory.
54679 </summary>
54680 @@ -78289,7 +78299,7 @@ Domain to not audit.
54681 </summary>
54682 </param>
54683 </interface>
54684 -<interface name="files_list_boot" lineno="2240">
54685 +<interface name="files_list_boot" lineno="2286">
54686 <summary>
54687 List the /boot directory.
54688 </summary>
54689 @@ -78299,7 +78309,7 @@ Domain allowed access.
54690 </summary>
54691 </param>
54692 </interface>
54693 -<interface name="files_dontaudit_list_boot" lineno="2258">
54694 +<interface name="files_dontaudit_list_boot" lineno="2304">
54695 <summary>
54696 Do not audit attempts to list the /boot directory.
54697 </summary>
54698 @@ -78309,7 +78319,7 @@ Domain allowed access.
54699 </summary>
54700 </param>
54701 </interface>
54702 -<interface name="files_create_boot_dirs" lineno="2276">
54703 +<interface name="files_create_boot_dirs" lineno="2322">
54704 <summary>
54705 Create directories in /boot
54706 </summary>
54707 @@ -78319,7 +78329,7 @@ Domain allowed access.
54708 </summary>
54709 </param>
54710 </interface>
54711 -<interface name="files_manage_boot_dirs" lineno="2295">
54712 +<interface name="files_manage_boot_dirs" lineno="2341">
54713 <summary>
54714 Create, read, write, and delete
54715 directories in /boot.
54716 @@ -78330,7 +78340,7 @@ Domain allowed access.
54717 </summary>
54718 </param>
54719 </interface>
54720 -<interface name="files_boot_filetrans" lineno="2329">
54721 +<interface name="files_boot_filetrans" lineno="2375">
54722 <summary>
54723 Create a private type object in boot
54724 with an automatic type transition
54725 @@ -78356,7 +78366,7 @@ The name of the object being created.
54726 </summary>
54727 </param>
54728 </interface>
54729 -<interface name="files_read_boot_files" lineno="2348">
54730 +<interface name="files_read_boot_files" lineno="2394">
54731 <summary>
54732 read files in the /boot directory.
54733 </summary>
54734 @@ -78367,7 +78377,7 @@ Domain allowed access.
54735 </param>
54736 <rolecap/>
54737 </interface>
54738 -<interface name="files_manage_boot_files" lineno="2368">
54739 +<interface name="files_manage_boot_files" lineno="2414">
54740 <summary>
54741 Create, read, write, and delete files
54742 in the /boot directory.
54743 @@ -78379,7 +78389,7 @@ Domain allowed access.
54744 </param>
54745 <rolecap/>
54746 </interface>
54747 -<interface name="files_relabelfrom_boot_files" lineno="2386">
54748 +<interface name="files_relabelfrom_boot_files" lineno="2432">
54749 <summary>
54750 Relabel from files in the /boot directory.
54751 </summary>
54752 @@ -78389,7 +78399,7 @@ Domain allowed access.
54753 </summary>
54754 </param>
54755 </interface>
54756 -<interface name="files_read_boot_symlinks" lineno="2404">
54757 +<interface name="files_read_boot_symlinks" lineno="2450">
54758 <summary>
54759 Read symbolic links in the /boot directory.
54760 </summary>
54761 @@ -78399,7 +78409,7 @@ Domain allowed access.
54762 </summary>
54763 </param>
54764 </interface>
54765 -<interface name="files_rw_boot_symlinks" lineno="2423">
54766 +<interface name="files_rw_boot_symlinks" lineno="2469">
54767 <summary>
54768 Read and write symbolic links
54769 in the /boot directory.
54770 @@ -78410,7 +78420,7 @@ Domain allowed access.
54771 </summary>
54772 </param>
54773 </interface>
54774 -<interface name="files_manage_boot_symlinks" lineno="2443">
54775 +<interface name="files_manage_boot_symlinks" lineno="2489">
54776 <summary>
54777 Create, read, write, and delete symbolic links
54778 in the /boot directory.
54779 @@ -78421,7 +78431,7 @@ Domain allowed access.
54780 </summary>
54781 </param>
54782 </interface>
54783 -<interface name="files_read_kernel_img" lineno="2461">
54784 +<interface name="files_read_kernel_img" lineno="2507">
54785 <summary>
54786 Read kernel files in the /boot directory.
54787 </summary>
54788 @@ -78431,7 +78441,7 @@ Domain allowed access.
54789 </summary>
54790 </param>
54791 </interface>
54792 -<interface name="files_create_kernel_img" lineno="2482">
54793 +<interface name="files_create_kernel_img" lineno="2528">
54794 <summary>
54795 Install a kernel into the /boot directory.
54796 </summary>
54797 @@ -78442,7 +78452,7 @@ Domain allowed access.
54798 </param>
54799 <rolecap/>
54800 </interface>
54801 -<interface name="files_delete_kernel" lineno="2502">
54802 +<interface name="files_delete_kernel" lineno="2548">
54803 <summary>
54804 Delete a kernel from /boot.
54805 </summary>
54806 @@ -78453,7 +78463,7 @@ Domain allowed access.
54807 </param>
54808 <rolecap/>
54809 </interface>
54810 -<interface name="files_getattr_default_dirs" lineno="2520">
54811 +<interface name="files_getattr_default_dirs" lineno="2566">
54812 <summary>
54813 Getattr of directories with the default file type.
54814 </summary>
54815 @@ -78463,7 +78473,7 @@ Domain allowed access.
54816 </summary>
54817 </param>
54818 </interface>
54819 -<interface name="files_dontaudit_getattr_default_dirs" lineno="2539">
54820 +<interface name="files_dontaudit_getattr_default_dirs" lineno="2585">
54821 <summary>
54822 Do not audit attempts to get the attributes of
54823 directories with the default file type.
54824 @@ -78474,7 +78484,7 @@ Domain to not audit.
54825 </summary>
54826 </param>
54827 </interface>
54828 -<interface name="files_search_default" lineno="2557">
54829 +<interface name="files_search_default" lineno="2603">
54830 <summary>
54831 Search the contents of directories with the default file type.
54832 </summary>
54833 @@ -78484,7 +78494,7 @@ Domain allowed access.
54834 </summary>
54835 </param>
54836 </interface>
54837 -<interface name="files_list_default" lineno="2575">
54838 +<interface name="files_list_default" lineno="2621">
54839 <summary>
54840 List contents of directories with the default file type.
54841 </summary>
54842 @@ -78494,7 +78504,7 @@ Domain allowed access.
54843 </summary>
54844 </param>
54845 </interface>
54846 -<interface name="files_dontaudit_list_default" lineno="2594">
54847 +<interface name="files_dontaudit_list_default" lineno="2640">
54848 <summary>
54849 Do not audit attempts to list contents of
54850 directories with the default file type.
54851 @@ -78505,7 +78515,7 @@ Domain to not audit.
54852 </summary>
54853 </param>
54854 </interface>
54855 -<interface name="files_manage_default_dirs" lineno="2613">
54856 +<interface name="files_manage_default_dirs" lineno="2659">
54857 <summary>
54858 Create, read, write, and delete directories with
54859 the default file type.
54860 @@ -78516,7 +78526,7 @@ Domain allowed access.
54861 </summary>
54862 </param>
54863 </interface>
54864 -<interface name="files_mounton_default" lineno="2631">
54865 +<interface name="files_mounton_default" lineno="2677">
54866 <summary>
54867 Mount a filesystem on a directory with the default file type.
54868 </summary>
54869 @@ -78526,7 +78536,7 @@ Domain allowed access.
54870 </summary>
54871 </param>
54872 </interface>
54873 -<interface name="files_dontaudit_getattr_default_files" lineno="2650">
54874 +<interface name="files_dontaudit_getattr_default_files" lineno="2696">
54875 <summary>
54876 Do not audit attempts to get the attributes of
54877 files with the default file type.
54878 @@ -78537,7 +78547,7 @@ Domain to not audit.
54879 </summary>
54880 </param>
54881 </interface>
54882 -<interface name="files_read_default_files" lineno="2668">
54883 +<interface name="files_read_default_files" lineno="2714">
54884 <summary>
54885 Read files with the default file type.
54886 </summary>
54887 @@ -78547,7 +78557,7 @@ Domain allowed access.
54888 </summary>
54889 </param>
54890 </interface>
54891 -<interface name="files_dontaudit_read_default_files" lineno="2687">
54892 +<interface name="files_dontaudit_read_default_files" lineno="2733">
54893 <summary>
54894 Do not audit attempts to read files
54895 with the default file type.
54896 @@ -78558,7 +78568,7 @@ Domain to not audit.
54897 </summary>
54898 </param>
54899 </interface>
54900 -<interface name="files_manage_default_files" lineno="2706">
54901 +<interface name="files_manage_default_files" lineno="2752">
54902 <summary>
54903 Create, read, write, and delete files with
54904 the default file type.
54905 @@ -78569,7 +78579,7 @@ Domain allowed access.
54906 </summary>
54907 </param>
54908 </interface>
54909 -<interface name="files_read_default_symlinks" lineno="2724">
54910 +<interface name="files_read_default_symlinks" lineno="2770">
54911 <summary>
54912 Read symbolic links with the default file type.
54913 </summary>
54914 @@ -78579,7 +78589,7 @@ Domain allowed access.
54915 </summary>
54916 </param>
54917 </interface>
54918 -<interface name="files_read_default_sockets" lineno="2742">
54919 +<interface name="files_read_default_sockets" lineno="2788">
54920 <summary>
54921 Read sockets with the default file type.
54922 </summary>
54923 @@ -78589,7 +78599,7 @@ Domain allowed access.
54924 </summary>
54925 </param>
54926 </interface>
54927 -<interface name="files_read_default_pipes" lineno="2760">
54928 +<interface name="files_read_default_pipes" lineno="2806">
54929 <summary>
54930 Read named pipes with the default file type.
54931 </summary>
54932 @@ -78599,7 +78609,7 @@ Domain allowed access.
54933 </summary>
54934 </param>
54935 </interface>
54936 -<interface name="files_search_etc" lineno="2778">
54937 +<interface name="files_search_etc" lineno="2824">
54938 <summary>
54939 Search the contents of /etc directories.
54940 </summary>
54941 @@ -78609,7 +78619,7 @@ Domain allowed access.
54942 </summary>
54943 </param>
54944 </interface>
54945 -<interface name="files_setattr_etc_dirs" lineno="2796">
54946 +<interface name="files_setattr_etc_dirs" lineno="2842">
54947 <summary>
54948 Set the attributes of the /etc directories.
54949 </summary>
54950 @@ -78619,7 +78629,7 @@ Domain allowed access.
54951 </summary>
54952 </param>
54953 </interface>
54954 -<interface name="files_list_etc" lineno="2814">
54955 +<interface name="files_list_etc" lineno="2860">
54956 <summary>
54957 List the contents of /etc directories.
54958 </summary>
54959 @@ -78629,7 +78639,7 @@ Domain allowed access.
54960 </summary>
54961 </param>
54962 </interface>
54963 -<interface name="files_dontaudit_write_etc_dirs" lineno="2832">
54964 +<interface name="files_dontaudit_write_etc_dirs" lineno="2878">
54965 <summary>
54966 Do not audit attempts to write to /etc dirs.
54967 </summary>
54968 @@ -78639,7 +78649,7 @@ Domain to not audit.
54969 </summary>
54970 </param>
54971 </interface>
54972 -<interface name="files_rw_etc_dirs" lineno="2850">
54973 +<interface name="files_rw_etc_dirs" lineno="2896">
54974 <summary>
54975 Add and remove entries from /etc directories.
54976 </summary>
54977 @@ -78649,7 +78659,7 @@ Domain allowed access.
54978 </summary>
54979 </param>
54980 </interface>
54981 -<interface name="files_manage_etc_dirs" lineno="2869">
54982 +<interface name="files_manage_etc_dirs" lineno="2915">
54983 <summary>
54984 Manage generic directories in /etc
54985 </summary>
54986 @@ -78660,7 +78670,7 @@ Domain allowed access
54987 </param>
54988
54989 </interface>
54990 -<interface name="files_relabelto_etc_dirs" lineno="2887">
54991 +<interface name="files_relabelto_etc_dirs" lineno="2933">
54992 <summary>
54993 Relabel directories to etc_t.
54994 </summary>
54995 @@ -78670,7 +78680,7 @@ Domain allowed access.
54996 </summary>
54997 </param>
54998 </interface>
54999 -<interface name="files_mounton_etc_dirs" lineno="2906">
55000 +<interface name="files_mounton_etc_dirs" lineno="2952">
55001 <summary>
55002 Mount a filesystem on the
55003 etc directories.
55004 @@ -78681,7 +78691,7 @@ Domain allowed access.
55005 </summary>
55006 </param>
55007 </interface>
55008 -<interface name="files_watch_etc_dirs" lineno="2924">
55009 +<interface name="files_watch_etc_dirs" lineno="2970">
55010 <summary>
55011 Watch /etc directories
55012 </summary>
55013 @@ -78691,7 +78701,7 @@ Domain allowed access.
55014 </summary>
55015 </param>
55016 </interface>
55017 -<interface name="files_read_etc_files" lineno="2976">
55018 +<interface name="files_read_etc_files" lineno="3022">
55019 <summary>
55020 Read generic files in /etc.
55021 </summary>
55022 @@ -78735,7 +78745,7 @@ Domain allowed access.
55023 </param>
55024 <infoflow type="read" weight="10"/>
55025 </interface>
55026 -<interface name="files_map_etc_files" lineno="3008">
55027 +<interface name="files_map_etc_files" lineno="3054">
55028 <summary>
55029 Map generic files in /etc.
55030 </summary>
55031 @@ -78757,7 +78767,7 @@ Domain allowed access.
55032 </param>
55033 <infoflow type="read" weight="10"/>
55034 </interface>
55035 -<interface name="files_dontaudit_write_etc_files" lineno="3026">
55036 +<interface name="files_dontaudit_write_etc_files" lineno="3072">
55037 <summary>
55038 Do not audit attempts to write generic files in /etc.
55039 </summary>
55040 @@ -78767,7 +78777,7 @@ Domain allowed access.
55041 </summary>
55042 </param>
55043 </interface>
55044 -<interface name="files_rw_etc_files" lineno="3045">
55045 +<interface name="files_rw_etc_files" lineno="3091">
55046 <summary>
55047 Read and write generic files in /etc.
55048 </summary>
55049 @@ -78778,7 +78788,7 @@ Domain allowed access.
55050 </param>
55051 <rolecap/>
55052 </interface>
55053 -<interface name="files_manage_etc_files" lineno="3067">
55054 +<interface name="files_manage_etc_files" lineno="3113">
55055 <summary>
55056 Create, read, write, and delete generic
55057 files in /etc.
55058 @@ -78790,7 +78800,7 @@ Domain allowed access.
55059 </param>
55060 <rolecap/>
55061 </interface>
55062 -<interface name="files_delete_etc_files" lineno="3086">
55063 +<interface name="files_delete_etc_files" lineno="3132">
55064 <summary>
55065 Delete system configuration files in /etc.
55066 </summary>
55067 @@ -78800,7 +78810,7 @@ Domain allowed access.
55068 </summary>
55069 </param>
55070 </interface>
55071 -<interface name="files_exec_etc_files" lineno="3104">
55072 +<interface name="files_exec_etc_files" lineno="3150">
55073 <summary>
55074 Execute generic files in /etc.
55075 </summary>
55076 @@ -78810,7 +78820,7 @@ Domain allowed access.
55077 </summary>
55078 </param>
55079 </interface>
55080 -<interface name="files_get_etc_unit_status" lineno="3124">
55081 +<interface name="files_get_etc_unit_status" lineno="3170">
55082 <summary>
55083 Get etc_t service status.
55084 </summary>
55085 @@ -78820,7 +78830,7 @@ Domain allowed access.
55086 </summary>
55087 </param>
55088 </interface>
55089 -<interface name="files_start_etc_service" lineno="3142">
55090 +<interface name="files_start_etc_service" lineno="3188">
55091 <summary>
55092 start etc_t service
55093 </summary>
55094 @@ -78830,7 +78840,7 @@ Domain allowed access.
55095 </summary>
55096 </param>
55097 </interface>
55098 -<interface name="files_stop_etc_service" lineno="3160">
55099 +<interface name="files_stop_etc_service" lineno="3206">
55100 <summary>
55101 stop etc_t service
55102 </summary>
55103 @@ -78840,7 +78850,7 @@ Domain allowed access.
55104 </summary>
55105 </param>
55106 </interface>
55107 -<interface name="files_relabel_etc_files" lineno="3178">
55108 +<interface name="files_relabel_etc_files" lineno="3224">
55109 <summary>
55110 Relabel from and to generic files in /etc.
55111 </summary>
55112 @@ -78850,7 +78860,7 @@ Domain allowed access.
55113 </summary>
55114 </param>
55115 </interface>
55116 -<interface name="files_read_etc_symlinks" lineno="3197">
55117 +<interface name="files_read_etc_symlinks" lineno="3243">
55118 <summary>
55119 Read symbolic links in /etc.
55120 </summary>
55121 @@ -78860,7 +78870,17 @@ Domain allowed access.
55122 </summary>
55123 </param>
55124 </interface>
55125 -<interface name="files_manage_etc_symlinks" lineno="3215">
55126 +<interface name="files_watch_etc_symlinks" lineno="3261">
55127 +<summary>
55128 +Watch /etc symlinks
55129 +</summary>
55130 +<param name="domain">
55131 +<summary>
55132 +Domain allowed access.
55133 +</summary>
55134 +</param>
55135 +</interface>
55136 +<interface name="files_manage_etc_symlinks" lineno="3279">
55137 <summary>
55138 Create, read, write, and delete symbolic links in /etc.
55139 </summary>
55140 @@ -78870,7 +78890,7 @@ Domain allowed access.
55141 </summary>
55142 </param>
55143 </interface>
55144 -<interface name="files_etc_filetrans" lineno="3249">
55145 +<interface name="files_etc_filetrans" lineno="3313">
55146 <summary>
55147 Create objects in /etc with a private
55148 type using a type_transition.
55149 @@ -78896,7 +78916,7 @@ The name of the object being created.
55150 </summary>
55151 </param>
55152 </interface>
55153 -<interface name="files_create_boot_flag" lineno="3279">
55154 +<interface name="files_create_boot_flag" lineno="3343">
55155 <summary>
55156 Create a boot flag.
55157 </summary>
55158 @@ -78918,7 +78938,7 @@ The name of the object being created.
55159 </param>
55160 <rolecap/>
55161 </interface>
55162 -<interface name="files_delete_boot_flag" lineno="3305">
55163 +<interface name="files_delete_boot_flag" lineno="3369">
55164 <summary>
55165 Delete a boot flag.
55166 </summary>
55167 @@ -78935,7 +78955,7 @@ Domain allowed access.
55168 </param>
55169 <rolecap/>
55170 </interface>
55171 -<interface name="files_getattr_etc_runtime_dirs" lineno="3324">
55172 +<interface name="files_getattr_etc_runtime_dirs" lineno="3388">
55173 <summary>
55174 Get the attributes of the
55175 etc_runtime directories.
55176 @@ -78946,7 +78966,7 @@ Domain allowed access.
55177 </summary>
55178 </param>
55179 </interface>
55180 -<interface name="files_mounton_etc_runtime_dirs" lineno="3343">
55181 +<interface name="files_mounton_etc_runtime_dirs" lineno="3407">
55182 <summary>
55183 Mount a filesystem on the
55184 etc_runtime directories.
55185 @@ -78957,7 +78977,7 @@ Domain allowed access.
55186 </summary>
55187 </param>
55188 </interface>
55189 -<interface name="files_relabelto_etc_runtime_dirs" lineno="3361">
55190 +<interface name="files_relabelto_etc_runtime_dirs" lineno="3425">
55191 <summary>
55192 Relabel to etc_runtime_t dirs.
55193 </summary>
55194 @@ -78967,7 +78987,7 @@ Domain allowed access.
55195 </summary>
55196 </param>
55197 </interface>
55198 -<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3379">
55199 +<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3443">
55200 <summary>
55201 Do not audit attempts to set the attributes of the etc_runtime files
55202 </summary>
55203 @@ -78977,7 +78997,7 @@ Domain to not audit.
55204 </summary>
55205 </param>
55206 </interface>
55207 -<interface name="files_read_etc_runtime_files" lineno="3417">
55208 +<interface name="files_read_etc_runtime_files" lineno="3481">
55209 <summary>
55210 Read files in /etc that are dynamically
55211 created on boot, such as mtab.
55212 @@ -79007,7 +79027,7 @@ Domain allowed access.
55213 <infoflow type="read" weight="10" />
55214 <rolecap/>
55215 </interface>
55216 -<interface name="files_dontaudit_read_etc_runtime_files" lineno="3439">
55217 +<interface name="files_dontaudit_read_etc_runtime_files" lineno="3503">
55218 <summary>
55219 Do not audit attempts to read files
55220 in /etc that are dynamically
55221 @@ -79019,7 +79039,7 @@ Domain to not audit.
55222 </summary>
55223 </param>
55224 </interface>
55225 -<interface name="files_dontaudit_read_etc_files" lineno="3458">
55226 +<interface name="files_dontaudit_read_etc_files" lineno="3522">
55227 <summary>
55228 Do not audit attempts to read files
55229 in /etc
55230 @@ -79030,7 +79050,7 @@ Domain to not audit.
55231 </summary>
55232 </param>
55233 </interface>
55234 -<interface name="files_dontaudit_write_etc_runtime_files" lineno="3477">
55235 +<interface name="files_dontaudit_write_etc_runtime_files" lineno="3541">
55236 <summary>
55237 Do not audit attempts to write
55238 etc runtime files.
55239 @@ -79041,7 +79061,7 @@ Domain to not audit.
55240 </summary>
55241 </param>
55242 </interface>
55243 -<interface name="files_rw_etc_runtime_files" lineno="3497">
55244 +<interface name="files_rw_etc_runtime_files" lineno="3561">
55245 <summary>
55246 Read and write files in /etc that are dynamically
55247 created on boot, such as mtab.
55248 @@ -79053,7 +79073,7 @@ Domain allowed access.
55249 </param>
55250 <rolecap/>
55251 </interface>
55252 -<interface name="files_manage_etc_runtime_files" lineno="3519">
55253 +<interface name="files_manage_etc_runtime_files" lineno="3583">
55254 <summary>
55255 Create, read, write, and delete files in
55256 /etc that are dynamically created on boot,
55257 @@ -79066,7 +79086,7 @@ Domain allowed access.
55258 </param>
55259 <rolecap/>
55260 </interface>
55261 -<interface name="files_relabelto_etc_runtime_files" lineno="3537">
55262 +<interface name="files_relabelto_etc_runtime_files" lineno="3601">
55263 <summary>
55264 Relabel to etc_runtime_t files.
55265 </summary>
55266 @@ -79076,7 +79096,7 @@ Domain allowed access.
55267 </summary>
55268 </param>
55269 </interface>
55270 -<interface name="files_etc_filetrans_etc_runtime" lineno="3566">
55271 +<interface name="files_etc_filetrans_etc_runtime" lineno="3630">
55272 <summary>
55273 Create, etc runtime objects with an automatic
55274 type transition.
55275 @@ -79097,7 +79117,7 @@ The name of the object being created.
55276 </summary>
55277 </param>
55278 </interface>
55279 -<interface name="files_getattr_home_dir" lineno="3585">
55280 +<interface name="files_getattr_home_dir" lineno="3649">
55281 <summary>
55282 Get the attributes of the home directories root
55283 (/home).
55284 @@ -79108,7 +79128,7 @@ Domain allowed access.
55285 </summary>
55286 </param>
55287 </interface>
55288 -<interface name="files_dontaudit_getattr_home_dir" lineno="3606">
55289 +<interface name="files_dontaudit_getattr_home_dir" lineno="3670">
55290 <summary>
55291 Do not audit attempts to get the
55292 attributes of the home directories root
55293 @@ -79120,7 +79140,7 @@ Domain to not audit.
55294 </summary>
55295 </param>
55296 </interface>
55297 -<interface name="files_search_home" lineno="3625">
55298 +<interface name="files_search_home" lineno="3689">
55299 <summary>
55300 Search home directories root (/home).
55301 </summary>
55302 @@ -79130,7 +79150,7 @@ Domain allowed access.
55303 </summary>
55304 </param>
55305 </interface>
55306 -<interface name="files_dontaudit_search_home" lineno="3645">
55307 +<interface name="files_dontaudit_search_home" lineno="3709">
55308 <summary>
55309 Do not audit attempts to search
55310 home directories root (/home).
55311 @@ -79141,7 +79161,7 @@ Domain to not audit.
55312 </summary>
55313 </param>
55314 </interface>
55315 -<interface name="files_dontaudit_list_home" lineno="3665">
55316 +<interface name="files_dontaudit_list_home" lineno="3729">
55317 <summary>
55318 Do not audit attempts to list
55319 home directories root (/home).
55320 @@ -79152,7 +79172,7 @@ Domain to not audit.
55321 </summary>
55322 </param>
55323 </interface>
55324 -<interface name="files_list_home" lineno="3684">
55325 +<interface name="files_list_home" lineno="3748">
55326 <summary>
55327 Get listing of home directories.
55328 </summary>
55329 @@ -79162,7 +79182,7 @@ Domain allowed access.
55330 </summary>
55331 </param>
55332 </interface>
55333 -<interface name="files_relabelto_home" lineno="3703">
55334 +<interface name="files_relabelto_home" lineno="3767">
55335 <summary>
55336 Relabel to user home root (/home).
55337 </summary>
55338 @@ -79172,7 +79192,7 @@ Domain allowed access.
55339 </summary>
55340 </param>
55341 </interface>
55342 -<interface name="files_relabelfrom_home" lineno="3721">
55343 +<interface name="files_relabelfrom_home" lineno="3785">
55344 <summary>
55345 Relabel from user home root (/home).
55346 </summary>
55347 @@ -79182,7 +79202,7 @@ Domain allowed access.
55348 </summary>
55349 </param>
55350 </interface>
55351 -<interface name="files_home_filetrans" lineno="3754">
55352 +<interface name="files_home_filetrans" lineno="3818">
55353 <summary>
55354 Create objects in /home.
55355 </summary>
55356 @@ -79207,7 +79227,7 @@ The name of the object being created.
55357 </summary>
55358 </param>
55359 </interface>
55360 -<interface name="files_getattr_lost_found_dirs" lineno="3772">
55361 +<interface name="files_getattr_lost_found_dirs" lineno="3836">
55362 <summary>
55363 Get the attributes of lost+found directories.
55364 </summary>
55365 @@ -79217,7 +79237,7 @@ Domain allowed access.
55366 </summary>
55367 </param>
55368 </interface>
55369 -<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3791">
55370 +<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3855">
55371 <summary>
55372 Do not audit attempts to get the attributes of
55373 lost+found directories.
55374 @@ -79228,7 +79248,7 @@ Domain to not audit.
55375 </summary>
55376 </param>
55377 </interface>
55378 -<interface name="files_list_lost_found" lineno="3809">
55379 +<interface name="files_list_lost_found" lineno="3873">
55380 <summary>
55381 List the contents of lost+found directories.
55382 </summary>
55383 @@ -79238,7 +79258,7 @@ Domain allowed access.
55384 </summary>
55385 </param>
55386 </interface>
55387 -<interface name="files_manage_lost_found" lineno="3829">
55388 +<interface name="files_manage_lost_found" lineno="3893">
55389 <summary>
55390 Create, read, write, and delete objects in
55391 lost+found directories.
55392 @@ -79250,7 +79270,7 @@ Domain allowed access.
55393 </param>
55394 <rolecap/>
55395 </interface>
55396 -<interface name="files_search_mnt" lineno="3851">
55397 +<interface name="files_search_mnt" lineno="3915">
55398 <summary>
55399 Search the contents of /mnt.
55400 </summary>
55401 @@ -79260,7 +79280,7 @@ Domain allowed access.
55402 </summary>
55403 </param>
55404 </interface>
55405 -<interface name="files_dontaudit_search_mnt" lineno="3869">
55406 +<interface name="files_dontaudit_search_mnt" lineno="3933">
55407 <summary>
55408 Do not audit attempts to search /mnt.
55409 </summary>
55410 @@ -79270,7 +79290,7 @@ Domain to not audit.
55411 </summary>
55412 </param>
55413 </interface>
55414 -<interface name="files_list_mnt" lineno="3887">
55415 +<interface name="files_list_mnt" lineno="3951">
55416 <summary>
55417 List the contents of /mnt.
55418 </summary>
55419 @@ -79280,7 +79300,7 @@ Domain allowed access.
55420 </summary>
55421 </param>
55422 </interface>
55423 -<interface name="files_dontaudit_list_mnt" lineno="3905">
55424 +<interface name="files_dontaudit_list_mnt" lineno="3969">
55425 <summary>
55426 Do not audit attempts to list the contents of /mnt.
55427 </summary>
55428 @@ -79290,7 +79310,7 @@ Domain allowed access.
55429 </summary>
55430 </param>
55431 </interface>
55432 -<interface name="files_mounton_mnt" lineno="3923">
55433 +<interface name="files_mounton_mnt" lineno="3987">
55434 <summary>
55435 Mount a filesystem on /mnt.
55436 </summary>
55437 @@ -79300,7 +79320,7 @@ Domain allowed access.
55438 </summary>
55439 </param>
55440 </interface>
55441 -<interface name="files_manage_mnt_dirs" lineno="3942">
55442 +<interface name="files_manage_mnt_dirs" lineno="4006">
55443 <summary>
55444 Create, read, write, and delete directories in /mnt.
55445 </summary>
55446 @@ -79311,7 +79331,7 @@ Domain allowed access.
55447 </param>
55448 <rolecap/>
55449 </interface>
55450 -<interface name="files_manage_mnt_files" lineno="3960">
55451 +<interface name="files_manage_mnt_files" lineno="4024">
55452 <summary>
55453 Create, read, write, and delete files in /mnt.
55454 </summary>
55455 @@ -79321,7 +79341,7 @@ Domain allowed access.
55456 </summary>
55457 </param>
55458 </interface>
55459 -<interface name="files_read_mnt_files" lineno="3978">
55460 +<interface name="files_read_mnt_files" lineno="4042">
55461 <summary>
55462 read files in /mnt.
55463 </summary>
55464 @@ -79331,7 +79351,7 @@ Domain allowed access.
55465 </summary>
55466 </param>
55467 </interface>
55468 -<interface name="files_read_mnt_symlinks" lineno="3996">
55469 +<interface name="files_read_mnt_symlinks" lineno="4060">
55470 <summary>
55471 Read symbolic links in /mnt.
55472 </summary>
55473 @@ -79341,7 +79361,7 @@ Domain allowed access.
55474 </summary>
55475 </param>
55476 </interface>
55477 -<interface name="files_manage_mnt_symlinks" lineno="4014">
55478 +<interface name="files_manage_mnt_symlinks" lineno="4078">
55479 <summary>
55480 Create, read, write, and delete symbolic links in /mnt.
55481 </summary>
55482 @@ -79351,7 +79371,7 @@ Domain allowed access.
55483 </summary>
55484 </param>
55485 </interface>
55486 -<interface name="files_search_kernel_modules" lineno="4032">
55487 +<interface name="files_search_kernel_modules" lineno="4096">
55488 <summary>
55489 Search the contents of the kernel module directories.
55490 </summary>
55491 @@ -79361,7 +79381,7 @@ Domain allowed access.
55492 </summary>
55493 </param>
55494 </interface>
55495 -<interface name="files_list_kernel_modules" lineno="4051">
55496 +<interface name="files_list_kernel_modules" lineno="4115">
55497 <summary>
55498 List the contents of the kernel module directories.
55499 </summary>
55500 @@ -79371,7 +79391,7 @@ Domain allowed access.
55501 </summary>
55502 </param>
55503 </interface>
55504 -<interface name="files_getattr_kernel_modules" lineno="4070">
55505 +<interface name="files_getattr_kernel_modules" lineno="4134">
55506 <summary>
55507 Get the attributes of kernel module files.
55508 </summary>
55509 @@ -79381,7 +79401,7 @@ Domain allowed access.
55510 </summary>
55511 </param>
55512 </interface>
55513 -<interface name="files_read_kernel_modules" lineno="4088">
55514 +<interface name="files_read_kernel_modules" lineno="4152">
55515 <summary>
55516 Read kernel module files.
55517 </summary>
55518 @@ -79391,7 +79411,17 @@ Domain allowed access.
55519 </summary>
55520 </param>
55521 </interface>
55522 -<interface name="files_write_kernel_modules" lineno="4108">
55523 +<interface name="files_mmap_read_kernel_modules" lineno="4172">
55524 +<summary>
55525 +Read and mmap kernel module files.
55526 +</summary>
55527 +<param name="domain">
55528 +<summary>
55529 +Domain allowed access.
55530 +</summary>
55531 +</param>
55532 +</interface>
55533 +<interface name="files_write_kernel_modules" lineno="4193">
55534 <summary>
55535 Write kernel module files.
55536 </summary>
55537 @@ -79401,7 +79431,7 @@ Domain allowed access.
55538 </summary>
55539 </param>
55540 </interface>
55541 -<interface name="files_delete_kernel_modules" lineno="4127">
55542 +<interface name="files_delete_kernel_modules" lineno="4212">
55543 <summary>
55544 Delete kernel module files.
55545 </summary>
55546 @@ -79411,7 +79441,7 @@ Domain allowed access.
55547 </summary>
55548 </param>
55549 </interface>
55550 -<interface name="files_manage_kernel_modules" lineno="4147">
55551 +<interface name="files_manage_kernel_modules" lineno="4232">
55552 <summary>
55553 Create, read, write, and delete
55554 kernel module files.
55555 @@ -79423,7 +79453,7 @@ Domain allowed access.
55556 </param>
55557 <rolecap/>
55558 </interface>
55559 -<interface name="files_relabel_kernel_modules" lineno="4166">
55560 +<interface name="files_relabel_kernel_modules" lineno="4252">
55561 <summary>
55562 Relabel from and to kernel module files.
55563 </summary>
55564 @@ -79433,7 +79463,7 @@ Domain allowed access.
55565 </summary>
55566 </param>
55567 </interface>
55568 -<interface name="files_kernel_modules_filetrans" lineno="4201">
55569 +<interface name="files_kernel_modules_filetrans" lineno="4287">
55570 <summary>
55571 Create objects in the kernel module directories
55572 with a private type via an automatic type transition.
55573 @@ -79459,7 +79489,7 @@ The name of the object being created.
55574 </summary>
55575 </param>
55576 </interface>
55577 -<interface name="files_load_kernel_modules" lineno="4219">
55578 +<interface name="files_load_kernel_modules" lineno="4305">
55579 <summary>
55580 Load kernel module files.
55581 </summary>
55582 @@ -79469,7 +79499,7 @@ Domain allowed access.
55583 </summary>
55584 </param>
55585 </interface>
55586 -<interface name="files_list_world_readable" lineno="4239">
55587 +<interface name="files_list_world_readable" lineno="4325">
55588 <summary>
55589 List world-readable directories.
55590 </summary>
55591 @@ -79480,7 +79510,7 @@ Domain allowed access.
55592 </param>
55593 <rolecap/>
55594 </interface>
55595 -<interface name="files_read_world_readable_files" lineno="4258">
55596 +<interface name="files_read_world_readable_files" lineno="4344">
55597 <summary>
55598 Read world-readable files.
55599 </summary>
55600 @@ -79491,7 +79521,7 @@ Domain allowed access.
55601 </param>
55602 <rolecap/>
55603 </interface>
55604 -<interface name="files_read_world_readable_symlinks" lineno="4277">
55605 +<interface name="files_read_world_readable_symlinks" lineno="4363">
55606 <summary>
55607 Read world-readable symbolic links.
55608 </summary>
55609 @@ -79502,7 +79532,7 @@ Domain allowed access.
55610 </param>
55611 <rolecap/>
55612 </interface>
55613 -<interface name="files_read_world_readable_pipes" lineno="4295">
55614 +<interface name="files_read_world_readable_pipes" lineno="4381">
55615 <summary>
55616 Read world-readable named pipes.
55617 </summary>
55618 @@ -79512,7 +79542,7 @@ Domain allowed access.
55619 </summary>
55620 </param>
55621 </interface>
55622 -<interface name="files_read_world_readable_sockets" lineno="4313">
55623 +<interface name="files_read_world_readable_sockets" lineno="4399">
55624 <summary>
55625 Read world-readable sockets.
55626 </summary>
55627 @@ -79522,7 +79552,7 @@ Domain allowed access.
55628 </summary>
55629 </param>
55630 </interface>
55631 -<interface name="files_associate_tmp" lineno="4333">
55632 +<interface name="files_associate_tmp" lineno="4419">
55633 <summary>
55634 Allow the specified type to associate
55635 to a filesystem with the type of the
55636 @@ -79534,7 +79564,7 @@ Type of the file to associate.
55637 </summary>
55638 </param>
55639 </interface>
55640 -<interface name="files_getattr_tmp_dirs" lineno="4351">
55641 +<interface name="files_getattr_tmp_dirs" lineno="4437">
55642 <summary>
55643 Get the attributes of the tmp directory (/tmp).
55644 </summary>
55645 @@ -79544,7 +79574,7 @@ Domain allowed access.
55646 </summary>
55647 </param>
55648 </interface>
55649 -<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4370">
55650 +<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4456">
55651 <summary>
55652 Do not audit attempts to get the
55653 attributes of the tmp directory (/tmp).
55654 @@ -79555,7 +79585,7 @@ Domain allowed access.
55655 </summary>
55656 </param>
55657 </interface>
55658 -<interface name="files_search_tmp" lineno="4388">
55659 +<interface name="files_search_tmp" lineno="4474">
55660 <summary>
55661 Search the tmp directory (/tmp).
55662 </summary>
55663 @@ -79565,7 +79595,7 @@ Domain allowed access.
55664 </summary>
55665 </param>
55666 </interface>
55667 -<interface name="files_dontaudit_search_tmp" lineno="4406">
55668 +<interface name="files_dontaudit_search_tmp" lineno="4492">
55669 <summary>
55670 Do not audit attempts to search the tmp directory (/tmp).
55671 </summary>
55672 @@ -79575,7 +79605,7 @@ Domain to not audit.
55673 </summary>
55674 </param>
55675 </interface>
55676 -<interface name="files_list_tmp" lineno="4424">
55677 +<interface name="files_list_tmp" lineno="4510">
55678 <summary>
55679 Read the tmp directory (/tmp).
55680 </summary>
55681 @@ -79585,7 +79615,7 @@ Domain allowed access.
55682 </summary>
55683 </param>
55684 </interface>
55685 -<interface name="files_dontaudit_list_tmp" lineno="4442">
55686 +<interface name="files_dontaudit_list_tmp" lineno="4528">
55687 <summary>
55688 Do not audit listing of the tmp directory (/tmp).
55689 </summary>
55690 @@ -79595,7 +79625,7 @@ Domain not to audit.
55691 </summary>
55692 </param>
55693 </interface>
55694 -<interface name="files_delete_tmp_dir_entry" lineno="4460">
55695 +<interface name="files_delete_tmp_dir_entry" lineno="4546">
55696 <summary>
55697 Remove entries from the tmp directory.
55698 </summary>
55699 @@ -79605,7 +79635,7 @@ Domain allowed access.
55700 </summary>
55701 </param>
55702 </interface>
55703 -<interface name="files_read_generic_tmp_files" lineno="4478">
55704 +<interface name="files_read_generic_tmp_files" lineno="4564">
55705 <summary>
55706 Read files in the tmp directory (/tmp).
55707 </summary>
55708 @@ -79615,7 +79645,7 @@ Domain allowed access.
55709 </summary>
55710 </param>
55711 </interface>
55712 -<interface name="files_manage_generic_tmp_dirs" lineno="4496">
55713 +<interface name="files_manage_generic_tmp_dirs" lineno="4582">
55714 <summary>
55715 Manage temporary directories in /tmp.
55716 </summary>
55717 @@ -79625,7 +79655,7 @@ Domain allowed access.
55718 </summary>
55719 </param>
55720 </interface>
55721 -<interface name="files_manage_generic_tmp_files" lineno="4514">
55722 +<interface name="files_manage_generic_tmp_files" lineno="4600">
55723 <summary>
55724 Manage temporary files and directories in /tmp.
55725 </summary>
55726 @@ -79635,7 +79665,7 @@ Domain allowed access.
55727 </summary>
55728 </param>
55729 </interface>
55730 -<interface name="files_read_generic_tmp_symlinks" lineno="4532">
55731 +<interface name="files_read_generic_tmp_symlinks" lineno="4618">
55732 <summary>
55733 Read symbolic links in the tmp directory (/tmp).
55734 </summary>
55735 @@ -79645,7 +79675,7 @@ Domain allowed access.
55736 </summary>
55737 </param>
55738 </interface>
55739 -<interface name="files_rw_generic_tmp_sockets" lineno="4550">
55740 +<interface name="files_rw_generic_tmp_sockets" lineno="4636">
55741 <summary>
55742 Read and write generic named sockets in the tmp directory (/tmp).
55743 </summary>
55744 @@ -79655,7 +79685,7 @@ Domain allowed access.
55745 </summary>
55746 </param>
55747 </interface>
55748 -<interface name="files_mounton_tmp" lineno="4568">
55749 +<interface name="files_mounton_tmp" lineno="4654">
55750 <summary>
55751 Mount filesystems in the tmp directory (/tmp)
55752 </summary>
55753 @@ -79665,7 +79695,7 @@ Domain allowed access.
55754 </summary>
55755 </param>
55756 </interface>
55757 -<interface name="files_setattr_all_tmp_dirs" lineno="4586">
55758 +<interface name="files_setattr_all_tmp_dirs" lineno="4672">
55759 <summary>
55760 Set the attributes of all tmp directories.
55761 </summary>
55762 @@ -79675,7 +79705,7 @@ Domain allowed access.
55763 </summary>
55764 </param>
55765 </interface>
55766 -<interface name="files_list_all_tmp" lineno="4604">
55767 +<interface name="files_list_all_tmp" lineno="4690">
55768 <summary>
55769 List all tmp directories.
55770 </summary>
55771 @@ -79685,7 +79715,7 @@ Domain allowed access.
55772 </summary>
55773 </param>
55774 </interface>
55775 -<interface name="files_relabel_all_tmp_dirs" lineno="4624">
55776 +<interface name="files_relabel_all_tmp_dirs" lineno="4710">
55777 <summary>
55778 Relabel to and from all temporary
55779 directory types.
55780 @@ -79697,7 +79727,7 @@ Domain allowed access.
55781 </param>
55782 <rolecap/>
55783 </interface>
55784 -<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4645">
55785 +<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4731">
55786 <summary>
55787 Do not audit attempts to get the attributes
55788 of all tmp files.
55789 @@ -79708,7 +79738,7 @@ Domain not to audit.
55790 </summary>
55791 </param>
55792 </interface>
55793 -<interface name="files_getattr_all_tmp_files" lineno="4664">
55794 +<interface name="files_getattr_all_tmp_files" lineno="4750">
55795 <summary>
55796 Allow attempts to get the attributes
55797 of all tmp files.
55798 @@ -79719,7 +79749,7 @@ Domain allowed access.
55799 </summary>
55800 </param>
55801 </interface>
55802 -<interface name="files_relabel_all_tmp_files" lineno="4684">
55803 +<interface name="files_relabel_all_tmp_files" lineno="4770">
55804 <summary>
55805 Relabel to and from all temporary
55806 file types.
55807 @@ -79731,7 +79761,7 @@ Domain allowed access.
55808 </param>
55809 <rolecap/>
55810 </interface>
55811 -<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4705">
55812 +<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4791">
55813 <summary>
55814 Do not audit attempts to get the attributes
55815 of all tmp sock_file.
55816 @@ -79742,7 +79772,7 @@ Domain not to audit.
55817 </summary>
55818 </param>
55819 </interface>
55820 -<interface name="files_read_all_tmp_files" lineno="4723">
55821 +<interface name="files_read_all_tmp_files" lineno="4809">
55822 <summary>
55823 Read all tmp files.
55824 </summary>
55825 @@ -79752,7 +79782,7 @@ Domain allowed access.
55826 </summary>
55827 </param>
55828 </interface>
55829 -<interface name="files_tmp_filetrans" lineno="4757">
55830 +<interface name="files_tmp_filetrans" lineno="4843">
55831 <summary>
55832 Create an object in the tmp directories, with a private
55833 type using a type transition.
55834 @@ -79778,7 +79808,7 @@ The name of the object being created.
55835 </summary>
55836 </param>
55837 </interface>
55838 -<interface name="files_purge_tmp" lineno="4775">
55839 +<interface name="files_purge_tmp" lineno="4861">
55840 <summary>
55841 Delete the contents of /tmp.
55842 </summary>
55843 @@ -79788,7 +79818,7 @@ Domain allowed access.
55844 </summary>
55845 </param>
55846 </interface>
55847 -<interface name="files_setattr_usr_dirs" lineno="4798">
55848 +<interface name="files_setattr_usr_dirs" lineno="4884">
55849 <summary>
55850 Set the attributes of the /usr directory.
55851 </summary>
55852 @@ -79798,7 +79828,7 @@ Domain allowed access.
55853 </summary>
55854 </param>
55855 </interface>
55856 -<interface name="files_search_usr" lineno="4816">
55857 +<interface name="files_search_usr" lineno="4902">
55858 <summary>
55859 Search the content of /usr.
55860 </summary>
55861 @@ -79808,7 +79838,7 @@ Domain allowed access.
55862 </summary>
55863 </param>
55864 </interface>
55865 -<interface name="files_list_usr" lineno="4835">
55866 +<interface name="files_list_usr" lineno="4921">
55867 <summary>
55868 List the contents of generic
55869 directories in /usr.
55870 @@ -79819,7 +79849,7 @@ Domain allowed access.
55871 </summary>
55872 </param>
55873 </interface>
55874 -<interface name="files_dontaudit_write_usr_dirs" lineno="4853">
55875 +<interface name="files_dontaudit_write_usr_dirs" lineno="4939">
55876 <summary>
55877 Do not audit write of /usr dirs
55878 </summary>
55879 @@ -79829,7 +79859,7 @@ Domain to not audit.
55880 </summary>
55881 </param>
55882 </interface>
55883 -<interface name="files_rw_usr_dirs" lineno="4871">
55884 +<interface name="files_rw_usr_dirs" lineno="4957">
55885 <summary>
55886 Add and remove entries from /usr directories.
55887 </summary>
55888 @@ -79839,7 +79869,7 @@ Domain allowed access.
55889 </summary>
55890 </param>
55891 </interface>
55892 -<interface name="files_dontaudit_rw_usr_dirs" lineno="4890">
55893 +<interface name="files_dontaudit_rw_usr_dirs" lineno="4976">
55894 <summary>
55895 Do not audit attempts to add and remove
55896 entries from /usr directories.
55897 @@ -79850,7 +79880,7 @@ Domain to not audit.
55898 </summary>
55899 </param>
55900 </interface>
55901 -<interface name="files_delete_usr_dirs" lineno="4908">
55902 +<interface name="files_delete_usr_dirs" lineno="4994">
55903 <summary>
55904 Delete generic directories in /usr in the caller domain.
55905 </summary>
55906 @@ -79860,7 +79890,7 @@ Domain allowed access.
55907 </summary>
55908 </param>
55909 </interface>
55910 -<interface name="files_watch_usr_dirs" lineno="4926">
55911 +<interface name="files_watch_usr_dirs" lineno="5012">
55912 <summary>
55913 Watch generic directories in /usr.
55914 </summary>
55915 @@ -79870,7 +79900,7 @@ Domain allowed access.
55916 </summary>
55917 </param>
55918 </interface>
55919 -<interface name="files_delete_usr_files" lineno="4944">
55920 +<interface name="files_delete_usr_files" lineno="5030">
55921 <summary>
55922 Delete generic files in /usr in the caller domain.
55923 </summary>
55924 @@ -79880,7 +79910,7 @@ Domain allowed access.
55925 </summary>
55926 </param>
55927 </interface>
55928 -<interface name="files_getattr_usr_files" lineno="4962">
55929 +<interface name="files_getattr_usr_files" lineno="5048">
55930 <summary>
55931 Get the attributes of files in /usr.
55932 </summary>
55933 @@ -79890,7 +79920,7 @@ Domain allowed access.
55934 </summary>
55935 </param>
55936 </interface>
55937 -<interface name="files_map_usr_files" lineno="4981">
55938 +<interface name="files_map_usr_files" lineno="5067">
55939 <summary>
55940 Map generic files in /usr.
55941 </summary>
55942 @@ -79901,7 +79931,7 @@ Domain allowed access.
55943 </param>
55944 <infoflow type="read" weight="10"/>
55945 </interface>
55946 -<interface name="files_read_usr_files" lineno="5017">
55947 +<interface name="files_read_usr_files" lineno="5103">
55948 <summary>
55949 Read generic files in /usr.
55950 </summary>
55951 @@ -79929,7 +79959,7 @@ Domain allowed access.
55952 </param>
55953 <infoflow type="read" weight="10"/>
55954 </interface>
55955 -<interface name="files_exec_usr_files" lineno="5037">
55956 +<interface name="files_exec_usr_files" lineno="5123">
55957 <summary>
55958 Execute generic programs in /usr in the caller domain.
55959 </summary>
55960 @@ -79939,7 +79969,7 @@ Domain allowed access.
55961 </summary>
55962 </param>
55963 </interface>
55964 -<interface name="files_dontaudit_write_usr_files" lineno="5057">
55965 +<interface name="files_dontaudit_write_usr_files" lineno="5143">
55966 <summary>
55967 dontaudit write of /usr files
55968 </summary>
55969 @@ -79949,7 +79979,7 @@ Domain to not audit.
55970 </summary>
55971 </param>
55972 </interface>
55973 -<interface name="files_manage_usr_files" lineno="5075">
55974 +<interface name="files_manage_usr_files" lineno="5161">
55975 <summary>
55976 Create, read, write, and delete files in the /usr directory.
55977 </summary>
55978 @@ -79959,7 +79989,7 @@ Domain allowed access.
55979 </summary>
55980 </param>
55981 </interface>
55982 -<interface name="files_relabelto_usr_files" lineno="5093">
55983 +<interface name="files_relabelto_usr_files" lineno="5179">
55984 <summary>
55985 Relabel a file to the type used in /usr.
55986 </summary>
55987 @@ -79969,7 +79999,7 @@ Domain allowed access.
55988 </summary>
55989 </param>
55990 </interface>
55991 -<interface name="files_relabelfrom_usr_files" lineno="5111">
55992 +<interface name="files_relabelfrom_usr_files" lineno="5197">
55993 <summary>
55994 Relabel a file from the type used in /usr.
55995 </summary>
55996 @@ -79979,7 +80009,7 @@ Domain allowed access.
55997 </summary>
55998 </param>
55999 </interface>
56000 -<interface name="files_read_usr_symlinks" lineno="5129">
56001 +<interface name="files_read_usr_symlinks" lineno="5215">
56002 <summary>
56003 Read symbolic links in /usr.
56004 </summary>
56005 @@ -79989,7 +80019,7 @@ Domain allowed access.
56006 </summary>
56007 </param>
56008 </interface>
56009 -<interface name="files_usr_filetrans" lineno="5162">
56010 +<interface name="files_usr_filetrans" lineno="5248">
56011 <summary>
56012 Create objects in the /usr directory
56013 </summary>
56014 @@ -80014,7 +80044,7 @@ The name of the object being created.
56015 </summary>
56016 </param>
56017 </interface>
56018 -<interface name="files_search_src" lineno="5180">
56019 +<interface name="files_search_src" lineno="5266">
56020 <summary>
56021 Search directories in /usr/src.
56022 </summary>
56023 @@ -80024,7 +80054,7 @@ Domain allowed access.
56024 </summary>
56025 </param>
56026 </interface>
56027 -<interface name="files_dontaudit_search_src" lineno="5198">
56028 +<interface name="files_dontaudit_search_src" lineno="5284">
56029 <summary>
56030 Do not audit attempts to search /usr/src.
56031 </summary>
56032 @@ -80034,7 +80064,7 @@ Domain to not audit.
56033 </summary>
56034 </param>
56035 </interface>
56036 -<interface name="files_getattr_usr_src_files" lineno="5216">
56037 +<interface name="files_getattr_usr_src_files" lineno="5302">
56038 <summary>
56039 Get the attributes of files in /usr/src.
56040 </summary>
56041 @@ -80044,7 +80074,7 @@ Domain allowed access.
56042 </summary>
56043 </param>
56044 </interface>
56045 -<interface name="files_read_usr_src_files" lineno="5237">
56046 +<interface name="files_read_usr_src_files" lineno="5323">
56047 <summary>
56048 Read files in /usr/src.
56049 </summary>
56050 @@ -80054,7 +80084,7 @@ Domain allowed access.
56051 </summary>
56052 </param>
56053 </interface>
56054 -<interface name="files_exec_usr_src_files" lineno="5258">
56055 +<interface name="files_exec_usr_src_files" lineno="5344">
56056 <summary>
56057 Execute programs in /usr/src in the caller domain.
56058 </summary>
56059 @@ -80064,7 +80094,7 @@ Domain allowed access.
56060 </summary>
56061 </param>
56062 </interface>
56063 -<interface name="files_create_kernel_symbol_table" lineno="5278">
56064 +<interface name="files_create_kernel_symbol_table" lineno="5364">
56065 <summary>
56066 Install a system.map into the /boot directory.
56067 </summary>
56068 @@ -80074,7 +80104,7 @@ Domain allowed access.
56069 </summary>
56070 </param>
56071 </interface>
56072 -<interface name="files_read_kernel_symbol_table" lineno="5297">
56073 +<interface name="files_read_kernel_symbol_table" lineno="5383">
56074 <summary>
56075 Read system.map in the /boot directory.
56076 </summary>
56077 @@ -80084,7 +80114,7 @@ Domain allowed access.
56078 </summary>
56079 </param>
56080 </interface>
56081 -<interface name="files_delete_kernel_symbol_table" lineno="5316">
56082 +<interface name="files_delete_kernel_symbol_table" lineno="5402">
56083 <summary>
56084 Delete a system.map in the /boot directory.
56085 </summary>
56086 @@ -80094,7 +80124,7 @@ Domain allowed access.
56087 </summary>
56088 </param>
56089 </interface>
56090 -<interface name="files_search_var" lineno="5335">
56091 +<interface name="files_search_var" lineno="5421">
56092 <summary>
56093 Search the contents of /var.
56094 </summary>
56095 @@ -80104,7 +80134,7 @@ Domain allowed access.
56096 </summary>
56097 </param>
56098 </interface>
56099 -<interface name="files_dontaudit_write_var_dirs" lineno="5353">
56100 +<interface name="files_dontaudit_write_var_dirs" lineno="5439">
56101 <summary>
56102 Do not audit attempts to write to /var.
56103 </summary>
56104 @@ -80114,7 +80144,7 @@ Domain to not audit.
56105 </summary>
56106 </param>
56107 </interface>
56108 -<interface name="files_write_var_dirs" lineno="5371">
56109 +<interface name="files_write_var_dirs" lineno="5457">
56110 <summary>
56111 Allow attempts to write to /var.dirs
56112 </summary>
56113 @@ -80124,7 +80154,7 @@ Domain allowed access.
56114 </summary>
56115 </param>
56116 </interface>
56117 -<interface name="files_dontaudit_search_var" lineno="5390">
56118 +<interface name="files_dontaudit_search_var" lineno="5476">
56119 <summary>
56120 Do not audit attempts to search
56121 the contents of /var.
56122 @@ -80135,7 +80165,7 @@ Domain to not audit.
56123 </summary>
56124 </param>
56125 </interface>
56126 -<interface name="files_list_var" lineno="5408">
56127 +<interface name="files_list_var" lineno="5494">
56128 <summary>
56129 List the contents of /var.
56130 </summary>
56131 @@ -80145,7 +80175,7 @@ Domain allowed access.
56132 </summary>
56133 </param>
56134 </interface>
56135 -<interface name="files_dontaudit_list_var" lineno="5427">
56136 +<interface name="files_dontaudit_list_var" lineno="5513">
56137 <summary>
56138 Do not audit attempts to list
56139 the contents of /var.
56140 @@ -80156,7 +80186,7 @@ Domain to not audit.
56141 </summary>
56142 </param>
56143 </interface>
56144 -<interface name="files_manage_var_dirs" lineno="5446">
56145 +<interface name="files_manage_var_dirs" lineno="5532">
56146 <summary>
56147 Create, read, write, and delete directories
56148 in the /var directory.
56149 @@ -80167,7 +80197,7 @@ Domain allowed access.
56150 </summary>
56151 </param>
56152 </interface>
56153 -<interface name="files_relabel_var_dirs" lineno="5464">
56154 +<interface name="files_relabel_var_dirs" lineno="5550">
56155 <summary>
56156 relabelto/from var directories
56157 </summary>
56158 @@ -80177,7 +80207,7 @@ Domain allowed access.
56159 </summary>
56160 </param>
56161 </interface>
56162 -<interface name="files_read_var_files" lineno="5482">
56163 +<interface name="files_read_var_files" lineno="5568">
56164 <summary>
56165 Read files in the /var directory.
56166 </summary>
56167 @@ -80187,7 +80217,7 @@ Domain allowed access.
56168 </summary>
56169 </param>
56170 </interface>
56171 -<interface name="files_append_var_files" lineno="5500">
56172 +<interface name="files_append_var_files" lineno="5586">
56173 <summary>
56174 Append files in the /var directory.
56175 </summary>
56176 @@ -80197,7 +80227,7 @@ Domain allowed access.
56177 </summary>
56178 </param>
56179 </interface>
56180 -<interface name="files_rw_var_files" lineno="5518">
56181 +<interface name="files_rw_var_files" lineno="5604">
56182 <summary>
56183 Read and write files in the /var directory.
56184 </summary>
56185 @@ -80207,7 +80237,7 @@ Domain allowed access.
56186 </summary>
56187 </param>
56188 </interface>
56189 -<interface name="files_dontaudit_rw_var_files" lineno="5537">
56190 +<interface name="files_dontaudit_rw_var_files" lineno="5623">
56191 <summary>
56192 Do not audit attempts to read and write
56193 files in the /var directory.
56194 @@ -80218,7 +80248,7 @@ Domain to not audit.
56195 </summary>
56196 </param>
56197 </interface>
56198 -<interface name="files_manage_var_files" lineno="5555">
56199 +<interface name="files_manage_var_files" lineno="5641">
56200 <summary>
56201 Create, read, write, and delete files in the /var directory.
56202 </summary>
56203 @@ -80228,7 +80258,7 @@ Domain allowed access.
56204 </summary>
56205 </param>
56206 </interface>
56207 -<interface name="files_read_var_symlinks" lineno="5573">
56208 +<interface name="files_read_var_symlinks" lineno="5659">
56209 <summary>
56210 Read symbolic links in the /var directory.
56211 </summary>
56212 @@ -80238,7 +80268,7 @@ Domain allowed access.
56213 </summary>
56214 </param>
56215 </interface>
56216 -<interface name="files_manage_var_symlinks" lineno="5592">
56217 +<interface name="files_manage_var_symlinks" lineno="5678">
56218 <summary>
56219 Create, read, write, and delete symbolic
56220 links in the /var directory.
56221 @@ -80249,7 +80279,7 @@ Domain allowed access.
56222 </summary>
56223 </param>
56224 </interface>
56225 -<interface name="files_var_filetrans" lineno="5625">
56226 +<interface name="files_var_filetrans" lineno="5711">
56227 <summary>
56228 Create objects in the /var directory
56229 </summary>
56230 @@ -80274,7 +80304,7 @@ The name of the object being created.
56231 </summary>
56232 </param>
56233 </interface>
56234 -<interface name="files_getattr_var_lib_dirs" lineno="5643">
56235 +<interface name="files_getattr_var_lib_dirs" lineno="5729">
56236 <summary>
56237 Get the attributes of the /var/lib directory.
56238 </summary>
56239 @@ -80284,7 +80314,7 @@ Domain allowed access.
56240 </summary>
56241 </param>
56242 </interface>
56243 -<interface name="files_search_var_lib" lineno="5675">
56244 +<interface name="files_search_var_lib" lineno="5761">
56245 <summary>
56246 Search the /var/lib directory.
56247 </summary>
56248 @@ -80308,7 +80338,7 @@ Domain allowed access.
56249 </param>
56250 <infoflow type="read" weight="5"/>
56251 </interface>
56252 -<interface name="files_dontaudit_search_var_lib" lineno="5695">
56253 +<interface name="files_dontaudit_search_var_lib" lineno="5781">
56254 <summary>
56255 Do not audit attempts to search the
56256 contents of /var/lib.
56257 @@ -80320,7 +80350,7 @@ Domain to not audit.
56258 </param>
56259 <infoflow type="read" weight="5"/>
56260 </interface>
56261 -<interface name="files_list_var_lib" lineno="5713">
56262 +<interface name="files_list_var_lib" lineno="5799">
56263 <summary>
56264 List the contents of the /var/lib directory.
56265 </summary>
56266 @@ -80330,7 +80360,7 @@ Domain allowed access.
56267 </summary>
56268 </param>
56269 </interface>
56270 -<interface name="files_rw_var_lib_dirs" lineno="5731">
56271 +<interface name="files_rw_var_lib_dirs" lineno="5817">
56272 <summary>
56273 Read-write /var/lib directories
56274 </summary>
56275 @@ -80340,7 +80370,7 @@ Domain allowed access.
56276 </summary>
56277 </param>
56278 </interface>
56279 -<interface name="files_manage_var_lib_dirs" lineno="5749">
56280 +<interface name="files_manage_var_lib_dirs" lineno="5835">
56281 <summary>
56282 manage var_lib_t dirs
56283 </summary>
56284 @@ -80350,7 +80380,7 @@ Domain allowed access.
56285 </summary>
56286 </param>
56287 </interface>
56288 -<interface name="files_relabel_var_lib_dirs" lineno="5768">
56289 +<interface name="files_relabel_var_lib_dirs" lineno="5854">
56290 <summary>
56291 relabel var_lib_t dirs
56292 </summary>
56293 @@ -80360,7 +80390,7 @@ Domain allowed access.
56294 </summary>
56295 </param>
56296 </interface>
56297 -<interface name="files_var_lib_filetrans" lineno="5802">
56298 +<interface name="files_var_lib_filetrans" lineno="5888">
56299 <summary>
56300 Create objects in the /var/lib directory
56301 </summary>
56302 @@ -80385,7 +80415,7 @@ The name of the object being created.
56303 </summary>
56304 </param>
56305 </interface>
56306 -<interface name="files_read_var_lib_files" lineno="5821">
56307 +<interface name="files_read_var_lib_files" lineno="5907">
56308 <summary>
56309 Read generic files in /var/lib.
56310 </summary>
56311 @@ -80395,7 +80425,7 @@ Domain allowed access.
56312 </summary>
56313 </param>
56314 </interface>
56315 -<interface name="files_read_var_lib_symlinks" lineno="5840">
56316 +<interface name="files_read_var_lib_symlinks" lineno="5926">
56317 <summary>
56318 Read generic symbolic links in /var/lib
56319 </summary>
56320 @@ -80405,7 +80435,7 @@ Domain allowed access.
56321 </summary>
56322 </param>
56323 </interface>
56324 -<interface name="files_manage_urandom_seed" lineno="5862">
56325 +<interface name="files_manage_urandom_seed" lineno="5948">
56326 <summary>
56327 Create, read, write, and delete the
56328 pseudorandom number generator seed.
56329 @@ -80416,7 +80446,7 @@ Domain allowed access.
56330 </summary>
56331 </param>
56332 </interface>
56333 -<interface name="files_manage_mounttab" lineno="5882">
56334 +<interface name="files_manage_mounttab" lineno="5968">
56335 <summary>
56336 Allow domain to manage mount tables
56337 necessary for rpcd, nfsd, etc.
56338 @@ -80427,7 +80457,7 @@ Domain allowed access.
56339 </summary>
56340 </param>
56341 </interface>
56342 -<interface name="files_setattr_lock_dirs" lineno="5901">
56343 +<interface name="files_setattr_lock_dirs" lineno="5987">
56344 <summary>
56345 Set the attributes of the generic lock directories.
56346 </summary>
56347 @@ -80437,7 +80467,7 @@ Domain allowed access.
56348 </summary>
56349 </param>
56350 </interface>
56351 -<interface name="files_search_locks" lineno="5919">
56352 +<interface name="files_search_locks" lineno="6005">
56353 <summary>
56354 Search the locks directory (/var/lock).
56355 </summary>
56356 @@ -80447,7 +80477,7 @@ Domain allowed access.
56357 </summary>
56358 </param>
56359 </interface>
56360 -<interface name="files_dontaudit_search_locks" lineno="5939">
56361 +<interface name="files_dontaudit_search_locks" lineno="6025">
56362 <summary>
56363 Do not audit attempts to search the
56364 locks directory (/var/lock).
56365 @@ -80458,7 +80488,7 @@ Domain to not audit.
56366 </summary>
56367 </param>
56368 </interface>
56369 -<interface name="files_list_locks" lineno="5958">
56370 +<interface name="files_list_locks" lineno="6044">
56371 <summary>
56372 List generic lock directories.
56373 </summary>
56374 @@ -80468,7 +80498,7 @@ Domain allowed access.
56375 </summary>
56376 </param>
56377 </interface>
56378 -<interface name="files_check_write_lock_dirs" lineno="5977">
56379 +<interface name="files_check_write_lock_dirs" lineno="6063">
56380 <summary>
56381 Test write access on lock directories.
56382 </summary>
56383 @@ -80478,7 +80508,7 @@ Domain allowed access.
56384 </summary>
56385 </param>
56386 </interface>
56387 -<interface name="files_add_entry_lock_dirs" lineno="5996">
56388 +<interface name="files_add_entry_lock_dirs" lineno="6082">
56389 <summary>
56390 Add entries in the /var/lock directories.
56391 </summary>
56392 @@ -80488,7 +80518,7 @@ Domain allowed access.
56393 </summary>
56394 </param>
56395 </interface>
56396 -<interface name="files_rw_lock_dirs" lineno="6016">
56397 +<interface name="files_rw_lock_dirs" lineno="6102">
56398 <summary>
56399 Add and remove entries in the /var/lock
56400 directories.
56401 @@ -80499,7 +80529,7 @@ Domain allowed access.
56402 </summary>
56403 </param>
56404 </interface>
56405 -<interface name="files_create_lock_dirs" lineno="6035">
56406 +<interface name="files_create_lock_dirs" lineno="6121">
56407 <summary>
56408 Create lock directories
56409 </summary>
56410 @@ -80509,7 +80539,7 @@ Domain allowed access
56411 </summary>
56412 </param>
56413 </interface>
56414 -<interface name="files_relabel_all_lock_dirs" lineno="6056">
56415 +<interface name="files_relabel_all_lock_dirs" lineno="6142">
56416 <summary>
56417 Relabel to and from all lock directory types.
56418 </summary>
56419 @@ -80520,7 +80550,7 @@ Domain allowed access.
56420 </param>
56421 <rolecap/>
56422 </interface>
56423 -<interface name="files_getattr_generic_locks" lineno="6077">
56424 +<interface name="files_getattr_generic_locks" lineno="6163">
56425 <summary>
56426 Get the attributes of generic lock files.
56427 </summary>
56428 @@ -80530,7 +80560,7 @@ Domain allowed access.
56429 </summary>
56430 </param>
56431 </interface>
56432 -<interface name="files_delete_generic_locks" lineno="6098">
56433 +<interface name="files_delete_generic_locks" lineno="6184">
56434 <summary>
56435 Delete generic lock files.
56436 </summary>
56437 @@ -80540,7 +80570,7 @@ Domain allowed access.
56438 </summary>
56439 </param>
56440 </interface>
56441 -<interface name="files_manage_generic_locks" lineno="6119">
56442 +<interface name="files_manage_generic_locks" lineno="6205">
56443 <summary>
56444 Create, read, write, and delete generic
56445 lock files.
56446 @@ -80551,7 +80581,7 @@ Domain allowed access.
56447 </summary>
56448 </param>
56449 </interface>
56450 -<interface name="files_delete_all_locks" lineno="6141">
56451 +<interface name="files_delete_all_locks" lineno="6227">
56452 <summary>
56453 Delete all lock files.
56454 </summary>
56455 @@ -80562,7 +80592,7 @@ Domain allowed access.
56456 </param>
56457 <rolecap/>
56458 </interface>
56459 -<interface name="files_read_all_locks" lineno="6162">
56460 +<interface name="files_read_all_locks" lineno="6248">
56461 <summary>
56462 Read all lock files.
56463 </summary>
56464 @@ -80572,7 +80602,7 @@ Domain allowed access.
56465 </summary>
56466 </param>
56467 </interface>
56468 -<interface name="files_manage_all_locks" lineno="6185">
56469 +<interface name="files_manage_all_locks" lineno="6271">
56470 <summary>
56471 manage all lock files.
56472 </summary>
56473 @@ -80582,7 +80612,7 @@ Domain allowed access.
56474 </summary>
56475 </param>
56476 </interface>
56477 -<interface name="files_relabel_all_locks" lineno="6208">
56478 +<interface name="files_relabel_all_locks" lineno="6294">
56479 <summary>
56480 Relabel from/to all lock files.
56481 </summary>
56482 @@ -80592,7 +80622,7 @@ Domain allowed access.
56483 </summary>
56484 </param>
56485 </interface>
56486 -<interface name="files_lock_filetrans" lineno="6247">
56487 +<interface name="files_lock_filetrans" lineno="6333">
56488 <summary>
56489 Create an object in the locks directory, with a private
56490 type using a type transition.
56491 @@ -80618,7 +80648,91 @@ The name of the object being created.
56492 </summary>
56493 </param>
56494 </interface>
56495 -<interface name="files_dontaudit_getattr_pid_dirs" lineno="6268">
56496 +<interface name="files_dontaudit_getattr_pid_dirs" lineno="6354">
56497 +<summary>
56498 +Do not audit attempts to get the attributes
56499 +of the /var/run directory. (Deprecated)
56500 +</summary>
56501 +<param name="domain">
56502 +<summary>
56503 +Domain to not audit.
56504 +</summary>
56505 +</param>
56506 +</interface>
56507 +<interface name="files_mounton_pid_dirs" lineno="6369">
56508 +<summary>
56509 +mounton a /var/run directory. (Deprecated)
56510 +</summary>
56511 +<param name="domain">
56512 +<summary>
56513 +Domain allowed access.
56514 +</summary>
56515 +</param>
56516 +</interface>
56517 +<interface name="files_setattr_pid_dirs" lineno="6384">
56518 +<summary>
56519 +Set the attributes of the /var/run directory. (Deprecated)
56520 +</summary>
56521 +<param name="domain">
56522 +<summary>
56523 +Domain allowed access.
56524 +</summary>
56525 +</param>
56526 +</interface>
56527 +<interface name="files_search_pids" lineno="6400">
56528 +<summary>
56529 +Search the contents of runtime process
56530 +ID directories (/var/run). (Deprecated)
56531 +</summary>
56532 +<param name="domain">
56533 +<summary>
56534 +Domain allowed access.
56535 +</summary>
56536 +</param>
56537 +</interface>
56538 +<interface name="files_dontaudit_search_pids" lineno="6416">
56539 +<summary>
56540 +Do not audit attempts to search
56541 +the /var/run directory. (Deprecated)
56542 +</summary>
56543 +<param name="domain">
56544 +<summary>
56545 +Domain to not audit.
56546 +</summary>
56547 +</param>
56548 +</interface>
56549 +<interface name="files_list_pids" lineno="6432">
56550 +<summary>
56551 +List the contents of the runtime process
56552 +ID directories (/var/run). (Deprecated)
56553 +</summary>
56554 +<param name="domain">
56555 +<summary>
56556 +Domain allowed access.
56557 +</summary>
56558 +</param>
56559 +</interface>
56560 +<interface name="files_check_write_pid_dirs" lineno="6447">
56561 +<summary>
56562 +Check write access on /var/run directories. (Deprecated)
56563 +</summary>
56564 +<param name="domain">
56565 +<summary>
56566 +Domain allowed access.
56567 +</summary>
56568 +</param>
56569 +</interface>
56570 +<interface name="files_create_pid_dirs" lineno="6462">
56571 +<summary>
56572 +Create a /var/run directory. (Deprecated)
56573 +</summary>
56574 +<param name="domain">
56575 +<summary>
56576 +Domain allowed access.
56577 +</summary>
56578 +</param>
56579 +</interface>
56580 +<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6478">
56581 <summary>
56582 Do not audit attempts to get the attributes
56583 of the /var/run directory.
56584 @@ -80629,7 +80743,7 @@ Domain to not audit.
56585 </summary>
56586 </param>
56587 </interface>
56588 -<interface name="files_mounton_pid_dirs" lineno="6287">
56589 +<interface name="files_mounton_runtime_dirs" lineno="6497">
56590 <summary>
56591 mounton a /var/run directory.
56592 </summary>
56593 @@ -80639,7 +80753,7 @@ Domain allowed access.
56594 </summary>
56595 </param>
56596 </interface>
56597 -<interface name="files_setattr_pid_dirs" lineno="6305">
56598 +<interface name="files_setattr_runtime_dirs" lineno="6515">
56599 <summary>
56600 Set the attributes of the /var/run directory.
56601 </summary>
56602 @@ -80649,7 +80763,7 @@ Domain allowed access.
56603 </summary>
56604 </param>
56605 </interface>
56606 -<interface name="files_search_pids" lineno="6325">
56607 +<interface name="files_search_runtime" lineno="6535">
56608 <summary>
56609 Search the contents of runtime process
56610 ID directories (/var/run).
56611 @@ -80660,7 +80774,7 @@ Domain allowed access.
56612 </summary>
56613 </param>
56614 </interface>
56615 -<interface name="files_dontaudit_search_pids" lineno="6345">
56616 +<interface name="files_dontaudit_search_runtime" lineno="6555">
56617 <summary>
56618 Do not audit attempts to search
56619 the /var/run directory.
56620 @@ -80671,7 +80785,7 @@ Domain to not audit.
56621 </summary>
56622 </param>
56623 </interface>
56624 -<interface name="files_list_pids" lineno="6365">
56625 +<interface name="files_list_runtime" lineno="6575">
56626 <summary>
56627 List the contents of the runtime process
56628 ID directories (/var/run).
56629 @@ -80682,7 +80796,7 @@ Domain allowed access.
56630 </summary>
56631 </param>
56632 </interface>
56633 -<interface name="files_check_write_pid_dirs" lineno="6384">
56634 +<interface name="files_check_write_runtime_dirs" lineno="6594">
56635 <summary>
56636 Check write access on /var/run directories.
56637 </summary>
56638 @@ -80692,7 +80806,7 @@ Domain allowed access.
56639 </summary>
56640 </param>
56641 </interface>
56642 -<interface name="files_create_pid_dirs" lineno="6402">
56643 +<interface name="files_create_runtime_dirs" lineno="6612">
56644 <summary>
56645 Create a /var/run directory.
56646 </summary>
56647 @@ -80702,7 +80816,7 @@ Domain allowed access.
56648 </summary>
56649 </param>
56650 </interface>
56651 -<interface name="files_watch_runtime_dirs" lineno="6420">
56652 +<interface name="files_watch_runtime_dirs" lineno="6630">
56653 <summary>
56654 Watch /var/run directories.
56655 </summary>
56656 @@ -80712,9 +80826,9 @@ Domain allowed access.
56657 </summary>
56658 </param>
56659 </interface>
56660 -<interface name="files_read_generic_pids" lineno="6438">
56661 +<interface name="files_read_generic_pids" lineno="6648">
56662 <summary>
56663 -Read generic process ID files.
56664 +Read generic process ID files. (Deprecated)
56665 </summary>
56666 <param name="domain">
56667 <summary>
56668 @@ -80722,9 +80836,9 @@ Domain allowed access.
56669 </summary>
56670 </param>
56671 </interface>
56672 -<interface name="files_write_generic_pid_pipes" lineno="6458">
56673 +<interface name="files_write_generic_pid_pipes" lineno="6663">
56674 <summary>
56675 -Write named generic process ID pipes
56676 +Write named generic process ID pipes. (Deprecated)
56677 </summary>
56678 <param name="domain">
56679 <summary>
56680 @@ -80732,9 +80846,9 @@ Domain allowed access.
56681 </summary>
56682 </param>
56683 </interface>
56684 -<interface name="files_pid_filetrans" lineno="6519">
56685 +<interface name="files_pid_filetrans" lineno="6720">
56686 <summary>
56687 -Create an object in the process ID directory, with a private type.
56688 +Create an object in the process ID directory, with a private type. (Deprecated)
56689 </summary>
56690 <desc>
56691 <p>
56692 @@ -80748,7 +80862,7 @@ either the program must be SELinux-aware, or use this interface.
56693 Related interfaces:
56694 </p>
56695 <ul>
56696 -<li>files_pid_file()</li>
56697 +<li>files_runtime_file()</li>
56698 </ul>
56699 <p>
56700 Example usage with a domain that can create and
56701 @@ -80757,9 +80871,9 @@ write its PID file with a private PID file type in the
56702 </p>
56703 <p>
56704 type mypidfile_t;
56705 -files_pid_file(mypidfile_t)
56706 +files_runtime_file(mypidfile_t)
56707 allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms };
56708 -files_pid_filetrans(mydomain_t, mypidfile_t, file)
56709 +files_runtime_filetrans(mydomain_t, mypidfile_t, file)
56710 </p>
56711 </desc>
56712 <param name="domain">
56713 @@ -80784,9 +80898,9 @@ The name of the object being created.
56714 </param>
56715 <infoflow type="write" weight="10"/>
56716 </interface>
56717 -<interface name="files_pid_filetrans_lock_dir" lineno="6544">
56718 +<interface name="files_pid_filetrans_lock_dir" lineno="6740">
56719 <summary>
56720 -Create a generic lock directory within the run directories
56721 +Create a generic lock directory within the run directories. (Deprecated)
56722 </summary>
56723 <param name="domain">
56724 <summary>
56725 @@ -80799,9 +80913,9 @@ The name of the object being created.
56726 </summary>
56727 </param>
56728 </interface>
56729 -<interface name="files_rw_generic_pids" lineno="6562">
56730 +<interface name="files_rw_generic_pids" lineno="6755">
56731 <summary>
56732 -Read and write generic process ID files.
56733 +Read and write generic process ID files. (Deprecated)
56734 </summary>
56735 <param name="domain">
56736 <summary>
56737 @@ -80809,10 +80923,10 @@ Domain allowed access.
56738 </summary>
56739 </param>
56740 </interface>
56741 -<interface name="files_dontaudit_getattr_all_pids" lineno="6583">
56742 +<interface name="files_dontaudit_getattr_all_pids" lineno="6771">
56743 <summary>
56744 Do not audit attempts to get the attributes of
56745 -daemon runtime data files.
56746 +daemon runtime data files. (Deprecated)
56747 </summary>
56748 <param name="domain">
56749 <summary>
56750 @@ -80820,9 +80934,9 @@ Domain to not audit.
56751 </summary>
56752 </param>
56753 </interface>
56754 -<interface name="files_dontaudit_write_all_pids" lineno="6603">
56755 +<interface name="files_dontaudit_write_all_pids" lineno="6786">
56756 <summary>
56757 -Do not audit attempts to write to daemon runtime data files.
56758 +Do not audit attempts to write to daemon runtime data files. (Deprecated)
56759 </summary>
56760 <param name="domain">
56761 <summary>
56762 @@ -80830,9 +80944,9 @@ Domain to not audit.
56763 </summary>
56764 </param>
56765 </interface>
56766 -<interface name="files_dontaudit_ioctl_all_pids" lineno="6623">
56767 +<interface name="files_dontaudit_ioctl_all_pids" lineno="6801">
56768 <summary>
56769 -Do not audit attempts to ioctl daemon runtime data files.
56770 +Do not audit attempts to ioctl daemon runtime data files. (Deprecated)
56771 </summary>
56772 <param name="domain">
56773 <summary>
56774 @@ -80840,10 +80954,41 @@ Domain to not audit.
56775 </summary>
56776 </param>
56777 </interface>
56778 -<interface name="files_manage_all_pid_dirs" lineno="6644">
56779 +<interface name="files_manage_all_pid_dirs" lineno="6817">
56780 <summary>
56781 manage all pidfile directories
56782 -in the /var/run directory.
56783 +in the /var/run directory. (Deprecated)
56784 +</summary>
56785 +<param name="domain">
56786 +<summary>
56787 +Domain allowed access.
56788 +</summary>
56789 +</param>
56790 +</interface>
56791 +<interface name="files_read_all_pids" lineno="6833">
56792 +<summary>
56793 +Read all process ID files. (Deprecated)
56794 +</summary>
56795 +<param name="domain">
56796 +<summary>
56797 +Domain allowed access.
56798 +</summary>
56799 +</param>
56800 +<rolecap/>
56801 +</interface>
56802 +<interface name="files_exec_generic_pid_files" lineno="6848">
56803 +<summary>
56804 +Execute generic programs in /var/run in the caller domain. (Deprecated)
56805 +</summary>
56806 +<param name="domain">
56807 +<summary>
56808 +Domain allowed access.
56809 +</summary>
56810 +</param>
56811 +</interface>
56812 +<interface name="files_relabel_all_pid_files" lineno="6863">
56813 +<summary>
56814 +Relabel all pid files. (Deprecated)
56815 </summary>
56816 <param name="domain">
56817 <summary>
56818 @@ -80851,9 +80996,9 @@ Domain allowed access.
56819 </summary>
56820 </param>
56821 </interface>
56822 -<interface name="files_read_all_pids" lineno="6663">
56823 +<interface name="files_delete_all_pids" lineno="6879">
56824 <summary>
56825 -Read all process ID files.
56826 +Delete all process IDs. (Deprecated)
56827 </summary>
56828 <param name="domain">
56829 <summary>
56830 @@ -80862,7 +81007,37 @@ Domain allowed access.
56831 </param>
56832 <rolecap/>
56833 </interface>
56834 -<interface name="files_exec_generic_pid_files" lineno="6684">
56835 +<interface name="files_create_all_pid_sockets" lineno="6898">
56836 +<summary>
56837 +Create all pid sockets. (Deprecated)
56838 +</summary>
56839 +<param name="domain">
56840 +<summary>
56841 +Domain allowed access.
56842 +</summary>
56843 +</param>
56844 +</interface>
56845 +<interface name="files_create_all_pid_pipes" lineno="6913">
56846 +<summary>
56847 +Create all pid named pipes. (Deprecated)
56848 +</summary>
56849 +<param name="domain">
56850 +<summary>
56851 +Domain allowed access.
56852 +</summary>
56853 +</param>
56854 +</interface>
56855 +<interface name="files_read_runtime_files" lineno="6928">
56856 +<summary>
56857 +Read generic runtime files.
56858 +</summary>
56859 +<param name="domain">
56860 +<summary>
56861 +Domain allowed access.
56862 +</summary>
56863 +</param>
56864 +</interface>
56865 +<interface name="files_exec_runtime" lineno="6948">
56866 <summary>
56867 Execute generic programs in /var/run in the caller domain.
56868 </summary>
56869 @@ -80872,9 +81047,134 @@ Domain allowed access.
56870 </summary>
56871 </param>
56872 </interface>
56873 -<interface name="files_relabel_all_pid_files" lineno="6702">
56874 +<interface name="files_rw_runtime_files" lineno="6966">
56875 +<summary>
56876 +Read and write generic runtime files.
56877 +</summary>
56878 +<param name="domain">
56879 +<summary>
56880 +Domain allowed access.
56881 +</summary>
56882 +</param>
56883 +</interface>
56884 +<interface name="files_delete_runtime_symlinks" lineno="6986">
56885 +<summary>
56886 +Delete generic runtime symlinks.
56887 +</summary>
56888 +<param name="domain">
56889 +<summary>
56890 +Domain allowed access.
56891 +</summary>
56892 +</param>
56893 +</interface>
56894 +<interface name="files_write_runtime_pipes" lineno="7004">
56895 +<summary>
56896 +Write named generic runtime pipes.
56897 +</summary>
56898 +<param name="domain">
56899 +<summary>
56900 +Domain allowed access.
56901 +</summary>
56902 +</param>
56903 +</interface>
56904 +<interface name="files_delete_all_runtime_dirs" lineno="7024">
56905 +<summary>
56906 +Delete all runtime dirs.
56907 +</summary>
56908 +<param name="domain">
56909 +<summary>
56910 +Domain allowed access.
56911 +</summary>
56912 +</param>
56913 +<rolecap/>
56914 +</interface>
56915 +<interface name="files_manage_all_runtime_dirs" lineno="7042">
56916 +<summary>
56917 +Create, read, write, and delete all runtime directories.
56918 +</summary>
56919 +<param name="domain">
56920 +<summary>
56921 +Domain allowed access.
56922 +</summary>
56923 +</param>
56924 +</interface>
56925 +<interface name="files_relabel_all_runtime_dirs" lineno="7060">
56926 +<summary>
56927 +Relabel all runtime directories.
56928 +</summary>
56929 +<param name="domain">
56930 +<summary>
56931 +Domain allowed access.
56932 +</summary>
56933 +</param>
56934 +</interface>
56935 +<interface name="files_dontaudit_getattr_all_runtime_files" lineno="7079">
56936 +<summary>
56937 +Do not audit attempts to get the attributes of
56938 +all runtime data files.
56939 +</summary>
56940 +<param name="domain">
56941 +<summary>
56942 +Domain to not audit.
56943 +</summary>
56944 +</param>
56945 +</interface>
56946 +<interface name="files_read_all_runtime_files" lineno="7100">
56947 +<summary>
56948 +Read all runtime files.
56949 +</summary>
56950 +<param name="domain">
56951 +<summary>
56952 +Domain allowed access.
56953 +</summary>
56954 +</param>
56955 +<rolecap/>
56956 +</interface>
56957 +<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7121">
56958 +<summary>
56959 +Do not audit attempts to ioctl all runtime files.
56960 +</summary>
56961 +<param name="domain">
56962 +<summary>
56963 +Domain to not audit.
56964 +</summary>
56965 +</param>
56966 +</interface>
56967 +<interface name="files_dontaudit_write_all_runtime_files" lineno="7141">
56968 +<summary>
56969 +Do not audit attempts to write to all runtime files.
56970 +</summary>
56971 +<param name="domain">
56972 +<summary>
56973 +Domain to not audit.
56974 +</summary>
56975 +</param>
56976 +</interface>
56977 +<interface name="files_delete_all_runtime_files" lineno="7162">
56978 +<summary>
56979 +Delete all runtime files.
56980 +</summary>
56981 +<param name="domain">
56982 +<summary>
56983 +Domain allowed access.
56984 +</summary>
56985 +</param>
56986 +<rolecap/>
56987 +</interface>
56988 +<interface name="files_manage_all_runtime_files" lineno="7181">
56989 +<summary>
56990 +Create, read, write and delete all
56991 +var_run (pid) files
56992 +</summary>
56993 +<param name="domain">
56994 +<summary>
56995 +Domain allowed access.
56996 +</summary>
56997 +</param>
56998 +</interface>
56999 +<interface name="files_relabel_all_runtime_files" lineno="7199">
57000 <summary>
57001 -Relable all pid files
57002 +Relabel all runtime files.
57003 </summary>
57004 <param name="domain">
57005 <summary>
57006 @@ -80882,9 +81182,9 @@ Domain allowed access.
57007 </summary>
57008 </param>
57009 </interface>
57010 -<interface name="files_delete_all_pids" lineno="6721">
57011 +<interface name="files_delete_all_runtime_symlinks" lineno="7218">
57012 <summary>
57013 -Delete all process IDs.
57014 +Delete all runtime symlinks.
57015 </summary>
57016 <param name="domain">
57017 <summary>
57018 @@ -80893,9 +81193,10 @@ Domain allowed access.
57019 </param>
57020 <rolecap/>
57021 </interface>
57022 -<interface name="files_create_all_pid_sockets" lineno="6746">
57023 +<interface name="files_manage_all_runtime_symlinks" lineno="7237">
57024 <summary>
57025 -Create all pid sockets
57026 +Create, read, write and delete all
57027 +var_run (pid) symbolic links.
57028 </summary>
57029 <param name="domain">
57030 <summary>
57031 @@ -80903,9 +81204,9 @@ Domain allowed access.
57032 </summary>
57033 </param>
57034 </interface>
57035 -<interface name="files_create_all_pid_pipes" lineno="6764">
57036 +<interface name="files_relabel_all_runtime_symlinks" lineno="7255">
57037 <summary>
57038 -Create all pid named pipes
57039 +Relabel all runtime symbolic links.
57040 </summary>
57041 <param name="domain">
57042 <summary>
57043 @@ -80913,7 +81214,124 @@ Domain allowed access.
57044 </summary>
57045 </param>
57046 </interface>
57047 -<interface name="files_create_all_spool_sockets" lineno="6782">
57048 +<interface name="files_create_all_runtime_pipes" lineno="7273">
57049 +<summary>
57050 +Create all runtime named pipes
57051 +</summary>
57052 +<param name="domain">
57053 +<summary>
57054 +Domain allowed access.
57055 +</summary>
57056 +</param>
57057 +</interface>
57058 +<interface name="files_delete_all_runtime_pipes" lineno="7292">
57059 +<summary>
57060 +Delete all runtime named pipes
57061 +</summary>
57062 +<param name="domain">
57063 +<summary>
57064 +Domain allowed access.
57065 +</summary>
57066 +</param>
57067 +</interface>
57068 +<interface name="files_create_all_runtime_sockets" lineno="7311">
57069 +<summary>
57070 +Create all runtime sockets.
57071 +</summary>
57072 +<param name="domain">
57073 +<summary>
57074 +Domain allowed access.
57075 +</summary>
57076 +</param>
57077 +</interface>
57078 +<interface name="files_delete_all_runtime_sockets" lineno="7329">
57079 +<summary>
57080 +Delete all runtime sockets.
57081 +</summary>
57082 +<param name="domain">
57083 +<summary>
57084 +Domain allowed access.
57085 +</summary>
57086 +</param>
57087 +</interface>
57088 +<interface name="files_relabel_all_runtime_sockets" lineno="7347">
57089 +<summary>
57090 +Relabel all runtime named sockets.
57091 +</summary>
57092 +<param name="domain">
57093 +<summary>
57094 +Domain allowed access.
57095 +</summary>
57096 +</param>
57097 +</interface>
57098 +<interface name="files_runtime_filetrans" lineno="7407">
57099 +<summary>
57100 +Create an object in the /run directory, with a private type.
57101 +</summary>
57102 +<desc>
57103 +<p>
57104 +Create an object in the process ID directory (e.g., /var/run)
57105 +with a private type. Typically this is used for creating
57106 +private PID files in /var/run with the private type instead
57107 +of the general PID file type. To accomplish this goal,
57108 +either the program must be SELinux-aware, or use this interface.
57109 +</p>
57110 +<p>
57111 +Related interfaces:
57112 +</p>
57113 +<ul>
57114 +<li>files_runtime_file()</li>
57115 +</ul>
57116 +<p>
57117 +Example usage with a domain that can create and
57118 +write its PID file with a private PID file type in the
57119 +/var/run directory:
57120 +</p>
57121 +<p>
57122 +type mypidfile_t;
57123 +files_runtime_file(mypidfile_t)
57124 +allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms };
57125 +files_runtime_filetrans(mydomain_t, mypidfile_t, file)
57126 +</p>
57127 +</desc>
57128 +<param name="domain">
57129 +<summary>
57130 +Domain allowed access.
57131 +</summary>
57132 +</param>
57133 +<param name="private type">
57134 +<summary>
57135 +The type of the object to be created.
57136 +</summary>
57137 +</param>
57138 +<param name="object">
57139 +<summary>
57140 +The object class of the object being created.
57141 +</summary>
57142 +</param>
57143 +<param name="name" optional="true">
57144 +<summary>
57145 +The name of the object being created.
57146 +</summary>
57147 +</param>
57148 +<infoflow type="write" weight="10"/>
57149 +</interface>
57150 +<interface name="files_runtime_filetrans_lock_dir" lineno="7432">
57151 +<summary>
57152 +Create a generic lock directory within the run directories.
57153 +</summary>
57154 +<param name="domain">
57155 +<summary>
57156 +Domain allowed access
57157 +</summary>
57158 +</param>
57159 +<param name="name" optional="true">
57160 +<summary>
57161 +The name of the object being created.
57162 +</summary>
57163 +</param>
57164 +</interface>
57165 +<interface name="files_create_all_spool_sockets" lineno="7450">
57166 <summary>
57167 Create all spool sockets
57168 </summary>
57169 @@ -80923,7 +81341,7 @@ Domain allowed access.
57170 </summary>
57171 </param>
57172 </interface>
57173 -<interface name="files_delete_all_spool_sockets" lineno="6800">
57174 +<interface name="files_delete_all_spool_sockets" lineno="7468">
57175 <summary>
57176 Delete all spool sockets
57177 </summary>
57178 @@ -80933,9 +81351,9 @@ Domain allowed access.
57179 </summary>
57180 </param>
57181 </interface>
57182 -<interface name="files_delete_all_pid_dirs" lineno="6818">
57183 +<interface name="files_delete_all_pid_dirs" lineno="7486">
57184 <summary>
57185 -Delete all process ID directories.
57186 +Delete all process ID directories. (Deprecated)
57187 </summary>
57188 <param name="domain">
57189 <summary>
57190 @@ -80943,48 +81361,48 @@ Domain allowed access.
57191 </summary>
57192 </param>
57193 </interface>
57194 -<interface name="files_manage_all_pids" lineno="6840">
57195 +<interface name="files_manage_all_pids" lineno="7502">
57196 <summary>
57197 Create, read, write and delete all
57198 -var_run (pid) content
57199 +var_run (pid) content (Deprecated)
57200 </summary>
57201 <param name="domain">
57202 <summary>
57203 -Domain alloed access.
57204 +Domain allowed access.
57205 </summary>
57206 </param>
57207 </interface>
57208 -<interface name="files_relabel_all_pid_dirs" lineno="6860">
57209 +<interface name="files_relabel_all_pid_dirs" lineno="7519">
57210 <summary>
57211 -Relabel to/from all var_run (pid) directories
57212 +Relabel to/from all var_run (pid) directories (Deprecated)
57213 </summary>
57214 <param name="domain">
57215 <summary>
57216 -Domain alloed access.
57217 +Domain allowed access.
57218 </summary>
57219 </param>
57220 </interface>
57221 -<interface name="files_relabel_all_pid_sock_files" lineno="6878">
57222 +<interface name="files_relabel_all_pid_sock_files" lineno="7534">
57223 <summary>
57224 -Relabel to/from all var_run (pid) socket files
57225 +Relabel to/from all var_run (pid) socket files (Deprecated)
57226 </summary>
57227 <param name="domain">
57228 <summary>
57229 -Domain alloed access.
57230 +Domain allowed access.
57231 </summary>
57232 </param>
57233 </interface>
57234 -<interface name="files_relabel_all_pids" lineno="6896">
57235 +<interface name="files_relabel_all_pids" lineno="7549">
57236 <summary>
57237 -Relabel to/from all var_run (pid) files and directories
57238 +Relabel to/from all var_run (pid) files and directories (Deprecated)
57239 </summary>
57240 <param name="domain">
57241 <summary>
57242 -Domain alloed access.
57243 +Domain allowed access.
57244 </summary>
57245 </param>
57246 </interface>
57247 -<interface name="files_mounton_all_poly_members" lineno="6917">
57248 +<interface name="files_mounton_all_poly_members" lineno="7567">
57249 <summary>
57250 Mount filesystems on all polyinstantiation
57251 member directories.
57252 @@ -80995,7 +81413,7 @@ Domain allowed access.
57253 </summary>
57254 </param>
57255 </interface>
57256 -<interface name="files_search_spool" lineno="6936">
57257 +<interface name="files_search_spool" lineno="7586">
57258 <summary>
57259 Search the contents of generic spool
57260 directories (/var/spool).
57261 @@ -81006,7 +81424,7 @@ Domain allowed access.
57262 </summary>
57263 </param>
57264 </interface>
57265 -<interface name="files_dontaudit_search_spool" lineno="6955">
57266 +<interface name="files_dontaudit_search_spool" lineno="7605">
57267 <summary>
57268 Do not audit attempts to search generic
57269 spool directories.
57270 @@ -81017,7 +81435,7 @@ Domain to not audit.
57271 </summary>
57272 </param>
57273 </interface>
57274 -<interface name="files_list_spool" lineno="6974">
57275 +<interface name="files_list_spool" lineno="7624">
57276 <summary>
57277 List the contents of generic spool
57278 (/var/spool) directories.
57279 @@ -81028,7 +81446,7 @@ Domain allowed access.
57280 </summary>
57281 </param>
57282 </interface>
57283 -<interface name="files_manage_generic_spool_dirs" lineno="6993">
57284 +<interface name="files_manage_generic_spool_dirs" lineno="7643">
57285 <summary>
57286 Create, read, write, and delete generic
57287 spool directories (/var/spool).
57288 @@ -81039,7 +81457,7 @@ Domain allowed access.
57289 </summary>
57290 </param>
57291 </interface>
57292 -<interface name="files_read_generic_spool" lineno="7012">
57293 +<interface name="files_read_generic_spool" lineno="7662">
57294 <summary>
57295 Read generic spool files.
57296 </summary>
57297 @@ -81049,7 +81467,7 @@ Domain allowed access.
57298 </summary>
57299 </param>
57300 </interface>
57301 -<interface name="files_manage_generic_spool" lineno="7032">
57302 +<interface name="files_manage_generic_spool" lineno="7682">
57303 <summary>
57304 Create, read, write, and delete generic
57305 spool files.
57306 @@ -81060,7 +81478,7 @@ Domain allowed access.
57307 </summary>
57308 </param>
57309 </interface>
57310 -<interface name="files_spool_filetrans" lineno="7068">
57311 +<interface name="files_spool_filetrans" lineno="7718">
57312 <summary>
57313 Create objects in the spool directory
57314 with a private type with a type transition.
57315 @@ -81087,7 +81505,7 @@ The name of the object being created.
57316 </summary>
57317 </param>
57318 </interface>
57319 -<interface name="files_polyinstantiate_all" lineno="7088">
57320 +<interface name="files_polyinstantiate_all" lineno="7738">
57321 <summary>
57322 Allow access to manage all polyinstantiated
57323 directories on the system.
57324 @@ -81098,7 +81516,7 @@ Domain allowed access.
57325 </summary>
57326 </param>
57327 </interface>
57328 -<interface name="files_unconfined" lineno="7142">
57329 +<interface name="files_unconfined" lineno="7792">
57330 <summary>
57331 Unconfined access to files.
57332 </summary>
57333 @@ -81108,7 +81526,7 @@ Domain allowed access.
57334 </summary>
57335 </param>
57336 </interface>
57337 -<interface name="files_manage_etc_runtime_lnk_files" lineno="7164">
57338 +<interface name="files_manage_etc_runtime_lnk_files" lineno="7814">
57339 <summary>
57340 Create, read, write, and delete symbolic links in
57341 /etc that are dynamically created on boot.
57342 @@ -81120,7 +81538,7 @@ Domain allowed access.
57343 </param>
57344 <rolecap/>
57345 </interface>
57346 -<interface name="files_dontaudit_read_etc_runtime" lineno="7182">
57347 +<interface name="files_dontaudit_read_etc_runtime" lineno="7832">
57348 <summary>
57349 Do not audit attempts to read etc_runtime resources
57350 </summary>
57351 @@ -81130,7 +81548,7 @@ Domain allowed access.
57352 </summary>
57353 </param>
57354 </interface>
57355 -<interface name="files_list_src" lineno="7200">
57356 +<interface name="files_list_src" lineno="7850">
57357 <summary>
57358 List usr/src files
57359 </summary>
57360 @@ -81140,7 +81558,7 @@ Domain allowed access
57361 </summary>
57362 </param>
57363 </interface>
57364 -<interface name="files_read_src_files" lineno="7218">
57365 +<interface name="files_read_src_files" lineno="7868">
57366 <summary>
57367 Read usr/src files
57368 </summary>
57369 @@ -81150,7 +81568,7 @@ Domain allowed access
57370 </summary>
57371 </param>
57372 </interface>
57373 -<interface name="files_manage_src_files" lineno="7236">
57374 +<interface name="files_manage_src_files" lineno="7886">
57375 <summary>
57376 Manage /usr/src files
57377 </summary>
57378 @@ -81160,7 +81578,7 @@ Domain allowed access
57379 </summary>
57380 </param>
57381 </interface>
57382 -<interface name="files_lib_filetrans_kernel_modules" lineno="7267">
57383 +<interface name="files_lib_filetrans_kernel_modules" lineno="7917">
57384 <summary>
57385 Create a resource in the generic lib location
57386 with an automatic type transition towards the kernel modules
57387 @@ -81182,7 +81600,7 @@ Optional name of the resource
57388 </summary>
57389 </param>
57390 </interface>
57391 -<interface name="files_read_etc_runtime" lineno="7285">
57392 +<interface name="files_read_etc_runtime" lineno="7935">
57393 <summary>
57394 Read etc runtime resources
57395 </summary>
57396 @@ -81192,7 +81610,7 @@ Domain allowed access
57397 </summary>
57398 </param>
57399 </interface>
57400 -<interface name="files_relabel_all_non_security_file_types" lineno="7307">
57401 +<interface name="files_relabel_all_non_security_file_types" lineno="7957">
57402 <summary>
57403 Allow relabel from and to non-security types
57404 </summary>
57405 @@ -81203,7 +81621,7 @@ Domain allowed access.
57406 </param>
57407 <rolecap/>
57408 </interface>
57409 -<interface name="files_manage_all_non_security_file_types" lineno="7337">
57410 +<interface name="files_manage_all_non_security_file_types" lineno="7987">
57411 <summary>
57412 Manage non-security-sensitive resource types
57413 </summary>
57414 @@ -81214,7 +81632,7 @@ Domain allowed access.
57415 </param>
57416 <rolecap/>
57417 </interface>
57418 -<interface name="files_relabel_all_pidfiles" lineno="7359">
57419 +<interface name="files_relabel_all_pidfiles" lineno="8009">
57420 <summary>
57421 Allow relabeling from and to any pidfile associated type
57422 </summary>
57423 @@ -81252,7 +81670,18 @@ Domain allowed access.
57424 </summary>
57425 </param>
57426 </interface>
57427 -<interface name="fs_associate" lineno="59">
57428 +<interface name="fs_image_file" lineno="57">
57429 +<summary>
57430 +Transform specified type into a filesystem
57431 +image file type.
57432 +</summary>
57433 +<param name="domain">
57434 +<summary>
57435 +Domain allowed access.
57436 +</summary>
57437 +</param>
57438 +</interface>
57439 +<interface name="fs_associate" lineno="80">
57440 <summary>
57441 Associate the specified file type to persistent
57442 filesystems with extended attributes. This
57443 @@ -81265,7 +81694,7 @@ The type of the to be associated.
57444 </summary>
57445 </param>
57446 </interface>
57447 -<interface name="fs_associate_noxattr" lineno="81">
57448 +<interface name="fs_associate_noxattr" lineno="102">
57449 <summary>
57450 Associate the specified file type to
57451 filesystems which lack extended attributes
57452 @@ -81279,7 +81708,7 @@ The type of the to be associated.
57453 </summary>
57454 </param>
57455 </interface>
57456 -<interface name="fs_exec_noxattr" lineno="101">
57457 +<interface name="fs_exec_noxattr" lineno="122">
57458 <summary>
57459 Execute files on a filesystem that does
57460 not support extended attributes.
57461 @@ -81291,7 +81720,7 @@ Domain allowed access.
57462 </param>
57463 <rolecap/>
57464 </interface>
57465 -<interface name="fs_xattr_type" lineno="121">
57466 +<interface name="fs_xattr_type" lineno="142">
57467 <summary>
57468 Transform specified type into a filesystem
57469 type which has extended attribute
57470 @@ -81303,7 +81732,7 @@ Domain allowed access.
57471 </summary>
57472 </param>
57473 </interface>
57474 -<interface name="fs_getattr_all_xattr_fs" lineno="159">
57475 +<interface name="fs_getattr_all_xattr_fs" lineno="180">
57476 <summary>
57477 Get the attributes of all the
57478 filesystems which have extended
57479 @@ -81331,7 +81760,7 @@ Domain allowed access.
57480 <infoflow type="read" weight="5"/>
57481 <rolecap/>
57482 </interface>
57483 -<interface name="fs_mount_xattr_fs" lineno="179">
57484 +<interface name="fs_mount_xattr_fs" lineno="200">
57485 <summary>
57486 Mount a persistent filesystem which
57487 has extended attributes, such as
57488 @@ -81343,7 +81772,7 @@ Domain allowed access.
57489 </summary>
57490 </param>
57491 </interface>
57492 -<interface name="fs_remount_xattr_fs" lineno="200">
57493 +<interface name="fs_remount_xattr_fs" lineno="221">
57494 <summary>
57495 Remount a persistent filesystem which
57496 has extended attributes, such as
57497 @@ -81356,7 +81785,7 @@ Domain allowed access.
57498 </summary>
57499 </param>
57500 </interface>
57501 -<interface name="fs_unmount_xattr_fs" lineno="220">
57502 +<interface name="fs_unmount_xattr_fs" lineno="241">
57503 <summary>
57504 Unmount a persistent filesystem which
57505 has extended attributes, such as
57506 @@ -81368,7 +81797,7 @@ Domain allowed access.
57507 </summary>
57508 </param>
57509 </interface>
57510 -<interface name="fs_getattr_xattr_fs" lineno="256">
57511 +<interface name="fs_getattr_xattr_fs" lineno="277">
57512 <summary>
57513 Get the attributes of persistent
57514 filesystems which have extended
57515 @@ -81396,7 +81825,7 @@ Domain allowed access.
57516 <infoflow type="read" weight="5"/>
57517 <rolecap/>
57518 </interface>
57519 -<interface name="fs_dontaudit_getattr_xattr_fs" lineno="277">
57520 +<interface name="fs_dontaudit_getattr_xattr_fs" lineno="298">
57521 <summary>
57522 Do not audit attempts to
57523 get the attributes of a persistent
57524 @@ -81409,7 +81838,7 @@ Domain to not audit.
57525 </summary>
57526 </param>
57527 </interface>
57528 -<interface name="fs_relabelfrom_xattr_fs" lineno="297">
57529 +<interface name="fs_relabelfrom_xattr_fs" lineno="318">
57530 <summary>
57531 Allow changing of the label of a
57532 filesystem with extended attributes
57533 @@ -81421,7 +81850,7 @@ Domain allowed access.
57534 </summary>
57535 </param>
57536 </interface>
57537 -<interface name="fs_get_xattr_fs_quotas" lineno="317">
57538 +<interface name="fs_get_xattr_fs_quotas" lineno="338">
57539 <summary>
57540 Get the filesystem quotas of a filesystem
57541 with extended attributes.
57542 @@ -81433,7 +81862,7 @@ Domain allowed access.
57543 </param>
57544 <rolecap/>
57545 </interface>
57546 -<interface name="fs_set_xattr_fs_quotas" lineno="337">
57547 +<interface name="fs_set_xattr_fs_quotas" lineno="358">
57548 <summary>
57549 Set the filesystem quotas of a filesystem
57550 with extended attributes.
57551 @@ -81445,7 +81874,7 @@ Domain allowed access.
57552 </param>
57553 <rolecap/>
57554 </interface>
57555 -<interface name="fs_read_anon_inodefs_files" lineno="355">
57556 +<interface name="fs_read_anon_inodefs_files" lineno="376">
57557 <summary>
57558 Read files on anon_inodefs file systems.
57559 </summary>
57560 @@ -81455,7 +81884,7 @@ Domain allowed access.
57561 </summary>
57562 </param>
57563 </interface>
57564 -<interface name="fs_rw_anon_inodefs_files" lineno="375">
57565 +<interface name="fs_rw_anon_inodefs_files" lineno="396">
57566 <summary>
57567 Read and write files on anon_inodefs
57568 file systems.
57569 @@ -81466,7 +81895,7 @@ Domain allowed access.
57570 </summary>
57571 </param>
57572 </interface>
57573 -<interface name="fs_dontaudit_rw_anon_inodefs_files" lineno="395">
57574 +<interface name="fs_dontaudit_rw_anon_inodefs_files" lineno="416">
57575 <summary>
57576 Do not audit attempts to read or write files on
57577 anon_inodefs file systems.
57578 @@ -81477,7 +81906,7 @@ Domain to not audit.
57579 </summary>
57580 </param>
57581 </interface>
57582 -<interface name="fs_mount_autofs" lineno="414">
57583 +<interface name="fs_mount_autofs" lineno="435">
57584 <summary>
57585 Mount an automount pseudo filesystem.
57586 </summary>
57587 @@ -81487,7 +81916,7 @@ Domain allowed access.
57588 </summary>
57589 </param>
57590 </interface>
57591 -<interface name="fs_remount_autofs" lineno="433">
57592 +<interface name="fs_remount_autofs" lineno="454">
57593 <summary>
57594 Remount an automount pseudo filesystem
57595 This allows some mount options to be changed.
57596 @@ -81498,7 +81927,7 @@ Domain allowed access.
57597 </summary>
57598 </param>
57599 </interface>
57600 -<interface name="fs_unmount_autofs" lineno="451">
57601 +<interface name="fs_unmount_autofs" lineno="472">
57602 <summary>
57603 Unmount an automount pseudo filesystem.
57604 </summary>
57605 @@ -81508,7 +81937,7 @@ Domain allowed access.
57606 </summary>
57607 </param>
57608 </interface>
57609 -<interface name="fs_getattr_autofs" lineno="470">
57610 +<interface name="fs_getattr_autofs" lineno="491">
57611 <summary>
57612 Get the attributes of an automount
57613 pseudo filesystem.
57614 @@ -81519,7 +81948,7 @@ Domain allowed access.
57615 </summary>
57616 </param>
57617 </interface>
57618 -<interface name="fs_search_auto_mountpoints" lineno="497">
57619 +<interface name="fs_search_auto_mountpoints" lineno="518">
57620 <summary>
57621 Search automount filesystem to use automatically
57622 mounted filesystems.
57623 @@ -81538,7 +81967,7 @@ Domain allowed access.
57624 </param>
57625 <infoflow type="read" weight="5"/>
57626 </interface>
57627 -<interface name="fs_list_auto_mountpoints" lineno="517">
57628 +<interface name="fs_list_auto_mountpoints" lineno="538">
57629 <summary>
57630 Read directories of automatically
57631 mounted filesystems.
57632 @@ -81550,7 +81979,7 @@ Domain allowed access.
57633 </param>
57634 <rolecap/>
57635 </interface>
57636 -<interface name="fs_dontaudit_list_auto_mountpoints" lineno="536">
57637 +<interface name="fs_dontaudit_list_auto_mountpoints" lineno="557">
57638 <summary>
57639 Do not audit attempts to list directories of automatically
57640 mounted filesystems.
57641 @@ -81561,7 +81990,7 @@ Domain to not audit.
57642 </summary>
57643 </param>
57644 </interface>
57645 -<interface name="fs_manage_autofs_symlinks" lineno="555">
57646 +<interface name="fs_manage_autofs_symlinks" lineno="576">
57647 <summary>
57648 Create, read, write, and delete symbolic links
57649 on an autofs filesystem.
57650 @@ -81572,7 +82001,7 @@ Domain allowed access.
57651 </summary>
57652 </param>
57653 </interface>
57654 -<interface name="fs_getattr_binfmt_misc_dirs" lineno="574">
57655 +<interface name="fs_getattr_binfmt_misc_dirs" lineno="595">
57656 <summary>
57657 Get the attributes of directories on
57658 binfmt_misc filesystems.
57659 @@ -81583,7 +82012,7 @@ Domain allowed access.
57660 </summary>
57661 </param>
57662 </interface>
57663 -<interface name="fs_register_binary_executable_type" lineno="610">
57664 +<interface name="fs_register_binary_executable_type" lineno="631">
57665 <summary>
57666 Register an interpreter for new binary
57667 file types, using the kernel binfmt_misc
57668 @@ -81610,7 +82039,7 @@ Domain allowed access.
57669 </param>
57670 <rolecap/>
57671 </interface>
57672 -<interface name="fs_mount_cgroup" lineno="630">
57673 +<interface name="fs_mount_cgroup" lineno="651">
57674 <summary>
57675 Mount cgroup filesystems.
57676 </summary>
57677 @@ -81620,7 +82049,7 @@ Domain allowed access.
57678 </summary>
57679 </param>
57680 </interface>
57681 -<interface name="fs_remount_cgroup" lineno="648">
57682 +<interface name="fs_remount_cgroup" lineno="669">
57683 <summary>
57684 Remount cgroup filesystems.
57685 </summary>
57686 @@ -81630,7 +82059,7 @@ Domain allowed access.
57687 </summary>
57688 </param>
57689 </interface>
57690 -<interface name="fs_unmount_cgroup" lineno="666">
57691 +<interface name="fs_unmount_cgroup" lineno="687">
57692 <summary>
57693 Unmount cgroup filesystems.
57694 </summary>
57695 @@ -81640,7 +82069,7 @@ Domain allowed access.
57696 </summary>
57697 </param>
57698 </interface>
57699 -<interface name="fs_getattr_cgroup" lineno="684">
57700 +<interface name="fs_getattr_cgroup" lineno="705">
57701 <summary>
57702 Get attributes of cgroup filesystems.
57703 </summary>
57704 @@ -81650,7 +82079,7 @@ Domain allowed access.
57705 </summary>
57706 </param>
57707 </interface>
57708 -<interface name="fs_search_cgroup_dirs" lineno="702">
57709 +<interface name="fs_search_cgroup_dirs" lineno="723">
57710 <summary>
57711 Search cgroup directories.
57712 </summary>
57713 @@ -81660,7 +82089,7 @@ Domain allowed access.
57714 </summary>
57715 </param>
57716 </interface>
57717 -<interface name="fs_list_cgroup_dirs" lineno="722">
57718 +<interface name="fs_list_cgroup_dirs" lineno="743">
57719 <summary>
57720 list cgroup directories.
57721 </summary>
57722 @@ -81670,7 +82099,7 @@ Domain allowed access.
57723 </summary>
57724 </param>
57725 </interface>
57726 -<interface name="fs_delete_cgroup_dirs" lineno="741">
57727 +<interface name="fs_delete_cgroup_dirs" lineno="762">
57728 <summary>
57729 Delete cgroup directories.
57730 </summary>
57731 @@ -81680,7 +82109,7 @@ Domain allowed access.
57732 </summary>
57733 </param>
57734 </interface>
57735 -<interface name="fs_manage_cgroup_dirs" lineno="760">
57736 +<interface name="fs_manage_cgroup_dirs" lineno="781">
57737 <summary>
57738 Manage cgroup directories.
57739 </summary>
57740 @@ -81690,7 +82119,7 @@ Domain allowed access.
57741 </summary>
57742 </param>
57743 </interface>
57744 -<interface name="fs_relabel_cgroup_dirs" lineno="780">
57745 +<interface name="fs_relabel_cgroup_dirs" lineno="801">
57746 <summary>
57747 Relabel cgroup directories.
57748 </summary>
57749 @@ -81700,7 +82129,7 @@ Domain allowed access.
57750 </summary>
57751 </param>
57752 </interface>
57753 -<interface name="fs_getattr_cgroup_files" lineno="798">
57754 +<interface name="fs_getattr_cgroup_files" lineno="819">
57755 <summary>
57756 Get attributes of cgroup files.
57757 </summary>
57758 @@ -81710,7 +82139,7 @@ Domain allowed access.
57759 </summary>
57760 </param>
57761 </interface>
57762 -<interface name="fs_read_cgroup_files" lineno="818">
57763 +<interface name="fs_read_cgroup_files" lineno="839">
57764 <summary>
57765 Read cgroup files.
57766 </summary>
57767 @@ -81720,7 +82149,7 @@ Domain allowed access.
57768 </summary>
57769 </param>
57770 </interface>
57771 -<interface name="fs_watch_cgroup_files" lineno="839">
57772 +<interface name="fs_watch_cgroup_files" lineno="860">
57773 <summary>
57774 Watch cgroup files.
57775 </summary>
57776 @@ -81730,7 +82159,7 @@ Domain allowed access.
57777 </summary>
57778 </param>
57779 </interface>
57780 -<interface name="fs_create_cgroup_links" lineno="858">
57781 +<interface name="fs_create_cgroup_links" lineno="879">
57782 <summary>
57783 Create cgroup lnk_files.
57784 </summary>
57785 @@ -81740,7 +82169,7 @@ Domain allowed access.
57786 </summary>
57787 </param>
57788 </interface>
57789 -<interface name="fs_write_cgroup_files" lineno="878">
57790 +<interface name="fs_write_cgroup_files" lineno="899">
57791 <summary>
57792 Write cgroup files.
57793 </summary>
57794 @@ -81750,7 +82179,7 @@ Domain allowed access.
57795 </summary>
57796 </param>
57797 </interface>
57798 -<interface name="fs_rw_cgroup_files" lineno="897">
57799 +<interface name="fs_rw_cgroup_files" lineno="918">
57800 <summary>
57801 Read and write cgroup files.
57802 </summary>
57803 @@ -81760,7 +82189,7 @@ Domain allowed access.
57804 </summary>
57805 </param>
57806 </interface>
57807 -<interface name="fs_dontaudit_rw_cgroup_files" lineno="919">
57808 +<interface name="fs_dontaudit_rw_cgroup_files" lineno="940">
57809 <summary>
57810 Do not audit attempts to open,
57811 get attributes, read and write
57812 @@ -81772,7 +82201,7 @@ Domain to not audit.
57813 </summary>
57814 </param>
57815 </interface>
57816 -<interface name="fs_manage_cgroup_files" lineno="937">
57817 +<interface name="fs_manage_cgroup_files" lineno="958">
57818 <summary>
57819 Manage cgroup files.
57820 </summary>
57821 @@ -81782,7 +82211,7 @@ Domain allowed access.
57822 </summary>
57823 </param>
57824 </interface>
57825 -<interface name="fs_relabel_cgroup_symlinks" lineno="957">
57826 +<interface name="fs_relabel_cgroup_symlinks" lineno="978">
57827 <summary>
57828 Relabel cgroup symbolic links.
57829 </summary>
57830 @@ -81792,7 +82221,7 @@ Domain allowed access.
57831 </summary>
57832 </param>
57833 </interface>
57834 -<interface name="fs_mounton_cgroup" lineno="975">
57835 +<interface name="fs_mounton_cgroup" lineno="996">
57836 <summary>
57837 Mount on cgroup directories.
57838 </summary>
57839 @@ -81802,7 +82231,7 @@ Domain allowed access.
57840 </summary>
57841 </param>
57842 </interface>
57843 -<interface name="fs_cgroup_filetrans" lineno="1009">
57844 +<interface name="fs_cgroup_filetrans" lineno="1030">
57845 <summary>
57846 Create an object in a cgroup tmpfs filesystem, with a private
57847 type using a type transition.
57848 @@ -81828,7 +82257,7 @@ The name of the object being created.
57849 </summary>
57850 </param>
57851 </interface>
57852 -<interface name="fs_dontaudit_list_cifs_dirs" lineno="1030">
57853 +<interface name="fs_dontaudit_list_cifs_dirs" lineno="1051">
57854 <summary>
57855 Do not audit attempts to read
57856 dirs on a CIFS or SMB filesystem.
57857 @@ -81839,7 +82268,7 @@ Domain to not audit.
57858 </summary>
57859 </param>
57860 </interface>
57861 -<interface name="fs_mount_cifs" lineno="1048">
57862 +<interface name="fs_mount_cifs" lineno="1069">
57863 <summary>
57864 Mount a CIFS or SMB network filesystem.
57865 </summary>
57866 @@ -81849,7 +82278,7 @@ Domain allowed access.
57867 </summary>
57868 </param>
57869 </interface>
57870 -<interface name="fs_remount_cifs" lineno="1067">
57871 +<interface name="fs_remount_cifs" lineno="1088">
57872 <summary>
57873 Remount a CIFS or SMB network filesystem.
57874 This allows some mount options to be changed.
57875 @@ -81860,7 +82289,7 @@ Domain allowed access.
57876 </summary>
57877 </param>
57878 </interface>
57879 -<interface name="fs_unmount_cifs" lineno="1085">
57880 +<interface name="fs_unmount_cifs" lineno="1106">
57881 <summary>
57882 Unmount a CIFS or SMB network filesystem.
57883 </summary>
57884 @@ -81870,7 +82299,7 @@ Domain allowed access.
57885 </summary>
57886 </param>
57887 </interface>
57888 -<interface name="fs_getattr_cifs" lineno="1105">
57889 +<interface name="fs_getattr_cifs" lineno="1126">
57890 <summary>
57891 Get the attributes of a CIFS or
57892 SMB network filesystem.
57893 @@ -81882,7 +82311,7 @@ Domain allowed access.
57894 </param>
57895 <rolecap/>
57896 </interface>
57897 -<interface name="fs_search_cifs" lineno="1123">
57898 +<interface name="fs_search_cifs" lineno="1144">
57899 <summary>
57900 Search directories on a CIFS or SMB filesystem.
57901 </summary>
57902 @@ -81892,7 +82321,7 @@ Domain allowed access.
57903 </summary>
57904 </param>
57905 </interface>
57906 -<interface name="fs_list_cifs" lineno="1142">
57907 +<interface name="fs_list_cifs" lineno="1163">
57908 <summary>
57909 List the contents of directories on a
57910 CIFS or SMB filesystem.
57911 @@ -81903,7 +82332,7 @@ Domain allowed access.
57912 </summary>
57913 </param>
57914 </interface>
57915 -<interface name="fs_dontaudit_list_cifs" lineno="1161">
57916 +<interface name="fs_dontaudit_list_cifs" lineno="1182">
57917 <summary>
57918 Do not audit attempts to list the contents
57919 of directories on a CIFS or SMB filesystem.
57920 @@ -81914,7 +82343,7 @@ Domain to not audit.
57921 </summary>
57922 </param>
57923 </interface>
57924 -<interface name="fs_mounton_cifs" lineno="1179">
57925 +<interface name="fs_mounton_cifs" lineno="1200">
57926 <summary>
57927 Mounton a CIFS filesystem.
57928 </summary>
57929 @@ -81924,7 +82353,7 @@ Domain allowed access.
57930 </summary>
57931 </param>
57932 </interface>
57933 -<interface name="fs_read_cifs_files" lineno="1198">
57934 +<interface name="fs_read_cifs_files" lineno="1219">
57935 <summary>
57936 Read files on a CIFS or SMB filesystem.
57937 </summary>
57938 @@ -81935,7 +82364,73 @@ Domain allowed access.
57939 </param>
57940 <rolecap/>
57941 </interface>
57942 -<interface name="fs_getattr_noxattr_fs" lineno="1219">
57943 +<interface name="fs_read_all_inherited_image_files" lineno="1239">
57944 +<summary>
57945 +Read all inherited filesystem image files.
57946 +</summary>
57947 +<param name="domain">
57948 +<summary>
57949 +Domain allowed access.
57950 +</summary>
57951 +</param>
57952 +<rolecap/>
57953 +</interface>
57954 +<interface name="fs_read_all_image_files" lineno="1258">
57955 +<summary>
57956 +Read all filesystem image files.
57957 +</summary>
57958 +<param name="domain">
57959 +<summary>
57960 +Domain allowed access.
57961 +</summary>
57962 +</param>
57963 +<rolecap/>
57964 +</interface>
57965 +<interface name="fs_mmap_read_all_image_files" lineno="1277">
57966 +<summary>
57967 +Mmap-read all filesystem image files.
57968 +</summary>
57969 +<param name="domain">
57970 +<summary>
57971 +Domain allowed access.
57972 +</summary>
57973 +</param>
57974 +<rolecap/>
57975 +</interface>
57976 +<interface name="fs_rw_all_image_files" lineno="1296">
57977 +<summary>
57978 +Read and write all filesystem image files.
57979 +</summary>
57980 +<param name="domain">
57981 +<summary>
57982 +Domain allowed access.
57983 +</summary>
57984 +</param>
57985 +<rolecap/>
57986 +</interface>
57987 +<interface name="fs_mmap_rw_all_image_files" lineno="1315">
57988 +<summary>
57989 +Mmap-Read-write all filesystem image files.
57990 +</summary>
57991 +<param name="domain">
57992 +<summary>
57993 +Domain allowed access.
57994 +</summary>
57995 +</param>
57996 +<rolecap/>
57997 +</interface>
57998 +<interface name="fs_dontaudit_write_all_image_files" lineno="1334">
57999 +<summary>
58000 +Do not audit attempts to write all filesystem image files.
58001 +</summary>
58002 +<param name="domain">
58003 +<summary>
58004 +Domain allowed access.
58005 +</summary>
58006 +</param>
58007 +<rolecap/>
58008 +</interface>
58009 +<interface name="fs_getattr_noxattr_fs" lineno="1354">
58010 <summary>
58011 Get the attributes of filesystems that
58012 do not have extended attribute support.
58013 @@ -81947,7 +82442,7 @@ Domain allowed access.
58014 </param>
58015 <rolecap/>
58016 </interface>
58017 -<interface name="fs_list_noxattr_fs" lineno="1237">
58018 +<interface name="fs_list_noxattr_fs" lineno="1372">
58019 <summary>
58020 Read all noxattrfs directories.
58021 </summary>
58022 @@ -81957,7 +82452,7 @@ Domain allowed access.
58023 </summary>
58024 </param>
58025 </interface>
58026 -<interface name="fs_dontaudit_list_noxattr_fs" lineno="1256">
58027 +<interface name="fs_dontaudit_list_noxattr_fs" lineno="1391">
58028 <summary>
58029 Do not audit attempts to list all
58030 noxattrfs directories.
58031 @@ -81968,7 +82463,7 @@ Domain to not audit.
58032 </summary>
58033 </param>
58034 </interface>
58035 -<interface name="fs_manage_noxattr_fs_dirs" lineno="1274">
58036 +<interface name="fs_manage_noxattr_fs_dirs" lineno="1409">
58037 <summary>
58038 Create, read, write, and delete all noxattrfs directories.
58039 </summary>
58040 @@ -81978,7 +82473,7 @@ Domain allowed access.
58041 </summary>
58042 </param>
58043 </interface>
58044 -<interface name="fs_read_noxattr_fs_files" lineno="1292">
58045 +<interface name="fs_read_noxattr_fs_files" lineno="1427">
58046 <summary>
58047 Read all noxattrfs files.
58048 </summary>
58049 @@ -81988,7 +82483,7 @@ Domain allowed access.
58050 </summary>
58051 </param>
58052 </interface>
58053 -<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1312">
58054 +<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1447">
58055 <summary>
58056 Do not audit attempts to read all
58057 noxattrfs files.
58058 @@ -81999,7 +82494,7 @@ Domain to not audit.
58059 </summary>
58060 </param>
58061 </interface>
58062 -<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1330">
58063 +<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1465">
58064 <summary>
58065 Dont audit attempts to write to noxattrfs files.
58066 </summary>
58067 @@ -82009,7 +82504,7 @@ Domain to not audit.
58068 </summary>
58069 </param>
58070 </interface>
58071 -<interface name="fs_manage_noxattr_fs_files" lineno="1348">
58072 +<interface name="fs_manage_noxattr_fs_files" lineno="1483">
58073 <summary>
58074 Create, read, write, and delete all noxattrfs files.
58075 </summary>
58076 @@ -82019,7 +82514,7 @@ Domain allowed access.
58077 </summary>
58078 </param>
58079 </interface>
58080 -<interface name="fs_read_noxattr_fs_symlinks" lineno="1367">
58081 +<interface name="fs_read_noxattr_fs_symlinks" lineno="1502">
58082 <summary>
58083 Read all noxattrfs symbolic links.
58084 </summary>
58085 @@ -82029,7 +82524,7 @@ Domain allowed access.
58086 </summary>
58087 </param>
58088 </interface>
58089 -<interface name="fs_manage_noxattr_fs_symlinks" lineno="1386">
58090 +<interface name="fs_manage_noxattr_fs_symlinks" lineno="1521">
58091 <summary>
58092 Manage all noxattrfs symbolic links.
58093 </summary>
58094 @@ -82039,9 +82534,9 @@ Domain allowed access.
58095 </summary>
58096 </param>
58097 </interface>
58098 -<interface name="fs_relabelfrom_noxattr_fs" lineno="1406">
58099 +<interface name="fs_relabelfrom_noxattr_fs" lineno="1541">
58100 <summary>
58101 -Relabel all objets from filesystems that
58102 +Relabel all objects from filesystems that
58103 do not support extended attributes.
58104 </summary>
58105 <param name="domain">
58106 @@ -82050,7 +82545,7 @@ Domain allowed access.
58107 </summary>
58108 </param>
58109 </interface>
58110 -<interface name="fs_dontaudit_read_cifs_files" lineno="1432">
58111 +<interface name="fs_dontaudit_read_cifs_files" lineno="1567">
58112 <summary>
58113 Do not audit attempts to read
58114 files on a CIFS or SMB filesystem.
58115 @@ -82061,7 +82556,7 @@ Domain to not audit.
58116 </summary>
58117 </param>
58118 </interface>
58119 -<interface name="fs_append_cifs_files" lineno="1452">
58120 +<interface name="fs_append_cifs_files" lineno="1587">
58121 <summary>
58122 Append files
58123 on a CIFS filesystem.
58124 @@ -82073,7 +82568,7 @@ Domain allowed access.
58125 </param>
58126 <rolecap/>
58127 </interface>
58128 -<interface name="fs_dontaudit_append_cifs_files" lineno="1472">
58129 +<interface name="fs_dontaudit_append_cifs_files" lineno="1607">
58130 <summary>
58131 dontaudit Append files
58132 on a CIFS filesystem.
58133 @@ -82085,7 +82580,7 @@ Domain to not audit.
58134 </param>
58135 <rolecap/>
58136 </interface>
58137 -<interface name="fs_dontaudit_rw_cifs_files" lineno="1491">
58138 +<interface name="fs_dontaudit_rw_cifs_files" lineno="1626">
58139 <summary>
58140 Do not audit attempts to read or
58141 write files on a CIFS or SMB filesystem.
58142 @@ -82096,7 +82591,7 @@ Domain to not audit.
58143 </summary>
58144 </param>
58145 </interface>
58146 -<interface name="fs_read_cifs_symlinks" lineno="1509">
58147 +<interface name="fs_read_cifs_symlinks" lineno="1644">
58148 <summary>
58149 Read symbolic links on a CIFS or SMB filesystem.
58150 </summary>
58151 @@ -82106,7 +82601,7 @@ Domain allowed access.
58152 </summary>
58153 </param>
58154 </interface>
58155 -<interface name="fs_read_cifs_named_pipes" lineno="1529">
58156 +<interface name="fs_read_cifs_named_pipes" lineno="1664">
58157 <summary>
58158 Read named pipes
58159 on a CIFS or SMB network filesystem.
58160 @@ -82117,7 +82612,7 @@ Domain allowed access.
58161 </summary>
58162 </param>
58163 </interface>
58164 -<interface name="fs_read_cifs_named_sockets" lineno="1548">
58165 +<interface name="fs_read_cifs_named_sockets" lineno="1683">
58166 <summary>
58167 Read named sockets
58168 on a CIFS or SMB network filesystem.
58169 @@ -82128,7 +82623,7 @@ Domain allowed access.
58170 </summary>
58171 </param>
58172 </interface>
58173 -<interface name="fs_exec_cifs_files" lineno="1569">
58174 +<interface name="fs_exec_cifs_files" lineno="1704">
58175 <summary>
58176 Execute files on a CIFS or SMB
58177 network filesystem, in the caller
58178 @@ -82141,7 +82636,7 @@ Domain allowed access.
58179 </param>
58180 <rolecap/>
58181 </interface>
58182 -<interface name="fs_manage_cifs_dirs" lineno="1590">
58183 +<interface name="fs_manage_cifs_dirs" lineno="1725">
58184 <summary>
58185 Create, read, write, and delete directories
58186 on a CIFS or SMB network filesystem.
58187 @@ -82153,7 +82648,7 @@ Domain allowed access.
58188 </param>
58189 <rolecap/>
58190 </interface>
58191 -<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1610">
58192 +<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1745">
58193 <summary>
58194 Do not audit attempts to create, read,
58195 write, and delete directories
58196 @@ -82165,7 +82660,7 @@ Domain to not audit.
58197 </summary>
58198 </param>
58199 </interface>
58200 -<interface name="fs_manage_cifs_files" lineno="1630">
58201 +<interface name="fs_manage_cifs_files" lineno="1765">
58202 <summary>
58203 Create, read, write, and delete files
58204 on a CIFS or SMB network filesystem.
58205 @@ -82177,7 +82672,7 @@ Domain allowed access.
58206 </param>
58207 <rolecap/>
58208 </interface>
58209 -<interface name="fs_dontaudit_manage_cifs_files" lineno="1650">
58210 +<interface name="fs_dontaudit_manage_cifs_files" lineno="1785">
58211 <summary>
58212 Do not audit attempts to create, read,
58213 write, and delete files
58214 @@ -82189,7 +82684,7 @@ Domain to not audit.
58215 </summary>
58216 </param>
58217 </interface>
58218 -<interface name="fs_manage_cifs_symlinks" lineno="1669">
58219 +<interface name="fs_manage_cifs_symlinks" lineno="1804">
58220 <summary>
58221 Create, read, write, and delete symbolic links
58222 on a CIFS or SMB network filesystem.
58223 @@ -82200,7 +82695,7 @@ Domain allowed access.
58224 </summary>
58225 </param>
58226 </interface>
58227 -<interface name="fs_manage_cifs_named_pipes" lineno="1688">
58228 +<interface name="fs_manage_cifs_named_pipes" lineno="1823">
58229 <summary>
58230 Create, read, write, and delete named pipes
58231 on a CIFS or SMB network filesystem.
58232 @@ -82211,7 +82706,7 @@ Domain allowed access.
58233 </summary>
58234 </param>
58235 </interface>
58236 -<interface name="fs_manage_cifs_named_sockets" lineno="1707">
58237 +<interface name="fs_manage_cifs_named_sockets" lineno="1842">
58238 <summary>
58239 Create, read, write, and delete named sockets
58240 on a CIFS or SMB network filesystem.
58241 @@ -82222,7 +82717,7 @@ Domain allowed access.
58242 </summary>
58243 </param>
58244 </interface>
58245 -<interface name="fs_cifs_domtrans" lineno="1750">
58246 +<interface name="fs_cifs_domtrans" lineno="1885">
58247 <summary>
58248 Execute a file on a CIFS or SMB filesystem
58249 in the specified domain.
58250 @@ -82257,7 +82752,7 @@ The type of the new process.
58251 </summary>
58252 </param>
58253 </interface>
58254 -<interface name="fs_manage_configfs_dirs" lineno="1770">
58255 +<interface name="fs_manage_configfs_dirs" lineno="1905">
58256 <summary>
58257 Create, read, write, and delete dirs
58258 on a configfs filesystem.
58259 @@ -82268,7 +82763,7 @@ Domain allowed access.
58260 </summary>
58261 </param>
58262 </interface>
58263 -<interface name="fs_manage_configfs_files" lineno="1789">
58264 +<interface name="fs_manage_configfs_files" lineno="1924">
58265 <summary>
58266 Create, read, write, and delete files
58267 on a configfs filesystem.
58268 @@ -82279,7 +82774,7 @@ Domain allowed access.
58269 </summary>
58270 </param>
58271 </interface>
58272 -<interface name="fs_mount_dos_fs" lineno="1808">
58273 +<interface name="fs_mount_dos_fs" lineno="1943">
58274 <summary>
58275 Mount a DOS filesystem, such as
58276 FAT32 or NTFS.
58277 @@ -82290,7 +82785,7 @@ Domain allowed access.
58278 </summary>
58279 </param>
58280 </interface>
58281 -<interface name="fs_remount_dos_fs" lineno="1828">
58282 +<interface name="fs_remount_dos_fs" lineno="1963">
58283 <summary>
58284 Remount a DOS filesystem, such as
58285 FAT32 or NTFS. This allows
58286 @@ -82302,7 +82797,7 @@ Domain allowed access.
58287 </summary>
58288 </param>
58289 </interface>
58290 -<interface name="fs_unmount_dos_fs" lineno="1847">
58291 +<interface name="fs_unmount_dos_fs" lineno="1982">
58292 <summary>
58293 Unmount a DOS filesystem, such as
58294 FAT32 or NTFS.
58295 @@ -82313,7 +82808,7 @@ Domain allowed access.
58296 </summary>
58297 </param>
58298 </interface>
58299 -<interface name="fs_getattr_dos_fs" lineno="1867">
58300 +<interface name="fs_getattr_dos_fs" lineno="2002">
58301 <summary>
58302 Get the attributes of a DOS
58303 filesystem, such as FAT32 or NTFS.
58304 @@ -82325,7 +82820,7 @@ Domain allowed access.
58305 </param>
58306 <rolecap/>
58307 </interface>
58308 -<interface name="fs_relabelfrom_dos_fs" lineno="1886">
58309 +<interface name="fs_relabelfrom_dos_fs" lineno="2021">
58310 <summary>
58311 Allow changing of the label of a
58312 DOS filesystem using the context= mount option.
58313 @@ -82336,7 +82831,7 @@ Domain allowed access.
58314 </summary>
58315 </param>
58316 </interface>
58317 -<interface name="fs_getattr_dos_dirs" lineno="1904">
58318 +<interface name="fs_getattr_dos_dirs" lineno="2039">
58319 <summary>
58320 Get attributes of directories on a dosfs filesystem.
58321 </summary>
58322 @@ -82346,7 +82841,7 @@ Domain allowed access.
58323 </summary>
58324 </param>
58325 </interface>
58326 -<interface name="fs_search_dos" lineno="1922">
58327 +<interface name="fs_search_dos" lineno="2057">
58328 <summary>
58329 Search dosfs filesystem.
58330 </summary>
58331 @@ -82356,7 +82851,7 @@ Domain allowed access.
58332 </summary>
58333 </param>
58334 </interface>
58335 -<interface name="fs_list_dos" lineno="1940">
58336 +<interface name="fs_list_dos" lineno="2075">
58337 <summary>
58338 List dirs DOS filesystem.
58339 </summary>
58340 @@ -82366,7 +82861,7 @@ Domain allowed access.
58341 </summary>
58342 </param>
58343 </interface>
58344 -<interface name="fs_manage_dos_dirs" lineno="1959">
58345 +<interface name="fs_manage_dos_dirs" lineno="2094">
58346 <summary>
58347 Create, read, write, and delete dirs
58348 on a DOS filesystem.
58349 @@ -82377,7 +82872,7 @@ Domain allowed access.
58350 </summary>
58351 </param>
58352 </interface>
58353 -<interface name="fs_read_dos_files" lineno="1977">
58354 +<interface name="fs_read_dos_files" lineno="2112">
58355 <summary>
58356 Read files on a DOS filesystem.
58357 </summary>
58358 @@ -82387,7 +82882,17 @@ Domain allowed access.
58359 </summary>
58360 </param>
58361 </interface>
58362 -<interface name="fs_manage_dos_files" lineno="1996">
58363 +<interface name="fs_mmap_read_dos_files" lineno="2130">
58364 +<summary>
58365 +Read and map files on a DOS filesystem.
58366 +</summary>
58367 +<param name="domain">
58368 +<summary>
58369 +Domain allowed access.
58370 +</summary>
58371 +</param>
58372 +</interface>
58373 +<interface name="fs_manage_dos_files" lineno="2150">
58374 <summary>
58375 Create, read, write, and delete files
58376 on a DOS filesystem.
58377 @@ -82398,7 +82903,7 @@ Domain allowed access.
58378 </summary>
58379 </param>
58380 </interface>
58381 -<interface name="fs_list_efivars" lineno="2014">
58382 +<interface name="fs_list_efivars" lineno="2168">
58383 <summary>
58384 List dirs in efivarfs filesystem.
58385 </summary>
58386 @@ -82408,7 +82913,7 @@ Domain allowed access.
58387 </summary>
58388 </param>
58389 </interface>
58390 -<interface name="fs_read_efivarfs_files" lineno="2034">
58391 +<interface name="fs_read_efivarfs_files" lineno="2188">
58392 <summary>
58393 Read files in efivarfs
58394 - contains Linux Kernel configuration options for UEFI systems
58395 @@ -82420,7 +82925,19 @@ Domain allowed access.
58396 </param>
58397 <rolecap/>
58398 </interface>
58399 -<interface name="fs_getattr_fusefs" lineno="2052">
58400 +<interface name="fs_manage_efivarfs_files" lineno="2208">
58401 +<summary>
58402 +Create, read, write, and delete files
58403 +on a efivarfs filesystem.
58404 +- contains Linux Kernel configuration options for UEFI systems
58405 +</summary>
58406 +<param name="domain">
58407 +<summary>
58408 +Domain allowed access.
58409 +</summary>
58410 +</param>
58411 +</interface>
58412 +<interface name="fs_getattr_fusefs" lineno="2226">
58413 <summary>
58414 stat a FUSE filesystem
58415 </summary>
58416 @@ -82430,7 +82947,7 @@ Domain allowed access.
58417 </summary>
58418 </param>
58419 </interface>
58420 -<interface name="fs_mount_fusefs" lineno="2070">
58421 +<interface name="fs_mount_fusefs" lineno="2244">
58422 <summary>
58423 Mount a FUSE filesystem.
58424 </summary>
58425 @@ -82440,7 +82957,7 @@ Domain allowed access.
58426 </summary>
58427 </param>
58428 </interface>
58429 -<interface name="fs_unmount_fusefs" lineno="2088">
58430 +<interface name="fs_unmount_fusefs" lineno="2262">
58431 <summary>
58432 Unmount a FUSE filesystem.
58433 </summary>
58434 @@ -82450,7 +82967,7 @@ Domain allowed access.
58435 </summary>
58436 </param>
58437 </interface>
58438 -<interface name="fs_mounton_fusefs" lineno="2106">
58439 +<interface name="fs_mounton_fusefs" lineno="2280">
58440 <summary>
58441 Mounton a FUSEFS filesystem.
58442 </summary>
58443 @@ -82460,7 +82977,7 @@ Domain allowed access.
58444 </summary>
58445 </param>
58446 </interface>
58447 -<interface name="fs_search_fusefs" lineno="2126">
58448 +<interface name="fs_search_fusefs" lineno="2300">
58449 <summary>
58450 Search directories
58451 on a FUSEFS filesystem.
58452 @@ -82472,7 +82989,7 @@ Domain allowed access.
58453 </param>
58454 <rolecap/>
58455 </interface>
58456 -<interface name="fs_dontaudit_list_fusefs" lineno="2145">
58457 +<interface name="fs_dontaudit_list_fusefs" lineno="2319">
58458 <summary>
58459 Do not audit attempts to list the contents
58460 of directories on a FUSEFS filesystem.
58461 @@ -82483,7 +83000,7 @@ Domain to not audit.
58462 </summary>
58463 </param>
58464 </interface>
58465 -<interface name="fs_manage_fusefs_dirs" lineno="2165">
58466 +<interface name="fs_manage_fusefs_dirs" lineno="2339">
58467 <summary>
58468 Create, read, write, and delete directories
58469 on a FUSEFS filesystem.
58470 @@ -82495,7 +83012,7 @@ Domain allowed access.
58471 </param>
58472 <rolecap/>
58473 </interface>
58474 -<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2185">
58475 +<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2359">
58476 <summary>
58477 Do not audit attempts to create, read,
58478 write, and delete directories
58479 @@ -82507,7 +83024,7 @@ Domain to not audit.
58480 </summary>
58481 </param>
58482 </interface>
58483 -<interface name="fs_read_fusefs_files" lineno="2204">
58484 +<interface name="fs_read_fusefs_files" lineno="2378">
58485 <summary>
58486 Read, a FUSEFS filesystem.
58487 </summary>
58488 @@ -82518,7 +83035,7 @@ Domain allowed access.
58489 </param>
58490 <rolecap/>
58491 </interface>
58492 -<interface name="fs_exec_fusefs_files" lineno="2223">
58493 +<interface name="fs_exec_fusefs_files" lineno="2397">
58494 <summary>
58495 Execute files on a FUSEFS filesystem.
58496 </summary>
58497 @@ -82529,7 +83046,7 @@ Domain allowed access.
58498 </param>
58499 <rolecap/>
58500 </interface>
58501 -<interface name="fs_manage_fusefs_files" lineno="2243">
58502 +<interface name="fs_manage_fusefs_files" lineno="2417">
58503 <summary>
58504 Create, read, write, and delete files
58505 on a FUSEFS filesystem.
58506 @@ -82541,7 +83058,7 @@ Domain allowed access.
58507 </param>
58508 <rolecap/>
58509 </interface>
58510 -<interface name="fs_dontaudit_manage_fusefs_files" lineno="2263">
58511 +<interface name="fs_dontaudit_manage_fusefs_files" lineno="2437">
58512 <summary>
58513 Do not audit attempts to create,
58514 read, write, and delete files
58515 @@ -82553,7 +83070,7 @@ Domain to not audit.
58516 </summary>
58517 </param>
58518 </interface>
58519 -<interface name="fs_read_fusefs_symlinks" lineno="2281">
58520 +<interface name="fs_read_fusefs_symlinks" lineno="2455">
58521 <summary>
58522 Read symbolic links on a FUSEFS filesystem.
58523 </summary>
58524 @@ -82563,7 +83080,7 @@ Domain allowed access.
58525 </summary>
58526 </param>
58527 </interface>
58528 -<interface name="fs_getattr_hugetlbfs" lineno="2301">
58529 +<interface name="fs_getattr_hugetlbfs" lineno="2475">
58530 <summary>
58531 Get the attributes of an hugetlbfs
58532 filesystem.
58533 @@ -82574,7 +83091,7 @@ Domain allowed access.
58534 </summary>
58535 </param>
58536 </interface>
58537 -<interface name="fs_list_hugetlbfs" lineno="2319">
58538 +<interface name="fs_list_hugetlbfs" lineno="2493">
58539 <summary>
58540 List hugetlbfs.
58541 </summary>
58542 @@ -82584,7 +83101,7 @@ Domain allowed access.
58543 </summary>
58544 </param>
58545 </interface>
58546 -<interface name="fs_manage_hugetlbfs_dirs" lineno="2337">
58547 +<interface name="fs_manage_hugetlbfs_dirs" lineno="2511">
58548 <summary>
58549 Manage hugetlbfs dirs.
58550 </summary>
58551 @@ -82594,7 +83111,7 @@ Domain allowed access.
58552 </summary>
58553 </param>
58554 </interface>
58555 -<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2355">
58556 +<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2529">
58557 <summary>
58558 Read and write inherited hugetlbfs files.
58559 </summary>
58560 @@ -82604,7 +83121,7 @@ Domain allowed access.
58561 </summary>
58562 </param>
58563 </interface>
58564 -<interface name="fs_rw_hugetlbfs_files" lineno="2373">
58565 +<interface name="fs_rw_hugetlbfs_files" lineno="2547">
58566 <summary>
58567 Read and write hugetlbfs files.
58568 </summary>
58569 @@ -82614,7 +83131,7 @@ Domain allowed access.
58570 </summary>
58571 </param>
58572 </interface>
58573 -<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2391">
58574 +<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2565">
58575 <summary>
58576 Read, map and write hugetlbfs files.
58577 </summary>
58578 @@ -82624,7 +83141,7 @@ Domain allowed access.
58579 </summary>
58580 </param>
58581 </interface>
58582 -<interface name="fs_associate_hugetlbfs" lineno="2410">
58583 +<interface name="fs_associate_hugetlbfs" lineno="2584">
58584 <summary>
58585 Allow the type to associate to hugetlbfs filesystems.
58586 </summary>
58587 @@ -82634,7 +83151,7 @@ The type of the object to be associated.
58588 </summary>
58589 </param>
58590 </interface>
58591 -<interface name="fs_search_inotifyfs" lineno="2428">
58592 +<interface name="fs_search_inotifyfs" lineno="2602">
58593 <summary>
58594 Search inotifyfs filesystem.
58595 </summary>
58596 @@ -82644,7 +83161,7 @@ Domain allowed access.
58597 </summary>
58598 </param>
58599 </interface>
58600 -<interface name="fs_list_inotifyfs" lineno="2446">
58601 +<interface name="fs_list_inotifyfs" lineno="2620">
58602 <summary>
58603 List inotifyfs filesystem.
58604 </summary>
58605 @@ -82654,7 +83171,7 @@ Domain allowed access.
58606 </summary>
58607 </param>
58608 </interface>
58609 -<interface name="fs_dontaudit_list_inotifyfs" lineno="2464">
58610 +<interface name="fs_dontaudit_list_inotifyfs" lineno="2638">
58611 <summary>
58612 Dontaudit List inotifyfs filesystem.
58613 </summary>
58614 @@ -82664,7 +83181,7 @@ Domain to not audit.
58615 </summary>
58616 </param>
58617 </interface>
58618 -<interface name="fs_hugetlbfs_filetrans" lineno="2498">
58619 +<interface name="fs_hugetlbfs_filetrans" lineno="2672">
58620 <summary>
58621 Create an object in a hugetlbfs filesystem, with a private
58622 type using a type transition.
58623 @@ -82690,7 +83207,7 @@ The name of the object being created.
58624 </summary>
58625 </param>
58626 </interface>
58627 -<interface name="fs_mount_iso9660_fs" lineno="2518">
58628 +<interface name="fs_mount_iso9660_fs" lineno="2692">
58629 <summary>
58630 Mount an iso9660 filesystem, which
58631 is usually used on CDs.
58632 @@ -82701,7 +83218,7 @@ Domain allowed access.
58633 </summary>
58634 </param>
58635 </interface>
58636 -<interface name="fs_remount_iso9660_fs" lineno="2538">
58637 +<interface name="fs_remount_iso9660_fs" lineno="2712">
58638 <summary>
58639 Remount an iso9660 filesystem, which
58640 is usually used on CDs. This allows
58641 @@ -82713,7 +83230,7 @@ Domain allowed access.
58642 </summary>
58643 </param>
58644 </interface>
58645 -<interface name="fs_relabelfrom_iso9660_fs" lineno="2557">
58646 +<interface name="fs_relabelfrom_iso9660_fs" lineno="2731">
58647 <summary>
58648 Allow changing of the label of a
58649 filesystem with iso9660 type
58650 @@ -82724,7 +83241,7 @@ Domain allowed access.
58651 </summary>
58652 </param>
58653 </interface>
58654 -<interface name="fs_unmount_iso9660_fs" lineno="2576">
58655 +<interface name="fs_unmount_iso9660_fs" lineno="2750">
58656 <summary>
58657 Unmount an iso9660 filesystem, which
58658 is usually used on CDs.
58659 @@ -82735,7 +83252,7 @@ Domain allowed access.
58660 </summary>
58661 </param>
58662 </interface>
58663 -<interface name="fs_getattr_iso9660_fs" lineno="2596">
58664 +<interface name="fs_getattr_iso9660_fs" lineno="2770">
58665 <summary>
58666 Get the attributes of an iso9660
58667 filesystem, which is usually used on CDs.
58668 @@ -82747,7 +83264,7 @@ Domain allowed access.
58669 </param>
58670 <rolecap/>
58671 </interface>
58672 -<interface name="fs_getattr_iso9660_files" lineno="2615">
58673 +<interface name="fs_getattr_iso9660_files" lineno="2789">
58674 <summary>
58675 Get the attributes of files on an iso9660
58676 filesystem, which is usually used on CDs.
58677 @@ -82758,7 +83275,7 @@ Domain allowed access.
58678 </summary>
58679 </param>
58680 </interface>
58681 -<interface name="fs_read_iso9660_files" lineno="2635">
58682 +<interface name="fs_read_iso9660_files" lineno="2809">
58683 <summary>
58684 Read files on an iso9660 filesystem, which
58685 is usually used on CDs.
58686 @@ -82769,7 +83286,7 @@ Domain allowed access.
58687 </summary>
58688 </param>
58689 </interface>
58690 -<interface name="fs_mount_nfs" lineno="2655">
58691 +<interface name="fs_mount_nfs" lineno="2829">
58692 <summary>
58693 Mount a NFS filesystem.
58694 </summary>
58695 @@ -82779,7 +83296,7 @@ Domain allowed access.
58696 </summary>
58697 </param>
58698 </interface>
58699 -<interface name="fs_remount_nfs" lineno="2674">
58700 +<interface name="fs_remount_nfs" lineno="2848">
58701 <summary>
58702 Remount a NFS filesystem. This allows
58703 some mount options to be changed.
58704 @@ -82790,7 +83307,7 @@ Domain allowed access.
58705 </summary>
58706 </param>
58707 </interface>
58708 -<interface name="fs_unmount_nfs" lineno="2692">
58709 +<interface name="fs_unmount_nfs" lineno="2866">
58710 <summary>
58711 Unmount a NFS filesystem.
58712 </summary>
58713 @@ -82800,7 +83317,7 @@ Domain allowed access.
58714 </summary>
58715 </param>
58716 </interface>
58717 -<interface name="fs_getattr_nfs" lineno="2711">
58718 +<interface name="fs_getattr_nfs" lineno="2885">
58719 <summary>
58720 Get the attributes of a NFS filesystem.
58721 </summary>
58722 @@ -82811,7 +83328,7 @@ Domain allowed access.
58723 </param>
58724 <rolecap/>
58725 </interface>
58726 -<interface name="fs_search_nfs" lineno="2729">
58727 +<interface name="fs_search_nfs" lineno="2903">
58728 <summary>
58729 Search directories on a NFS filesystem.
58730 </summary>
58731 @@ -82821,7 +83338,7 @@ Domain allowed access.
58732 </summary>
58733 </param>
58734 </interface>
58735 -<interface name="fs_list_nfs" lineno="2747">
58736 +<interface name="fs_list_nfs" lineno="2921">
58737 <summary>
58738 List NFS filesystem.
58739 </summary>
58740 @@ -82831,7 +83348,7 @@ Domain allowed access.
58741 </summary>
58742 </param>
58743 </interface>
58744 -<interface name="fs_dontaudit_list_nfs" lineno="2766">
58745 +<interface name="fs_dontaudit_list_nfs" lineno="2940">
58746 <summary>
58747 Do not audit attempts to list the contents
58748 of directories on a NFS filesystem.
58749 @@ -82842,7 +83359,7 @@ Domain to not audit.
58750 </summary>
58751 </param>
58752 </interface>
58753 -<interface name="fs_mounton_nfs" lineno="2784">
58754 +<interface name="fs_mounton_nfs" lineno="2958">
58755 <summary>
58756 Mounton a NFS filesystem.
58757 </summary>
58758 @@ -82852,7 +83369,7 @@ Domain allowed access.
58759 </summary>
58760 </param>
58761 </interface>
58762 -<interface name="fs_read_nfs_files" lineno="2803">
58763 +<interface name="fs_read_nfs_files" lineno="2977">
58764 <summary>
58765 Read files on a NFS filesystem.
58766 </summary>
58767 @@ -82863,7 +83380,7 @@ Domain allowed access.
58768 </param>
58769 <rolecap/>
58770 </interface>
58771 -<interface name="fs_dontaudit_read_nfs_files" lineno="2823">
58772 +<interface name="fs_dontaudit_read_nfs_files" lineno="2997">
58773 <summary>
58774 Do not audit attempts to read
58775 files on a NFS filesystem.
58776 @@ -82874,7 +83391,7 @@ Domain to not audit.
58777 </summary>
58778 </param>
58779 </interface>
58780 -<interface name="fs_write_nfs_files" lineno="2841">
58781 +<interface name="fs_write_nfs_files" lineno="3015">
58782 <summary>
58783 Read files on a NFS filesystem.
58784 </summary>
58785 @@ -82884,7 +83401,7 @@ Domain allowed access.
58786 </summary>
58787 </param>
58788 </interface>
58789 -<interface name="fs_exec_nfs_files" lineno="2861">
58790 +<interface name="fs_exec_nfs_files" lineno="3035">
58791 <summary>
58792 Execute files on a NFS filesystem.
58793 </summary>
58794 @@ -82895,7 +83412,7 @@ Domain allowed access.
58795 </param>
58796 <rolecap/>
58797 </interface>
58798 -<interface name="fs_append_nfs_files" lineno="2882">
58799 +<interface name="fs_append_nfs_files" lineno="3056">
58800 <summary>
58801 Append files
58802 on a NFS filesystem.
58803 @@ -82907,7 +83424,7 @@ Domain allowed access.
58804 </param>
58805 <rolecap/>
58806 </interface>
58807 -<interface name="fs_dontaudit_append_nfs_files" lineno="2902">
58808 +<interface name="fs_dontaudit_append_nfs_files" lineno="3076">
58809 <summary>
58810 dontaudit Append files
58811 on a NFS filesystem.
58812 @@ -82919,7 +83436,7 @@ Domain to not audit.
58813 </param>
58814 <rolecap/>
58815 </interface>
58816 -<interface name="fs_dontaudit_rw_nfs_files" lineno="2921">
58817 +<interface name="fs_dontaudit_rw_nfs_files" lineno="3095">
58818 <summary>
58819 Do not audit attempts to read or
58820 write files on a NFS filesystem.
58821 @@ -82930,7 +83447,7 @@ Domain to not audit.
58822 </summary>
58823 </param>
58824 </interface>
58825 -<interface name="fs_read_nfs_symlinks" lineno="2939">
58826 +<interface name="fs_read_nfs_symlinks" lineno="3113">
58827 <summary>
58828 Read symbolic links on a NFS filesystem.
58829 </summary>
58830 @@ -82940,7 +83457,7 @@ Domain allowed access.
58831 </summary>
58832 </param>
58833 </interface>
58834 -<interface name="fs_dontaudit_read_nfs_symlinks" lineno="2958">
58835 +<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3132">
58836 <summary>
58837 Dontaudit read symbolic links on a NFS filesystem.
58838 </summary>
58839 @@ -82950,7 +83467,7 @@ Domain to not audit.
58840 </summary>
58841 </param>
58842 </interface>
58843 -<interface name="fs_read_nfs_named_sockets" lineno="2976">
58844 +<interface name="fs_read_nfs_named_sockets" lineno="3150">
58845 <summary>
58846 Read named sockets on a NFS filesystem.
58847 </summary>
58848 @@ -82960,7 +83477,7 @@ Domain allowed access.
58849 </summary>
58850 </param>
58851 </interface>
58852 -<interface name="fs_read_nfs_named_pipes" lineno="2995">
58853 +<interface name="fs_read_nfs_named_pipes" lineno="3169">
58854 <summary>
58855 Read named pipes on a NFS network filesystem.
58856 </summary>
58857 @@ -82971,7 +83488,7 @@ Domain allowed access.
58858 </param>
58859 <rolecap/>
58860 </interface>
58861 -<interface name="fs_getattr_rpc_dirs" lineno="3014">
58862 +<interface name="fs_getattr_rpc_dirs" lineno="3188">
58863 <summary>
58864 Get the attributes of directories of RPC
58865 file system pipes.
58866 @@ -82982,7 +83499,7 @@ Domain allowed access.
58867 </summary>
58868 </param>
58869 </interface>
58870 -<interface name="fs_search_rpc" lineno="3033">
58871 +<interface name="fs_search_rpc" lineno="3207">
58872 <summary>
58873 Search directories of RPC file system pipes.
58874 </summary>
58875 @@ -82992,7 +83509,7 @@ Domain allowed access.
58876 </summary>
58877 </param>
58878 </interface>
58879 -<interface name="fs_search_removable" lineno="3051">
58880 +<interface name="fs_search_removable" lineno="3225">
58881 <summary>
58882 Search removable storage directories.
58883 </summary>
58884 @@ -83002,7 +83519,7 @@ Domain allowed access.
58885 </summary>
58886 </param>
58887 </interface>
58888 -<interface name="fs_dontaudit_list_removable" lineno="3069">
58889 +<interface name="fs_dontaudit_list_removable" lineno="3243">
58890 <summary>
58891 Do not audit attempts to list removable storage directories.
58892 </summary>
58893 @@ -83012,7 +83529,7 @@ Domain not to audit.
58894 </summary>
58895 </param>
58896 </interface>
58897 -<interface name="fs_read_removable_files" lineno="3087">
58898 +<interface name="fs_read_removable_files" lineno="3261">
58899 <summary>
58900 Read removable storage files.
58901 </summary>
58902 @@ -83022,7 +83539,7 @@ Domain allowed access.
58903 </summary>
58904 </param>
58905 </interface>
58906 -<interface name="fs_dontaudit_read_removable_files" lineno="3105">
58907 +<interface name="fs_dontaudit_read_removable_files" lineno="3279">
58908 <summary>
58909 Do not audit attempts to read removable storage files.
58910 </summary>
58911 @@ -83032,7 +83549,7 @@ Domain not to audit.
58912 </summary>
58913 </param>
58914 </interface>
58915 -<interface name="fs_dontaudit_write_removable_files" lineno="3123">
58916 +<interface name="fs_dontaudit_write_removable_files" lineno="3297">
58917 <summary>
58918 Do not audit attempts to write removable storage files.
58919 </summary>
58920 @@ -83042,7 +83559,7 @@ Domain not to audit.
58921 </summary>
58922 </param>
58923 </interface>
58924 -<interface name="fs_read_removable_symlinks" lineno="3141">
58925 +<interface name="fs_read_removable_symlinks" lineno="3315">
58926 <summary>
58927 Read removable storage symbolic links.
58928 </summary>
58929 @@ -83052,7 +83569,7 @@ Domain allowed access.
58930 </summary>
58931 </param>
58932 </interface>
58933 -<interface name="fs_read_removable_blk_files" lineno="3159">
58934 +<interface name="fs_read_removable_blk_files" lineno="3333">
58935 <summary>
58936 Read block nodes on removable filesystems.
58937 </summary>
58938 @@ -83062,7 +83579,7 @@ Domain allowed access.
58939 </summary>
58940 </param>
58941 </interface>
58942 -<interface name="fs_rw_removable_blk_files" lineno="3178">
58943 +<interface name="fs_rw_removable_blk_files" lineno="3352">
58944 <summary>
58945 Read and write block nodes on removable filesystems.
58946 </summary>
58947 @@ -83072,7 +83589,7 @@ Domain allowed access.
58948 </summary>
58949 </param>
58950 </interface>
58951 -<interface name="fs_list_rpc" lineno="3197">
58952 +<interface name="fs_list_rpc" lineno="3371">
58953 <summary>
58954 Read directories of RPC file system pipes.
58955 </summary>
58956 @@ -83082,7 +83599,7 @@ Domain allowed access.
58957 </summary>
58958 </param>
58959 </interface>
58960 -<interface name="fs_read_rpc_files" lineno="3215">
58961 +<interface name="fs_read_rpc_files" lineno="3389">
58962 <summary>
58963 Read files of RPC file system pipes.
58964 </summary>
58965 @@ -83092,7 +83609,7 @@ Domain allowed access.
58966 </summary>
58967 </param>
58968 </interface>
58969 -<interface name="fs_read_rpc_symlinks" lineno="3233">
58970 +<interface name="fs_read_rpc_symlinks" lineno="3407">
58971 <summary>
58972 Read symbolic links of RPC file system pipes.
58973 </summary>
58974 @@ -83102,7 +83619,7 @@ Domain allowed access.
58975 </summary>
58976 </param>
58977 </interface>
58978 -<interface name="fs_read_rpc_sockets" lineno="3251">
58979 +<interface name="fs_read_rpc_sockets" lineno="3425">
58980 <summary>
58981 Read sockets of RPC file system pipes.
58982 </summary>
58983 @@ -83112,7 +83629,7 @@ Domain allowed access.
58984 </summary>
58985 </param>
58986 </interface>
58987 -<interface name="fs_rw_rpc_sockets" lineno="3269">
58988 +<interface name="fs_rw_rpc_sockets" lineno="3443">
58989 <summary>
58990 Read and write sockets of RPC file system pipes.
58991 </summary>
58992 @@ -83122,7 +83639,7 @@ Domain allowed access.
58993 </summary>
58994 </param>
58995 </interface>
58996 -<interface name="fs_manage_nfs_dirs" lineno="3289">
58997 +<interface name="fs_manage_nfs_dirs" lineno="3463">
58998 <summary>
58999 Create, read, write, and delete directories
59000 on a NFS filesystem.
59001 @@ -83134,7 +83651,7 @@ Domain allowed access.
59002 </param>
59003 <rolecap/>
59004 </interface>
59005 -<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3309">
59006 +<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3483">
59007 <summary>
59008 Do not audit attempts to create, read,
59009 write, and delete directories
59010 @@ -83146,7 +83663,7 @@ Domain to not audit.
59011 </summary>
59012 </param>
59013 </interface>
59014 -<interface name="fs_manage_nfs_files" lineno="3329">
59015 +<interface name="fs_manage_nfs_files" lineno="3503">
59016 <summary>
59017 Create, read, write, and delete files
59018 on a NFS filesystem.
59019 @@ -83158,7 +83675,7 @@ Domain allowed access.
59020 </param>
59021 <rolecap/>
59022 </interface>
59023 -<interface name="fs_dontaudit_manage_nfs_files" lineno="3349">
59024 +<interface name="fs_dontaudit_manage_nfs_files" lineno="3523">
59025 <summary>
59026 Do not audit attempts to create,
59027 read, write, and delete files
59028 @@ -83170,7 +83687,7 @@ Domain to not audit.
59029 </summary>
59030 </param>
59031 </interface>
59032 -<interface name="fs_manage_nfs_symlinks" lineno="3369">
59033 +<interface name="fs_manage_nfs_symlinks" lineno="3543">
59034 <summary>
59035 Create, read, write, and delete symbolic links
59036 on a NFS network filesystem.
59037 @@ -83182,7 +83699,7 @@ Domain allowed access.
59038 </param>
59039 <rolecap/>
59040 </interface>
59041 -<interface name="fs_manage_nfs_named_pipes" lineno="3388">
59042 +<interface name="fs_manage_nfs_named_pipes" lineno="3562">
59043 <summary>
59044 Create, read, write, and delete named pipes
59045 on a NFS filesystem.
59046 @@ -83193,7 +83710,7 @@ Domain allowed access.
59047 </summary>
59048 </param>
59049 </interface>
59050 -<interface name="fs_manage_nfs_named_sockets" lineno="3407">
59051 +<interface name="fs_manage_nfs_named_sockets" lineno="3581">
59052 <summary>
59053 Create, read, write, and delete named sockets
59054 on a NFS filesystem.
59055 @@ -83204,7 +83721,7 @@ Domain allowed access.
59056 </summary>
59057 </param>
59058 </interface>
59059 -<interface name="fs_nfs_domtrans" lineno="3450">
59060 +<interface name="fs_nfs_domtrans" lineno="3624">
59061 <summary>
59062 Execute a file on a NFS filesystem
59063 in the specified domain.
59064 @@ -83239,7 +83756,7 @@ The type of the new process.
59065 </summary>
59066 </param>
59067 </interface>
59068 -<interface name="fs_mount_nfsd_fs" lineno="3469">
59069 +<interface name="fs_mount_nfsd_fs" lineno="3643">
59070 <summary>
59071 Mount a NFS server pseudo filesystem.
59072 </summary>
59073 @@ -83249,7 +83766,7 @@ Domain allowed access.
59074 </summary>
59075 </param>
59076 </interface>
59077 -<interface name="fs_remount_nfsd_fs" lineno="3488">
59078 +<interface name="fs_remount_nfsd_fs" lineno="3662">
59079 <summary>
59080 Mount a NFS server pseudo filesystem.
59081 This allows some mount options to be changed.
59082 @@ -83260,7 +83777,7 @@ Domain allowed access.
59083 </summary>
59084 </param>
59085 </interface>
59086 -<interface name="fs_unmount_nfsd_fs" lineno="3506">
59087 +<interface name="fs_unmount_nfsd_fs" lineno="3680">
59088 <summary>
59089 Unmount a NFS server pseudo filesystem.
59090 </summary>
59091 @@ -83270,7 +83787,7 @@ Domain allowed access.
59092 </summary>
59093 </param>
59094 </interface>
59095 -<interface name="fs_getattr_nfsd_fs" lineno="3525">
59096 +<interface name="fs_getattr_nfsd_fs" lineno="3699">
59097 <summary>
59098 Get the attributes of a NFS server
59099 pseudo filesystem.
59100 @@ -83281,7 +83798,7 @@ Domain allowed access.
59101 </summary>
59102 </param>
59103 </interface>
59104 -<interface name="fs_search_nfsd_fs" lineno="3543">
59105 +<interface name="fs_search_nfsd_fs" lineno="3717">
59106 <summary>
59107 Search NFS server directories.
59108 </summary>
59109 @@ -83291,7 +83808,7 @@ Domain allowed access.
59110 </summary>
59111 </param>
59112 </interface>
59113 -<interface name="fs_list_nfsd_fs" lineno="3561">
59114 +<interface name="fs_list_nfsd_fs" lineno="3735">
59115 <summary>
59116 List NFS server directories.
59117 </summary>
59118 @@ -83301,7 +83818,7 @@ Domain allowed access.
59119 </summary>
59120 </param>
59121 </interface>
59122 -<interface name="fs_getattr_nfsd_files" lineno="3579">
59123 +<interface name="fs_getattr_nfsd_files" lineno="3753">
59124 <summary>
59125 Getattr files on an nfsd filesystem
59126 </summary>
59127 @@ -83311,7 +83828,7 @@ Domain allowed access.
59128 </summary>
59129 </param>
59130 </interface>
59131 -<interface name="fs_rw_nfsd_fs" lineno="3597">
59132 +<interface name="fs_rw_nfsd_fs" lineno="3771">
59133 <summary>
59134 Read and write NFS server files.
59135 </summary>
59136 @@ -83321,7 +83838,7 @@ Domain allowed access.
59137 </summary>
59138 </param>
59139 </interface>
59140 -<interface name="fs_read_nsfs_files" lineno="3615">
59141 +<interface name="fs_read_nsfs_files" lineno="3789">
59142 <summary>
59143 Read nsfs inodes (e.g. /proc/pid/ns/uts)
59144 </summary>
59145 @@ -83331,7 +83848,17 @@ Domain allowed access.
59146 </summary>
59147 </param>
59148 </interface>
59149 -<interface name="fs_getattr_pstorefs" lineno="3633">
59150 +<interface name="fs_unmount_nsfs" lineno="3807">
59151 +<summary>
59152 +Unmount an nsfs filesystem.
59153 +</summary>
59154 +<param name="domain">
59155 +<summary>
59156 +Domain allowed access.
59157 +</summary>
59158 +</param>
59159 +</interface>
59160 +<interface name="fs_getattr_pstorefs" lineno="3825">
59161 <summary>
59162 Get the attributes of a pstore filesystem.
59163 </summary>
59164 @@ -83341,7 +83868,7 @@ Domain allowed access.
59165 </summary>
59166 </param>
59167 </interface>
59168 -<interface name="fs_getattr_pstore_dirs" lineno="3652">
59169 +<interface name="fs_getattr_pstore_dirs" lineno="3844">
59170 <summary>
59171 Get the attributes of directories
59172 of a pstore filesystem.
59173 @@ -83352,7 +83879,7 @@ Domain allowed access.
59174 </summary>
59175 </param>
59176 </interface>
59177 -<interface name="fs_relabel_pstore_dirs" lineno="3671">
59178 +<interface name="fs_relabel_pstore_dirs" lineno="3863">
59179 <summary>
59180 Relabel to/from pstore_t directories.
59181 </summary>
59182 @@ -83362,7 +83889,39 @@ Domain allowed access.
59183 </summary>
59184 </param>
59185 </interface>
59186 -<interface name="fs_associate_ramfs" lineno="3689">
59187 +<interface name="fs_list_pstore_dirs" lineno="3882">
59188 +<summary>
59189 +List the directories
59190 +of a pstore filesystem.
59191 +</summary>
59192 +<param name="domain">
59193 +<summary>
59194 +Domain allowed access.
59195 +</summary>
59196 +</param>
59197 +</interface>
59198 +<interface name="fs_read_pstore_files" lineno="3901">
59199 +<summary>
59200 +Read pstore_t files
59201 +</summary>
59202 +<param name="domain">
59203 +<summary>
59204 +Domain allowed access.
59205 +</summary>
59206 +</param>
59207 +</interface>
59208 +<interface name="fs_delete_pstore_files" lineno="3920">
59209 +<summary>
59210 +Delete the files
59211 +of a pstore filesystem.
59212 +</summary>
59213 +<param name="domain">
59214 +<summary>
59215 +Domain allowed access.
59216 +</summary>
59217 +</param>
59218 +</interface>
59219 +<interface name="fs_associate_ramfs" lineno="3939">
59220 <summary>
59221 Allow the type to associate to ramfs filesystems.
59222 </summary>
59223 @@ -83372,7 +83931,7 @@ The type of the object to be associated.
59224 </summary>
59225 </param>
59226 </interface>
59227 -<interface name="fs_mount_ramfs" lineno="3707">
59228 +<interface name="fs_mount_ramfs" lineno="3957">
59229 <summary>
59230 Mount a RAM filesystem.
59231 </summary>
59232 @@ -83382,7 +83941,7 @@ Domain allowed access.
59233 </summary>
59234 </param>
59235 </interface>
59236 -<interface name="fs_remount_ramfs" lineno="3726">
59237 +<interface name="fs_remount_ramfs" lineno="3976">
59238 <summary>
59239 Remount a RAM filesystem. This allows
59240 some mount options to be changed.
59241 @@ -83393,7 +83952,7 @@ Domain allowed access.
59242 </summary>
59243 </param>
59244 </interface>
59245 -<interface name="fs_unmount_ramfs" lineno="3744">
59246 +<interface name="fs_unmount_ramfs" lineno="3994">
59247 <summary>
59248 Unmount a RAM filesystem.
59249 </summary>
59250 @@ -83403,7 +83962,7 @@ Domain allowed access.
59251 </summary>
59252 </param>
59253 </interface>
59254 -<interface name="fs_getattr_ramfs" lineno="3762">
59255 +<interface name="fs_getattr_ramfs" lineno="4012">
59256 <summary>
59257 Get the attributes of a RAM filesystem.
59258 </summary>
59259 @@ -83413,7 +83972,7 @@ Domain allowed access.
59260 </summary>
59261 </param>
59262 </interface>
59263 -<interface name="fs_search_ramfs" lineno="3780">
59264 +<interface name="fs_search_ramfs" lineno="4030">
59265 <summary>
59266 Search directories on a ramfs
59267 </summary>
59268 @@ -83423,7 +83982,7 @@ Domain allowed access.
59269 </summary>
59270 </param>
59271 </interface>
59272 -<interface name="fs_dontaudit_search_ramfs" lineno="3798">
59273 +<interface name="fs_dontaudit_search_ramfs" lineno="4048">
59274 <summary>
59275 Dontaudit Search directories on a ramfs
59276 </summary>
59277 @@ -83433,7 +83992,7 @@ Domain to not audit.
59278 </summary>
59279 </param>
59280 </interface>
59281 -<interface name="fs_manage_ramfs_dirs" lineno="3817">
59282 +<interface name="fs_manage_ramfs_dirs" lineno="4067">
59283 <summary>
59284 Create, read, write, and delete
59285 directories on a ramfs.
59286 @@ -83444,7 +84003,7 @@ Domain allowed access.
59287 </summary>
59288 </param>
59289 </interface>
59290 -<interface name="fs_dontaudit_read_ramfs_files" lineno="3835">
59291 +<interface name="fs_dontaudit_read_ramfs_files" lineno="4085">
59292 <summary>
59293 Dontaudit read on a ramfs files.
59294 </summary>
59295 @@ -83454,7 +84013,7 @@ Domain to not audit.
59296 </summary>
59297 </param>
59298 </interface>
59299 -<interface name="fs_dontaudit_read_ramfs_pipes" lineno="3853">
59300 +<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4103">
59301 <summary>
59302 Dontaudit read on a ramfs fifo_files.
59303 </summary>
59304 @@ -83464,7 +84023,7 @@ Domain to not audit.
59305 </summary>
59306 </param>
59307 </interface>
59308 -<interface name="fs_manage_ramfs_files" lineno="3872">
59309 +<interface name="fs_manage_ramfs_files" lineno="4122">
59310 <summary>
59311 Create, read, write, and delete
59312 files on a ramfs filesystem.
59313 @@ -83475,7 +84034,7 @@ Domain allowed access.
59314 </summary>
59315 </param>
59316 </interface>
59317 -<interface name="fs_write_ramfs_pipes" lineno="3890">
59318 +<interface name="fs_write_ramfs_pipes" lineno="4140">
59319 <summary>
59320 Write to named pipe on a ramfs filesystem.
59321 </summary>
59322 @@ -83485,7 +84044,7 @@ Domain allowed access.
59323 </summary>
59324 </param>
59325 </interface>
59326 -<interface name="fs_dontaudit_write_ramfs_pipes" lineno="3909">
59327 +<interface name="fs_dontaudit_write_ramfs_pipes" lineno="4159">
59328 <summary>
59329 Do not audit attempts to write to named
59330 pipes on a ramfs filesystem.
59331 @@ -83496,7 +84055,7 @@ Domain to not audit.
59332 </summary>
59333 </param>
59334 </interface>
59335 -<interface name="fs_rw_ramfs_pipes" lineno="3927">
59336 +<interface name="fs_rw_ramfs_pipes" lineno="4177">
59337 <summary>
59338 Read and write a named pipe on a ramfs filesystem.
59339 </summary>
59340 @@ -83506,7 +84065,7 @@ Domain allowed access.
59341 </summary>
59342 </param>
59343 </interface>
59344 -<interface name="fs_manage_ramfs_pipes" lineno="3946">
59345 +<interface name="fs_manage_ramfs_pipes" lineno="4196">
59346 <summary>
59347 Create, read, write, and delete
59348 named pipes on a ramfs filesystem.
59349 @@ -83517,7 +84076,7 @@ Domain allowed access.
59350 </summary>
59351 </param>
59352 </interface>
59353 -<interface name="fs_write_ramfs_sockets" lineno="3964">
59354 +<interface name="fs_write_ramfs_sockets" lineno="4214">
59355 <summary>
59356 Write to named socket on a ramfs filesystem.
59357 </summary>
59358 @@ -83527,7 +84086,7 @@ Domain allowed access.
59359 </summary>
59360 </param>
59361 </interface>
59362 -<interface name="fs_manage_ramfs_sockets" lineno="3983">
59363 +<interface name="fs_manage_ramfs_sockets" lineno="4233">
59364 <summary>
59365 Create, read, write, and delete
59366 named sockets on a ramfs filesystem.
59367 @@ -83538,7 +84097,7 @@ Domain allowed access.
59368 </summary>
59369 </param>
59370 </interface>
59371 -<interface name="fs_mount_romfs" lineno="4001">
59372 +<interface name="fs_mount_romfs" lineno="4251">
59373 <summary>
59374 Mount a ROM filesystem.
59375 </summary>
59376 @@ -83548,7 +84107,7 @@ Domain allowed access.
59377 </summary>
59378 </param>
59379 </interface>
59380 -<interface name="fs_remount_romfs" lineno="4020">
59381 +<interface name="fs_remount_romfs" lineno="4270">
59382 <summary>
59383 Remount a ROM filesystem. This allows
59384 some mount options to be changed.
59385 @@ -83559,7 +84118,7 @@ Domain allowed access.
59386 </summary>
59387 </param>
59388 </interface>
59389 -<interface name="fs_unmount_romfs" lineno="4038">
59390 +<interface name="fs_unmount_romfs" lineno="4288">
59391 <summary>
59392 Unmount a ROM filesystem.
59393 </summary>
59394 @@ -83569,7 +84128,7 @@ Domain allowed access.
59395 </summary>
59396 </param>
59397 </interface>
59398 -<interface name="fs_getattr_romfs" lineno="4057">
59399 +<interface name="fs_getattr_romfs" lineno="4307">
59400 <summary>
59401 Get the attributes of a ROM
59402 filesystem.
59403 @@ -83580,7 +84139,7 @@ Domain allowed access.
59404 </summary>
59405 </param>
59406 </interface>
59407 -<interface name="fs_mount_rpc_pipefs" lineno="4075">
59408 +<interface name="fs_mount_rpc_pipefs" lineno="4325">
59409 <summary>
59410 Mount a RPC pipe filesystem.
59411 </summary>
59412 @@ -83590,7 +84149,7 @@ Domain allowed access.
59413 </summary>
59414 </param>
59415 </interface>
59416 -<interface name="fs_remount_rpc_pipefs" lineno="4094">
59417 +<interface name="fs_remount_rpc_pipefs" lineno="4344">
59418 <summary>
59419 Remount a RPC pipe filesystem. This
59420 allows some mount option to be changed.
59421 @@ -83601,7 +84160,7 @@ Domain allowed access.
59422 </summary>
59423 </param>
59424 </interface>
59425 -<interface name="fs_unmount_rpc_pipefs" lineno="4112">
59426 +<interface name="fs_unmount_rpc_pipefs" lineno="4362">
59427 <summary>
59428 Unmount a RPC pipe filesystem.
59429 </summary>
59430 @@ -83611,7 +84170,7 @@ Domain allowed access.
59431 </summary>
59432 </param>
59433 </interface>
59434 -<interface name="fs_getattr_rpc_pipefs" lineno="4131">
59435 +<interface name="fs_getattr_rpc_pipefs" lineno="4381">
59436 <summary>
59437 Get the attributes of a RPC pipe
59438 filesystem.
59439 @@ -83622,7 +84181,7 @@ Domain allowed access.
59440 </summary>
59441 </param>
59442 </interface>
59443 -<interface name="fs_rw_rpc_named_pipes" lineno="4149">
59444 +<interface name="fs_rw_rpc_named_pipes" lineno="4399">
59445 <summary>
59446 Read and write RPC pipe filesystem named pipes.
59447 </summary>
59448 @@ -83632,7 +84191,7 @@ Domain allowed access.
59449 </summary>
59450 </param>
59451 </interface>
59452 -<interface name="fs_mount_tmpfs" lineno="4167">
59453 +<interface name="fs_mount_tmpfs" lineno="4417">
59454 <summary>
59455 Mount a tmpfs filesystem.
59456 </summary>
59457 @@ -83642,7 +84201,7 @@ Domain allowed access.
59458 </summary>
59459 </param>
59460 </interface>
59461 -<interface name="fs_remount_tmpfs" lineno="4185">
59462 +<interface name="fs_remount_tmpfs" lineno="4435">
59463 <summary>
59464 Remount a tmpfs filesystem.
59465 </summary>
59466 @@ -83652,7 +84211,7 @@ Domain allowed access.
59467 </summary>
59468 </param>
59469 </interface>
59470 -<interface name="fs_unmount_tmpfs" lineno="4203">
59471 +<interface name="fs_unmount_tmpfs" lineno="4453">
59472 <summary>
59473 Unmount a tmpfs filesystem.
59474 </summary>
59475 @@ -83662,7 +84221,7 @@ Domain allowed access.
59476 </summary>
59477 </param>
59478 </interface>
59479 -<interface name="fs_dontaudit_getattr_tmpfs" lineno="4221">
59480 +<interface name="fs_dontaudit_getattr_tmpfs" lineno="4471">
59481 <summary>
59482 Do not audit getting the attributes of a tmpfs filesystem
59483 </summary>
59484 @@ -83672,7 +84231,7 @@ Domain to not audit
59485 </summary>
59486 </param>
59487 </interface>
59488 -<interface name="fs_getattr_tmpfs" lineno="4241">
59489 +<interface name="fs_getattr_tmpfs" lineno="4491">
59490 <summary>
59491 Get the attributes of a tmpfs
59492 filesystem.
59493 @@ -83684,7 +84243,7 @@ Domain allowed access.
59494 </param>
59495 <rolecap/>
59496 </interface>
59497 -<interface name="fs_associate_tmpfs" lineno="4259">
59498 +<interface name="fs_associate_tmpfs" lineno="4509">
59499 <summary>
59500 Allow the type to associate to tmpfs filesystems.
59501 </summary>
59502 @@ -83694,7 +84253,7 @@ The type of the object to be associated.
59503 </summary>
59504 </param>
59505 </interface>
59506 -<interface name="fs_relabelfrom_tmpfs" lineno="4277">
59507 +<interface name="fs_relabelfrom_tmpfs" lineno="4527">
59508 <summary>
59509 Relabel from tmpfs filesystem.
59510 </summary>
59511 @@ -83704,7 +84263,7 @@ Domain allowed access.
59512 </summary>
59513 </param>
59514 </interface>
59515 -<interface name="fs_getattr_tmpfs_dirs" lineno="4295">
59516 +<interface name="fs_getattr_tmpfs_dirs" lineno="4545">
59517 <summary>
59518 Get the attributes of tmpfs directories.
59519 </summary>
59520 @@ -83714,7 +84273,7 @@ Domain allowed access.
59521 </summary>
59522 </param>
59523 </interface>
59524 -<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4314">
59525 +<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4564">
59526 <summary>
59527 Do not audit attempts to get the attributes
59528 of tmpfs directories.
59529 @@ -83725,7 +84284,7 @@ Domain to not audit.
59530 </summary>
59531 </param>
59532 </interface>
59533 -<interface name="fs_mounton_tmpfs" lineno="4332">
59534 +<interface name="fs_mounton_tmpfs" lineno="4582">
59535 <summary>
59536 Mount on tmpfs directories.
59537 </summary>
59538 @@ -83735,7 +84294,7 @@ Domain allowed access.
59539 </summary>
59540 </param>
59541 </interface>
59542 -<interface name="fs_mounton_tmpfs_files" lineno="4350">
59543 +<interface name="fs_mounton_tmpfs_files" lineno="4600">
59544 <summary>
59545 Mount on tmpfs files.
59546 </summary>
59547 @@ -83745,7 +84304,7 @@ Domain allowed access.
59548 </summary>
59549 </param>
59550 </interface>
59551 -<interface name="fs_setattr_tmpfs_dirs" lineno="4368">
59552 +<interface name="fs_setattr_tmpfs_dirs" lineno="4618">
59553 <summary>
59554 Set the attributes of tmpfs directories.
59555 </summary>
59556 @@ -83755,7 +84314,7 @@ Domain allowed access.
59557 </summary>
59558 </param>
59559 </interface>
59560 -<interface name="fs_search_tmpfs" lineno="4386">
59561 +<interface name="fs_search_tmpfs" lineno="4636">
59562 <summary>
59563 Search tmpfs directories.
59564 </summary>
59565 @@ -83765,7 +84324,7 @@ Domain allowed access.
59566 </summary>
59567 </param>
59568 </interface>
59569 -<interface name="fs_list_tmpfs" lineno="4404">
59570 +<interface name="fs_list_tmpfs" lineno="4654">
59571 <summary>
59572 List the contents of generic tmpfs directories.
59573 </summary>
59574 @@ -83775,7 +84334,7 @@ Domain allowed access.
59575 </summary>
59576 </param>
59577 </interface>
59578 -<interface name="fs_dontaudit_list_tmpfs" lineno="4423">
59579 +<interface name="fs_dontaudit_list_tmpfs" lineno="4673">
59580 <summary>
59581 Do not audit attempts to list the
59582 contents of generic tmpfs directories.
59583 @@ -83786,7 +84345,7 @@ Domain to not audit.
59584 </summary>
59585 </param>
59586 </interface>
59587 -<interface name="fs_manage_tmpfs_dirs" lineno="4442">
59588 +<interface name="fs_manage_tmpfs_dirs" lineno="4692">
59589 <summary>
59590 Create, read, write, and delete
59591 tmpfs directories
59592 @@ -83797,7 +84356,7 @@ Domain allowed access.
59593 </summary>
59594 </param>
59595 </interface>
59596 -<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="4461">
59597 +<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="4711">
59598 <summary>
59599 Do not audit attempts to write
59600 tmpfs directories
59601 @@ -83808,7 +84367,7 @@ Domain to not audit.
59602 </summary>
59603 </param>
59604 </interface>
59605 -<interface name="fs_relabelfrom_tmpfs_dirs" lineno="4479">
59606 +<interface name="fs_relabelfrom_tmpfs_dirs" lineno="4729">
59607 <summary>
59608 Relabel from tmpfs_t dir
59609 </summary>
59610 @@ -83818,7 +84377,7 @@ Domain allowed access.
59611 </summary>
59612 </param>
59613 </interface>
59614 -<interface name="fs_relabel_tmpfs_dirs" lineno="4497">
59615 +<interface name="fs_relabel_tmpfs_dirs" lineno="4747">
59616 <summary>
59617 Relabel directory on tmpfs filesystems.
59618 </summary>
59619 @@ -83828,7 +84387,7 @@ Domain allowed access.
59620 </summary>
59621 </param>
59622 </interface>
59623 -<interface name="fs_tmpfs_filetrans" lineno="4530">
59624 +<interface name="fs_tmpfs_filetrans" lineno="4780">
59625 <summary>
59626 Create an object in a tmpfs filesystem, with a private
59627 type using a type transition.
59628 @@ -83854,7 +84413,7 @@ The name of the object being created.
59629 </summary>
59630 </param>
59631 </interface>
59632 -<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="4550">
59633 +<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="4800">
59634 <summary>
59635 Do not audit attempts to getattr
59636 generic tmpfs files.
59637 @@ -83865,7 +84424,7 @@ Domain to not audit.
59638 </summary>
59639 </param>
59640 </interface>
59641 -<interface name="fs_dontaudit_rw_tmpfs_files" lineno="4569">
59642 +<interface name="fs_dontaudit_rw_tmpfs_files" lineno="4819">
59643 <summary>
59644 Do not audit attempts to read or write
59645 generic tmpfs files.
59646 @@ -83876,7 +84435,7 @@ Domain to not audit.
59647 </summary>
59648 </param>
59649 </interface>
59650 -<interface name="fs_delete_tmpfs_symlinks" lineno="4587">
59651 +<interface name="fs_delete_tmpfs_symlinks" lineno="4837">
59652 <summary>
59653 Delete tmpfs symbolic links.
59654 </summary>
59655 @@ -83886,7 +84445,7 @@ Domain allowed access.
59656 </summary>
59657 </param>
59658 </interface>
59659 -<interface name="fs_manage_auto_mountpoints" lineno="4606">
59660 +<interface name="fs_manage_auto_mountpoints" lineno="4856">
59661 <summary>
59662 Create, read, write, and delete
59663 auto moutpoints.
59664 @@ -83897,7 +84456,7 @@ Domain allowed access.
59665 </summary>
59666 </param>
59667 </interface>
59668 -<interface name="fs_read_tmpfs_files" lineno="4624">
59669 +<interface name="fs_read_tmpfs_files" lineno="4874">
59670 <summary>
59671 Read generic tmpfs files.
59672 </summary>
59673 @@ -83907,7 +84466,7 @@ Domain allowed access.
59674 </summary>
59675 </param>
59676 </interface>
59677 -<interface name="fs_rw_tmpfs_files" lineno="4642">
59678 +<interface name="fs_rw_tmpfs_files" lineno="4892">
59679 <summary>
59680 Read and write generic tmpfs files.
59681 </summary>
59682 @@ -83917,7 +84476,7 @@ Domain allowed access.
59683 </summary>
59684 </param>
59685 </interface>
59686 -<interface name="fs_relabel_tmpfs_files" lineno="4660">
59687 +<interface name="fs_relabel_tmpfs_files" lineno="4910">
59688 <summary>
59689 Relabel files on tmpfs filesystems.
59690 </summary>
59691 @@ -83927,7 +84486,7 @@ Domain allowed access.
59692 </summary>
59693 </param>
59694 </interface>
59695 -<interface name="fs_read_tmpfs_symlinks" lineno="4678">
59696 +<interface name="fs_read_tmpfs_symlinks" lineno="4928">
59697 <summary>
59698 Read tmpfs link files.
59699 </summary>
59700 @@ -83937,7 +84496,7 @@ Domain allowed access.
59701 </summary>
59702 </param>
59703 </interface>
59704 -<interface name="fs_relabelfrom_tmpfs_sockets" lineno="4696">
59705 +<interface name="fs_relabelfrom_tmpfs_sockets" lineno="4946">
59706 <summary>
59707 Relabelfrom socket files on tmpfs filesystems.
59708 </summary>
59709 @@ -83947,7 +84506,7 @@ Domain allowed access.
59710 </summary>
59711 </param>
59712 </interface>
59713 -<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="4714">
59714 +<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="4964">
59715 <summary>
59716 Relabelfrom tmpfs link files.
59717 </summary>
59718 @@ -83957,7 +84516,7 @@ Domain allowed access.
59719 </summary>
59720 </param>
59721 </interface>
59722 -<interface name="fs_rw_tmpfs_chr_files" lineno="4732">
59723 +<interface name="fs_rw_tmpfs_chr_files" lineno="4982">
59724 <summary>
59725 Read and write character nodes on tmpfs filesystems.
59726 </summary>
59727 @@ -83967,7 +84526,7 @@ Domain allowed access.
59728 </summary>
59729 </param>
59730 </interface>
59731 -<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="4751">
59732 +<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5001">
59733 <summary>
59734 dontaudit Read and write character nodes on tmpfs filesystems.
59735 </summary>
59736 @@ -83977,7 +84536,7 @@ Domain to not audit.
59737 </summary>
59738 </param>
59739 </interface>
59740 -<interface name="fs_relabel_tmpfs_chr_file" lineno="4770">
59741 +<interface name="fs_relabel_tmpfs_chr_file" lineno="5020">
59742 <summary>
59743 Relabel character nodes on tmpfs filesystems.
59744 </summary>
59745 @@ -83987,7 +84546,7 @@ Domain allowed access.
59746 </summary>
59747 </param>
59748 </interface>
59749 -<interface name="fs_rw_tmpfs_blk_files" lineno="4789">
59750 +<interface name="fs_rw_tmpfs_blk_files" lineno="5039">
59751 <summary>
59752 Read and write block nodes on tmpfs filesystems.
59753 </summary>
59754 @@ -83997,7 +84556,7 @@ Domain allowed access.
59755 </summary>
59756 </param>
59757 </interface>
59758 -<interface name="fs_relabel_tmpfs_blk_file" lineno="4808">
59759 +<interface name="fs_relabel_tmpfs_blk_file" lineno="5058">
59760 <summary>
59761 Relabel block nodes on tmpfs filesystems.
59762 </summary>
59763 @@ -84007,7 +84566,7 @@ Domain allowed access.
59764 </summary>
59765 </param>
59766 </interface>
59767 -<interface name="fs_manage_tmpfs_files" lineno="4828">
59768 +<interface name="fs_manage_tmpfs_files" lineno="5078">
59769 <summary>
59770 Read and write, create and delete generic
59771 files on tmpfs filesystems.
59772 @@ -84018,7 +84577,7 @@ Domain allowed access.
59773 </summary>
59774 </param>
59775 </interface>
59776 -<interface name="fs_manage_tmpfs_symlinks" lineno="4847">
59777 +<interface name="fs_manage_tmpfs_symlinks" lineno="5097">
59778 <summary>
59779 Read and write, create and delete symbolic
59780 links on tmpfs filesystems.
59781 @@ -84029,7 +84588,7 @@ Domain allowed access.
59782 </summary>
59783 </param>
59784 </interface>
59785 -<interface name="fs_manage_tmpfs_sockets" lineno="4866">
59786 +<interface name="fs_manage_tmpfs_sockets" lineno="5116">
59787 <summary>
59788 Read and write, create and delete socket
59789 files on tmpfs filesystems.
59790 @@ -84040,7 +84599,7 @@ Domain allowed access.
59791 </summary>
59792 </param>
59793 </interface>
59794 -<interface name="fs_manage_tmpfs_chr_files" lineno="4885">
59795 +<interface name="fs_manage_tmpfs_chr_files" lineno="5135">
59796 <summary>
59797 Read and write, create and delete character
59798 nodes on tmpfs filesystems.
59799 @@ -84051,7 +84610,7 @@ Domain allowed access.
59800 </summary>
59801 </param>
59802 </interface>
59803 -<interface name="fs_manage_tmpfs_blk_files" lineno="4904">
59804 +<interface name="fs_manage_tmpfs_blk_files" lineno="5154">
59805 <summary>
59806 Read and write, create and delete block nodes
59807 on tmpfs filesystems.
59808 @@ -84062,7 +84621,7 @@ Domain allowed access.
59809 </summary>
59810 </param>
59811 </interface>
59812 -<interface name="fs_getattr_tracefs" lineno="4922">
59813 +<interface name="fs_getattr_tracefs" lineno="5172">
59814 <summary>
59815 Get the attributes of a trace filesystem.
59816 </summary>
59817 @@ -84072,7 +84631,7 @@ Domain allowed access.
59818 </summary>
59819 </param>
59820 </interface>
59821 -<interface name="fs_getattr_tracefs_dirs" lineno="4940">
59822 +<interface name="fs_getattr_tracefs_dirs" lineno="5190">
59823 <summary>
59824 Get attributes of dirs on tracefs filesystem.
59825 </summary>
59826 @@ -84082,7 +84641,7 @@ Domain allowed access.
59827 </summary>
59828 </param>
59829 </interface>
59830 -<interface name="fs_search_tracefs" lineno="4958">
59831 +<interface name="fs_search_tracefs" lineno="5208">
59832 <summary>
59833 search directories on a tracefs filesystem
59834 </summary>
59835 @@ -84092,7 +84651,7 @@ Domain allowed access.
59836 </summary>
59837 </param>
59838 </interface>
59839 -<interface name="fs_getattr_tracefs_files" lineno="4977">
59840 +<interface name="fs_getattr_tracefs_files" lineno="5227">
59841 <summary>
59842 Get the attributes of files
59843 on a trace filesystem.
59844 @@ -84103,7 +84662,7 @@ Domain allowed access.
59845 </summary>
59846 </param>
59847 </interface>
59848 -<interface name="fs_mount_xenfs" lineno="4995">
59849 +<interface name="fs_mount_xenfs" lineno="5245">
59850 <summary>
59851 Mount a XENFS filesystem.
59852 </summary>
59853 @@ -84113,7 +84672,7 @@ Domain allowed access.
59854 </summary>
59855 </param>
59856 </interface>
59857 -<interface name="fs_search_xenfs" lineno="5013">
59858 +<interface name="fs_search_xenfs" lineno="5263">
59859 <summary>
59860 Search the XENFS filesystem.
59861 </summary>
59862 @@ -84123,7 +84682,7 @@ Domain allowed access.
59863 </summary>
59864 </param>
59865 </interface>
59866 -<interface name="fs_manage_xenfs_dirs" lineno="5033">
59867 +<interface name="fs_manage_xenfs_dirs" lineno="5283">
59868 <summary>
59869 Create, read, write, and delete directories
59870 on a XENFS filesystem.
59871 @@ -84135,7 +84694,7 @@ Domain allowed access.
59872 </param>
59873 <rolecap/>
59874 </interface>
59875 -<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5053">
59876 +<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5303">
59877 <summary>
59878 Do not audit attempts to create, read,
59879 write, and delete directories
59880 @@ -84147,7 +84706,7 @@ Domain to not audit.
59881 </summary>
59882 </param>
59883 </interface>
59884 -<interface name="fs_manage_xenfs_files" lineno="5073">
59885 +<interface name="fs_manage_xenfs_files" lineno="5323">
59886 <summary>
59887 Create, read, write, and delete files
59888 on a XENFS filesystem.
59889 @@ -84159,7 +84718,17 @@ Domain allowed access.
59890 </param>
59891 <rolecap/>
59892 </interface>
59893 -<interface name="fs_dontaudit_manage_xenfs_files" lineno="5093">
59894 +<interface name="fs_mmap_xenfs_files" lineno="5341">
59895 +<summary>
59896 +Map files a XENFS filesystem.
59897 +</summary>
59898 +<param name="domain">
59899 +<summary>
59900 +Domain allowed access.
59901 +</summary>
59902 +</param>
59903 +</interface>
59904 +<interface name="fs_dontaudit_manage_xenfs_files" lineno="5361">
59905 <summary>
59906 Do not audit attempts to create,
59907 read, write, and delete files
59908 @@ -84171,7 +84740,7 @@ Domain to not audit.
59909 </summary>
59910 </param>
59911 </interface>
59912 -<interface name="fs_mount_all_fs" lineno="5111">
59913 +<interface name="fs_mount_all_fs" lineno="5379">
59914 <summary>
59915 Mount all filesystems.
59916 </summary>
59917 @@ -84181,7 +84750,7 @@ Domain allowed access.
59918 </summary>
59919 </param>
59920 </interface>
59921 -<interface name="fs_remount_all_fs" lineno="5130">
59922 +<interface name="fs_remount_all_fs" lineno="5398">
59923 <summary>
59924 Remount all filesystems. This
59925 allows some mount options to be changed.
59926 @@ -84192,7 +84761,7 @@ Domain allowed access.
59927 </summary>
59928 </param>
59929 </interface>
59930 -<interface name="fs_unmount_all_fs" lineno="5148">
59931 +<interface name="fs_unmount_all_fs" lineno="5416">
59932 <summary>
59933 Unmount all filesystems.
59934 </summary>
59935 @@ -84202,7 +84771,7 @@ Domain allowed access.
59936 </summary>
59937 </param>
59938 </interface>
59939 -<interface name="fs_getattr_all_fs" lineno="5180">
59940 +<interface name="fs_getattr_all_fs" lineno="5448">
59941 <summary>
59942 Get the attributes of all filesystems.
59943 </summary>
59944 @@ -84226,7 +84795,7 @@ Domain allowed access.
59945 <infoflow type="read" weight="5"/>
59946 <rolecap/>
59947 </interface>
59948 -<interface name="fs_dontaudit_getattr_all_fs" lineno="5200">
59949 +<interface name="fs_dontaudit_getattr_all_fs" lineno="5468">
59950 <summary>
59951 Do not audit attempts to get the attributes
59952 all filesystems.
59953 @@ -84237,7 +84806,7 @@ Domain to not audit.
59954 </summary>
59955 </param>
59956 </interface>
59957 -<interface name="fs_get_all_fs_quotas" lineno="5219">
59958 +<interface name="fs_get_all_fs_quotas" lineno="5487">
59959 <summary>
59960 Get the quotas of all filesystems.
59961 </summary>
59962 @@ -84248,7 +84817,7 @@ Domain allowed access.
59963 </param>
59964 <rolecap/>
59965 </interface>
59966 -<interface name="fs_set_all_quotas" lineno="5238">
59967 +<interface name="fs_set_all_quotas" lineno="5506">
59968 <summary>
59969 Set the quotas of all filesystems.
59970 </summary>
59971 @@ -84259,7 +84828,7 @@ Domain allowed access.
59972 </param>
59973 <rolecap/>
59974 </interface>
59975 -<interface name="fs_relabelfrom_all_fs" lineno="5256">
59976 +<interface name="fs_relabelfrom_all_fs" lineno="5524">
59977 <summary>
59978 Relabelfrom all filesystems.
59979 </summary>
59980 @@ -84269,7 +84838,7 @@ Domain allowed access.
59981 </summary>
59982 </param>
59983 </interface>
59984 -<interface name="fs_getattr_all_dirs" lineno="5275">
59985 +<interface name="fs_getattr_all_dirs" lineno="5543">
59986 <summary>
59987 Get the attributes of all directories
59988 with a filesystem type.
59989 @@ -84280,7 +84849,7 @@ Domain allowed access.
59990 </summary>
59991 </param>
59992 </interface>
59993 -<interface name="fs_search_all" lineno="5293">
59994 +<interface name="fs_search_all" lineno="5561">
59995 <summary>
59996 Search all directories with a filesystem type.
59997 </summary>
59998 @@ -84290,7 +84859,7 @@ Domain allowed access.
59999 </summary>
60000 </param>
60001 </interface>
60002 -<interface name="fs_list_all" lineno="5311">
60003 +<interface name="fs_list_all" lineno="5579">
60004 <summary>
60005 List all directories with a filesystem type.
60006 </summary>
60007 @@ -84300,7 +84869,7 @@ Domain allowed access.
60008 </summary>
60009 </param>
60010 </interface>
60011 -<interface name="fs_getattr_all_files" lineno="5330">
60012 +<interface name="fs_getattr_all_files" lineno="5598">
60013 <summary>
60014 Get the attributes of all files with
60015 a filesystem type.
60016 @@ -84311,7 +84880,7 @@ Domain allowed access.
60017 </summary>
60018 </param>
60019 </interface>
60020 -<interface name="fs_dontaudit_getattr_all_files" lineno="5349">
60021 +<interface name="fs_dontaudit_getattr_all_files" lineno="5617">
60022 <summary>
60023 Do not audit attempts to get the attributes
60024 of all files with a filesystem type.
60025 @@ -84322,7 +84891,7 @@ Domain to not audit.
60026 </summary>
60027 </param>
60028 </interface>
60029 -<interface name="fs_getattr_all_symlinks" lineno="5368">
60030 +<interface name="fs_getattr_all_symlinks" lineno="5636">
60031 <summary>
60032 Get the attributes of all symbolic links with
60033 a filesystem type.
60034 @@ -84333,7 +84902,7 @@ Domain allowed access.
60035 </summary>
60036 </param>
60037 </interface>
60038 -<interface name="fs_dontaudit_getattr_all_symlinks" lineno="5387">
60039 +<interface name="fs_dontaudit_getattr_all_symlinks" lineno="5655">
60040 <summary>
60041 Do not audit attempts to get the attributes
60042 of all symbolic links with a filesystem type.
60043 @@ -84344,7 +84913,7 @@ Domain to not audit.
60044 </summary>
60045 </param>
60046 </interface>
60047 -<interface name="fs_getattr_all_pipes" lineno="5406">
60048 +<interface name="fs_getattr_all_pipes" lineno="5674">
60049 <summary>
60050 Get the attributes of all named pipes with
60051 a filesystem type.
60052 @@ -84355,7 +84924,7 @@ Domain allowed access.
60053 </summary>
60054 </param>
60055 </interface>
60056 -<interface name="fs_dontaudit_getattr_all_pipes" lineno="5425">
60057 +<interface name="fs_dontaudit_getattr_all_pipes" lineno="5693">
60058 <summary>
60059 Do not audit attempts to get the attributes
60060 of all named pipes with a filesystem type.
60061 @@ -84366,7 +84935,7 @@ Domain to not audit.
60062 </summary>
60063 </param>
60064 </interface>
60065 -<interface name="fs_getattr_all_sockets" lineno="5444">
60066 +<interface name="fs_getattr_all_sockets" lineno="5712">
60067 <summary>
60068 Get the attributes of all named sockets with
60069 a filesystem type.
60070 @@ -84377,7 +84946,7 @@ Domain allowed access.
60071 </summary>
60072 </param>
60073 </interface>
60074 -<interface name="fs_dontaudit_getattr_all_sockets" lineno="5463">
60075 +<interface name="fs_dontaudit_getattr_all_sockets" lineno="5731">
60076 <summary>
60077 Do not audit attempts to get the attributes
60078 of all named sockets with a filesystem type.
60079 @@ -84388,7 +84957,7 @@ Domain to not audit.
60080 </summary>
60081 </param>
60082 </interface>
60083 -<interface name="fs_getattr_all_blk_files" lineno="5482">
60084 +<interface name="fs_getattr_all_blk_files" lineno="5750">
60085 <summary>
60086 Get the attributes of all block device nodes with
60087 a filesystem type.
60088 @@ -84399,7 +84968,7 @@ Domain allowed access.
60089 </summary>
60090 </param>
60091 </interface>
60092 -<interface name="fs_getattr_all_chr_files" lineno="5501">
60093 +<interface name="fs_getattr_all_chr_files" lineno="5769">
60094 <summary>
60095 Get the attributes of all character device nodes with
60096 a filesystem type.
60097 @@ -84410,7 +84979,7 @@ Domain allowed access.
60098 </summary>
60099 </param>
60100 </interface>
60101 -<interface name="fs_unconfined" lineno="5519">
60102 +<interface name="fs_unconfined" lineno="5787">
60103 <summary>
60104 Unconfined access to filesystems
60105 </summary>
60106 @@ -84703,7 +85272,17 @@ Domain to not audit.
60107 </summary>
60108 </param>
60109 </interface>
60110 -<interface name="kernel_read_ring_buffer" lineno="505">
60111 +<interface name="kernel_write_key" lineno="504">
60112 +<summary>
60113 +allow write access to the kernel key ring.
60114 +</summary>
60115 +<param name="domain">
60116 +<summary>
60117 +Domain to allow.
60118 +</summary>
60119 +</param>
60120 +</interface>
60121 +<interface name="kernel_read_ring_buffer" lineno="523">
60122 <summary>
60123 Allows caller to read the ring buffer.
60124 </summary>
60125 @@ -84714,7 +85293,7 @@ Domain allowed access.
60126 </param>
60127 <rolecap/>
60128 </interface>
60129 -<interface name="kernel_dontaudit_read_ring_buffer" lineno="524">
60130 +<interface name="kernel_dontaudit_read_ring_buffer" lineno="542">
60131 <summary>
60132 Do not audit attempts to read the ring buffer.
60133 </summary>
60134 @@ -84724,7 +85303,7 @@ Domain to not audit.
60135 </summary>
60136 </param>
60137 </interface>
60138 -<interface name="kernel_change_ring_buffer_level" lineno="543">
60139 +<interface name="kernel_change_ring_buffer_level" lineno="561">
60140 <summary>
60141 Change the level of kernel messages logged to the console.
60142 </summary>
60143 @@ -84735,7 +85314,7 @@ Domain allowed access.
60144 </param>
60145 <rolecap/>
60146 </interface>
60147 -<interface name="kernel_clear_ring_buffer" lineno="563">
60148 +<interface name="kernel_clear_ring_buffer" lineno="581">
60149 <summary>
60150 Allows the caller to clear the ring buffer.
60151 </summary>
60152 @@ -84746,7 +85325,7 @@ Domain allowed access.
60153 </param>
60154 <rolecap/>
60155 </interface>
60156 -<interface name="kernel_request_load_module" lineno="595">
60157 +<interface name="kernel_request_load_module" lineno="613">
60158 <summary>
60159 Allows caller to request the kernel to load a module
60160 </summary>
60161 @@ -84769,7 +85348,7 @@ Domain allowed access.
60162 </summary>
60163 </param>
60164 </interface>
60165 -<interface name="kernel_dontaudit_request_load_module" lineno="613">
60166 +<interface name="kernel_dontaudit_request_load_module" lineno="631">
60167 <summary>
60168 Do not audit requests to the kernel to load a module.
60169 </summary>
60170 @@ -84779,7 +85358,7 @@ Domain to not audit.
60171 </summary>
60172 </param>
60173 </interface>
60174 -<interface name="kernel_get_sysvipc_info" lineno="631">
60175 +<interface name="kernel_get_sysvipc_info" lineno="649">
60176 <summary>
60177 Get information on all System V IPC objects.
60178 </summary>
60179 @@ -84789,7 +85368,7 @@ Domain allowed access.
60180 </summary>
60181 </param>
60182 </interface>
60183 -<interface name="kernel_getattr_debugfs" lineno="649">
60184 +<interface name="kernel_getattr_debugfs" lineno="667">
60185 <summary>
60186 Get the attributes of a kernel debugging filesystem.
60187 </summary>
60188 @@ -84799,7 +85378,7 @@ Domain allowed access.
60189 </summary>
60190 </param>
60191 </interface>
60192 -<interface name="kernel_mount_debugfs" lineno="667">
60193 +<interface name="kernel_mount_debugfs" lineno="685">
60194 <summary>
60195 Mount a kernel debugging filesystem.
60196 </summary>
60197 @@ -84809,7 +85388,7 @@ Domain allowed access.
60198 </summary>
60199 </param>
60200 </interface>
60201 -<interface name="kernel_unmount_debugfs" lineno="685">
60202 +<interface name="kernel_unmount_debugfs" lineno="703">
60203 <summary>
60204 Unmount a kernel debugging filesystem.
60205 </summary>
60206 @@ -84819,7 +85398,7 @@ Domain allowed access.
60207 </summary>
60208 </param>
60209 </interface>
60210 -<interface name="kernel_remount_debugfs" lineno="703">
60211 +<interface name="kernel_remount_debugfs" lineno="721">
60212 <summary>
60213 Remount a kernel debugging filesystem.
60214 </summary>
60215 @@ -84829,7 +85408,7 @@ Domain allowed access.
60216 </summary>
60217 </param>
60218 </interface>
60219 -<interface name="kernel_search_debugfs" lineno="721">
60220 +<interface name="kernel_search_debugfs" lineno="739">
60221 <summary>
60222 Search the contents of a kernel debugging filesystem.
60223 </summary>
60224 @@ -84839,7 +85418,7 @@ Domain allowed access.
60225 </summary>
60226 </param>
60227 </interface>
60228 -<interface name="kernel_dontaudit_search_debugfs" lineno="739">
60229 +<interface name="kernel_dontaudit_search_debugfs" lineno="757">
60230 <summary>
60231 Do not audit attempts to search the kernel debugging filesystem.
60232 </summary>
60233 @@ -84849,7 +85428,7 @@ Domain to not audit.
60234 </summary>
60235 </param>
60236 </interface>
60237 -<interface name="kernel_read_debugfs" lineno="757">
60238 +<interface name="kernel_read_debugfs" lineno="775">
60239 <summary>
60240 Read information from the debugging filesystem.
60241 </summary>
60242 @@ -84859,7 +85438,7 @@ Domain allowed access.
60243 </summary>
60244 </param>
60245 </interface>
60246 -<interface name="kernel_dontaudit_write_debugfs_dirs" lineno="777">
60247 +<interface name="kernel_dontaudit_write_debugfs_dirs" lineno="795">
60248 <summary>
60249 Do not audit attempts to write kernel debugging filesystem dirs.
60250 </summary>
60251 @@ -84869,7 +85448,7 @@ Domain to not audit.
60252 </summary>
60253 </param>
60254 </interface>
60255 -<interface name="kernel_manage_debugfs" lineno="795">
60256 +<interface name="kernel_manage_debugfs" lineno="813">
60257 <summary>
60258 Manage information from the debugging filesystem.
60259 </summary>
60260 @@ -84879,7 +85458,7 @@ Domain allowed access.
60261 </summary>
60262 </param>
60263 </interface>
60264 -<interface name="kernel_mount_kvmfs" lineno="815">
60265 +<interface name="kernel_mount_kvmfs" lineno="833">
60266 <summary>
60267 Mount a kernel VM filesystem.
60268 </summary>
60269 @@ -84889,7 +85468,7 @@ Domain allowed access.
60270 </summary>
60271 </param>
60272 </interface>
60273 -<interface name="kernel_mount_proc" lineno="833">
60274 +<interface name="kernel_mount_proc" lineno="851">
60275 <summary>
60276 mount the proc filesystem.
60277 </summary>
60278 @@ -84899,7 +85478,7 @@ Domain allowed access.
60279 </summary>
60280 </param>
60281 </interface>
60282 -<interface name="kernel_remount_proc" lineno="851">
60283 +<interface name="kernel_remount_proc" lineno="869">
60284 <summary>
60285 remount the proc filesystem.
60286 </summary>
60287 @@ -84909,7 +85488,7 @@ Domain allowed access.
60288 </summary>
60289 </param>
60290 </interface>
60291 -<interface name="kernel_unmount_proc" lineno="869">
60292 +<interface name="kernel_unmount_proc" lineno="887">
60293 <summary>
60294 Unmount the proc filesystem.
60295 </summary>
60296 @@ -84919,7 +85498,7 @@ Domain allowed access.
60297 </summary>
60298 </param>
60299 </interface>
60300 -<interface name="kernel_getattr_proc" lineno="887">
60301 +<interface name="kernel_getattr_proc" lineno="905">
60302 <summary>
60303 Get the attributes of the proc filesystem.
60304 </summary>
60305 @@ -84929,7 +85508,7 @@ Domain allowed access.
60306 </summary>
60307 </param>
60308 </interface>
60309 -<interface name="kernel_mounton_proc" lineno="906">
60310 +<interface name="kernel_mounton_proc" lineno="924">
60311 <summary>
60312 Mount on proc directories.
60313 </summary>
60314 @@ -84940,7 +85519,7 @@ Domain allowed access.
60315 </param>
60316 <rolecap/>
60317 </interface>
60318 -<interface name="kernel_dontaudit_setattr_proc_dirs" lineno="925">
60319 +<interface name="kernel_dontaudit_setattr_proc_dirs" lineno="943">
60320 <summary>
60321 Do not audit attempts to set the
60322 attributes of directories in /proc.
60323 @@ -84951,7 +85530,7 @@ Domain to not audit.
60324 </summary>
60325 </param>
60326 </interface>
60327 -<interface name="kernel_search_proc" lineno="943">
60328 +<interface name="kernel_search_proc" lineno="961">
60329 <summary>
60330 Search directories in /proc.
60331 </summary>
60332 @@ -84961,7 +85540,7 @@ Domain allowed access.
60333 </summary>
60334 </param>
60335 </interface>
60336 -<interface name="kernel_list_proc" lineno="961">
60337 +<interface name="kernel_list_proc" lineno="979">
60338 <summary>
60339 List the contents of directories in /proc.
60340 </summary>
60341 @@ -84971,7 +85550,7 @@ Domain allowed access.
60342 </summary>
60343 </param>
60344 </interface>
60345 -<interface name="kernel_dontaudit_list_proc" lineno="980">
60346 +<interface name="kernel_dontaudit_list_proc" lineno="998">
60347 <summary>
60348 Do not audit attempts to list the
60349 contents of directories in /proc.
60350 @@ -84982,7 +85561,7 @@ Domain to not audit.
60351 </summary>
60352 </param>
60353 </interface>
60354 -<interface name="kernel_dontaudit_write_proc_dirs" lineno="999">
60355 +<interface name="kernel_dontaudit_write_proc_dirs" lineno="1017">
60356 <summary>
60357 Do not audit attempts to write the
60358 directories in /proc.
60359 @@ -84993,7 +85572,7 @@ Domain to not audit.
60360 </summary>
60361 </param>
60362 </interface>
60363 -<interface name="kernel_mounton_proc_dirs" lineno="1017">
60364 +<interface name="kernel_mounton_proc_dirs" lineno="1035">
60365 <summary>
60366 Mount the directories in /proc.
60367 </summary>
60368 @@ -85003,7 +85582,7 @@ Domain allowed access.
60369 </summary>
60370 </param>
60371 </interface>
60372 -<interface name="kernel_getattr_proc_files" lineno="1035">
60373 +<interface name="kernel_getattr_proc_files" lineno="1053">
60374 <summary>
60375 Get the attributes of files in /proc.
60376 </summary>
60377 @@ -85013,7 +85592,7 @@ Domain allowed access.
60378 </summary>
60379 </param>
60380 </interface>
60381 -<interface name="kernel_read_proc_symlinks" lineno="1062">
60382 +<interface name="kernel_read_proc_symlinks" lineno="1080">
60383 <summary>
60384 Read generic symbolic links in /proc.
60385 </summary>
60386 @@ -85032,7 +85611,7 @@ Domain allowed access.
60387 </param>
60388 <infoflow type="read" weight="10"/>
60389 </interface>
60390 -<interface name="kernel_read_system_state" lineno="1101">
60391 +<interface name="kernel_read_system_state" lineno="1119">
60392 <summary>
60393 Allows caller to read system state information in /proc.
60394 </summary>
60395 @@ -85063,7 +85642,7 @@ Domain allowed access.
60396 <infoflow type="read" weight="10"/>
60397 <rolecap/>
60398 </interface>
60399 -<interface name="kernel_write_proc_files" lineno="1127">
60400 +<interface name="kernel_write_proc_files" lineno="1145">
60401 <summary>
60402 Write to generic proc entries.
60403 </summary>
60404 @@ -85074,7 +85653,7 @@ Domain allowed access.
60405 </param>
60406 <rolecap/>
60407 </interface>
60408 -<interface name="kernel_dontaudit_read_system_state" lineno="1146">
60409 +<interface name="kernel_dontaudit_read_system_state" lineno="1164">
60410 <summary>
60411 Do not audit attempts by caller to
60412 read system state information in proc.
60413 @@ -85085,7 +85664,7 @@ Domain to not audit.
60414 </summary>
60415 </param>
60416 </interface>
60417 -<interface name="kernel_dontaudit_read_proc_symlinks" lineno="1165">
60418 +<interface name="kernel_dontaudit_read_proc_symlinks" lineno="1183">
60419 <summary>
60420 Do not audit attempts by caller to
60421 read symbolic links in proc.
60422 @@ -85096,7 +85675,7 @@ Domain to not audit.
60423 </summary>
60424 </param>
60425 </interface>
60426 -<interface name="kernel_rw_afs_state" lineno="1184">
60427 +<interface name="kernel_rw_afs_state" lineno="1202">
60428 <summary>
60429 Allow caller to read and write state information for AFS.
60430 </summary>
60431 @@ -85107,7 +85686,7 @@ Domain allowed access.
60432 </param>
60433 <rolecap/>
60434 </interface>
60435 -<interface name="kernel_read_software_raid_state" lineno="1204">
60436 +<interface name="kernel_read_software_raid_state" lineno="1222">
60437 <summary>
60438 Allow caller to read the state information for software raid.
60439 </summary>
60440 @@ -85118,7 +85697,7 @@ Domain allowed access.
60441 </param>
60442 <rolecap/>
60443 </interface>
60444 -<interface name="kernel_rw_software_raid_state" lineno="1224">
60445 +<interface name="kernel_rw_software_raid_state" lineno="1242">
60446 <summary>
60447 Allow caller to read and set the state information for software raid.
60448 </summary>
60449 @@ -85128,9 +85707,9 @@ Domain allowed access.
60450 </summary>
60451 </param>
60452 </interface>
60453 -<interface name="kernel_getattr_core_if" lineno="1244">
60454 +<interface name="kernel_getattr_core_if" lineno="1262">
60455 <summary>
60456 -Allows caller to get attribues of core kernel interface.
60457 +Allows caller to get attributes of core kernel interface.
60458 </summary>
60459 <param name="domain">
60460 <summary>
60461 @@ -85138,7 +85717,7 @@ Domain allowed access.
60462 </summary>
60463 </param>
60464 </interface>
60465 -<interface name="kernel_dontaudit_getattr_core_if" lineno="1265">
60466 +<interface name="kernel_dontaudit_getattr_core_if" lineno="1283">
60467 <summary>
60468 Do not audit attempts to get the attributes of
60469 core kernel interfaces.
60470 @@ -85149,7 +85728,7 @@ Domain to not audit.
60471 </summary>
60472 </param>
60473 </interface>
60474 -<interface name="kernel_read_core_if" lineno="1283">
60475 +<interface name="kernel_read_core_if" lineno="1301">
60476 <summary>
60477 Allows caller to read the core kernel interface.
60478 </summary>
60479 @@ -85159,7 +85738,7 @@ Domain allowed access.
60480 </summary>
60481 </param>
60482 </interface>
60483 -<interface name="kernel_read_messages" lineno="1307">
60484 +<interface name="kernel_read_messages" lineno="1325">
60485 <summary>
60486 Allow caller to read kernel messages
60487 using the /proc/kmsg interface.
60488 @@ -85170,7 +85749,7 @@ Domain allowed access.
60489 </summary>
60490 </param>
60491 </interface>
60492 -<interface name="kernel_getattr_message_if" lineno="1329">
60493 +<interface name="kernel_getattr_message_if" lineno="1347">
60494 <summary>
60495 Allow caller to get the attributes of kernel message
60496 interface (/proc/kmsg).
60497 @@ -85181,7 +85760,7 @@ Domain allowed access.
60498 </summary>
60499 </param>
60500 </interface>
60501 -<interface name="kernel_dontaudit_getattr_message_if" lineno="1348">
60502 +<interface name="kernel_dontaudit_getattr_message_if" lineno="1366">
60503 <summary>
60504 Do not audit attempts by caller to get the attributes of kernel
60505 message interfaces.
60506 @@ -85192,7 +85771,7 @@ Domain to not audit.
60507 </summary>
60508 </param>
60509 </interface>
60510 -<interface name="kernel_mounton_message_if" lineno="1367">
60511 +<interface name="kernel_mounton_message_if" lineno="1385">
60512 <summary>
60513 Mount on kernel message interfaces files.
60514 </summary>
60515 @@ -85203,7 +85782,7 @@ Domain allowed access.
60516 </param>
60517 <rolecap/>
60518 </interface>
60519 -<interface name="kernel_dontaudit_search_network_state" lineno="1388">
60520 +<interface name="kernel_dontaudit_search_network_state" lineno="1406">
60521 <summary>
60522 Do not audit attempts to search the network
60523 state directory.
60524 @@ -85215,7 +85794,7 @@ Domain to not audit.
60525 </param>
60526
60527 </interface>
60528 -<interface name="kernel_search_network_state" lineno="1407">
60529 +<interface name="kernel_search_network_state" lineno="1425">
60530 <summary>
60531 Allow searching of network state directory.
60532 </summary>
60533 @@ -85226,7 +85805,7 @@ Domain allowed access.
60534 </param>
60535
60536 </interface>
60537 -<interface name="kernel_read_network_state" lineno="1437">
60538 +<interface name="kernel_read_network_state" lineno="1455">
60539 <summary>
60540 Read the network state information.
60541 </summary>
60542 @@ -85248,7 +85827,7 @@ Domain allowed access.
60543 <infoflow type="read" weight="10"/>
60544 <rolecap/>
60545 </interface>
60546 -<interface name="kernel_read_network_state_symlinks" lineno="1458">
60547 +<interface name="kernel_read_network_state_symlinks" lineno="1476">
60548 <summary>
60549 Allow caller to read the network state symbolic links.
60550 </summary>
60551 @@ -85258,7 +85837,7 @@ Domain allowed access.
60552 </summary>
60553 </param>
60554 </interface>
60555 -<interface name="kernel_search_xen_state" lineno="1479">
60556 +<interface name="kernel_search_xen_state" lineno="1497">
60557 <summary>
60558 Allow searching of xen state directory.
60559 </summary>
60560 @@ -85269,7 +85848,7 @@ Domain allowed access.
60561 </param>
60562
60563 </interface>
60564 -<interface name="kernel_dontaudit_search_xen_state" lineno="1499">
60565 +<interface name="kernel_dontaudit_search_xen_state" lineno="1517">
60566 <summary>
60567 Do not audit attempts to search the xen
60568 state directory.
60569 @@ -85281,7 +85860,7 @@ Domain to not audit.
60570 </param>
60571
60572 </interface>
60573 -<interface name="kernel_read_xen_state" lineno="1518">
60574 +<interface name="kernel_read_xen_state" lineno="1536">
60575 <summary>
60576 Allow caller to read the xen state information.
60577 </summary>
60578 @@ -85292,7 +85871,7 @@ Domain allowed access.
60579 </param>
60580
60581 </interface>
60582 -<interface name="kernel_read_xen_state_symlinks" lineno="1540">
60583 +<interface name="kernel_read_xen_state_symlinks" lineno="1558">
60584 <summary>
60585 Allow caller to read the xen state symbolic links.
60586 </summary>
60587 @@ -85303,7 +85882,7 @@ Domain allowed access.
60588 </param>
60589
60590 </interface>
60591 -<interface name="kernel_write_xen_state" lineno="1561">
60592 +<interface name="kernel_write_xen_state" lineno="1579">
60593 <summary>
60594 Allow caller to write xen state information.
60595 </summary>
60596 @@ -85314,7 +85893,7 @@ Domain allowed access.
60597 </param>
60598
60599 </interface>
60600 -<interface name="kernel_list_all_proc" lineno="1579">
60601 +<interface name="kernel_list_all_proc" lineno="1597">
60602 <summary>
60603 Allow attempts to list all proc directories.
60604 </summary>
60605 @@ -85324,7 +85903,7 @@ Domain allowed access.
60606 </summary>
60607 </param>
60608 </interface>
60609 -<interface name="kernel_dontaudit_list_all_proc" lineno="1598">
60610 +<interface name="kernel_dontaudit_list_all_proc" lineno="1616">
60611 <summary>
60612 Do not audit attempts to list all proc directories.
60613 </summary>
60614 @@ -85334,7 +85913,7 @@ Domain to not audit.
60615 </summary>
60616 </param>
60617 </interface>
60618 -<interface name="kernel_dontaudit_search_sysctl" lineno="1619">
60619 +<interface name="kernel_dontaudit_search_sysctl" lineno="1637">
60620 <summary>
60621 Do not audit attempts by caller to search
60622 the base directory of sysctls.
60623 @@ -85346,7 +85925,7 @@ Domain to not audit.
60624 </param>
60625
60626 </interface>
60627 -<interface name="kernel_mounton_sysctl_dirs" lineno="1638">
60628 +<interface name="kernel_mounton_sysctl_dirs" lineno="1656">
60629 <summary>
60630 Mount on sysctl_t dirs.
60631 </summary>
60632 @@ -85357,7 +85936,7 @@ Domain allowed access.
60633 </param>
60634 <rolecap/>
60635 </interface>
60636 -<interface name="kernel_read_sysctl" lineno="1658">
60637 +<interface name="kernel_read_sysctl" lineno="1676">
60638 <summary>
60639 Allow access to read sysctl directories.
60640 </summary>
60641 @@ -85368,7 +85947,7 @@ Domain allowed access.
60642 </param>
60643
60644 </interface>
60645 -<interface name="kernel_mounton_sysctl_files" lineno="1678">
60646 +<interface name="kernel_mounton_sysctl_files" lineno="1696">
60647 <summary>
60648 Mount on sysctl files.
60649 </summary>
60650 @@ -85379,7 +85958,7 @@ Domain allowed access.
60651 </param>
60652 <rolecap/>
60653 </interface>
60654 -<interface name="kernel_read_device_sysctls" lineno="1698">
60655 +<interface name="kernel_read_device_sysctls" lineno="1716">
60656 <summary>
60657 Allow caller to read the device sysctls.
60658 </summary>
60659 @@ -85390,7 +85969,7 @@ Domain allowed access.
60660 </param>
60661 <rolecap/>
60662 </interface>
60663 -<interface name="kernel_rw_device_sysctls" lineno="1719">
60664 +<interface name="kernel_rw_device_sysctls" lineno="1737">
60665 <summary>
60666 Read and write device sysctls.
60667 </summary>
60668 @@ -85401,7 +85980,7 @@ Domain allowed access.
60669 </param>
60670 <rolecap/>
60671 </interface>
60672 -<interface name="kernel_search_vm_sysctl" lineno="1739">
60673 +<interface name="kernel_search_vm_sysctl" lineno="1757">
60674 <summary>
60675 Allow caller to search virtual memory sysctls.
60676 </summary>
60677 @@ -85411,7 +85990,7 @@ Domain allowed access.
60678 </summary>
60679 </param>
60680 </interface>
60681 -<interface name="kernel_read_vm_sysctls" lineno="1758">
60682 +<interface name="kernel_read_vm_sysctls" lineno="1776">
60683 <summary>
60684 Allow caller to read virtual memory sysctls.
60685 </summary>
60686 @@ -85422,7 +86001,7 @@ Domain allowed access.
60687 </param>
60688 <rolecap/>
60689 </interface>
60690 -<interface name="kernel_rw_vm_sysctls" lineno="1779">
60691 +<interface name="kernel_rw_vm_sysctls" lineno="1797">
60692 <summary>
60693 Read and write virtual memory sysctls.
60694 </summary>
60695 @@ -85433,7 +86012,7 @@ Domain allowed access.
60696 </param>
60697 <rolecap/>
60698 </interface>
60699 -<interface name="kernel_search_network_sysctl" lineno="1801">
60700 +<interface name="kernel_search_network_sysctl" lineno="1819">
60701 <summary>
60702 Search network sysctl directories.
60703 </summary>
60704 @@ -85443,7 +86022,7 @@ Domain allowed access.
60705 </summary>
60706 </param>
60707 </interface>
60708 -<interface name="kernel_dontaudit_search_network_sysctl" lineno="1819">
60709 +<interface name="kernel_dontaudit_search_network_sysctl" lineno="1837">
60710 <summary>
60711 Do not audit attempts by caller to search network sysctl directories.
60712 </summary>
60713 @@ -85453,7 +86032,7 @@ Domain to not audit.
60714 </summary>
60715 </param>
60716 </interface>
60717 -<interface name="kernel_read_net_sysctls" lineno="1838">
60718 +<interface name="kernel_read_net_sysctls" lineno="1856">
60719 <summary>
60720 Allow caller to read network sysctls.
60721 </summary>
60722 @@ -85464,7 +86043,7 @@ Domain allowed access.
60723 </param>
60724 <rolecap/>
60725 </interface>
60726 -<interface name="kernel_rw_net_sysctls" lineno="1859">
60727 +<interface name="kernel_rw_net_sysctls" lineno="1877">
60728 <summary>
60729 Allow caller to modiry contents of sysctl network files.
60730 </summary>
60731 @@ -85475,7 +86054,7 @@ Domain allowed access.
60732 </param>
60733 <rolecap/>
60734 </interface>
60735 -<interface name="kernel_read_unix_sysctls" lineno="1881">
60736 +<interface name="kernel_read_unix_sysctls" lineno="1899">
60737 <summary>
60738 Allow caller to read unix domain
60739 socket sysctls.
60740 @@ -85487,7 +86066,7 @@ Domain allowed access.
60741 </param>
60742 <rolecap/>
60743 </interface>
60744 -<interface name="kernel_rw_unix_sysctls" lineno="1903">
60745 +<interface name="kernel_rw_unix_sysctls" lineno="1921">
60746 <summary>
60747 Read and write unix domain
60748 socket sysctls.
60749 @@ -85499,7 +86078,7 @@ Domain allowed access.
60750 </param>
60751 <rolecap/>
60752 </interface>
60753 -<interface name="kernel_read_hotplug_sysctls" lineno="1924">
60754 +<interface name="kernel_read_hotplug_sysctls" lineno="1942">
60755 <summary>
60756 Read the hotplug sysctl.
60757 </summary>
60758 @@ -85510,7 +86089,7 @@ Domain allowed access.
60759 </param>
60760 <rolecap/>
60761 </interface>
60762 -<interface name="kernel_rw_hotplug_sysctls" lineno="1945">
60763 +<interface name="kernel_rw_hotplug_sysctls" lineno="1963">
60764 <summary>
60765 Read and write the hotplug sysctl.
60766 </summary>
60767 @@ -85521,7 +86100,7 @@ Domain allowed access.
60768 </param>
60769 <rolecap/>
60770 </interface>
60771 -<interface name="kernel_read_modprobe_sysctls" lineno="1966">
60772 +<interface name="kernel_read_modprobe_sysctls" lineno="1984">
60773 <summary>
60774 Read the modprobe sysctl.
60775 </summary>
60776 @@ -85532,7 +86111,7 @@ Domain allowed access.
60777 </param>
60778 <rolecap/>
60779 </interface>
60780 -<interface name="kernel_rw_modprobe_sysctls" lineno="1987">
60781 +<interface name="kernel_rw_modprobe_sysctls" lineno="2005">
60782 <summary>
60783 Read and write the modprobe sysctl.
60784 </summary>
60785 @@ -85543,7 +86122,7 @@ Domain allowed access.
60786 </param>
60787 <rolecap/>
60788 </interface>
60789 -<interface name="kernel_dontaudit_search_kernel_sysctl" lineno="2007">
60790 +<interface name="kernel_dontaudit_search_kernel_sysctl" lineno="2025">
60791 <summary>
60792 Do not audit attempts to search generic kernel sysctls.
60793 </summary>
60794 @@ -85553,7 +86132,7 @@ Domain to not audit.
60795 </summary>
60796 </param>
60797 </interface>
60798 -<interface name="kernel_dontaudit_read_kernel_sysctl" lineno="2025">
60799 +<interface name="kernel_dontaudit_read_kernel_sysctl" lineno="2043">
60800 <summary>
60801 Do not audit attempted reading of kernel sysctls
60802 </summary>
60803 @@ -85563,7 +86142,7 @@ Domain to not audit accesses from
60804 </summary>
60805 </param>
60806 </interface>
60807 -<interface name="kernel_read_crypto_sysctls" lineno="2043">
60808 +<interface name="kernel_read_crypto_sysctls" lineno="2061">
60809 <summary>
60810 Read generic crypto sysctls.
60811 </summary>
60812 @@ -85573,7 +86152,7 @@ Domain allowed access.
60813 </summary>
60814 </param>
60815 </interface>
60816 -<interface name="kernel_read_kernel_sysctls" lineno="2084">
60817 +<interface name="kernel_read_kernel_sysctls" lineno="2102">
60818 <summary>
60819 Read general kernel sysctls.
60820 </summary>
60821 @@ -85605,7 +86184,7 @@ Domain allowed access.
60822 </param>
60823 <infoflow type="read" weight="10"/>
60824 </interface>
60825 -<interface name="kernel_dontaudit_write_kernel_sysctl" lineno="2104">
60826 +<interface name="kernel_dontaudit_write_kernel_sysctl" lineno="2122">
60827 <summary>
60828 Do not audit attempts to write generic kernel sysctls.
60829 </summary>
60830 @@ -85615,7 +86194,7 @@ Domain to not audit.
60831 </summary>
60832 </param>
60833 </interface>
60834 -<interface name="kernel_rw_kernel_sysctl" lineno="2123">
60835 +<interface name="kernel_rw_kernel_sysctl" lineno="2141">
60836 <summary>
60837 Read and write generic kernel sysctls.
60838 </summary>
60839 @@ -85626,7 +86205,7 @@ Domain allowed access.
60840 </param>
60841 <rolecap/>
60842 </interface>
60843 -<interface name="kernel_mounton_kernel_sysctl_files" lineno="2144">
60844 +<interface name="kernel_mounton_kernel_sysctl_files" lineno="2162">
60845 <summary>
60846 Mount on kernel sysctl files.
60847 </summary>
60848 @@ -85637,7 +86216,7 @@ Domain allowed access.
60849 </param>
60850 <rolecap/>
60851 </interface>
60852 -<interface name="kernel_read_kernel_ns_lastpid_sysctls" lineno="2164">
60853 +<interface name="kernel_read_kernel_ns_lastpid_sysctls" lineno="2182">
60854 <summary>
60855 Read kernel ns lastpid sysctls.
60856 </summary>
60857 @@ -85648,7 +86227,7 @@ Domain allowed access.
60858 </param>
60859 <rolecap/>
60860 </interface>
60861 -<interface name="kernel_dontaudit_write_kernel_ns_lastpid_sysctl" lineno="2184">
60862 +<interface name="kernel_dontaudit_write_kernel_ns_lastpid_sysctl" lineno="2202">
60863 <summary>
60864 Do not audit attempts to write kernel ns lastpid sysctls.
60865 </summary>
60866 @@ -85658,7 +86237,7 @@ Domain to not audit.
60867 </summary>
60868 </param>
60869 </interface>
60870 -<interface name="kernel_rw_kernel_ns_lastpid_sysctl" lineno="2203">
60871 +<interface name="kernel_rw_kernel_ns_lastpid_sysctl" lineno="2221">
60872 <summary>
60873 Read and write kernel ns lastpid sysctls.
60874 </summary>
60875 @@ -85669,7 +86248,7 @@ Domain allowed access.
60876 </param>
60877 <rolecap/>
60878 </interface>
60879 -<interface name="kernel_search_fs_sysctls" lineno="2224">
60880 +<interface name="kernel_search_fs_sysctls" lineno="2242">
60881 <summary>
60882 Search filesystem sysctl directories.
60883 </summary>
60884 @@ -85680,7 +86259,7 @@ Domain allowed access.
60885 </param>
60886 <rolecap/>
60887 </interface>
60888 -<interface name="kernel_read_fs_sysctls" lineno="2243">
60889 +<interface name="kernel_read_fs_sysctls" lineno="2261">
60890 <summary>
60891 Read filesystem sysctls.
60892 </summary>
60893 @@ -85691,9 +86270,9 @@ Domain allowed access.
60894 </param>
60895 <rolecap/>
60896 </interface>
60897 -<interface name="kernel_rw_fs_sysctls" lineno="2264">
60898 +<interface name="kernel_rw_fs_sysctls" lineno="2282">
60899 <summary>
60900 -Read and write fileystem sysctls.
60901 +Read and write filesystem sysctls.
60902 </summary>
60903 <param name="domain">
60904 <summary>
60905 @@ -85702,7 +86281,7 @@ Domain allowed access.
60906 </param>
60907 <rolecap/>
60908 </interface>
60909 -<interface name="kernel_read_irq_sysctls" lineno="2285">
60910 +<interface name="kernel_read_irq_sysctls" lineno="2303">
60911 <summary>
60912 Read IRQ sysctls.
60913 </summary>
60914 @@ -85713,7 +86292,7 @@ Domain allowed access.
60915 </param>
60916 <rolecap/>
60917 </interface>
60918 -<interface name="kernel_rw_irq_sysctls" lineno="2306">
60919 +<interface name="kernel_rw_irq_sysctls" lineno="2324">
60920 <summary>
60921 Read and write IRQ sysctls.
60922 </summary>
60923 @@ -85724,7 +86303,7 @@ Domain allowed access.
60924 </param>
60925 <rolecap/>
60926 </interface>
60927 -<interface name="kernel_read_rpc_sysctls" lineno="2327">
60928 +<interface name="kernel_read_rpc_sysctls" lineno="2345">
60929 <summary>
60930 Read RPC sysctls.
60931 </summary>
60932 @@ -85735,7 +86314,7 @@ Domain allowed access.
60933 </param>
60934 <rolecap/>
60935 </interface>
60936 -<interface name="kernel_rw_rpc_sysctls" lineno="2348">
60937 +<interface name="kernel_rw_rpc_sysctls" lineno="2366">
60938 <summary>
60939 Read and write RPC sysctls.
60940 </summary>
60941 @@ -85746,7 +86325,7 @@ Domain allowed access.
60942 </param>
60943 <rolecap/>
60944 </interface>
60945 -<interface name="kernel_dontaudit_list_all_sysctls" lineno="2368">
60946 +<interface name="kernel_dontaudit_list_all_sysctls" lineno="2386">
60947 <summary>
60948 Do not audit attempts to list all sysctl directories.
60949 </summary>
60950 @@ -85756,7 +86335,7 @@ Domain to not audit.
60951 </summary>
60952 </param>
60953 </interface>
60954 -<interface name="kernel_read_all_sysctls" lineno="2388">
60955 +<interface name="kernel_read_all_sysctls" lineno="2406">
60956 <summary>
60957 Allow caller to read all sysctls.
60958 </summary>
60959 @@ -85767,7 +86346,7 @@ Domain allowed access.
60960 </param>
60961 <rolecap/>
60962 </interface>
60963 -<interface name="kernel_rw_all_sysctls" lineno="2411">
60964 +<interface name="kernel_rw_all_sysctls" lineno="2429">
60965 <summary>
60966 Read and write all sysctls.
60967 </summary>
60968 @@ -85778,7 +86357,18 @@ Domain allowed access.
60969 </param>
60970 <rolecap/>
60971 </interface>
60972 -<interface name="kernel_kill_unlabeled" lineno="2435">
60973 +<interface name="kernel_associate_proc" lineno="2454">
60974 +<summary>
60975 +Associate a file to proc_t (/proc)
60976 +</summary>
60977 +<param name="domain">
60978 +<summary>
60979 +Domain allowed access.
60980 +</summary>
60981 +</param>
60982 +<rolecap/>
60983 +</interface>
60984 +<interface name="kernel_kill_unlabeled" lineno="2471">
60985 <summary>
60986 Send a kill signal to unlabeled processes.
60987 </summary>
60988 @@ -85788,7 +86378,7 @@ Domain allowed access.
60989 </summary>
60990 </param>
60991 </interface>
60992 -<interface name="kernel_mount_unlabeled" lineno="2453">
60993 +<interface name="kernel_mount_unlabeled" lineno="2489">
60994 <summary>
60995 Mount a kernel unlabeled filesystem.
60996 </summary>
60997 @@ -85798,7 +86388,7 @@ Domain allowed access.
60998 </summary>
60999 </param>
61000 </interface>
61001 -<interface name="kernel_unmount_unlabeled" lineno="2471">
61002 +<interface name="kernel_unmount_unlabeled" lineno="2507">
61003 <summary>
61004 Unmount a kernel unlabeled filesystem.
61005 </summary>
61006 @@ -85808,7 +86398,7 @@ Domain allowed access.
61007 </summary>
61008 </param>
61009 </interface>
61010 -<interface name="kernel_signal_unlabeled" lineno="2489">
61011 +<interface name="kernel_signal_unlabeled" lineno="2525">
61012 <summary>
61013 Send general signals to unlabeled processes.
61014 </summary>
61015 @@ -85818,7 +86408,7 @@ Domain allowed access.
61016 </summary>
61017 </param>
61018 </interface>
61019 -<interface name="kernel_signull_unlabeled" lineno="2507">
61020 +<interface name="kernel_signull_unlabeled" lineno="2543">
61021 <summary>
61022 Send a null signal to unlabeled processes.
61023 </summary>
61024 @@ -85828,7 +86418,7 @@ Domain allowed access.
61025 </summary>
61026 </param>
61027 </interface>
61028 -<interface name="kernel_sigstop_unlabeled" lineno="2525">
61029 +<interface name="kernel_sigstop_unlabeled" lineno="2561">
61030 <summary>
61031 Send a stop signal to unlabeled processes.
61032 </summary>
61033 @@ -85838,7 +86428,7 @@ Domain allowed access.
61034 </summary>
61035 </param>
61036 </interface>
61037 -<interface name="kernel_sigchld_unlabeled" lineno="2543">
61038 +<interface name="kernel_sigchld_unlabeled" lineno="2579">
61039 <summary>
61040 Send a child terminated signal to unlabeled processes.
61041 </summary>
61042 @@ -85848,7 +86438,7 @@ Domain allowed access.
61043 </summary>
61044 </param>
61045 </interface>
61046 -<interface name="kernel_getattr_unlabeled_dirs" lineno="2561">
61047 +<interface name="kernel_getattr_unlabeled_dirs" lineno="2597">
61048 <summary>
61049 Get the attributes of unlabeled directories.
61050 </summary>
61051 @@ -85858,7 +86448,7 @@ Domain allowed access.
61052 </summary>
61053 </param>
61054 </interface>
61055 -<interface name="kernel_dontaudit_search_unlabeled" lineno="2579">
61056 +<interface name="kernel_dontaudit_search_unlabeled" lineno="2615">
61057 <summary>
61058 Do not audit attempts to search unlabeled directories.
61059 </summary>
61060 @@ -85868,7 +86458,7 @@ Domain to not audit.
61061 </summary>
61062 </param>
61063 </interface>
61064 -<interface name="kernel_list_unlabeled" lineno="2597">
61065 +<interface name="kernel_list_unlabeled" lineno="2633">
61066 <summary>
61067 List unlabeled directories.
61068 </summary>
61069 @@ -85878,7 +86468,7 @@ Domain allowed access.
61070 </summary>
61071 </param>
61072 </interface>
61073 -<interface name="kernel_read_unlabeled_state" lineno="2615">
61074 +<interface name="kernel_read_unlabeled_state" lineno="2651">
61075 <summary>
61076 Read the process state (/proc/pid) of all unlabeled_t.
61077 </summary>
61078 @@ -85888,7 +86478,7 @@ Domain allowed access.
61079 </summary>
61080 </param>
61081 </interface>
61082 -<interface name="kernel_dontaudit_list_unlabeled" lineno="2635">
61083 +<interface name="kernel_dontaudit_list_unlabeled" lineno="2671">
61084 <summary>
61085 Do not audit attempts to list unlabeled directories.
61086 </summary>
61087 @@ -85898,7 +86488,7 @@ Domain allowed access.
61088 </summary>
61089 </param>
61090 </interface>
61091 -<interface name="kernel_rw_unlabeled_dirs" lineno="2653">
61092 +<interface name="kernel_rw_unlabeled_dirs" lineno="2689">
61093 <summary>
61094 Read and write unlabeled directories.
61095 </summary>
61096 @@ -85908,7 +86498,7 @@ Domain allowed access.
61097 </summary>
61098 </param>
61099 </interface>
61100 -<interface name="kernel_delete_unlabeled_dirs" lineno="2671">
61101 +<interface name="kernel_delete_unlabeled_dirs" lineno="2707">
61102 <summary>
61103 Delete unlabeled directories.
61104 </summary>
61105 @@ -85918,7 +86508,7 @@ Domain allowed access.
61106 </summary>
61107 </param>
61108 </interface>
61109 -<interface name="kernel_manage_unlabeled_dirs" lineno="2689">
61110 +<interface name="kernel_manage_unlabeled_dirs" lineno="2725">
61111 <summary>
61112 Create, read, write, and delete unlabeled directories.
61113 </summary>
61114 @@ -85928,7 +86518,7 @@ Domain allowed access.
61115 </summary>
61116 </param>
61117 </interface>
61118 -<interface name="kernel_mounton_unlabeled_dirs" lineno="2707">
61119 +<interface name="kernel_mounton_unlabeled_dirs" lineno="2743">
61120 <summary>
61121 Mount a filesystem on an unlabeled directory.
61122 </summary>
61123 @@ -85938,7 +86528,7 @@ Domain allowed access.
61124 </summary>
61125 </param>
61126 </interface>
61127 -<interface name="kernel_read_unlabeled_files" lineno="2725">
61128 +<interface name="kernel_read_unlabeled_files" lineno="2761">
61129 <summary>
61130 Read unlabeled files.
61131 </summary>
61132 @@ -85948,7 +86538,7 @@ Domain allowed access.
61133 </summary>
61134 </param>
61135 </interface>
61136 -<interface name="kernel_rw_unlabeled_files" lineno="2743">
61137 +<interface name="kernel_rw_unlabeled_files" lineno="2779">
61138 <summary>
61139 Read and write unlabeled files.
61140 </summary>
61141 @@ -85958,7 +86548,7 @@ Domain allowed access.
61142 </summary>
61143 </param>
61144 </interface>
61145 -<interface name="kernel_delete_unlabeled_files" lineno="2761">
61146 +<interface name="kernel_delete_unlabeled_files" lineno="2797">
61147 <summary>
61148 Delete unlabeled files.
61149 </summary>
61150 @@ -85968,7 +86558,7 @@ Domain allowed access.
61151 </summary>
61152 </param>
61153 </interface>
61154 -<interface name="kernel_manage_unlabeled_files" lineno="2779">
61155 +<interface name="kernel_manage_unlabeled_files" lineno="2815">
61156 <summary>
61157 Create, read, write, and delete unlabeled files.
61158 </summary>
61159 @@ -85978,7 +86568,7 @@ Domain allowed access.
61160 </summary>
61161 </param>
61162 </interface>
61163 -<interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2798">
61164 +<interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2834">
61165 <summary>
61166 Do not audit attempts by caller to get the
61167 attributes of an unlabeled file.
61168 @@ -85989,7 +86579,7 @@ Domain to not audit.
61169 </summary>
61170 </param>
61171 </interface>
61172 -<interface name="kernel_dontaudit_read_unlabeled_files" lineno="2817">
61173 +<interface name="kernel_dontaudit_read_unlabeled_files" lineno="2853">
61174 <summary>
61175 Do not audit attempts by caller to
61176 read an unlabeled file.
61177 @@ -86000,7 +86590,7 @@ Domain to not audit.
61178 </summary>
61179 </param>
61180 </interface>
61181 -<interface name="kernel_delete_unlabeled_symlinks" lineno="2835">
61182 +<interface name="kernel_delete_unlabeled_symlinks" lineno="2871">
61183 <summary>
61184 Delete unlabeled symbolic links.
61185 </summary>
61186 @@ -86010,7 +86600,7 @@ Domain allowed access.
61187 </summary>
61188 </param>
61189 </interface>
61190 -<interface name="kernel_manage_unlabeled_symlinks" lineno="2853">
61191 +<interface name="kernel_manage_unlabeled_symlinks" lineno="2889">
61192 <summary>
61193 Create, read, write, and delete unlabeled symbolic links.
61194 </summary>
61195 @@ -86020,7 +86610,7 @@ Domain allowed access.
61196 </summary>
61197 </param>
61198 </interface>
61199 -<interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="2872">
61200 +<interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="2908">
61201 <summary>
61202 Do not audit attempts by caller to get the
61203 attributes of unlabeled symbolic links.
61204 @@ -86031,7 +86621,7 @@ Domain to not audit.
61205 </summary>
61206 </param>
61207 </interface>
61208 -<interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="2891">
61209 +<interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="2927">
61210 <summary>
61211 Do not audit attempts by caller to get the
61212 attributes of unlabeled named pipes.
61213 @@ -86042,7 +86632,7 @@ Domain to not audit.
61214 </summary>
61215 </param>
61216 </interface>
61217 -<interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="2910">
61218 +<interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="2946">
61219 <summary>
61220 Do not audit attempts by caller to get the
61221 attributes of unlabeled named sockets.
61222 @@ -86053,7 +86643,7 @@ Domain to not audit.
61223 </summary>
61224 </param>
61225 </interface>
61226 -<interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="2929">
61227 +<interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="2965">
61228 <summary>
61229 Do not audit attempts by caller to get attributes for
61230 unlabeled block devices.
61231 @@ -86064,7 +86654,7 @@ Domain to not audit.
61232 </summary>
61233 </param>
61234 </interface>
61235 -<interface name="kernel_rw_unlabeled_blk_files" lineno="2947">
61236 +<interface name="kernel_rw_unlabeled_blk_files" lineno="2983">
61237 <summary>
61238 Read and write unlabeled block device nodes.
61239 </summary>
61240 @@ -86074,7 +86664,7 @@ Domain allowed access.
61241 </summary>
61242 </param>
61243 </interface>
61244 -<interface name="kernel_delete_unlabeled_blk_files" lineno="2965">
61245 +<interface name="kernel_delete_unlabeled_blk_files" lineno="3001">
61246 <summary>
61247 Delete unlabeled block device nodes.
61248 </summary>
61249 @@ -86084,7 +86674,7 @@ Domain allowed access.
61250 </summary>
61251 </param>
61252 </interface>
61253 -<interface name="kernel_manage_unlabeled_blk_files" lineno="2983">
61254 +<interface name="kernel_manage_unlabeled_blk_files" lineno="3019">
61255 <summary>
61256 Create, read, write, and delete unlabeled block device nodes.
61257 </summary>
61258 @@ -86094,7 +86684,7 @@ Domain allowed access.
61259 </summary>
61260 </param>
61261 </interface>
61262 -<interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="3002">
61263 +<interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="3038">
61264 <summary>
61265 Do not audit attempts by caller to get attributes for
61266 unlabeled character devices.
61267 @@ -86105,7 +86695,7 @@ Domain to not audit.
61268 </summary>
61269 </param>
61270 </interface>
61271 -<interface name="kernel_dontaudit_write_unlabeled_chr_files" lineno="3021">
61272 +<interface name="kernel_dontaudit_write_unlabeled_chr_files" lineno="3057">
61273 <summary>
61274 Do not audit attempts to
61275 write unlabeled character devices.
61276 @@ -86116,7 +86706,7 @@ Domain to not audit.
61277 </summary>
61278 </param>
61279 </interface>
61280 -<interface name="kernel_delete_unlabeled_chr_files" lineno="3039">
61281 +<interface name="kernel_delete_unlabeled_chr_files" lineno="3075">
61282 <summary>
61283 Delete unlabeled character device nodes.
61284 </summary>
61285 @@ -86126,7 +86716,7 @@ Domain allowed access.
61286 </summary>
61287 </param>
61288 </interface>
61289 -<interface name="kernel_manage_unlabeled_chr_files" lineno="3058">
61290 +<interface name="kernel_manage_unlabeled_chr_files" lineno="3094">
61291 <summary>
61292 Create, read, write, and delete unlabeled character device nodes.
61293 </summary>
61294 @@ -86136,7 +86726,7 @@ Domain allowed access.
61295 </summary>
61296 </param>
61297 </interface>
61298 -<interface name="kernel_relabelfrom_unlabeled_dirs" lineno="3076">
61299 +<interface name="kernel_relabelfrom_unlabeled_dirs" lineno="3112">
61300 <summary>
61301 Allow caller to relabel unlabeled directories.
61302 </summary>
61303 @@ -86146,7 +86736,7 @@ Domain allowed access.
61304 </summary>
61305 </param>
61306 </interface>
61307 -<interface name="kernel_relabelfrom_unlabeled_files" lineno="3094">
61308 +<interface name="kernel_relabelfrom_unlabeled_files" lineno="3130">
61309 <summary>
61310 Allow caller to relabel unlabeled files.
61311 </summary>
61312 @@ -86156,7 +86746,7 @@ Domain allowed access.
61313 </summary>
61314 </param>
61315 </interface>
61316 -<interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="3113">
61317 +<interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="3149">
61318 <summary>
61319 Allow caller to relabel unlabeled symbolic links.
61320 </summary>
61321 @@ -86166,7 +86756,7 @@ Domain allowed access.
61322 </summary>
61323 </param>
61324 </interface>
61325 -<interface name="kernel_relabelfrom_unlabeled_pipes" lineno="3132">
61326 +<interface name="kernel_relabelfrom_unlabeled_pipes" lineno="3168">
61327 <summary>
61328 Allow caller to relabel unlabeled named pipes.
61329 </summary>
61330 @@ -86176,7 +86766,7 @@ Domain allowed access.
61331 </summary>
61332 </param>
61333 </interface>
61334 -<interface name="kernel_delete_unlabeled_pipes" lineno="3151">
61335 +<interface name="kernel_delete_unlabeled_pipes" lineno="3187">
61336 <summary>
61337 Delete unlabeled named pipes
61338 </summary>
61339 @@ -86186,7 +86776,7 @@ Domain allowed access.
61340 </summary>
61341 </param>
61342 </interface>
61343 -<interface name="kernel_relabelfrom_unlabeled_sockets" lineno="3169">
61344 +<interface name="kernel_relabelfrom_unlabeled_sockets" lineno="3205">
61345 <summary>
61346 Allow caller to relabel unlabeled named sockets.
61347 </summary>
61348 @@ -86196,7 +86786,7 @@ Domain allowed access.
61349 </summary>
61350 </param>
61351 </interface>
61352 -<interface name="kernel_delete_unlabeled_sockets" lineno="3188">
61353 +<interface name="kernel_delete_unlabeled_sockets" lineno="3224">
61354 <summary>
61355 Delete unlabeled named sockets.
61356 </summary>
61357 @@ -86206,7 +86796,27 @@ Domain allowed access.
61358 </summary>
61359 </param>
61360 </interface>
61361 -<interface name="kernel_sendrecv_unlabeled_association" lineno="3220">
61362 +<interface name="kernel_relabelfrom_unlabeled_blk_devs" lineno="3242">
61363 +<summary>
61364 +Allow caller to relabel from unlabeled block devices.
61365 +</summary>
61366 +<param name="domain">
61367 +<summary>
61368 +Domain allowed access.
61369 +</summary>
61370 +</param>
61371 +</interface>
61372 +<interface name="kernel_relabelfrom_unlabeled_chr_devs" lineno="3260">
61373 +<summary>
61374 +Allow caller to relabel from unlabeled character devices.
61375 +</summary>
61376 +<param name="domain">
61377 +<summary>
61378 +Domain allowed access.
61379 +</summary>
61380 +</param>
61381 +</interface>
61382 +<interface name="kernel_sendrecv_unlabeled_association" lineno="3293">
61383 <summary>
61384 Send and receive messages from an
61385 unlabeled IPSEC association.
61386 @@ -86217,7 +86827,7 @@ Send and receive messages from an
61387 unlabeled IPSEC association. Network
61388 connections that are not protected
61389 by IPSEC have use an unlabeled
61390 -assocation.
61391 +association.
61392 </p>
61393 <p>
61394 The corenetwork interface
61395 @@ -86231,7 +86841,7 @@ Domain allowed access.
61396 </summary>
61397 </param>
61398 </interface>
61399 -<interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="3253">
61400 +<interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="3326">
61401 <summary>
61402 Do not audit attempts to send and receive messages
61403 from an unlabeled IPSEC association.
61404 @@ -86242,7 +86852,7 @@ Do not audit attempts to send and receive messages
61405 from an unlabeled IPSEC association. Network
61406 connections that are not protected
61407 by IPSEC have use an unlabeled
61408 -assocation.
61409 +association.
61410 </p>
61411 <p>
61412 The corenetwork interface
61413 @@ -86256,7 +86866,7 @@ Domain to not audit.
61414 </summary>
61415 </param>
61416 </interface>
61417 -<interface name="kernel_tcp_recvfrom_unlabeled" lineno="3280">
61418 +<interface name="kernel_tcp_recvfrom_unlabeled" lineno="3353">
61419 <summary>
61420 Receive TCP packets from an unlabeled connection.
61421 </summary>
61422 @@ -86275,7 +86885,7 @@ Domain allowed access.
61423 </summary>
61424 </param>
61425 </interface>
61426 -<interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="3309">
61427 +<interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="3382">
61428 <summary>
61429 Do not audit attempts to receive TCP packets from an unlabeled
61430 connection.
61431 @@ -86296,7 +86906,7 @@ Domain to not audit.
61432 </summary>
61433 </param>
61434 </interface>
61435 -<interface name="kernel_udp_recvfrom_unlabeled" lineno="3336">
61436 +<interface name="kernel_udp_recvfrom_unlabeled" lineno="3409">
61437 <summary>
61438 Receive UDP packets from an unlabeled connection.
61439 </summary>
61440 @@ -86315,7 +86925,7 @@ Domain allowed access.
61441 </summary>
61442 </param>
61443 </interface>
61444 -<interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="3365">
61445 +<interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="3438">
61446 <summary>
61447 Do not audit attempts to receive UDP packets from an unlabeled
61448 connection.
61449 @@ -86336,7 +86946,7 @@ Domain to not audit.
61450 </summary>
61451 </param>
61452 </interface>
61453 -<interface name="kernel_raw_recvfrom_unlabeled" lineno="3392">
61454 +<interface name="kernel_raw_recvfrom_unlabeled" lineno="3465">
61455 <summary>
61456 Receive Raw IP packets from an unlabeled connection.
61457 </summary>
61458 @@ -86355,7 +86965,7 @@ Domain allowed access.
61459 </summary>
61460 </param>
61461 </interface>
61462 -<interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="3421">
61463 +<interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="3494">
61464 <summary>
61465 Do not audit attempts to receive Raw IP packets from an unlabeled
61466 connection.
61467 @@ -86376,7 +86986,7 @@ Domain to not audit.
61468 </summary>
61469 </param>
61470 </interface>
61471 -<interface name="kernel_sendrecv_unlabeled_packets" lineno="3451">
61472 +<interface name="kernel_sendrecv_unlabeled_packets" lineno="3524">
61473 <summary>
61474 Send and receive unlabeled packets.
61475 </summary>
61476 @@ -86398,7 +87008,7 @@ Domain allowed access.
61477 </summary>
61478 </param>
61479 </interface>
61480 -<interface name="kernel_recvfrom_unlabeled_peer" lineno="3479">
61481 +<interface name="kernel_recvfrom_unlabeled_peer" lineno="3552">
61482 <summary>
61483 Receive packets from an unlabeled peer.
61484 </summary>
61485 @@ -86418,7 +87028,7 @@ Domain allowed access.
61486 </summary>
61487 </param>
61488 </interface>
61489 -<interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="3507">
61490 +<interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="3580">
61491 <summary>
61492 Do not audit attempts to receive packets from an unlabeled peer.
61493 </summary>
61494 @@ -86438,7 +87048,7 @@ Domain to not audit.
61495 </summary>
61496 </param>
61497 </interface>
61498 -<interface name="kernel_relabelfrom_unlabeled_database" lineno="3525">
61499 +<interface name="kernel_relabelfrom_unlabeled_database" lineno="3598">
61500 <summary>
61501 Relabel from unlabeled database objects.
61502 </summary>
61503 @@ -86448,7 +87058,7 @@ Domain allowed access.
61504 </summary>
61505 </param>
61506 </interface>
61507 -<interface name="kernel_unconfined" lineno="3562">
61508 +<interface name="kernel_unconfined" lineno="3635">
61509 <summary>
61510 Unconfined access to kernel module resources.
61511 </summary>
61512 @@ -86458,7 +87068,7 @@ Domain allowed access.
61513 </summary>
61514 </param>
61515 </interface>
61516 -<interface name="kernel_read_vm_overcommit_sysctl" lineno="3582">
61517 +<interface name="kernel_read_vm_overcommit_sysctl" lineno="3655">
61518 <summary>
61519 Read virtual memory overcommit sysctl.
61520 </summary>
61521 @@ -86469,7 +87079,7 @@ Domain allowed access.
61522 </param>
61523 <rolecap/>
61524 </interface>
61525 -<interface name="kernel_rw_vm_overcommit_sysctl" lineno="3602">
61526 +<interface name="kernel_rw_vm_overcommit_sysctl" lineno="3675">
61527 <summary>
61528 Read and write virtual memory overcommit sysctl.
61529 </summary>
61530 @@ -86480,7 +87090,7 @@ Domain allowed access.
61531 </param>
61532 <rolecap/>
61533 </interface>
61534 -<interface name="kernel_ib_access_unlabeled_pkeys" lineno="3621">
61535 +<interface name="kernel_ib_access_unlabeled_pkeys" lineno="3694">
61536 <summary>
61537 Access unlabeled infiniband pkeys.
61538 </summary>
61539 @@ -86490,7 +87100,7 @@ Domain allowed access.
61540 </summary>
61541 </param>
61542 </interface>
61543 -<interface name="kernel_ib_manage_subnet_unlabeled_endports" lineno="3639">
61544 +<interface name="kernel_ib_manage_subnet_unlabeled_endports" lineno="3712">
61545 <summary>
61546 Manage subnet on unlabeled Infiniband endports.
61547 </summary>
61548 @@ -87112,7 +87722,7 @@ Domain allowed access.
61549 <interface name="mls_fd_share_all_levels" lineno="841">
61550 <summary>
61551 Make the file descriptors from the
61552 -specifed domain inheritable by
61553 +specified domain inheritable by
61554 all levels.
61555 </summary>
61556 <param name="domain">
61557 @@ -87122,19 +87732,7 @@ Domain allowed access.
61558 </param>
61559 <rolecap/>
61560 </interface>
61561 -<interface name="mls_context_translate_all_levels" lineno="861">
61562 -<summary>
61563 -Make specified domain MLS trusted
61564 -for translating contexts at all levels. (Deprecated)
61565 -</summary>
61566 -<param name="domain">
61567 -<summary>
61568 -Domain allowed access.
61569 -</summary>
61570 -</param>
61571 -<rolecap/>
61572 -</interface>
61573 -<interface name="mls_db_read_all_levels" lineno="877">
61574 +<interface name="mls_db_read_all_levels" lineno="861">
61575 <summary>
61576 Make specified domain MLS trusted
61577 for reading from databases at any level.
61578 @@ -87146,7 +87744,7 @@ Domain allowed access.
61579 </param>
61580 <rolecap/>
61581 </interface>
61582 -<interface name="mls_db_write_all_levels" lineno="897">
61583 +<interface name="mls_db_write_all_levels" lineno="881">
61584 <summary>
61585 Make specified domain MLS trusted
61586 for writing to databases at any level.
61587 @@ -87158,7 +87756,7 @@ Domain allowed access.
61588 </param>
61589 <rolecap/>
61590 </interface>
61591 -<interface name="mls_db_upgrade" lineno="917">
61592 +<interface name="mls_db_upgrade" lineno="901">
61593 <summary>
61594 Make specified domain MLS trusted
61595 for raising the level of databases.
61596 @@ -87170,7 +87768,7 @@ Domain allowed access.
61597 </param>
61598 <rolecap/>
61599 </interface>
61600 -<interface name="mls_db_downgrade" lineno="937">
61601 +<interface name="mls_db_downgrade" lineno="921">
61602 <summary>
61603 Make specified domain MLS trusted
61604 for lowering the level of databases.
61605 @@ -87182,7 +87780,7 @@ Domain allowed access.
61606 </param>
61607 <rolecap/>
61608 </interface>
61609 -<interface name="mls_dbus_send_all_levels" lineno="957">
61610 +<interface name="mls_dbus_send_all_levels" lineno="941">
61611 <summary>
61612 Make specified domain MLS trusted
61613 for sending dbus messages to
61614 @@ -87195,7 +87793,7 @@ Domain allowed access.
61615 </param>
61616 <rolecap/>
61617 </interface>
61618 -<interface name="mls_dbus_recv_all_levels" lineno="978">
61619 +<interface name="mls_dbus_recv_all_levels" lineno="962">
61620 <summary>
61621 Make specified domain MLS trusted
61622 for receiving dbus messages from
61623 @@ -87455,7 +88053,19 @@ Domain allowed access.
61624 </param>
61625 <rolecap/>
61626 </interface>
61627 -<interface name="selinux_set_parameters" lineno="469">
61628 +<interface name="selinux_get_all_booleans" lineno="459">
61629 +<summary>
61630 +Allow caller to get the state of all Booleans to
61631 +view conditional portions of the policy.
61632 +</summary>
61633 +<param name="domain">
61634 +<summary>
61635 +Domain allowed access.
61636 +</summary>
61637 +</param>
61638 +<rolecap/>
61639 +</interface>
61640 +<interface name="selinux_set_parameters" lineno="493">
61641 <summary>
61642 Allow caller to set SELinux access vector cache parameters.
61643 </summary>
61644 @@ -87477,7 +88087,7 @@ Domain allowed access.
61645 </param>
61646 <rolecap/>
61647 </interface>
61648 -<interface name="selinux_validate_context" lineno="488">
61649 +<interface name="selinux_validate_context" lineno="512">
61650 <summary>
61651 Allows caller to validate security contexts.
61652 </summary>
61653 @@ -87488,7 +88098,7 @@ Domain allowed access.
61654 </param>
61655 <rolecap/>
61656 </interface>
61657 -<interface name="selinux_dontaudit_validate_context" lineno="510">
61658 +<interface name="selinux_dontaudit_validate_context" lineno="534">
61659 <summary>
61660 Do not audit attempts to validate security contexts.
61661 </summary>
61662 @@ -87499,7 +88109,7 @@ Domain to not audit.
61663 </param>
61664 <rolecap/>
61665 </interface>
61666 -<interface name="selinux_compute_access_vector" lineno="531">
61667 +<interface name="selinux_compute_access_vector" lineno="555">
61668 <summary>
61669 Allows caller to compute an access vector.
61670 </summary>
61671 @@ -87510,7 +88120,7 @@ Domain allowed access.
61672 </param>
61673 <rolecap/>
61674 </interface>
61675 -<interface name="selinux_compute_create_context" lineno="554">
61676 +<interface name="selinux_compute_create_context" lineno="578">
61677 <summary>
61678 Calculate the default type for object creation.
61679 </summary>
61680 @@ -87521,7 +88131,7 @@ Domain allowed access.
61681 </param>
61682 <rolecap/>
61683 </interface>
61684 -<interface name="selinux_compute_member" lineno="576">
61685 +<interface name="selinux_compute_member" lineno="600">
61686 <summary>
61687 Allows caller to compute polyinstatntiated
61688 directory members.
61689 @@ -87532,7 +88142,7 @@ Domain allowed access.
61690 </summary>
61691 </param>
61692 </interface>
61693 -<interface name="selinux_compute_relabel_context" lineno="606">
61694 +<interface name="selinux_compute_relabel_context" lineno="630">
61695 <summary>
61696 Calculate the context for relabeling objects.
61697 </summary>
61698 @@ -87551,7 +88161,7 @@ Domain allowed access.
61699 </summary>
61700 </param>
61701 </interface>
61702 -<interface name="selinux_compute_user_contexts" lineno="627">
61703 +<interface name="selinux_compute_user_contexts" lineno="651">
61704 <summary>
61705 Allows caller to compute possible contexts for a user.
61706 </summary>
61707 @@ -87561,17 +88171,28 @@ Domain allowed access.
61708 </summary>
61709 </param>
61710 </interface>
61711 -<interface name="selinux_map_security_files" lineno="649">
61712 +<interface name="selinux_use_status_page" lineno="673">
61713 <summary>
61714 -Allows caller to map secuirty_t files.
61715 +Allows the caller to use the SELinux status page.
61716 </summary>
61717 <param name="domain">
61718 <summary>
61719 Domain allowed access.
61720 </summary>
61721 </param>
61722 +<rolecap/>
61723 </interface>
61724 -<interface name="selinux_unconfined" lineno="668">
61725 +<interface name="selinux_map_security_files" lineno="694">
61726 +<summary>
61727 +Allows caller to map secuirty_t files. (Deprecated)
61728 +</summary>
61729 +<param name="domain">
61730 +<summary>
61731 +Domain allowed access.
61732 +</summary>
61733 +</param>
61734 +</interface>
61735 +<interface name="selinux_unconfined" lineno="715">
61736 <summary>
61737 Unconfined access to the SELinux kernel security server.
61738 </summary>
61739 @@ -87794,7 +88415,17 @@ Domain allowed access.
61740 </summary>
61741 </param>
61742 </interface>
61743 -<interface name="storage_getattr_fuse_dev" lineno="378">
61744 +<interface name="storage_watch_fixed_disk" lineno="377">
61745 +<summary>
61746 +Watch fixed disk device nodes.
61747 +</summary>
61748 +<param name="domain">
61749 +<summary>
61750 +Domain allowed access.
61751 +</summary>
61752 +</param>
61753 +</interface>
61754 +<interface name="storage_getattr_fuse_dev" lineno="398">
61755 <summary>
61756 Allow the caller to get the attributes
61757 of device nodes of fuse devices.
61758 @@ -87805,7 +88436,7 @@ Domain allowed access.
61759 </summary>
61760 </param>
61761 </interface>
61762 -<interface name="storage_rw_fuse" lineno="397">
61763 +<interface name="storage_rw_fuse" lineno="417">
61764 <summary>
61765 read or write fuse device interfaces.
61766 </summary>
61767 @@ -87815,7 +88446,7 @@ Domain allowed access.
61768 </summary>
61769 </param>
61770 </interface>
61771 -<interface name="storage_dontaudit_rw_fuse" lineno="416">
61772 +<interface name="storage_dontaudit_rw_fuse" lineno="436">
61773 <summary>
61774 Do not audit attempts to read or write
61775 fuse device interfaces.
61776 @@ -87826,7 +88457,7 @@ Domain to not audit.
61777 </summary>
61778 </param>
61779 </interface>
61780 -<interface name="storage_getattr_scsi_generic_dev" lineno="435">
61781 +<interface name="storage_getattr_scsi_generic_dev" lineno="455">
61782 <summary>
61783 Allow the caller to get the attributes of
61784 the generic SCSI interface device nodes.
61785 @@ -87837,7 +88468,7 @@ Domain allowed access.
61786 </summary>
61787 </param>
61788 </interface>
61789 -<interface name="storage_setattr_scsi_generic_dev" lineno="455">
61790 +<interface name="storage_setattr_scsi_generic_dev" lineno="475">
61791 <summary>
61792 Allow the caller to set the attributes of
61793 the generic SCSI interface device nodes.
61794 @@ -87848,7 +88479,7 @@ Domain allowed access.
61795 </summary>
61796 </param>
61797 </interface>
61798 -<interface name="storage_read_scsi_generic" lineno="478">
61799 +<interface name="storage_read_scsi_generic" lineno="498">
61800 <summary>
61801 Allow the caller to directly read, in a
61802 generic fashion, from any SCSI device.
61803 @@ -87862,7 +88493,7 @@ Domain allowed access.
61804 </summary>
61805 </param>
61806 </interface>
61807 -<interface name="storage_write_scsi_generic" lineno="503">
61808 +<interface name="storage_write_scsi_generic" lineno="523">
61809 <summary>
61810 Allow the caller to directly write, in a
61811 generic fashion, from any SCSI device.
61812 @@ -87876,10 +88507,10 @@ Domain allowed access.
61813 </summary>
61814 </param>
61815 </interface>
61816 -<interface name="storage_setattr_scsi_generic_dev_dev" lineno="525">
61817 +<interface name="storage_setattr_scsi_generic_dev_dev" lineno="545">
61818 <summary>
61819 Set attributes of the device nodes
61820 -for the SCSI generic inerface.
61821 +for the SCSI generic interface.
61822 </summary>
61823 <param name="domain">
61824 <summary>
61825 @@ -87887,7 +88518,7 @@ Domain allowed access.
61826 </summary>
61827 </param>
61828 </interface>
61829 -<interface name="storage_dontaudit_rw_scsi_generic" lineno="545">
61830 +<interface name="storage_dontaudit_rw_scsi_generic" lineno="565">
61831 <summary>
61832 Do not audit attempts to read or write
61833 SCSI generic device interfaces.
61834 @@ -87898,7 +88529,7 @@ Domain to not audit.
61835 </summary>
61836 </param>
61837 </interface>
61838 -<interface name="storage_getattr_removable_dev" lineno="564">
61839 +<interface name="storage_getattr_removable_dev" lineno="584">
61840 <summary>
61841 Allow the caller to get the attributes of removable
61842 devices device nodes.
61843 @@ -87909,7 +88540,7 @@ Domain allowed access.
61844 </summary>
61845 </param>
61846 </interface>
61847 -<interface name="storage_dontaudit_getattr_removable_dev" lineno="584">
61848 +<interface name="storage_dontaudit_getattr_removable_dev" lineno="604">
61849 <summary>
61850 Do not audit attempts made by the caller to get
61851 the attributes of removable devices device nodes.
61852 @@ -87920,7 +88551,7 @@ Domain to not audit.
61853 </summary>
61854 </param>
61855 </interface>
61856 -<interface name="storage_dontaudit_read_removable_device" lineno="603">
61857 +<interface name="storage_dontaudit_read_removable_device" lineno="623">
61858 <summary>
61859 Do not audit attempts made by the caller to read
61860 removable devices device nodes.
61861 @@ -87931,7 +88562,7 @@ Domain to not audit.
61862 </summary>
61863 </param>
61864 </interface>
61865 -<interface name="storage_dontaudit_write_removable_device" lineno="623">
61866 +<interface name="storage_dontaudit_write_removable_device" lineno="643">
61867 <summary>
61868 Do not audit attempts made by the caller to write
61869 removable devices device nodes.
61870 @@ -87942,7 +88573,7 @@ Domain to not audit.
61871 </summary>
61872 </param>
61873 </interface>
61874 -<interface name="storage_setattr_removable_dev" lineno="642">
61875 +<interface name="storage_setattr_removable_dev" lineno="662">
61876 <summary>
61877 Allow the caller to set the attributes of removable
61878 devices device nodes.
61879 @@ -87953,7 +88584,7 @@ Domain allowed access.
61880 </summary>
61881 </param>
61882 </interface>
61883 -<interface name="storage_dontaudit_setattr_removable_dev" lineno="662">
61884 +<interface name="storage_dontaudit_setattr_removable_dev" lineno="682">
61885 <summary>
61886 Do not audit attempts made by the caller to set
61887 the attributes of removable devices device nodes.
61888 @@ -87964,7 +88595,7 @@ Domain to not audit.
61889 </summary>
61890 </param>
61891 </interface>
61892 -<interface name="storage_raw_read_removable_device" lineno="684">
61893 +<interface name="storage_raw_read_removable_device" lineno="704">
61894 <summary>
61895 Allow the caller to directly read from
61896 a removable device.
61897 @@ -87978,7 +88609,7 @@ Domain allowed access.
61898 </summary>
61899 </param>
61900 </interface>
61901 -<interface name="storage_dontaudit_raw_read_removable_device" lineno="703">
61902 +<interface name="storage_dontaudit_raw_read_removable_device" lineno="723">
61903 <summary>
61904 Do not audit attempts to directly read removable devices.
61905 </summary>
61906 @@ -87988,7 +88619,7 @@ Domain to not audit.
61907 </summary>
61908 </param>
61909 </interface>
61910 -<interface name="storage_raw_write_removable_device" lineno="725">
61911 +<interface name="storage_raw_write_removable_device" lineno="745">
61912 <summary>
61913 Allow the caller to directly write to
61914 a removable device.
61915 @@ -88002,7 +88633,7 @@ Domain allowed access.
61916 </summary>
61917 </param>
61918 </interface>
61919 -<interface name="storage_dontaudit_raw_write_removable_device" lineno="744">
61920 +<interface name="storage_dontaudit_raw_write_removable_device" lineno="764">
61921 <summary>
61922 Do not audit attempts to directly write removable devices.
61923 </summary>
61924 @@ -88012,7 +88643,7 @@ Domain to not audit.
61925 </summary>
61926 </param>
61927 </interface>
61928 -<interface name="storage_read_tape" lineno="763">
61929 +<interface name="storage_read_tape" lineno="783">
61930 <summary>
61931 Allow the caller to directly read
61932 a tape device.
61933 @@ -88023,7 +88654,7 @@ Domain allowed access.
61934 </summary>
61935 </param>
61936 </interface>
61937 -<interface name="storage_write_tape" lineno="783">
61938 +<interface name="storage_write_tape" lineno="803">
61939 <summary>
61940 Allow the caller to directly write
61941 a tape device.
61942 @@ -88034,7 +88665,7 @@ Domain allowed access.
61943 </summary>
61944 </param>
61945 </interface>
61946 -<interface name="storage_getattr_tape_dev" lineno="803">
61947 +<interface name="storage_getattr_tape_dev" lineno="823">
61948 <summary>
61949 Allow the caller to get the attributes
61950 of device nodes of tape devices.
61951 @@ -88045,7 +88676,7 @@ Domain allowed access.
61952 </summary>
61953 </param>
61954 </interface>
61955 -<interface name="storage_setattr_tape_dev" lineno="823">
61956 +<interface name="storage_setattr_tape_dev" lineno="843">
61957 <summary>
61958 Allow the caller to set the attributes
61959 of device nodes of tape devices.
61960 @@ -88056,7 +88687,7 @@ Domain allowed access.
61961 </summary>
61962 </param>
61963 </interface>
61964 -<interface name="storage_unconfined" lineno="842">
61965 +<interface name="storage_unconfined" lineno="862">
61966 <summary>
61967 Unconfined access to storage devices.
61968 </summary>
61969 @@ -88156,7 +88787,7 @@ The type of the process creating the directory.
61970 </summary>
61971 </param>
61972 </interface>
61973 -<interface name="term_create_pty" lineno="184">
61974 +<interface name="term_create_pty" lineno="185">
61975 <summary>
61976 Create a pty in the /dev/pts directory.
61977 </summary>
61978 @@ -88171,7 +88802,7 @@ The type of the pty.
61979 </summary>
61980 </param>
61981 </interface>
61982 -<interface name="term_write_all_terms" lineno="210">
61983 +<interface name="term_write_all_terms" lineno="211">
61984 <summary>
61985 Write the console, all
61986 ttys and all ptys.
61987 @@ -88183,7 +88814,7 @@ Domain allowed access.
61988 </param>
61989 <rolecap/>
61990 </interface>
61991 -<interface name="term_use_all_terms" lineno="233">
61992 +<interface name="term_use_all_terms" lineno="234">
61993 <summary>
61994 Read and write the console, all
61995 ttys and all ptys.
61996 @@ -88195,7 +88826,7 @@ Domain allowed access.
61997 </param>
61998 <rolecap/>
61999 </interface>
62000 -<interface name="term_write_console" lineno="255">
62001 +<interface name="term_write_console" lineno="256">
62002 <summary>
62003 Write to the console.
62004 </summary>
62005 @@ -88206,7 +88837,7 @@ Domain allowed access.
62006 </param>
62007 <rolecap/>
62008 </interface>
62009 -<interface name="term_read_console" lineno="275">
62010 +<interface name="term_read_console" lineno="276">
62011 <summary>
62012 Read from the console.
62013 </summary>
62014 @@ -88217,7 +88848,7 @@ Domain allowed access.
62015 </param>
62016 <rolecap/>
62017 </interface>
62018 -<interface name="term_dontaudit_read_console" lineno="295">
62019 +<interface name="term_dontaudit_read_console" lineno="296">
62020 <summary>
62021 Do not audit attempts to read from the console.
62022 </summary>
62023 @@ -88228,7 +88859,7 @@ Domain to not audit.
62024 </param>
62025 <rolecap/>
62026 </interface>
62027 -<interface name="term_use_console" lineno="314">
62028 +<interface name="term_use_console" lineno="315">
62029 <summary>
62030 Read from and write to the console.
62031 </summary>
62032 @@ -88239,9 +88870,9 @@ Domain allowed access.
62033 </param>
62034 <rolecap/>
62035 </interface>
62036 -<interface name="term_dontaudit_use_console" lineno="334">
62037 +<interface name="term_dontaudit_use_console" lineno="335">
62038 <summary>
62039 -Do not audit attemtps to read from
62040 +Do not audit attempts to read from
62041 or write to the console.
62042 </summary>
62043 <param name="domain">
62044 @@ -88250,7 +88881,7 @@ Domain to not audit.
62045 </summary>
62046 </param>
62047 </interface>
62048 -<interface name="term_setattr_console" lineno="354">
62049 +<interface name="term_setattr_console" lineno="355">
62050 <summary>
62051 Set the attributes of the console
62052 device node.
62053 @@ -88262,7 +88893,7 @@ Domain allowed access.
62054 </param>
62055 <rolecap/>
62056 </interface>
62057 -<interface name="term_relabel_console" lineno="373">
62058 +<interface name="term_relabel_console" lineno="374">
62059 <summary>
62060 Relabel from and to the console type.
62061 </summary>
62062 @@ -88272,7 +88903,7 @@ Domain allowed access.
62063 </summary>
62064 </param>
62065 </interface>
62066 -<interface name="term_create_console_dev" lineno="392">
62067 +<interface name="term_create_console_dev" lineno="393">
62068 <summary>
62069 Create the console device (/dev/console).
62070 </summary>
62071 @@ -88282,7 +88913,7 @@ Domain allowed access.
62072 </summary>
62073 </param>
62074 </interface>
62075 -<interface name="term_getattr_pty_fs" lineno="412">
62076 +<interface name="term_getattr_pty_fs" lineno="413">
62077 <summary>
62078 Get the attributes of a pty filesystem
62079 </summary>
62080 @@ -88292,7 +88923,7 @@ Domain allowed access.
62081 </summary>
62082 </param>
62083 </interface>
62084 -<interface name="term_relabel_pty_fs" lineno="430">
62085 +<interface name="term_relabel_pty_fs" lineno="431">
62086 <summary>
62087 Relabel from and to pty filesystem.
62088 </summary>
62089 @@ -88302,7 +88933,7 @@ Domain allowed access.
62090 </summary>
62091 </param>
62092 </interface>
62093 -<interface name="term_getattr_pty_dirs" lineno="450">
62094 +<interface name="term_getattr_pty_dirs" lineno="451">
62095 <summary>
62096 Get the attributes of the
62097 /dev/pts directory.
62098 @@ -88313,7 +88944,7 @@ Domain allowed access.
62099 </summary>
62100 </param>
62101 </interface>
62102 -<interface name="term_dontaudit_getattr_pty_dirs" lineno="469">
62103 +<interface name="term_dontaudit_getattr_pty_dirs" lineno="470">
62104 <summary>
62105 Do not audit attempts to get the
62106 attributes of the /dev/pts directory.
62107 @@ -88324,7 +88955,7 @@ Domain to not audit.
62108 </summary>
62109 </param>
62110 </interface>
62111 -<interface name="term_search_ptys" lineno="487">
62112 +<interface name="term_search_ptys" lineno="488">
62113 <summary>
62114 Search the contents of the /dev/pts directory.
62115 </summary>
62116 @@ -88334,7 +88965,7 @@ Domain allowed access.
62117 </summary>
62118 </param>
62119 </interface>
62120 -<interface name="term_dontaudit_search_ptys" lineno="507">
62121 +<interface name="term_dontaudit_search_ptys" lineno="508">
62122 <summary>
62123 Do not audit attempts to search the
62124 contents of the /dev/pts directory.
62125 @@ -88345,7 +88976,7 @@ Domain to not audit.
62126 </summary>
62127 </param>
62128 </interface>
62129 -<interface name="term_list_ptys" lineno="527">
62130 +<interface name="term_list_ptys" lineno="528">
62131 <summary>
62132 Read the /dev/pts directory to
62133 list all ptys.
62134 @@ -88356,7 +88987,7 @@ Domain allowed access.
62135 </summary>
62136 </param>
62137 </interface>
62138 -<interface name="term_dontaudit_list_ptys" lineno="547">
62139 +<interface name="term_dontaudit_list_ptys" lineno="548">
62140 <summary>
62141 Do not audit attempts to read the
62142 /dev/pts directory.
62143 @@ -88367,7 +88998,7 @@ Domain to not audit.
62144 </summary>
62145 </param>
62146 </interface>
62147 -<interface name="term_dontaudit_manage_pty_dirs" lineno="566">
62148 +<interface name="term_dontaudit_manage_pty_dirs" lineno="567">
62149 <summary>
62150 Do not audit attempts to create, read,
62151 write, or delete the /dev/pts directory.
62152 @@ -88378,7 +89009,7 @@ Domain to not audit.
62153 </summary>
62154 </param>
62155 </interface>
62156 -<interface name="term_relabel_pty_dirs" lineno="584">
62157 +<interface name="term_relabel_pty_dirs" lineno="585">
62158 <summary>
62159 Relabel from and to pty directories.
62160 </summary>
62161 @@ -88388,7 +89019,7 @@ Domain allowed access.
62162 </summary>
62163 </param>
62164 </interface>
62165 -<interface name="term_getattr_generic_ptys" lineno="603">
62166 +<interface name="term_getattr_generic_ptys" lineno="604">
62167 <summary>
62168 Get the attributes of generic pty devices.
62169 </summary>
62170 @@ -88398,7 +89029,7 @@ Domain to allow
62171 </summary>
62172 </param>
62173 </interface>
62174 -<interface name="term_dontaudit_getattr_generic_ptys" lineno="622">
62175 +<interface name="term_dontaudit_getattr_generic_ptys" lineno="623">
62176 <summary>
62177 Do not audit attempts to get the attributes
62178 of generic pty devices.
62179 @@ -88409,7 +89040,7 @@ Domain to not audit.
62180 </summary>
62181 </param>
62182 </interface>
62183 -<interface name="term_ioctl_generic_ptys" lineno="640">
62184 +<interface name="term_ioctl_generic_ptys" lineno="641">
62185 <summary>
62186 ioctl of generic pty devices.
62187 </summary>
62188 @@ -88430,7 +89061,7 @@ Domain allowed access.
62189 </summary>
62190 </param>
62191 </interface>
62192 -<interface name="term_dontaudit_setattr_generic_ptys" lineno="682">
62193 +<interface name="term_dontaudit_setattr_generic_ptys" lineno="681">
62194 <summary>
62195 Dontaudit setting the attributes of
62196 generic pty devices.
62197 @@ -88441,7 +89072,7 @@ Domain to not audit.
62198 </summary>
62199 </param>
62200 </interface>
62201 -<interface name="term_use_generic_ptys" lineno="702">
62202 +<interface name="term_use_generic_ptys" lineno="701">
62203 <summary>
62204 Read and write the generic pty
62205 type. This is generally only used in
62206 @@ -88453,7 +89084,7 @@ Domain allowed access.
62207 </summary>
62208 </param>
62209 </interface>
62210 -<interface name="term_dontaudit_use_generic_ptys" lineno="724">
62211 +<interface name="term_dontaudit_use_generic_ptys" lineno="723">
62212 <summary>
62213 Dot not audit attempts to read and
62214 write the generic pty type. This is
62215 @@ -88465,7 +89096,17 @@ Domain to not audit.
62216 </summary>
62217 </param>
62218 </interface>
62219 -<interface name="term_setattr_controlling_term" lineno="742">
62220 +<interface name="term_create_controlling_term" lineno="741">
62221 +<summary>
62222 +Create the tty device.
62223 +</summary>
62224 +<param name="domain">
62225 +<summary>
62226 +Domain allowed access.
62227 +</summary>
62228 +</param>
62229 +</interface>
62230 +<interface name="term_setattr_controlling_term" lineno="762">
62231 <summary>
62232 Set the attributes of the tty device
62233 </summary>
62234 @@ -88475,7 +89116,7 @@ Domain allowed access.
62235 </summary>
62236 </param>
62237 </interface>
62238 -<interface name="term_use_controlling_term" lineno="762">
62239 +<interface name="term_use_controlling_term" lineno="782">
62240 <summary>
62241 Read and write the controlling
62242 terminal (/dev/tty).
62243 @@ -88486,7 +89127,17 @@ Domain allowed access.
62244 </summary>
62245 </param>
62246 </interface>
62247 -<interface name="term_getattr_ptmx" lineno="781">
62248 +<interface name="term_create_ptmx" lineno="801">
62249 +<summary>
62250 +Create the pty multiplexor (/dev/ptmx).
62251 +</summary>
62252 +<param name="domain">
62253 +<summary>
62254 +Domain to not audit.
62255 +</summary>
62256 +</param>
62257 +</interface>
62258 +<interface name="term_getattr_ptmx" lineno="821">
62259 <summary>
62260 Get the attributes of the pty multiplexor (/dev/ptmx).
62261 </summary>
62262 @@ -88496,7 +89147,7 @@ Domain to not audit.
62263 </summary>
62264 </param>
62265 </interface>
62266 -<interface name="term_dontaudit_getattr_ptmx" lineno="800">
62267 +<interface name="term_dontaudit_getattr_ptmx" lineno="840">
62268 <summary>
62269 Do not audit attempts to get attributes
62270 on the pty multiplexor (/dev/ptmx).
62271 @@ -88507,7 +89158,7 @@ Domain to not audit.
62272 </summary>
62273 </param>
62274 </interface>
62275 -<interface name="term_use_ptmx" lineno="818">
62276 +<interface name="term_use_ptmx" lineno="858">
62277 <summary>
62278 Read and write the pty multiplexor (/dev/ptmx).
62279 </summary>
62280 @@ -88517,7 +89168,7 @@ Domain allowed access.
62281 </summary>
62282 </param>
62283 </interface>
62284 -<interface name="term_dontaudit_use_ptmx" lineno="838">
62285 +<interface name="term_dontaudit_use_ptmx" lineno="878">
62286 <summary>
62287 Do not audit attempts to read and
62288 write the pty multiplexor (/dev/ptmx).
62289 @@ -88528,7 +89179,7 @@ Domain to not audit.
62290 </summary>
62291 </param>
62292 </interface>
62293 -<interface name="term_getattr_all_ptys" lineno="858">
62294 +<interface name="term_getattr_all_ptys" lineno="898">
62295 <summary>
62296 Get the attributes of all
62297 pty device nodes.
62298 @@ -88540,7 +89191,7 @@ Domain allowed access.
62299 </param>
62300 <rolecap/>
62301 </interface>
62302 -<interface name="term_dontaudit_getattr_all_ptys" lineno="881">
62303 +<interface name="term_dontaudit_getattr_all_ptys" lineno="921">
62304 <summary>
62305 Do not audit attempts to get the
62306 attributes of any pty
62307 @@ -88552,7 +89203,7 @@ Domain to not audit.
62308 </summary>
62309 </param>
62310 </interface>
62311 -<interface name="term_setattr_all_ptys" lineno="901">
62312 +<interface name="term_setattr_all_ptys" lineno="941">
62313 <summary>
62314 Set the attributes of all
62315 pty device nodes.
62316 @@ -88564,7 +89215,7 @@ Domain allowed access.
62317 </param>
62318 <rolecap/>
62319 </interface>
62320 -<interface name="term_relabelto_all_ptys" lineno="922">
62321 +<interface name="term_relabelto_all_ptys" lineno="962">
62322 <summary>
62323 Relabel to all ptys.
62324 </summary>
62325 @@ -88574,7 +89225,7 @@ Domain allowed access.
62326 </summary>
62327 </param>
62328 </interface>
62329 -<interface name="term_write_all_ptys" lineno="940">
62330 +<interface name="term_write_all_ptys" lineno="980">
62331 <summary>
62332 Write to all ptys.
62333 </summary>
62334 @@ -88584,7 +89235,7 @@ Domain allowed access.
62335 </summary>
62336 </param>
62337 </interface>
62338 -<interface name="term_use_all_ptys" lineno="960">
62339 +<interface name="term_use_all_ptys" lineno="1000">
62340 <summary>
62341 Read and write all ptys.
62342 </summary>
62343 @@ -88595,7 +89246,7 @@ Domain allowed access.
62344 </param>
62345 <rolecap/>
62346 </interface>
62347 -<interface name="term_dontaudit_use_all_ptys" lineno="981">
62348 +<interface name="term_dontaudit_use_all_ptys" lineno="1021">
62349 <summary>
62350 Do not audit attempts to read or write any ptys.
62351 </summary>
62352 @@ -88605,7 +89256,7 @@ Domain to not audit.
62353 </summary>
62354 </param>
62355 </interface>
62356 -<interface name="term_relabel_all_ptys" lineno="999">
62357 +<interface name="term_relabel_all_ptys" lineno="1039">
62358 <summary>
62359 Relabel from and to all pty device nodes.
62360 </summary>
62361 @@ -88615,7 +89266,7 @@ Domain allowed access.
62362 </summary>
62363 </param>
62364 </interface>
62365 -<interface name="term_getattr_unallocated_ttys" lineno="1021">
62366 +<interface name="term_getattr_unallocated_ttys" lineno="1061">
62367 <summary>
62368 Get the attributes of all unallocated
62369 tty device nodes.
62370 @@ -88627,7 +89278,7 @@ Domain allowed access.
62371 </param>
62372 <rolecap/>
62373 </interface>
62374 -<interface name="term_setattr_unlink_unallocated_ttys" lineno="1041">
62375 +<interface name="term_setattr_unlink_unallocated_ttys" lineno="1081">
62376 <summary>
62377 Setattr and unlink unallocated tty device nodes.
62378 </summary>
62379 @@ -88638,7 +89289,7 @@ Domain allowed access.
62380 </param>
62381 <rolecap/>
62382 </interface>
62383 -<interface name="term_dontaudit_getattr_unallocated_ttys" lineno="1061">
62384 +<interface name="term_dontaudit_getattr_unallocated_ttys" lineno="1101">
62385 <summary>
62386 Do not audit attempts to get the attributes
62387 of all unallocated tty device nodes.
62388 @@ -88649,7 +89300,7 @@ Domain to not audit.
62389 </summary>
62390 </param>
62391 </interface>
62392 -<interface name="term_setattr_unallocated_ttys" lineno="1081">
62393 +<interface name="term_setattr_unallocated_ttys" lineno="1121">
62394 <summary>
62395 Set the attributes of all unallocated
62396 tty device nodes.
62397 @@ -88661,7 +89312,7 @@ Domain allowed access.
62398 </param>
62399 <rolecap/>
62400 </interface>
62401 -<interface name="term_dontaudit_setattr_unallocated_ttys" lineno="1101">
62402 +<interface name="term_dontaudit_setattr_unallocated_ttys" lineno="1141">
62403 <summary>
62404 Do not audit attempts to set the attributes
62405 of unallocated tty device nodes.
62406 @@ -88672,7 +89323,7 @@ Domain to not audit.
62407 </summary>
62408 </param>
62409 </interface>
62410 -<interface name="term_dontaudit_ioctl_unallocated_ttys" lineno="1120">
62411 +<interface name="term_dontaudit_ioctl_unallocated_ttys" lineno="1160">
62412 <summary>
62413 Do not audit attempts to ioctl
62414 unallocated tty device nodes.
62415 @@ -88683,7 +89334,7 @@ Domain to not audit.
62416 </summary>
62417 </param>
62418 </interface>
62419 -<interface name="term_relabel_unallocated_ttys" lineno="1139">
62420 +<interface name="term_relabel_unallocated_ttys" lineno="1179">
62421 <summary>
62422 Relabel from and to the unallocated
62423 tty type.
62424 @@ -88694,7 +89345,7 @@ Domain allowed access.
62425 </summary>
62426 </param>
62427 </interface>
62428 -<interface name="term_reset_tty_labels" lineno="1159">
62429 +<interface name="term_reset_tty_labels" lineno="1199">
62430 <summary>
62431 Relabel from all user tty types to
62432 the unallocated tty type.
62433 @@ -88705,7 +89356,7 @@ Domain allowed access.
62434 </summary>
62435 </param>
62436 </interface>
62437 -<interface name="term_append_unallocated_ttys" lineno="1180">
62438 +<interface name="term_append_unallocated_ttys" lineno="1220">
62439 <summary>
62440 Append to unallocated ttys.
62441 </summary>
62442 @@ -88715,7 +89366,7 @@ Domain allowed access.
62443 </summary>
62444 </param>
62445 </interface>
62446 -<interface name="term_write_unallocated_ttys" lineno="1199">
62447 +<interface name="term_write_unallocated_ttys" lineno="1239">
62448 <summary>
62449 Write to unallocated ttys.
62450 </summary>
62451 @@ -88725,7 +89376,7 @@ Domain allowed access.
62452 </summary>
62453 </param>
62454 </interface>
62455 -<interface name="term_use_unallocated_ttys" lineno="1219">
62456 +<interface name="term_use_unallocated_ttys" lineno="1259">
62457 <summary>
62458 Read and write unallocated ttys.
62459 </summary>
62460 @@ -88736,7 +89387,7 @@ Domain allowed access.
62461 </param>
62462 <rolecap/>
62463 </interface>
62464 -<interface name="term_dontaudit_use_unallocated_ttys" lineno="1239">
62465 +<interface name="term_dontaudit_use_unallocated_ttys" lineno="1279">
62466 <summary>
62467 Do not audit attempts to read or
62468 write unallocated ttys.
62469 @@ -88747,7 +89398,7 @@ Domain to not audit.
62470 </summary>
62471 </param>
62472 </interface>
62473 -<interface name="term_getattr_all_ttys" lineno="1258">
62474 +<interface name="term_getattr_all_ttys" lineno="1298">
62475 <summary>
62476 Get the attributes of all tty device nodes.
62477 </summary>
62478 @@ -88758,7 +89409,7 @@ Domain allowed access.
62479 </param>
62480 <rolecap/>
62481 </interface>
62482 -<interface name="term_dontaudit_getattr_all_ttys" lineno="1278">
62483 +<interface name="term_dontaudit_getattr_all_ttys" lineno="1318">
62484 <summary>
62485 Do not audit attempts to get the
62486 attributes of any tty device nodes.
62487 @@ -88769,7 +89420,7 @@ Domain to not audit.
62488 </summary>
62489 </param>
62490 </interface>
62491 -<interface name="term_setattr_all_ttys" lineno="1298">
62492 +<interface name="term_setattr_all_ttys" lineno="1338">
62493 <summary>
62494 Set the attributes of all tty device nodes.
62495 </summary>
62496 @@ -88780,7 +89431,7 @@ Domain allowed access.
62497 </param>
62498 <rolecap/>
62499 </interface>
62500 -<interface name="term_relabel_all_ttys" lineno="1317">
62501 +<interface name="term_relabel_all_ttys" lineno="1357">
62502 <summary>
62503 Relabel from and to all tty device nodes.
62504 </summary>
62505 @@ -88790,7 +89441,7 @@ Domain allowed access.
62506 </summary>
62507 </param>
62508 </interface>
62509 -<interface name="term_write_all_ttys" lineno="1336">
62510 +<interface name="term_write_all_ttys" lineno="1376">
62511 <summary>
62512 Write to all ttys.
62513 </summary>
62514 @@ -88800,7 +89451,7 @@ Domain allowed access.
62515 </summary>
62516 </param>
62517 </interface>
62518 -<interface name="term_use_all_ttys" lineno="1356">
62519 +<interface name="term_use_all_ttys" lineno="1396">
62520 <summary>
62521 Read and write all ttys.
62522 </summary>
62523 @@ -88811,7 +89462,7 @@ Domain allowed access.
62524 </param>
62525 <rolecap/>
62526 </interface>
62527 -<interface name="term_dontaudit_use_all_ttys" lineno="1376">
62528 +<interface name="term_dontaudit_use_all_ttys" lineno="1416">
62529 <summary>
62530 Do not audit attempts to read or write
62531 any ttys.
62532 @@ -88822,7 +89473,7 @@ Domain to not audit.
62533 </summary>
62534 </param>
62535 </interface>
62536 -<interface name="term_use_virtio_console" lineno="1394">
62537 +<interface name="term_use_virtio_console" lineno="1434">
62538 <summary>
62539 Read from and write virtio console.
62540 </summary>
62541 @@ -89044,7 +89695,7 @@ generic user files.
62542 </tunable>
62543 </module>
62544 <module name="guest" filename="policy/modules/roles/guest.if">
62545 -<summary>Least privledge terminal user role.</summary>
62546 +<summary>Least privilege terminal user role.</summary>
62547 <interface name="guest_role_change" lineno="14">
62548 <summary>
62549 Change to the guest role.
62550 @@ -89189,7 +89840,7 @@ Role allowed access.
62551 </module>
62552 <module name="sysadm" filename="policy/modules/roles/sysadm.if">
62553 <summary>General system administration role</summary>
62554 -<interface name="sysadm_role_change" lineno="14">
62555 +<interface name="sysadm_role_change" lineno="19">
62556 <summary>
62557 Change to the system administrator role.
62558 </summary>
62559 @@ -89198,9 +89849,14 @@ Change to the system administrator role.
62560 Role allowed access.
62561 </summary>
62562 </param>
62563 +<param name="domain">
62564 +<summary>
62565 +Domain allowed access.
62566 +</summary>
62567 +</param>
62568 <rolecap/>
62569 </interface>
62570 -<interface name="sysadm_role_change_to" lineno="44">
62571 +<interface name="sysadm_role_change_to" lineno="54">
62572 <summary>
62573 Change from the system administrator role.
62574 </summary>
62575 @@ -89222,7 +89878,7 @@ Role allowed access.
62576 </param>
62577 <rolecap/>
62578 </interface>
62579 -<interface name="sysadm_shell_domtrans" lineno="62">
62580 +<interface name="sysadm_shell_domtrans" lineno="72">
62581 <summary>
62582 Execute a shell in the sysadm domain.
62583 </summary>
62584 @@ -89232,7 +89888,7 @@ Domain allowed access.
62585 </summary>
62586 </param>
62587 </interface>
62588 -<interface name="sysadm_bin_spec_domtrans" lineno="83">
62589 +<interface name="sysadm_bin_spec_domtrans" lineno="93">
62590 <summary>
62591 Execute a generic bin program in the sysadm domain.
62592 </summary>
62593 @@ -89242,7 +89898,7 @@ Domain allowed access.
62594 </summary>
62595 </param>
62596 </interface>
62597 -<interface name="sysadm_entry_spec_domtrans" lineno="106">
62598 +<interface name="sysadm_entry_spec_domtrans" lineno="116">
62599 <summary>
62600 Execute all entrypoint files in the sysadm domain. This
62601 is an explicit transition, requiring the
62602 @@ -89254,7 +89910,7 @@ Domain allowed access.
62603 </summary>
62604 </param>
62605 </interface>
62606 -<interface name="sysadm_entry_spec_domtrans_to" lineno="141">
62607 +<interface name="sysadm_entry_spec_domtrans_to" lineno="151">
62608 <summary>
62609 Allow sysadm to execute all entrypoint files in
62610 a specified domain. This is an explicit transition,
62611 @@ -89278,7 +89934,7 @@ Domain allowed access.
62612 </summary>
62613 </param>
62614 </interface>
62615 -<interface name="sysadm_bin_spec_domtrans_to" lineno="175">
62616 +<interface name="sysadm_bin_spec_domtrans_to" lineno="185">
62617 <summary>
62618 Allow sysadm to execute a generic bin program in
62619 a specified domain. This is an explicit transition,
62620 @@ -89301,7 +89957,7 @@ Domain to execute in.
62621 </summary>
62622 </param>
62623 </interface>
62624 -<interface name="sysadm_sigchld" lineno="196">
62625 +<interface name="sysadm_sigchld" lineno="206">
62626 <summary>
62627 Send a SIGCHLD signal to sysadm users.
62628 </summary>
62629 @@ -89311,7 +89967,7 @@ Domain allowed access.
62630 </summary>
62631 </param>
62632 </interface>
62633 -<interface name="sysadm_use_fds" lineno="214">
62634 +<interface name="sysadm_use_fds" lineno="224">
62635 <summary>
62636 Inherit and use sysadm file descriptors
62637 </summary>
62638 @@ -89321,7 +89977,7 @@ Domain allowed access.
62639 </summary>
62640 </param>
62641 </interface>
62642 -<interface name="sysadm_rw_pipes" lineno="232">
62643 +<interface name="sysadm_rw_pipes" lineno="242">
62644 <summary>
62645 Read and write sysadm user unnamed pipes.
62646 </summary>
62647 @@ -89338,6 +89994,14 @@ Allow sysadm to debug or ptrace all processes.
62648 </p>
62649 </desc>
62650 </tunable>
62651 +<tunable name="sysadm_allow_rw_inherited_fifo" dftval="false">
62652 +<desc>
62653 +<p>
62654 +Allow sysadm to read/write to fifo files inherited from
62655 +a domain allowed to change role.
62656 +</p>
62657 +</desc>
62658 +</tunable>
62659 </module>
62660 <module name="unprivuser" filename="policy/modules/roles/unprivuser.if">
62661 <summary>Generic unprivileged user role</summary>
62662 @@ -89428,7 +90092,7 @@ read generic user files.
62663 </tunable>
62664 </module>
62665 <module name="xguest" filename="policy/modules/roles/xguest.if">
62666 -<summary>Least privledge xwindows user role.</summary>
62667 +<summary>Least privilege xwindows user role.</summary>
62668 <interface name="xguest_role_change" lineno="14">
62669 <summary>
62670 Change to the xguest role.
62671 @@ -89618,7 +90282,18 @@ Domain allowed access.
62672 </interface>
62673 <interface name="abrt_read_pid_files" lineno="234">
62674 <summary>
62675 -Read abrt PID files.
62676 +Read abrt PID files. (Deprecated)
62677 +</summary>
62678 +<param name="domain">
62679 +<summary>
62680 +Domain allowed access.
62681 +</summary>
62682 +</param>
62683 +</interface>
62684 +<interface name="abrt_manage_pid_files" lineno="249">
62685 +<summary>
62686 +Create, read, write, and delete
62687 +abrt PID files. (Deprecated)
62688 </summary>
62689 <param name="domain">
62690 <summary>
62691 @@ -89626,10 +90301,10 @@ Domain allowed access.
62692 </summary>
62693 </param>
62694 </interface>
62695 -<interface name="abrt_manage_pid_files" lineno="254">
62696 +<interface name="abrt_manage_runtime_files" lineno="265">
62697 <summary>
62698 Create, read, write, and delete
62699 -abrt PID files.
62700 +abrt runtime files.
62701 </summary>
62702 <param name="domain">
62703 <summary>
62704 @@ -89637,7 +90312,7 @@ Domain allowed access.
62705 </summary>
62706 </param>
62707 </interface>
62708 -<interface name="abrt_admin" lineno="280">
62709 +<interface name="abrt_admin" lineno="291">
62710 <summary>
62711 All of the rules required to
62712 administrate an abrt environment,
62713 @@ -89950,7 +90625,7 @@ Domain allowed to transition.
62714 </interface>
62715 <interface name="aiccu_read_pid_files" lineno="50">
62716 <summary>
62717 -Read aiccu PID files.
62718 +Read aiccu PID files. (Deprecated)
62719 </summary>
62720 <param name="domain">
62721 <summary>
62722 @@ -89958,7 +90633,7 @@ Domain allowed access.
62723 </summary>
62724 </param>
62725 </interface>
62726 -<interface name="aiccu_admin" lineno="76">
62727 +<interface name="aiccu_admin" lineno="71">
62728 <summary>
62729 All of the rules required to
62730 administrate an aiccu environment.
62731 @@ -90129,7 +90804,17 @@ Domain allowed access.
62732 </interface>
62733 <interface name="amavis_setattr_pid_files" lineno="184">
62734 <summary>
62735 -Set attributes of amavis pid files.
62736 +Set attributes of amavis pid files. (Deprecated)
62737 +</summary>
62738 +<param name="domain">
62739 +<summary>
62740 +Domain allowed access.
62741 +</summary>
62742 +</param>
62743 +</interface>
62744 +<interface name="amavis_create_pid_files" lineno="199">
62745 +<summary>
62746 +Create amavis pid files. (Deprecated)
62747 </summary>
62748 <param name="domain">
62749 <summary>
62750 @@ -90137,9 +90822,9 @@ Domain allowed access.
62751 </summary>
62752 </param>
62753 </interface>
62754 -<interface name="amavis_create_pid_files" lineno="203">
62755 +<interface name="amavis_setattr_runtime_files" lineno="214">
62756 <summary>
62757 -Create amavis pid files.
62758 +Set attributes of amavis runtime files.
62759 </summary>
62760 <param name="domain">
62761 <summary>
62762 @@ -90147,7 +90832,17 @@ Domain allowed access.
62763 </summary>
62764 </param>
62765 </interface>
62766 -<interface name="amavis_admin" lineno="230">
62767 +<interface name="amavis_create_runtime_files" lineno="233">
62768 +<summary>
62769 +Create amavis runtime files.
62770 +</summary>
62771 +<param name="domain">
62772 +<summary>
62773 +Domain allowed access.
62774 +</summary>
62775 +</param>
62776 +</interface>
62777 +<interface name="amavis_admin" lineno="259">
62778 <summary>
62779 All of the rules required to
62780 administrate an amavis environment.
62781 @@ -90186,7 +90881,7 @@ The prefix to be used for deriving type names.
62782 </summary>
62783 </param>
62784 </template>
62785 -<interface name="apache_role" lineno="118">
62786 +<interface name="apache_role" lineno="120">
62787 <summary>
62788 Role access for apache.
62789 </summary>
62790 @@ -90201,7 +90896,7 @@ User domain for the role.
62791 </summary>
62792 </param>
62793 </interface>
62794 -<interface name="apache_read_user_scripts" lineno="173">
62795 +<interface name="apache_read_user_scripts" lineno="175">
62796 <summary>
62797 Read user httpd script executable files.
62798 </summary>
62799 @@ -90211,7 +90906,7 @@ Domain allowed access.
62800 </summary>
62801 </param>
62802 </interface>
62803 -<interface name="apache_read_user_content" lineno="193">
62804 +<interface name="apache_read_user_content" lineno="195">
62805 <summary>
62806 Read user httpd content.
62807 </summary>
62808 @@ -90221,7 +90916,7 @@ Domain allowed access.
62809 </summary>
62810 </param>
62811 </interface>
62812 -<interface name="apache_domtrans" lineno="213">
62813 +<interface name="apache_domtrans" lineno="215">
62814 <summary>
62815 Execute httpd with a domain transition.
62816 </summary>
62817 @@ -90231,7 +90926,7 @@ Domain allowed to transition.
62818 </summary>
62819 </param>
62820 </interface>
62821 -<interface name="apache_initrc_domtrans" lineno="232">
62822 +<interface name="apache_initrc_domtrans" lineno="234">
62823 <summary>
62824 Execute httpd server in the httpd domain.
62825 </summary>
62826 @@ -90241,7 +90936,7 @@ Domain allowed to transition.
62827 </summary>
62828 </param>
62829 </interface>
62830 -<interface name="apache_signal" lineno="250">
62831 +<interface name="apache_signal" lineno="252">
62832 <summary>
62833 Send generic signals to httpd.
62834 </summary>
62835 @@ -90251,7 +90946,7 @@ Domain allowed access.
62836 </summary>
62837 </param>
62838 </interface>
62839 -<interface name="apache_signull" lineno="268">
62840 +<interface name="apache_signull" lineno="270">
62841 <summary>
62842 Send null signals to httpd.
62843 </summary>
62844 @@ -90261,7 +90956,7 @@ Domain allowed access.
62845 </summary>
62846 </param>
62847 </interface>
62848 -<interface name="apache_sigchld" lineno="286">
62849 +<interface name="apache_sigchld" lineno="288">
62850 <summary>
62851 Send child terminated signals to httpd.
62852 </summary>
62853 @@ -90271,7 +90966,7 @@ Domain allowed access.
62854 </summary>
62855 </param>
62856 </interface>
62857 -<interface name="apache_use_fds" lineno="305">
62858 +<interface name="apache_use_fds" lineno="307">
62859 <summary>
62860 Inherit and use file descriptors
62861 from httpd.
62862 @@ -90282,7 +90977,7 @@ Domain allowed access.
62863 </summary>
62864 </param>
62865 </interface>
62866 -<interface name="apache_dontaudit_rw_fifo_file" lineno="324">
62867 +<interface name="apache_dontaudit_rw_fifo_file" lineno="326">
62868 <summary>
62869 Do not audit attempts to read and
62870 write httpd unnamed pipes.
62871 @@ -90293,7 +90988,7 @@ Domain to not audit.
62872 </summary>
62873 </param>
62874 </interface>
62875 -<interface name="apache_dontaudit_rw_stream_sockets" lineno="343">
62876 +<interface name="apache_dontaudit_rw_stream_sockets" lineno="345">
62877 <summary>
62878 Do not audit attempts to read and
62879 write httpd unix domain stream sockets.
62880 @@ -90304,7 +90999,7 @@ Domain to not audit.
62881 </summary>
62882 </param>
62883 </interface>
62884 -<interface name="apache_rw_stream_sockets" lineno="362">
62885 +<interface name="apache_rw_stream_sockets" lineno="364">
62886 <summary>
62887 Read and write httpd unix domain
62888 stream sockets.
62889 @@ -90315,7 +91010,7 @@ Domain allowed access.
62890 </summary>
62891 </param>
62892 </interface>
62893 -<interface name="apache_dontaudit_rw_tcp_sockets" lineno="381">
62894 +<interface name="apache_dontaudit_rw_tcp_sockets" lineno="383">
62895 <summary>
62896 Do not audit attempts to read and
62897 write httpd TCP sockets.
62898 @@ -90326,7 +91021,7 @@ Domain to not audit.
62899 </summary>
62900 </param>
62901 </interface>
62902 -<interface name="apache_reload" lineno="399">
62903 +<interface name="apache_reload" lineno="401">
62904 <summary>
62905 Reload the httpd service (systemd).
62906 </summary>
62907 @@ -90336,7 +91031,7 @@ Domain allowed access.
62908 </summary>
62909 </param>
62910 </interface>
62911 -<interface name="apache_read_all_ra_content" lineno="418">
62912 +<interface name="apache_read_all_ra_content" lineno="420">
62913 <summary>
62914 Read all appendable content
62915 </summary>
62916 @@ -90346,7 +91041,7 @@ Domain allowed access.
62917 </summary>
62918 </param>
62919 </interface>
62920 -<interface name="apache_append_all_ra_content" lineno="437">
62921 +<interface name="apache_append_all_ra_content" lineno="439">
62922 <summary>
62923 Append to all appendable web content
62924 </summary>
62925 @@ -90356,7 +91051,7 @@ Domain allowed access.
62926 </summary>
62927 </param>
62928 </interface>
62929 -<interface name="apache_read_all_rw_content" lineno="455">
62930 +<interface name="apache_read_all_rw_content" lineno="457">
62931 <summary>
62932 Read all read/write content
62933 </summary>
62934 @@ -90366,7 +91061,7 @@ Domain allowed access.
62935 </summary>
62936 </param>
62937 </interface>
62938 -<interface name="apache_manage_all_rw_content" lineno="474">
62939 +<interface name="apache_manage_all_rw_content" lineno="476">
62940 <summary>
62941 Manage all read/write content
62942 </summary>
62943 @@ -90376,7 +91071,7 @@ Domain allowed access.
62944 </summary>
62945 </param>
62946 </interface>
62947 -<interface name="apache_read_all_content" lineno="493">
62948 +<interface name="apache_read_all_content" lineno="495">
62949 <summary>
62950 Read all web content.
62951 </summary>
62952 @@ -90386,7 +91081,7 @@ Domain allowed access.
62953 </summary>
62954 </param>
62955 </interface>
62956 -<interface name="apache_search_all_content" lineno="515">
62957 +<interface name="apache_search_all_content" lineno="517">
62958 <summary>
62959 Search all apache content.
62960 </summary>
62961 @@ -90396,7 +91091,17 @@ Domain allowed access.
62962 </summary>
62963 </param>
62964 </interface>
62965 -<interface name="apache_manage_all_content" lineno="535">
62966 +<interface name="apache_list_all_content" lineno="535">
62967 +<summary>
62968 +List all apache content.
62969 +</summary>
62970 +<param name="domain">
62971 +<summary>
62972 +Domain allowed access.
62973 +</summary>
62974 +</param>
62975 +</interface>
62976 +<interface name="apache_manage_all_content" lineno="555">
62977 <summary>
62978 Create, read, write, and delete
62979 all httpd content.
62980 @@ -90408,7 +91113,7 @@ Domain allowed access.
62981 </param>
62982 <rolecap/>
62983 </interface>
62984 -<interface name="apache_setattr_cache_dirs" lineno="559">
62985 +<interface name="apache_setattr_cache_dirs" lineno="579">
62986 <summary>
62987 Set attributes httpd cache directories.
62988 </summary>
62989 @@ -90418,7 +91123,7 @@ Domain allowed access.
62990 </summary>
62991 </param>
62992 </interface>
62993 -<interface name="apache_list_cache" lineno="577">
62994 +<interface name="apache_list_cache" lineno="597">
62995 <summary>
62996 List httpd cache directories.
62997 </summary>
62998 @@ -90428,7 +91133,7 @@ Domain allowed access.
62999 </summary>
63000 </param>
63001 </interface>
63002 -<interface name="apache_rw_cache_files" lineno="595">
63003 +<interface name="apache_rw_cache_files" lineno="615">
63004 <summary>
63005 Read and write httpd cache files.
63006 </summary>
63007 @@ -90438,7 +91143,7 @@ Domain allowed access.
63008 </summary>
63009 </param>
63010 </interface>
63011 -<interface name="apache_delete_cache_dirs" lineno="613">
63012 +<interface name="apache_delete_cache_dirs" lineno="633">
63013 <summary>
63014 Delete httpd cache directories.
63015 </summary>
63016 @@ -90448,7 +91153,7 @@ Domain allowed access.
63017 </summary>
63018 </param>
63019 </interface>
63020 -<interface name="apache_delete_cache_files" lineno="631">
63021 +<interface name="apache_delete_cache_files" lineno="651">
63022 <summary>
63023 Delete httpd cache files.
63024 </summary>
63025 @@ -90458,7 +91163,7 @@ Domain allowed access.
63026 </summary>
63027 </param>
63028 </interface>
63029 -<interface name="apache_read_config" lineno="650">
63030 +<interface name="apache_read_config" lineno="670">
63031 <summary>
63032 Read httpd configuration files.
63033 </summary>
63034 @@ -90469,7 +91174,7 @@ Domain allowed access.
63035 </param>
63036 <rolecap/>
63037 </interface>
63038 -<interface name="apache_search_config" lineno="671">
63039 +<interface name="apache_search_config" lineno="691">
63040 <summary>
63041 Search httpd configuration directories.
63042 </summary>
63043 @@ -90479,7 +91184,7 @@ Domain allowed access.
63044 </summary>
63045 </param>
63046 </interface>
63047 -<interface name="apache_manage_config" lineno="691">
63048 +<interface name="apache_manage_config" lineno="711">
63049 <summary>
63050 Create, read, write, and delete
63051 httpd configuration files.
63052 @@ -90490,7 +91195,7 @@ Domain allowed access.
63053 </summary>
63054 </param>
63055 </interface>
63056 -<interface name="apache_domtrans_helper" lineno="713">
63057 +<interface name="apache_domtrans_helper" lineno="733">
63058 <summary>
63059 Execute the Apache helper program
63060 with a domain transition.
63061 @@ -90501,7 +91206,7 @@ Domain allowed access.
63062 </summary>
63063 </param>
63064 </interface>
63065 -<interface name="apache_run_helper" lineno="740">
63066 +<interface name="apache_run_helper" lineno="760">
63067 <summary>
63068 Execute the Apache helper program with
63069 a domain transition, and allow the
63070 @@ -90519,7 +91224,7 @@ Role allowed access.
63071 </param>
63072 <rolecap/>
63073 </interface>
63074 -<interface name="apache_read_log" lineno="760">
63075 +<interface name="apache_read_log" lineno="780">
63076 <summary>
63077 Read httpd log files.
63078 </summary>
63079 @@ -90530,7 +91235,7 @@ Domain allowed access.
63080 </param>
63081 <rolecap/>
63082 </interface>
63083 -<interface name="apache_append_log" lineno="781">
63084 +<interface name="apache_append_log" lineno="801">
63085 <summary>
63086 Append httpd log files.
63087 </summary>
63088 @@ -90540,7 +91245,7 @@ Domain allowed access.
63089 </summary>
63090 </param>
63091 </interface>
63092 -<interface name="apache_dontaudit_append_log" lineno="802">
63093 +<interface name="apache_dontaudit_append_log" lineno="822">
63094 <summary>
63095 Do not audit attempts to append
63096 httpd log files.
63097 @@ -90551,7 +91256,7 @@ Domain to not audit.
63098 </summary>
63099 </param>
63100 </interface>
63101 -<interface name="apache_manage_log" lineno="821">
63102 +<interface name="apache_manage_log" lineno="841">
63103 <summary>
63104 Create, read, write, and delete
63105 httpd log files.
63106 @@ -90562,7 +91267,7 @@ Domain allowed access.
63107 </summary>
63108 </param>
63109 </interface>
63110 -<interface name="apache_write_log" lineno="842">
63111 +<interface name="apache_write_log" lineno="862">
63112 <summary>
63113 Write apache log files.
63114 </summary>
63115 @@ -90572,7 +91277,7 @@ Domain allowed access.
63116 </summary>
63117 </param>
63118 </interface>
63119 -<interface name="apache_dontaudit_search_modules" lineno="862">
63120 +<interface name="apache_dontaudit_search_modules" lineno="882">
63121 <summary>
63122 Do not audit attempts to search
63123 httpd module directories.
63124 @@ -90583,7 +91288,7 @@ Domain to not audit.
63125 </summary>
63126 </param>
63127 </interface>
63128 -<interface name="apache_list_modules" lineno="880">
63129 +<interface name="apache_list_modules" lineno="900">
63130 <summary>
63131 List httpd module directories.
63132 </summary>
63133 @@ -90593,7 +91298,7 @@ Domain allowed access.
63134 </summary>
63135 </param>
63136 </interface>
63137 -<interface name="apache_exec_modules" lineno="898">
63138 +<interface name="apache_exec_modules" lineno="918">
63139 <summary>
63140 Execute httpd module files.
63141 </summary>
63142 @@ -90603,7 +91308,7 @@ Domain allowed access.
63143 </summary>
63144 </param>
63145 </interface>
63146 -<interface name="apache_read_module_files" lineno="918">
63147 +<interface name="apache_read_module_files" lineno="938">
63148 <summary>
63149 Read httpd module files.
63150 </summary>
63151 @@ -90613,7 +91318,7 @@ Domain allowed access.
63152 </summary>
63153 </param>
63154 </interface>
63155 -<interface name="apache_domtrans_rotatelogs" lineno="938">
63156 +<interface name="apache_domtrans_rotatelogs" lineno="958">
63157 <summary>
63158 Execute a domain transition to
63159 run httpd_rotatelogs.
63160 @@ -90624,7 +91329,7 @@ Domain allowed to transition.
63161 </summary>
63162 </param>
63163 </interface>
63164 -<interface name="apache_list_sys_content" lineno="957">
63165 +<interface name="apache_list_sys_content" lineno="977">
63166 <summary>
63167 List httpd system content directories.
63168 </summary>
63169 @@ -90634,7 +91339,7 @@ Domain allowed access.
63170 </summary>
63171 </param>
63172 </interface>
63173 -<interface name="apache_manage_sys_content" lineno="978">
63174 +<interface name="apache_manage_sys_content" lineno="998">
63175 <summary>
63176 Create, read, write, and delete
63177 httpd system content files.
63178 @@ -90646,7 +91351,7 @@ Domain allowed access.
63179 </param>
63180 <rolecap/>
63181 </interface>
63182 -<interface name="apache_manage_sys_rw_content" lineno="1000">
63183 +<interface name="apache_manage_sys_rw_content" lineno="1020">
63184 <summary>
63185 Create, read, write, and delete
63186 httpd system rw content.
63187 @@ -90657,7 +91362,7 @@ Domain allowed access.
63188 </summary>
63189 </param>
63190 </interface>
63191 -<interface name="apache_domtrans_sys_script" lineno="1022">
63192 +<interface name="apache_domtrans_sys_script" lineno="1042">
63193 <summary>
63194 Execute all httpd scripts in the
63195 system script domain.
63196 @@ -90668,7 +91373,7 @@ Domain allowed to transition.
63197 </summary>
63198 </param>
63199 </interface>
63200 -<interface name="apache_dontaudit_rw_sys_script_stream_sockets" lineno="1045">
63201 +<interface name="apache_dontaudit_rw_sys_script_stream_sockets" lineno="1065">
63202 <summary>
63203 Do not audit attempts to read and
63204 write httpd system script unix
63205 @@ -90680,7 +91385,7 @@ Domain to not audit.
63206 </summary>
63207 </param>
63208 </interface>
63209 -<interface name="apache_domtrans_all_scripts" lineno="1064">
63210 +<interface name="apache_domtrans_all_scripts" lineno="1084">
63211 <summary>
63212 Execute all user scripts in the user
63213 script domain.
63214 @@ -90691,7 +91396,7 @@ Domain allowed to transition.
63215 </summary>
63216 </param>
63217 </interface>
63218 -<interface name="apache_run_all_scripts" lineno="1089">
63219 +<interface name="apache_run_all_scripts" lineno="1109">
63220 <summary>
63221 Execute all user scripts in the user
63222 script domain. Add user script domains
63223 @@ -90708,7 +91413,7 @@ Role allowed access.
63224 </summary>
63225 </param>
63226 </interface>
63227 -<interface name="apache_read_squirrelmail_data" lineno="1108">
63228 +<interface name="apache_read_squirrelmail_data" lineno="1128">
63229 <summary>
63230 Read httpd squirrelmail data files.
63231 </summary>
63232 @@ -90718,7 +91423,7 @@ Domain allowed access.
63233 </summary>
63234 </param>
63235 </interface>
63236 -<interface name="apache_append_squirrelmail_data" lineno="1126">
63237 +<interface name="apache_append_squirrelmail_data" lineno="1146">
63238 <summary>
63239 Append httpd squirrelmail data files.
63240 </summary>
63241 @@ -90728,7 +91433,17 @@ Domain allowed access.
63242 </summary>
63243 </param>
63244 </interface>
63245 -<interface name="apache_search_sys_content" lineno="1144">
63246 +<interface name="apache_delete_squirrelmail_spool" lineno="1164">
63247 +<summary>
63248 +delete httpd squirrelmail spool files.
63249 +</summary>
63250 +<param name="domain">
63251 +<summary>
63252 +Domain allowed access.
63253 +</summary>
63254 +</param>
63255 +</interface>
63256 +<interface name="apache_search_sys_content" lineno="1182">
63257 <summary>
63258 Search httpd system content.
63259 </summary>
63260 @@ -90738,7 +91453,7 @@ Domain allowed access.
63261 </summary>
63262 </param>
63263 </interface>
63264 -<interface name="apache_read_sys_content" lineno="1163">
63265 +<interface name="apache_read_sys_content" lineno="1201">
63266 <summary>
63267 Read httpd system content.
63268 </summary>
63269 @@ -90748,7 +91463,7 @@ Domain allowed access.
63270 </summary>
63271 </param>
63272 </interface>
63273 -<interface name="apache_search_sys_scripts" lineno="1183">
63274 +<interface name="apache_search_sys_scripts" lineno="1221">
63275 <summary>
63276 Search httpd system CGI directories.
63277 </summary>
63278 @@ -90758,7 +91473,7 @@ Domain allowed access.
63279 </summary>
63280 </param>
63281 </interface>
63282 -<interface name="apache_manage_all_user_content" lineno="1203">
63283 +<interface name="apache_manage_all_user_content" lineno="1241">
63284 <summary>
63285 Create, read, write, and delete all
63286 user httpd content.
63287 @@ -90770,7 +91485,7 @@ Domain allowed access.
63288 </param>
63289 <rolecap/>
63290 </interface>
63291 -<interface name="apache_search_sys_script_state" lineno="1224">
63292 +<interface name="apache_search_sys_script_state" lineno="1262">
63293 <summary>
63294 Search system script state directories.
63295 </summary>
63296 @@ -90780,7 +91495,7 @@ Domain allowed access.
63297 </summary>
63298 </param>
63299 </interface>
63300 -<interface name="apache_read_tmp_files" lineno="1242">
63301 +<interface name="apache_read_tmp_files" lineno="1280">
63302 <summary>
63303 Read httpd tmp files.
63304 </summary>
63305 @@ -90790,7 +91505,7 @@ Domain allowed access.
63306 </summary>
63307 </param>
63308 </interface>
63309 -<interface name="apache_dontaudit_write_tmp_files" lineno="1262">
63310 +<interface name="apache_dontaudit_write_tmp_files" lineno="1300">
63311 <summary>
63312 Do not audit attempts to write
63313 httpd tmp files.
63314 @@ -90801,7 +91516,7 @@ Domain to not audit.
63315 </summary>
63316 </param>
63317 </interface>
63318 -<interface name="apache_delete_lib_files" lineno="1280">
63319 +<interface name="apache_delete_lib_files" lineno="1318">
63320 <summary>
63321 Delete httpd_var_lib_t files
63322 </summary>
63323 @@ -90811,7 +91526,7 @@ Domain that can delete the files
63324 </summary>
63325 </param>
63326 </interface>
63327 -<interface name="apache_cgi_domain" lineno="1311">
63328 +<interface name="apache_cgi_domain" lineno="1349">
63329 <summary>
63330 Execute CGI in the specified domain.
63331 </summary>
63332 @@ -90833,7 +91548,7 @@ Type of the executable to enter the cgi domain.
63333 </summary>
63334 </param>
63335 </interface>
63336 -<interface name="apache_admin" lineno="1339">
63337 +<interface name="apache_admin" lineno="1377">
63338 <summary>
63339 All of the rules required to
63340 administrate an apache environment.
63341 @@ -90954,7 +91669,7 @@ with avahi service via dbus.
63342 <tunable name="httpd_enable_cgi" dftval="false">
63343 <desc>
63344 <p>
63345 -Determine wether httpd can use support.
63346 +Determine whether httpd can use support.
63347 </p>
63348 </desc>
63349 </tunable>
63350 @@ -91160,7 +91875,7 @@ Domain allowed to transition.
63351 </interface>
63352 <interface name="apcupsd_read_pid_files" lineno="52">
63353 <summary>
63354 -Read apcupsd PID files.
63355 +Read apcupsd PID files. (Deprecated)
63356 </summary>
63357 <param name="domain">
63358 <summary>
63359 @@ -91168,7 +91883,7 @@ Domain allowed access.
63360 </summary>
63361 </param>
63362 </interface>
63363 -<interface name="apcupsd_read_log" lineno="72">
63364 +<interface name="apcupsd_read_log" lineno="67">
63365 <summary>
63366 Read apcupsd log files.
63367 </summary>
63368 @@ -91179,7 +91894,7 @@ Domain allowed access.
63369 </param>
63370 <rolecap/>
63371 </interface>
63372 -<interface name="apcupsd_append_log" lineno="92">
63373 +<interface name="apcupsd_append_log" lineno="87">
63374 <summary>
63375 Append apcupsd log files.
63376 </summary>
63377 @@ -91189,7 +91904,7 @@ Domain allowed access.
63378 </summary>
63379 </param>
63380 </interface>
63381 -<interface name="apcupsd_cgi_script_domtrans" lineno="113">
63382 +<interface name="apcupsd_cgi_script_domtrans" lineno="108">
63383 <summary>
63384 Execute a domain transition to
63385 run httpd_apcupsd_cgi_script.
63386 @@ -91200,7 +91915,7 @@ Domain allowed to transition.
63387 </summary>
63388 </param>
63389 </interface>
63390 -<interface name="apcupsd_admin" lineno="143">
63391 +<interface name="apcupsd_admin" lineno="138">
63392 <summary>
63393 All of the rules required to
63394 administrate an apcupsd environment.
63395 @@ -91228,6 +91943,46 @@ be labeled public_content_rw_t.
63396 </desc>
63397 </tunable>
63398 </module>
63399 +<module name="aptcacher" filename="policy/modules/services/aptcacher.if">
63400 +<summary>apt-cacher, cache for Debian APT repositories.</summary>
63401 +<interface name="aptcacher_domtrans_acngtool" lineno="13">
63402 +<summary>
63403 +Execute acngtool in the acngtool domain.
63404 +</summary>
63405 +<param name="domain">
63406 +<summary>
63407 +Domain allowed to transition.
63408 +</summary>
63409 +</param>
63410 +</interface>
63411 +<interface name="aptcacher_run_acngtool" lineno="38">
63412 +<summary>
63413 +Execute acngtool in the acngtool domain, and
63414 +allow the specified role the acngtool domain.
63415 +</summary>
63416 +<param name="domain">
63417 +<summary>
63418 +Domain allowed to transition.
63419 +</summary>
63420 +</param>
63421 +<param name="role">
63422 +<summary>
63423 +Role allowed access.
63424 +</summary>
63425 +</param>
63426 +</interface>
63427 +<interface name="aptcacher_stream_connect" lineno="58">
63428 +<summary>
63429 +Connect to aptcacher using a unix
63430 +stream socket.
63431 +</summary>
63432 +<param name="domain">
63433 +<summary>
63434 +Domain allowed access.
63435 +</summary>
63436 +</param>
63437 +</interface>
63438 +</module>
63439 <module name="arpwatch" filename="policy/modules/services/arpwatch.if">
63440 <summary>Ethernet activity monitor.</summary>
63441 <interface name="arpwatch_initrc_domtrans" lineno="14">
63442 @@ -91368,7 +92123,7 @@ Domain allowed access.
63443 </summary>
63444 </param>
63445 </interface>
63446 -<interface name="asterisk_admin" lineno="120">
63447 +<interface name="asterisk_admin" lineno="114">
63448 <summary>
63449 All of the rules required to
63450 administrate an asterisk environment.
63451 @@ -91547,7 +92302,7 @@ Domain allowed access.
63452 </interface>
63453 <interface name="avahi_create_pid_dirs" lineno="146">
63454 <summary>
63455 -Create avahi pid directories.
63456 +Create avahi pid directories. (Deprecated)
63457 </summary>
63458 <param name="domain">
63459 <summary>
63460 @@ -91555,9 +92310,9 @@ Domain allowed access.
63461 </summary>
63462 </param>
63463 </interface>
63464 -<interface name="avahi_setattr_pid_dirs" lineno="165">
63465 +<interface name="avahi_setattr_pid_dirs" lineno="161">
63466 <summary>
63467 -Set attributes of avahi pid directories.
63468 +Set attributes of avahi pid directories. (Deprecated)
63469 </summary>
63470 <param name="domain">
63471 <summary>
63472 @@ -91565,9 +92320,9 @@ Domain allowed access.
63473 </summary>
63474 </param>
63475 </interface>
63476 -<interface name="avahi_manage_pid_files" lineno="184">
63477 +<interface name="avahi_setattr_runtime_dirs" lineno="176">
63478 <summary>
63479 -Create, read, and write avahi pid files.
63480 +Set attributes of avahi runtime directories.
63481 </summary>
63482 <param name="domain">
63483 <summary>
63484 @@ -91575,10 +92330,30 @@ Domain allowed access.
63485 </summary>
63486 </param>
63487 </interface>
63488 -<interface name="avahi_dontaudit_search_pid" lineno="204">
63489 +<interface name="avahi_create_runtime_dirs" lineno="195">
63490 +<summary>
63491 +Create avahi runtime directories.
63492 +</summary>
63493 +<param name="domain">
63494 +<summary>
63495 +Domain allowed access.
63496 +</summary>
63497 +</param>
63498 +</interface>
63499 +<interface name="avahi_manage_pid_files" lineno="214">
63500 +<summary>
63501 +Create, read, and write avahi pid files. (Deprecated)
63502 +</summary>
63503 +<param name="domain">
63504 +<summary>
63505 +Domain allowed access.
63506 +</summary>
63507 +</param>
63508 +</interface>
63509 +<interface name="avahi_dontaudit_search_pid" lineno="230">
63510 <summary>
63511 Do not audit attempts to search
63512 -avahi pid directories.
63513 +avahi pid directories. (Deprecated)
63514 </summary>
63515 <param name="domain">
63516 <summary>
63517 @@ -91586,10 +92361,10 @@ Domain to not audit.
63518 </summary>
63519 </param>
63520 </interface>
63521 -<interface name="avahi_filetrans_pid" lineno="233">
63522 +<interface name="avahi_filetrans_pid" lineno="256">
63523 <summary>
63524 Create specified objects in generic
63525 -pid directories with the avahi pid file type.
63526 +pid directories with the avahi pid file type. (Deprecated)
63527 </summary>
63528 <param name="domain">
63529 <summary>
63530 @@ -91607,7 +92382,49 @@ The name of the object being created.
63531 </summary>
63532 </param>
63533 </interface>
63534 -<interface name="avahi_admin" lineno="258">
63535 +<interface name="avahi_manage_runtime_files" lineno="271">
63536 +<summary>
63537 +Create, read, and write avahi runtime files.
63538 +</summary>
63539 +<param name="domain">
63540 +<summary>
63541 +Domain allowed access.
63542 +</summary>
63543 +</param>
63544 +</interface>
63545 +<interface name="avahi_dontaudit_search_runtime" lineno="291">
63546 +<summary>
63547 +Do not audit attempts to search
63548 +avahi runtime directories.
63549 +</summary>
63550 +<param name="domain">
63551 +<summary>
63552 +Domain to not audit.
63553 +</summary>
63554 +</param>
63555 +</interface>
63556 +<interface name="avahi_filetrans_runtime" lineno="320">
63557 +<summary>
63558 +Create specified objects in generic
63559 +runtime directories with the avahi runtime file type.
63560 +</summary>
63561 +<param name="domain">
63562 +<summary>
63563 +Domain allowed access.
63564 +</summary>
63565 +</param>
63566 +<param name="object_class">
63567 +<summary>
63568 +Class of the object being created.
63569 +</summary>
63570 +</param>
63571 +<param name="name" optional="true">
63572 +<summary>
63573 +The name of the object being created.
63574 +</summary>
63575 +</param>
63576 +</interface>
63577 +<interface name="avahi_admin" lineno="345">
63578 <summary>
63579 All of the rules required to
63580 administrate an avahi environment.
63581 @@ -91769,7 +92586,7 @@ Domain allowed access.
63582 </interface>
63583 <interface name="bind_setattr_pid_dirs" lineno="267">
63584 <summary>
63585 -Set attributes of bind pid directories.
63586 +Set attributes of bind pid directories. (Deprecated)
63587 </summary>
63588 <param name="domain">
63589 <summary>
63590 @@ -91777,7 +92594,7 @@ Domain allowed access.
63591 </summary>
63592 </param>
63593 </interface>
63594 -<interface name="bind_setattr_zone_dirs" lineno="285">
63595 +<interface name="bind_setattr_zone_dirs" lineno="281">
63596 <summary>
63597 Set attributes of bind zone directories.
63598 </summary>
63599 @@ -91787,7 +92604,7 @@ Domain allowed access.
63600 </summary>
63601 </param>
63602 </interface>
63603 -<interface name="bind_read_zone" lineno="303">
63604 +<interface name="bind_read_zone" lineno="299">
63605 <summary>
63606 Read bind zone files.
63607 </summary>
63608 @@ -91797,7 +92614,7 @@ Domain allowed access.
63609 </summary>
63610 </param>
63611 </interface>
63612 -<interface name="bind_manage_zone" lineno="323">
63613 +<interface name="bind_manage_zone" lineno="319">
63614 <summary>
63615 Create, read, write, and delete
63616 bind zone files.
63617 @@ -91808,7 +92625,7 @@ Domain allowed access.
63618 </summary>
63619 </param>
63620 </interface>
63621 -<interface name="bind_admin" lineno="349">
63622 +<interface name="bind_admin" lineno="345">
63623 <summary>
63624 All of the rules required to
63625 administrate an bind environment.
63626 @@ -92211,6 +93028,37 @@ Role allowed access.
63627 <rolecap/>
63628 </interface>
63629 </module>
63630 +<module name="certbot" filename="policy/modules/services/certbot.if">
63631 +<summary>SSL certificate requesting tool certbot AKA letsencrypt.</summary>
63632 +<interface name="certbot_domtrans" lineno="14">
63633 +<summary>
63634 +Execute certbot/letsencrypt in the certbot
63635 +domain.
63636 +</summary>
63637 +<param name="domain">
63638 +<summary>
63639 +Domain allowed to transition.
63640 +</summary>
63641 +</param>
63642 +</interface>
63643 +<interface name="certbot_run" lineno="39">
63644 +<summary>
63645 +Execute certbot/letsencrypt in the certbot
63646 +domain, and allow the specified role
63647 +the firstboot domain.
63648 +</summary>
63649 +<param name="domain">
63650 +<summary>
63651 +Domain allowed to transition.
63652 +</summary>
63653 +</param>
63654 +<param name="role">
63655 +<summary>
63656 +Role allowed access.
63657 +</summary>
63658 +</param>
63659 +</interface>
63660 +</module>
63661 <module name="certmaster" filename="policy/modules/services/certmaster.if">
63662 <summary>Remote certificate distribution framework.</summary>
63663 <interface name="certmaster_domtrans" lineno="13">
63664 @@ -92318,7 +93166,7 @@ Domain allowed to transition.
63665 </interface>
63666 <interface name="certmonger_read_pid_files" lineno="72">
63667 <summary>
63668 -Read certmonger PID files.
63669 +Read certmonger PID files. (Deprecated)
63670 </summary>
63671 <param name="domain">
63672 <summary>
63673 @@ -92326,7 +93174,7 @@ Domain allowed access.
63674 </summary>
63675 </param>
63676 </interface>
63677 -<interface name="certmonger_search_lib" lineno="91">
63678 +<interface name="certmonger_search_lib" lineno="86">
63679 <summary>
63680 Search certmonger lib directories.
63681 </summary>
63682 @@ -92336,7 +93184,7 @@ Domain allowed access.
63683 </summary>
63684 </param>
63685 </interface>
63686 -<interface name="certmonger_read_lib_files" lineno="110">
63687 +<interface name="certmonger_read_lib_files" lineno="105">
63688 <summary>
63689 Read certmonger lib files.
63690 </summary>
63691 @@ -92346,7 +93194,7 @@ Domain allowed access.
63692 </summary>
63693 </param>
63694 </interface>
63695 -<interface name="certmonger_manage_lib_files" lineno="130">
63696 +<interface name="certmonger_manage_lib_files" lineno="125">
63697 <summary>
63698 Create, read, write, and delete
63699 certmonger lib files.
63700 @@ -92357,7 +93205,7 @@ Domain allowed access.
63701 </summary>
63702 </param>
63703 </interface>
63704 -<interface name="certmonger_admin" lineno="156">
63705 +<interface name="certmonger_admin" lineno="151">
63706 <summary>
63707 All of the rules required to
63708 administrate an certmonger environment.
63709 @@ -92760,7 +93608,7 @@ Domain allowed access.
63710 <interface name="clamav_manage_pid_content" lineno="101">
63711 <summary>
63712 Create, read, write, and delete
63713 -clamav pid content.
63714 +clamav pid content. (Deprecated)
63715 </summary>
63716 <param name="domain">
63717 <summary>
63718 @@ -92768,7 +93616,7 @@ Domain allowed access.
63719 </summary>
63720 </param>
63721 </interface>
63722 -<interface name="clamav_read_config" lineno="121">
63723 +<interface name="clamav_read_config" lineno="115">
63724 <summary>
63725 Read clamav configuration files.
63726 </summary>
63727 @@ -92778,7 +93626,7 @@ Domain allowed access.
63728 </summary>
63729 </param>
63730 </interface>
63731 -<interface name="clamav_search_lib" lineno="140">
63732 +<interface name="clamav_search_lib" lineno="134">
63733 <summary>
63734 Search clamav library directories.
63735 </summary>
63736 @@ -92788,7 +93636,7 @@ Domain allowed access.
63737 </summary>
63738 </param>
63739 </interface>
63740 -<interface name="clamav_domtrans_clamscan" lineno="159">
63741 +<interface name="clamav_domtrans_clamscan" lineno="153">
63742 <summary>
63743 Execute a domain transition to run clamscan.
63744 </summary>
63745 @@ -92798,7 +93646,7 @@ Domain allowed to transition.
63746 </summary>
63747 </param>
63748 </interface>
63749 -<interface name="clamav_exec_clamscan" lineno="178">
63750 +<interface name="clamav_exec_clamscan" lineno="172">
63751 <summary>
63752 Execute clamscan in the caller domain.
63753 </summary>
63754 @@ -92808,7 +93656,7 @@ Domain allowed access.
63755 </summary>
63756 </param>
63757 </interface>
63758 -<interface name="clamav_read_state_clamd" lineno="197">
63759 +<interface name="clamav_read_state_clamd" lineno="191">
63760 <summary>
63761 Read clamd process state files.
63762 </summary>
63763 @@ -92818,7 +93666,7 @@ Domain allowed access.
63764 </summary>
63765 </param>
63766 </interface>
63767 -<interface name="clamav_read_signatures" lineno="225">
63768 +<interface name="clamav_read_signatures" lineno="219">
63769 <summary>
63770 Read clam virus signature files
63771 </summary>
63772 @@ -92835,7 +93683,7 @@ Domain allowed access.
63773 </summary>
63774 </param>
63775 </interface>
63776 -<interface name="clamav_scannable_files" lineno="246">
63777 +<interface name="clamav_scannable_files" lineno="240">
63778 <summary>
63779 Denote a particular type to be scanned by ClamAV
63780 </summary>
63781 @@ -92845,7 +93693,7 @@ Type that clamd_t and clamscan_t can read.
63782 </summary>
63783 </param>
63784 </interface>
63785 -<interface name="clamav_domtrans_freshclam" lineno="264">
63786 +<interface name="clamav_domtrans_freshclam" lineno="258">
63787 <summary>
63788 Execute a domain transition to run freshclam.
63789 </summary>
63790 @@ -92855,7 +93703,7 @@ Domain allowed to transition.
63791 </summary>
63792 </param>
63793 </interface>
63794 -<interface name="clamav_run_freshclam" lineno="290">
63795 +<interface name="clamav_run_freshclam" lineno="284">
63796 <summary>
63797 Execute freshclam in the freshclam domain, and
63798 allow the specified role the freshclam domain.
63799 @@ -92872,7 +93720,7 @@ Role allowed access.
63800 </param>
63801 <rolecap/>
63802 </interface>
63803 -<interface name="clamav_exec_freshclam" lineno="309">
63804 +<interface name="clamav_exec_freshclam" lineno="303">
63805 <summary>
63806 Execute freshclam in the caller domain.
63807 </summary>
63808 @@ -92882,7 +93730,7 @@ Domain allowed access.
63809 </summary>
63810 </param>
63811 </interface>
63812 -<interface name="clamav_enabledisable_clamd" lineno="328">
63813 +<interface name="clamav_enabledisable_clamd" lineno="322">
63814 <summary>
63815 Allow specified domain to enable clamd units
63816 </summary>
63817 @@ -92892,7 +93740,7 @@ Domain allowed access.
63818 </summary>
63819 </param>
63820 </interface>
63821 -<interface name="clamav_startstop_clamd" lineno="347">
63822 +<interface name="clamav_startstop_clamd" lineno="341">
63823 <summary>
63824 Allow specified domain to start clamd units
63825 </summary>
63826 @@ -92902,7 +93750,7 @@ Domain allowed access.
63827 </summary>
63828 </param>
63829 </interface>
63830 -<interface name="clamav_status_clamd" lineno="366">
63831 +<interface name="clamav_status_clamd" lineno="360">
63832 <summary>
63833 Allow specified domain to get status of clamd
63834 </summary>
63835 @@ -92912,7 +93760,7 @@ Domain allowed access.
63836 </summary>
63837 </param>
63838 </interface>
63839 -<interface name="clamav_reload_clamd" lineno="385">
63840 +<interface name="clamav_reload_clamd" lineno="379">
63841 <summary>
63842 Allow specified domain reload of clamd
63843 </summary>
63844 @@ -92922,7 +93770,7 @@ Domain allowed access.
63845 </summary>
63846 </param>
63847 </interface>
63848 -<interface name="clamav_admin" lineno="411">
63849 +<interface name="clamav_admin" lineno="405">
63850 <summary>
63851 All of the rules required to
63852 administrate an clamav environment.
63853 @@ -93054,7 +93902,7 @@ Domain allowed to transition.
63854 </interface>
63855 <interface name="cmirrord_read_pid_files" lineno="52">
63856 <summary>
63857 -Read cmirrord PID files.
63858 +Read cmirrord PID files. (Deprecated)
63859 </summary>
63860 <param name="domain">
63861 <summary>
63862 @@ -93062,7 +93910,7 @@ Domain allowed access.
63863 </summary>
63864 </param>
63865 </interface>
63866 -<interface name="cmirrord_rw_shm" lineno="71">
63867 +<interface name="cmirrord_rw_shm" lineno="66">
63868 <summary>
63869 Read and write cmirrord shared memory.
63870 </summary>
63871 @@ -93072,7 +93920,7 @@ Domain allowed access.
63872 </summary>
63873 </param>
63874 </interface>
63875 -<interface name="cmirrord_admin" lineno="101">
63876 +<interface name="cmirrord_admin" lineno="96">
63877 <summary>
63878 All of the rules required to
63879 administrate an cmirrord environment.
63880 @@ -93329,75 +94177,6 @@ to the network using TCP.
63881 </desc>
63882 </tunable>
63883 </module>
63884 -<module name="consolekit" filename="policy/modules/services/consolekit.if">
63885 -<summary>Framework for facilitating multiple user sessions on desktops.</summary>
63886 -<interface name="consolekit_domtrans" lineno="13">
63887 -<summary>
63888 -Execute a domain transition to run consolekit.
63889 -</summary>
63890 -<param name="domain">
63891 -<summary>
63892 -Domain allowed to transition.
63893 -</summary>
63894 -</param>
63895 -</interface>
63896 -<interface name="consolekit_dbus_chat" lineno="33">
63897 -<summary>
63898 -Send and receive messages from
63899 -consolekit over dbus.
63900 -</summary>
63901 -<param name="domain">
63902 -<summary>
63903 -Domain allowed access.
63904 -</summary>
63905 -</param>
63906 -</interface>
63907 -<interface name="consolekit_use_inhibit_lock" lineno="57">
63908 -<summary>
63909 -Use consolekit inhibit locks.
63910 -
63911 -The program gets passed an FD to a fifo_file to hold.
63912 -When the application is done with the lock, it closes the FD.
63913 -Implements this API: https://www.freedesktop.org/wiki/Software/systemd/inhibit/
63914 -</summary>
63915 -<param name="domain">
63916 -<summary>
63917 -Domain allowed access.
63918 -</summary>
63919 -</param>
63920 -</interface>
63921 -<interface name="consolekit_read_log" lineno="76">
63922 -<summary>
63923 -Read consolekit log files.
63924 -</summary>
63925 -<param name="domain">
63926 -<summary>
63927 -Domain allowed access.
63928 -</summary>
63929 -</param>
63930 -</interface>
63931 -<interface name="consolekit_manage_log" lineno="96">
63932 -<summary>
63933 -Create, read, write, and delete
63934 -consolekit log files.
63935 -</summary>
63936 -<param name="domain">
63937 -<summary>
63938 -Domain allowed access.
63939 -</summary>
63940 -</param>
63941 -</interface>
63942 -<interface name="consolekit_read_pid_files" lineno="115">
63943 -<summary>
63944 -Read consolekit PID files.
63945 -</summary>
63946 -<param name="domain">
63947 -<summary>
63948 -Domain allowed access.
63949 -</summary>
63950 -</param>
63951 -</interface>
63952 -</module>
63953 <module name="consolesetup" filename="policy/modules/services/consolesetup.if">
63954 <summary>console font and keymap setup program for debian</summary>
63955 <interface name="consolesetup_domtrans" lineno="13">
63956 @@ -93447,6 +94226,18 @@ Domain allowed access.
63957 <interface name="consolesetup_pid_filetrans_runtime" lineno="98">
63958 <summary>
63959 Create a console-setup directory in
63960 +the runtime directory. (Deprecated)
63961 +</summary>
63962 +<param name="domain">
63963 +<summary>
63964 +Domain allowed access.
63965 +</summary>
63966 +</param>
63967 +<rolecap/>
63968 +</interface>
63969 +<interface name="consolesetup_runtime_filetrans_runtime_dir" lineno="115">
63970 +<summary>
63971 +Create a console-setup directory in
63972 the runtime directory.
63973 </summary>
63974 <param name="domain">
63975 @@ -93511,7 +94302,17 @@ Domain allowed access.
63976 </summary>
63977 </param>
63978 </interface>
63979 -<interface name="corosync_rw_tmpfs" lineno="110">
63980 +<interface name="corosync_mmap_rw_tmpfs" lineno="110">
63981 +<summary>
63982 +Memmap, read and write corosync tmpfs files.
63983 +</summary>
63984 +<param name="domain">
63985 +<summary>
63986 +Domain allowed access.
63987 +</summary>
63988 +</param>
63989 +</interface>
63990 +<interface name="corosync_rw_tmpfs" lineno="129">
63991 <summary>
63992 Read and write corosync tmpfs files.
63993 </summary>
63994 @@ -93521,7 +94322,17 @@ Domain allowed access.
63995 </summary>
63996 </param>
63997 </interface>
63998 -<interface name="corosync_admin" lineno="136">
63999 +<interface name="corosync_read_state" lineno="148">
64000 +<summary>
64001 +Read process state of corosync.
64002 +</summary>
64003 +<param name="domain">
64004 +<summary>
64005 +Domain allowed access.
64006 +</summary>
64007 +</param>
64008 +</interface>
64009 +<interface name="corosync_admin" lineno="173">
64010 <summary>
64011 All of the rules required to
64012 administrate an corosync environment.
64013 @@ -93573,7 +94384,7 @@ Domain allowed access.
64014 </interface>
64015 <interface name="couchdb_read_pid_files" lineno="70">
64016 <summary>
64017 -Read couchdb pid files.
64018 +Read couchdb pid files. (Deprecated)
64019 </summary>
64020 <param name="domain">
64021 <summary>
64022 @@ -93581,7 +94392,17 @@ Domain allowed access.
64023 </summary>
64024 </param>
64025 </interface>
64026 -<interface name="couchdb_admin" lineno="96">
64027 +<interface name="couchdb_read_runtime_files" lineno="85">
64028 +<summary>
64029 +Read couchdb runtime files.
64030 +</summary>
64031 +<param name="domain">
64032 +<summary>
64033 +Domain allowed access.
64034 +</summary>
64035 +</param>
64036 +</interface>
64037 +<interface name="couchdb_admin" lineno="111">
64038 <summary>
64039 All of the rules required to
64040 administrate an couchdb environment.
64041 @@ -93771,7 +94592,7 @@ User domain for the role.
64042 <interface name="cron_system_entry" lineno="312">
64043 <summary>
64044 Make the specified program domain
64045 -accessable from the system cron jobs.
64046 +accessible from the system cron jobs.
64047 </summary>
64048 <param name="domain">
64049 <summary>
64050 @@ -93961,7 +94782,7 @@ Domain allowed access.
64051 <interface name="cron_manage_pid_files" lineno="641">
64052 <summary>
64053 Create, read, write, and delete
64054 -crond pid files.
64055 +crond pid files. (Deprecated)
64056 </summary>
64057 <param name="domain">
64058 <summary>
64059 @@ -93969,7 +94790,7 @@ Domain allowed access.
64060 </summary>
64061 </param>
64062 </interface>
64063 -<interface name="cron_anacron_domtrans_system_job" lineno="660">
64064 +<interface name="cron_anacron_domtrans_system_job" lineno="656">
64065 <summary>
64066 Execute anacron in the cron
64067 system domain.
64068 @@ -93980,7 +94801,7 @@ Domain allowed to transition.
64069 </summary>
64070 </param>
64071 </interface>
64072 -<interface name="cron_use_system_job_fds" lineno="679">
64073 +<interface name="cron_use_system_job_fds" lineno="675">
64074 <summary>
64075 Use system cron job file descriptors.
64076 </summary>
64077 @@ -93990,7 +94811,7 @@ Domain allowed access.
64078 </summary>
64079 </param>
64080 </interface>
64081 -<interface name="cron_manage_system_spool" lineno="697">
64082 +<interface name="cron_manage_system_spool" lineno="693">
64083 <summary>
64084 Create, read, write, and delete the system spool.
64085 </summary>
64086 @@ -94000,7 +94821,7 @@ Domain allowed access.
64087 </summary>
64088 </param>
64089 </interface>
64090 -<interface name="cron_read_system_spool" lineno="716">
64091 +<interface name="cron_read_system_spool" lineno="712">
64092 <summary>
64093 Read the system spool.
64094 </summary>
64095 @@ -94010,7 +94831,7 @@ Domain allowed access.
64096 </summary>
64097 </param>
64098 </interface>
64099 -<interface name="cron_rw_tmp_files" lineno="736">
64100 +<interface name="cron_rw_tmp_files" lineno="732">
64101 <summary>
64102 Read and write crond temporary files.
64103 </summary>
64104 @@ -94020,7 +94841,7 @@ Domain allowed access.
64105 </summary>
64106 </param>
64107 </interface>
64108 -<interface name="cron_read_system_job_lib_files" lineno="754">
64109 +<interface name="cron_read_system_job_lib_files" lineno="750">
64110 <summary>
64111 Read system cron job lib files.
64112 </summary>
64113 @@ -94030,7 +94851,7 @@ Domain allowed access.
64114 </summary>
64115 </param>
64116 </interface>
64117 -<interface name="cron_manage_system_job_lib_files" lineno="774">
64118 +<interface name="cron_manage_system_job_lib_files" lineno="770">
64119 <summary>
64120 Create, read, write, and delete
64121 system cron job lib files.
64122 @@ -94041,7 +94862,7 @@ Domain allowed access.
64123 </summary>
64124 </param>
64125 </interface>
64126 -<interface name="cron_write_system_job_pipes" lineno="793">
64127 +<interface name="cron_write_system_job_pipes" lineno="789">
64128 <summary>
64129 Write system cron job unnamed pipes.
64130 </summary>
64131 @@ -94051,7 +94872,7 @@ Domain allowed access.
64132 </summary>
64133 </param>
64134 </interface>
64135 -<interface name="cron_rw_system_job_pipes" lineno="812">
64136 +<interface name="cron_rw_system_job_pipes" lineno="808">
64137 <summary>
64138 Read and write system cron job
64139 unnamed pipes.
64140 @@ -94062,7 +94883,7 @@ Domain allowed access.
64141 </summary>
64142 </param>
64143 </interface>
64144 -<interface name="cron_rw_system_job_stream_sockets" lineno="831">
64145 +<interface name="cron_rw_system_job_stream_sockets" lineno="827">
64146 <summary>
64147 Read and write inherited system cron
64148 job unix domain stream sockets.
64149 @@ -94073,7 +94894,7 @@ Domain allowed access.
64150 </summary>
64151 </param>
64152 </interface>
64153 -<interface name="cron_read_system_job_tmp_files" lineno="849">
64154 +<interface name="cron_read_system_job_tmp_files" lineno="845">
64155 <summary>
64156 Read system cron job temporary files.
64157 </summary>
64158 @@ -94083,7 +94904,7 @@ Domain allowed access.
64159 </summary>
64160 </param>
64161 </interface>
64162 -<interface name="cron_dontaudit_append_system_job_tmp_files" lineno="869">
64163 +<interface name="cron_dontaudit_append_system_job_tmp_files" lineno="865">
64164 <summary>
64165 Do not audit attempts to append temporary
64166 system cron job files.
64167 @@ -94094,7 +94915,7 @@ Domain to not audit.
64168 </summary>
64169 </param>
64170 </interface>
64171 -<interface name="cron_rw_inherited_system_job_tmp_files" lineno="887">
64172 +<interface name="cron_rw_inherited_system_job_tmp_files" lineno="883">
64173 <summary>
64174 Read and write to inherited system cron job temporary files.
64175 </summary>
64176 @@ -94104,7 +94925,7 @@ Domain allowed access.
64177 </summary>
64178 </param>
64179 </interface>
64180 -<interface name="cron_dontaudit_write_system_job_tmp_files" lineno="906">
64181 +<interface name="cron_dontaudit_write_system_job_tmp_files" lineno="902">
64182 <summary>
64183 Do not audit attempts to write temporary
64184 system cron job files.
64185 @@ -94115,7 +94936,7 @@ Domain to not audit.
64186 </summary>
64187 </param>
64188 </interface>
64189 -<interface name="cron_exec_crontab" lineno="925">
64190 +<interface name="cron_exec_crontab" lineno="921">
64191 <summary>
64192 Execute crontab in the caller domain.
64193 </summary>
64194 @@ -94126,7 +94947,7 @@ Domain allowed access.
64195 </param>
64196 <rolecap/>
64197 </interface>
64198 -<interface name="cron_admin" lineno="951">
64199 +<interface name="cron_admin" lineno="947">
64200 <summary>
64201 All of the rules required to
64202 administrate a cron environment.
64203 @@ -94292,7 +95113,17 @@ Domain allowed access.
64204 </interface>
64205 <interface name="cups_read_pid_files" lineno="107">
64206 <summary>
64207 -Read cups PID files.
64208 +Read cups PID files. (Deprecated)
64209 +</summary>
64210 +<param name="domain">
64211 +<summary>
64212 +Domain allowed access.
64213 +</summary>
64214 +</param>
64215 +</interface>
64216 +<interface name="cups_read_runtime_files" lineno="122">
64217 +<summary>
64218 +Read cups runtime files.
64219 </summary>
64220 <param name="domain">
64221 <summary>
64222 @@ -94300,7 +95131,7 @@ Domain allowed access.
64223 </summary>
64224 </param>
64225 </interface>
64226 -<interface name="cups_domtrans_config" lineno="127">
64227 +<interface name="cups_domtrans_config" lineno="142">
64228 <summary>
64229 Execute cups_config in the
64230 cups config domain.
64231 @@ -94311,7 +95142,7 @@ Domain allowed to transition.
64232 </summary>
64233 </param>
64234 </interface>
64235 -<interface name="cups_signal_config" lineno="147">
64236 +<interface name="cups_signal_config" lineno="162">
64237 <summary>
64238 Send generic signals to the cups
64239 configuration daemon.
64240 @@ -94322,7 +95153,7 @@ Domain allowed access.
64241 </summary>
64242 </param>
64243 </interface>
64244 -<interface name="cups_dbus_chat_config" lineno="166">
64245 +<interface name="cups_dbus_chat_config" lineno="181">
64246 <summary>
64247 Send and receive messages from
64248 cupsd_config over dbus.
64249 @@ -94333,7 +95164,7 @@ Domain allowed access.
64250 </summary>
64251 </param>
64252 </interface>
64253 -<interface name="cups_read_config" lineno="187">
64254 +<interface name="cups_read_config" lineno="202">
64255 <summary>
64256 Read cups configuration files.
64257 </summary>
64258 @@ -94344,7 +95175,7 @@ Domain allowed access.
64259 </param>
64260 <rolecap/>
64261 </interface>
64262 -<interface name="cups_read_rw_config" lineno="207">
64263 +<interface name="cups_read_rw_config" lineno="222">
64264 <summary>
64265 Read cups-writable configuration files.
64266 </summary>
64267 @@ -94355,7 +95186,7 @@ Domain allowed access.
64268 </param>
64269 <rolecap/>
64270 </interface>
64271 -<interface name="cups_read_log" lineno="227">
64272 +<interface name="cups_read_log" lineno="242">
64273 <summary>
64274 Read cups log files.
64275 </summary>
64276 @@ -94366,7 +95197,7 @@ Domain allowed access.
64277 </param>
64278 <rolecap/>
64279 </interface>
64280 -<interface name="cups_append_log" lineno="246">
64281 +<interface name="cups_append_log" lineno="261">
64282 <summary>
64283 Append cups log files.
64284 </summary>
64285 @@ -94376,7 +95207,7 @@ Domain allowed access.
64286 </summary>
64287 </param>
64288 </interface>
64289 -<interface name="cups_write_log" lineno="265">
64290 +<interface name="cups_write_log" lineno="280">
64291 <summary>
64292 Write cups log files.
64293 </summary>
64294 @@ -94386,7 +95217,7 @@ Domain allowed access.
64295 </summary>
64296 </param>
64297 </interface>
64298 -<interface name="cups_stream_connect_ptal" lineno="285">
64299 +<interface name="cups_stream_connect_ptal" lineno="300">
64300 <summary>
64301 Connect to ptal over an unix
64302 domain stream socket.
64303 @@ -94397,7 +95228,7 @@ Domain allowed access.
64304 </summary>
64305 </param>
64306 </interface>
64307 -<interface name="cups_read_state" lineno="304">
64308 +<interface name="cups_read_state" lineno="319">
64309 <summary>
64310 Read the process state (/proc/pid) of cupsd.
64311 </summary>
64312 @@ -94407,7 +95238,7 @@ Domain allowed access.
64313 </summary>
64314 </param>
64315 </interface>
64316 -<interface name="cups_domtrans_hplip" lineno="326">
64317 +<interface name="cups_domtrans_hplip" lineno="341">
64318 <summary>
64319 Execute HP Linux Imaging and
64320 Printing applications in their
64321 @@ -94419,7 +95250,7 @@ Domain allowed to transition.
64322 </summary>
64323 </param>
64324 </interface>
64325 -<interface name="cups_admin" lineno="352">
64326 +<interface name="cups_admin" lineno="367">
64327 <summary>
64328 All of the rules required to
64329 administrate an cups environment.
64330 @@ -94644,7 +95475,7 @@ Domain allowed access.
64331 </summary>
64332 </param>
64333 </interface>
64334 -<interface name="dbus_connect_all_session_bus" lineno="170">
64335 +<interface name="dbus_connect_all_session_bus" lineno="172">
64336 <summary>
64337 Acquire service on all DBUS
64338 session busses.
64339 @@ -94655,7 +95486,7 @@ Domain allowed access.
64340 </summary>
64341 </param>
64342 </interface>
64343 -<interface name="dbus_connect_spec_session_bus" lineno="196">
64344 +<interface name="dbus_connect_spec_session_bus" lineno="198">
64345 <summary>
64346 Acquire service on specified
64347 DBUS session bus.
64348 @@ -94672,7 +95503,7 @@ Domain allowed access.
64349 </summary>
64350 </param>
64351 </interface>
64352 -<interface name="dbus_all_session_bus_client" lineno="216">
64353 +<interface name="dbus_all_session_bus_client" lineno="218">
64354 <summary>
64355 Creating connections to all
64356 DBUS session busses.
64357 @@ -94683,7 +95514,7 @@ Domain allowed access.
64358 </summary>
64359 </param>
64360 </interface>
64361 -<interface name="dbus_spec_session_bus_client" lineno="248">
64362 +<interface name="dbus_spec_session_bus_client" lineno="250">
64363 <summary>
64364 Creating connections to specified
64365 DBUS session bus.
64366 @@ -94700,7 +95531,7 @@ Domain allowed access.
64367 </summary>
64368 </param>
64369 </interface>
64370 -<interface name="dbus_send_all_session_bus" lineno="275">
64371 +<interface name="dbus_send_all_session_bus" lineno="277">
64372 <summary>
64373 Send messages to all DBUS
64374 session busses.
64375 @@ -94711,7 +95542,7 @@ Domain allowed access.
64376 </summary>
64377 </param>
64378 </interface>
64379 -<interface name="dbus_send_spec_session_bus" lineno="301">
64380 +<interface name="dbus_send_spec_session_bus" lineno="303">
64381 <summary>
64382 Send messages to specified
64383 DBUS session busses.
64384 @@ -94728,7 +95559,7 @@ Domain allowed access.
64385 </summary>
64386 </param>
64387 </interface>
64388 -<interface name="dbus_read_config" lineno="320">
64389 +<interface name="dbus_read_config" lineno="322">
64390 <summary>
64391 Read dbus configuration content.
64392 </summary>
64393 @@ -94738,7 +95569,7 @@ Domain allowed access.
64394 </summary>
64395 </param>
64396 </interface>
64397 -<interface name="dbus_read_lib_files" lineno="339">
64398 +<interface name="dbus_read_lib_files" lineno="341">
64399 <summary>
64400 Read system dbus lib files.
64401 </summary>
64402 @@ -94748,7 +95579,7 @@ Domain allowed access.
64403 </summary>
64404 </param>
64405 </interface>
64406 -<interface name="dbus_relabel_lib_dirs" lineno="359">
64407 +<interface name="dbus_relabel_lib_dirs" lineno="361">
64408 <summary>
64409 Relabel system dbus lib directory.
64410 </summary>
64411 @@ -94758,7 +95589,7 @@ Domain allowed access.
64412 </summary>
64413 </param>
64414 </interface>
64415 -<interface name="dbus_manage_lib_files" lineno="379">
64416 +<interface name="dbus_manage_lib_files" lineno="381">
64417 <summary>
64418 Create, read, write, and delete
64419 system dbus lib files.
64420 @@ -94769,7 +95600,7 @@ Domain allowed access.
64421 </summary>
64422 </param>
64423 </interface>
64424 -<interface name="dbus_all_session_domain" lineno="405">
64425 +<interface name="dbus_all_session_domain" lineno="407">
64426 <summary>
64427 Allow a application domain to be
64428 started by the specified session bus.
64429 @@ -94786,7 +95617,7 @@ entry point to this domain.
64430 </summary>
64431 </param>
64432 </interface>
64433 -<interface name="dbus_spec_session_domain" lineno="439">
64434 +<interface name="dbus_spec_session_domain" lineno="441">
64435 <summary>
64436 Allow a application domain to be
64437 started by the specified session bus.
64438 @@ -94809,7 +95640,7 @@ entry point to this domain.
64439 </summary>
64440 </param>
64441 </interface>
64442 -<interface name="dbus_connect_system_bus" lineno="460">
64443 +<interface name="dbus_connect_system_bus" lineno="462">
64444 <summary>
64445 Acquire service on the DBUS system bus.
64446 </summary>
64447 @@ -94819,7 +95650,7 @@ Domain allowed access.
64448 </summary>
64449 </param>
64450 </interface>
64451 -<interface name="dbus_send_system_bus" lineno="479">
64452 +<interface name="dbus_send_system_bus" lineno="481">
64453 <summary>
64454 Send messages to the DBUS system bus.
64455 </summary>
64456 @@ -94829,7 +95660,7 @@ Domain allowed access.
64457 </summary>
64458 </param>
64459 </interface>
64460 -<interface name="dbus_system_bus_unconfined" lineno="498">
64461 +<interface name="dbus_system_bus_unconfined" lineno="500">
64462 <summary>
64463 Unconfined access to DBUS system bus.
64464 </summary>
64465 @@ -94839,7 +95670,7 @@ Domain allowed access.
64466 </summary>
64467 </param>
64468 </interface>
64469 -<interface name="dbus_system_domain" lineno="523">
64470 +<interface name="dbus_system_domain" lineno="525">
64471 <summary>
64472 Create a domain for processes which
64473 can be started by the DBUS system bus.
64474 @@ -94855,7 +95686,7 @@ Type of the program to be used as an entry point to this domain.
64475 </summary>
64476 </param>
64477 </interface>
64478 -<interface name="dbus_use_system_bus_fds" lineno="563">
64479 +<interface name="dbus_use_system_bus_fds" lineno="565">
64480 <summary>
64481 Use and inherit DBUS system bus
64482 file descriptors.
64483 @@ -94866,7 +95697,7 @@ Domain allowed access.
64484 </summary>
64485 </param>
64486 </interface>
64487 -<interface name="dbus_dontaudit_system_bus_rw_tcp_sockets" lineno="582">
64488 +<interface name="dbus_dontaudit_system_bus_rw_tcp_sockets" lineno="584">
64489 <summary>
64490 Do not audit attempts to read and
64491 write DBUS system bus TCP sockets.
64492 @@ -94877,7 +95708,7 @@ Domain to not audit.
64493 </summary>
64494 </param>
64495 </interface>
64496 -<interface name="dbus_watch_system_bus_runtime_dirs" lineno="600">
64497 +<interface name="dbus_watch_system_bus_runtime_dirs" lineno="602">
64498 <summary>
64499 Watch system bus runtime directories.
64500 </summary>
64501 @@ -94887,7 +95718,17 @@ Domain allowed access.
64502 </summary>
64503 </param>
64504 </interface>
64505 -<interface name="dbus_watch_system_bus_runtime_named_sockets" lineno="618">
64506 +<interface name="dbus_list_system_bus_runtime" lineno="620">
64507 +<summary>
64508 +List system bus runtime directories.
64509 +</summary>
64510 +<param name="domain">
64511 +<summary>
64512 +Domain allowed access.
64513 +</summary>
64514 +</param>
64515 +</interface>
64516 +<interface name="dbus_watch_system_bus_runtime_named_sockets" lineno="638">
64517 <summary>
64518 Watch system bus runtime named sockets.
64519 </summary>
64520 @@ -94897,7 +95738,17 @@ Domain allowed access.
64521 </summary>
64522 </param>
64523 </interface>
64524 -<interface name="dbus_unconfined" lineno="636">
64525 +<interface name="dbus_read_system_bus_runtime_named_sockets" lineno="656">
64526 +<summary>
64527 +Read system bus runtime named sockets.
64528 +</summary>
64529 +<param name="domain">
64530 +<summary>
64531 +Domain allowed access.
64532 +</summary>
64533 +</param>
64534 +</interface>
64535 +<interface name="dbus_unconfined" lineno="674">
64536 <summary>
64537 Unconfined access to DBUS.
64538 </summary>
64539 @@ -94907,7 +95758,7 @@ Domain allowed access.
64540 </summary>
64541 </param>
64542 </interface>
64543 -<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="666">
64544 +<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="704">
64545 <summary>
64546 Create resources in /run or /var/run with the system_dbusd_runtime_t
64547 label. This method is deprecated in favor of the init_daemon_run_dir
64548 @@ -94929,7 +95780,7 @@ Optional file name used for the resource
64549 </summary>
64550 </param>
64551 </interface>
64552 -<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="680">
64553 +<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="718">
64554 <summary>
64555 Create directories with the system_dbusd_runtime_t label
64556 </summary>
64557 @@ -94939,6 +95790,15 @@ Domain allowed access
64558 </summary>
64559 </param>
64560 </interface>
64561 +<tunable name="dbus_pass_tuntap_fd" dftval="false">
64562 +<desc>
64563 +<p>
64564 +Allow dbus-daemon system bus to access /dev/net/tun
64565 +which is needed to pass tun/tap device file descriptors
64566 +over D-Bus. This is needed by openvpn3-linux.
64567 +</p>
64568 +</desc>
64569 +</tunable>
64570 </module>
64571 <module name="dcc" filename="policy/modules/services/dcc.if">
64572 <summary>Distributed checksum clearinghouse spam filtering.</summary>
64573 @@ -95247,7 +96107,7 @@ Domain allowed access.
64574 </interface>
64575 <interface name="devicekit_read_pid_files" lineno="212">
64576 <summary>
64577 -Read devicekit PID files.
64578 +Read devicekit PID files. (Deprecated)
64579 </summary>
64580 <param name="domain">
64581 <summary>
64582 @@ -95255,10 +96115,10 @@ Domain allowed access.
64583 </summary>
64584 </param>
64585 </interface>
64586 -<interface name="devicekit_manage_pid_files" lineno="232">
64587 +<interface name="devicekit_manage_pid_files" lineno="228">
64588 <summary>
64589 Create, read, write, and delete
64590 -devicekit PID files.
64591 +devicekit PID files. (Deprecated)
64592 </summary>
64593 <param name="domain">
64594 <summary>
64595 @@ -95266,7 +96126,28 @@ Domain allowed access.
64596 </summary>
64597 </param>
64598 </interface>
64599 -<interface name="devicekit_admin" lineno="258">
64600 +<interface name="devicekit_read_runtime_files" lineno="243">
64601 +<summary>
64602 +Read devicekit runtime files.
64603 +</summary>
64604 +<param name="domain">
64605 +<summary>
64606 +Domain allowed access.
64607 +</summary>
64608 +</param>
64609 +</interface>
64610 +<interface name="devicekit_manage_runtime_files" lineno="263">
64611 +<summary>
64612 +Create, read, write, and delete
64613 +devicekit runtime files.
64614 +</summary>
64615 +<param name="domain">
64616 +<summary>
64617 +Domain allowed access.
64618 +</summary>
64619 +</param>
64620 +</interface>
64621 +<interface name="devicekit_admin" lineno="289">
64622 <summary>
64623 All of the rules required to
64624 administrate an devicekit environment.
64625 @@ -95586,7 +96467,7 @@ Domain allowed access.
64626 </interface>
64627 <interface name="dnsmasq_delete_pid_files" lineno="149">
64628 <summary>
64629 -Delete dnsmasq pid files.
64630 +Delete dnsmasq pid files. (Deprecated)
64631 </summary>
64632 <param name="domain">
64633 <summary>
64634 @@ -95594,10 +96475,10 @@ Domain allowed access.
64635 </summary>
64636 </param>
64637 </interface>
64638 -<interface name="dnsmasq_manage_pid_files" lineno="168">
64639 +<interface name="dnsmasq_manage_pid_files" lineno="165">
64640 <summary>
64641 Create, read, write, and delete
64642 -dnsmasq pid files
64643 +dnsmasq pid files (Deprecated)
64644 </summary>
64645 <param name="domain">
64646 <summary>
64647 @@ -95605,9 +96486,9 @@ Domain allowed access.
64648 </summary>
64649 </param>
64650 </interface>
64651 -<interface name="dnsmasq_read_pid_files" lineno="188">
64652 +<interface name="dnsmasq_read_pid_files" lineno="181">
64653 <summary>
64654 -Read dnsmasq pid files.
64655 +Read dnsmasq pid files. (Deprecated)
64656 </summary>
64657 <param name="domain">
64658 <summary>
64659 @@ -95615,9 +96496,9 @@ Domain allowed access.
64660 </summary>
64661 </param>
64662 </interface>
64663 -<interface name="dnsmasq_create_pid_dirs" lineno="206">
64664 +<interface name="dnsmasq_create_pid_dirs" lineno="196">
64665 <summary>
64666 -Create dnsmasq pid directories.
64667 +Create dnsmasq pid directories. (Deprecated)
64668 </summary>
64669 <param name="domain">
64670 <summary>
64671 @@ -95625,11 +96506,11 @@ Domain allowed access.
64672 </summary>
64673 </param>
64674 </interface>
64675 -<interface name="dnsmasq_spec_filetrans_pid" lineno="242">
64676 +<interface name="dnsmasq_spec_filetrans_pid" lineno="228">
64677 <summary>
64678 Create specified objects in specified
64679 directories with a type transition to
64680 -the dnsmasq pid file type.
64681 +the dnsmasq pid file type. (Deprecated)
64682 </summary>
64683 <param name="domain">
64684 <summary>
64685 @@ -95652,30 +96533,73 @@ The name of the object being created.
64686 </summary>
64687 </param>
64688 </interface>
64689 -<interface name="dnsmasq_admin" lineno="267">
64690 +<interface name="dnsmasq_create_runtime_dirs" lineno="243">
64691 <summary>
64692 -All of the rules required to
64693 -administrate an dnsmasq environment.
64694 +Create dnsmasq runtime directories.
64695 </summary>
64696 <param name="domain">
64697 <summary>
64698 Domain allowed access.
64699 </summary>
64700 </param>
64701 -<param name="role">
64702 +</interface>
64703 +<interface name="dnsmasq_virt_runtime_filetrans_runtime" lineno="274">
64704 <summary>
64705 -Role allowed access.
64706 +Create specified objects in specified
64707 +directories with a type transition to
64708 +the dnsmasq runtime file type.
64709 +</summary>
64710 +<param name="domain">
64711 +<summary>
64712 +Domain allowed access.
64713 +</summary>
64714 +</param>
64715 +<param name="object">
64716 +<summary>
64717 +The object class of the object being created.
64718 +</summary>
64719 +</param>
64720 +<param name="name" optional="true">
64721 +<summary>
64722 +The name of the object being created.
64723 </summary>
64724 </param>
64725 -<rolecap/>
64726 </interface>
64727 -</module>
64728 -<module name="dnssectrigger" filename="policy/modules/services/dnssectrigger.if">
64729 -<summary>Enables DNSSEC protection for DNS traffic.</summary>
64730 -<interface name="dnssectrigger_admin" lineno="20">
64731 +<interface name="dnsmasq_read_runtime_files" lineno="293">
64732 +<summary>
64733 +Read dnsmasq runtime files.
64734 +</summary>
64735 +<param name="domain">
64736 +<summary>
64737 +Domain allowed access.
64738 +</summary>
64739 +</param>
64740 +</interface>
64741 +<interface name="dnsmasq_delete_runtime_files" lineno="312">
64742 +<summary>
64743 +Delete dnsmasq runtime files.
64744 +</summary>
64745 +<param name="domain">
64746 +<summary>
64747 +Domain allowed access.
64748 +</summary>
64749 +</param>
64750 +</interface>
64751 +<interface name="dnsmasq_manage_runtime_files" lineno="331">
64752 +<summary>
64753 +Create, read, write, and delete
64754 +dnsmasq runtime files
64755 +</summary>
64756 +<param name="domain">
64757 +<summary>
64758 +Domain allowed access.
64759 +</summary>
64760 +</param>
64761 +</interface>
64762 +<interface name="dnsmasq_admin" lineno="357">
64763 <summary>
64764 All of the rules required to
64765 -administrate an dnssec environment.
64766 +administrate an dnsmasq environment.
64767 </summary>
64768 <param name="domain">
64769 <summary>
64770 @@ -95958,7 +96882,7 @@ Domain allowed access.
64771 </interface>
64772 <interface name="exim_read_pid_files" lineno="116">
64773 <summary>
64774 -Read exim pid files.
64775 +Read exim pid files. (Deprecated)
64776 </summary>
64777 <param name="domain">
64778 <summary>
64779 @@ -95966,7 +96890,7 @@ Domain allowed access.
64780 </summary>
64781 </param>
64782 </interface>
64783 -<interface name="exim_read_log" lineno="136">
64784 +<interface name="exim_read_log" lineno="131">
64785 <summary>
64786 Read exim log files.
64787 </summary>
64788 @@ -95977,7 +96901,7 @@ Domain allowed access.
64789 </param>
64790 <rolecap/>
64791 </interface>
64792 -<interface name="exim_append_log" lineno="155">
64793 +<interface name="exim_append_log" lineno="150">
64794 <summary>
64795 Append exim log files.
64796 </summary>
64797 @@ -95987,7 +96911,7 @@ Domain allowed access.
64798 </summary>
64799 </param>
64800 </interface>
64801 -<interface name="exim_manage_log" lineno="176">
64802 +<interface name="exim_manage_log" lineno="171">
64803 <summary>
64804 Create, read, write, and delete
64805 exim log files.
64806 @@ -95999,7 +96923,7 @@ Domain allowed access.
64807 </param>
64808 <rolecap/>
64809 </interface>
64810 -<interface name="exim_manage_spool_dirs" lineno="196">
64811 +<interface name="exim_manage_spool_dirs" lineno="191">
64812 <summary>
64813 Create, read, write, and delete
64814 exim spool directories.
64815 @@ -96010,7 +96934,7 @@ Domain allowed access.
64816 </summary>
64817 </param>
64818 </interface>
64819 -<interface name="exim_read_spool_files" lineno="215">
64820 +<interface name="exim_read_spool_files" lineno="210">
64821 <summary>
64822 Read exim spool files.
64823 </summary>
64824 @@ -96020,7 +96944,7 @@ Domain allowed access.
64825 </summary>
64826 </param>
64827 </interface>
64828 -<interface name="exim_manage_spool_files" lineno="236">
64829 +<interface name="exim_manage_spool_files" lineno="231">
64830 <summary>
64831 Create, read, write, and delete
64832 exim spool files.
64833 @@ -96031,7 +96955,7 @@ Domain allowed access.
64834 </summary>
64835 </param>
64836 </interface>
64837 -<interface name="exim_read_var_lib_files" lineno="255">
64838 +<interface name="exim_read_var_lib_files" lineno="250">
64839 <summary>
64840 Read exim var lib files.
64841 </summary>
64842 @@ -96041,7 +96965,7 @@ Domain allowed access.
64843 </summary>
64844 </param>
64845 </interface>
64846 -<interface name="exim_manage_var_lib_files" lineno="274">
64847 +<interface name="exim_manage_var_lib_files" lineno="269">
64848 <summary>
64849 Create, read, and write exim var lib files.
64850 </summary>
64851 @@ -96051,7 +96975,7 @@ Domain allowed access.
64852 </summary>
64853 </param>
64854 </interface>
64855 -<interface name="exim_admin" lineno="300">
64856 +<interface name="exim_admin" lineno="295">
64857 <summary>
64858 All of the rules required to
64859 administrate an exim environment.
64860 @@ -96222,7 +97146,7 @@ Domain allowed access.
64861 </interface>
64862 <interface name="fail2ban_read_pid_files" lineno="233">
64863 <summary>
64864 -Read fail2ban pid files.
64865 +Read fail2ban pid files. (Deprecated)
64866 </summary>
64867 <param name="domain">
64868 <summary>
64869 @@ -96230,7 +97154,7 @@ Domain allowed access.
64870 </summary>
64871 </param>
64872 </interface>
64873 -<interface name="fail2ban_admin" lineno="259">
64874 +<interface name="fail2ban_admin" lineno="254">
64875 <summary>
64876 All of the rules required to
64877 administrate an fail2ban environment.
64878 @@ -96862,7 +97786,7 @@ Domain allowed access.
64879 </interface>
64880 <interface name="glance_read_pid_files" lineno="192">
64881 <summary>
64882 -Read glance pid files.
64883 +Read glance pid files. (Deprecated)
64884 </summary>
64885 <param name="domain">
64886 <summary>
64887 @@ -96870,10 +97794,10 @@ Domain allowed access.
64888 </summary>
64889 </param>
64890 </interface>
64891 -<interface name="glance_manage_pid_files" lineno="212">
64892 +<interface name="glance_manage_pid_files" lineno="207">
64893 <summary>
64894 Create, read, write, and delete
64895 -glance pid files.
64896 +glance pid files. (Deprecated)
64897 </summary>
64898 <param name="domain">
64899 <summary>
64900 @@ -96881,7 +97805,7 @@ Domain allowed access.
64901 </summary>
64902 </param>
64903 </interface>
64904 -<interface name="glance_admin" lineno="238">
64905 +<interface name="glance_admin" lineno="228">
64906 <summary>
64907 All of the rules required to
64908 administrate an glance environment.
64909 @@ -97148,7 +98072,7 @@ Domain allowed access.
64910 </interface>
64911 <interface name="gssproxy_read_pid_files" lineno="108">
64912 <summary>
64913 -Read gssproxy PID files.
64914 +Read gssproxy PID files. (Deprecated)
64915 </summary>
64916 <param name="domain">
64917 <summary>
64918 @@ -97156,7 +98080,7 @@ Domain allowed access.
64919 </summary>
64920 </param>
64921 </interface>
64922 -<interface name="gssproxy_stream_connect" lineno="128">
64923 +<interface name="gssproxy_stream_connect" lineno="123">
64924 <summary>
64925 Connect to gssproxy over an unix
64926 domain stream socket.
64927 @@ -97167,7 +98091,7 @@ Domain allowed access.
64928 </summary>
64929 </param>
64930 </interface>
64931 -<interface name="gssproxy_admin" lineno="150">
64932 +<interface name="gssproxy_admin" lineno="145">
64933 <summary>
64934 All of the rules required to administrate
64935 an gssproxy environment
64936 @@ -97380,250 +98304,6 @@ Role allowed access.
64937 <rolecap/>
64938 </interface>
64939 </module>
64940 -<module name="hal" filename="policy/modules/services/hal.if">
64941 -<summary>Hardware abstraction layer.</summary>
64942 -<interface name="hal_domtrans" lineno="13">
64943 -<summary>
64944 -Execute hal in the hal domain.
64945 -</summary>
64946 -<param name="domain">
64947 -<summary>
64948 -Domain allowed to transition.
64949 -</summary>
64950 -</param>
64951 -</interface>
64952 -<interface name="hal_getattr" lineno="32">
64953 -<summary>
64954 -Get attributes of hald processes.
64955 -</summary>
64956 -<param name="domain">
64957 -<summary>
64958 -Domain allowed access.
64959 -</summary>
64960 -</param>
64961 -</interface>
64962 -<interface name="hal_read_state" lineno="50">
64963 -<summary>
64964 -Read hal process state files.
64965 -</summary>
64966 -<param name="domain">
64967 -<summary>
64968 -Domain allowed access.
64969 -</summary>
64970 -</param>
64971 -</interface>
64972 -<interface name="hal_ptrace" lineno="68">
64973 -<summary>
64974 -Trace hald processes.
64975 -</summary>
64976 -<param name="domain">
64977 -<summary>
64978 -Domain allowed access.
64979 -</summary>
64980 -</param>
64981 -</interface>
64982 -<interface name="hal_use_fds" lineno="86">
64983 -<summary>
64984 -Inherit and use hald file descriptors.
64985 -</summary>
64986 -<param name="domain">
64987 -<summary>
64988 -Domain allowed access.
64989 -</summary>
64990 -</param>
64991 -</interface>
64992 -<interface name="hal_dontaudit_use_fds" lineno="105">
64993 -<summary>
64994 -Do not audit attempts to inherited
64995 -and use hald file descriptors.
64996 -</summary>
64997 -<param name="domain">
64998 -<summary>
64999 -Domain to not audit.
65000 -</summary>
65001 -</param>
65002 -</interface>
65003 -<interface name="hal_rw_pipes" lineno="123">
65004 -<summary>
65005 -Read and write hald unnamed pipes.
65006 -</summary>
65007 -<param name="domain">
65008 -<summary>
65009 -Domain allowed access.
65010 -</summary>
65011 -</param>
65012 -</interface>
65013 -<interface name="hal_dontaudit_rw_pipes" lineno="142">
65014 -<summary>
65015 -Do not audit attempts to read and
65016 -write hald unnamed pipes.
65017 -</summary>
65018 -<param name="domain">
65019 -<summary>
65020 -Domain to not audit.
65021 -</summary>
65022 -</param>
65023 -</interface>
65024 -<interface name="hal_dgram_send" lineno="161">
65025 -<summary>
65026 -Send to hald over a unix domain
65027 -datagram socket.
65028 -</summary>
65029 -<param name="domain">
65030 -<summary>
65031 -Domain allowed access.
65032 -</summary>
65033 -</param>
65034 -</interface>
65035 -<interface name="hal_stream_connect" lineno="181">
65036 -<summary>
65037 -Send to hald over a unix domain
65038 -stream socket.
65039 -</summary>
65040 -<param name="domain">
65041 -<summary>
65042 -Domain allowed access.
65043 -</summary>
65044 -</param>
65045 -</interface>
65046 -<interface name="hal_dontaudit_rw_dgram_sockets" lineno="201">
65047 -<summary>
65048 -Do not audit attempts to read and
65049 -write hald unix datagram sockets.
65050 -</summary>
65051 -<param name="domain">
65052 -<summary>
65053 -Domain to not audit.
65054 -</summary>
65055 -</param>
65056 -</interface>
65057 -<interface name="hal_dbus_send" lineno="219">
65058 -<summary>
65059 -Send messages to hald over dbus.
65060 -</summary>
65061 -<param name="domain">
65062 -<summary>
65063 -Domain allowed access.
65064 -</summary>
65065 -</param>
65066 -</interface>
65067 -<interface name="hal_dbus_chat" lineno="239">
65068 -<summary>
65069 -Send and receive messages from
65070 -hald over dbus.
65071 -</summary>
65072 -<param name="domain">
65073 -<summary>
65074 -Domain allowed access.
65075 -</summary>
65076 -</param>
65077 -</interface>
65078 -<interface name="hal_domtrans_mac" lineno="259">
65079 -<summary>
65080 -Execute hal mac in the hal mac domain.
65081 -</summary>
65082 -<param name="domain">
65083 -<summary>
65084 -Domain allowed to transition.
65085 -</summary>
65086 -</param>
65087 -</interface>
65088 -<interface name="hal_write_log" lineno="278">
65089 -<summary>
65090 -Write hald log files.
65091 -</summary>
65092 -<param name="domain">
65093 -<summary>
65094 -Domain allowed access.
65095 -</summary>
65096 -</param>
65097 -</interface>
65098 -<interface name="hal_dontaudit_write_log" lineno="298">
65099 -<summary>
65100 -Do not audit attempts to write hald
65101 -log files.
65102 -</summary>
65103 -<param name="domain">
65104 -<summary>
65105 -Domain to not audit.
65106 -</summary>
65107 -</param>
65108 -</interface>
65109 -<interface name="hal_manage_log" lineno="317">
65110 -<summary>
65111 -Create, read, write, and delete
65112 -hald log files.
65113 -</summary>
65114 -<param name="domain">
65115 -<summary>
65116 -Domain allowed access.
65117 -</summary>
65118 -</param>
65119 -</interface>
65120 -<interface name="hal_read_tmp_files" lineno="336">
65121 -<summary>
65122 -Read hald temporary files.
65123 -</summary>
65124 -<param name="domain">
65125 -<summary>
65126 -Domain allowed access.
65127 -</summary>
65128 -</param>
65129 -</interface>
65130 -<interface name="hal_dontaudit_append_lib_files" lineno="356">
65131 -<summary>
65132 -Do not audit attempts to append
65133 -hald libraries files.
65134 -</summary>
65135 -<param name="domain">
65136 -<summary>
65137 -Domain to not audit.
65138 -</summary>
65139 -</param>
65140 -</interface>
65141 -<interface name="hal_read_pid_files" lineno="374">
65142 -<summary>
65143 -Read hald pid files.
65144 -</summary>
65145 -<param name="domain">
65146 -<summary>
65147 -Domain allowed access.
65148 -</summary>
65149 -</param>
65150 -</interface>
65151 -<interface name="hal_rw_pid_files" lineno="393">
65152 -<summary>
65153 -Read and write hald pid files.
65154 -</summary>
65155 -<param name="domain">
65156 -<summary>
65157 -Domain allowed access.
65158 -</summary>
65159 -</param>
65160 -</interface>
65161 -<interface name="hal_manage_pid_dirs" lineno="413">
65162 -<summary>
65163 -Create, read, write, and delete
65164 -hald pid directories.
65165 -</summary>
65166 -<param name="domain">
65167 -<summary>
65168 -Domain allowed access.
65169 -</summary>
65170 -</param>
65171 -</interface>
65172 -<interface name="hal_manage_pid_files" lineno="433">
65173 -<summary>
65174 -Create, read, write, and delete
65175 -hald pid files.
65176 -</summary>
65177 -<param name="domain">
65178 -<summary>
65179 -Domain allowed access.
65180 -</summary>
65181 -</param>
65182 -</interface>
65183 -</module>
65184 <module name="hddtemp" filename="policy/modules/services/hddtemp.if">
65185 <summary>Hard disk temperature tool running as a daemon.</summary>
65186 <interface name="hddtemp_domtrans" lineno="13">
65187 @@ -97778,7 +98458,7 @@ Domain allowed to transition.
65188 </interface>
65189 <interface name="icecast_read_pid_files" lineno="68">
65190 <summary>
65191 -Read icecast pid files.
65192 +Read icecast pid files. (Deprecated)
65193 </summary>
65194 <param name="domain">
65195 <summary>
65196 @@ -97786,7 +98466,7 @@ Domain allowed access.
65197 </summary>
65198 </param>
65199 </interface>
65200 -<interface name="icecast_manage_pid_files" lineno="88">
65201 +<interface name="icecast_manage_pid_files" lineno="83">
65202 <summary>
65203 Create, read, write, and delete
65204 icecast pid files.
65205 @@ -97797,7 +98477,7 @@ Domain allowed access.
65206 </summary>
65207 </param>
65208 </interface>
65209 -<interface name="icecast_read_log" lineno="108">
65210 +<interface name="icecast_read_log" lineno="103">
65211 <summary>
65212 Read icecast log files.
65213 </summary>
65214 @@ -97808,7 +98488,7 @@ Domain allowed access.
65215 </param>
65216 <rolecap/>
65217 </interface>
65218 -<interface name="icecast_append_log" lineno="127">
65219 +<interface name="icecast_append_log" lineno="122">
65220 <summary>
65221 Append icecast log files.
65222 </summary>
65223 @@ -97818,7 +98498,7 @@ Domain allowed access.
65224 </summary>
65225 </param>
65226 </interface>
65227 -<interface name="icecast_manage_log" lineno="147">
65228 +<interface name="icecast_manage_log" lineno="142">
65229 <summary>
65230 Create, read, write, and delete
65231 icecast log files.
65232 @@ -97829,7 +98509,7 @@ Domain allow access.
65233 </summary>
65234 </param>
65235 </interface>
65236 -<interface name="icecast_admin" lineno="173">
65237 +<interface name="icecast_admin" lineno="168">
65238 <summary>
65239 All of the rules required to
65240 administrate an icecast environment.
65241 @@ -97900,7 +98580,7 @@ Domain allowed access.
65242 </interface>
65243 <interface name="ifplugd_read_pid_files" lineno="90">
65244 <summary>
65245 -Read ifplugd pid files.
65246 +Read ifplugd pid files. (Deprecated)
65247 </summary>
65248 <param name="domain">
65249 <summary>
65250 @@ -97908,7 +98588,7 @@ Domain allowed access.
65251 </summary>
65252 </param>
65253 </interface>
65254 -<interface name="ifplugd_admin" lineno="116">
65255 +<interface name="ifplugd_admin" lineno="111">
65256 <summary>
65257 All of the rules required to
65258 administrate an ifplugd environment.
65259 @@ -98089,7 +98769,7 @@ The name of the object being created.
65260 <interface name="inn_manage_pid" lineno="100">
65261 <summary>
65262 Create, read, write, and delete
65263 -innd pid content.
65264 +innd pid content. (Deprecated)
65265 </summary>
65266 <param name="domain">
65267 <summary>
65268 @@ -98097,7 +98777,40 @@ Domain allowed access.
65269 </summary>
65270 </param>
65271 </interface>
65272 -<interface name="inn_read_config" lineno="122">
65273 +<interface name="inn_manage_runtime_dirs" lineno="118">
65274 +<summary>
65275 +Create, read, write, and delete
65276 +innd runtime dirs.
65277 +</summary>
65278 +<param name="domain">
65279 +<summary>
65280 +Domain allowed access.
65281 +</summary>
65282 +</param>
65283 +</interface>
65284 +<interface name="inn_manage_runtime_files" lineno="138">
65285 +<summary>
65286 +Create, read, write, and delete
65287 +innd runtime files.
65288 +</summary>
65289 +<param name="domain">
65290 +<summary>
65291 +Domain allowed access.
65292 +</summary>
65293 +</param>
65294 +</interface>
65295 +<interface name="inn_manage_runtime_sockets" lineno="158">
65296 +<summary>
65297 +Create, read, write, and delete
65298 +innd runtime named sockets.
65299 +</summary>
65300 +<param name="domain">
65301 +<summary>
65302 +Domain allowed access.
65303 +</summary>
65304 +</param>
65305 +</interface>
65306 +<interface name="inn_read_config" lineno="178">
65307 <summary>
65308 Read innd configuration content.
65309 </summary>
65310 @@ -98107,7 +98820,7 @@ Domain allowed access.
65311 </summary>
65312 </param>
65313 </interface>
65314 -<interface name="inn_read_news_lib" lineno="142">
65315 +<interface name="inn_read_news_lib" lineno="198">
65316 <summary>
65317 Read innd news library content.
65318 </summary>
65319 @@ -98117,7 +98830,7 @@ Domain allowed access.
65320 </summary>
65321 </param>
65322 </interface>
65323 -<interface name="inn_read_news_spool" lineno="161">
65324 +<interface name="inn_read_news_spool" lineno="217">
65325 <summary>
65326 Read innd news spool content.
65327 </summary>
65328 @@ -98127,7 +98840,7 @@ Domain allowed access.
65329 </summary>
65330 </param>
65331 </interface>
65332 -<interface name="inn_dgram_send" lineno="181">
65333 +<interface name="inn_dgram_send" lineno="237">
65334 <summary>
65335 Send to a innd unix dgram socket.
65336 </summary>
65337 @@ -98137,7 +98850,7 @@ Domain allowed access.
65338 </summary>
65339 </param>
65340 </interface>
65341 -<interface name="inn_domtrans" lineno="200">
65342 +<interface name="inn_domtrans" lineno="256">
65343 <summary>
65344 Execute innd in the innd domain.
65345 </summary>
65346 @@ -98147,7 +98860,7 @@ Domain allowed to transition.
65347 </summary>
65348 </param>
65349 </interface>
65350 -<interface name="inn_admin" lineno="226">
65351 +<interface name="inn_admin" lineno="282">
65352 <summary>
65353 All of the rules required to
65354 administrate an inn environment.
65355 @@ -98321,7 +99034,7 @@ Domain allowed access.
65356 </summary>
65357 </param>
65358 </interface>
65359 -<interface name="kerberos_read_config" lineno="109">
65360 +<interface name="kerberos_read_config" lineno="108">
65361 <summary>
65362 Read kerberos configuration files.
65363 </summary>
65364 @@ -98332,7 +99045,7 @@ Domain allowed access.
65365 </param>
65366 <rolecap/>
65367 </interface>
65368 -<interface name="kerberos_dontaudit_write_config" lineno="132">
65369 +<interface name="kerberos_dontaudit_write_config" lineno="131">
65370 <summary>
65371 Do not audit attempts to write
65372 kerberos configuration files.
65373 @@ -98343,7 +99056,7 @@ Domain to not audit.
65374 </summary>
65375 </param>
65376 </interface>
65377 -<interface name="kerberos_rw_config" lineno="152">
65378 +<interface name="kerberos_rw_config" lineno="151">
65379 <summary>
65380 Read and write kerberos
65381 configuration files.
65382 @@ -98355,7 +99068,7 @@ Domain allowed access.
65383 </param>
65384 <rolecap/>
65385 </interface>
65386 -<interface name="kerberos_manage_krb5_home_files" lineno="172">
65387 +<interface name="kerberos_manage_krb5_home_files" lineno="171">
65388 <summary>
65389 Create, read, write, and delete
65390 kerberos home files.
65391 @@ -98366,7 +99079,7 @@ Domain allowed access.
65392 </summary>
65393 </param>
65394 </interface>
65395 -<interface name="kerberos_relabel_krb5_home_files" lineno="191">
65396 +<interface name="kerberos_relabel_krb5_home_files" lineno="190">
65397 <summary>
65398 Relabel kerberos home files.
65399 </summary>
65400 @@ -98376,7 +99089,7 @@ Domain allowed access.
65401 </summary>
65402 </param>
65403 </interface>
65404 -<interface name="kerberos_home_filetrans_krb5_home" lineno="221">
65405 +<interface name="kerberos_home_filetrans_krb5_home" lineno="220">
65406 <summary>
65407 Create objects in user home
65408 directories with the krb5 home type.
65409 @@ -98397,7 +99110,7 @@ The name of the object being created.
65410 </summary>
65411 </param>
65412 </interface>
65413 -<interface name="kerberos_read_keytab" lineno="240">
65414 +<interface name="kerberos_read_keytab" lineno="239">
65415 <summary>
65416 Read kerberos key table files.
65417 </summary>
65418 @@ -98408,7 +99121,7 @@ Domain allowed access.
65419 </param>
65420 <rolecap/>
65421 </interface>
65422 -<interface name="kerberos_rw_keytab" lineno="259">
65423 +<interface name="kerberos_rw_keytab" lineno="258">
65424 <summary>
65425 Read and write kerberos key table files.
65426 </summary>
65427 @@ -98418,7 +99131,7 @@ Domain allowed access.
65428 </summary>
65429 </param>
65430 </interface>
65431 -<interface name="kerberos_manage_keytab_files" lineno="279">
65432 +<interface name="kerberos_manage_keytab_files" lineno="278">
65433 <summary>
65434 Create, read, write, and delete
65435 kerberos key table files.
65436 @@ -98429,7 +99142,7 @@ Domain allowed access.
65437 </summary>
65438 </param>
65439 </interface>
65440 -<interface name="kerberos_etc_filetrans_keytab" lineno="310">
65441 +<interface name="kerberos_etc_filetrans_keytab" lineno="309">
65442 <summary>
65443 Create specified objects in generic
65444 etc directories with the kerberos
65445 @@ -98451,7 +99164,7 @@ The name of the object being created.
65446 </summary>
65447 </param>
65448 </interface>
65449 -<interface name="kerberos_read_kdc_config" lineno="329">
65450 +<interface name="kerberos_read_kdc_config" lineno="328">
65451 <summary>
65452 Read kerberos kdc configuration files.
65453 </summary>
65454 @@ -98462,7 +99175,7 @@ Domain allowed access.
65455 </param>
65456 <rolecap/>
65457 </interface>
65458 -<interface name="kerberos_manage_host_rcache" lineno="350">
65459 +<interface name="kerberos_manage_host_rcache" lineno="349">
65460 <summary>
65461 Create, read, write, and delete
65462 kerberos host rcache files.
65463 @@ -98474,7 +99187,7 @@ Domain allowed access.
65464 </param>
65465 <rolecap/>
65466 </interface>
65467 -<interface name="kerberos_tmp_filetrans_host_rcache" lineno="391">
65468 +<interface name="kerberos_tmp_filetrans_host_rcache" lineno="390">
65469 <summary>
65470 Create objects in generic temporary
65471 directories with the kerberos host
65472 @@ -98496,7 +99209,7 @@ The name of the object being created.
65473 </summary>
65474 </param>
65475 </interface>
65476 -<interface name="kerberos_connect_524" lineno="409">
65477 +<interface name="kerberos_connect_524" lineno="408">
65478 <summary>
65479 Connect to krb524 service.
65480 </summary>
65481 @@ -98506,7 +99219,7 @@ Domain allowed access.
65482 </summary>
65483 </param>
65484 </interface>
65485 -<interface name="kerberos_admin" lineno="439">
65486 +<interface name="kerberos_admin" lineno="437">
65487 <summary>
65488 All of the rules required to
65489 administrate an kerberos environment.
65490 @@ -98595,19 +99308,6 @@ Role allowed access.
65491 <rolecap/>
65492 </interface>
65493 </module>
65494 -<module name="keyboardd" filename="policy/modules/services/keyboardd.if">
65495 -<summary>Xorg.conf keyboard layout callout.</summary>
65496 -<interface name="keyboardd_read_pipes" lineno="13">
65497 -<summary>
65498 -Read keyboardd unnamed pipes.
65499 -</summary>
65500 -<param name="domain">
65501 -<summary>
65502 -Domain allowed access.
65503 -</summary>
65504 -</param>
65505 -</interface>
65506 -</module>
65507 <module name="keystone" filename="policy/modules/services/keystone.if">
65508 <summary>Python implementation of the OpenStack identity service API.</summary>
65509 <interface name="keystone_admin" lineno="20">
65510 @@ -99078,7 +99778,7 @@ Domain allowed access.
65511 </param>
65512 <rolecap/>
65513 </interface>
65514 -<template name="lpd_domtrans_lpr" lineno="203">
65515 +<interface name="lpd_domtrans_lpr" lineno="203">
65516 <summary>
65517 Transition to a user lpr domain.
65518 </summary>
65519 @@ -99087,7 +99787,7 @@ Transition to a user lpr domain.
65520 Domain allowed to transition.
65521 </summary>
65522 </param>
65523 -</template>
65524 +</interface>
65525 <interface name="lpd_run_lpr" lineno="229">
65526 <summary>
65527 Execute lpr in the lpr domain, and
65528 @@ -99200,7 +99900,7 @@ Execute mailman in the caller domain.
65529 </summary>
65530 <param name="domain">
65531 <summary>
65532 -Domain allowd access.
65533 +Domain allowed access.
65534 </summary>
65535 </param>
65536 </interface>
65537 @@ -99306,7 +100006,7 @@ Domain allowed access.
65538 </summary>
65539 </param>
65540 </interface>
65541 -<interface name="mailman_domtrans_queue" lineno="336">
65542 +<interface name="mailman_domtrans_queue" lineno="337">
65543 <summary>
65544 Execute mailman_queue in the
65545 mailman_queue domain.
65546 @@ -99377,7 +100077,7 @@ Domain allowed to transition.
65547 <interface name="memcached_manage_pid_files" lineno="33">
65548 <summary>
65549 Create, read, write, and delete
65550 -memcached pid files.
65551 +memcached pid files. (Deprecated)
65552 </summary>
65553 <param name="domain">
65554 <summary>
65555 @@ -99385,9 +100085,9 @@ Domain allowed access.
65556 </summary>
65557 </param>
65558 </interface>
65559 -<interface name="memcached_read_pid_files" lineno="52">
65560 +<interface name="memcached_read_pid_files" lineno="48">
65561 <summary>
65562 -Read memcached pid files.
65563 +Read memcached pid files. (Deprecated)
65564 </summary>
65565 <param name="domain">
65566 <summary>
65567 @@ -99395,7 +100095,18 @@ Domain allowed access.
65568 </summary>
65569 </param>
65570 </interface>
65571 -<interface name="memcached_stream_connect" lineno="72">
65572 +<interface name="memcached_manage_runtime_files" lineno="63">
65573 +<summary>
65574 +Create, read, write, and delete
65575 +memcached runtime files.
65576 +</summary>
65577 +<param name="domain">
65578 +<summary>
65579 +Domain allowed access.
65580 +</summary>
65581 +</param>
65582 +</interface>
65583 +<interface name="memcached_stream_connect" lineno="83">
65584 <summary>
65585 Connect to memcached using a unix
65586 domain stream socket.
65587 @@ -99406,7 +100117,7 @@ Domain allowed access.
65588 </summary>
65589 </param>
65590 </interface>
65591 -<interface name="memcached_tcp_connect" lineno="91">
65592 +<interface name="memcached_tcp_connect" lineno="102">
65593 <summary>
65594 Connect to memcache over the network.
65595 </summary>
65596 @@ -99416,7 +100127,7 @@ Domain allowed access.
65597 </summary>
65598 </param>
65599 </interface>
65600 -<interface name="memcached_admin" lineno="118">
65601 +<interface name="memcached_admin" lineno="129">
65602 <summary>
65603 All of the rules required to
65604 administrate an memcached environment.
65605 @@ -99434,6 +100145,9 @@ Role allowed access.
65606 <rolecap/>
65607 </interface>
65608 </module>
65609 +<module name="memlockd" filename="policy/modules/services/memlockd.if">
65610 +<summary>memory lock daemon, keeps important files in RAM.</summary>
65611 +</module>
65612 <module name="milter" filename="policy/modules/services/milter.if">
65613 <summary>Milter mail filters.</summary>
65614 <template name="milter_template" lineno="13">
65615 @@ -100062,7 +100776,7 @@ Domain allowed access.
65616 </summary>
65617 </param>
65618 </interface>
65619 -<interface name="mta_home_filetrans_mail_home_rw" lineno="279">
65620 +<interface name="mta_home_filetrans_mail_home_rw" lineno="280">
65621 <summary>
65622 Create specified objects in user home
65623 directories with the generic mail
65624 @@ -100084,7 +100798,7 @@ The name of the object being created.
65625 </summary>
65626 </param>
65627 </interface>
65628 -<interface name="mta_system_content" lineno="297">
65629 +<interface name="mta_system_content" lineno="298">
65630 <summary>
65631 Make the specified type by a system MTA.
65632 </summary>
65633 @@ -100094,7 +100808,7 @@ Type to be used as a mail client.
65634 </summary>
65635 </param>
65636 </interface>
65637 -<interface name="mta_sendmail_mailserver" lineno="330">
65638 +<interface name="mta_sendmail_mailserver" lineno="331">
65639 <summary>
65640 Modified mailserver interface for
65641 sendmail daemon use.
65642 @@ -100119,7 +100833,7 @@ The type to be used for the mail server.
65643 </summary>
65644 </param>
65645 </interface>
65646 -<interface name="mta_use_mailserver_fds" lineno="351">
65647 +<interface name="mta_use_mailserver_fds" lineno="352">
65648 <summary>
65649 Inherit FDs from mailserver_domain domains
65650 </summary>
65651 @@ -100129,7 +100843,7 @@ Type for a list server or delivery agent that inherits fds
65652 </summary>
65653 </param>
65654 </interface>
65655 -<interface name="mta_mailserver_sender" lineno="370">
65656 +<interface name="mta_mailserver_sender" lineno="371">
65657 <summary>
65658 Make a type a mailserver type used
65659 for sending mail.
65660 @@ -100140,7 +100854,7 @@ Mail server domain type used for sending mail.
65661 </summary>
65662 </param>
65663 </interface>
65664 -<interface name="mta_mailserver_delivery" lineno="389">
65665 +<interface name="mta_mailserver_delivery" lineno="390">
65666 <summary>
65667 Make a type a mailserver type used
65668 for delivering mail to local users.
65669 @@ -100151,7 +100865,7 @@ Mail server domain type used for delivering mail.
65670 </summary>
65671 </param>
65672 </interface>
65673 -<interface name="mta_mailserver_user_agent" lineno="409">
65674 +<interface name="mta_mailserver_user_agent" lineno="410">
65675 <summary>
65676 Make a type a mailserver type used
65677 for sending mail on behalf of local
65678 @@ -100163,7 +100877,7 @@ Mail server domain type used for sending local mail.
65679 </summary>
65680 </param>
65681 </interface>
65682 -<interface name="mta_send_mail" lineno="427">
65683 +<interface name="mta_send_mail" lineno="428">
65684 <summary>
65685 Send mail from the system.
65686 </summary>
65687 @@ -100173,7 +100887,7 @@ Domain allowed to transition.
65688 </summary>
65689 </param>
65690 </interface>
65691 -<interface name="mta_sendmail_domtrans" lineno="472">
65692 +<interface name="mta_sendmail_domtrans" lineno="473">
65693 <summary>
65694 Execute send mail in a specified domain.
65695 </summary>
65696 @@ -100198,7 +100912,7 @@ Domain to transition to.
65697 </summary>
65698 </param>
65699 </interface>
65700 -<interface name="mta_signal_system_mail" lineno="494">
65701 +<interface name="mta_signal_system_mail" lineno="495">
65702 <summary>
65703 Send signals to system mail.
65704 </summary>
65705 @@ -100208,7 +100922,7 @@ Domain allowed access.
65706 </summary>
65707 </param>
65708 </interface>
65709 -<interface name="mta_kill_system_mail" lineno="512">
65710 +<interface name="mta_kill_system_mail" lineno="513">
65711 <summary>
65712 Send kill signals to system mail.
65713 </summary>
65714 @@ -100218,7 +100932,7 @@ Domain allowed access.
65715 </summary>
65716 </param>
65717 </interface>
65718 -<interface name="mta_sendmail_exec" lineno="530">
65719 +<interface name="mta_sendmail_exec" lineno="531">
65720 <summary>
65721 Execute sendmail in the caller domain.
65722 </summary>
65723 @@ -100228,7 +100942,7 @@ Domain allowed access.
65724 </summary>
65725 </param>
65726 </interface>
65727 -<interface name="mta_sendmail_entry_point" lineno="550">
65728 +<interface name="mta_sendmail_entry_point" lineno="551">
65729 <summary>
65730 Make sendmail usable as an entry
65731 point for the domain.
65732 @@ -100239,7 +100953,7 @@ Domain to be entered.
65733 </summary>
65734 </param>
65735 </interface>
65736 -<interface name="mta_read_config" lineno="569">
65737 +<interface name="mta_read_config" lineno="570">
65738 <summary>
65739 Read mail server configuration content.
65740 </summary>
65741 @@ -100250,7 +100964,7 @@ Domain allowed access.
65742 </param>
65743 <rolecap/>
65744 </interface>
65745 -<interface name="mta_write_config" lineno="591">
65746 +<interface name="mta_write_config" lineno="592">
65747 <summary>
65748 Write mail server configuration files.
65749 </summary>
65750 @@ -100261,7 +100975,7 @@ Domain allowed access.
65751 </param>
65752 <rolecap/>
65753 </interface>
65754 -<interface name="mta_read_aliases" lineno="610">
65755 +<interface name="mta_read_aliases" lineno="611">
65756 <summary>
65757 Read mail address alias files.
65758 </summary>
65759 @@ -100271,7 +100985,7 @@ Domain allowed access.
65760 </summary>
65761 </param>
65762 </interface>
65763 -<interface name="mta_map_aliases" lineno="638">
65764 +<interface name="mta_map_aliases" lineno="639">
65765 <summary>
65766 Read mail address alias files.
65767 </summary>
65768 @@ -100281,7 +100995,7 @@ Domain allowed access.
65769 </summary>
65770 </param>
65771 </interface>
65772 -<interface name="mta_manage_aliases" lineno="657">
65773 +<interface name="mta_manage_aliases" lineno="658">
65774 <summary>
65775 Create, read, write, and delete
65776 mail address alias content.
65777 @@ -100292,7 +101006,7 @@ Domain allowed access.
65778 </summary>
65779 </param>
65780 </interface>
65781 -<interface name="mta_etc_filetrans_aliases" lineno="699">
65782 +<interface name="mta_etc_filetrans_aliases" lineno="700">
65783 <summary>
65784 Create specified object in generic
65785 etc directories with the mail address
65786 @@ -100314,7 +101028,7 @@ The name of the object being created.
65787 </summary>
65788 </param>
65789 </interface>
65790 -<interface name="mta_spec_filetrans_aliases" lineno="734">
65791 +<interface name="mta_spec_filetrans_aliases" lineno="735">
65792 <summary>
65793 Create specified objects in specified
65794 directories with a type transition to
65795 @@ -100341,7 +101055,7 @@ The name of the object being created.
65796 </summary>
65797 </param>
65798 </interface>
65799 -<interface name="mta_rw_aliases" lineno="753">
65800 +<interface name="mta_rw_aliases" lineno="754">
65801 <summary>
65802 Read and write mail alias files.
65803 </summary>
65804 @@ -100352,7 +101066,7 @@ Domain allowed access.
65805 </param>
65806 <rolecap/>
65807 </interface>
65808 -<interface name="mta_dontaudit_rw_delivery_tcp_sockets" lineno="783">
65809 +<interface name="mta_dontaudit_rw_delivery_tcp_sockets" lineno="784">
65810 <summary>
65811 Do not audit attempts to read
65812 and write TCP sockets of mail
65813 @@ -100364,7 +101078,7 @@ Domain to not audit.
65814 </summary>
65815 </param>
65816 </interface>
65817 -<interface name="mta_dontaudit_read_spool_symlinks" lineno="802">
65818 +<interface name="mta_dontaudit_read_spool_symlinks" lineno="803">
65819 <summary>
65820 Do not audit attempts to read
65821 mail spool symlinks.
65822 @@ -100375,7 +101089,7 @@ Domain to not audit.
65823 </summary>
65824 </param>
65825 </interface>
65826 -<interface name="mta_getattr_spool" lineno="820">
65827 +<interface name="mta_getattr_spool" lineno="821">
65828 <summary>
65829 Get attributes of mail spool content.
65830 </summary>
65831 @@ -100385,7 +101099,7 @@ Domain allowed access.
65832 </summary>
65833 </param>
65834 </interface>
65835 -<interface name="mta_dontaudit_getattr_spool_files" lineno="842">
65836 +<interface name="mta_dontaudit_getattr_spool_files" lineno="843">
65837 <summary>
65838 Do not audit attempts to get
65839 attributes of mail spool files.
65840 @@ -100396,7 +101110,7 @@ Domain to not audit.
65841 </summary>
65842 </param>
65843 </interface>
65844 -<interface name="mta_spool_filetrans" lineno="880">
65845 +<interface name="mta_spool_filetrans" lineno="881">
65846 <summary>
65847 Create specified objects in the
65848 mail spool directory with a
65849 @@ -100423,7 +101137,7 @@ The name of the object being created.
65850 </summary>
65851 </param>
65852 </interface>
65853 -<interface name="mta_read_spool_files" lineno="899">
65854 +<interface name="mta_read_spool_files" lineno="900">
65855 <summary>
65856 Read mail spool files.
65857 </summary>
65858 @@ -100433,7 +101147,7 @@ Domain allowed access.
65859 </summary>
65860 </param>
65861 </interface>
65862 -<interface name="mta_rw_spool" lineno="918">
65863 +<interface name="mta_rw_spool" lineno="920">
65864 <summary>
65865 Read and write mail spool files.
65866 </summary>
65867 @@ -100443,7 +101157,7 @@ Domain allowed access.
65868 </summary>
65869 </param>
65870 </interface>
65871 -<interface name="mta_append_spool" lineno="939">
65872 +<interface name="mta_append_spool" lineno="941">
65873 <summary>
65874 Create, read, and write mail spool files.
65875 </summary>
65876 @@ -100453,7 +101167,7 @@ Domain allowed access.
65877 </summary>
65878 </param>
65879 </interface>
65880 -<interface name="mta_delete_spool" lineno="960">
65881 +<interface name="mta_delete_spool" lineno="962">
65882 <summary>
65883 Delete mail spool files.
65884 </summary>
65885 @@ -100463,7 +101177,7 @@ Domain allowed access.
65886 </summary>
65887 </param>
65888 </interface>
65889 -<interface name="mta_manage_spool" lineno="980">
65890 +<interface name="mta_manage_spool" lineno="982">
65891 <summary>
65892 Create, read, write, and delete
65893 mail spool content.
65894 @@ -100474,7 +101188,7 @@ Domain allowed access.
65895 </summary>
65896 </param>
65897 </interface>
65898 -<interface name="mta_queue_filetrans" lineno="1018">
65899 +<interface name="mta_queue_filetrans" lineno="1021">
65900 <summary>
65901 Create specified objects in the
65902 mail queue spool directory with a
65903 @@ -100501,7 +101215,7 @@ The name of the object being created.
65904 </summary>
65905 </param>
65906 </interface>
65907 -<interface name="mta_search_queue" lineno="1037">
65908 +<interface name="mta_search_queue" lineno="1040">
65909 <summary>
65910 Search mail queue directories.
65911 </summary>
65912 @@ -100511,7 +101225,7 @@ Domain allowed access.
65913 </summary>
65914 </param>
65915 </interface>
65916 -<interface name="mta_list_queue" lineno="1056">
65917 +<interface name="mta_list_queue" lineno="1059">
65918 <summary>
65919 List mail queue directories.
65920 </summary>
65921 @@ -100521,7 +101235,7 @@ Domain allowed access.
65922 </summary>
65923 </param>
65924 </interface>
65925 -<interface name="mta_read_queue" lineno="1075">
65926 +<interface name="mta_read_queue" lineno="1078">
65927 <summary>
65928 Read mail queue files.
65929 </summary>
65930 @@ -100531,7 +101245,7 @@ Domain allowed access.
65931 </summary>
65932 </param>
65933 </interface>
65934 -<interface name="mta_dontaudit_rw_queue" lineno="1095">
65935 +<interface name="mta_dontaudit_rw_queue" lineno="1098">
65936 <summary>
65937 Do not audit attempts to read and
65938 write mail queue content.
65939 @@ -100542,7 +101256,7 @@ Domain to not audit.
65940 </summary>
65941 </param>
65942 </interface>
65943 -<interface name="mta_manage_queue" lineno="1115">
65944 +<interface name="mta_manage_queue" lineno="1118">
65945 <summary>
65946 Create, read, write, and delete
65947 mail queue content.
65948 @@ -100553,7 +101267,7 @@ Domain allowed access.
65949 </summary>
65950 </param>
65951 </interface>
65952 -<interface name="mta_read_sendmail_bin" lineno="1135">
65953 +<interface name="mta_read_sendmail_bin" lineno="1138">
65954 <summary>
65955 Read sendmail binary.
65956 </summary>
65957 @@ -100563,7 +101277,7 @@ Domain allowed access.
65958 </summary>
65959 </param>
65960 </interface>
65961 -<interface name="mta_rw_user_mail_stream_sockets" lineno="1154">
65962 +<interface name="mta_rw_user_mail_stream_sockets" lineno="1157">
65963 <summary>
65964 Read and write unix domain stream
65965 sockets of all base mail domains.
65966 @@ -100866,7 +101580,7 @@ Domain allowed to transition.
65967 </interface>
65968 <interface name="mysql_read_pid_files" lineno="361">
65969 <summary>
65970 -Read mysqld pid files.
65971 +Read mysqld pid files. (Deprecated)
65972 </summary>
65973 <param name="domain">
65974 <summary>
65975 @@ -100874,9 +101588,9 @@ Domain allowed access.
65976 </summary>
65977 </param>
65978 </interface>
65979 -<interface name="mysql_search_pid_files" lineno="381">
65980 +<interface name="mysql_search_pid_files" lineno="376">
65981 <summary>
65982 -Search mysqld pid files.
65983 +Search mysqld pid files. (Deprecated)
65984 </summary>
65985 <param name="domain">
65986 <summary>
65987 @@ -100885,7 +101599,7 @@ Domain allowed access.
65988 </param>
65989
65990 </interface>
65991 -<interface name="mysql_admin" lineno="407">
65992 +<interface name="mysql_admin" lineno="397">
65993 <summary>
65994 All of the rules required to
65995 administrate an mysqld environment.
65996 @@ -100902,7 +101616,7 @@ Role allowed access.
65997 </param>
65998 <rolecap/>
65999 </interface>
66000 -<interface name="mysql_setattr_run_dirs" lineno="449">
66001 +<interface name="mysql_setattr_run_dirs" lineno="439">
66002 <summary>
66003 Set the attributes of the MySQL run directories
66004 </summary>
66005 @@ -100912,7 +101626,7 @@ Domain allowed access
66006 </summary>
66007 </param>
66008 </interface>
66009 -<interface name="mysql_create_run_dirs" lineno="467">
66010 +<interface name="mysql_create_run_dirs" lineno="457">
66011 <summary>
66012 Create MySQL run directories
66013 </summary>
66014 @@ -100922,7 +101636,7 @@ Domain allowed access
66015 </summary>
66016 </param>
66017 </interface>
66018 -<interface name="mysql_generic_run_filetrans_run" lineno="498">
66019 +<interface name="mysql_generic_run_filetrans_run" lineno="488">
66020 <summary>
66021 Automatically use the MySQL run label for created resources in generic
66022 run locations. This method is deprecated in favor of the
66023 @@ -101183,7 +101897,17 @@ Domain allowed access.
66024 </summary>
66025 </param>
66026 </interface>
66027 -<interface name="networkmanager_read_etc_files" lineno="184">
66028 +<interface name="networkmanager_watch_etc_dirs" lineno="184">
66029 +<summary>
66030 +Watch networkmanager etc dirs.
66031 +</summary>
66032 +<param name="domain">
66033 +<summary>
66034 +Domain allowed access.
66035 +</summary>
66036 +</param>
66037 +</interface>
66038 +<interface name="networkmanager_read_etc_files" lineno="202">
66039 <summary>
66040 Read networkmanager etc files.
66041 </summary>
66042 @@ -101193,7 +101917,7 @@ Domain allowed access.
66043 </summary>
66044 </param>
66045 </interface>
66046 -<interface name="networkmanager_manage_lib_files" lineno="205">
66047 +<interface name="networkmanager_manage_lib_files" lineno="223">
66048 <summary>
66049 Create, read, and write
66050 networkmanager library files.
66051 @@ -101204,7 +101928,7 @@ Domain allowed access.
66052 </summary>
66053 </param>
66054 </interface>
66055 -<interface name="networkmanager_read_lib_files" lineno="225">
66056 +<interface name="networkmanager_read_lib_files" lineno="243">
66057 <summary>
66058 Read networkmanager lib files.
66059 </summary>
66060 @@ -101214,7 +101938,7 @@ Domain allowed access.
66061 </summary>
66062 </param>
66063 </interface>
66064 -<interface name="networkmanager_append_log_files" lineno="246">
66065 +<interface name="networkmanager_append_log_files" lineno="264">
66066 <summary>
66067 Append networkmanager log files.
66068 </summary>
66069 @@ -101224,9 +101948,9 @@ Domain allowed access.
66070 </summary>
66071 </param>
66072 </interface>
66073 -<interface name="networkmanager_read_pid_files" lineno="266">
66074 +<interface name="networkmanager_read_pid_files" lineno="284">
66075 <summary>
66076 -Read networkmanager pid files.
66077 +Read networkmanager pid files. (Deprecated)
66078 </summary>
66079 <param name="domain">
66080 <summary>
66081 @@ -101234,7 +101958,17 @@ Domain allowed access.
66082 </summary>
66083 </param>
66084 </interface>
66085 -<interface name="networkmanager_stream_connect" lineno="287">
66086 +<interface name="networkmanager_read_runtime_files" lineno="299">
66087 +<summary>
66088 +Read networkmanager runtime files.
66089 +</summary>
66090 +<param name="domain">
66091 +<summary>
66092 +Domain allowed access.
66093 +</summary>
66094 +</param>
66095 +</interface>
66096 +<interface name="networkmanager_stream_connect" lineno="319">
66097 <summary>
66098 Connect to networkmanager over
66099 a unix domain stream socket.
66100 @@ -101245,7 +101979,7 @@ Domain allowed access.
66101 </summary>
66102 </param>
66103 </interface>
66104 -<interface name="networkmanager_enabledisable" lineno="306">
66105 +<interface name="networkmanager_enabledisable" lineno="338">
66106 <summary>
66107 Allow specified domain to enable/disable NetworkManager units
66108 </summary>
66109 @@ -101255,7 +101989,7 @@ Domain allowed access.
66110 </summary>
66111 </param>
66112 </interface>
66113 -<interface name="networkmanager_startstop" lineno="325">
66114 +<interface name="networkmanager_startstop" lineno="357">
66115 <summary>
66116 Allow specified domain to start/stop NetworkManager units
66117 </summary>
66118 @@ -101265,7 +101999,7 @@ Domain allowed access.
66119 </summary>
66120 </param>
66121 </interface>
66122 -<interface name="networkmanager_status" lineno="344">
66123 +<interface name="networkmanager_status" lineno="376">
66124 <summary>
66125 Allow specified domain to get status of NetworkManager
66126 </summary>
66127 @@ -101275,7 +102009,7 @@ Domain allowed access.
66128 </summary>
66129 </param>
66130 </interface>
66131 -<interface name="networkmanager_admin" lineno="370">
66132 +<interface name="networkmanager_admin" lineno="402">
66133 <summary>
66134 All of the rules required to
66135 administrate an networkmanager environment.
66136 @@ -101292,7 +102026,7 @@ Role allowed access.
66137 </param>
66138 <rolecap/>
66139 </interface>
66140 -<interface name="networkmanager_dontaudit_use_wpa_cli_fds" lineno="409">
66141 +<interface name="networkmanager_dontaudit_use_wpa_cli_fds" lineno="441">
66142 <summary>
66143 Do not audit use of wpa_cli file descriptors
66144 </summary>
66145 @@ -101302,7 +102036,7 @@ Domain to dontaudit access.
66146 </summary>
66147 </param>
66148 </interface>
66149 -<interface name="networkmanager_domtrans_wpa_cli" lineno="428">
66150 +<interface name="networkmanager_domtrans_wpa_cli" lineno="460">
66151 <summary>
66152 Execute wpa_cli in the wpa_cli domain.
66153 </summary>
66154 @@ -101312,7 +102046,7 @@ Domain allowed to transition.
66155 </summary>
66156 </param>
66157 </interface>
66158 -<interface name="networkmanager_run_wpa_cli" lineno="454">
66159 +<interface name="networkmanager_run_wpa_cli" lineno="486">
66160 <summary>
66161 Execute wpa cli in the wpa_cli domain, and
66162 allow the specified role the wpa_cli domain.
66163 @@ -101329,7 +102063,7 @@ Role allowed access.
66164 </param>
66165 <rolecap/>
66166 </interface>
66167 -<interface name="networkmanager_rw_rawip_sockets" lineno="475">
66168 +<interface name="networkmanager_rw_rawip_sockets" lineno="507">
66169 <summary>
66170 Read and write networkmanager rawip sockets.
66171 </summary>
66172 @@ -101365,7 +102099,7 @@ Domain allowed access.
66173 </summary>
66174 </param>
66175 </interface>
66176 -<interface name="nis_use_ypbind" lineno="88">
66177 +<interface name="nis_use_ypbind" lineno="87">
66178 <summary>
66179 Use the ypbind service to access NIS services.
66180 </summary>
66181 @@ -101373,7 +102107,7 @@ Use the ypbind service to access NIS services.
66182 <p>
66183 Allow the specified domain to use the ypbind service
66184 to access Network Information Service (NIS) services.
66185 -Information that can be retreived from NIS includes
66186 +Information that can be retrieved from NIS includes
66187 usernames, passwords, home directories, and groups.
66188 If the network is configured to have a single sign-on
66189 using NIS, it is likely that any program that does
66190 @@ -101388,7 +102122,7 @@ Domain allowed access.
66191 <infoflow type="both" weight="10"/>
66192 <rolecap/>
66193 </interface>
66194 -<interface name="nis_authenticate" lineno="105">
66195 +<interface name="nis_authenticate" lineno="104">
66196 <summary>
66197 Use nis to authenticate passwords.
66198 </summary>
66199 @@ -101399,7 +102133,7 @@ Domain allowed access.
66200 </param>
66201 <rolecap/>
66202 </interface>
66203 -<interface name="nis_domtrans_ypbind" lineno="123">
66204 +<interface name="nis_domtrans_ypbind" lineno="122">
66205 <summary>
66206 Execute ypbind in the ypbind domain.
66207 </summary>
66208 @@ -101409,7 +102143,7 @@ Domain allowed to transition.
66209 </summary>
66210 </param>
66211 </interface>
66212 -<interface name="nis_exec_ypbind" lineno="142">
66213 +<interface name="nis_exec_ypbind" lineno="141">
66214 <summary>
66215 Execute ypbind in the caller domain.
66216 </summary>
66217 @@ -101419,7 +102153,7 @@ Domain allowed access.
66218 </summary>
66219 </param>
66220 </interface>
66221 -<interface name="nis_run_ypbind" lineno="168">
66222 +<interface name="nis_run_ypbind" lineno="167">
66223 <summary>
66224 Execute ypbind in the ypbind domain, and
66225 allow the specified role the ypbind domain.
66226 @@ -101436,7 +102170,7 @@ Role allowed access.
66227 </param>
66228 <rolecap/>
66229 </interface>
66230 -<interface name="nis_signal_ypbind" lineno="187">
66231 +<interface name="nis_signal_ypbind" lineno="186">
66232 <summary>
66233 Send generic signals to ypbind.
66234 </summary>
66235 @@ -101446,7 +102180,7 @@ Domain allowed access.
66236 </summary>
66237 </param>
66238 </interface>
66239 -<interface name="nis_list_var_yp" lineno="205">
66240 +<interface name="nis_list_var_yp" lineno="204">
66241 <summary>
66242 List nis data directories.
66243 </summary>
66244 @@ -101456,9 +102190,9 @@ Domain allowed access.
66245 </summary>
66246 </param>
66247 </interface>
66248 -<interface name="nis_read_ypbind_pid" lineno="224">
66249 +<interface name="nis_read_ypbind_pid" lineno="223">
66250 <summary>
66251 -Read ypbind pid files.
66252 +Read ypbind pid files. (Deprecated)
66253 </summary>
66254 <param name="domain">
66255 <summary>
66256 @@ -101466,9 +102200,9 @@ Domain allowed access.
66257 </summary>
66258 </param>
66259 </interface>
66260 -<interface name="nis_delete_ypbind_pid" lineno="243">
66261 +<interface name="nis_read_ypbind_runtime_files" lineno="238">
66262 <summary>
66263 -Delete ypbind pid files.
66264 +Read ypbind runtime files.
66265 </summary>
66266 <param name="domain">
66267 <summary>
66268 @@ -101476,7 +102210,17 @@ Domain allowed access.
66269 </summary>
66270 </param>
66271 </interface>
66272 -<interface name="nis_read_ypserv_config" lineno="261">
66273 +<interface name="nis_delete_ypbind_pid" lineno="257">
66274 +<summary>
66275 +Delete ypbind pid files. (Deprecated)
66276 +</summary>
66277 +<param name="domain">
66278 +<summary>
66279 +Domain allowed access.
66280 +</summary>
66281 +</param>
66282 +</interface>
66283 +<interface name="nis_read_ypserv_config" lineno="271">
66284 <summary>
66285 Read ypserv configuration files.
66286 </summary>
66287 @@ -101486,7 +102230,7 @@ Domain allowed access.
66288 </summary>
66289 </param>
66290 </interface>
66291 -<interface name="nis_domtrans_ypxfr" lineno="280">
66292 +<interface name="nis_domtrans_ypxfr" lineno="290">
66293 <summary>
66294 Execute ypxfr in the ypxfr domain.
66295 </summary>
66296 @@ -101496,7 +102240,7 @@ Domain allowed to transition.
66297 </summary>
66298 </param>
66299 </interface>
66300 -<interface name="nis_initrc_domtrans" lineno="301">
66301 +<interface name="nis_initrc_domtrans" lineno="311">
66302 <summary>
66303 Execute nis init scripts in
66304 the init script domain.
66305 @@ -101507,7 +102251,7 @@ Domain allowed to transition.
66306 </summary>
66307 </param>
66308 </interface>
66309 -<interface name="nis_initrc_domtrans_ypbind" lineno="320">
66310 +<interface name="nis_initrc_domtrans_ypbind" lineno="330">
66311 <summary>
66312 Execute ypbind init scripts in
66313 the init script domain.
66314 @@ -101518,7 +102262,7 @@ Domain allowed to transition.
66315 </summary>
66316 </param>
66317 </interface>
66318 -<interface name="nis_admin" lineno="345">
66319 +<interface name="nis_admin" lineno="355">
66320 <summary>
66321 All of the rules required to
66322 administrate an nis environment.
66323 @@ -101624,7 +102368,7 @@ Domain allowed access.
66324 <interface name="nscd_dontaudit_search_pid" lineno="186">
66325 <summary>
66326 Do not audit attempts to search
66327 -nscd pid directories.
66328 +nscd pid directories. (Deprecated)
66329 </summary>
66330 <param name="domain">
66331 <summary>
66332 @@ -101632,9 +102376,9 @@ Domain to not audit.
66333 </summary>
66334 </param>
66335 </interface>
66336 -<interface name="nscd_read_pid" lineno="204">
66337 +<interface name="nscd_read_pid" lineno="201">
66338 <summary>
66339 -Read nscd pid files.
66340 +Read nscd pid files. (Deprecated)
66341 </summary>
66342 <param name="domain">
66343 <summary>
66344 @@ -101642,7 +102386,28 @@ Domain allowed access.
66345 </summary>
66346 </param>
66347 </interface>
66348 -<interface name="nscd_unconfined" lineno="223">
66349 +<interface name="nscd_dontaudit_search_runtime" lineno="217">
66350 +<summary>
66351 +Do not audit attempts to search
66352 +nscd runtime directories.
66353 +</summary>
66354 +<param name="domain">
66355 +<summary>
66356 +Domain to not audit.
66357 +</summary>
66358 +</param>
66359 +</interface>
66360 +<interface name="nscd_read_runtime_files" lineno="235">
66361 +<summary>
66362 +Read nscd runtime files.
66363 +</summary>
66364 +<param name="domain">
66365 +<summary>
66366 +Domain allowed access.
66367 +</summary>
66368 +</param>
66369 +</interface>
66370 +<interface name="nscd_unconfined" lineno="254">
66371 <summary>
66372 Unconfined access to nscd services.
66373 </summary>
66374 @@ -101652,7 +102417,7 @@ Domain allowed access.
66375 </summary>
66376 </param>
66377 </interface>
66378 -<interface name="nscd_run" lineno="248">
66379 +<interface name="nscd_run" lineno="279">
66380 <summary>
66381 Execute nscd in the nscd domain, and
66382 allow the specified role the nscd domain.
66383 @@ -101668,7 +102433,7 @@ Role allowed access.
66384 </summary>
66385 </param>
66386 </interface>
66387 -<interface name="nscd_initrc_domtrans" lineno="268">
66388 +<interface name="nscd_initrc_domtrans" lineno="299">
66389 <summary>
66390 Execute the nscd server init
66391 script in the initrc domain.
66392 @@ -101679,7 +102444,7 @@ Domain allowed to transition.
66393 </summary>
66394 </param>
66395 </interface>
66396 -<interface name="nscd_admin" lineno="293">
66397 +<interface name="nscd_admin" lineno="324">
66398 <summary>
66399 All of the rules required to
66400 administrate an nscd environment.
66401 @@ -101749,7 +102514,7 @@ Domain allowed to transition.
66402 </interface>
66403 <interface name="nslcd_read_pid_files" lineno="50">
66404 <summary>
66405 -Read nslcd pid files.
66406 +Read nslcd pid files. (Deprecated)
66407 </summary>
66408 <param name="domain">
66409 <summary>
66410 @@ -101757,7 +102522,7 @@ Domain allowed access.
66411 </summary>
66412 </param>
66413 </interface>
66414 -<interface name="nslcd_stream_connect" lineno="70">
66415 +<interface name="nslcd_stream_connect" lineno="65">
66416 <summary>
66417 Connect to nslcd over an unix
66418 domain stream socket.
66419 @@ -101768,7 +102533,7 @@ Domain allowed access.
66420 </summary>
66421 </param>
66422 </interface>
66423 -<interface name="nslcd_admin" lineno="96">
66424 +<interface name="nslcd_admin" lineno="91">
66425 <summary>
66426 All of the rules required to
66427 administrate an nslcd environment.
66428 @@ -102175,7 +102940,7 @@ Domain allowed to transition.
66429 <interface name="oddjob_system_entry" lineno="38">
66430 <summary>
66431 Make the specified program domain
66432 -accessable from the oddjob.
66433 +accessible from the oddjob.
66434 </summary>
66435 <param name="domain">
66436 <summary>
66437 @@ -102401,7 +103166,17 @@ Domain allowed to transition.
66438 </interface>
66439 <interface name="openct_read_pid_files" lineno="69">
66440 <summary>
66441 -Read openct pid files.
66442 +Read openct pid files. (Deprecated)
66443 +</summary>
66444 +<param name="domain">
66445 +<summary>
66446 +Domain allowed access.
66447 +</summary>
66448 +</param>
66449 +</interface>
66450 +<interface name="openct_read_runtime_files" lineno="84">
66451 +<summary>
66452 +Read openct runtime files.
66453 </summary>
66454 <param name="domain">
66455 <summary>
66456 @@ -102409,7 +103184,7 @@ Domain allowed access.
66457 </summary>
66458 </param>
66459 </interface>
66460 -<interface name="openct_stream_connect" lineno="89">
66461 +<interface name="openct_stream_connect" lineno="104">
66462 <summary>
66463 Connect to openct over an unix
66464 domain stream socket.
66465 @@ -102420,7 +103195,7 @@ Domain allowed access.
66466 </summary>
66467 </param>
66468 </interface>
66469 -<interface name="openct_admin" lineno="115">
66470 +<interface name="openct_admin" lineno="130">
66471 <summary>
66472 All of the rules required to
66473 administrate an openct environment.
66474 @@ -102578,7 +103353,17 @@ Domain allowed to transition.
66475 </interface>
66476 <interface name="openvswitch_read_pid_files" lineno="32">
66477 <summary>
66478 -Read openvswitch pid files.
66479 +Read openvswitch pid files. (Deprecated)
66480 +</summary>
66481 +<param name="domain">
66482 +<summary>
66483 +Domain allowed access.
66484 +</summary>
66485 +</param>
66486 +</interface>
66487 +<interface name="openvswitch_read_runtime_files" lineno="47">
66488 +<summary>
66489 +Read openvswitch runtime files.
66490 </summary>
66491 <param name="domain">
66492 <summary>
66493 @@ -102586,7 +103371,7 @@ Domain allowed access.
66494 </summary>
66495 </param>
66496 </interface>
66497 -<interface name="openvswitch_admin" lineno="58">
66498 +<interface name="openvswitch_admin" lineno="73">
66499 <summary>
66500 All of the rules required to
66501 administrate an openvswitch environment.
66502 @@ -102623,6 +103408,13 @@ Role allowed access.
66503 </param>
66504 <rolecap/>
66505 </interface>
66506 +<tunable name="pacemaker_startstop_all_services" dftval="false">
66507 +<desc>
66508 +<p>
66509 +Allow pacemaker to start/stop services
66510 +</p>
66511 +</desc>
66512 +</tunable>
66513 </module>
66514 <module name="pads" filename="policy/modules/services/pads.if">
66515 <summary>Passive Asset Detection System.</summary>
66516 @@ -102658,7 +103450,7 @@ Domain allowed to transition.
66517 </interface>
66518 <interface name="pcscd_read_pid_files" lineno="32">
66519 <summary>
66520 -Read pcscd pid files.
66521 +Read pcscd pid files. (Deprecated)
66522 </summary>
66523 <param name="domain">
66524 <summary>
66525 @@ -102666,7 +103458,17 @@ Domain allowed access.
66526 </summary>
66527 </param>
66528 </interface>
66529 -<interface name="pcscd_stream_connect" lineno="52">
66530 +<interface name="pcscd_read_runtime_files" lineno="47">
66531 +<summary>
66532 +Read pcscd runtime files.
66533 +</summary>
66534 +<param name="domain">
66535 +<summary>
66536 +Domain allowed access.
66537 +</summary>
66538 +</param>
66539 +</interface>
66540 +<interface name="pcscd_stream_connect" lineno="67">
66541 <summary>
66542 Connect to pcscd over an unix
66543 domain stream socket.
66544 @@ -102677,7 +103479,7 @@ Domain allowed access.
66545 </summary>
66546 </param>
66547 </interface>
66548 -<interface name="pcscd_admin" lineno="81">
66549 +<interface name="pcscd_admin" lineno="96">
66550 <summary>
66551 All of the rules required to
66552 administrate an pcscd environment.
66553 @@ -102933,7 +103735,7 @@ Domain allowed access.
66554 </interface>
66555 <interface name="plymouthd_read_pid_files" lineno="244">
66556 <summary>
66557 -Read plymouthd pid files.
66558 +Read plymouthd pid files. (Deprecated)
66559 </summary>
66560 <param name="domain">
66561 <summary>
66562 @@ -102941,9 +103743,9 @@ Domain allowed access.
66563 </summary>
66564 </param>
66565 </interface>
66566 -<interface name="plymouthd_delete_pid_files" lineno="264">
66567 +<interface name="plymouthd_delete_pid_files" lineno="259">
66568 <summary>
66569 -Delete the plymouthd pid files.
66570 +Delete the plymouthd pid files. (Deprecated)
66571 </summary>
66572 <param name="domain">
66573 <summary>
66574 @@ -102951,7 +103753,27 @@ Domain allowed access.
66575 </summary>
66576 </param>
66577 </interface>
66578 -<interface name="plymouthd_admin" lineno="290">
66579 +<interface name="plymouthd_read_runtime_files" lineno="274">
66580 +<summary>
66581 +Read plymouthd runtime files.
66582 +</summary>
66583 +<param name="domain">
66584 +<summary>
66585 +Domain allowed access.
66586 +</summary>
66587 +</param>
66588 +</interface>
66589 +<interface name="plymouthd_delete_runtime_files" lineno="293">
66590 +<summary>
66591 +Delete the plymouthd runtime files.
66592 +</summary>
66593 +<param name="domain">
66594 +<summary>
66595 +Domain allowed access.
66596 +</summary>
66597 +</param>
66598 +</interface>
66599 +<interface name="plymouthd_admin" lineno="319">
66600 <summary>
66601 All of the rules required to
66602 administrate an plymouthd environment.
66603 @@ -104263,7 +105085,7 @@ Domain allowed access.
66604 </interface>
66605 <interface name="ppp_read_pid_files" lineno="366">
66606 <summary>
66607 -Read ppp pid files.
66608 +Read ppp pid files. (Deprecated)
66609 </summary>
66610 <param name="domain">
66611 <summary>
66612 @@ -104271,10 +105093,10 @@ Domain allowed access.
66613 </summary>
66614 </param>
66615 </interface>
66616 -<interface name="ppp_manage_pid_files" lineno="386">
66617 +<interface name="ppp_manage_pid_files" lineno="382">
66618 <summary>
66619 Create, read, write, and delete
66620 -ppp pid files.
66621 +ppp pid files. (Deprecated)
66622 </summary>
66623 <param name="domain">
66624 <summary>
66625 @@ -104282,9 +105104,51 @@ Domain allowed access.
66626 </summary>
66627 </param>
66628 </interface>
66629 -<interface name="ppp_pid_filetrans" lineno="416">
66630 +<interface name="ppp_pid_filetrans" lineno="408">
66631 <summary>
66632 Create specified pppd pid objects
66633 +with a type transition. (Deprecated)
66634 +</summary>
66635 +<param name="domain">
66636 +<summary>
66637 +Domain allowed access.
66638 +</summary>
66639 +</param>
66640 +<param name="object_class">
66641 +<summary>
66642 +Class of the object being created.
66643 +</summary>
66644 +</param>
66645 +<param name="name" optional="true">
66646 +<summary>
66647 +The name of the object being created.
66648 +</summary>
66649 +</param>
66650 +</interface>
66651 +<interface name="ppp_read_runtime_files" lineno="423">
66652 +<summary>
66653 +Read ppp runtime files.
66654 +</summary>
66655 +<param name="domain">
66656 +<summary>
66657 +Domain allowed access.
66658 +</summary>
66659 +</param>
66660 +</interface>
66661 +<interface name="ppp_manage_runtime_files" lineno="443">
66662 +<summary>
66663 +Create, read, write, and delete
66664 +ppp runtime files.
66665 +</summary>
66666 +<param name="domain">
66667 +<summary>
66668 +Domain allowed access.
66669 +</summary>
66670 +</param>
66671 +</interface>
66672 +<interface name="ppp_runtime_filetrans" lineno="473">
66673 +<summary>
66674 +Create specified pppd runtime objects
66675 with a type transition.
66676 </summary>
66677 <param name="domain">
66678 @@ -104303,7 +105167,7 @@ The name of the object being created.
66679 </summary>
66680 </param>
66681 </interface>
66682 -<interface name="ppp_initrc_domtrans" lineno="435">
66683 +<interface name="ppp_initrc_domtrans" lineno="492">
66684 <summary>
66685 Execute pppd init script in
66686 the initrc domain.
66687 @@ -104314,7 +105178,7 @@ Domain allowed to transition.
66688 </summary>
66689 </param>
66690 </interface>
66691 -<interface name="ppp_admin" lineno="460">
66692 +<interface name="ppp_admin" lineno="517">
66693 <summary>
66694 All of the rules required to
66695 administrate an ppp environment.
66696 @@ -104608,7 +105472,7 @@ Domain allowed access.
66697 </interface>
66698 <interface name="psad_read_pid_files" lineno="111">
66699 <summary>
66700 -Read psad pid files.
66701 +Read psad pid files. (Deprecated)
66702 </summary>
66703 <param name="domain">
66704 <summary>
66705 @@ -104616,9 +105480,9 @@ Domain allowed access.
66706 </summary>
66707 </param>
66708 </interface>
66709 -<interface name="psad_rw_pid_files" lineno="130">
66710 +<interface name="psad_rw_pid_files" lineno="125">
66711 <summary>
66712 -Read and write psad pid files.
66713 +Read and write psad pid files. (Deprecated)
66714 </summary>
66715 <param name="domain">
66716 <summary>
66717 @@ -104626,7 +105490,7 @@ Domain allowed access.
66718 </summary>
66719 </param>
66720 </interface>
66721 -<interface name="psad_read_log" lineno="150">
66722 +<interface name="psad_read_log" lineno="140">
66723 <summary>
66724 Read psad log content.
66725 </summary>
66726 @@ -104637,7 +105501,7 @@ Domain allowed access.
66727 </param>
66728 <rolecap/>
66729 </interface>
66730 -<interface name="psad_append_log" lineno="171">
66731 +<interface name="psad_append_log" lineno="161">
66732 <summary>
66733 Append psad log files.
66734 </summary>
66735 @@ -104648,7 +105512,7 @@ Domain allowed access.
66736 </param>
66737 <rolecap/>
66738 </interface>
66739 -<interface name="psad_rw_fifo_file" lineno="190">
66740 +<interface name="psad_rw_fifo_file" lineno="180">
66741 <summary>
66742 Read and write psad fifo files.
66743 </summary>
66744 @@ -104658,7 +105522,7 @@ Domain allowed access.
66745 </summary>
66746 </param>
66747 </interface>
66748 -<interface name="psad_rw_tmp_files" lineno="209">
66749 +<interface name="psad_rw_tmp_files" lineno="199">
66750 <summary>
66751 Read and write psad temporary files.
66752 </summary>
66753 @@ -104668,7 +105532,7 @@ Domain allowed access.
66754 </summary>
66755 </param>
66756 </interface>
66757 -<interface name="psad_admin" lineno="235">
66758 +<interface name="psad_admin" lineno="225">
66759 <summary>
66760 All of the rules required to
66761 administrate an psad environment.
66762 @@ -104949,7 +105813,7 @@ Domain allowed to transition.
66763 </interface>
66764 <interface name="qpidd_read_pid_files" lineno="87">
66765 <summary>
66766 -Read qpidd pid files.
66767 +Read qpidd pid files. (Deprecated)
66768 </summary>
66769 <param name="domain">
66770 <summary>
66771 @@ -104957,7 +105821,7 @@ Domain allowed access.
66772 </summary>
66773 </param>
66774 </interface>
66775 -<interface name="qpidd_search_lib" lineno="106">
66776 +<interface name="qpidd_search_lib" lineno="101">
66777 <summary>
66778 Search qpidd lib directories.
66779 </summary>
66780 @@ -104967,7 +105831,7 @@ Domain allowed access.
66781 </summary>
66782 </param>
66783 </interface>
66784 -<interface name="qpidd_read_lib_files" lineno="125">
66785 +<interface name="qpidd_read_lib_files" lineno="120">
66786 <summary>
66787 Read qpidd lib files.
66788 </summary>
66789 @@ -104977,7 +105841,7 @@ Domain allowed access.
66790 </summary>
66791 </param>
66792 </interface>
66793 -<interface name="qpidd_manage_lib_files" lineno="145">
66794 +<interface name="qpidd_manage_lib_files" lineno="140">
66795 <summary>
66796 Create, read, write, and delete
66797 qpidd lib files.
66798 @@ -104988,7 +105852,7 @@ Domain allowed access.
66799 </summary>
66800 </param>
66801 </interface>
66802 -<interface name="qpidd_admin" lineno="171">
66803 +<interface name="qpidd_admin" lineno="166">
66804 <summary>
66805 All of the rules required to
66806 administrate an qpidd environment.
66807 @@ -105603,123 +106467,6 @@ Determine whether fenced can use ssh.
66808 </desc>
66809 </tunable>
66810 </module>
66811 -<module name="rhgb" filename="policy/modules/services/rhgb.if">
66812 -<summary> Red Hat Graphical Boot.</summary>
66813 -<interface name="rhgb_stub" lineno="13">
66814 -<summary>
66815 -RHGB stub interface. No access allowed.
66816 -</summary>
66817 -<param name="domain" unused="true">
66818 -<summary>
66819 -N/A
66820 -</summary>
66821 -</param>
66822 -</interface>
66823 -<interface name="rhgb_use_fds" lineno="29">
66824 -<summary>
66825 -Inherit and use rhgb file descriptors.
66826 -</summary>
66827 -<param name="domain">
66828 -<summary>
66829 -Domain allowed access.
66830 -</summary>
66831 -</param>
66832 -</interface>
66833 -<interface name="rhgb_getpgid" lineno="47">
66834 -<summary>
66835 -Get the process group of rhgb.
66836 -</summary>
66837 -<param name="domain">
66838 -<summary>
66839 -Domain allowed access.
66840 -</summary>
66841 -</param>
66842 -</interface>
66843 -<interface name="rhgb_signal" lineno="65">
66844 -<summary>
66845 -Send generic signals to rhgb.
66846 -</summary>
66847 -<param name="domain">
66848 -<summary>
66849 -Domain allowed access.
66850 -</summary>
66851 -</param>
66852 -</interface>
66853 -<interface name="rhgb_rw_stream_sockets" lineno="84">
66854 -<summary>
66855 -Read and write inherited rhgb unix
66856 -domain stream sockets.
66857 -</summary>
66858 -<param name="domain">
66859 -<summary>
66860 -Domain allowed access.
66861 -</summary>
66862 -</param>
66863 -</interface>
66864 -<interface name="rhgb_dontaudit_rw_stream_sockets" lineno="103">
66865 -<summary>
66866 -Do not audit attempts to read and write
66867 -rhgb unix domain stream sockets.
66868 -</summary>
66869 -<param name="domain">
66870 -<summary>
66871 -Domain to not audit.
66872 -</summary>
66873 -</param>
66874 -</interface>
66875 -<interface name="rhgb_stream_connect" lineno="122">
66876 -<summary>
66877 -Connected to rhgb with a unix
66878 -domain stream socket.
66879 -</summary>
66880 -<param name="domain">
66881 -<summary>
66882 -Domain allowed access.
66883 -</summary>
66884 -</param>
66885 -</interface>
66886 -<interface name="rhgb_rw_shm" lineno="141">
66887 -<summary>
66888 -Read and write to rhgb shared memory.
66889 -</summary>
66890 -<param name="domain">
66891 -<summary>
66892 -Domain allowed access.
66893 -</summary>
66894 -</param>
66895 -</interface>
66896 -<interface name="rhgb_use_ptys" lineno="159">
66897 -<summary>
66898 -Read and write rhgb pty devices.
66899 -</summary>
66900 -<param name="domain">
66901 -<summary>
66902 -Domain allowed access.
66903 -</summary>
66904 -</param>
66905 -</interface>
66906 -<interface name="rhgb_dontaudit_use_ptys" lineno="179">
66907 -<summary>
66908 -Do not audit attempts to read and
66909 -write rhgb pty devices.
66910 -</summary>
66911 -<param name="domain">
66912 -<summary>
66913 -Domain to not audit.
66914 -</summary>
66915 -</param>
66916 -</interface>
66917 -<interface name="rhgb_rw_tmpfs_files" lineno="197">
66918 -<summary>
66919 -Read and write to rhgb tmpfs files.
66920 -</summary>
66921 -<param name="domain">
66922 -<summary>
66923 -Domain allowed access.
66924 -</summary>
66925 -</param>
66926 -</interface>
66927 -</module>
66928 <module name="rhsmcertd" filename="policy/modules/services/rhsmcertd.if">
66929 <summary>Subscription Management Certificate Daemon.</summary>
66930 <interface name="rhsmcertd_domtrans" lineno="13">
66931 @@ -105819,7 +106566,7 @@ Domain allowed access.
66932 </interface>
66933 <interface name="rhsmcertd_read_pid_files" lineno="190">
66934 <summary>
66935 -Read rhsmcertd pid files.
66936 +Read rhsmcertd pid files. (Deprecated)
66937 </summary>
66938 <param name="domain">
66939 <summary>
66940 @@ -105827,7 +106574,7 @@ Domain allowed access.
66941 </summary>
66942 </param>
66943 </interface>
66944 -<interface name="rhsmcertd_stream_connect" lineno="210">
66945 +<interface name="rhsmcertd_stream_connect" lineno="205">
66946 <summary>
66947 Connect to rhsmcertd with a
66948 unix domain stream socket.
66949 @@ -105838,7 +106585,7 @@ Domain allowed access.
66950 </summary>
66951 </param>
66952 </interface>
66953 -<interface name="rhsmcertd_dbus_chat" lineno="230">
66954 +<interface name="rhsmcertd_dbus_chat" lineno="225">
66955 <summary>
66956 Send and receive messages from
66957 rhsmcertd over dbus.
66958 @@ -105849,7 +106596,7 @@ Domain allowed access.
66959 </summary>
66960 </param>
66961 </interface>
66962 -<interface name="rhsmcertd_dontaudit_dbus_chat" lineno="252">
66963 +<interface name="rhsmcertd_dontaudit_dbus_chat" lineno="247">
66964 <summary>
66965 Do not audit attempts to send
66966 and receive messages from
66967 @@ -105861,7 +106608,7 @@ Domain to not audit.
66968 </summary>
66969 </param>
66970 </interface>
66971 -<interface name="rhsmcertd_admin" lineno="279">
66972 +<interface name="rhsmcertd_admin" lineno="274">
66973 <summary>
66974 All of the rules required to
66975 administrate an rhsmcertd environment.
66976 @@ -105916,7 +106663,7 @@ Domain to not audit.
66977 <interface name="ricci_dontaudit_rw_modcluster_pipes" lineno="72">
66978 <summary>
66979 Do not audit attempts to read write
66980 -ricci modcluster unamed pipes.
66981 +ricci modcluster unnamed pipes.
66982 </summary>
66983 <param name="domain">
66984 <summary>
66985 @@ -106103,26 +106850,6 @@ Role allowed access.
66986 <rolecap/>
66987 </interface>
66988 </module>
66989 -<module name="roundup" filename="policy/modules/services/roundup.if">
66990 -<summary>Roundup Issue Tracking System.</summary>
66991 -<interface name="roundup_admin" lineno="20">
66992 -<summary>
66993 -All of the rules required to
66994 -administrate an roundup environment.
66995 -</summary>
66996 -<param name="domain">
66997 -<summary>
66998 -Domain allowed access.
66999 -</summary>
67000 -</param>
67001 -<param name="role">
67002 -<summary>
67003 -Role allowed access.
67004 -</summary>
67005 -</param>
67006 -<rolecap/>
67007 -</interface>
67008 -</module>
67009 <module name="rpc" filename="policy/modules/services/rpc.if">
67010 <summary>Remote Procedure Call Daemon.</summary>
67011 <interface name="rpc_stub" lineno="13">
67012 @@ -106373,7 +107100,7 @@ Domain allowed access.
67013 </interface>
67014 <interface name="rpcbind_read_pid_files" lineno="52">
67015 <summary>
67016 -Read rpcbind pid files.
67017 +Read rpcbind pid files. (Deprecated)
67018 </summary>
67019 <param name="domain">
67020 <summary>
67021 @@ -106381,7 +107108,7 @@ Domain allowed access.
67022 </summary>
67023 </param>
67024 </interface>
67025 -<interface name="rpcbind_search_lib" lineno="71">
67026 +<interface name="rpcbind_search_lib" lineno="66">
67027 <summary>
67028 Search rpcbind lib directories.
67029 </summary>
67030 @@ -106391,7 +107118,7 @@ Domain allowed access.
67031 </summary>
67032 </param>
67033 </interface>
67034 -<interface name="rpcbind_read_lib_files" lineno="90">
67035 +<interface name="rpcbind_read_lib_files" lineno="85">
67036 <summary>
67037 Read rpcbind lib files.
67038 </summary>
67039 @@ -106401,7 +107128,7 @@ Domain allowed access.
67040 </summary>
67041 </param>
67042 </interface>
67043 -<interface name="rpcbind_manage_lib_files" lineno="110">
67044 +<interface name="rpcbind_manage_lib_files" lineno="105">
67045 <summary>
67046 Create, read, write, and delete
67047 rpcbind lib files.
67048 @@ -106412,7 +107139,7 @@ Domain allowed access.
67049 </summary>
67050 </param>
67051 </interface>
67052 -<interface name="rpcbind_signull" lineno="129">
67053 +<interface name="rpcbind_signull" lineno="124">
67054 <summary>
67055 Send null signals to rpcbind.
67056 </summary>
67057 @@ -106422,7 +107149,7 @@ Domain allowed access.
67058 </summary>
67059 </param>
67060 </interface>
67061 -<interface name="rpcbind_admin" lineno="154">
67062 +<interface name="rpcbind_admin" lineno="149">
67063 <summary>
67064 All of the rules required to
67065 administrate an rpcbind environment.
67066 @@ -106990,7 +107717,47 @@ Domain allowed access.
67067 </summary>
67068 </param>
67069 </interface>
67070 -<interface name="samba_search_var" lineno="341">
67071 +<interface name="samba_start" lineno="341">
67072 +<summary>
67073 +start samba daemon
67074 +</summary>
67075 +<param name="domain">
67076 +<summary>
67077 +Domain allowed access.
67078 +</summary>
67079 +</param>
67080 +</interface>
67081 +<interface name="samba_stop" lineno="361">
67082 +<summary>
67083 +stop samba daemon
67084 +</summary>
67085 +<param name="domain">
67086 +<summary>
67087 +Domain allowed access.
67088 +</summary>
67089 +</param>
67090 +</interface>
67091 +<interface name="samba_status" lineno="381">
67092 +<summary>
67093 +get status of samba daemon
67094 +</summary>
67095 +<param name="domain">
67096 +<summary>
67097 +Domain allowed access.
67098 +</summary>
67099 +</param>
67100 +</interface>
67101 +<interface name="samba_reload" lineno="401">
67102 +<summary>
67103 +reload samba daemon
67104 +</summary>
67105 +<param name="domain">
67106 +<summary>
67107 +Domain allowed access.
67108 +</summary>
67109 +</param>
67110 +</interface>
67111 +<interface name="samba_search_var" lineno="421">
67112 <summary>
67113 Search samba var directories.
67114 </summary>
67115 @@ -107000,7 +107767,7 @@ Domain allowed access.
67116 </summary>
67117 </param>
67118 </interface>
67119 -<interface name="samba_read_var_files" lineno="360">
67120 +<interface name="samba_read_var_files" lineno="440">
67121 <summary>
67122 Read samba var files.
67123 </summary>
67124 @@ -107010,7 +107777,7 @@ Domain allowed access.
67125 </summary>
67126 </param>
67127 </interface>
67128 -<interface name="samba_dontaudit_write_var_files" lineno="380">
67129 +<interface name="samba_dontaudit_write_var_files" lineno="460">
67130 <summary>
67131 Do not audit attempts to write
67132 samba var files.
67133 @@ -107021,7 +107788,7 @@ Domain to not audit.
67134 </summary>
67135 </param>
67136 </interface>
67137 -<interface name="samba_rw_var_files" lineno="398">
67138 +<interface name="samba_rw_var_files" lineno="478">
67139 <summary>
67140 Read and write samba var files.
67141 </summary>
67142 @@ -107031,7 +107798,7 @@ Domain allowed access.
67143 </summary>
67144 </param>
67145 </interface>
67146 -<interface name="samba_manage_var_files" lineno="418">
67147 +<interface name="samba_manage_var_files" lineno="498">
67148 <summary>
67149 Create, read, write, and delete
67150 samba var files.
67151 @@ -107042,7 +107809,7 @@ Domain allowed access.
67152 </summary>
67153 </param>
67154 </interface>
67155 -<interface name="samba_domtrans_smbcontrol" lineno="437">
67156 +<interface name="samba_domtrans_smbcontrol" lineno="517">
67157 <summary>
67158 Execute smbcontrol in the smbcontrol domain.
67159 </summary>
67160 @@ -107052,7 +107819,7 @@ Domain allowed to transition.
67161 </summary>
67162 </param>
67163 </interface>
67164 -<interface name="samba_run_smbcontrol" lineno="463">
67165 +<interface name="samba_run_smbcontrol" lineno="543">
67166 <summary>
67167 Execute smbcontrol in the smbcontrol
67168 domain, and allow the specified
67169 @@ -107069,7 +107836,7 @@ Role allowed access.
67170 </summary>
67171 </param>
67172 </interface>
67173 -<interface name="samba_domtrans_smbd" lineno="482">
67174 +<interface name="samba_domtrans_smbd" lineno="562">
67175 <summary>
67176 Execute smbd in the smbd domain.
67177 </summary>
67178 @@ -107079,7 +107846,7 @@ Domain allowed to transition.
67179 </summary>
67180 </param>
67181 </interface>
67182 -<interface name="samba_signal_smbd" lineno="501">
67183 +<interface name="samba_signal_smbd" lineno="581">
67184 <summary>
67185 Send generic signals to smbd.
67186 </summary>
67187 @@ -107089,7 +107856,7 @@ Domain allowed access.
67188 </summary>
67189 </param>
67190 </interface>
67191 -<interface name="samba_dontaudit_use_fds" lineno="519">
67192 +<interface name="samba_dontaudit_use_fds" lineno="599">
67193 <summary>
67194 Do not audit attempts to inherit
67195 and use smbd file descriptors.
67196 @@ -107100,7 +107867,7 @@ Domain to not audit.
67197 </summary>
67198 </param>
67199 </interface>
67200 -<interface name="samba_write_smbmount_tcp_sockets" lineno="537">
67201 +<interface name="samba_write_smbmount_tcp_sockets" lineno="617">
67202 <summary>
67203 Write smbmount tcp sockets.
67204 </summary>
67205 @@ -107110,7 +107877,7 @@ Domain allowed access.
67206 </summary>
67207 </param>
67208 </interface>
67209 -<interface name="samba_rw_smbmount_tcp_sockets" lineno="555">
67210 +<interface name="samba_rw_smbmount_tcp_sockets" lineno="635">
67211 <summary>
67212 Read and write smbmount tcp sockets.
67213 </summary>
67214 @@ -107120,7 +107887,7 @@ Domain allowed access.
67215 </summary>
67216 </param>
67217 </interface>
67218 -<interface name="samba_domtrans_winbind_helper" lineno="574">
67219 +<interface name="samba_domtrans_winbind_helper" lineno="654">
67220 <summary>
67221 Execute winbind helper in the
67222 winbind helper domain.
67223 @@ -107131,7 +107898,7 @@ Domain allowed to transition.
67224 </summary>
67225 </param>
67226 </interface>
67227 -<interface name="samba_getattr_winbind_exec" lineno="593">
67228 +<interface name="samba_getattr_winbind_exec" lineno="673">
67229 <summary>
67230 Get attributes of winbind executable files.
67231 </summary>
67232 @@ -107141,7 +107908,7 @@ Domain allowed access.
67233 </summary>
67234 </param>
67235 </interface>
67236 -<interface name="samba_run_winbind_helper" lineno="619">
67237 +<interface name="samba_run_winbind_helper" lineno="699">
67238 <summary>
67239 Execute winbind helper in the winbind
67240 helper domain, and allow the specified
67241 @@ -107159,9 +107926,19 @@ Role allowed access.
67242 </param>
67243 <rolecap/>
67244 </interface>
67245 -<interface name="samba_read_winbind_pid" lineno="638">
67246 +<interface name="samba_read_winbind_pid" lineno="718">
67247 +<summary>
67248 +Read winbind pid files. (Deprecated)
67249 +</summary>
67250 +<param name="domain">
67251 +<summary>
67252 +Domain allowed access.
67253 +</summary>
67254 +</param>
67255 +</interface>
67256 +<interface name="samba_read_winbind_runtime_files" lineno="733">
67257 <summary>
67258 -Read winbind pid files.
67259 +Read winbind runtime files.
67260 </summary>
67261 <param name="domain">
67262 <summary>
67263 @@ -107169,7 +107946,7 @@ Domain allowed access.
67264 </summary>
67265 </param>
67266 </interface>
67267 -<interface name="samba_stream_connect_winbind" lineno="658">
67268 +<interface name="samba_stream_connect_winbind" lineno="753">
67269 <summary>
67270 Connect to winbind with a unix
67271 domain stream socket.
67272 @@ -107180,7 +107957,7 @@ Domain allowed access.
67273 </summary>
67274 </param>
67275 </interface>
67276 -<interface name="samba_admin" lineno="684">
67277 +<interface name="samba_admin" lineno="779">
67278 <summary>
67279 All of the rules required to
67280 administrate an samba environment.
67281 @@ -107315,7 +108092,7 @@ Domain allowed to transition.
67282 <interface name="sanlock_manage_pid_files" lineno="52">
67283 <summary>
67284 Create, read, write, and delete
67285 -sanlock pid files.
67286 +sanlock pid files. (Deprecated)
67287 </summary>
67288 <param name="domain">
67289 <summary>
67290 @@ -107323,7 +108100,7 @@ Domain allowed access.
67291 </summary>
67292 </param>
67293 </interface>
67294 -<interface name="sanlock_stream_connect" lineno="72">
67295 +<interface name="sanlock_stream_connect" lineno="67">
67296 <summary>
67297 Connect to sanlock with a unix
67298 domain stream socket.
67299 @@ -107334,7 +108111,7 @@ Domain allowed access.
67300 </summary>
67301 </param>
67302 </interface>
67303 -<interface name="sanlock_admin" lineno="98">
67304 +<interface name="sanlock_admin" lineno="93">
67305 <summary>
67306 All of the rules required to
67307 administrate an sanlock environment.
67308 @@ -107718,7 +108495,7 @@ Role allowed access.
67309 </interface>
67310 </module>
67311 <module name="shibboleth" filename="policy/modules/services/shibboleth.if">
67312 -<summary>Shibboleth authentication deamon</summary>
67313 +<summary>Shibboleth authentication daemon</summary>
67314 <interface name="shibboleth_read_config" lineno="14">
67315 <summary>
67316 Allow your application domain to access
67317 @@ -107848,7 +108625,7 @@ Domain allowed to transition.
67318 </interface>
67319 <interface name="smokeping_read_pid_files" lineno="51">
67320 <summary>
67321 -Read smokeping pid files.
67322 +Read smokeping pid files. (Deprecated)
67323 </summary>
67324 <param name="domain">
67325 <summary>
67326 @@ -107856,10 +108633,10 @@ Domain allowed access.
67327 </summary>
67328 </param>
67329 </interface>
67330 -<interface name="smokeping_manage_pid_files" lineno="71">
67331 +<interface name="smokeping_manage_pid_files" lineno="66">
67332 <summary>
67333 Create, read, write, and delete
67334 -smokeping pid files.
67335 +smokeping pid files. (Deprecated)
67336 </summary>
67337 <param name="domain">
67338 <summary>
67339 @@ -107867,7 +108644,7 @@ Domain allowed access.
67340 </summary>
67341 </param>
67342 </interface>
67343 -<interface name="smokeping_getattr_lib_files" lineno="90">
67344 +<interface name="smokeping_getattr_lib_files" lineno="80">
67345 <summary>
67346 Get attributes of smokeping lib files.
67347 </summary>
67348 @@ -107877,7 +108654,7 @@ Domain allowed access.
67349 </summary>
67350 </param>
67351 </interface>
67352 -<interface name="smokeping_read_lib_files" lineno="109">
67353 +<interface name="smokeping_read_lib_files" lineno="99">
67354 <summary>
67355 Read smokeping lib files.
67356 </summary>
67357 @@ -107887,7 +108664,7 @@ Domain allowed access.
67358 </summary>
67359 </param>
67360 </interface>
67361 -<interface name="smokeping_manage_lib_files" lineno="129">
67362 +<interface name="smokeping_manage_lib_files" lineno="119">
67363 <summary>
67364 Create, read, write, and delete
67365 smokeping lib files.
67366 @@ -107898,7 +108675,7 @@ Domain allowed access.
67367 </summary>
67368 </param>
67369 </interface>
67370 -<interface name="smokeping_admin" lineno="155">
67371 +<interface name="smokeping_admin" lineno="145">
67372 <summary>
67373 All of the rules required to
67374 administrate a smokeping environment.
67375 @@ -108157,7 +108934,29 @@ Domain allowed access.
67376 </summary>
67377 </param>
67378 </interface>
67379 -<interface name="spamassassin_exec_spamd" lineno="114">
67380 +<interface name="spamassassin_reload" lineno="115">
67381 +<summary>
67382 +reload SA service
67383 +</summary>
67384 +<param name="domain">
67385 +<summary>
67386 +Domain allowed access.
67387 +</summary>
67388 +</param>
67389 +<rolecap/>
67390 +</interface>
67391 +<interface name="spamassassin_status" lineno="135">
67392 +<summary>
67393 +Get SA service status
67394 +</summary>
67395 +<param name="domain">
67396 +<summary>
67397 +Domain allowed access.
67398 +</summary>
67399 +</param>
67400 +<rolecap/>
67401 +</interface>
67402 +<interface name="spamassassin_exec_spamd" lineno="154">
67403 <summary>
67404 Execute spamd in the caller domain.
67405 </summary>
67406 @@ -108167,7 +108966,7 @@ Domain allowed access.
67407 </summary>
67408 </param>
67409 </interface>
67410 -<interface name="spamassassin_domtrans_client" lineno="133">
67411 +<interface name="spamassassin_domtrans_client" lineno="173">
67412 <summary>
67413 Execute spamc in the spamc domain.
67414 </summary>
67415 @@ -108177,7 +108976,7 @@ Domain allowed to transition.
67416 </summary>
67417 </param>
67418 </interface>
67419 -<interface name="spamassassin_exec_client" lineno="152">
67420 +<interface name="spamassassin_exec_client" lineno="192">
67421 <summary>
67422 Execute spamc in the caller domain.
67423 </summary>
67424 @@ -108187,7 +108986,7 @@ Domain allowed access.
67425 </summary>
67426 </param>
67427 </interface>
67428 -<interface name="spamassassin_kill_client" lineno="171">
67429 +<interface name="spamassassin_kill_client" lineno="211">
67430 <summary>
67431 Send kill signals to spamc.
67432 </summary>
67433 @@ -108197,7 +108996,7 @@ Domain allowed access.
67434 </summary>
67435 </param>
67436 </interface>
67437 -<interface name="spamassassin_domtrans_local_client" lineno="190">
67438 +<interface name="spamassassin_domtrans_local_client" lineno="230">
67439 <summary>
67440 Execute spamassassin standalone client
67441 in the user spamassassin domain.
67442 @@ -108208,7 +109007,7 @@ Domain allowed to transition.
67443 </summary>
67444 </param>
67445 </interface>
67446 -<interface name="spamassassin_manage_spamd_home_content" lineno="210">
67447 +<interface name="spamassassin_manage_spamd_home_content" lineno="250">
67448 <summary>
67449 Create, read, write, and delete
67450 spamd home content.
67451 @@ -108219,7 +109018,7 @@ Domain allowed access.
67452 </summary>
67453 </param>
67454 </interface>
67455 -<interface name="spamassassin_relabel_spamd_home_content" lineno="231">
67456 +<interface name="spamassassin_relabel_spamd_home_content" lineno="271">
67457 <summary>
67458 Relabel spamd home content.
67459 </summary>
67460 @@ -108229,7 +109028,7 @@ Domain allowed access.
67461 </summary>
67462 </param>
67463 </interface>
67464 -<interface name="spamassassin_home_filetrans_spamd_home" lineno="263">
67465 +<interface name="spamassassin_home_filetrans_spamd_home" lineno="303">
67466 <summary>
67467 Create objects in user home
67468 directories with the spamd home type.
67469 @@ -108250,7 +109049,7 @@ The name of the object being created.
67470 </summary>
67471 </param>
67472 </interface>
67473 -<interface name="spamassassin_read_lib_files" lineno="281">
67474 +<interface name="spamassassin_read_lib_files" lineno="321">
67475 <summary>
67476 Read spamd lib files.
67477 </summary>
67478 @@ -108260,7 +109059,7 @@ Domain allowed access.
67479 </summary>
67480 </param>
67481 </interface>
67482 -<interface name="spamassassin_manage_lib_files" lineno="301">
67483 +<interface name="spamassassin_manage_lib_files" lineno="341">
67484 <summary>
67485 Create, read, write, and delete
67486 spamd lib files.
67487 @@ -108271,9 +109070,19 @@ Domain allowed access.
67488 </summary>
67489 </param>
67490 </interface>
67491 -<interface name="spamassassin_read_spamd_pid_files" lineno="320">
67492 +<interface name="spamassassin_read_spamd_pid_files" lineno="360">
67493 +<summary>
67494 +Read spamd pid files. (Deprecated)
67495 +</summary>
67496 +<param name="domain">
67497 +<summary>
67498 +Domain allowed access.
67499 +</summary>
67500 +</param>
67501 +</interface>
67502 +<interface name="spamassassin_read_spamd_runtime_files" lineno="375">
67503 <summary>
67504 -Read spamd pid files.
67505 +Read spamd runtime files.
67506 </summary>
67507 <param name="domain">
67508 <summary>
67509 @@ -108281,7 +109090,7 @@ Domain allowed access.
67510 </summary>
67511 </param>
67512 </interface>
67513 -<interface name="spamassassin_read_spamd_tmp_files" lineno="339">
67514 +<interface name="spamassassin_read_spamd_tmp_files" lineno="394">
67515 <summary>
67516 Read temporary spamd files.
67517 </summary>
67518 @@ -108291,7 +109100,7 @@ Domain allowed access.
67519 </summary>
67520 </param>
67521 </interface>
67522 -<interface name="spamassassin_dontaudit_getattr_spamd_tmp_sockets" lineno="358">
67523 +<interface name="spamassassin_dontaudit_getattr_spamd_tmp_sockets" lineno="413">
67524 <summary>
67525 Do not audit attempts to get
67526 attributes of temporary spamd sockets.
67527 @@ -108302,7 +109111,7 @@ Domain to not audit.
67528 </summary>
67529 </param>
67530 </interface>
67531 -<interface name="spamassassin_stream_connect_spamd" lineno="377">
67532 +<interface name="spamassassin_stream_connect_spamd" lineno="432">
67533 <summary>
67534 Connect to spamd with a unix
67535 domain stream socket.
67536 @@ -108313,7 +109122,7 @@ Domain allowed access.
67537 </summary>
67538 </param>
67539 </interface>
67540 -<interface name="spamassassin_admin" lineno="403">
67541 +<interface name="spamassassin_admin" lineno="458">
67542 <summary>
67543 All of the rules required to
67544 administrate an spamassassin environment.
67545 @@ -108346,9 +109155,14 @@ generic user home content.
67546 </p>
67547 </desc>
67548 </tunable>
67549 -</module>
67550 -<module name="speedtouch" filename="policy/modules/services/speedtouch.if">
67551 -<summary>Alcatel speedtouch USB ADSL modem</summary>
67552 +<tunable name="rspamd_spamd" dftval="false">
67553 +<desc>
67554 +<p>
67555 +Determine whether extra rules should
67556 +be enabled to support rspamd.
67557 +</p>
67558 +</desc>
67559 +</tunable>
67560 </module>
67561 <module name="squid" filename="policy/modules/services/squid.if">
67562 <summary>Squid caching http proxy server.</summary>
67563 @@ -108545,7 +109359,7 @@ The role associated with the user domain.
67564 </summary>
67565 </param>
67566 </template>
67567 -<template name="ssh_server_template" lineno="169">
67568 +<template name="ssh_server_template" lineno="168">
67569 <summary>
67570 The template to define a ssh server.
67571 </summary>
67572 @@ -108565,7 +109379,7 @@ is the prefix for sshd_t).
67573 </summary>
67574 </param>
67575 </template>
67576 -<template name="ssh_role_template" lineno="300">
67577 +<template name="ssh_role_template" lineno="298">
67578 <summary>
67579 Role access for ssh
67580 </summary>
67581 @@ -108586,7 +109400,7 @@ User domain for the role
67582 </summary>
67583 </param>
67584 </template>
67585 -<interface name="ssh_sigchld" lineno="453">
67586 +<interface name="ssh_sigchld" lineno="455">
67587 <summary>
67588 Send a SIGCHLD signal to the ssh server.
67589 </summary>
67590 @@ -108596,7 +109410,7 @@ Domain allowed access.
67591 </summary>
67592 </param>
67593 </interface>
67594 -<interface name="ssh_signal" lineno="471">
67595 +<interface name="ssh_signal" lineno="473">
67596 <summary>
67597 Send a generic signal to the ssh server.
67598 </summary>
67599 @@ -108606,7 +109420,7 @@ Domain allowed access.
67600 </summary>
67601 </param>
67602 </interface>
67603 -<interface name="ssh_signull" lineno="489">
67604 +<interface name="ssh_signull" lineno="491">
67605 <summary>
67606 Send a null signal to sshd processes.
67607 </summary>
67608 @@ -108616,7 +109430,7 @@ Domain allowed access.
67609 </summary>
67610 </param>
67611 </interface>
67612 -<interface name="ssh_read_pipes" lineno="507">
67613 +<interface name="ssh_read_pipes" lineno="509">
67614 <summary>
67615 Read a ssh server unnamed pipe.
67616 </summary>
67617 @@ -108626,7 +109440,7 @@ Domain allowed access.
67618 </summary>
67619 </param>
67620 </interface>
67621 -<interface name="ssh_rw_pipes" lineno="524">
67622 +<interface name="ssh_rw_pipes" lineno="526">
67623 <summary>
67624 Read and write a ssh server unnamed pipe.
67625 </summary>
67626 @@ -108636,7 +109450,7 @@ Domain allowed access.
67627 </summary>
67628 </param>
67629 </interface>
67630 -<interface name="ssh_rw_stream_sockets" lineno="542">
67631 +<interface name="ssh_rw_stream_sockets" lineno="544">
67632 <summary>
67633 Read and write ssh server unix domain stream sockets.
67634 </summary>
67635 @@ -108646,7 +109460,7 @@ Domain allowed access.
67636 </summary>
67637 </param>
67638 </interface>
67639 -<interface name="ssh_rw_tcp_sockets" lineno="560">
67640 +<interface name="ssh_rw_tcp_sockets" lineno="562">
67641 <summary>
67642 Read and write ssh server TCP sockets.
67643 </summary>
67644 @@ -108656,7 +109470,7 @@ Domain allowed access.
67645 </summary>
67646 </param>
67647 </interface>
67648 -<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="579">
67649 +<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="581">
67650 <summary>
67651 Do not audit attempts to read and write
67652 ssh server TCP sockets.
67653 @@ -108667,7 +109481,7 @@ Domain to not audit.
67654 </summary>
67655 </param>
67656 </interface>
67657 -<interface name="ssh_exec_sshd" lineno="597">
67658 +<interface name="ssh_exec_sshd" lineno="599">
67659 <summary>
67660 Execute the ssh daemon in the caller domain.
67661 </summary>
67662 @@ -108677,7 +109491,7 @@ Domain allowed access.
67663 </summary>
67664 </param>
67665 </interface>
67666 -<interface name="ssh_domtrans" lineno="616">
67667 +<interface name="ssh_domtrans" lineno="618">
67668 <summary>
67669 Execute the ssh daemon sshd domain.
67670 </summary>
67671 @@ -108687,7 +109501,7 @@ Domain allowed to transition.
67672 </summary>
67673 </param>
67674 </interface>
67675 -<interface name="ssh_exec" lineno="634">
67676 +<interface name="ssh_exec" lineno="636">
67677 <summary>
67678 Execute the ssh client in the caller domain.
67679 </summary>
67680 @@ -108697,7 +109511,7 @@ Domain allowed access.
67681 </summary>
67682 </param>
67683 </interface>
67684 -<interface name="ssh_setattr_key_files" lineno="653">
67685 +<interface name="ssh_setattr_key_files" lineno="655">
67686 <summary>
67687 Set the attributes of sshd key files.
67688 </summary>
67689 @@ -108707,7 +109521,7 @@ Domain allowed access.
67690 </summary>
67691 </param>
67692 </interface>
67693 -<interface name="ssh_agent_exec" lineno="672">
67694 +<interface name="ssh_agent_exec" lineno="674">
67695 <summary>
67696 Execute the ssh agent client in the caller domain.
67697 </summary>
67698 @@ -108717,7 +109531,7 @@ Domain allowed access.
67699 </summary>
67700 </param>
67701 </interface>
67702 -<interface name="ssh_read_user_home_files" lineno="691">
67703 +<interface name="ssh_read_user_home_files" lineno="693">
67704 <summary>
67705 Read ssh home directory content
67706 </summary>
67707 @@ -108727,7 +109541,7 @@ Domain allowed access.
67708 </summary>
67709 </param>
67710 </interface>
67711 -<interface name="ssh_domtrans_keygen" lineno="712">
67712 +<interface name="ssh_domtrans_keygen" lineno="714">
67713 <summary>
67714 Execute the ssh key generator in the ssh keygen domain.
67715 </summary>
67716 @@ -108737,7 +109551,7 @@ Domain allowed to transition.
67717 </summary>
67718 </param>
67719 </interface>
67720 -<interface name="ssh_dontaudit_read_server_keys" lineno="730">
67721 +<interface name="ssh_dontaudit_read_server_keys" lineno="732">
67722 <summary>
67723 Read ssh server keys
67724 </summary>
67725 @@ -108747,7 +109561,7 @@ Domain to not audit.
67726 </summary>
67727 </param>
67728 </interface>
67729 -<interface name="ssh_manage_home_files" lineno="748">
67730 +<interface name="ssh_manage_home_files" lineno="750">
67731 <summary>
67732 Manage ssh home directory content
67733 </summary>
67734 @@ -108757,7 +109571,7 @@ Domain allowed access.
67735 </summary>
67736 </param>
67737 </interface>
67738 -<interface name="ssh_delete_tmp" lineno="767">
67739 +<interface name="ssh_delete_tmp" lineno="769">
67740 <summary>
67741 Delete from the ssh temp files.
67742 </summary>
67743 @@ -108767,6 +109581,16 @@ Domain allowed access.
67744 </summary>
67745 </param>
67746 </interface>
67747 +<interface name="ssh_dontaudit_agent_tmp" lineno="788">
67748 +<summary>
67749 +dontaudit access to ssh agent tmp dirs
67750 +</summary>
67751 +<param name="domain">
67752 +<summary>
67753 +Domain not to audit.
67754 +</summary>
67755 +</param>
67756 +</interface>
67757 <tunable name="allow_ssh_keysign" dftval="false">
67758 <desc>
67759 <p>
67760 @@ -108876,7 +109700,7 @@ Domain allowed access.
67761 </interface>
67762 <interface name="sssd_read_pid_files" lineno="168">
67763 <summary>
67764 -Read sssd pid files.
67765 +Read sssd pid files. (Deprecated)
67766 </summary>
67767 <param name="domain">
67768 <summary>
67769 @@ -108884,10 +109708,20 @@ Domain allowed access.
67770 </summary>
67771 </param>
67772 </interface>
67773 -<interface name="sssd_manage_pids" lineno="188">
67774 +<interface name="sssd_manage_pids" lineno="184">
67775 <summary>
67776 Create, read, write, and delete
67777 -sssd pid content.
67778 +sssd pid content. (Deprecated)
67779 +</summary>
67780 +<param name="domain">
67781 +<summary>
67782 +Domain allowed access.
67783 +</summary>
67784 +</param>
67785 +</interface>
67786 +<interface name="sssd_read_runtime_files" lineno="198">
67787 +<summary>
67788 +Read sssd runtime files.
67789 </summary>
67790 <param name="domain">
67791 <summary>
67792 @@ -108895,7 +109729,7 @@ Domain allowed access.
67793 </summary>
67794 </param>
67795 </interface>
67796 -<interface name="sssd_search_lib" lineno="208">
67797 +<interface name="sssd_search_lib" lineno="217">
67798 <summary>
67799 Search sssd lib directories.
67800 </summary>
67801 @@ -108905,7 +109739,7 @@ Domain allowed access.
67802 </summary>
67803 </param>
67804 </interface>
67805 -<interface name="sssd_dontaudit_search_lib" lineno="228">
67806 +<interface name="sssd_dontaudit_search_lib" lineno="237">
67807 <summary>
67808 Do not audit attempts to search
67809 sssd lib directories.
67810 @@ -108916,7 +109750,7 @@ Domain to not audit.
67811 </summary>
67812 </param>
67813 </interface>
67814 -<interface name="sssd_read_lib_files" lineno="246">
67815 +<interface name="sssd_read_lib_files" lineno="255">
67816 <summary>
67817 Read sssd lib files.
67818 </summary>
67819 @@ -108926,7 +109760,7 @@ Domain allowed access.
67820 </summary>
67821 </param>
67822 </interface>
67823 -<interface name="sssd_manage_lib_files" lineno="267">
67824 +<interface name="sssd_manage_lib_files" lineno="276">
67825 <summary>
67826 Create, read, write, and delete
67827 sssd lib files.
67828 @@ -108937,7 +109771,7 @@ Domain allowed access.
67829 </summary>
67830 </param>
67831 </interface>
67832 -<interface name="sssd_dbus_chat" lineno="288">
67833 +<interface name="sssd_dbus_chat" lineno="297">
67834 <summary>
67835 Send and receive messages from
67836 sssd over dbus.
67837 @@ -108948,7 +109782,7 @@ Domain allowed access.
67838 </summary>
67839 </param>
67840 </interface>
67841 -<interface name="sssd_stream_connect" lineno="309">
67842 +<interface name="sssd_stream_connect" lineno="318">
67843 <summary>
67844 Connect to sssd with a unix
67845 domain stream socket.
67846 @@ -108959,7 +109793,7 @@ Domain allowed access.
67847 </summary>
67848 </param>
67849 </interface>
67850 -<interface name="sssd_admin" lineno="335">
67851 +<interface name="sssd_admin" lineno="344">
67852 <summary>
67853 All of the rules required to
67854 administrate an sssd environment.
67855 @@ -109427,7 +110261,94 @@ tcp sockets to all unreserved ports.
67856 </module>
67857 <module name="tpm2" filename="policy/modules/services/tpm2.if">
67858 <summary>Trusted Platform Module 2.0</summary>
67859 -<interface name="tpm2_enabledisable_abrmd" lineno="13">
67860 +<interface name="tpm2_exec" lineno="14">
67861 +<summary>
67862 +Execute tpm2_* processes
67863 +in the caller domain.
67864 +</summary>
67865 +<param name="domain">
67866 +<summary>
67867 +Domain allowed access.
67868 +</summary>
67869 +</param>
67870 +</interface>
67871 +<interface name="tpm2_domtrans" lineno="33">
67872 +<summary>
67873 +Execute tpm2_* processes in the tpm2 domain.
67874 +</summary>
67875 +<param name="domain">
67876 +<summary>
67877 +Domain allowed to transition.
67878 +</summary>
67879 +</param>
67880 +</interface>
67881 +<interface name="tpm2_run" lineno="58">
67882 +<summary>
67883 +Execute tpm2_* processes in the tpm2
67884 +domain and allow the specified role
67885 +</summary>
67886 +<param name="domain">
67887 +<summary>
67888 +Domain allowed to transition.
67889 +</summary>
67890 +</param>
67891 +<param name="role">
67892 +<summary>
67893 +Role allowed access.
67894 +</summary>
67895 +</param>
67896 +</interface>
67897 +<interface name="tpm2_use_fds" lineno="78">
67898 +<summary>
67899 +Use tpm2 file descriptors.
67900 +</summary>
67901 +<param name="domain">
67902 +<summary>
67903 +Domain allowed access.
67904 +</summary>
67905 +</param>
67906 +</interface>
67907 +<interface name="tpm2_dontaudit_use_fds" lineno="97">
67908 +<summary>
67909 +Do not audit attempts to inherit file
67910 +descriptors from tpm2.
67911 +</summary>
67912 +<param name="domain">
67913 +<summary>
67914 +Domain to not audit.
67915 +</summary>
67916 +</param>
67917 +</interface>
67918 +<interface name="tpm2_dbus_chat_abrmd" lineno="116">
67919 +<summary>
67920 +Send and receive messages from
67921 +tpm2-abrmd over dbus.
67922 +</summary>
67923 +<param name="domain">
67924 +<summary>
67925 +Domain allowed access.
67926 +</summary>
67927 +</param>
67928 +</interface>
67929 +<interface name="tpm2_read_pipes" lineno="144">
67930 +<summary>
67931 +Allow tpm2 to read unnamed pipes from other process.
67932 +</summary>
67933 +<desc>
67934 +<p>
67935 +Allow the tpm to open and read pipes from other
67936 +domain. This is seen when piping input to one
67937 +of the tpm2_* processes. For example:
67938 +sha512sum my_file | tpm2_hmac -k 0x81001000 -g sha256 /dev/stdin
67939 +</p>
67940 +</desc>
67941 +<param name="domain">
67942 +<summary>
67943 +Domain of pipe to be read by tpm2_t.
67944 +</summary>
67945 +</param>
67946 +</interface>
67947 +<interface name="tpm2_enabledisable_abrmd" lineno="162">
67948 <summary>
67949 Allow specified domain to enable/disable tpm2-abrmd unit
67950 </summary>
67951 @@ -109437,7 +110358,7 @@ Domain allowed access.
67952 </summary>
67953 </param>
67954 </interface>
67955 -<interface name="tpm2_startstop_abrmd" lineno="32">
67956 +<interface name="tpm2_startstop_abrmd" lineno="181">
67957 <summary>
67958 Allow specified domain to start/stop tpm2-abrmd unit
67959 </summary>
67960 @@ -109447,7 +110368,7 @@ Domain allowed access.
67961 </summary>
67962 </param>
67963 </interface>
67964 -<interface name="tpm2_status_abrmd" lineno="51">
67965 +<interface name="tpm2_status_abrmd" lineno="200">
67966 <summary>
67967 Allow specified domain to get status of tpm2-abrmd unit
67968 </summary>
67969 @@ -109457,6 +110378,16 @@ Domain allowed access.
67970 </summary>
67971 </param>
67972 </interface>
67973 +<interface name="tpm2_rw_abrmd_pipes" lineno="219">
67974 +<summary>
67975 +access tpm2-abrmd fifos
67976 +</summary>
67977 +<param name="domain">
67978 +<summary>
67979 +Domain allowed access
67980 +</summary>
67981 +</param>
67982 +</interface>
67983 </module>
67984 <module name="transproxy" filename="policy/modules/services/transproxy.if">
67985 <summary>Portable Transparent Proxy Solution.</summary>
67986 @@ -109502,7 +110433,7 @@ Domain allowed access.
67987 </interface>
67988 <interface name="tuned_read_pid_files" lineno="51">
67989 <summary>
67990 -Read tuned pid files.
67991 +Read tuned pid files. (Deprecated)
67992 </summary>
67993 <param name="domain">
67994 <summary>
67995 @@ -109510,10 +110441,10 @@ Domain allowed access.
67996 </summary>
67997 </param>
67998 </interface>
67999 -<interface name="tuned_manage_pid_files" lineno="71">
68000 +<interface name="tuned_manage_pid_files" lineno="66">
68001 <summary>
68002 Create, read, write, and delete
68003 -tuned pid files.
68004 +tuned pid files. (Deprecated)
68005 </summary>
68006 <param name="domain">
68007 <summary>
68008 @@ -109521,7 +110452,7 @@ Domain allowed access.
68009 </summary>
68010 </param>
68011 </interface>
68012 -<interface name="tuned_initrc_domtrans" lineno="91">
68013 +<interface name="tuned_initrc_domtrans" lineno="81">
68014 <summary>
68015 Execute tuned init scripts in
68016 the initrc domain.
68017 @@ -109532,7 +110463,7 @@ Domain allowed to transition.
68018 </summary>
68019 </param>
68020 </interface>
68021 -<interface name="tuned_admin" lineno="116">
68022 +<interface name="tuned_admin" lineno="106">
68023 <summary>
68024 All of the rules required to
68025 administrate an tuned environment.
68026 @@ -109813,7 +110744,7 @@ Domain allowed access.
68027 </interface>
68028 <interface name="uuidd_read_pid_files" lineno="129">
68029 <summary>
68030 -Read uuidd pid files.
68031 +Read uuidd pid files. (Deprecated)
68032 </summary>
68033 <param name="domain">
68034 <summary>
68035 @@ -109821,7 +110752,7 @@ Domain allowed access.
68036 </summary>
68037 </param>
68038 </interface>
68039 -<interface name="uuidd_stream_connect_manager" lineno="149">
68040 +<interface name="uuidd_stream_connect_manager" lineno="144">
68041 <summary>
68042 Connect to uuidd with an unix
68043 domain stream socket.
68044 @@ -109832,7 +110763,7 @@ Domain allowed access.
68045 </summary>
68046 </param>
68047 </interface>
68048 -<interface name="uuidd_admin" lineno="175">
68049 +<interface name="uuidd_admin" lineno="170">
68050 <summary>
68051 All of the rules required to
68052 administrate an uuidd environment.
68053 @@ -110013,7 +110944,7 @@ Domain allowed access.
68054 </interface>
68055 <interface name="vdagent_read_pid_files" lineno="69">
68056 <summary>
68057 -Read vdagent pid files.
68058 +Read vdagent pid files. (Deprecated)
68059 </summary>
68060 <param name="domain">
68061 <summary>
68062 @@ -110021,7 +110952,7 @@ Domain allowed access.
68063 </summary>
68064 </param>
68065 </interface>
68066 -<interface name="vdagent_stream_connect" lineno="89">
68067 +<interface name="vdagent_stream_connect" lineno="84">
68068 <summary>
68069 Connect to vdagent with a unix
68070 domain stream socket.
68071 @@ -110032,7 +110963,7 @@ Domain allowed access.
68072 </summary>
68073 </param>
68074 </interface>
68075 -<interface name="vdagent_admin" lineno="115">
68076 +<interface name="vdagent_admin" lineno="110">
68077 <summary>
68078 All of the rules required to
68079 administrate an vdagent environment.
68080 @@ -110117,7 +111048,7 @@ Domain allowed access.
68081 </interface>
68082 <interface name="vhostmd_read_pid_files" lineno="128">
68083 <summary>
68084 -Read vhostmd pid files.
68085 +Read vhostmd pid files. (Deprecated)
68086 </summary>
68087 <param name="domain">
68088 <summary>
68089 @@ -110125,10 +111056,10 @@ Domain allowed access.
68090 </summary>
68091 </param>
68092 </interface>
68093 -<interface name="vhostmd_manage_pid_files" lineno="148">
68094 +<interface name="vhostmd_manage_pid_files" lineno="143">
68095 <summary>
68096 Create, read, write, and delete
68097 -vhostmd pid files.
68098 +vhostmd pid files. (Deprecated)
68099 </summary>
68100 <param name="domain">
68101 <summary>
68102 @@ -110136,7 +111067,7 @@ Domain allowed access.
68103 </summary>
68104 </param>
68105 </interface>
68106 -<interface name="vhostmd_stream_connect" lineno="168">
68107 +<interface name="vhostmd_stream_connect" lineno="158">
68108 <summary>
68109 Connect to vhostmd with a unix
68110 domain stream socket.
68111 @@ -110147,7 +111078,7 @@ Domain allowed access.
68112 </summary>
68113 </param>
68114 </interface>
68115 -<interface name="vhostmd_dontaudit_rw_stream_connect" lineno="188">
68116 +<interface name="vhostmd_dontaudit_rw_stream_connect" lineno="178">
68117 <summary>
68118 Do not audit attempts to read and
68119 write vhostmd unix domain stream sockets.
68120 @@ -110158,7 +111089,7 @@ Domain to not audit.
68121 </summary>
68122 </param>
68123 </interface>
68124 -<interface name="vhostmd_admin" lineno="213">
68125 +<interface name="vhostmd_admin" lineno="203">
68126 <summary>
68127 All of the rules required to
68128 administrate an vhostmd environment.
68129 @@ -110550,7 +111481,7 @@ The name of the object being created.
68130 </interface>
68131 <interface name="virt_read_pid_files" lineno="808">
68132 <summary>
68133 -Read virt pid files.
68134 +Read virt pid files. (Depprecated)
68135 </summary>
68136 <param name="domain">
68137 <summary>
68138 @@ -110558,18 +111489,54 @@ Domain allowed access.
68139 </summary>
68140 </param>
68141 </interface>
68142 -<interface name="virt_manage_pid_files" lineno="828">
68143 +<interface name="virt_manage_pid_files" lineno="824">
68144 <summary>
68145 Create, read, write, and delete
68146 -virt pid files.
68147 +virt pid files. (Deprecated)
68148 +</summary>
68149 +<param name="domain">
68150 +<summary>
68151 +Domain allowed access.
68152 +</summary>
68153 +</param>
68154 +</interface>
68155 +<interface name="virt_read_runtime_files" lineno="838">
68156 +<summary>
68157 +Read virt runtime files.
68158 +</summary>
68159 +<param name="domain">
68160 +<summary>
68161 +Domain allowed access.
68162 +</summary>
68163 +</param>
68164 +</interface>
68165 +<interface name="virt_runtime_filetrans" lineno="873">
68166 +<summary>
68167 +Create an object in the libvirt runtime directory, with a private type.
68168 </summary>
68169 <param name="domain">
68170 <summary>
68171 Domain allowed access.
68172 </summary>
68173 </param>
68174 +<param name="private type">
68175 +<summary>
68176 +The type of the object to be created.
68177 +</summary>
68178 +</param>
68179 +<param name="object">
68180 +<summary>
68181 +The object class of the object being created.
68182 +</summary>
68183 +</param>
68184 +<param name="name" optional="true">
68185 +<summary>
68186 +The name of the object being created.
68187 +</summary>
68188 +</param>
68189 +<infoflow type="write" weight="10"/>
68190 </interface>
68191 -<interface name="virt_search_lib" lineno="847">
68192 +<interface name="virt_search_lib" lineno="891">
68193 <summary>
68194 Search virt lib directories.
68195 </summary>
68196 @@ -110579,7 +111546,7 @@ Domain allowed access.
68197 </summary>
68198 </param>
68199 </interface>
68200 -<interface name="virt_read_lib_files" lineno="866">
68201 +<interface name="virt_read_lib_files" lineno="910">
68202 <summary>
68203 Read virt lib files.
68204 </summary>
68205 @@ -110589,7 +111556,7 @@ Domain allowed access.
68206 </summary>
68207 </param>
68208 </interface>
68209 -<interface name="virt_manage_lib_files" lineno="887">
68210 +<interface name="virt_manage_lib_files" lineno="931">
68211 <summary>
68212 Create, read, write, and delete
68213 virt lib files.
68214 @@ -110600,10 +111567,10 @@ Domain allowed access.
68215 </summary>
68216 </param>
68217 </interface>
68218 -<interface name="virt_pid_filetrans" lineno="923">
68219 +<interface name="virt_pid_filetrans" lineno="967">
68220 <summary>
68221 Create objects in virt pid
68222 -directories with a private type.
68223 +directories with a private type. (Deprecated)
68224 </summary>
68225 <param name="domain">
68226 <summary>
68227 @@ -110627,7 +111594,7 @@ The name of the object being created.
68228 </param>
68229 <infoflow type="write" weight="10"/>
68230 </interface>
68231 -<interface name="virt_read_log" lineno="943">
68232 +<interface name="virt_read_log" lineno="983">
68233 <summary>
68234 Read virt log files.
68235 </summary>
68236 @@ -110638,7 +111605,7 @@ Domain allowed access.
68237 </param>
68238 <rolecap/>
68239 </interface>
68240 -<interface name="virt_append_log" lineno="962">
68241 +<interface name="virt_append_log" lineno="1002">
68242 <summary>
68243 Append virt log files.
68244 </summary>
68245 @@ -110648,7 +111615,7 @@ Domain allowed access.
68246 </summary>
68247 </param>
68248 </interface>
68249 -<interface name="virt_manage_log" lineno="982">
68250 +<interface name="virt_manage_log" lineno="1022">
68251 <summary>
68252 Create, read, write, and delete
68253 virt log files.
68254 @@ -110659,7 +111626,7 @@ Domain allowed access.
68255 </summary>
68256 </param>
68257 </interface>
68258 -<interface name="virt_search_images" lineno="1003">
68259 +<interface name="virt_search_images" lineno="1043">
68260 <summary>
68261 Search virt image directories.
68262 </summary>
68263 @@ -110669,7 +111636,7 @@ Domain allowed access.
68264 </summary>
68265 </param>
68266 </interface>
68267 -<interface name="virt_read_images" lineno="1022">
68268 +<interface name="virt_read_images" lineno="1062">
68269 <summary>
68270 Read virt image files.
68271 </summary>
68272 @@ -110679,7 +111646,7 @@ Domain allowed access.
68273 </summary>
68274 </param>
68275 </interface>
68276 -<interface name="virt_rw_all_image_chr_files" lineno="1058">
68277 +<interface name="virt_rw_all_image_chr_files" lineno="1098">
68278 <summary>
68279 Read and write all virt image
68280 character files.
68281 @@ -110690,7 +111657,7 @@ Domain allowed access.
68282 </summary>
68283 </param>
68284 </interface>
68285 -<interface name="virt_manage_virt_cache" lineno="1079">
68286 +<interface name="virt_manage_virt_cache" lineno="1119">
68287 <summary>
68288 Create, read, write, and delete
68289 virt cache content.
68290 @@ -110701,7 +111668,7 @@ Domain allowed access.
68291 </summary>
68292 </param>
68293 </interface>
68294 -<interface name="virt_manage_images" lineno="1101">
68295 +<interface name="virt_manage_images" lineno="1141">
68296 <summary>
68297 Create, read, write, and delete
68298 virt image files.
68299 @@ -110712,7 +111679,7 @@ Domain allowed access.
68300 </summary>
68301 </param>
68302 </interface>
68303 -<interface name="virt_admin" lineno="1143">
68304 +<interface name="virt_admin" lineno="1183">
68305 <summary>
68306 All of the rules required to
68307 administrate an virt environment.
68308 @@ -110802,6 +111769,14 @@ can use vfio for pci device pass through (vt-d).
68309 </p>
68310 </desc>
68311 </tunable>
68312 +<tunable name="virt_use_evdev" dftval="false">
68313 +<desc>
68314 +<p>
68315 +Determine whether confined virtual guests
68316 +can use input devices via evdev pass through.
68317 +</p>
68318 +</desc>
68319 +</tunable>
68320 </module>
68321 <module name="vnstatd" filename="policy/modules/services/vnstatd.if">
68322 <summary>Console network traffic monitor.</summary>
68323 @@ -110832,59 +111807,7 @@ Role allowed access.
68324 </summary>
68325 </param>
68326 </interface>
68327 -<interface name="vnstatd_domtrans" lineno="58">
68328 -<summary>
68329 -Execute a domain transition to run vnstatd.
68330 -</summary>
68331 -<param name="domain">
68332 -<summary>
68333 -Domain allowed to transition.
68334 -</summary>
68335 -</param>
68336 -</interface>
68337 -<interface name="vnstatd_search_lib" lineno="79">
68338 -<summary>
68339 -Search vnstatd lib directories.
68340 -</summary>
68341 -<param name="domain">
68342 -<summary>
68343 -Domain allowed access.
68344 -</summary>
68345 -</param>
68346 -</interface>
68347 -<interface name="vnstatd_manage_lib_dirs" lineno="101">
68348 -<summary>
68349 -Create, read, write, and delete
68350 -vnstatd lib directories.
68351 -</summary>
68352 -<param name="domain">
68353 -<summary>
68354 -Domain allowed access.
68355 -</summary>
68356 -</param>
68357 -</interface>
68358 -<interface name="vnstatd_read_lib_files" lineno="122">
68359 -<summary>
68360 -Read vnstatd lib files.
68361 -</summary>
68362 -<param name="domain">
68363 -<summary>
68364 -Domain allowed access.
68365 -</summary>
68366 -</param>
68367 -</interface>
68368 -<interface name="vnstatd_manage_lib_files" lineno="144">
68369 -<summary>
68370 -Create, read, write, and delete
68371 -vnstatd lib files.
68372 -</summary>
68373 -<param name="domain">
68374 -<summary>
68375 -Domain allowed access.
68376 -</summary>
68377 -</param>
68378 -</interface>
68379 -<interface name="vnstatd_admin" lineno="172">
68380 +<interface name="vnstatd_admin" lineno="65">
68381 <summary>
68382 All of the rules required to
68383 administrate an vnstatd environment.
68384 @@ -110902,19 +111825,6 @@ Role allowed access.
68385 <rolecap/>
68386 </interface>
68387 </module>
68388 -<module name="w3c" filename="policy/modules/services/w3c.if">
68389 -<summary>W3C Markup Validator.</summary>
68390 -<tunable name="allow_httpd_w3c_validator_script_anon_write" dftval="false">
68391 -<desc>
68392 -<p>
68393 -Determine whether the script domain can
68394 -modify public files used for public file
68395 -transfer services. Directories/Files must
68396 -be labeled public_content_rw_t.
68397 -</p>
68398 -</desc>
68399 -</tunable>
68400 -</module>
68401 <module name="watchdog" filename="policy/modules/services/watchdog.if">
68402 <summary>Software watchdog.</summary>
68403 <interface name="watchdog_admin" lineno="20">
68404 @@ -111075,9 +111985,6 @@ Role allowed access.
68405 <rolecap/>
68406 </interface>
68407 </module>
68408 -<module name="xprint" filename="policy/modules/services/xprint.if">
68409 -<summary>A X11-based print system and API.</summary>
68410 -</module>
68411 <module name="xserver" filename="policy/modules/services/xserver.if">
68412 <summary>X Windows Server</summary>
68413 <interface name="xserver_restricted_role" lineno="19">
68414 @@ -111096,7 +112003,7 @@ Domain allowed access.
68415 </summary>
68416 </param>
68417 </interface>
68418 -<interface name="xserver_role" lineno="139">
68419 +<interface name="xserver_role" lineno="140">
68420 <summary>
68421 Rules required for using the X Windows server
68422 and environment.
68423 @@ -111112,7 +112019,7 @@ Domain allowed access.
68424 </summary>
68425 </param>
68426 </interface>
68427 -<interface name="xserver_ro_session" lineno="236">
68428 +<interface name="xserver_ro_session" lineno="209">
68429 <summary>
68430 Create sessions on the X server, with read-only
68431 access to the X server shared
68432 @@ -111129,7 +112036,7 @@ The type of the domain SYSV tmpfs files.
68433 </summary>
68434 </param>
68435 </interface>
68436 -<interface name="xserver_rw_session" lineno="278">
68437 +<interface name="xserver_rw_session" lineno="251">
68438 <summary>
68439 Create sessions on the X server, with read and write
68440 access to the X server shared
68441 @@ -111146,7 +112053,7 @@ The type of the domain SYSV tmpfs files.
68442 </summary>
68443 </param>
68444 </interface>
68445 -<interface name="xserver_non_drawing_client" lineno="298">
68446 +<interface name="xserver_non_drawing_client" lineno="271">
68447 <summary>
68448 Create non-drawing client sessions on an X server.
68449 </summary>
68450 @@ -111156,7 +112063,7 @@ Domain allowed access.
68451 </summary>
68452 </param>
68453 </interface>
68454 -<template name="xserver_common_x_domain_template" lineno="337">
68455 +<template name="xserver_common_x_domain_template" lineno="310">
68456 <summary>
68457 Interface to provide X object permissions on a given X server to
68458 an X client domain. Provides the minimal set required by a basic
68459 @@ -111174,7 +112081,7 @@ Client domain allowed access.
68460 </summary>
68461 </param>
68462 </template>
68463 -<template name="xserver_object_types_template" lineno="396">
68464 +<template name="xserver_object_types_template" lineno="369">
68465 <summary>
68466 Template for creating the set of types used
68467 in an X windows domain.
68468 @@ -111186,7 +112093,7 @@ is the prefix for user_t).
68469 </summary>
68470 </param>
68471 </template>
68472 -<template name="xserver_user_x_domain_template" lineno="438">
68473 +<template name="xserver_user_x_domain_template" lineno="411">
68474 <summary>
68475 Interface to provide X object permissions on a given X server to
68476 an X client domain. Provides the minimal set required by a basic
68477 @@ -111209,7 +112116,7 @@ The type of the domain SYSV tmpfs files.
68478 </summary>
68479 </param>
68480 </template>
68481 -<interface name="xserver_use_user_fonts" lineno="505">
68482 +<interface name="xserver_use_user_fonts" lineno="478">
68483 <summary>
68484 Read user fonts, user font configuration,
68485 and manage the user font cache.
68486 @@ -111230,7 +112137,7 @@ Domain allowed access.
68487 </summary>
68488 </param>
68489 </interface>
68490 -<interface name="xserver_domtrans_xauth" lineno="537">
68491 +<interface name="xserver_domtrans_xauth" lineno="510">
68492 <summary>
68493 Transition to the Xauthority domain.
68494 </summary>
68495 @@ -111240,7 +112147,7 @@ Domain allowed to transition.
68496 </summary>
68497 </param>
68498 </interface>
68499 -<interface name="xserver_user_home_dir_filetrans_user_xauth" lineno="560">
68500 +<interface name="xserver_user_home_dir_filetrans_user_xauth" lineno="533">
68501 <summary>
68502 Create a Xauthority file in the user home directory.
68503 </summary>
68504 @@ -111255,7 +112162,7 @@ The name of the object being created.
68505 </summary>
68506 </param>
68507 </interface>
68508 -<interface name="xserver_user_home_dir_filetrans_user_iceauth" lineno="584">
68509 +<interface name="xserver_user_home_dir_filetrans_user_iceauth" lineno="557">
68510 <summary>
68511 Create a ICEauthority file in
68512 the user home directory.
68513 @@ -111271,7 +112178,7 @@ The name of the object being created.
68514 </summary>
68515 </param>
68516 </interface>
68517 -<interface name="xserver_user_home_dir_filetrans_user_xsession_log" lineno="603">
68518 +<interface name="xserver_user_home_dir_filetrans_user_xsession_log" lineno="576">
68519 <summary>
68520 Create a .xsession-errors log
68521 file in the user home directory.
68522 @@ -111282,7 +112189,7 @@ Domain allowed access.
68523 </summary>
68524 </param>
68525 </interface>
68526 -<interface name="xserver_read_user_xauth" lineno="621">
68527 +<interface name="xserver_read_user_xauth" lineno="594">
68528 <summary>
68529 Read all users .Xauthority.
68530 </summary>
68531 @@ -111292,7 +112199,7 @@ Domain allowed access.
68532 </summary>
68533 </param>
68534 </interface>
68535 -<interface name="xserver_read_user_dmrc" lineno="640">
68536 +<interface name="xserver_read_user_dmrc" lineno="613">
68537 <summary>
68538 Read all users .dmrc.
68539 </summary>
68540 @@ -111302,7 +112209,7 @@ Domain allowed access.
68541 </summary>
68542 </param>
68543 </interface>
68544 -<interface name="xserver_read_user_iceauth" lineno="659">
68545 +<interface name="xserver_read_user_iceauth" lineno="632">
68546 <summary>
68547 Read all users .ICEauthority.
68548 </summary>
68549 @@ -111312,7 +112219,7 @@ Domain allowed access.
68550 </summary>
68551 </param>
68552 </interface>
68553 -<interface name="xserver_setattr_console_pipes" lineno="678">
68554 +<interface name="xserver_setattr_console_pipes" lineno="651">
68555 <summary>
68556 Set the attributes of the X windows console named pipes.
68557 </summary>
68558 @@ -111322,7 +112229,7 @@ Domain allowed access.
68559 </summary>
68560 </param>
68561 </interface>
68562 -<interface name="xserver_rw_console" lineno="696">
68563 +<interface name="xserver_rw_console" lineno="669">
68564 <summary>
68565 Read and write the X windows console named pipe.
68566 </summary>
68567 @@ -111332,7 +112239,7 @@ Domain allowed access.
68568 </summary>
68569 </param>
68570 </interface>
68571 -<interface name="xserver_create_console_pipes" lineno="714">
68572 +<interface name="xserver_create_console_pipes" lineno="687">
68573 <summary>
68574 Create the X windows console named pipes.
68575 </summary>
68576 @@ -111342,7 +112249,7 @@ Domain allowed access.
68577 </summary>
68578 </param>
68579 </interface>
68580 -<interface name="xserver_relabel_console_pipes" lineno="732">
68581 +<interface name="xserver_relabel_console_pipes" lineno="705">
68582 <summary>
68583 relabel the X windows console named pipes.
68584 </summary>
68585 @@ -111352,7 +112259,7 @@ Domain allowed access.
68586 </summary>
68587 </param>
68588 </interface>
68589 -<interface name="xserver_use_xdm_fds" lineno="750">
68590 +<interface name="xserver_use_xdm_fds" lineno="723">
68591 <summary>
68592 Use file descriptors for xdm.
68593 </summary>
68594 @@ -111362,7 +112269,7 @@ Domain allowed access.
68595 </summary>
68596 </param>
68597 </interface>
68598 -<interface name="xserver_dontaudit_use_xdm_fds" lineno="769">
68599 +<interface name="xserver_dontaudit_use_xdm_fds" lineno="742">
68600 <summary>
68601 Do not audit attempts to inherit
68602 XDM file descriptors.
68603 @@ -111373,7 +112280,7 @@ Domain to not audit.
68604 </summary>
68605 </param>
68606 </interface>
68607 -<interface name="xserver_sigchld_xdm" lineno="787">
68608 +<interface name="xserver_sigchld_xdm" lineno="760">
68609 <summary>
68610 Allow domain to send sigchld to xdm_t
68611 </summary>
68612 @@ -111383,7 +112290,7 @@ Domain allowed access.
68613 </summary>
68614 </param>
68615 </interface>
68616 -<interface name="xserver_rw_xdm_pipes" lineno="805">
68617 +<interface name="xserver_rw_xdm_pipes" lineno="778">
68618 <summary>
68619 Read and write XDM unnamed pipes.
68620 </summary>
68621 @@ -111393,7 +112300,7 @@ Domain allowed access.
68622 </summary>
68623 </param>
68624 </interface>
68625 -<interface name="xserver_dontaudit_rw_xdm_pipes" lineno="824">
68626 +<interface name="xserver_dontaudit_rw_xdm_pipes" lineno="797">
68627 <summary>
68628 Do not audit attempts to read and write
68629 XDM unnamed pipes.
68630 @@ -111404,7 +112311,7 @@ Domain to not audit.
68631 </summary>
68632 </param>
68633 </interface>
68634 -<interface name="xserver_dbus_chat_xdm" lineno="844">
68635 +<interface name="xserver_dbus_chat_xdm" lineno="817">
68636 <summary>
68637 Send and receive messages from
68638 xdm over dbus.
68639 @@ -111415,7 +112322,7 @@ Domain allowed access.
68640 </summary>
68641 </param>
68642 </interface>
68643 -<interface name="xserver_read_xdm_state" lineno="864">
68644 +<interface name="xserver_read_xdm_state" lineno="837">
68645 <summary>
68646 Read xdm process state files.
68647 </summary>
68648 @@ -111425,7 +112332,7 @@ Domain allowed access.
68649 </summary>
68650 </param>
68651 </interface>
68652 -<interface name="xserver_setsched_xdm" lineno="886">
68653 +<interface name="xserver_setsched_xdm" lineno="859">
68654 <summary>
68655 Set the priority of the X Display
68656 Manager (XDM).
68657 @@ -111436,18 +112343,7 @@ Domain allowed access.
68658 </summary>
68659 </param>
68660 </interface>
68661 -<interface name="xserver_manage_xdm_spool_files" lineno="905">
68662 -<summary>
68663 -Create, read, write, and delete
68664 -xdm_spool files.
68665 -</summary>
68666 -<param name="domain" unused="true">
68667 -<summary>
68668 -Domain allowed access.
68669 -</summary>
68670 -</param>
68671 -</interface>
68672 -<interface name="xserver_stream_connect_xdm" lineno="920">
68673 +<interface name="xserver_stream_connect_xdm" lineno="878">
68674 <summary>
68675 Connect to XDM over a unix domain
68676 stream socket.
68677 @@ -111458,7 +112354,7 @@ Domain allowed access.
68678 </summary>
68679 </param>
68680 </interface>
68681 -<interface name="xserver_read_xdm_rw_config" lineno="939">
68682 +<interface name="xserver_read_xdm_rw_config" lineno="897">
68683 <summary>
68684 Read xdm-writable configuration files.
68685 </summary>
68686 @@ -111468,7 +112364,7 @@ Domain allowed access.
68687 </summary>
68688 </param>
68689 </interface>
68690 -<interface name="xserver_setattr_xdm_tmp_dirs" lineno="958">
68691 +<interface name="xserver_setattr_xdm_tmp_dirs" lineno="916">
68692 <summary>
68693 Set the attributes of XDM temporary directories.
68694 </summary>
68695 @@ -111478,7 +112374,7 @@ Domain allowed access.
68696 </summary>
68697 </param>
68698 </interface>
68699 -<interface name="xserver_create_xdm_tmp_sockets" lineno="977">
68700 +<interface name="xserver_create_xdm_tmp_sockets" lineno="935">
68701 <summary>
68702 Create a named socket in a XDM
68703 temporary directory.
68704 @@ -111489,7 +112385,7 @@ Domain allowed access.
68705 </summary>
68706 </param>
68707 </interface>
68708 -<interface name="xserver_delete_xdm_tmp_sockets" lineno="998">
68709 +<interface name="xserver_delete_xdm_tmp_sockets" lineno="956">
68710 <summary>
68711 Delete a named socket in a XDM
68712 temporary directory.
68713 @@ -111500,9 +112396,9 @@ Domain allowed access.
68714 </summary>
68715 </param>
68716 </interface>
68717 -<interface name="xserver_read_xdm_pid" lineno="1017">
68718 +<interface name="xserver_read_xdm_pid" lineno="975">
68719 <summary>
68720 -Read XDM pid files.
68721 +Read XDM pid files. (Deprecated)
68722 </summary>
68723 <param name="domain">
68724 <summary>
68725 @@ -111510,7 +112406,17 @@ Domain allowed access.
68726 </summary>
68727 </param>
68728 </interface>
68729 -<interface name="xserver_read_xdm_lib_files" lineno="1036">
68730 +<interface name="xserver_read_xdm_runtime_files" lineno="990">
68731 +<summary>
68732 +Read XDM runtime files.
68733 +</summary>
68734 +<param name="domain">
68735 +<summary>
68736 +Domain allowed access.
68737 +</summary>
68738 +</param>
68739 +</interface>
68740 +<interface name="xserver_read_xdm_lib_files" lineno="1009">
68741 <summary>
68742 Read XDM var lib files.
68743 </summary>
68744 @@ -111520,7 +112426,7 @@ Domain allowed access.
68745 </summary>
68746 </param>
68747 </interface>
68748 -<interface name="xserver_xsession_entry_type" lineno="1054">
68749 +<interface name="xserver_xsession_entry_type" lineno="1027">
68750 <summary>
68751 Make an X session script an entrypoint for the specified domain.
68752 </summary>
68753 @@ -111530,7 +112436,7 @@ The domain for which the shell is an entrypoint.
68754 </summary>
68755 </param>
68756 </interface>
68757 -<interface name="xserver_xsession_spec_domtrans" lineno="1091">
68758 +<interface name="xserver_xsession_spec_domtrans" lineno="1064">
68759 <summary>
68760 Execute an X session in the target domain. This
68761 is an explicit transition, requiring the
68762 @@ -111559,7 +112465,7 @@ The type of the shell process.
68763 </summary>
68764 </param>
68765 </interface>
68766 -<interface name="xserver_write_inherited_xsession_log" lineno="1110">
68767 +<interface name="xserver_write_inherited_xsession_log" lineno="1083">
68768 <summary>
68769 Write to inherited xsession log
68770 files such as .xsession-errors.
68771 @@ -111570,7 +112476,7 @@ Domain allowed access.
68772 </summary>
68773 </param>
68774 </interface>
68775 -<interface name="xserver_rw_xsession_log" lineno="1130">
68776 +<interface name="xserver_rw_xsession_log" lineno="1103">
68777 <summary>
68778 Read and write xsession log
68779 files such as .xsession-errors.
68780 @@ -111581,7 +112487,7 @@ Domain allowed access.
68781 </summary>
68782 </param>
68783 </interface>
68784 -<interface name="xserver_manage_xsession_log" lineno="1149">
68785 +<interface name="xserver_manage_xsession_log" lineno="1122">
68786 <summary>
68787 Manage xsession log files such
68788 as .xsession-errors.
68789 @@ -111592,7 +112498,7 @@ Domain allowed access.
68790 </summary>
68791 </param>
68792 </interface>
68793 -<interface name="xserver_write_inherited_log" lineno="1168">
68794 +<interface name="xserver_write_inherited_log" lineno="1141">
68795 <summary>
68796 Write to inherited X server log
68797 files like /var/log/lightdm/lightdm.log
68798 @@ -111603,7 +112509,7 @@ Domain allowed access.
68799 </summary>
68800 </param>
68801 </interface>
68802 -<interface name="xserver_getattr_log" lineno="1186">
68803 +<interface name="xserver_getattr_log" lineno="1159">
68804 <summary>
68805 Get the attributes of X server logs.
68806 </summary>
68807 @@ -111613,7 +112519,7 @@ Domain allowed access.
68808 </summary>
68809 </param>
68810 </interface>
68811 -<interface name="xserver_dontaudit_write_log" lineno="1206">
68812 +<interface name="xserver_dontaudit_write_log" lineno="1179">
68813 <summary>
68814 Do not audit attempts to write the X server
68815 log files.
68816 @@ -111624,7 +112530,7 @@ Domain to not audit.
68817 </summary>
68818 </param>
68819 </interface>
68820 -<interface name="xserver_delete_log" lineno="1224">
68821 +<interface name="xserver_delete_log" lineno="1197">
68822 <summary>
68823 Delete X server log files.
68824 </summary>
68825 @@ -111634,7 +112540,7 @@ Domain allowed access.
68826 </summary>
68827 </param>
68828 </interface>
68829 -<interface name="xserver_read_xkb_libs" lineno="1245">
68830 +<interface name="xserver_read_xkb_libs" lineno="1218">
68831 <summary>
68832 Read X keyboard extension libraries.
68833 </summary>
68834 @@ -111644,7 +112550,7 @@ Domain allowed access.
68835 </summary>
68836 </param>
68837 </interface>
68838 -<interface name="xserver_create_xdm_tmp_dirs" lineno="1266">
68839 +<interface name="xserver_create_xdm_tmp_dirs" lineno="1239">
68840 <summary>
68841 Create xdm temporary directories.
68842 </summary>
68843 @@ -111654,7 +112560,7 @@ Domain to allow access.
68844 </summary>
68845 </param>
68846 </interface>
68847 -<interface name="xserver_read_xdm_tmp_files" lineno="1284">
68848 +<interface name="xserver_read_xdm_tmp_files" lineno="1257">
68849 <summary>
68850 Read xdm temporary files.
68851 </summary>
68852 @@ -111664,7 +112570,7 @@ Domain allowed access.
68853 </summary>
68854 </param>
68855 </interface>
68856 -<interface name="xserver_dontaudit_read_xdm_tmp_files" lineno="1303">
68857 +<interface name="xserver_dontaudit_read_xdm_tmp_files" lineno="1276">
68858 <summary>
68859 Do not audit attempts to read xdm temporary files.
68860 </summary>
68861 @@ -111674,7 +112580,7 @@ Domain to not audit.
68862 </summary>
68863 </param>
68864 </interface>
68865 -<interface name="xserver_rw_xdm_tmp_files" lineno="1322">
68866 +<interface name="xserver_rw_xdm_tmp_files" lineno="1295">
68867 <summary>
68868 Read write xdm temporary files.
68869 </summary>
68870 @@ -111684,7 +112590,7 @@ Domain allowed access.
68871 </summary>
68872 </param>
68873 </interface>
68874 -<interface name="xserver_manage_xdm_tmp_files" lineno="1341">
68875 +<interface name="xserver_manage_xdm_tmp_files" lineno="1314">
68876 <summary>
68877 Create, read, write, and delete xdm temporary files.
68878 </summary>
68879 @@ -111694,7 +112600,7 @@ Domain allowed access.
68880 </summary>
68881 </param>
68882 </interface>
68883 -<interface name="xserver_dontaudit_getattr_xdm_tmp_sockets" lineno="1360">
68884 +<interface name="xserver_dontaudit_getattr_xdm_tmp_sockets" lineno="1333">
68885 <summary>
68886 Do not audit attempts to get the attributes of
68887 xdm temporary named sockets.
68888 @@ -111705,7 +112611,7 @@ Domain to not audit.
68889 </summary>
68890 </param>
68891 </interface>
68892 -<interface name="xserver_list_xdm_tmp" lineno="1378">
68893 +<interface name="xserver_list_xdm_tmp" lineno="1351">
68894 <summary>
68895 list xdm_tmp_t directories
68896 </summary>
68897 @@ -111715,7 +112621,7 @@ Domain to allow
68898 </summary>
68899 </param>
68900 </interface>
68901 -<interface name="xserver_domtrans" lineno="1396">
68902 +<interface name="xserver_domtrans" lineno="1369">
68903 <summary>
68904 Execute the X server in the X server domain.
68905 </summary>
68906 @@ -111725,7 +112631,7 @@ Domain allowed to transition.
68907 </summary>
68908 </param>
68909 </interface>
68910 -<interface name="xserver_signal" lineno="1415">
68911 +<interface name="xserver_signal" lineno="1388">
68912 <summary>
68913 Signal X servers
68914 </summary>
68915 @@ -111735,7 +112641,7 @@ Domain allowed access.
68916 </summary>
68917 </param>
68918 </interface>
68919 -<interface name="xserver_kill" lineno="1433">
68920 +<interface name="xserver_kill" lineno="1406">
68921 <summary>
68922 Kill X servers
68923 </summary>
68924 @@ -111745,7 +112651,7 @@ Domain allowed access.
68925 </summary>
68926 </param>
68927 </interface>
68928 -<interface name="xserver_read_state" lineno="1451">
68929 +<interface name="xserver_read_state" lineno="1424">
68930 <summary>
68931 Allow reading xserver_t files to get cgroup and sessionid
68932 </summary>
68933 @@ -111755,7 +112661,7 @@ Domain allowed access.
68934 </summary>
68935 </param>
68936 </interface>
68937 -<interface name="xserver_rw_shm" lineno="1471">
68938 +<interface name="xserver_rw_shm" lineno="1444">
68939 <summary>
68940 Read and write X server Sys V Shared
68941 memory segments.
68942 @@ -111766,7 +112672,7 @@ Domain allowed access.
68943 </summary>
68944 </param>
68945 </interface>
68946 -<interface name="xserver_dontaudit_rw_tcp_sockets" lineno="1490">
68947 +<interface name="xserver_dontaudit_rw_tcp_sockets" lineno="1463">
68948 <summary>
68949 Do not audit attempts to read and write to
68950 X server sockets.
68951 @@ -111777,7 +112683,7 @@ Domain to not audit.
68952 </summary>
68953 </param>
68954 </interface>
68955 -<interface name="xserver_dontaudit_rw_stream_sockets" lineno="1509">
68956 +<interface name="xserver_dontaudit_rw_stream_sockets" lineno="1482">
68957 <summary>
68958 Do not audit attempts to read and write X server
68959 unix domain stream sockets.
68960 @@ -111788,7 +112694,7 @@ Domain to not audit.
68961 </summary>
68962 </param>
68963 </interface>
68964 -<interface name="xserver_stream_connect" lineno="1528">
68965 +<interface name="xserver_stream_connect" lineno="1501">
68966 <summary>
68967 Connect to the X server over a unix domain
68968 stream socket.
68969 @@ -111799,7 +112705,7 @@ Domain allowed access.
68970 </summary>
68971 </param>
68972 </interface>
68973 -<interface name="xserver_read_tmp_files" lineno="1547">
68974 +<interface name="xserver_read_tmp_files" lineno="1520">
68975 <summary>
68976 Read X server temporary files.
68977 </summary>
68978 @@ -111809,7 +112715,7 @@ Domain allowed access.
68979 </summary>
68980 </param>
68981 </interface>
68982 -<interface name="xserver_dbus_chat" lineno="1566">
68983 +<interface name="xserver_dbus_chat" lineno="1539">
68984 <summary>
68985 talk to xserver_t by dbus
68986 </summary>
68987 @@ -111819,7 +112725,7 @@ Domain allowed access.
68988 </summary>
68989 </param>
68990 </interface>
68991 -<interface name="xserver_manage_core_devices" lineno="1587">
68992 +<interface name="xserver_manage_core_devices" lineno="1560">
68993 <summary>
68994 Interface to provide X object permissions on a given X server to
68995 an X client domain. Gives the domain permission to read the
68996 @@ -111831,7 +112737,7 @@ Domain allowed access.
68997 </summary>
68998 </param>
68999 </interface>
69000 -<interface name="xserver_unconfined" lineno="1610">
69001 +<interface name="xserver_unconfined" lineno="1583">
69002 <summary>
69003 Interface to provide X object permissions on a given X server to
69004 an X client domain. Gives the domain complete control over the
69005 @@ -111843,7 +112749,7 @@ Domain allowed access.
69006 </summary>
69007 </param>
69008 </interface>
69009 -<interface name="xserver_rw_xdm_keys" lineno="1630">
69010 +<interface name="xserver_rw_xdm_keys" lineno="1603">
69011 <summary>
69012 Manage keys for xdm.
69013 </summary>
69014 @@ -111853,7 +112759,7 @@ Domain allowed access.
69015 </summary>
69016 </param>
69017 </interface>
69018 -<interface name="xserver_link_xdm_keys" lineno="1648">
69019 +<interface name="xserver_link_xdm_keys" lineno="1621">
69020 <summary>
69021 Manage keys for xdm.
69022 </summary>
69023 @@ -111863,7 +112769,7 @@ Domain allowed access.
69024 </summary>
69025 </param>
69026 </interface>
69027 -<interface name="xserver_rw_mesa_shader_cache" lineno="1666">
69028 +<interface name="xserver_rw_mesa_shader_cache" lineno="1639">
69029 <summary>
69030 Read and write the mesa shader cache.
69031 </summary>
69032 @@ -111873,6 +112779,16 @@ Domain allowed access.
69033 </summary>
69034 </param>
69035 </interface>
69036 +<interface name="xserver_manage_mesa_shader_cache" lineno="1660">
69037 +<summary>
69038 +Manage the mesa shader cache.
69039 +</summary>
69040 +<param name="domain">
69041 +<summary>
69042 +Domain allowed access.
69043 +</summary>
69044 +</param>
69045 +</interface>
69046 <tunable name="allow_write_xshm" dftval="false">
69047 <desc>
69048 <p>
69049 @@ -111903,6 +112819,13 @@ Support X userspace object manager
69050 </p>
69051 </desc>
69052 </tunable>
69053 +<tunable name="xserver_allow_dri" dftval="false">
69054 +<desc>
69055 +<p>
69056 +Allow DRI access
69057 +</p>
69058 +</desc>
69059 +</tunable>
69060 </module>
69061 <module name="zabbix" filename="policy/modules/services/zabbix.if">
69062 <summary>Distributed infrastructure monitoring.</summary>
69063 @@ -111949,7 +112872,7 @@ Domain allowed access.
69064 </interface>
69065 <interface name="zabbix_read_pid_files" lineno="91">
69066 <summary>
69067 -Read zabbix pid files.
69068 +Read zabbix pid files. (Deprecated)
69069 </summary>
69070 <param name="domain">
69071 <summary>
69072 @@ -111957,7 +112880,7 @@ Domain allowed access.
69073 </summary>
69074 </param>
69075 </interface>
69076 -<interface name="zabbix_agent_tcp_connect" lineno="110">
69077 +<interface name="zabbix_agent_tcp_connect" lineno="105">
69078 <summary>
69079 Connect to zabbix agent on the TCP network.
69080 </summary>
69081 @@ -111967,7 +112890,7 @@ Domain allowed access.
69082 </summary>
69083 </param>
69084 </interface>
69085 -<interface name="zabbix_admin" lineno="137">
69086 +<interface name="zabbix_admin" lineno="132">
69087 <summary>
69088 All of the rules required to
69089 administrate an zabbix environment.
69090 @@ -112164,7 +113087,7 @@ Type to be used as a domain type.
69091 <interface name="application_executable_file" lineno="36">
69092 <summary>
69093 Make the specified type usable for files
69094 -that are exectuables, such as binary programs.
69095 +that are executables, such as binary programs.
69096 This does not include shared libraries.
69097 </summary>
69098 <param name="type">
69099 @@ -112301,7 +113224,7 @@ Domain allowed access.
69100 </summary>
69101 </param>
69102 </interface>
69103 -<interface name="auth_use_pam_systemd" lineno="103">
69104 +<interface name="auth_use_pam_systemd" lineno="99">
69105 <summary>
69106 Use the pam module systemd during authentication.
69107 </summary>
69108 @@ -112311,7 +113234,7 @@ Domain allowed access.
69109 </summary>
69110 </param>
69111 </interface>
69112 -<interface name="auth_use_pam_motd_dynamic" lineno="120">
69113 +<interface name="auth_use_pam_motd_dynamic" lineno="116">
69114 <summary>
69115 Use the pam module motd with dynamic support during authentication.
69116 This module comes from Ubuntu (https://bugs.launchpad.net/ubuntu/+source/pam/+bug/399071)
69117 @@ -112323,7 +113246,7 @@ Domain allowed access.
69118 </summary>
69119 </param>
69120 </interface>
69121 -<interface name="auth_login_pgm_domain" lineno="144">
69122 +<interface name="auth_login_pgm_domain" lineno="140">
69123 <summary>
69124 Make the specified domain used for a login program.
69125 </summary>
69126 @@ -112333,7 +113256,7 @@ Domain type used for a login program domain.
69127 </summary>
69128 </param>
69129 </interface>
69130 -<interface name="auth_login_entry_type" lineno="231">
69131 +<interface name="auth_login_entry_type" lineno="227">
69132 <summary>
69133 Use the login program as an entry point program.
69134 </summary>
69135 @@ -112343,7 +113266,7 @@ Domain allowed access.
69136 </summary>
69137 </param>
69138 </interface>
69139 -<interface name="auth_domtrans_login_program" lineno="254">
69140 +<interface name="auth_domtrans_login_program" lineno="250">
69141 <summary>
69142 Execute a login_program in the target domain.
69143 </summary>
69144 @@ -112358,7 +113281,7 @@ The type of the login_program process.
69145 </summary>
69146 </param>
69147 </interface>
69148 -<interface name="auth_ranged_domtrans_login_program" lineno="284">
69149 +<interface name="auth_ranged_domtrans_login_program" lineno="280">
69150 <summary>
69151 Execute a login_program in the target domain,
69152 with a range transition.
69153 @@ -112379,7 +113302,7 @@ Range of the login program.
69154 </summary>
69155 </param>
69156 </interface>
69157 -<interface name="auth_search_cache" lineno="310">
69158 +<interface name="auth_search_cache" lineno="306">
69159 <summary>
69160 Search authentication cache
69161 </summary>
69162 @@ -112389,7 +113312,7 @@ Domain allowed access.
69163 </summary>
69164 </param>
69165 </interface>
69166 -<interface name="auth_read_cache" lineno="328">
69167 +<interface name="auth_read_cache" lineno="324">
69168 <summary>
69169 Read authentication cache
69170 </summary>
69171 @@ -112399,7 +113322,7 @@ Domain allowed access.
69172 </summary>
69173 </param>
69174 </interface>
69175 -<interface name="auth_rw_cache" lineno="346">
69176 +<interface name="auth_rw_cache" lineno="342">
69177 <summary>
69178 Read/Write authentication cache
69179 </summary>
69180 @@ -112409,7 +113332,7 @@ Domain allowed access.
69181 </summary>
69182 </param>
69183 </interface>
69184 -<interface name="auth_manage_cache" lineno="364">
69185 +<interface name="auth_manage_cache" lineno="360">
69186 <summary>
69187 Manage authentication cache
69188 </summary>
69189 @@ -112419,7 +113342,7 @@ Domain allowed access.
69190 </summary>
69191 </param>
69192 </interface>
69193 -<interface name="auth_var_filetrans_cache" lineno="383">
69194 +<interface name="auth_var_filetrans_cache" lineno="379">
69195 <summary>
69196 Automatic transition from cache_t to cache.
69197 </summary>
69198 @@ -112429,7 +113352,7 @@ Domain allowed access.
69199 </summary>
69200 </param>
69201 </interface>
69202 -<interface name="auth_domtrans_chk_passwd" lineno="401">
69203 +<interface name="auth_domtrans_chk_passwd" lineno="397">
69204 <summary>
69205 Run unix_chkpwd to check a password.
69206 </summary>
69207 @@ -112439,7 +113362,7 @@ Domain allowed to transition.
69208 </summary>
69209 </param>
69210 </interface>
69211 -<interface name="auth_domtrans_chkpwd" lineno="449">
69212 +<interface name="auth_domtrans_chkpwd" lineno="445">
69213 <summary>
69214 Run unix_chkpwd to check a password.
69215 Stripped down version to be called within boolean
69216 @@ -112450,7 +113373,7 @@ Domain allowed to transition.
69217 </summary>
69218 </param>
69219 </interface>
69220 -<interface name="auth_run_chk_passwd" lineno="475">
69221 +<interface name="auth_run_chk_passwd" lineno="471">
69222 <summary>
69223 Execute chkpwd programs in the chkpwd domain.
69224 </summary>
69225 @@ -112465,7 +113388,7 @@ The role to allow the chkpwd domain.
69226 </summary>
69227 </param>
69228 </interface>
69229 -<interface name="auth_domtrans_upd_passwd" lineno="494">
69230 +<interface name="auth_domtrans_upd_passwd" lineno="490">
69231 <summary>
69232 Execute a domain transition to run unix_update.
69233 </summary>
69234 @@ -112475,7 +113398,7 @@ Domain allowed to transition.
69235 </summary>
69236 </param>
69237 </interface>
69238 -<interface name="auth_run_upd_passwd" lineno="519">
69239 +<interface name="auth_run_upd_passwd" lineno="515">
69240 <summary>
69241 Execute updpwd programs in the updpwd domain.
69242 </summary>
69243 @@ -112490,7 +113413,7 @@ The role to allow the updpwd domain.
69244 </summary>
69245 </param>
69246 </interface>
69247 -<interface name="auth_getattr_shadow" lineno="538">
69248 +<interface name="auth_getattr_shadow" lineno="534">
69249 <summary>
69250 Get the attributes of the shadow passwords file.
69251 </summary>
69252 @@ -112500,7 +113423,7 @@ Domain allowed access.
69253 </summary>
69254 </param>
69255 </interface>
69256 -<interface name="auth_dontaudit_getattr_shadow" lineno="558">
69257 +<interface name="auth_dontaudit_getattr_shadow" lineno="554">
69258 <summary>
69259 Do not audit attempts to get the attributes
69260 of the shadow passwords file.
69261 @@ -112511,7 +113434,7 @@ Domain to not audit.
69262 </summary>
69263 </param>
69264 </interface>
69265 -<interface name="auth_read_shadow" lineno="580">
69266 +<interface name="auth_read_shadow" lineno="576">
69267 <summary>
69268 Read the shadow passwords file (/etc/shadow)
69269 </summary>
69270 @@ -112521,7 +113444,17 @@ Domain allowed access.
69271 </summary>
69272 </param>
69273 </interface>
69274 -<interface name="auth_can_read_shadow_passwords" lineno="604">
69275 +<interface name="auth_map_shadow" lineno="591">
69276 +<summary>
69277 +Map the shadow passwords file (/etc/shadow)
69278 +</summary>
69279 +<param name="domain">
69280 +<summary>
69281 +Domain allowed access.
69282 +</summary>
69283 +</param>
69284 +</interface>
69285 +<interface name="auth_can_read_shadow_passwords" lineno="617">
69286 <summary>
69287 Pass shadow assertion for reading.
69288 </summary>
69289 @@ -112540,7 +113473,7 @@ Domain allowed access.
69290 </summary>
69291 </param>
69292 </interface>
69293 -<interface name="auth_tunable_read_shadow" lineno="630">
69294 +<interface name="auth_tunable_read_shadow" lineno="643">
69295 <summary>
69296 Read the shadow password file.
69297 </summary>
69298 @@ -112558,7 +113491,7 @@ Domain allowed access.
69299 </summary>
69300 </param>
69301 </interface>
69302 -<interface name="auth_dontaudit_read_shadow" lineno="650">
69303 +<interface name="auth_dontaudit_read_shadow" lineno="663">
69304 <summary>
69305 Do not audit attempts to read the shadow
69306 password file (/etc/shadow).
69307 @@ -112569,7 +113502,7 @@ Domain to not audit.
69308 </summary>
69309 </param>
69310 </interface>
69311 -<interface name="auth_rw_shadow" lineno="668">
69312 +<interface name="auth_rw_shadow" lineno="681">
69313 <summary>
69314 Read and write the shadow password file (/etc/shadow).
69315 </summary>
69316 @@ -112579,7 +113512,7 @@ Domain allowed access.
69317 </summary>
69318 </param>
69319 </interface>
69320 -<interface name="auth_manage_shadow" lineno="690">
69321 +<interface name="auth_manage_shadow" lineno="703">
69322 <summary>
69323 Create, read, write, and delete the shadow
69324 password file.
69325 @@ -112590,7 +113523,7 @@ Domain allowed access.
69326 </summary>
69327 </param>
69328 </interface>
69329 -<interface name="auth_etc_filetrans_shadow" lineno="710">
69330 +<interface name="auth_etc_filetrans_shadow" lineno="723">
69331 <summary>
69332 Automatic transition from etc to shadow.
69333 </summary>
69334 @@ -112600,7 +113533,7 @@ Domain allowed access.
69335 </summary>
69336 </param>
69337 </interface>
69338 -<interface name="auth_relabelto_shadow" lineno="729">
69339 +<interface name="auth_relabelto_shadow" lineno="742">
69340 <summary>
69341 Relabel to the shadow
69342 password file type.
69343 @@ -112611,7 +113544,7 @@ Domain allowed access.
69344 </summary>
69345 </param>
69346 </interface>
69347 -<interface name="auth_relabel_shadow" lineno="751">
69348 +<interface name="auth_relabel_shadow" lineno="764">
69349 <summary>
69350 Relabel from and to the shadow
69351 password file type.
69352 @@ -112622,7 +113555,7 @@ Domain allowed access.
69353 </summary>
69354 </param>
69355 </interface>
69356 -<interface name="auth_append_faillog" lineno="772">
69357 +<interface name="auth_append_faillog" lineno="785">
69358 <summary>
69359 Append to the login failure log.
69360 </summary>
69361 @@ -112632,7 +113565,7 @@ Domain allowed access.
69362 </summary>
69363 </param>
69364 </interface>
69365 -<interface name="auth_create_faillog_files" lineno="791">
69366 +<interface name="auth_create_faillog_files" lineno="804">
69367 <summary>
69368 Create fail log lock (in /run/faillock).
69369 </summary>
69370 @@ -112642,7 +113575,7 @@ Domain allowed access.
69371 </summary>
69372 </param>
69373 </interface>
69374 -<interface name="auth_rw_faillog" lineno="809">
69375 +<interface name="auth_rw_faillog" lineno="822">
69376 <summary>
69377 Read and write the login failure log.
69378 </summary>
69379 @@ -112652,7 +113585,7 @@ Domain allowed access.
69380 </summary>
69381 </param>
69382 </interface>
69383 -<interface name="auth_manage_faillog" lineno="828">
69384 +<interface name="auth_manage_faillog" lineno="841">
69385 <summary>
69386 Manage the login failure logs.
69387 </summary>
69388 @@ -112662,7 +113595,7 @@ Domain allowed access.
69389 </summary>
69390 </param>
69391 </interface>
69392 -<interface name="auth_setattr_faillog_files" lineno="847">
69393 +<interface name="auth_setattr_faillog_files" lineno="860">
69394 <summary>
69395 Setattr the login failure logs.
69396 </summary>
69397 @@ -112672,7 +113605,7 @@ Domain allowed access.
69398 </summary>
69399 </param>
69400 </interface>
69401 -<interface name="auth_read_lastlog" lineno="866">
69402 +<interface name="auth_read_lastlog" lineno="879">
69403 <summary>
69404 Read the last logins log.
69405 </summary>
69406 @@ -112683,7 +113616,7 @@ Domain allowed access.
69407 </param>
69408 <rolecap/>
69409 </interface>
69410 -<interface name="auth_append_lastlog" lineno="885">
69411 +<interface name="auth_append_lastlog" lineno="898">
69412 <summary>
69413 Append only to the last logins log.
69414 </summary>
69415 @@ -112693,7 +113626,7 @@ Domain allowed access.
69416 </summary>
69417 </param>
69418 </interface>
69419 -<interface name="auth_relabel_lastlog" lineno="904">
69420 +<interface name="auth_relabel_lastlog" lineno="917">
69421 <summary>
69422 relabel the last logins log.
69423 </summary>
69424 @@ -112703,7 +113636,7 @@ Domain allowed access.
69425 </summary>
69426 </param>
69427 </interface>
69428 -<interface name="auth_rw_lastlog" lineno="923">
69429 +<interface name="auth_rw_lastlog" lineno="936">
69430 <summary>
69431 Read and write to the last logins log.
69432 </summary>
69433 @@ -112713,7 +113646,7 @@ Domain allowed access.
69434 </summary>
69435 </param>
69436 </interface>
69437 -<interface name="auth_manage_lastlog" lineno="942">
69438 +<interface name="auth_manage_lastlog" lineno="955">
69439 <summary>
69440 Manage the last logins log.
69441 </summary>
69442 @@ -112723,7 +113656,7 @@ Domain allowed access.
69443 </summary>
69444 </param>
69445 </interface>
69446 -<interface name="auth_domtrans_pam" lineno="961">
69447 +<interface name="auth_domtrans_pam" lineno="974">
69448 <summary>
69449 Execute pam programs in the pam domain.
69450 </summary>
69451 @@ -112733,7 +113666,7 @@ Domain allowed to transition.
69452 </summary>
69453 </param>
69454 </interface>
69455 -<interface name="auth_signal_pam" lineno="979">
69456 +<interface name="auth_signal_pam" lineno="992">
69457 <summary>
69458 Send generic signals to pam processes.
69459 </summary>
69460 @@ -112743,7 +113676,7 @@ Domain allowed access.
69461 </summary>
69462 </param>
69463 </interface>
69464 -<interface name="auth_run_pam" lineno="1002">
69465 +<interface name="auth_run_pam" lineno="1015">
69466 <summary>
69467 Execute pam programs in the PAM domain.
69468 </summary>
69469 @@ -112758,7 +113691,7 @@ The role to allow the PAM domain.
69470 </summary>
69471 </param>
69472 </interface>
69473 -<interface name="auth_exec_pam" lineno="1021">
69474 +<interface name="auth_exec_pam" lineno="1034">
69475 <summary>
69476 Execute the pam program.
69477 </summary>
69478 @@ -112768,7 +113701,7 @@ Domain allowed access.
69479 </summary>
69480 </param>
69481 </interface>
69482 -<interface name="auth_read_var_auth" lineno="1040">
69483 +<interface name="auth_read_var_auth" lineno="1053">
69484 <summary>
69485 Read var auth files. Used by various other applications
69486 and pam applets etc.
69487 @@ -112779,7 +113712,7 @@ Domain allowed access.
69488 </summary>
69489 </param>
69490 </interface>
69491 -<interface name="auth_rw_var_auth" lineno="1060">
69492 +<interface name="auth_rw_var_auth" lineno="1073">
69493 <summary>
69494 Read and write var auth files. Used by various other applications
69495 and pam applets etc.
69496 @@ -112790,7 +113723,7 @@ Domain allowed access.
69497 </summary>
69498 </param>
69499 </interface>
69500 -<interface name="auth_manage_var_auth" lineno="1080">
69501 +<interface name="auth_manage_var_auth" lineno="1093">
69502 <summary>
69503 Manage var auth files. Used by various other applications
69504 and pam applets etc.
69505 @@ -112801,9 +113734,9 @@ Domain allowed access.
69506 </summary>
69507 </param>
69508 </interface>
69509 -<interface name="auth_read_pam_pid" lineno="1101">
69510 +<interface name="auth_read_pam_pid" lineno="1114">
69511 <summary>
69512 -Read PAM PID files.
69513 +Read PAM PID files. (Deprecated)
69514 </summary>
69515 <param name="domain">
69516 <summary>
69517 @@ -112811,9 +113744,9 @@ Domain allowed access.
69518 </summary>
69519 </param>
69520 </interface>
69521 -<interface name="auth_dontaudit_read_pam_pid" lineno="1121">
69522 +<interface name="auth_dontaudit_read_pam_pid" lineno="1129">
69523 <summary>
69524 -Do not audit attemps to read PAM PID files.
69525 +Do not audit attempts to read PAM PID files. (Deprecated)
69526 </summary>
69527 <param name="domain">
69528 <summary>
69529 @@ -112821,12 +113754,64 @@ Domain to not audit.
69530 </summary>
69531 </param>
69532 </interface>
69533 -<interface name="auth_pid_filetrans_pam_var_run" lineno="1152">
69534 +<interface name="auth_pid_filetrans_pam_var_run" lineno="1157">
69535 <summary>
69536 Create specified objects in
69537 pid directories with the pam var
69538 run file type using a
69539 -file type transition.
69540 +file type transition. (Deprecated)
69541 +</summary>
69542 +<param name="domain">
69543 +<summary>
69544 +Domain allowed access.
69545 +</summary>
69546 +</param>
69547 +<param name="object_class">
69548 +<summary>
69549 +Class of the object being created.
69550 +</summary>
69551 +</param>
69552 +<param name="name" optional="true">
69553 +<summary>
69554 +The name of the object being created.
69555 +</summary>
69556 +</param>
69557 +</interface>
69558 +<interface name="auth_delete_pam_pid" lineno="1172">
69559 +<summary>
69560 +Delete pam PID files. (Deprecated)
69561 +</summary>
69562 +<param name="domain">
69563 +<summary>
69564 +Domain allowed access.
69565 +</summary>
69566 +</param>
69567 +</interface>
69568 +<interface name="auth_manage_pam_pid" lineno="1187">
69569 +<summary>
69570 +Manage pam PID files. (Deprecated)
69571 +</summary>
69572 +<param name="domain">
69573 +<summary>
69574 +Domain allowed access.
69575 +</summary>
69576 +</param>
69577 +</interface>
69578 +<interface name="auth_manage_pam_runtime_dirs" lineno="1203">
69579 +<summary>
69580 +Manage pam runtime dirs.
69581 +</summary>
69582 +<param name="domain">
69583 +<summary>
69584 +Domain allowed access.
69585 +</summary>
69586 +</param>
69587 +</interface>
69588 +<interface name="auth_runtime_filetrans_pam_runtime" lineno="1234">
69589 +<summary>
69590 +Create specified objects in
69591 +pid directories with the pam runtime
69592 +file type using a type transition.
69593 </summary>
69594 <param name="domain">
69595 <summary>
69596 @@ -112844,9 +113829,9 @@ The name of the object being created.
69597 </summary>
69598 </param>
69599 </interface>
69600 -<interface name="auth_delete_pam_pid" lineno="1170">
69601 +<interface name="auth_read_pam_runtime_files" lineno="1252">
69602 <summary>
69603 -Delete pam PID files.
69604 +Read PAM runtime files.
69605 </summary>
69606 <param name="domain">
69607 <summary>
69608 @@ -112854,9 +113839,29 @@ Domain allowed access.
69609 </summary>
69610 </param>
69611 </interface>
69612 -<interface name="auth_manage_pam_pid" lineno="1190">
69613 +<interface name="auth_dontaudit_read_pam_runtime_files" lineno="1272">
69614 <summary>
69615 -Manage pam PID files.
69616 +Do not audit attempts to read PAM runtime files.
69617 +</summary>
69618 +<param name="domain">
69619 +<summary>
69620 +Domain to not audit.
69621 +</summary>
69622 +</param>
69623 +</interface>
69624 +<interface name="auth_delete_pam_runtime_files" lineno="1290">
69625 +<summary>
69626 +Delete pam runtime files.
69627 +</summary>
69628 +<param name="domain">
69629 +<summary>
69630 +Domain allowed access.
69631 +</summary>
69632 +</param>
69633 +</interface>
69634 +<interface name="auth_manage_pam_runtime_files" lineno="1309">
69635 +<summary>
69636 +Create, read, write, and delete pam runtime files.
69637 </summary>
69638 <param name="domain">
69639 <summary>
69640 @@ -112864,7 +113869,7 @@ Domain allowed access.
69641 </summary>
69642 </param>
69643 </interface>
69644 -<interface name="auth_domtrans_pam_console" lineno="1210">
69645 +<interface name="auth_domtrans_pam_console" lineno="1328">
69646 <summary>
69647 Execute pam_console with a domain transition.
69648 </summary>
69649 @@ -112874,7 +113879,7 @@ Domain allowed to transition.
69650 </summary>
69651 </param>
69652 </interface>
69653 -<interface name="auth_search_pam_console_data" lineno="1229">
69654 +<interface name="auth_search_pam_console_data" lineno="1347">
69655 <summary>
69656 Search the contents of the
69657 pam_console data directory.
69658 @@ -112885,7 +113890,7 @@ Domain allowed access.
69659 </summary>
69660 </param>
69661 </interface>
69662 -<interface name="auth_list_pam_console_data" lineno="1249">
69663 +<interface name="auth_list_pam_console_data" lineno="1367">
69664 <summary>
69665 List the contents of the pam_console
69666 data directory.
69667 @@ -112896,7 +113901,7 @@ Domain allowed access.
69668 </summary>
69669 </param>
69670 </interface>
69671 -<interface name="auth_create_pam_console_data_dirs" lineno="1268">
69672 +<interface name="auth_create_pam_console_data_dirs" lineno="1386">
69673 <summary>
69674 Create pam var console pid directories.
69675 </summary>
69676 @@ -112906,7 +113911,7 @@ Domain allowed access.
69677 </summary>
69678 </param>
69679 </interface>
69680 -<interface name="auth_relabel_pam_console_data_dirs" lineno="1287">
69681 +<interface name="auth_relabel_pam_console_data_dirs" lineno="1405">
69682 <summary>
69683 Relabel pam_console data directories.
69684 </summary>
69685 @@ -112916,7 +113921,7 @@ Domain allowed access.
69686 </summary>
69687 </param>
69688 </interface>
69689 -<interface name="auth_read_pam_console_data" lineno="1305">
69690 +<interface name="auth_read_pam_console_data" lineno="1423">
69691 <summary>
69692 Read pam_console data files.
69693 </summary>
69694 @@ -112926,7 +113931,7 @@ Domain allowed access.
69695 </summary>
69696 </param>
69697 </interface>
69698 -<interface name="auth_manage_pam_console_data" lineno="1326">
69699 +<interface name="auth_manage_pam_console_data" lineno="1444">
69700 <summary>
69701 Create, read, write, and delete
69702 pam_console data files.
69703 @@ -112937,7 +113942,7 @@ Domain allowed access.
69704 </summary>
69705 </param>
69706 </interface>
69707 -<interface name="auth_delete_pam_console_data" lineno="1346">
69708 +<interface name="auth_delete_pam_console_data" lineno="1464">
69709 <summary>
69710 Delete pam_console data.
69711 </summary>
69712 @@ -112947,11 +113952,34 @@ Domain allowed access.
69713 </summary>
69714 </param>
69715 </interface>
69716 -<interface name="auth_pid_filetrans_pam_var_console" lineno="1379">
69717 +<interface name="auth_pid_filetrans_pam_var_console" lineno="1497">
69718 <summary>
69719 Create specified objects in
69720 pid directories with the pam var
69721 console pid file type using a
69722 +file type transition. (Deprecated)
69723 +</summary>
69724 +<param name="domain">
69725 +<summary>
69726 +Domain allowed access.
69727 +</summary>
69728 +</param>
69729 +<param name="object_class">
69730 +<summary>
69731 +Class of the object being created.
69732 +</summary>
69733 +</param>
69734 +<param name="name" optional="true">
69735 +<summary>
69736 +The name of the object being created.
69737 +</summary>
69738 +</param>
69739 +</interface>
69740 +<interface name="auth_runtime_filetrans_pam_var_console" lineno="1525">
69741 +<summary>
69742 +Create specified objects in generic
69743 +runtime directories with the pam var
69744 +console runtime file type using a
69745 file type transition.
69746 </summary>
69747 <param name="domain">
69748 @@ -112970,7 +113998,7 @@ The name of the object being created.
69749 </summary>
69750 </param>
69751 </interface>
69752 -<interface name="auth_domtrans_utempter" lineno="1397">
69753 +<interface name="auth_domtrans_utempter" lineno="1543">
69754 <summary>
69755 Execute utempter programs in the utempter domain.
69756 </summary>
69757 @@ -112980,7 +114008,7 @@ Domain allowed to transition.
69758 </summary>
69759 </param>
69760 </interface>
69761 -<interface name="auth_run_utempter" lineno="1420">
69762 +<interface name="auth_run_utempter" lineno="1566">
69763 <summary>
69764 Execute utempter programs in the utempter domain.
69765 </summary>
69766 @@ -112995,9 +114023,9 @@ The role to allow the utempter domain.
69767 </summary>
69768 </param>
69769 </interface>
69770 -<interface name="auth_dontaudit_exec_utempter" lineno="1439">
69771 +<interface name="auth_dontaudit_exec_utempter" lineno="1585">
69772 <summary>
69773 -Do not audit attemps to execute utempter executable.
69774 +Do not audit attempts to execute utempter executable.
69775 </summary>
69776 <param name="domain">
69777 <summary>
69778 @@ -113005,7 +114033,7 @@ Domain to not audit.
69779 </summary>
69780 </param>
69781 </interface>
69782 -<interface name="auth_setattr_login_records" lineno="1457">
69783 +<interface name="auth_setattr_login_records" lineno="1603">
69784 <summary>
69785 Set the attributes of login record files.
69786 </summary>
69787 @@ -113015,7 +114043,7 @@ Domain allowed access.
69788 </summary>
69789 </param>
69790 </interface>
69791 -<interface name="auth_read_login_records" lineno="1477">
69792 +<interface name="auth_read_login_records" lineno="1623">
69793 <summary>
69794 Read login records files (/var/log/wtmp).
69795 </summary>
69796 @@ -113026,7 +114054,7 @@ Domain allowed access.
69797 </param>
69798 <rolecap/>
69799 </interface>
69800 -<interface name="auth_dontaudit_read_login_records" lineno="1498">
69801 +<interface name="auth_dontaudit_read_login_records" lineno="1644">
69802 <summary>
69803 Do not audit attempts to read login records
69804 files (/var/log/wtmp).
69805 @@ -113038,7 +114066,7 @@ Domain to not audit.
69806 </param>
69807 <rolecap/>
69808 </interface>
69809 -<interface name="auth_dontaudit_write_login_records" lineno="1517">
69810 +<interface name="auth_dontaudit_write_login_records" lineno="1663">
69811 <summary>
69812 Do not audit attempts to write to
69813 login records files.
69814 @@ -113049,7 +114077,7 @@ Domain to not audit.
69815 </summary>
69816 </param>
69817 </interface>
69818 -<interface name="auth_append_login_records" lineno="1535">
69819 +<interface name="auth_append_login_records" lineno="1681">
69820 <summary>
69821 Append to login records (wtmp).
69822 </summary>
69823 @@ -113059,7 +114087,7 @@ Domain allowed access.
69824 </summary>
69825 </param>
69826 </interface>
69827 -<interface name="auth_write_login_records" lineno="1554">
69828 +<interface name="auth_write_login_records" lineno="1700">
69829 <summary>
69830 Write to login records (wtmp).
69831 </summary>
69832 @@ -113069,7 +114097,7 @@ Domain allowed access.
69833 </summary>
69834 </param>
69835 </interface>
69836 -<interface name="auth_rw_login_records" lineno="1572">
69837 +<interface name="auth_rw_login_records" lineno="1718">
69838 <summary>
69839 Read and write login records.
69840 </summary>
69841 @@ -113079,7 +114107,7 @@ Domain allowed access.
69842 </summary>
69843 </param>
69844 </interface>
69845 -<interface name="auth_log_filetrans_login_records" lineno="1592">
69846 +<interface name="auth_log_filetrans_login_records" lineno="1738">
69847 <summary>
69848 Create a login records in the log directory
69849 using a type transition.
69850 @@ -113090,7 +114118,7 @@ Domain allowed access.
69851 </summary>
69852 </param>
69853 </interface>
69854 -<interface name="auth_manage_login_records" lineno="1611">
69855 +<interface name="auth_manage_login_records" lineno="1757">
69856 <summary>
69857 Create, read, write, and delete login
69858 records files.
69859 @@ -113101,7 +114129,7 @@ Domain allowed access.
69860 </summary>
69861 </param>
69862 </interface>
69863 -<interface name="auth_relabel_login_records" lineno="1630">
69864 +<interface name="auth_relabel_login_records" lineno="1776">
69865 <summary>
69866 Relabel login record files.
69867 </summary>
69868 @@ -113111,7 +114139,7 @@ Domain allowed access.
69869 </summary>
69870 </param>
69871 </interface>
69872 -<interface name="auth_use_nsswitch" lineno="1658">
69873 +<interface name="auth_use_nsswitch" lineno="1804">
69874 <summary>
69875 Use nsswitch to look up user, password, group, or
69876 host information.
69877 @@ -113131,7 +114159,7 @@ Domain allowed access.
69878 </param>
69879 <infoflow type="both" weight="10"/>
69880 </interface>
69881 -<interface name="auth_unconfined" lineno="1686">
69882 +<interface name="auth_unconfined" lineno="1832">
69883 <summary>
69884 Unconfined access to the authlogin module.
69885 </summary>
69886 @@ -113612,105 +114640,6 @@ Domain allowed access.
69887 <rolecap/>
69888 </interface>
69889 </module>
69890 -<module name="hotplug" filename="policy/modules/system/hotplug.if">
69891 -<summary>
69892 -Policy for hotplug system, for supporting the
69893 -connection and disconnection of devices at runtime.
69894 -</summary>
69895 -<interface name="hotplug_domtrans" lineno="16">
69896 -<summary>
69897 -Execute hotplug with a domain transition.
69898 -</summary>
69899 -<param name="domain">
69900 -<summary>
69901 -Domain allowed to transition.
69902 -</summary>
69903 -</param>
69904 -</interface>
69905 -<interface name="hotplug_exec" lineno="35">
69906 -<summary>
69907 -Execute hotplug in the caller domain.
69908 -</summary>
69909 -<param name="domain">
69910 -<summary>
69911 -Domain allowed access.
69912 -</summary>
69913 -</param>
69914 -</interface>
69915 -<interface name="hotplug_use_fds" lineno="54">
69916 -<summary>
69917 -Inherit and use hotplug file descriptors.
69918 -</summary>
69919 -<param name="domain">
69920 -<summary>
69921 -Domain allowed access.
69922 -</summary>
69923 -</param>
69924 -</interface>
69925 -<interface name="hotplug_dontaudit_use_fds" lineno="73">
69926 -<summary>
69927 -Do not audit attempts to inherit
69928 -hotplug file descriptors.
69929 -</summary>
69930 -<param name="domain">
69931 -<summary>
69932 -Domain to not audit.
69933 -</summary>
69934 -</param>
69935 -</interface>
69936 -<interface name="hotplug_dontaudit_search_config" lineno="92">
69937 -<summary>
69938 -Do not audit attempts to search the
69939 -hotplug configuration directories.
69940 -</summary>
69941 -<param name="domain">
69942 -<summary>
69943 -Domain to not audit.
69944 -</summary>
69945 -</param>
69946 -</interface>
69947 -<interface name="hotplug_getattr_config_dirs" lineno="110">
69948 -<summary>
69949 -Get the attributes of the hotplug configuration directory.
69950 -</summary>
69951 -<param name="domain">
69952 -<summary>
69953 -Domain allowed access.
69954 -</summary>
69955 -</param>
69956 -</interface>
69957 -<interface name="hotplug_search_config" lineno="128">
69958 -<summary>
69959 -Search the hotplug configuration directory.
69960 -</summary>
69961 -<param name="domain">
69962 -<summary>
69963 -Domain allowed access.
69964 -</summary>
69965 -</param>
69966 -</interface>
69967 -<interface name="hotplug_read_config" lineno="147">
69968 -<summary>
69969 -Read the configuration files for hotplug.
69970 -</summary>
69971 -<param name="domain">
69972 -<summary>
69973 -Domain allowed access.
69974 -</summary>
69975 -</param>
69976 -<rolecap/>
69977 -</interface>
69978 -<interface name="hotplug_search_pids" lineno="168">
69979 -<summary>
69980 -Search the hotplug PIDs.
69981 -</summary>
69982 -<param name="domain">
69983 -<summary>
69984 -Domain allowed access.
69985 -</summary>
69986 -</param>
69987 -</interface>
69988 -</module>
69989 <module name="init" filename="policy/modules/system/init.if">
69990 <summary>System initialization programs (init and init scripts).</summary>
69991 <interface name="init_mountpoint" lineno="17">
69992 @@ -113894,7 +114823,7 @@ Type of the program to be used as an entry point to this domain.
69993 </param>
69994 <infoflow type="read" weight="10"/>
69995 </interface>
69996 -<interface name="init_ranged_daemon_domain" lineno="412">
69997 +<interface name="init_ranged_daemon_domain" lineno="415">
69998 <summary>
69999 Create a domain for long running processes
70000 (daemons/services) which are started by init scripts,
70001 @@ -113936,7 +114865,7 @@ MLS/MCS range for the domain.
70002 </param>
70003 <infoflow type="read" weight="10"/>
70004 </interface>
70005 -<interface name="init_abstract_socket_activation" lineno="443">
70006 +<interface name="init_abstract_socket_activation" lineno="446">
70007 <summary>
70008 Abstract socket service activation (systemd).
70009 </summary>
70010 @@ -113946,7 +114875,7 @@ The domain to be started by systemd socket activation.
70011 </summary>
70012 </param>
70013 </interface>
70014 -<interface name="init_named_socket_activation" lineno="468">
70015 +<interface name="init_named_socket_activation" lineno="471">
70016 <summary>
70017 Named socket service activation (systemd).
70018 </summary>
70019 @@ -113961,7 +114890,7 @@ The domain socket file type.
70020 </summary>
70021 </param>
70022 </interface>
70023 -<interface name="init_system_domain" lineno="519">
70024 +<interface name="init_system_domain" lineno="522">
70025 <summary>
70026 Create a domain for short running processes
70027 which are started by init scripts.
70028 @@ -113998,7 +114927,7 @@ Type of the program to be used as an entry point to this domain.
70029 </param>
70030 <infoflow type="read" weight="10"/>
70031 </interface>
70032 -<interface name="init_ranged_system_domain" lineno="581">
70033 +<interface name="init_ranged_system_domain" lineno="584">
70034 <summary>
70035 Create a domain for short running processes
70036 which are started by init scripts.
70037 @@ -114041,7 +114970,7 @@ Range for the domain.
70038 </param>
70039 <infoflow type="read" weight="10"/>
70040 </interface>
70041 -<interface name="init_dyntrans" lineno="612">
70042 +<interface name="init_dyntrans" lineno="615">
70043 <summary>
70044 Allow domain dyntransition to init_t domain.
70045 </summary>
70046 @@ -114051,9 +114980,30 @@ Domain allowed to transition.
70047 </summary>
70048 </param>
70049 </interface>
70050 -<interface name="init_daemon_pid_file" lineno="641">
70051 +<interface name="init_daemon_pid_file" lineno="644">
70052 <summary>
70053 Mark the file type as a daemon pid file, allowing initrc_t
70054 +to create it (Deprecated)
70055 +</summary>
70056 +<param name="filetype">
70057 +<summary>
70058 +Type to mark as a daemon pid file
70059 +</summary>
70060 +</param>
70061 +<param name="class">
70062 +<summary>
70063 +Class on which the type is applied
70064 +</summary>
70065 +</param>
70066 +<param name="filename">
70067 +<summary>
70068 +Filename of the file that the init script creates
70069 +</summary>
70070 +</param>
70071 +</interface>
70072 +<interface name="init_daemon_runtime_file" lineno="671">
70073 +<summary>
70074 +Mark the file type as a daemon runtime file, allowing initrc_t
70075 to create it
70076 </summary>
70077 <param name="filetype">
70078 @@ -114072,7 +115022,7 @@ Filename of the file that the init script creates
70079 </summary>
70080 </param>
70081 </interface>
70082 -<interface name="init_daemon_lock_file" lineno="674">
70083 +<interface name="init_daemon_lock_file" lineno="704">
70084 <summary>
70085 Mark the file type as a daemon lock file, allowing initrc_t
70086 to create it
70087 @@ -114093,7 +115043,7 @@ Filename of the file that the init script creates
70088 </summary>
70089 </param>
70090 </interface>
70091 -<interface name="init_domtrans" lineno="696">
70092 +<interface name="init_domtrans" lineno="726">
70093 <summary>
70094 Execute init (/sbin/init) with a domain transition.
70095 </summary>
70096 @@ -114103,7 +115053,7 @@ Domain allowed to transition.
70097 </summary>
70098 </param>
70099 </interface>
70100 -<interface name="init_pgm_spec_user_daemon_domain" lineno="720">
70101 +<interface name="init_pgm_spec_user_daemon_domain" lineno="750">
70102 <summary>
70103 Execute init (/sbin/init) with a domain transition
70104 to the provided domain.
70105 @@ -114119,7 +115069,7 @@ The type to be used as a systemd --user domain.
70106 </summary>
70107 </param>
70108 </interface>
70109 -<interface name="init_exec" lineno="748">
70110 +<interface name="init_exec" lineno="778">
70111 <summary>
70112 Execute the init program in the caller domain.
70113 </summary>
70114 @@ -114130,7 +115080,7 @@ Domain allowed access.
70115 </param>
70116 <rolecap/>
70117 </interface>
70118 -<interface name="init_pgm_entrypoint" lineno="769">
70119 +<interface name="init_pgm_entrypoint" lineno="799">
70120 <summary>
70121 Allow the init program to be an entrypoint
70122 for the specified domain.
70123 @@ -114142,7 +115092,7 @@ Domain allowed access.
70124 </param>
70125 <rolecap/>
70126 </interface>
70127 -<interface name="init_exec_rc" lineno="798">
70128 +<interface name="init_exec_rc" lineno="828">
70129 <summary>
70130 Execute the rc application in the caller domain.
70131 </summary>
70132 @@ -114163,7 +115113,7 @@ Domain allowed access.
70133 </summary>
70134 </param>
70135 </interface>
70136 -<interface name="init_getpgid" lineno="817">
70137 +<interface name="init_getpgid" lineno="847">
70138 <summary>
70139 Get the process group of init.
70140 </summary>
70141 @@ -114173,7 +115123,7 @@ Domain allowed access.
70142 </summary>
70143 </param>
70144 </interface>
70145 -<interface name="init_signal" lineno="835">
70146 +<interface name="init_signal" lineno="865">
70147 <summary>
70148 Send init a generic signal.
70149 </summary>
70150 @@ -114183,7 +115133,7 @@ Domain allowed access.
70151 </summary>
70152 </param>
70153 </interface>
70154 -<interface name="init_signull" lineno="853">
70155 +<interface name="init_signull" lineno="883">
70156 <summary>
70157 Send init a null signal.
70158 </summary>
70159 @@ -114193,7 +115143,7 @@ Domain allowed access.
70160 </summary>
70161 </param>
70162 </interface>
70163 -<interface name="init_sigchld" lineno="871">
70164 +<interface name="init_sigchld" lineno="901">
70165 <summary>
70166 Send init a SIGCHLD signal.
70167 </summary>
70168 @@ -114203,9 +115153,20 @@ Domain allowed access.
70169 </summary>
70170 </param>
70171 </interface>
70172 -<interface name="init_stream_connect" lineno="889">
70173 +<interface name="init_stream_connect" lineno="919">
70174 +<summary>
70175 +Connect to init with a unix socket.
70176 +</summary>
70177 +<param name="domain">
70178 +<summary>
70179 +Domain allowed access.
70180 +</summary>
70181 +</param>
70182 +</interface>
70183 +<interface name="init_unix_stream_socket_connectto" lineno="940">
70184 <summary>
70185 Connect to init with a unix socket.
70186 +Without any additional permissions.
70187 </summary>
70188 <param name="domain">
70189 <summary>
70190 @@ -114213,7 +115174,7 @@ Domain allowed access.
70191 </summary>
70192 </param>
70193 </interface>
70194 -<interface name="init_use_fds" lineno="949">
70195 +<interface name="init_use_fds" lineno="998">
70196 <summary>
70197 Inherit and use file descriptors from init.
70198 </summary>
70199 @@ -114263,7 +115224,7 @@ Domain allowed access.
70200 </param>
70201 <infoflow type="read" weight="1"/>
70202 </interface>
70203 -<interface name="init_dontaudit_use_fds" lineno="968">
70204 +<interface name="init_dontaudit_use_fds" lineno="1017">
70205 <summary>
70206 Do not audit attempts to inherit file
70207 descriptors from init.
70208 @@ -114274,7 +115235,7 @@ Domain to not audit.
70209 </summary>
70210 </param>
70211 </interface>
70212 -<interface name="init_dgram_send" lineno="987">
70213 +<interface name="init_dgram_send" lineno="1036">
70214 <summary>
70215 Send messages to init unix datagram sockets.
70216 </summary>
70217 @@ -114285,7 +115246,7 @@ Domain allowed access.
70218 </param>
70219 <rolecap/>
70220 </interface>
70221 -<interface name="init_rw_inherited_stream_socket" lineno="1007">
70222 +<interface name="init_rw_inherited_stream_socket" lineno="1056">
70223 <summary>
70224 Read and write to inherited init unix streams.
70225 </summary>
70226 @@ -114295,7 +115256,7 @@ Domain allowed access.
70227 </summary>
70228 </param>
70229 </interface>
70230 -<interface name="init_rw_stream_sockets" lineno="1026">
70231 +<interface name="init_rw_stream_sockets" lineno="1075">
70232 <summary>
70233 Allow the specified domain to read/write to
70234 init with unix domain stream sockets.
70235 @@ -114306,7 +115267,7 @@ Domain allowed access.
70236 </summary>
70237 </param>
70238 </interface>
70239 -<interface name="init_start_system" lineno="1044">
70240 +<interface name="init_start_system" lineno="1093">
70241 <summary>
70242 start service (systemd).
70243 </summary>
70244 @@ -114316,7 +115277,7 @@ Domain allowed access.
70245 </summary>
70246 </param>
70247 </interface>
70248 -<interface name="init_stop_system" lineno="1062">
70249 +<interface name="init_stop_system" lineno="1111">
70250 <summary>
70251 stop service (systemd).
70252 </summary>
70253 @@ -114326,7 +115287,7 @@ Domain allowed access.
70254 </summary>
70255 </param>
70256 </interface>
70257 -<interface name="init_get_system_status" lineno="1080">
70258 +<interface name="init_get_system_status" lineno="1129">
70259 <summary>
70260 Get all service status (systemd).
70261 </summary>
70262 @@ -114336,7 +115297,7 @@ Domain allowed access.
70263 </summary>
70264 </param>
70265 </interface>
70266 -<interface name="init_enable" lineno="1098">
70267 +<interface name="init_enable" lineno="1147">
70268 <summary>
70269 Enable all systemd services (systemd).
70270 </summary>
70271 @@ -114346,7 +115307,7 @@ Domain allowed access.
70272 </summary>
70273 </param>
70274 </interface>
70275 -<interface name="init_disable" lineno="1116">
70276 +<interface name="init_disable" lineno="1165">
70277 <summary>
70278 Disable all services (systemd).
70279 </summary>
70280 @@ -114356,7 +115317,7 @@ Domain allowed access.
70281 </summary>
70282 </param>
70283 </interface>
70284 -<interface name="init_reload" lineno="1134">
70285 +<interface name="init_reload" lineno="1183">
70286 <summary>
70287 Reload all services (systemd).
70288 </summary>
70289 @@ -114366,7 +115327,7 @@ Domain allowed access.
70290 </summary>
70291 </param>
70292 </interface>
70293 -<interface name="init_reboot_system" lineno="1152">
70294 +<interface name="init_reboot_system" lineno="1201">
70295 <summary>
70296 Reboot the system (systemd).
70297 </summary>
70298 @@ -114376,7 +115337,7 @@ Domain allowed access.
70299 </summary>
70300 </param>
70301 </interface>
70302 -<interface name="init_shutdown_system" lineno="1170">
70303 +<interface name="init_shutdown_system" lineno="1219">
70304 <summary>
70305 Shutdown (halt) the system (systemd).
70306 </summary>
70307 @@ -114386,7 +115347,7 @@ Domain allowed access.
70308 </summary>
70309 </param>
70310 </interface>
70311 -<interface name="init_service_status" lineno="1188">
70312 +<interface name="init_service_status" lineno="1237">
70313 <summary>
70314 Allow specified domain to get init status
70315 </summary>
70316 @@ -114396,7 +115357,7 @@ Domain to allow access.
70317 </summary>
70318 </param>
70319 </interface>
70320 -<interface name="init_service_start" lineno="1207">
70321 +<interface name="init_service_start" lineno="1256">
70322 <summary>
70323 Allow specified domain to get init start
70324 </summary>
70325 @@ -114406,7 +115367,7 @@ Domain to allow access.
70326 </summary>
70327 </param>
70328 </interface>
70329 -<interface name="init_dbus_chat" lineno="1227">
70330 +<interface name="init_dbus_chat" lineno="1276">
70331 <summary>
70332 Send and receive messages from
70333 systemd over dbus.
70334 @@ -114417,7 +115378,7 @@ Domain allowed access.
70335 </summary>
70336 </param>
70337 </interface>
70338 -<interface name="init_read_var_lib_links" lineno="1247">
70339 +<interface name="init_read_var_lib_links" lineno="1296">
70340 <summary>
70341 read/follow symlinks under /var/lib/systemd/
70342 </summary>
70343 @@ -114427,7 +115388,7 @@ Domain allowed access.
70344 </summary>
70345 </param>
70346 </interface>
70347 -<interface name="init_list_var_lib_dirs" lineno="1266">
70348 +<interface name="init_list_var_lib_dirs" lineno="1315">
70349 <summary>
70350 List /var/lib/systemd/ dir
70351 </summary>
70352 @@ -114437,7 +115398,7 @@ Domain allowed access.
70353 </summary>
70354 </param>
70355 </interface>
70356 -<interface name="init_relabel_var_lib_dirs" lineno="1284">
70357 +<interface name="init_relabel_var_lib_dirs" lineno="1333">
70358 <summary>
70359 Relabel dirs in /var/lib/systemd/.
70360 </summary>
70361 @@ -114447,7 +115408,7 @@ Domain allowed access.
70362 </summary>
70363 </param>
70364 </interface>
70365 -<interface name="init_manage_var_lib_files" lineno="1302">
70366 +<interface name="init_manage_var_lib_files" lineno="1351">
70367 <summary>
70368 Manage files in /var/lib/systemd/.
70369 </summary>
70370 @@ -114457,7 +115418,7 @@ Domain allowed access.
70371 </summary>
70372 </param>
70373 </interface>
70374 -<interface name="init_var_lib_filetrans" lineno="1337">
70375 +<interface name="init_var_lib_filetrans" lineno="1386">
70376 <summary>
70377 Create files in /var/lib/systemd
70378 with an automatic type transition.
70379 @@ -114483,9 +115444,9 @@ The name of the object being created.
70380 </summary>
70381 </param>
70382 </interface>
70383 -<interface name="init_search_pids" lineno="1356">
70384 +<interface name="init_search_pids" lineno="1405">
70385 <summary>
70386 -Allow search directory in the /run/systemd directory.
70387 +Allow search directory in the /run/systemd directory. (Deprecated)
70388 </summary>
70389 <param name="domain">
70390 <summary>
70391 @@ -114493,9 +115454,9 @@ Domain allowed access.
70392 </summary>
70393 </param>
70394 </interface>
70395 -<interface name="init_list_pids" lineno="1374">
70396 +<interface name="init_list_pids" lineno="1420">
70397 <summary>
70398 -Allow listing of the /run/systemd directory.
70399 +Allow listing of the /run/systemd directory. (Deprecated)
70400 </summary>
70401 <param name="domain">
70402 <summary>
70403 @@ -114503,9 +115464,9 @@ Domain allowed access.
70404 </summary>
70405 </param>
70406 </interface>
70407 -<interface name="init_manage_pid_symlinks" lineno="1393">
70408 +<interface name="init_manage_pid_symlinks" lineno="1435">
70409 <summary>
70410 -Create symbolic links in the /run/systemd directory.
70411 +Create symbolic links in the /run/systemd directory. (Deprecated)
70412 </summary>
70413 <param name="domain">
70414 <summary>
70415 @@ -114513,9 +115474,9 @@ Domain allowed access.
70416 </summary>
70417 </param>
70418 </interface>
70419 -<interface name="init_create_pid_files" lineno="1411">
70420 +<interface name="init_create_pid_files" lineno="1450">
70421 <summary>
70422 -Create files in the /run/systemd directory.
70423 +Create files in the /run/systemd directory. (Deprecated)
70424 </summary>
70425 <param name="domain">
70426 <summary>
70427 @@ -114523,9 +115484,9 @@ Domain allowed access.
70428 </summary>
70429 </param>
70430 </interface>
70431 -<interface name="init_write_pid_files" lineno="1429">
70432 +<interface name="init_write_pid_files" lineno="1465">
70433 <summary>
70434 -Write files in the /run/systemd directory.
70435 +Write files in the /run/systemd directory. (Deprecated)
70436 </summary>
70437 <param name="domain">
70438 <summary>
70439 @@ -114533,7 +115494,63 @@ Domain allowed access.
70440 </summary>
70441 </param>
70442 </interface>
70443 -<interface name="init_manage_pid_dirs" lineno="1448">
70444 +<interface name="init_manage_pid_dirs" lineno="1481">
70445 +<summary>
70446 +Create, read, write, and delete
70447 +directories in the /run/systemd directory. (Deprecated)
70448 +</summary>
70449 +<param name="domain">
70450 +<summary>
70451 +Domain allowed access.
70452 +</summary>
70453 +</param>
70454 +</interface>
70455 +<interface name="init_pid_filetrans" lineno="1511">
70456 +<summary>
70457 +Create files in an init PID directory. (Deprecated)
70458 +</summary>
70459 +<param name="domain">
70460 +<summary>
70461 +Domain allowed access.
70462 +</summary>
70463 +</param>
70464 +<param name="file_type">
70465 +<summary>
70466 +The type of the object to be created
70467 +</summary>
70468 +</param>
70469 +<param name="object_class">
70470 +<summary>
70471 +The object class.
70472 +</summary>
70473 +</param>
70474 +<param name="name" optional="true">
70475 +<summary>
70476 +The name of the object being created.
70477 +</summary>
70478 +</param>
70479 +</interface>
70480 +<interface name="init_search_runtime" lineno="1526">
70481 +<summary>
70482 +Search init runtime directories, e.g. /run/systemd.
70483 +</summary>
70484 +<param name="domain">
70485 +<summary>
70486 +Domain allowed access.
70487 +</summary>
70488 +</param>
70489 +</interface>
70490 +<interface name="init_list_runtime" lineno="1544">
70491 +<summary>
70492 +List init runtime directories, e.g. /run/systemd.
70493 +</summary>
70494 +<param name="domain">
70495 +<summary>
70496 +Domain allowed access.
70497 +</summary>
70498 +</param>
70499 +</interface>
70500 +<interface name="init_manage_runtime_dirs" lineno="1564">
70501 <summary>
70502 Create, read, write, and delete
70503 directories in the /run/systemd directory.
70504 @@ -114544,9 +115561,9 @@ Domain allowed access.
70505 </summary>
70506 </param>
70507 </interface>
70508 -<interface name="init_pid_filetrans" lineno="1481">
70509 +<interface name="init_runtime_filetrans" lineno="1597">
70510 <summary>
70511 -Create files in an init PID directory.
70512 +Create files in an init runtime directory with a private type.
70513 </summary>
70514 <param name="domain">
70515 <summary>
70516 @@ -114569,7 +115586,37 @@ The name of the object being created.
70517 </summary>
70518 </param>
70519 </interface>
70520 -<interface name="init_getattr_initctl" lineno="1500">
70521 +<interface name="init_write_runtime_files" lineno="1616">
70522 +<summary>
70523 +Write init runtime files, e.g. in /run/systemd.
70524 +</summary>
70525 +<param name="domain">
70526 +<summary>
70527 +Domain allowed access.
70528 +</summary>
70529 +</param>
70530 +</interface>
70531 +<interface name="init_create_runtime_files" lineno="1634">
70532 +<summary>
70533 +Create init runtime files, e.g. in /run/systemd.
70534 +</summary>
70535 +<param name="domain">
70536 +<summary>
70537 +Domain allowed access.
70538 +</summary>
70539 +</param>
70540 +</interface>
70541 +<interface name="init_manage_runtime_symlinks" lineno="1652">
70542 +<summary>
70543 +Create init runtime symbolic links, e.g. in /run/systemd.
70544 +</summary>
70545 +<param name="domain">
70546 +<summary>
70547 +Domain allowed access.
70548 +</summary>
70549 +</param>
70550 +</interface>
70551 +<interface name="init_getattr_initctl" lineno="1670">
70552 <summary>
70553 Get the attributes of initctl.
70554 </summary>
70555 @@ -114579,7 +115626,7 @@ Domain allowed access.
70556 </summary>
70557 </param>
70558 </interface>
70559 -<interface name="init_dontaudit_getattr_initctl" lineno="1521">
70560 +<interface name="init_dontaudit_getattr_initctl" lineno="1691">
70561 <summary>
70562 Do not audit attempts to get the
70563 attributes of initctl.
70564 @@ -114590,7 +115637,7 @@ Domain to not audit.
70565 </summary>
70566 </param>
70567 </interface>
70568 -<interface name="init_write_initctl" lineno="1539">
70569 +<interface name="init_write_initctl" lineno="1709">
70570 <summary>
70571 Write to initctl.
70572 </summary>
70573 @@ -114600,7 +115647,7 @@ Domain allowed access.
70574 </summary>
70575 </param>
70576 </interface>
70577 -<interface name="init_telinit" lineno="1560">
70578 +<interface name="init_telinit" lineno="1730">
70579 <summary>
70580 Use telinit (Read and write initctl).
70581 </summary>
70582 @@ -114611,7 +115658,7 @@ Domain allowed access.
70583 </param>
70584 <rolecap/>
70585 </interface>
70586 -<interface name="init_rw_initctl" lineno="1593">
70587 +<interface name="init_rw_initctl" lineno="1763">
70588 <summary>
70589 Read and write initctl.
70590 </summary>
70591 @@ -114621,7 +115668,7 @@ Domain allowed access.
70592 </summary>
70593 </param>
70594 </interface>
70595 -<interface name="init_dontaudit_rw_initctl" lineno="1614">
70596 +<interface name="init_dontaudit_rw_initctl" lineno="1784">
70597 <summary>
70598 Do not audit attempts to read and
70599 write initctl.
70600 @@ -114632,7 +115679,7 @@ Domain to not audit.
70601 </summary>
70602 </param>
70603 </interface>
70604 -<interface name="init_script_file_entry_type" lineno="1633">
70605 +<interface name="init_script_file_entry_type" lineno="1803">
70606 <summary>
70607 Make init scripts an entry point for
70608 the specified domain.
70609 @@ -114643,7 +115690,7 @@ Domain allowed access.
70610 </summary>
70611 </param>
70612 </interface>
70613 -<interface name="init_spec_domtrans_script" lineno="1656">
70614 +<interface name="init_spec_domtrans_script" lineno="1826">
70615 <summary>
70616 Execute init scripts with a specified domain transition.
70617 </summary>
70618 @@ -114653,7 +115700,7 @@ Domain allowed to transition.
70619 </summary>
70620 </param>
70621 </interface>
70622 -<interface name="init_domtrans_script" lineno="1683">
70623 +<interface name="init_domtrans_script" lineno="1853">
70624 <summary>
70625 Execute init scripts with an automatic domain transition.
70626 </summary>
70627 @@ -114663,7 +115710,7 @@ Domain allowed to transition.
70628 </summary>
70629 </param>
70630 </interface>
70631 -<interface name="init_domtrans_labeled_script" lineno="1718">
70632 +<interface name="init_domtrans_labeled_script" lineno="1888">
70633 <summary>
70634 Execute labelled init scripts with an automatic domain transition.
70635 </summary>
70636 @@ -114673,7 +115720,7 @@ Domain allowed to transition.
70637 </summary>
70638 </param>
70639 </interface>
70640 -<interface name="init_script_file_domtrans" lineno="1764">
70641 +<interface name="init_script_file_domtrans" lineno="1934">
70642 <summary>
70643 Execute a init script in a specified domain.
70644 </summary>
70645 @@ -114698,7 +115745,7 @@ Domain to transition to.
70646 </summary>
70647 </param>
70648 </interface>
70649 -<interface name="init_kill_scripts" lineno="1783">
70650 +<interface name="init_kill_scripts" lineno="1953">
70651 <summary>
70652 Send a kill signal to init scripts.
70653 </summary>
70654 @@ -114708,7 +115755,7 @@ Domain allowed access.
70655 </summary>
70656 </param>
70657 </interface>
70658 -<interface name="init_manage_script_service" lineno="1801">
70659 +<interface name="init_manage_script_service" lineno="1971">
70660 <summary>
70661 Allow manage service for initrc_exec_t scripts
70662 </summary>
70663 @@ -114718,7 +115765,7 @@ Target domain
70664 </summary>
70665 </param>
70666 </interface>
70667 -<interface name="init_labeled_script_domtrans" lineno="1826">
70668 +<interface name="init_labeled_script_domtrans" lineno="1996">
70669 <summary>
70670 Transition to the init script domain
70671 on a specified labeled init script.
70672 @@ -114734,7 +115781,7 @@ Labeled init script file.
70673 </summary>
70674 </param>
70675 </interface>
70676 -<interface name="init_all_labeled_script_domtrans" lineno="1848">
70677 +<interface name="init_all_labeled_script_domtrans" lineno="2018">
70678 <summary>
70679 Transition to the init script domain
70680 for all labeled init script types
70681 @@ -114745,7 +115792,7 @@ Domain allowed to transition.
70682 </summary>
70683 </param>
70684 </interface>
70685 -<interface name="init_get_script_status" lineno="1866">
70686 +<interface name="init_get_script_status" lineno="2036">
70687 <summary>
70688 Allow getting service status of initrc_exec_t scripts
70689 </summary>
70690 @@ -114755,7 +115802,7 @@ Target domain
70691 </summary>
70692 </param>
70693 </interface>
70694 -<interface name="init_startstop_service" lineno="1906">
70695 +<interface name="init_startstop_service" lineno="2076">
70696 <summary>
70697 Allow the role to start and stop
70698 labeled services.
70699 @@ -114786,7 +115833,7 @@ Systemd unit file type.
70700 </summary>
70701 </param>
70702 </interface>
70703 -<interface name="init_run_daemon" lineno="1960">
70704 +<interface name="init_run_daemon" lineno="2132">
70705 <summary>
70706 Start and stop daemon programs directly.
70707 </summary>
70708 @@ -114808,7 +115855,7 @@ The role to be performing this action.
70709 </summary>
70710 </param>
70711 </interface>
70712 -<interface name="init_startstop_all_script_services" lineno="1982">
70713 +<interface name="init_startstop_all_script_services" lineno="2154">
70714 <summary>
70715 Start and stop init_script_file_type services
70716 </summary>
70717 @@ -114818,7 +115865,7 @@ domain that can start and stop the services
70718 </summary>
70719 </param>
70720 </interface>
70721 -<interface name="init_read_state" lineno="2001">
70722 +<interface name="init_read_state" lineno="2173">
70723 <summary>
70724 Read the process state (/proc/pid) of init.
70725 </summary>
70726 @@ -114828,7 +115875,7 @@ Domain allowed access.
70727 </summary>
70728 </param>
70729 </interface>
70730 -<interface name="init_dontaudit_read_state" lineno="2021">
70731 +<interface name="init_dontaudit_read_state" lineno="2193">
70732 <summary>
70733 Dontaudit read the process state (/proc/pid) of init.
70734 </summary>
70735 @@ -114838,7 +115885,7 @@ Domain to not audit.
70736 </summary>
70737 </param>
70738 </interface>
70739 -<interface name="init_ptrace" lineno="2042">
70740 +<interface name="init_ptrace" lineno="2214">
70741 <summary>
70742 Ptrace init
70743 </summary>
70744 @@ -114849,7 +115896,7 @@ Domain allowed access.
70745 </param>
70746 <rolecap/>
70747 </interface>
70748 -<interface name="init_getattr" lineno="2061">
70749 +<interface name="init_getattr" lineno="2233">
70750 <summary>
70751 get init process stats
70752 </summary>
70753 @@ -114860,7 +115907,7 @@ Domain allowed access.
70754 </param>
70755 <rolecap/>
70756 </interface>
70757 -<interface name="init_read_script_pipes" lineno="2079">
70758 +<interface name="init_read_script_pipes" lineno="2251">
70759 <summary>
70760 Read an init script unnamed pipe.
70761 </summary>
70762 @@ -114870,7 +115917,7 @@ Domain allowed access.
70763 </summary>
70764 </param>
70765 </interface>
70766 -<interface name="init_write_script_pipes" lineno="2097">
70767 +<interface name="init_write_script_pipes" lineno="2269">
70768 <summary>
70769 Write an init script unnamed pipe.
70770 </summary>
70771 @@ -114880,7 +115927,7 @@ Domain allowed access.
70772 </summary>
70773 </param>
70774 </interface>
70775 -<interface name="init_getattr_script_files" lineno="2115">
70776 +<interface name="init_getattr_script_files" lineno="2287">
70777 <summary>
70778 Get the attribute of init script entrypoint files.
70779 </summary>
70780 @@ -114890,7 +115937,7 @@ Domain allowed access.
70781 </summary>
70782 </param>
70783 </interface>
70784 -<interface name="init_read_script_files" lineno="2134">
70785 +<interface name="init_read_script_files" lineno="2306">
70786 <summary>
70787 Read init scripts.
70788 </summary>
70789 @@ -114900,7 +115947,7 @@ Domain allowed access.
70790 </summary>
70791 </param>
70792 </interface>
70793 -<interface name="init_exec_script_files" lineno="2153">
70794 +<interface name="init_exec_script_files" lineno="2325">
70795 <summary>
70796 Execute init scripts in the caller domain.
70797 </summary>
70798 @@ -114910,7 +115957,7 @@ Domain allowed access.
70799 </summary>
70800 </param>
70801 </interface>
70802 -<interface name="init_getattr_all_script_files" lineno="2172">
70803 +<interface name="init_getattr_all_script_files" lineno="2344">
70804 <summary>
70805 Get the attribute of all init script entrypoint files.
70806 </summary>
70807 @@ -114920,7 +115967,7 @@ Domain allowed access.
70808 </summary>
70809 </param>
70810 </interface>
70811 -<interface name="init_read_all_script_files" lineno="2191">
70812 +<interface name="init_read_all_script_files" lineno="2363">
70813 <summary>
70814 Read all init script files.
70815 </summary>
70816 @@ -114930,7 +115977,7 @@ Domain allowed access.
70817 </summary>
70818 </param>
70819 </interface>
70820 -<interface name="init_dontaudit_read_all_script_files" lineno="2215">
70821 +<interface name="init_dontaudit_read_all_script_files" lineno="2387">
70822 <summary>
70823 Dontaudit read all init script files.
70824 </summary>
70825 @@ -114940,7 +115987,7 @@ Domain to not audit.
70826 </summary>
70827 </param>
70828 </interface>
70829 -<interface name="init_exec_all_script_files" lineno="2233">
70830 +<interface name="init_exec_all_script_files" lineno="2405">
70831 <summary>
70832 Execute all init scripts in the caller domain.
70833 </summary>
70834 @@ -114950,7 +115997,7 @@ Domain allowed access.
70835 </summary>
70836 </param>
70837 </interface>
70838 -<interface name="init_read_script_state" lineno="2252">
70839 +<interface name="init_read_script_state" lineno="2424">
70840 <summary>
70841 Read the process state (/proc/pid) of the init scripts.
70842 </summary>
70843 @@ -114960,7 +116007,7 @@ Domain allowed access.
70844 </summary>
70845 </param>
70846 </interface>
70847 -<interface name="init_use_script_fds" lineno="2271">
70848 +<interface name="init_use_script_fds" lineno="2443">
70849 <summary>
70850 Inherit and use init script file descriptors.
70851 </summary>
70852 @@ -114970,7 +116017,7 @@ Domain allowed access.
70853 </summary>
70854 </param>
70855 </interface>
70856 -<interface name="init_dontaudit_use_script_fds" lineno="2290">
70857 +<interface name="init_dontaudit_use_script_fds" lineno="2462">
70858 <summary>
70859 Do not audit attempts to inherit
70860 init script file descriptors.
70861 @@ -114981,7 +116028,7 @@ Domain to not audit.
70862 </summary>
70863 </param>
70864 </interface>
70865 -<interface name="init_search_script_keys" lineno="2308">
70866 +<interface name="init_search_script_keys" lineno="2480">
70867 <summary>
70868 Search init script keys.
70869 </summary>
70870 @@ -114991,7 +116038,7 @@ Domain allowed access.
70871 </summary>
70872 </param>
70873 </interface>
70874 -<interface name="init_getpgid_script" lineno="2326">
70875 +<interface name="init_getpgid_script" lineno="2498">
70876 <summary>
70877 Get the process group ID of init scripts.
70878 </summary>
70879 @@ -115001,7 +116048,7 @@ Domain allowed access.
70880 </summary>
70881 </param>
70882 </interface>
70883 -<interface name="init_sigchld_script" lineno="2344">
70884 +<interface name="init_sigchld_script" lineno="2516">
70885 <summary>
70886 Send SIGCHLD signals to init scripts.
70887 </summary>
70888 @@ -115011,7 +116058,7 @@ Domain allowed access.
70889 </summary>
70890 </param>
70891 </interface>
70892 -<interface name="init_signal_script" lineno="2362">
70893 +<interface name="init_signal_script" lineno="2534">
70894 <summary>
70895 Send generic signals to init scripts.
70896 </summary>
70897 @@ -115021,7 +116068,7 @@ Domain allowed access.
70898 </summary>
70899 </param>
70900 </interface>
70901 -<interface name="init_signull_script" lineno="2380">
70902 +<interface name="init_signull_script" lineno="2552">
70903 <summary>
70904 Send null signals to init scripts.
70905 </summary>
70906 @@ -115031,7 +116078,7 @@ Domain allowed access.
70907 </summary>
70908 </param>
70909 </interface>
70910 -<interface name="init_rw_script_pipes" lineno="2398">
70911 +<interface name="init_rw_script_pipes" lineno="2570">
70912 <summary>
70913 Read and write init script unnamed pipes.
70914 </summary>
70915 @@ -115041,7 +116088,7 @@ Domain allowed access.
70916 </summary>
70917 </param>
70918 </interface>
70919 -<interface name="init_stream_connect_script" lineno="2417">
70920 +<interface name="init_stream_connect_script" lineno="2589">
70921 <summary>
70922 Allow the specified domain to connect to
70923 init scripts with a unix socket.
70924 @@ -115052,7 +116099,7 @@ Domain allowed access.
70925 </summary>
70926 </param>
70927 </interface>
70928 -<interface name="init_rw_script_stream_sockets" lineno="2436">
70929 +<interface name="init_rw_script_stream_sockets" lineno="2608">
70930 <summary>
70931 Allow the specified domain to read/write to
70932 init scripts with a unix domain stream sockets.
70933 @@ -115063,7 +116110,7 @@ Domain allowed access.
70934 </summary>
70935 </param>
70936 </interface>
70937 -<interface name="init_dontaudit_stream_connect_script" lineno="2455">
70938 +<interface name="init_dontaudit_stream_connect_script" lineno="2627">
70939 <summary>
70940 Dont audit the specified domain connecting to
70941 init scripts with a unix domain stream socket.
70942 @@ -115074,7 +116121,7 @@ Domain to not audit.
70943 </summary>
70944 </param>
70945 </interface>
70946 -<interface name="init_dbus_send_script" lineno="2472">
70947 +<interface name="init_dbus_send_script" lineno="2644">
70948 <summary>
70949 Send messages to init scripts over dbus.
70950 </summary>
70951 @@ -115084,7 +116131,7 @@ Domain allowed access.
70952 </summary>
70953 </param>
70954 </interface>
70955 -<interface name="init_dbus_chat_script" lineno="2492">
70956 +<interface name="init_dbus_chat_script" lineno="2664">
70957 <summary>
70958 Send and receive messages from
70959 init scripts over dbus.
70960 @@ -115095,7 +116142,7 @@ Domain allowed access.
70961 </summary>
70962 </param>
70963 </interface>
70964 -<interface name="init_use_script_ptys" lineno="2521">
70965 +<interface name="init_use_script_ptys" lineno="2693">
70966 <summary>
70967 Read and write the init script pty.
70968 </summary>
70969 @@ -115114,7 +116161,7 @@ Domain allowed access.
70970 </summary>
70971 </param>
70972 </interface>
70973 -<interface name="init_use_inherited_script_ptys" lineno="2540">
70974 +<interface name="init_use_inherited_script_ptys" lineno="2712">
70975 <summary>
70976 Read and write inherited init script ptys.
70977 </summary>
70978 @@ -115124,7 +116171,7 @@ Domain allowed access.
70979 </summary>
70980 </param>
70981 </interface>
70982 -<interface name="init_dontaudit_use_script_ptys" lineno="2562">
70983 +<interface name="init_dontaudit_use_script_ptys" lineno="2734">
70984 <summary>
70985 Do not audit attempts to read and
70986 write the init script pty.
70987 @@ -115135,7 +116182,7 @@ Domain to not audit.
70988 </summary>
70989 </param>
70990 </interface>
70991 -<interface name="init_getattr_script_status_files" lineno="2581">
70992 +<interface name="init_getattr_script_status_files" lineno="2753">
70993 <summary>
70994 Get the attributes of init script
70995 status files.
70996 @@ -115146,7 +116193,7 @@ Domain allowed access.
70997 </summary>
70998 </param>
70999 </interface>
71000 -<interface name="init_dontaudit_read_script_status_files" lineno="2600">
71001 +<interface name="init_dontaudit_read_script_status_files" lineno="2772">
71002 <summary>
71003 Do not audit attempts to read init script
71004 status files.
71005 @@ -115157,7 +116204,7 @@ Domain to not audit.
71006 </summary>
71007 </param>
71008 </interface>
71009 -<interface name="init_search_run" lineno="2619">
71010 +<interface name="init_search_run" lineno="2791">
71011 <summary>
71012 Search the /run/systemd directory.
71013 </summary>
71014 @@ -115167,7 +116214,7 @@ Domain allowed access.
71015 </summary>
71016 </param>
71017 </interface>
71018 -<interface name="init_read_script_tmp_files" lineno="2638">
71019 +<interface name="init_read_script_tmp_files" lineno="2810">
71020 <summary>
71021 Read init script temporary data.
71022 </summary>
71023 @@ -115177,7 +116224,7 @@ Domain allowed access.
71024 </summary>
71025 </param>
71026 </interface>
71027 -<interface name="init_rw_inherited_script_tmp_files" lineno="2657">
71028 +<interface name="init_rw_inherited_script_tmp_files" lineno="2829">
71029 <summary>
71030 Read and write init script inherited temporary data.
71031 </summary>
71032 @@ -115187,7 +116234,7 @@ Domain allowed access.
71033 </summary>
71034 </param>
71035 </interface>
71036 -<interface name="init_rw_script_tmp_files" lineno="2675">
71037 +<interface name="init_rw_script_tmp_files" lineno="2847">
71038 <summary>
71039 Read and write init script temporary data.
71040 </summary>
71041 @@ -115197,7 +116244,7 @@ Domain allowed access.
71042 </summary>
71043 </param>
71044 </interface>
71045 -<interface name="init_script_tmp_filetrans" lineno="2710">
71046 +<interface name="init_script_tmp_filetrans" lineno="2882">
71047 <summary>
71048 Create files in a init script
71049 temporary data directory.
71050 @@ -115223,7 +116270,7 @@ The name of the object being created.
71051 </summary>
71052 </param>
71053 </interface>
71054 -<interface name="init_getattr_utmp" lineno="2729">
71055 +<interface name="init_getattr_utmp" lineno="2901">
71056 <summary>
71057 Get the attributes of init script process id files.
71058 </summary>
71059 @@ -115233,7 +116280,7 @@ Domain allowed access.
71060 </summary>
71061 </param>
71062 </interface>
71063 -<interface name="init_read_utmp" lineno="2747">
71064 +<interface name="init_read_utmp" lineno="2919">
71065 <summary>
71066 Read utmp.
71067 </summary>
71068 @@ -115243,7 +116290,7 @@ Domain allowed access.
71069 </summary>
71070 </param>
71071 </interface>
71072 -<interface name="init_dontaudit_write_utmp" lineno="2766">
71073 +<interface name="init_dontaudit_write_utmp" lineno="2938">
71074 <summary>
71075 Do not audit attempts to write utmp.
71076 </summary>
71077 @@ -115253,7 +116300,7 @@ Domain to not audit.
71078 </summary>
71079 </param>
71080 </interface>
71081 -<interface name="init_write_utmp" lineno="2784">
71082 +<interface name="init_write_utmp" lineno="2956">
71083 <summary>
71084 Write to utmp.
71085 </summary>
71086 @@ -115263,7 +116310,7 @@ Domain allowed access.
71087 </summary>
71088 </param>
71089 </interface>
71090 -<interface name="init_dontaudit_lock_utmp" lineno="2804">
71091 +<interface name="init_dontaudit_lock_utmp" lineno="2976">
71092 <summary>
71093 Do not audit attempts to lock
71094 init script pid files.
71095 @@ -115274,7 +116321,7 @@ Domain to not audit.
71096 </summary>
71097 </param>
71098 </interface>
71099 -<interface name="init_rw_utmp" lineno="2822">
71100 +<interface name="init_rw_utmp" lineno="2994">
71101 <summary>
71102 Read and write utmp.
71103 </summary>
71104 @@ -115284,7 +116331,7 @@ Domain allowed access.
71105 </summary>
71106 </param>
71107 </interface>
71108 -<interface name="init_dontaudit_rw_utmp" lineno="2841">
71109 +<interface name="init_dontaudit_rw_utmp" lineno="3013">
71110 <summary>
71111 Do not audit attempts to read and write utmp.
71112 </summary>
71113 @@ -115294,7 +116341,7 @@ Domain to not audit.
71114 </summary>
71115 </param>
71116 </interface>
71117 -<interface name="init_manage_utmp" lineno="2859">
71118 +<interface name="init_manage_utmp" lineno="3031">
71119 <summary>
71120 Create, read, write, and delete utmp.
71121 </summary>
71122 @@ -115304,7 +116351,7 @@ Domain allowed access.
71123 </summary>
71124 </param>
71125 </interface>
71126 -<interface name="init_relabel_utmp" lineno="2878">
71127 +<interface name="init_relabel_utmp" lineno="3050">
71128 <summary>
71129 Relabel utmp.
71130 </summary>
71131 @@ -115314,7 +116361,7 @@ Domain allowed access.
71132 </summary>
71133 </param>
71134 </interface>
71135 -<interface name="init_pid_filetrans_utmp" lineno="2897">
71136 +<interface name="init_runtime_filetrans_utmp" lineno="3069">
71137 <summary>
71138 Create files in /var/run with the
71139 utmp file type.
71140 @@ -115325,28 +116372,7 @@ Domain allowed access.
71141 </summary>
71142 </param>
71143 </interface>
71144 -<interface name="init_runtime_filetrans_utmp" lineno="2913">
71145 -<summary>
71146 -Create files in /var/run with the
71147 -utmp file type.
71148 -</summary>
71149 -<param name="domain">
71150 -<summary>
71151 -Domain allowed access.
71152 -</summary>
71153 -</param>
71154 -</interface>
71155 -<interface name="init_create_pid_dirs" lineno="2931">
71156 -<summary>
71157 -Create a directory in the /run/systemd directory.
71158 -</summary>
71159 -<param name="domain">
71160 -<summary>
71161 -Domain allowed access.
71162 -</summary>
71163 -</param>
71164 -</interface>
71165 -<interface name="init_create_runtime_dirs" lineno="2946">
71166 +<interface name="init_create_runtime_dirs" lineno="3087">
71167 <summary>
71168 Create a directory in the /run/systemd directory.
71169 </summary>
71170 @@ -115356,9 +116382,9 @@ Domain allowed access.
71171 </summary>
71172 </param>
71173 </interface>
71174 -<interface name="init_rename_pid_files" lineno="2965">
71175 +<interface name="init_read_runtime_files" lineno="3106">
71176 <summary>
71177 -Rename init_runtime_t files
71178 +Read init_runtime_t files
71179 </summary>
71180 <param name="domain">
71181 <summary>
71182 @@ -115366,7 +116392,7 @@ domain
71183 </summary>
71184 </param>
71185 </interface>
71186 -<interface name="init_rename_runtime_files" lineno="2980">
71187 +<interface name="init_rename_runtime_files" lineno="3124">
71188 <summary>
71189 Rename init_runtime_t files
71190 </summary>
71191 @@ -115376,9 +116402,9 @@ domain
71192 </summary>
71193 </param>
71194 </interface>
71195 -<interface name="init_delete_pid_files" lineno="2998">
71196 +<interface name="init_setattr_runtime_files" lineno="3142">
71197 <summary>
71198 -Delete init_runtime_t files
71199 +Setattr init_runtime_t files
71200 </summary>
71201 <param name="domain">
71202 <summary>
71203 @@ -115386,7 +116412,7 @@ domain
71204 </summary>
71205 </param>
71206 </interface>
71207 -<interface name="init_delete_runtime_files" lineno="3013">
71208 +<interface name="init_delete_runtime_files" lineno="3160">
71209 <summary>
71210 Delete init_runtime_t files
71211 </summary>
71212 @@ -115396,7 +116422,7 @@ domain
71213 </summary>
71214 </param>
71215 </interface>
71216 -<interface name="init_write_pid_socket" lineno="3032">
71217 +<interface name="init_write_runtime_socket" lineno="3179">
71218 <summary>
71219 Allow the specified domain to write to
71220 init sock file.
71221 @@ -115407,28 +116433,7 @@ Domain allowed access.
71222 </summary>
71223 </param>
71224 </interface>
71225 -<interface name="init_write_runtime_socket" lineno="3048">
71226 -<summary>
71227 -Allow the specified domain to write to
71228 -init sock file.
71229 -</summary>
71230 -<param name="domain">
71231 -<summary>
71232 -Domain allowed access.
71233 -</summary>
71234 -</param>
71235 -</interface>
71236 -<interface name="init_read_pid_pipes" lineno="3066">
71237 -<summary>
71238 -Read init unnamed pipes.
71239 -</summary>
71240 -<param name="domain">
71241 -<summary>
71242 -Domain allowed access.
71243 -</summary>
71244 -</param>
71245 -</interface>
71246 -<interface name="init_read_runtime_pipes" lineno="3081">
71247 +<interface name="init_read_runtime_pipes" lineno="3197">
71248 <summary>
71249 Read init unnamed pipes.
71250 </summary>
71251 @@ -115438,7 +116443,7 @@ Domain allowed access.
71252 </summary>
71253 </param>
71254 </interface>
71255 -<interface name="init_read_runtime_symlinks" lineno="3099">
71256 +<interface name="init_read_runtime_symlinks" lineno="3215">
71257 <summary>
71258 read systemd unit symlinks (usually under /run/systemd/units/)
71259 </summary>
71260 @@ -115448,7 +116453,7 @@ Domain allowed access.
71261 </summary>
71262 </param>
71263 </interface>
71264 -<interface name="init_tcp_recvfrom_all_daemons" lineno="3117">
71265 +<interface name="init_tcp_recvfrom_all_daemons" lineno="3233">
71266 <summary>
71267 Allow the specified domain to connect to daemon with a tcp socket
71268 </summary>
71269 @@ -115458,7 +116463,7 @@ Domain allowed access.
71270 </summary>
71271 </param>
71272 </interface>
71273 -<interface name="init_udp_recvfrom_all_daemons" lineno="3135">
71274 +<interface name="init_udp_recvfrom_all_daemons" lineno="3251">
71275 <summary>
71276 Allow the specified domain to connect to daemon with a udp socket
71277 </summary>
71278 @@ -115468,7 +116473,7 @@ Domain allowed access.
71279 </summary>
71280 </param>
71281 </interface>
71282 -<interface name="init_read_script_status_files" lineno="3154">
71283 +<interface name="init_read_script_status_files" lineno="3270">
71284 <summary>
71285 Allow reading the init script state files
71286 </summary>
71287 @@ -115478,7 +116483,7 @@ Domain allowed access
71288 </summary>
71289 </param>
71290 </interface>
71291 -<interface name="init_relabelto_script_state" lineno="3172">
71292 +<interface name="init_relabelto_script_state" lineno="3288">
71293 <summary>
71294 Label to init script status files
71295 </summary>
71296 @@ -115488,7 +116493,7 @@ Domain allowed access
71297 </summary>
71298 </param>
71299 </interface>
71300 -<interface name="init_script_readable_type" lineno="3191">
71301 +<interface name="init_script_readable_type" lineno="3307">
71302 <summary>
71303 Mark as a readable type for the initrc_t domain
71304 </summary>
71305 @@ -115498,7 +116503,7 @@ Type that initrc_t needs read access to
71306 </summary>
71307 </param>
71308 </interface>
71309 -<interface name="init_search_units" lineno="3209">
71310 +<interface name="init_search_units" lineno="3325">
71311 <summary>
71312 Search systemd unit dirs.
71313 </summary>
71314 @@ -115508,7 +116513,7 @@ Domain allowed access.
71315 </summary>
71316 </param>
71317 </interface>
71318 -<interface name="init_list_unit_dirs" lineno="3234">
71319 +<interface name="init_list_unit_dirs" lineno="3350">
71320 <summary>
71321 List systemd unit dirs.
71322 </summary>
71323 @@ -115518,7 +116523,7 @@ Domain allowed access.
71324 </summary>
71325 </param>
71326 </interface>
71327 -<interface name="init_read_generic_units_symlinks" lineno="3254">
71328 +<interface name="init_read_generic_units_symlinks" lineno="3370">
71329 <summary>
71330 Read systemd unit links
71331 </summary>
71332 @@ -115528,7 +116533,7 @@ Domain allowed access.
71333 </summary>
71334 </param>
71335 </interface>
71336 -<interface name="init_get_generic_units_status" lineno="3272">
71337 +<interface name="init_get_generic_units_status" lineno="3388">
71338 <summary>
71339 Get status of generic systemd units.
71340 </summary>
71341 @@ -115538,7 +116543,7 @@ Domain allowed access.
71342 </summary>
71343 </param>
71344 </interface>
71345 -<interface name="init_start_generic_units" lineno="3291">
71346 +<interface name="init_start_generic_units" lineno="3407">
71347 <summary>
71348 Start generic systemd units.
71349 </summary>
71350 @@ -115548,7 +116553,7 @@ Domain allowed access.
71351 </summary>
71352 </param>
71353 </interface>
71354 -<interface name="init_stop_generic_units" lineno="3310">
71355 +<interface name="init_stop_generic_units" lineno="3426">
71356 <summary>
71357 Stop generic systemd units.
71358 </summary>
71359 @@ -115558,7 +116563,7 @@ Domain to not audit.
71360 </summary>
71361 </param>
71362 </interface>
71363 -<interface name="init_reload_generic_units" lineno="3329">
71364 +<interface name="init_reload_generic_units" lineno="3445">
71365 <summary>
71366 Reload generic systemd units.
71367 </summary>
71368 @@ -115568,7 +116573,7 @@ Domain allowed access.
71369 </summary>
71370 </param>
71371 </interface>
71372 -<interface name="init_get_all_units_status" lineno="3348">
71373 +<interface name="init_get_all_units_status" lineno="3464">
71374 <summary>
71375 Get status of all systemd units.
71376 </summary>
71377 @@ -115578,7 +116583,7 @@ Domain allowed access.
71378 </summary>
71379 </param>
71380 </interface>
71381 -<interface name="init_manage_all_units" lineno="3367">
71382 +<interface name="init_manage_all_units" lineno="3483">
71383 <summary>
71384 All perms on all systemd units.
71385 </summary>
71386 @@ -115588,7 +116593,7 @@ Domain allowed access.
71387 </summary>
71388 </param>
71389 </interface>
71390 -<interface name="init_start_all_units" lineno="3387">
71391 +<interface name="init_start_all_units" lineno="3503">
71392 <summary>
71393 Start all systemd units.
71394 </summary>
71395 @@ -115598,7 +116603,7 @@ Domain allowed access.
71396 </summary>
71397 </param>
71398 </interface>
71399 -<interface name="init_stop_all_units" lineno="3406">
71400 +<interface name="init_stop_all_units" lineno="3522">
71401 <summary>
71402 Stop all systemd units.
71403 </summary>
71404 @@ -115608,7 +116613,7 @@ Domain to not audit.
71405 </summary>
71406 </param>
71407 </interface>
71408 -<interface name="init_reload_all_units" lineno="3425">
71409 +<interface name="init_reload_all_units" lineno="3541">
71410 <summary>
71411 Reload all systemd units.
71412 </summary>
71413 @@ -115618,7 +116623,17 @@ Domain allowed access.
71414 </summary>
71415 </param>
71416 </interface>
71417 -<interface name="init_admin" lineno="3444">
71418 +<interface name="init_manage_all_unit_files" lineno="3560">
71419 +<summary>
71420 +Manage systemd unit dirs and the files in them
71421 +</summary>
71422 +<param name="domain">
71423 +<summary>
71424 +Domain allowed access.
71425 +</summary>
71426 +</param>
71427 +</interface>
71428 +<interface name="init_admin" lineno="3580">
71429 <summary>
71430 Allow unconfined access to send instructions to init
71431 </summary>
71432 @@ -115628,7 +116643,7 @@ Target domain
71433 </summary>
71434 </param>
71435 </interface>
71436 -<interface name="init_getrlimit" lineno="3476">
71437 +<interface name="init_getrlimit" lineno="3612">
71438 <summary>
71439 Allow getting init_t rlimit
71440 </summary>
71441 @@ -115797,7 +116812,7 @@ Domain allowed access.
71442 </interface>
71443 <interface name="ipsec_write_pid" lineno="259">
71444 <summary>
71445 -write the ipsec_runtime_t files.
71446 +write the ipsec_runtime_t files. (Deprecated)
71447 </summary>
71448 <param name="domain">
71449 <summary>
71450 @@ -115805,9 +116820,30 @@ Domain allowed access.
71451 </summary>
71452 </param>
71453 </interface>
71454 -<interface name="ipsec_manage_pid" lineno="278">
71455 +<interface name="ipsec_manage_pid" lineno="275">
71456 <summary>
71457 Create, read, write, and delete the IPSEC pid files.
71458 +(Deprecated)
71459 +</summary>
71460 +<param name="domain">
71461 +<summary>
71462 +Domain allowed access.
71463 +</summary>
71464 +</param>
71465 +</interface>
71466 +<interface name="ipsec_write_runtime_files" lineno="290">
71467 +<summary>
71468 +Write ipsec runtime files.
71469 +</summary>
71470 +<param name="domain">
71471 +<summary>
71472 +Domain allowed access.
71473 +</summary>
71474 +</param>
71475 +</interface>
71476 +<interface name="ipsec_manage_runtime_files" lineno="309">
71477 +<summary>
71478 +Create, read, write, and delete the IPSEC runtime files.
71479 </summary>
71480 <param name="domain">
71481 <summary>
71482 @@ -115815,7 +116851,7 @@ Domain allowed access.
71483 </summary>
71484 </param>
71485 </interface>
71486 -<interface name="ipsec_domtrans_racoon" lineno="297">
71487 +<interface name="ipsec_domtrans_racoon" lineno="328">
71488 <summary>
71489 Execute racoon in the racoon domain.
71490 </summary>
71491 @@ -115825,7 +116861,7 @@ Domain allowed to transition.
71492 </summary>
71493 </param>
71494 </interface>
71495 -<interface name="ipsec_run_racoon" lineno="321">
71496 +<interface name="ipsec_run_racoon" lineno="352">
71497 <summary>
71498 Execute racoon and allow the specified role the domain.
71499 </summary>
71500 @@ -115841,7 +116877,7 @@ Role allowed access.
71501 </param>
71502 <rolecap/>
71503 </interface>
71504 -<interface name="ipsec_domtrans_setkey" lineno="340">
71505 +<interface name="ipsec_domtrans_setkey" lineno="371">
71506 <summary>
71507 Execute setkey in the setkey domain.
71508 </summary>
71509 @@ -115851,7 +116887,7 @@ Domain allowed to transition.
71510 </summary>
71511 </param>
71512 </interface>
71513 -<interface name="ipsec_run_setkey" lineno="364">
71514 +<interface name="ipsec_run_setkey" lineno="395">
71515 <summary>
71516 Execute setkey and allow the specified role the domains.
71517 </summary>
71518 @@ -115867,7 +116903,7 @@ Role allowed access..
71519 </param>
71520 <rolecap/>
71521 </interface>
71522 -<interface name="ipsec_admin" lineno="390">
71523 +<interface name="ipsec_admin" lineno="421">
71524 <summary>
71525 All of the rules required to
71526 administrate an ipsec environment.
71527 @@ -115985,7 +117021,7 @@ Domain allowed access.
71528 </interface>
71529 <interface name="iptables_dontaudit_read_pids" lineno="177">
71530 <summary>
71531 -dontaudit reading iptables_runtime_t
71532 +dontaudit reading iptables_runtime_t (Deprecated)
71533 </summary>
71534 <param name="domain">
71535 <summary>
71536 @@ -115993,7 +117029,17 @@ Domain to not audit.
71537 </summary>
71538 </param>
71539 </interface>
71540 -<interface name="iptables_startstop" lineno="195">
71541 +<interface name="iptables_dontaudit_read_runtime_files" lineno="192">
71542 +<summary>
71543 +Do not audit reading iptables runtime files.
71544 +</summary>
71545 +<param name="domain">
71546 +<summary>
71547 +Domain to not audit.
71548 +</summary>
71549 +</param>
71550 +</interface>
71551 +<interface name="iptables_startstop" lineno="210">
71552 <summary>
71553 Allow specified domain to start and stop iptables service
71554 </summary>
71555 @@ -116003,7 +117049,7 @@ Domain allowed access.
71556 </summary>
71557 </param>
71558 </interface>
71559 -<interface name="iptables_status" lineno="214">
71560 +<interface name="iptables_status" lineno="229">
71561 <summary>
71562 Allow specified domain to get status of iptables service
71563 </summary>
71564 @@ -116013,7 +117059,7 @@ Domain allowed access.
71565 </summary>
71566 </param>
71567 </interface>
71568 -<interface name="iptables_admin" lineno="241">
71569 +<interface name="iptables_admin" lineno="256">
71570 <summary>
71571 All of the rules required to
71572 administrate an iptables
71573 @@ -116746,7 +117792,17 @@ Domain allowed to transition.
71574 </summary>
71575 </param>
71576 </interface>
71577 -<interface name="logging_status_syslog" lineno="440">
71578 +<interface name="logging_startstop_syslog" lineno="440">
71579 +<summary>
71580 +Allow specified domain to start/stop syslog units
71581 +</summary>
71582 +<param name="domain">
71583 +<summary>
71584 +Domain allowed access.
71585 +</summary>
71586 +</param>
71587 +</interface>
71588 +<interface name="logging_status_syslog" lineno="459">
71589 <summary>
71590 Allow specified domain to check status of syslog unit
71591 </summary>
71592 @@ -116756,7 +117812,7 @@ Domain allowed access.
71593 </summary>
71594 </param>
71595 </interface>
71596 -<interface name="logging_setattr_syslogd_tmp_files" lineno="460">
71597 +<interface name="logging_setattr_syslogd_tmp_files" lineno="479">
71598 <summary>
71599 Set the attributes of syslog temporary files.
71600 </summary>
71601 @@ -116767,7 +117823,18 @@ Domain allowed access.
71602 </param>
71603 <rolecap/>
71604 </interface>
71605 -<interface name="logging_relabel_syslogd_tmp_files" lineno="479">
71606 +<interface name="logging_audit_socket_activation" lineno="498">
71607 +<summary>
71608 +Allow the domain to create the audit socket
71609 +for syslogd.
71610 +</summary>
71611 +<param name="domain">
71612 +<summary>
71613 +Domain allowed access.
71614 +</summary>
71615 +</param>
71616 +</interface>
71617 +<interface name="logging_relabel_syslogd_tmp_files" lineno="517">
71618 <summary>
71619 Relabel to and from syslog temporary file type.
71620 </summary>
71621 @@ -116778,7 +117845,7 @@ Domain allowed access.
71622 </param>
71623 <rolecap/>
71624 </interface>
71625 -<interface name="logging_setattr_syslogd_tmp_dirs" lineno="498">
71626 +<interface name="logging_setattr_syslogd_tmp_dirs" lineno="536">
71627 <summary>
71628 Set the attributes of syslog temporary directories.
71629 </summary>
71630 @@ -116789,7 +117856,7 @@ Domain allowed access.
71631 </param>
71632 <rolecap/>
71633 </interface>
71634 -<interface name="logging_relabel_syslogd_tmp_dirs" lineno="517">
71635 +<interface name="logging_relabel_syslogd_tmp_dirs" lineno="555">
71636 <summary>
71637 Relabel to and from syslog temporary directory type.
71638 </summary>
71639 @@ -116800,7 +117867,7 @@ Domain allowed access.
71640 </param>
71641 <rolecap/>
71642 </interface>
71643 -<interface name="logging_log_filetrans" lineno="578">
71644 +<interface name="logging_log_filetrans" lineno="616">
71645 <summary>
71646 Create an object in the log directory, with a private type.
71647 </summary>
71648 @@ -116853,7 +117920,7 @@ The name of the object being created.
71649 </param>
71650 <infoflow type="write" weight="10"/>
71651 </interface>
71652 -<interface name="logging_send_syslog_msg" lineno="620">
71653 +<interface name="logging_send_syslog_msg" lineno="658">
71654 <summary>
71655 Send system log messages.
71656 </summary>
71657 @@ -116885,7 +117952,18 @@ Domain allowed access.
71658 </summary>
71659 </param>
71660 </interface>
71661 -<interface name="logging_relabelto_devlog_sock_files" lineno="663">
71662 +<interface name="logging_use_syslogd_fd" lineno="701">
71663 +<summary>
71664 +Allow domain to use a file descriptor
71665 +from syslogd.
71666 +</summary>
71667 +<param name="domain">
71668 +<summary>
71669 +Domain allowed access.
71670 +</summary>
71671 +</param>
71672 +</interface>
71673 +<interface name="logging_relabelto_devlog_sock_files" lineno="720">
71674 <summary>
71675 Allow domain to relabelto devlog sock_files
71676 </summary>
71677 @@ -116896,7 +117974,7 @@ Domain allowed access.
71678 </param>
71679 <rolecap/>
71680 </interface>
71681 -<interface name="logging_create_devlog" lineno="681">
71682 +<interface name="logging_create_devlog" lineno="738">
71683 <summary>
71684 Connect to the syslog control unix stream socket.
71685 </summary>
71686 @@ -116906,7 +117984,7 @@ Domain allowed access.
71687 </summary>
71688 </param>
71689 </interface>
71690 -<interface name="logging_read_audit_config" lineno="702">
71691 +<interface name="logging_read_audit_config" lineno="759">
71692 <summary>
71693 Read the auditd configuration files.
71694 </summary>
71695 @@ -116917,7 +117995,7 @@ Domain allowed access.
71696 </param>
71697 <rolecap/>
71698 </interface>
71699 -<interface name="logging_dontaudit_search_audit_config" lineno="725">
71700 +<interface name="logging_dontaudit_search_audit_config" lineno="782">
71701 <summary>
71702 dontaudit search of auditd configuration files.
71703 </summary>
71704 @@ -116928,7 +118006,7 @@ Domain to not audit.
71705 </param>
71706 <rolecap/>
71707 </interface>
71708 -<interface name="logging_read_syslog_config" lineno="744">
71709 +<interface name="logging_read_syslog_config" lineno="801">
71710 <summary>
71711 Read syslog configuration files.
71712 </summary>
71713 @@ -116939,7 +118017,7 @@ Domain allowed access.
71714 </param>
71715 <rolecap/>
71716 </interface>
71717 -<interface name="logging_watch_runtime_dirs" lineno="762">
71718 +<interface name="logging_watch_runtime_dirs" lineno="819">
71719 <summary>
71720 Watch syslog runtime dirs.
71721 </summary>
71722 @@ -116949,7 +118027,7 @@ Domain allowed access.
71723 </summary>
71724 </param>
71725 </interface>
71726 -<interface name="logging_delete_devlog_socket" lineno="781">
71727 +<interface name="logging_delete_devlog_socket" lineno="838">
71728 <summary>
71729 Delete the syslog socket files
71730 </summary>
71731 @@ -116960,7 +118038,17 @@ Domain allowed access
71732 </param>
71733 <rolecap/>
71734 </interface>
71735 -<interface name="logging_manage_pid_sockets" lineno="799">
71736 +<interface name="logging_manage_pid_sockets" lineno="856">
71737 +<summary>
71738 +Create, read, write, and delete syslog PID sockets. (Deprecated)
71739 +</summary>
71740 +<param name="domain">
71741 +<summary>
71742 +Domain allowed access.
71743 +</summary>
71744 +</param>
71745 +</interface>
71746 +<interface name="logging_manage_runtime_sockets" lineno="871">
71747 <summary>
71748 Create, read, write, and delete syslog PID sockets.
71749 </summary>
71750 @@ -116970,7 +118058,7 @@ Domain allowed access.
71751 </summary>
71752 </param>
71753 </interface>
71754 -<interface name="logging_search_logs" lineno="820">
71755 +<interface name="logging_search_logs" lineno="892">
71756 <summary>
71757 Allows the domain to open a file in the
71758 log directory, but does not allow the listing
71759 @@ -116982,7 +118070,7 @@ Domain allowed access.
71760 </summary>
71761 </param>
71762 </interface>
71763 -<interface name="logging_dontaudit_search_logs" lineno="840">
71764 +<interface name="logging_dontaudit_search_logs" lineno="912">
71765 <summary>
71766 Do not audit attempts to search the var log directory.
71767 </summary>
71768 @@ -116992,7 +118080,7 @@ Domain not to audit.
71769 </summary>
71770 </param>
71771 </interface>
71772 -<interface name="logging_list_logs" lineno="858">
71773 +<interface name="logging_list_logs" lineno="930">
71774 <summary>
71775 List the contents of the generic log directory (/var/log).
71776 </summary>
71777 @@ -117002,7 +118090,7 @@ Domain allowed access.
71778 </summary>
71779 </param>
71780 </interface>
71781 -<interface name="logging_rw_generic_log_dirs" lineno="878">
71782 +<interface name="logging_rw_generic_log_dirs" lineno="950">
71783 <summary>
71784 Read and write the generic log directory (/var/log).
71785 </summary>
71786 @@ -117012,7 +118100,7 @@ Domain allowed access.
71787 </summary>
71788 </param>
71789 </interface>
71790 -<interface name="logging_search_all_logs" lineno="899">
71791 +<interface name="logging_search_all_logs" lineno="971">
71792 <summary>
71793 Search through all log dirs.
71794 </summary>
71795 @@ -117023,7 +118111,7 @@ Domain allowed access.
71796 </param>
71797 <rolecap/>
71798 </interface>
71799 -<interface name="logging_setattr_all_log_dirs" lineno="918">
71800 +<interface name="logging_setattr_all_log_dirs" lineno="990">
71801 <summary>
71802 Set attributes on all log dirs.
71803 </summary>
71804 @@ -117034,7 +118122,7 @@ Domain allowed access.
71805 </param>
71806 <rolecap/>
71807 </interface>
71808 -<interface name="logging_dontaudit_getattr_all_logs" lineno="937">
71809 +<interface name="logging_dontaudit_getattr_all_logs" lineno="1009">
71810 <summary>
71811 Do not audit attempts to get the attributes
71812 of any log files.
71813 @@ -117045,9 +118133,9 @@ Domain to not audit.
71814 </summary>
71815 </param>
71816 </interface>
71817 -<interface name="logging_getattr_all_logs" lineno="955">
71818 +<interface name="logging_getattr_all_logs" lineno="1027">
71819 <summary>
71820 -Read the atttributes of any log file
71821 +Read the attributes of any log file
71822 </summary>
71823 <param name="domain">
71824 <summary>
71825 @@ -117055,7 +118143,7 @@ Domain allowed access
71826 </summary>
71827 </param>
71828 </interface>
71829 -<interface name="logging_append_all_logs" lineno="973">
71830 +<interface name="logging_append_all_logs" lineno="1045">
71831 <summary>
71832 Append to all log files.
71833 </summary>
71834 @@ -117065,7 +118153,7 @@ Domain allowed access.
71835 </summary>
71836 </param>
71837 </interface>
71838 -<interface name="logging_append_all_inherited_logs" lineno="994">
71839 +<interface name="logging_append_all_inherited_logs" lineno="1066">
71840 <summary>
71841 Append to all log files.
71842 </summary>
71843 @@ -117075,7 +118163,7 @@ Domain allowed access.
71844 </summary>
71845 </param>
71846 </interface>
71847 -<interface name="logging_read_all_logs" lineno="1013">
71848 +<interface name="logging_read_all_logs" lineno="1085">
71849 <summary>
71850 Read all log files.
71851 </summary>
71852 @@ -117086,7 +118174,7 @@ Domain allowed access.
71853 </param>
71854 <rolecap/>
71855 </interface>
71856 -<interface name="logging_exec_all_logs" lineno="1035">
71857 +<interface name="logging_exec_all_logs" lineno="1107">
71858 <summary>
71859 Execute all log files in the caller domain.
71860 </summary>
71861 @@ -117096,7 +118184,7 @@ Domain allowed access.
71862 </summary>
71863 </param>
71864 </interface>
71865 -<interface name="logging_rw_all_logs" lineno="1055">
71866 +<interface name="logging_rw_all_logs" lineno="1127">
71867 <summary>
71868 read/write to all log files.
71869 </summary>
71870 @@ -117106,7 +118194,7 @@ Domain allowed access.
71871 </summary>
71872 </param>
71873 </interface>
71874 -<interface name="logging_manage_all_logs" lineno="1075">
71875 +<interface name="logging_manage_all_logs" lineno="1147">
71876 <summary>
71877 Create, read, write, and delete all log files.
71878 </summary>
71879 @@ -117117,7 +118205,7 @@ Domain allowed access.
71880 </param>
71881 <rolecap/>
71882 </interface>
71883 -<interface name="logging_manage_generic_log_dirs" lineno="1096">
71884 +<interface name="logging_manage_generic_log_dirs" lineno="1168">
71885 <summary>
71886 Create, read, write, and delete generic log directories.
71887 </summary>
71888 @@ -117128,7 +118216,7 @@ Domain allowed access.
71889 </param>
71890 <rolecap/>
71891 </interface>
71892 -<interface name="logging_relabel_generic_log_dirs" lineno="1116">
71893 +<interface name="logging_relabel_generic_log_dirs" lineno="1188">
71894 <summary>
71895 Relabel from and to generic log directory type.
71896 </summary>
71897 @@ -117139,7 +118227,7 @@ Domain allowed access.
71898 </param>
71899 <rolecap/>
71900 </interface>
71901 -<interface name="logging_read_generic_logs" lineno="1136">
71902 +<interface name="logging_read_generic_logs" lineno="1208">
71903 <summary>
71904 Read generic log files.
71905 </summary>
71906 @@ -117150,7 +118238,7 @@ Domain allowed access.
71907 </param>
71908 <rolecap/>
71909 </interface>
71910 -<interface name="logging_mmap_generic_logs" lineno="1157">
71911 +<interface name="logging_mmap_generic_logs" lineno="1229">
71912 <summary>
71913 Map generic log files.
71914 </summary>
71915 @@ -117161,7 +118249,7 @@ Domain allowed access.
71916 </param>
71917 <rolecap/>
71918 </interface>
71919 -<interface name="logging_write_generic_logs" lineno="1175">
71920 +<interface name="logging_write_generic_logs" lineno="1247">
71921 <summary>
71922 Write generic log files.
71923 </summary>
71924 @@ -117171,7 +118259,7 @@ Domain allowed access.
71925 </summary>
71926 </param>
71927 </interface>
71928 -<interface name="logging_dontaudit_write_generic_logs" lineno="1196">
71929 +<interface name="logging_dontaudit_write_generic_logs" lineno="1268">
71930 <summary>
71931 Dontaudit Write generic log files.
71932 </summary>
71933 @@ -117181,7 +118269,7 @@ Domain to not audit.
71934 </summary>
71935 </param>
71936 </interface>
71937 -<interface name="logging_rw_generic_logs" lineno="1214">
71938 +<interface name="logging_rw_generic_logs" lineno="1286">
71939 <summary>
71940 Read and write generic log files.
71941 </summary>
71942 @@ -117191,7 +118279,7 @@ Domain allowed access.
71943 </summary>
71944 </param>
71945 </interface>
71946 -<interface name="logging_manage_generic_logs" lineno="1237">
71947 +<interface name="logging_manage_generic_logs" lineno="1309">
71948 <summary>
71949 Create, read, write, and delete
71950 generic log files.
71951 @@ -117203,7 +118291,17 @@ Domain allowed access.
71952 </param>
71953 <rolecap/>
71954 </interface>
71955 -<interface name="logging_admin_audit" lineno="1263">
71956 +<interface name="logging_watch_generic_logs_dir" lineno="1328">
71957 +<summary>
71958 +Watch generic log dirs.
71959 +</summary>
71960 +<param name="domain">
71961 +<summary>
71962 +Domain allowed access.
71963 +</summary>
71964 +</param>
71965 +</interface>
71966 +<interface name="logging_admin_audit" lineno="1353">
71967 <summary>
71968 All of the rules required to administrate
71969 the audit environment
71970 @@ -117220,7 +118318,7 @@ User role allowed access.
71971 </param>
71972 <rolecap/>
71973 </interface>
71974 -<interface name="logging_admin_syslog" lineno="1307">
71975 +<interface name="logging_admin_syslog" lineno="1397">
71976 <summary>
71977 All of the rules required to administrate
71978 the syslog environment
71979 @@ -117237,7 +118335,7 @@ User role allowed access.
71980 </param>
71981 <rolecap/>
71982 </interface>
71983 -<interface name="logging_admin" lineno="1363">
71984 +<interface name="logging_admin" lineno="1453">
71985 <summary>
71986 All of the rules required to administrate
71987 the logging environment
71988 @@ -117254,7 +118352,7 @@ User role allowed access.
71989 </param>
71990 <rolecap/>
71991 </interface>
71992 -<interface name="logging_syslog_managed_log_file" lineno="1386">
71993 +<interface name="logging_syslog_managed_log_file" lineno="1476">
71994 <summary>
71995 Mark the type as a syslog managed log file
71996 and introduce the proper file transition when
71997 @@ -117272,7 +118370,7 @@ Name to use for the file
71998 </summary>
71999 </param>
72000 </interface>
72001 -<interface name="logging_syslog_managed_log_dir" lineno="1425">
72002 +<interface name="logging_syslog_managed_log_dir" lineno="1515">
72003 <summary>
72004 Mark the type as a syslog managed log dir
72005 and introduce the proper file transition when
72006 @@ -117299,7 +118397,7 @@ Name to use for the directory
72007 </summary>
72008 </param>
72009 </interface>
72010 -<interface name="logging_mmap_journal" lineno="1447">
72011 +<interface name="logging_mmap_journal" lineno="1537">
72012 <summary>
72013 Map files in /run/log/journal/ directory.
72014 </summary>
72015 @@ -117369,7 +118467,28 @@ Domain allowed access.
72016 </param>
72017 <rolecap/>
72018 </interface>
72019 -<interface name="lvm_manage_config" lineno="116">
72020 +<interface name="lvm_map_config" lineno="126">
72021 +<summary>
72022 +Map lvm config files.
72023 +</summary>
72024 +<desc>
72025 +<p>
72026 +Allow the specified domain to map lvm config files.
72027 +</p>
72028 +<p>
72029 +Related interfaces:
72030 +</p>
72031 +<ul>
72032 +<li>lvm_read_config()</li>
72033 +</ul>
72034 +</desc>
72035 +<param name="domain">
72036 +<summary>
72037 +Domain allowed access.
72038 +</summary>
72039 +</param>
72040 +</interface>
72041 +<interface name="lvm_manage_config" lineno="145">
72042 <summary>
72043 Manage LVM configuration files.
72044 </summary>
72045 @@ -117380,7 +118499,7 @@ Domain allowed access.
72046 </param>
72047 <rolecap/>
72048 </interface>
72049 -<interface name="lvm_create_lock_dirs" lineno="137">
72050 +<interface name="lvm_create_lock_dirs" lineno="166">
72051 <summary>
72052 Create lvm_lock_t directories
72053 </summary>
72054 @@ -117391,9 +118510,9 @@ Domain allowed access.
72055 </param>
72056 <rolecap/>
72057 </interface>
72058 -<interface name="lvm_rw_inherited_pid_pipes" lineno="156">
72059 +<interface name="lvm_rw_inherited_pid_pipes" lineno="185">
72060 <summary>
72061 -Read and write a lvm unnamed pipe.
72062 +Read and write a lvm unnamed pipe. (Deprecated)
72063 </summary>
72064 <param name="domain">
72065 <summary>
72066 @@ -117401,7 +118520,7 @@ Domain allowed access.
72067 </summary>
72068 </param>
72069 </interface>
72070 -<interface name="lvm_domtrans_clvmd" lineno="174">
72071 +<interface name="lvm_domtrans_clvmd" lineno="199">
72072 <summary>
72073 Execute a domain transition to run clvmd.
72074 </summary>
72075 @@ -117411,7 +118530,7 @@ Domain allowed to transition.
72076 </summary>
72077 </param>
72078 </interface>
72079 -<interface name="lvm_admin" lineno="199">
72080 +<interface name="lvm_admin" lineno="224">
72081 <summary>
72082 All of the rules required to
72083 administrate an lvm environment.
72084 @@ -117610,7 +118729,19 @@ Domain allowed access.
72085 </param>
72086 <rolecap/>
72087 </interface>
72088 -<interface name="miscfiles_read_fonts" lineno="296">
72089 +<interface name="miscfiles_manage_generic_tls_privkey_symlinks" lineno="297">
72090 +<summary>
72091 +Manage generic SSL/TLS private
72092 +keys.
72093 +</summary>
72094 +<param name="domain">
72095 +<summary>
72096 +Domain allowed access.
72097 +</summary>
72098 +</param>
72099 +<rolecap/>
72100 +</interface>
72101 +<interface name="miscfiles_read_fonts" lineno="316">
72102 <summary>
72103 Read fonts.
72104 </summary>
72105 @@ -117621,7 +118752,7 @@ Domain allowed access.
72106 </param>
72107 <rolecap/>
72108 </interface>
72109 -<interface name="miscfiles_setattr_fonts_dirs" lineno="327">
72110 +<interface name="miscfiles_setattr_fonts_dirs" lineno="347">
72111 <summary>
72112 Set the attributes on a fonts directory.
72113 </summary>
72114 @@ -117632,7 +118763,7 @@ Domain allowed access.
72115 </param>
72116 <rolecap/>
72117 </interface>
72118 -<interface name="miscfiles_dontaudit_setattr_fonts_dirs" lineno="347">
72119 +<interface name="miscfiles_dontaudit_setattr_fonts_dirs" lineno="367">
72120 <summary>
72121 Do not audit attempts to set the attributes
72122 on a fonts directory.
72123 @@ -117644,7 +118775,7 @@ Domain to not audit.
72124 </param>
72125 <rolecap/>
72126 </interface>
72127 -<interface name="miscfiles_dontaudit_write_fonts" lineno="366">
72128 +<interface name="miscfiles_dontaudit_write_fonts" lineno="386">
72129 <summary>
72130 Do not audit attempts to write fonts.
72131 </summary>
72132 @@ -117655,7 +118786,7 @@ Domain to not audit.
72133 </param>
72134 <rolecap/>
72135 </interface>
72136 -<interface name="miscfiles_manage_fonts" lineno="386">
72137 +<interface name="miscfiles_manage_fonts" lineno="406">
72138 <summary>
72139 Create, read, write, and delete fonts.
72140 </summary>
72141 @@ -117666,7 +118797,18 @@ Domain allowed access.
72142 </param>
72143 <rolecap/>
72144 </interface>
72145 -<interface name="miscfiles_setattr_fonts_cache_dirs" lineno="410">
72146 +<interface name="miscfiles_watch_fonts_dirs" lineno="431">
72147 +<summary>
72148 +Watch fonts directories.
72149 +</summary>
72150 +<param name="domain">
72151 +<summary>
72152 +Domain allowed access.
72153 +</summary>
72154 +</param>
72155 +<rolecap/>
72156 +</interface>
72157 +<interface name="miscfiles_setattr_fonts_cache_dirs" lineno="449">
72158 <summary>
72159 Set the attributes on a fonts cache directory.
72160 </summary>
72161 @@ -117676,7 +118818,7 @@ Domain allowed access.
72162 </summary>
72163 </param>
72164 </interface>
72165 -<interface name="miscfiles_dontaudit_setattr_fonts_cache_dirs" lineno="429">
72166 +<interface name="miscfiles_dontaudit_setattr_fonts_cache_dirs" lineno="468">
72167 <summary>
72168 Do not audit attempts to set the attributes
72169 on a fonts cache directory.
72170 @@ -117687,7 +118829,7 @@ Domain to not audit.
72171 </summary>
72172 </param>
72173 </interface>
72174 -<interface name="miscfiles_manage_fonts_cache" lineno="448">
72175 +<interface name="miscfiles_manage_fonts_cache" lineno="487">
72176 <summary>
72177 Create, read, write, and delete fonts cache.
72178 </summary>
72179 @@ -117698,7 +118840,7 @@ Domain allowed access.
72180 </param>
72181 <rolecap/>
72182 </interface>
72183 -<interface name="miscfiles_read_hwdata" lineno="470">
72184 +<interface name="miscfiles_read_hwdata" lineno="509">
72185 <summary>
72186 Read hardware identification data.
72187 </summary>
72188 @@ -117708,7 +118850,7 @@ Domain allowed access.
72189 </summary>
72190 </param>
72191 </interface>
72192 -<interface name="miscfiles_setattr_localization" lineno="490">
72193 +<interface name="miscfiles_setattr_localization" lineno="529">
72194 <summary>
72195 Allow process to setattr localization info
72196 </summary>
72197 @@ -117718,7 +118860,7 @@ Domain allowed access.
72198 </summary>
72199 </param>
72200 </interface>
72201 -<interface name="miscfiles_read_localization" lineno="522">
72202 +<interface name="miscfiles_read_localization" lineno="561">
72203 <summary>
72204 Allow process to read localization information.
72205 </summary>
72206 @@ -117740,7 +118882,7 @@ Domain allowed access.
72207 </param>
72208 <infoflow type="read" weight="10"/>
72209 </interface>
72210 -<interface name="miscfiles_rw_localization" lineno="545">
72211 +<interface name="miscfiles_rw_localization" lineno="584">
72212 <summary>
72213 Allow process to write localization info
72214 </summary>
72215 @@ -117750,7 +118892,7 @@ Domain allowed access.
72216 </summary>
72217 </param>
72218 </interface>
72219 -<interface name="miscfiles_relabel_localization" lineno="565">
72220 +<interface name="miscfiles_relabel_localization" lineno="604">
72221 <summary>
72222 Allow process to relabel localization info
72223 </summary>
72224 @@ -117760,7 +118902,7 @@ Domain allowed access.
72225 </summary>
72226 </param>
72227 </interface>
72228 -<interface name="miscfiles_legacy_read_localization" lineno="584">
72229 +<interface name="miscfiles_legacy_read_localization" lineno="623">
72230 <summary>
72231 Allow process to read legacy time localization info
72232 </summary>
72233 @@ -117770,7 +118912,7 @@ Domain allowed access.
72234 </summary>
72235 </param>
72236 </interface>
72237 -<interface name="miscfiles_watch_localization" lineno="603">
72238 +<interface name="miscfiles_watch_localization" lineno="642">
72239 <summary>
72240 Watch time localization info
72241 </summary>
72242 @@ -117780,7 +118922,7 @@ Domain allowed access.
72243 </summary>
72244 </param>
72245 </interface>
72246 -<interface name="miscfiles_search_man_pages" lineno="621">
72247 +<interface name="miscfiles_search_man_pages" lineno="660">
72248 <summary>
72249 Search man pages.
72250 </summary>
72251 @@ -117790,7 +118932,7 @@ Domain allowed access.
72252 </summary>
72253 </param>
72254 </interface>
72255 -<interface name="miscfiles_dontaudit_search_man_pages" lineno="640">
72256 +<interface name="miscfiles_dontaudit_search_man_pages" lineno="679">
72257 <summary>
72258 Do not audit attempts to search man pages.
72259 </summary>
72260 @@ -117800,7 +118942,7 @@ Domain to not audit.
72261 </summary>
72262 </param>
72263 </interface>
72264 -<interface name="miscfiles_read_man_pages" lineno="659">
72265 +<interface name="miscfiles_read_man_pages" lineno="698">
72266 <summary>
72267 Read man pages
72268 </summary>
72269 @@ -117811,7 +118953,7 @@ Domain allowed access.
72270 </param>
72271 <rolecap/>
72272 </interface>
72273 -<interface name="miscfiles_delete_man_pages" lineno="681">
72274 +<interface name="miscfiles_delete_man_pages" lineno="720">
72275 <summary>
72276 Delete man pages
72277 </summary>
72278 @@ -117821,7 +118963,7 @@ Domain allowed access.
72279 </summary>
72280 </param>
72281 </interface>
72282 -<interface name="miscfiles_manage_man_pages" lineno="703">
72283 +<interface name="miscfiles_manage_man_pages" lineno="742">
72284 <summary>
72285 Create, read, write, and delete man pages
72286 </summary>
72287 @@ -117831,7 +118973,7 @@ Domain allowed access.
72288 </summary>
72289 </param>
72290 </interface>
72291 -<interface name="miscfiles_read_man_cache" lineno="724">
72292 +<interface name="miscfiles_read_man_cache" lineno="763">
72293 <summary>
72294 Read man cache content.
72295 </summary>
72296 @@ -117841,7 +118983,7 @@ Domain allowed access.
72297 </summary>
72298 </param>
72299 </interface>
72300 -<interface name="miscfiles_map_man_cache" lineno="745">
72301 +<interface name="miscfiles_map_man_cache" lineno="784">
72302 <summary>
72303 Map man cache content.
72304 </summary>
72305 @@ -117851,7 +118993,7 @@ Domain allowed access.
72306 </summary>
72307 </param>
72308 </interface>
72309 -<interface name="miscfiles_manage_man_cache" lineno="764">
72310 +<interface name="miscfiles_manage_man_cache" lineno="803">
72311 <summary>
72312 Create, read, write, and delete
72313 man cache content.
72314 @@ -117862,7 +119004,7 @@ Domain allowed access.
72315 </summary>
72316 </param>
72317 </interface>
72318 -<interface name="miscfiles_relabel_man_cache" lineno="785">
72319 +<interface name="miscfiles_relabel_man_cache" lineno="824">
72320 <summary>
72321 Relabel from and to man cache.
72322 </summary>
72323 @@ -117872,7 +119014,7 @@ Domain allowed access.
72324 </summary>
72325 </param>
72326 </interface>
72327 -<interface name="miscfiles_read_public_files" lineno="806">
72328 +<interface name="miscfiles_read_public_files" lineno="845">
72329 <summary>
72330 Read public files used for file
72331 transfer services.
72332 @@ -117884,7 +119026,7 @@ Domain allowed access.
72333 </param>
72334 <rolecap/>
72335 </interface>
72336 -<interface name="miscfiles_manage_public_files" lineno="828">
72337 +<interface name="miscfiles_manage_public_files" lineno="867">
72338 <summary>
72339 Create, read, write, and delete public files
72340 and directories used for file transfer services.
72341 @@ -117896,7 +119038,17 @@ Domain allowed access.
72342 </param>
72343 <rolecap/>
72344 </interface>
72345 -<interface name="miscfiles_read_tetex_data" lineno="848">
72346 +<interface name="miscfiles_watch_public_dirs" lineno="887">
72347 +<summary>
72348 +Watch public files
72349 +</summary>
72350 +<param name="domain">
72351 +<summary>
72352 +Domain allowed access.
72353 +</summary>
72354 +</param>
72355 +</interface>
72356 +<interface name="miscfiles_read_tetex_data" lineno="905">
72357 <summary>
72358 Read TeX data
72359 </summary>
72360 @@ -117906,7 +119058,7 @@ Domain allowed access.
72361 </summary>
72362 </param>
72363 </interface>
72364 -<interface name="miscfiles_exec_tetex_data" lineno="872">
72365 +<interface name="miscfiles_exec_tetex_data" lineno="929">
72366 <summary>
72367 Execute TeX data programs in the caller domain.
72368 </summary>
72369 @@ -117916,7 +119068,7 @@ Domain allowed access.
72370 </summary>
72371 </param>
72372 </interface>
72373 -<interface name="miscfiles_domain_entry_test_files" lineno="896">
72374 +<interface name="miscfiles_domain_entry_test_files" lineno="953">
72375 <summary>
72376 Let test files be an entry point for
72377 a specified domain.
72378 @@ -117927,7 +119079,7 @@ Domain allowed access.
72379 </summary>
72380 </param>
72381 </interface>
72382 -<interface name="miscfiles_read_test_files" lineno="914">
72383 +<interface name="miscfiles_read_test_files" lineno="971">
72384 <summary>
72385 Read test files and directories.
72386 </summary>
72387 @@ -117937,7 +119089,7 @@ Domain allowed access.
72388 </summary>
72389 </param>
72390 </interface>
72391 -<interface name="miscfiles_exec_test_files" lineno="933">
72392 +<interface name="miscfiles_exec_test_files" lineno="990">
72393 <summary>
72394 Execute test files.
72395 </summary>
72396 @@ -117947,7 +119099,7 @@ Domain allowed access.
72397 </summary>
72398 </param>
72399 </interface>
72400 -<interface name="miscfiles_etc_filetrans_localization" lineno="953">
72401 +<interface name="miscfiles_etc_filetrans_localization" lineno="1010">
72402 <summary>
72403 Create files in etc directories
72404 with localization file type.
72405 @@ -117958,7 +119110,7 @@ Domain allowed access.
72406 </summary>
72407 </param>
72408 </interface>
72409 -<interface name="miscfiles_manage_localization" lineno="973">
72410 +<interface name="miscfiles_manage_localization" lineno="1030">
72411 <summary>
72412 Create, read, write, and delete localization
72413 </summary>
72414 @@ -117982,7 +119134,7 @@ Domain allowed access.
72415 </summary>
72416 </param>
72417 </interface>
72418 -<interface name="modutils_read_module_deps" lineno="31">
72419 +<interface name="modutils_read_module_deps" lineno="32">
72420 <summary>
72421 Read the dependencies of kernel modules.
72422 </summary>
72423 @@ -117992,9 +119144,9 @@ Domain allowed access.
72424 </summary>
72425 </param>
72426 </interface>
72427 -<interface name="modutils_read_module_objects" lineno="50">
72428 +<interface name="modutils_read_module_objects" lineno="51">
72429 <summary>
72430 -Read the kernel modules.
72431 +Read the kernel modules. (Deprecated)
72432 </summary>
72433 <param name="domain">
72434 <summary>
72435 @@ -118002,7 +119154,7 @@ Domain allowed access.
72436 </summary>
72437 </param>
72438 </interface>
72439 -<interface name="modutils_read_module_config" lineno="71">
72440 +<interface name="modutils_read_module_config" lineno="68">
72441 <summary>
72442 Read the configuration options used when
72443 loading modules.
72444 @@ -118014,7 +119166,7 @@ Domain allowed access.
72445 </param>
72446 <rolecap/>
72447 </interface>
72448 -<interface name="modutils_rename_module_config" lineno="97">
72449 +<interface name="modutils_rename_module_config" lineno="94">
72450 <summary>
72451 Rename a file with the configuration options used when
72452 loading modules.
72453 @@ -118025,7 +119177,7 @@ Domain allowed access.
72454 </summary>
72455 </param>
72456 </interface>
72457 -<interface name="modutils_delete_module_config" lineno="116">
72458 +<interface name="modutils_delete_module_config" lineno="113">
72459 <summary>
72460 Unlink a file with the configuration options used when
72461 loading modules.
72462 @@ -118036,7 +119188,7 @@ Domain allowed access.
72463 </summary>
72464 </param>
72465 </interface>
72466 -<interface name="modutils_manage_module_config" lineno="135">
72467 +<interface name="modutils_manage_module_config" lineno="132">
72468 <summary>
72469 Manage files with the configuration options used when
72470 loading modules.
72471 @@ -118047,7 +119199,7 @@ Domain allowed access.
72472 </summary>
72473 </param>
72474 </interface>
72475 -<interface name="modutils_domtrans" lineno="155">
72476 +<interface name="modutils_domtrans" lineno="152">
72477 <summary>
72478 Execute any modutil,
72479 like insmod, kmod, depmod or updates-modules,
72480 @@ -118059,7 +119211,7 @@ Domain allowed to transition.
72481 </summary>
72482 </param>
72483 </interface>
72484 -<interface name="modutils_run" lineno="184">
72485 +<interface name="modutils_run" lineno="181">
72486 <summary>
72487 Execute any modutil,
72488 like insmod, kmod, depmod or updates-modules,
72489 @@ -118079,7 +119231,7 @@ Role allowed access.
72490 </param>
72491 <rolecap/>
72492 </interface>
72493 -<interface name="modutils_exec" lineno="205">
72494 +<interface name="modutils_exec" lineno="202">
72495 <summary>
72496 Execute any modutil,
72497 like insmod, kmod, depmod or updates-modules,
72498 @@ -118091,137 +119243,6 @@ Domain allowed access.
72499 </summary>
72500 </param>
72501 </interface>
72502 -<interface name="modutils_domtrans_insmod_uncond" lineno="226">
72503 -<summary>
72504 -Unconditionally execute insmod in the insmod domain.
72505 -</summary>
72506 -<param name="domain">
72507 -<summary>
72508 -Domain allowed to transition.
72509 -</summary>
72510 -</param>
72511 -</interface>
72512 -<interface name="modutils_domtrans_insmod" lineno="241">
72513 -<summary>
72514 -Execute insmod in the insmod domain.
72515 -</summary>
72516 -<param name="domain">
72517 -<summary>
72518 -Domain allowed to transition.
72519 -</summary>
72520 -</param>
72521 -</interface>
72522 -<interface name="modutils_run_insmod" lineno="265">
72523 -<summary>
72524 -Execute insmod in the insmod domain, and
72525 -allow the specified role the insmod domain,
72526 -and use the caller's terminal. Has a sigchld
72527 -backchannel.
72528 -</summary>
72529 -<param name="domain">
72530 -<summary>
72531 -Domain allowed to transition.
72532 -</summary>
72533 -</param>
72534 -<param name="role">
72535 -<summary>
72536 -Role allowed access.
72537 -</summary>
72538 -</param>
72539 -<rolecap/>
72540 -</interface>
72541 -<interface name="modutils_exec_insmod" lineno="280">
72542 -<summary>
72543 -Execute insmod in the caller domain.
72544 -</summary>
72545 -<param name="domain">
72546 -<summary>
72547 -Domain allowed access.
72548 -</summary>
72549 -</param>
72550 -</interface>
72551 -<interface name="modutils_domtrans_depmod" lineno="295">
72552 -<summary>
72553 -Execute depmod in the depmod domain.
72554 -</summary>
72555 -<param name="domain">
72556 -<summary>
72557 -Domain allowed to transition.
72558 -</summary>
72559 -</param>
72560 -</interface>
72561 -<interface name="modutils_run_depmod" lineno="316">
72562 -<summary>
72563 -Execute depmod in the depmod domain.
72564 -</summary>
72565 -<param name="domain">
72566 -<summary>
72567 -Domain allowed to transition.
72568 -</summary>
72569 -</param>
72570 -<param name="role">
72571 -<summary>
72572 -Role allowed access.
72573 -</summary>
72574 -</param>
72575 -<rolecap/>
72576 -</interface>
72577 -<interface name="modutils_exec_depmod" lineno="331">
72578 -<summary>
72579 -Execute depmod in the caller domain.
72580 -</summary>
72581 -<param name="domain">
72582 -<summary>
72583 -Domain allowed access.
72584 -</summary>
72585 -</param>
72586 -</interface>
72587 -<interface name="modutils_domtrans_update_mods" lineno="346">
72588 -<summary>
72589 -Execute update_modules in the update_modules domain.
72590 -</summary>
72591 -<param name="domain">
72592 -<summary>
72593 -Domain allowed to transition.
72594 -</summary>
72595 -</param>
72596 -</interface>
72597 -<interface name="modutils_run_update_mods" lineno="367">
72598 -<summary>
72599 -Execute update_modules in the update_modules domain.
72600 -</summary>
72601 -<param name="domain">
72602 -<summary>
72603 -Domain allowed to transition.
72604 -</summary>
72605 -</param>
72606 -<param name="role">
72607 -<summary>
72608 -Role allowed access.
72609 -</summary>
72610 -</param>
72611 -<rolecap/>
72612 -</interface>
72613 -<interface name="modutils_exec_update_mods" lineno="382">
72614 -<summary>
72615 -Execute update_modules in the caller domain.
72616 -</summary>
72617 -<param name="domain">
72618 -<summary>
72619 -Domain allowed access.
72620 -</summary>
72621 -</param>
72622 -</interface>
72623 -<interface name="modutils_read_var_run_files" lineno="397">
72624 -<summary>
72625 -Read kmod lib files.
72626 -</summary>
72627 -<param name="domain">
72628 -<summary>
72629 -Domain allowed access.
72630 -</summary>
72631 -</param>
72632 -</interface>
72633 </module>
72634 <module name="mount" filename="policy/modules/system/mount.if">
72635 <summary>Policy for mount.</summary>
72636 @@ -118419,41 +119440,12 @@ Role allowed access.
72637 <rolecap/>
72638 </interface>
72639 </module>
72640 -<module name="pcmcia" filename="policy/modules/system/pcmcia.if">
72641 -<summary>PCMCIA card management services.</summary>
72642 -<interface name="pcmcia_stub" lineno="13">
72643 -<summary>
72644 -PCMCIA stub interface. No access allowed.
72645 -</summary>
72646 -<param name="domain" unused="true">
72647 -<summary>
72648 -Domain allowed access.
72649 -</summary>
72650 -</param>
72651 -</interface>
72652 -<interface name="pcmcia_domtrans_cardmgr" lineno="29">
72653 -<summary>
72654 -Execute cardmgr in the cardmgr domain.
72655 -</summary>
72656 -<param name="domain">
72657 -<summary>
72658 -Domain allowed to transition.
72659 -</summary>
72660 -</param>
72661 -</interface>
72662 -<interface name="pcmcia_use_cardmgr_fds" lineno="48">
72663 -<summary>
72664 -Inherit and use cardmgr file descriptors.
72665 -</summary>
72666 -<param name="domain">
72667 -<summary>
72668 -Domain allowed access.
72669 -</summary>
72670 -</param>
72671 -</interface>
72672 -<interface name="pcmcia_domtrans_cardctl" lineno="66">
72673 +<module name="raid" filename="policy/modules/system/raid.if">
72674 +<summary>RAID array management tools.</summary>
72675 +<interface name="raid_domtrans_mdadm" lineno="14">
72676 <summary>
72677 -Execute cardctl in the cardmgr domain.
72678 +Execute software raid tools in
72679 +the mdadm domain.
72680 </summary>
72681 <param name="domain">
72682 <summary>
72683 @@ -118461,38 +119453,26 @@ Domain allowed to transition.
72684 </summary>
72685 </param>
72686 </interface>
72687 -<interface name="pcmcia_run_cardctl" lineno="93">
72688 +<interface name="raid_run_mdadm" lineno="40">
72689 <summary>
72690 -Execute cardctl in the cardmgr
72691 +Execute mdadm in the mdadm
72692 domain, and allow the specified
72693 -role the cardmgr domain.
72694 -</summary>
72695 -<param name="domain">
72696 -<summary>
72697 -Domain allowed to transition.
72698 +role the mdadm domain.
72699 </summary>
72700 -</param>
72701 <param name="role">
72702 <summary>
72703 Role allowed access.
72704 </summary>
72705 </param>
72706 -<rolecap/>
72707 -</interface>
72708 -<interface name="pcmcia_read_pid" lineno="112">
72709 -<summary>
72710 -Read cardmgr pid files.
72711 -</summary>
72712 <param name="domain">
72713 <summary>
72714 -Domain allowed access.
72715 +Domain allowed to transition.
72716 </summary>
72717 </param>
72718 </interface>
72719 -<interface name="pcmcia_manage_pid" lineno="132">
72720 +<interface name="raid_read_mdadm_pid" lineno="59">
72721 <summary>
72722 -Create, read, write, and delete
72723 -cardmgr pid files.
72724 +read mdadm pid files. (Deprecated)
72725 </summary>
72726 <param name="domain">
72727 <summary>
72728 @@ -118500,10 +119480,10 @@ Domain allowed access.
72729 </summary>
72730 </param>
72731 </interface>
72732 -<interface name="pcmcia_manage_pid_chr_files" lineno="152">
72733 +<interface name="raid_manage_mdadm_pid" lineno="75">
72734 <summary>
72735 Create, read, write, and delete
72736 -cardmgr runtime character nodes.
72737 +mdadm pid files. (Deprecated)
72738 </summary>
72739 <param name="domain">
72740 <summary>
72741 @@ -118511,40 +119491,9 @@ Domain allowed access.
72742 </summary>
72743 </param>
72744 </interface>
72745 -</module>
72746 -<module name="raid" filename="policy/modules/system/raid.if">
72747 -<summary>RAID array management tools.</summary>
72748 -<interface name="raid_domtrans_mdadm" lineno="14">
72749 +<interface name="raid_read_mdadm_runtime_files" lineno="90">
72750 <summary>
72751 -Execute software raid tools in
72752 -the mdadm domain.
72753 -</summary>
72754 -<param name="domain">
72755 -<summary>
72756 -Domain allowed to transition.
72757 -</summary>
72758 -</param>
72759 -</interface>
72760 -<interface name="raid_run_mdadm" lineno="40">
72761 -<summary>
72762 -Execute mdadm in the mdadm
72763 -domain, and allow the specified
72764 -role the mdadm domain.
72765 -</summary>
72766 -<param name="role">
72767 -<summary>
72768 -Role allowed access.
72769 -</summary>
72770 -</param>
72771 -<param name="domain">
72772 -<summary>
72773 -Domain allowed to transition.
72774 -</summary>
72775 -</param>
72776 -</interface>
72777 -<interface name="raid_read_mdadm_pid" lineno="59">
72778 -<summary>
72779 -read mdadm pid files.
72780 +Read mdadm runtime files.
72781 </summary>
72782 <param name="domain">
72783 <summary>
72784 @@ -118552,10 +119501,10 @@ Domain allowed access.
72785 </summary>
72786 </param>
72787 </interface>
72788 -<interface name="raid_manage_mdadm_pid" lineno="80">
72789 +<interface name="raid_manage_mdadm_runtime_files" lineno="111">
72790 <summary>
72791 Create, read, write, and delete
72792 -mdadm pid files.
72793 +mdadm runtime files.
72794 </summary>
72795 <param name="domain">
72796 <summary>
72797 @@ -118563,7 +119512,7 @@ Domain allowed access.
72798 </summary>
72799 </param>
72800 </interface>
72801 -<interface name="raid_admin_mdadm" lineno="106">
72802 +<interface name="raid_admin_mdadm" lineno="137">
72803 <summary>
72804 All of the rules required to
72805 administrate an mdadm environment.
72806 @@ -119265,7 +120214,7 @@ Domain allowed to transition.
72807 </interface>
72808 <interface name="setrans_translate_context" lineno="32">
72809 <summary>
72810 -Allow a domain to translate contexts. (Deprecated)
72811 +Allow a domain to translate contexts.
72812 </summary>
72813 <param name="domain">
72814 <summary>
72815 @@ -119273,7 +120222,7 @@ Domain allowed access.
72816 </summary>
72817 </param>
72818 </interface>
72819 -<interface name="setrans_admin" lineno="52">
72820 +<interface name="setrans_admin" lineno="58">
72821 <summary>
72822 All of the rules required to
72823 administrate an setrans environment.
72824 @@ -119497,7 +120446,39 @@ Domain allowed access.
72825 </summary>
72826 </param>
72827 </interface>
72828 -<interface name="sysnet_dontaudit_read_config" lineno="377">
72829 +<interface name="sysnet_mmap_config_files" lineno="385">
72830 +<summary>
72831 +Map network config files.
72832 +</summary>
72833 +<desc>
72834 +<p>
72835 +Allow the specified domain to mmap the
72836 +general network configuration files.
72837 +</p>
72838 +</desc>
72839 +<param name="domain">
72840 +<summary>
72841 +Domain allowed access.
72842 +</summary>
72843 +</param>
72844 +</interface>
72845 +<interface name="sysnet_mmap_read_config" lineno="410">
72846 +<summary>
72847 +map network config files.
72848 +</summary>
72849 +<desc>
72850 +<p>
72851 +Allow the specified domain to mmap the
72852 +general network configuration files.
72853 +</p>
72854 +</desc>
72855 +<param name="domain">
72856 +<summary>
72857 +Domain allowed access.
72858 +</summary>
72859 +</param>
72860 +</interface>
72861 +<interface name="sysnet_dontaudit_read_config" lineno="429">
72862 <summary>
72863 Do not audit attempts to read network config files.
72864 </summary>
72865 @@ -119507,7 +120488,7 @@ Domain to not audit.
72866 </summary>
72867 </param>
72868 </interface>
72869 -<interface name="sysnet_write_config" lineno="395">
72870 +<interface name="sysnet_write_config" lineno="447">
72871 <summary>
72872 Write network config files.
72873 </summary>
72874 @@ -119517,7 +120498,7 @@ Domain allowed access.
72875 </summary>
72876 </param>
72877 </interface>
72878 -<interface name="sysnet_create_config" lineno="414">
72879 +<interface name="sysnet_create_config" lineno="466">
72880 <summary>
72881 Create network config files.
72882 </summary>
72883 @@ -119527,7 +120508,7 @@ Domain allowed access.
72884 </summary>
72885 </param>
72886 </interface>
72887 -<interface name="sysnet_relabel_config" lineno="433">
72888 +<interface name="sysnet_relabel_config" lineno="485">
72889 <summary>
72890 Relabel network config files.
72891 </summary>
72892 @@ -119537,7 +120518,7 @@ Domain allowed access.
72893 </summary>
72894 </param>
72895 </interface>
72896 -<interface name="sysnet_etc_filetrans_config" lineno="458">
72897 +<interface name="sysnet_etc_filetrans_config" lineno="510">
72898 <summary>
72899 Create files in /etc with the type used for
72900 the network config files.
72901 @@ -119553,7 +120534,7 @@ The name of the object being created.
72902 </summary>
72903 </param>
72904 </interface>
72905 -<interface name="sysnet_manage_config" lineno="476">
72906 +<interface name="sysnet_manage_config" lineno="528">
72907 <summary>
72908 Create, read, write, and delete network config files.
72909 </summary>
72910 @@ -119563,9 +120544,19 @@ Domain allowed access.
72911 </summary>
72912 </param>
72913 </interface>
72914 -<interface name="sysnet_read_dhcpc_pid" lineno="504">
72915 +<interface name="sysnet_read_dhcpc_pid" lineno="556">
72916 +<summary>
72917 +Read the dhcp client pid file. (Deprecated)
72918 +</summary>
72919 +<param name="domain">
72920 +<summary>
72921 +Domain allowed access.
72922 +</summary>
72923 +</param>
72924 +</interface>
72925 +<interface name="sysnet_delete_dhcpc_pid" lineno="571">
72926 <summary>
72927 -Read the dhcp client pid file.
72928 +Delete the dhcp client pid file. (Deprecated)
72929 </summary>
72930 <param name="domain">
72931 <summary>
72932 @@ -119573,9 +120564,9 @@ Domain allowed access.
72933 </summary>
72934 </param>
72935 </interface>
72936 -<interface name="sysnet_delete_dhcpc_pid" lineno="523">
72937 +<interface name="sysnet_read_dhcpc_runtime_files" lineno="586">
72938 <summary>
72939 -Delete the dhcp client pid file.
72940 +Read dhcp client runtime files.
72941 </summary>
72942 <param name="domain">
72943 <summary>
72944 @@ -119583,7 +120574,17 @@ Domain allowed access.
72945 </summary>
72946 </param>
72947 </interface>
72948 -<interface name="sysnet_domtrans_ifconfig" lineno="541">
72949 +<interface name="sysnet_delete_dhcpc_runtime_files" lineno="605">
72950 +<summary>
72951 +Delete the dhcp client runtime files.
72952 +</summary>
72953 +<param name="domain">
72954 +<summary>
72955 +Domain allowed access.
72956 +</summary>
72957 +</param>
72958 +</interface>
72959 +<interface name="sysnet_domtrans_ifconfig" lineno="623">
72960 <summary>
72961 Execute ifconfig in the ifconfig domain.
72962 </summary>
72963 @@ -119593,7 +120594,7 @@ Domain allowed to transition.
72964 </summary>
72965 </param>
72966 </interface>
72967 -<interface name="sysnet_run_ifconfig" lineno="568">
72968 +<interface name="sysnet_run_ifconfig" lineno="650">
72969 <summary>
72970 Execute ifconfig in the ifconfig domain, and
72971 allow the specified role the ifconfig domain,
72972 @@ -119611,7 +120612,7 @@ Role allowed access.
72973 </param>
72974 <rolecap/>
72975 </interface>
72976 -<interface name="sysnet_exec_ifconfig" lineno="588">
72977 +<interface name="sysnet_exec_ifconfig" lineno="670">
72978 <summary>
72979 Execute ifconfig in the caller domain.
72980 </summary>
72981 @@ -119621,7 +120622,7 @@ Domain allowed access.
72982 </summary>
72983 </param>
72984 </interface>
72985 -<interface name="sysnet_signal_ifconfig" lineno="608">
72986 +<interface name="sysnet_signal_ifconfig" lineno="690">
72987 <summary>
72988 Send a generic signal to ifconfig.
72989 </summary>
72990 @@ -119632,7 +120633,7 @@ Domain allowed access.
72991 </param>
72992 <rolecap/>
72993 </interface>
72994 -<interface name="sysnet_signull_ifconfig" lineno="627">
72995 +<interface name="sysnet_signull_ifconfig" lineno="709">
72996 <summary>
72997 Send null signals to ifconfig.
72998 </summary>
72999 @@ -119643,7 +120644,7 @@ Domain allowed access.
73000 </param>
73001 <rolecap/>
73002 </interface>
73003 -<interface name="sysnet_read_dhcp_config" lineno="645">
73004 +<interface name="sysnet_read_dhcp_config" lineno="727">
73005 <summary>
73006 Read the DHCP configuration files.
73007 </summary>
73008 @@ -119653,7 +120654,7 @@ Domain allowed access.
73009 </summary>
73010 </param>
73011 </interface>
73012 -<interface name="sysnet_search_dhcp_state" lineno="665">
73013 +<interface name="sysnet_search_dhcp_state" lineno="747">
73014 <summary>
73015 Search the DHCP state data directory.
73016 </summary>
73017 @@ -119663,7 +120664,7 @@ Domain allowed access.
73018 </summary>
73019 </param>
73020 </interface>
73021 -<interface name="sysnet_dhcp_state_filetrans" lineno="709">
73022 +<interface name="sysnet_dhcp_state_filetrans" lineno="791">
73023 <summary>
73024 Create DHCP state data.
73025 </summary>
73026 @@ -119698,7 +120699,7 @@ The name of the object being created.
73027 </summary>
73028 </param>
73029 </interface>
73030 -<interface name="sysnet_dns_name_resolve" lineno="729">
73031 +<interface name="sysnet_dns_name_resolve" lineno="811">
73032 <summary>
73033 Perform a DNS name resolution.
73034 </summary>
73035 @@ -119709,7 +120710,7 @@ Domain allowed access.
73036 </param>
73037 <rolecap/>
73038 </interface>
73039 -<interface name="sysnet_use_ldap" lineno="780">
73040 +<interface name="sysnet_use_ldap" lineno="861">
73041 <summary>
73042 Connect and use a LDAP server.
73043 </summary>
73044 @@ -119719,7 +120720,7 @@ Domain allowed access.
73045 </summary>
73046 </param>
73047 </interface>
73048 -<interface name="sysnet_use_portmap" lineno="808">
73049 +<interface name="sysnet_use_portmap" lineno="888">
73050 <summary>
73051 Connect and use remote port mappers.
73052 </summary>
73053 @@ -119729,7 +120730,7 @@ Domain allowed access.
73054 </summary>
73055 </param>
73056 </interface>
73057 -<interface name="sysnet_dhcpc_script_entry" lineno="843">
73058 +<interface name="sysnet_dhcpc_script_entry" lineno="922">
73059 <summary>
73060 Make the specified program domain
73061 accessable from the DHCP hooks/scripts.
73062 @@ -119745,6 +120746,14 @@ The type of the file used as an entrypoint to this domain.
73063 </summary>
73064 </param>
73065 </interface>
73066 +<tunable name="dhcpc_manage_samba" dftval="false">
73067 +<desc>
73068 +<p>
73069 +Determine whether DHCP client
73070 +can manage samba
73071 +</p>
73072 +</desc>
73073 +</tunable>
73074 </module>
73075 <module name="systemd" filename="policy/modules/system/systemd.if">
73076 <summary>Systemd components (not PID 1)</summary>
73077 @@ -119768,7 +120777,7 @@ The user domain for the role.
73078 </summary>
73079 </param>
73080 </template>
73081 -<interface name="systemd_log_parse_environment" lineno="74">
73082 +<interface name="systemd_log_parse_environment" lineno="82">
73083 <summary>
73084 Make the specified type usable as an
73085 log parse environment type.
73086 @@ -119779,7 +120788,7 @@ Type to be used as a log parse environment type.
73087 </summary>
73088 </param>
73089 </interface>
73090 -<interface name="systemd_use_nss" lineno="94">
73091 +<interface name="systemd_use_nss" lineno="102">
73092 <summary>
73093 Allow domain to use systemd's Name Service Switch (NSS) module.
73094 This module provides UNIX user and group name resolution for dynamic users
73095 @@ -119791,7 +120800,7 @@ Domain allowed access
73096 </summary>
73097 </param>
73098 </interface>
73099 -<interface name="systemd_PrivateDevices" lineno="121">
73100 +<interface name="systemd_PrivateDevices" lineno="129">
73101 <summary>
73102 Allow domain to be used as a systemd service with a unit
73103 that uses PrivateDevices=yes in section [Service].
73104 @@ -119802,7 +120811,7 @@ Domain allowed access
73105 </summary>
73106 </param>
73107 </interface>
73108 -<interface name="systemd_read_hwdb" lineno="138">
73109 +<interface name="systemd_read_hwdb" lineno="146">
73110 <summary>
73111 Allow domain to read udev hwdb file
73112 </summary>
73113 @@ -119812,7 +120821,7 @@ domain allowed access
73114 </summary>
73115 </param>
73116 </interface>
73117 -<interface name="systemd_map_hwdb" lineno="156">
73118 +<interface name="systemd_map_hwdb" lineno="164">
73119 <summary>
73120 Allow domain to map udev hwdb file
73121 </summary>
73122 @@ -119822,9 +120831,19 @@ domain allowed access
73123 </summary>
73124 </param>
73125 </interface>
73126 -<interface name="systemd_read_logind_pids" lineno="174">
73127 +<interface name="systemd_read_logind_pids" lineno="182">
73128 +<summary>
73129 +Read systemd_login PID files. (Deprecated)
73130 +</summary>
73131 +<param name="domain">
73132 +<summary>
73133 +Domain allowed access.
73134 +</summary>
73135 +</param>
73136 +</interface>
73137 +<interface name="systemd_manage_logind_pid_pipes" lineno="197">
73138 <summary>
73139 -Read systemd_login PID files.
73140 +Manage systemd_login PID pipes. (Deprecated)
73141 </summary>
73142 <param name="domain">
73143 <summary>
73144 @@ -119832,9 +120851,9 @@ Domain allowed access.
73145 </summary>
73146 </param>
73147 </interface>
73148 -<interface name="systemd_manage_logind_pid_pipes" lineno="194">
73149 +<interface name="systemd_write_logind_pid_pipes" lineno="212">
73150 <summary>
73151 -Manage systemd_login PID pipes.
73152 +Write systemd_login named pipe. (Deprecated)
73153 </summary>
73154 <param name="domain">
73155 <summary>
73156 @@ -119842,9 +120861,9 @@ Domain allowed access.
73157 </summary>
73158 </param>
73159 </interface>
73160 -<interface name="systemd_write_logind_pid_pipes" lineno="213">
73161 +<interface name="systemd_read_logind_runtime_files" lineno="227">
73162 <summary>
73163 -Write systemd_login named pipe.
73164 +Read systemd-logind runtime files.
73165 </summary>
73166 <param name="domain">
73167 <summary>
73168 @@ -119852,7 +120871,27 @@ Domain allowed access.
73169 </summary>
73170 </param>
73171 </interface>
73172 -<interface name="systemd_use_logind_fds" lineno="234">
73173 +<interface name="systemd_manage_logind_runtime_pipes" lineno="247">
73174 +<summary>
73175 +Manage systemd-logind runtime pipes.
73176 +</summary>
73177 +<param name="domain">
73178 +<summary>
73179 +Domain allowed access.
73180 +</summary>
73181 +</param>
73182 +</interface>
73183 +<interface name="systemd_write_logind_runtime_pipes" lineno="266">
73184 +<summary>
73185 +Write systemd-logind runtime named pipe.
73186 +</summary>
73187 +<param name="domain">
73188 +<summary>
73189 +Domain allowed access.
73190 +</summary>
73191 +</param>
73192 +</interface>
73193 +<interface name="systemd_use_logind_fds" lineno="287">
73194 <summary>
73195 Use inherited systemd
73196 logind file descriptors.
73197 @@ -119863,7 +120902,7 @@ Domain allowed access.
73198 </summary>
73199 </param>
73200 </interface>
73201 -<interface name="systemd_read_logind_sessions_files" lineno="252">
73202 +<interface name="systemd_read_logind_sessions_files" lineno="305">
73203 <summary>
73204 Read logind sessions files.
73205 </summary>
73206 @@ -119873,7 +120912,7 @@ Domain allowed access.
73207 </summary>
73208 </param>
73209 </interface>
73210 -<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="273">
73211 +<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="326">
73212 <summary>
73213 Write inherited logind sessions pipes.
73214 </summary>
73215 @@ -119883,7 +120922,7 @@ Domain allowed access.
73216 </summary>
73217 </param>
73218 </interface>
73219 -<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="293">
73220 +<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="346">
73221 <summary>
73222 Write inherited logind inhibit pipes.
73223 </summary>
73224 @@ -119893,7 +120932,7 @@ Domain allowed access.
73225 </summary>
73226 </param>
73227 </interface>
73228 -<interface name="systemd_dbus_chat_logind" lineno="314">
73229 +<interface name="systemd_dbus_chat_logind" lineno="367">
73230 <summary>
73231 Send and receive messages from
73232 systemd logind over dbus.
73233 @@ -119904,20 +120943,19 @@ Domain allowed access.
73234 </summary>
73235 </param>
73236 </interface>
73237 -<interface name="systemd_write_kmod_files" lineno="335">
73238 +<interface name="systemd_status_logind" lineno="387">
73239 <summary>
73240 -Allow process to write to systemd_kmod_conf_t.
73241 +Get the system status information from systemd_login
73242 </summary>
73243 <param name="domain">
73244 <summary>
73245 Domain allowed access.
73246 </summary>
73247 </param>
73248 -<rolecap/>
73249 </interface>
73250 -<interface name="systemd_status_logind" lineno="349">
73251 +<interface name="systemd_signull_logind" lineno="406">
73252 <summary>
73253 -Get the system status information from systemd_login
73254 +Send systemd_login a null signal.
73255 </summary>
73256 <param name="domain">
73257 <summary>
73258 @@ -119925,9 +120963,29 @@ Domain allowed access.
73259 </summary>
73260 </param>
73261 </interface>
73262 -<interface name="systemd_signull_logind" lineno="368">
73263 +<interface name="systemd_manage_userdb_runtime_dirs" lineno="424">
73264 <summary>
73265 -Send systemd_login a null signal.
73266 +Manage systemd userdb runtime directories.
73267 +</summary>
73268 +<param name="domain">
73269 +<summary>
73270 +Domain allowed access.
73271 +</summary>
73272 +</param>
73273 +</interface>
73274 +<interface name="systemd_manage_userdb_runtime_sock_files" lineno="442">
73275 +<summary>
73276 +Manage socket files under /run/systemd/userdb .
73277 +</summary>
73278 +<param name="domain">
73279 +<summary>
73280 +Domain allowed access.
73281 +</summary>
73282 +</param>
73283 +</interface>
73284 +<interface name="systemd_stream_connect_userdb" lineno="460">
73285 +<summary>
73286 +Connect to /run/systemd/userdb/io.systemd.DynamicUser .
73287 </summary>
73288 <param name="domain">
73289 <summary>
73290 @@ -119935,7 +120993,7 @@ Domain allowed access.
73291 </summary>
73292 </param>
73293 </interface>
73294 -<interface name="systemd_read_machines" lineno="386">
73295 +<interface name="systemd_read_machines" lineno="481">
73296 <summary>
73297 Allow reading /run/systemd/machines
73298 </summary>
73299 @@ -119945,7 +121003,7 @@ Domain that can access the machines files
73300 </summary>
73301 </param>
73302 </interface>
73303 -<interface name="systemd_dbus_chat_hostnamed" lineno="406">
73304 +<interface name="systemd_dbus_chat_hostnamed" lineno="501">
73305 <summary>
73306 Send and receive messages from
73307 systemd hostnamed over dbus.
73308 @@ -119956,7 +121014,7 @@ Domain allowed access.
73309 </summary>
73310 </param>
73311 </interface>
73312 -<interface name="systemd_use_passwd_agent_fds" lineno="426">
73313 +<interface name="systemd_use_passwd_agent_fds" lineno="521">
73314 <summary>
73315 allow systemd_passwd_agent to inherit fds
73316 </summary>
73317 @@ -119966,7 +121024,7 @@ Domain that owns the fds
73318 </summary>
73319 </param>
73320 </interface>
73321 -<interface name="systemd_use_passwd_agent" lineno="445">
73322 +<interface name="systemd_use_passwd_agent" lineno="540">
73323 <summary>
73324 Allow a systemd_passwd_agent_t process to interact with a daemon
73325 that needs a password from the sysadmin.
73326 @@ -119977,7 +121035,7 @@ Domain allowed access.
73327 </summary>
73328 </param>
73329 </interface>
73330 -<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="469">
73331 +<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="564">
73332 <summary>
73333 Transition to systemd_passwd_runtime_t when creating dirs
73334 </summary>
73335 @@ -119987,7 +121045,19 @@ Domain allowed access.
73336 </summary>
73337 </param>
73338 </interface>
73339 -<interface name="systemd_manage_passwd_runtime_symlinks" lineno="488">
73340 +<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="585">
73341 +<summary>
73342 +Transition to systemd_userdb_runtime_t when
73343 +creating the userdb directory inside an init runtime
73344 +directory.
73345 +</summary>
73346 +<param name="domain">
73347 +<summary>
73348 +Domain allowed access.
73349 +</summary>
73350 +</param>
73351 +</interface>
73352 +<interface name="systemd_manage_passwd_runtime_symlinks" lineno="603">
73353 <summary>
73354 Allow to domain to create systemd-passwd symlink
73355 </summary>
73356 @@ -119997,9 +121067,9 @@ Domain allowed access.
73357 </summary>
73358 </param>
73359 </interface>
73360 -<interface name="systemd_manage_all_units" lineno="506">
73361 +<interface name="systemd_manage_all_units" lineno="621">
73362 <summary>
73363 -manage systemd unit dirs and the files in them
73364 +manage systemd unit dirs and the files in them (Deprecated)
73365 </summary>
73366 <param name="domain">
73367 <summary>
73368 @@ -120007,7 +121077,7 @@ Domain allowed access.
73369 </summary>
73370 </param>
73371 </interface>
73372 -<interface name="systemd_read_journal_files" lineno="526">
73373 +<interface name="systemd_read_journal_files" lineno="636">
73374 <summary>
73375 Allow domain to read systemd_journal_t files
73376 </summary>
73377 @@ -120017,7 +121087,7 @@ Domain allowed access.
73378 </summary>
73379 </param>
73380 </interface>
73381 -<interface name="systemd_manage_journal_files" lineno="545">
73382 +<interface name="systemd_manage_journal_files" lineno="655">
73383 <summary>
73384 Allow domain to create/manage systemd_journal_t files
73385 </summary>
73386 @@ -120027,7 +121097,7 @@ Domain allowed access.
73387 </summary>
73388 </param>
73389 </interface>
73390 -<interface name="systemd_relabelto_journal_dirs" lineno="565">
73391 +<interface name="systemd_relabelto_journal_dirs" lineno="675">
73392 <summary>
73393 Relabel to systemd-journald directory type.
73394 </summary>
73395 @@ -120037,7 +121107,7 @@ Domain allowed access.
73396 </summary>
73397 </param>
73398 </interface>
73399 -<interface name="systemd_relabelto_journal_files" lineno="584">
73400 +<interface name="systemd_relabelto_journal_files" lineno="694">
73401 <summary>
73402 Relabel to systemd-journald file type.
73403 </summary>
73404 @@ -120047,7 +121117,7 @@ Domain allowed access.
73405 </summary>
73406 </param>
73407 </interface>
73408 -<interface name="systemd_read_networkd_units" lineno="604">
73409 +<interface name="systemd_read_networkd_units" lineno="714">
73410 <summary>
73411 Allow domain to read systemd_networkd_t unit files
73412 </summary>
73413 @@ -120057,7 +121127,7 @@ Domain allowed access.
73414 </summary>
73415 </param>
73416 </interface>
73417 -<interface name="systemd_manage_networkd_units" lineno="624">
73418 +<interface name="systemd_manage_networkd_units" lineno="734">
73419 <summary>
73420 Allow domain to create/manage systemd_networkd_t unit files
73421 </summary>
73422 @@ -120067,7 +121137,7 @@ Domain allowed access.
73423 </summary>
73424 </param>
73425 </interface>
73426 -<interface name="systemd_enabledisable_networkd" lineno="644">
73427 +<interface name="systemd_enabledisable_networkd" lineno="754">
73428 <summary>
73429 Allow specified domain to enable systemd-networkd units
73430 </summary>
73431 @@ -120077,7 +121147,7 @@ Domain allowed access.
73432 </summary>
73433 </param>
73434 </interface>
73435 -<interface name="systemd_startstop_networkd" lineno="663">
73436 +<interface name="systemd_startstop_networkd" lineno="773">
73437 <summary>
73438 Allow specified domain to start systemd-networkd units
73439 </summary>
73440 @@ -120087,7 +121157,7 @@ Domain allowed access.
73441 </summary>
73442 </param>
73443 </interface>
73444 -<interface name="systemd_status_networkd" lineno="682">
73445 +<interface name="systemd_status_networkd" lineno="792">
73446 <summary>
73447 Allow specified domain to get status of systemd-networkd
73448 </summary>
73449 @@ -120097,7 +121167,7 @@ Domain allowed access.
73450 </summary>
73451 </param>
73452 </interface>
73453 -<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="701">
73454 +<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="811">
73455 <summary>
73456 Relabel systemd_networkd tun socket.
73457 </summary>
73458 @@ -120107,7 +121177,7 @@ Domain allowed access.
73459 </summary>
73460 </param>
73461 </interface>
73462 -<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="719">
73463 +<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="829">
73464 <summary>
73465 Read/Write from systemd_networkd netlink route socket.
73466 </summary>
73467 @@ -120117,7 +121187,7 @@ Domain allowed access.
73468 </summary>
73469 </param>
73470 </interface>
73471 -<interface name="systemd_list_networkd_runtime" lineno="737">
73472 +<interface name="systemd_list_networkd_runtime" lineno="847">
73473 <summary>
73474 Allow domain to list dirs under /run/systemd/netif
73475 </summary>
73476 @@ -120127,7 +121197,7 @@ domain permitted the access
73477 </summary>
73478 </param>
73479 </interface>
73480 -<interface name="systemd_watch_networkd_runtime_dirs" lineno="756">
73481 +<interface name="systemd_watch_networkd_runtime_dirs" lineno="866">
73482 <summary>
73483 Watch directories under /run/systemd/netif
73484 </summary>
73485 @@ -120137,7 +121207,7 @@ Domain permitted the access
73486 </summary>
73487 </param>
73488 </interface>
73489 -<interface name="systemd_read_networkd_runtime" lineno="775">
73490 +<interface name="systemd_read_networkd_runtime" lineno="885">
73491 <summary>
73492 Allow domain to read files generated by systemd_networkd
73493 </summary>
73494 @@ -120147,7 +121217,7 @@ domain allowed access
73495 </summary>
73496 </param>
73497 </interface>
73498 -<interface name="systemd_read_logind_state" lineno="794">
73499 +<interface name="systemd_read_logind_state" lineno="904">
73500 <summary>
73501 Allow systemd_logind_t to read process state for cgroup file
73502 </summary>
73503 @@ -120157,7 +121227,7 @@ Domain systemd_logind_t may access.
73504 </summary>
73505 </param>
73506 </interface>
73507 -<interface name="systemd_start_power_units" lineno="813">
73508 +<interface name="systemd_start_power_units" lineno="923">
73509 <summary>
73510 Allow specified domain to start power units
73511 </summary>
73512 @@ -120167,7 +121237,7 @@ Domain to not audit.
73513 </summary>
73514 </param>
73515 </interface>
73516 -<interface name="systemd_status_power_units" lineno="832">
73517 +<interface name="systemd_status_power_units" lineno="942">
73518 <summary>
73519 Get the system status information about power units
73520 </summary>
73521 @@ -120177,7 +121247,17 @@ Domain allowed access.
73522 </summary>
73523 </param>
73524 </interface>
73525 -<interface name="systemd_tmpfiles_conf_file" lineno="852">
73526 +<interface name="systemd_stream_connect_socket_proxyd" lineno="961">
73527 +<summary>
73528 +Allows connections to the systemd-socket-proxyd's socket.
73529 +</summary>
73530 +<param name="domain">
73531 +<summary>
73532 +Domain allowed access.
73533 +</summary>
73534 +</param>
73535 +</interface>
73536 +<interface name="systemd_tmpfiles_conf_file" lineno="980">
73537 <summary>
73538 Make the specified type usable for
73539 systemd tmpfiles config files.
73540 @@ -120188,7 +121268,7 @@ Type to be used for systemd tmpfiles config files.
73541 </summary>
73542 </param>
73543 </interface>
73544 -<interface name="systemd_tmpfiles_creator" lineno="873">
73545 +<interface name="systemd_tmpfiles_creator" lineno="1001">
73546 <summary>
73547 Allow the specified domain to create
73548 the tmpfiles config directory with
73549 @@ -120200,7 +121280,7 @@ Domain allowed access.
73550 </summary>
73551 </param>
73552 </interface>
73553 -<interface name="systemd_tmpfiles_conf_filetrans" lineno="909">
73554 +<interface name="systemd_tmpfiles_conf_filetrans" lineno="1037">
73555 <summary>
73556 Create an object in the systemd tmpfiles config
73557 directory, with a private type
73558 @@ -120227,7 +121307,7 @@ The name of the object being created.
73559 </summary>
73560 </param>
73561 </interface>
73562 -<interface name="systemd_list_tmpfiles_conf" lineno="928">
73563 +<interface name="systemd_list_tmpfiles_conf" lineno="1056">
73564 <summary>
73565 Allow domain to list systemd tmpfiles config directory
73566 </summary>
73567 @@ -120237,7 +121317,7 @@ Domain allowed access.
73568 </summary>
73569 </param>
73570 </interface>
73571 -<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="946">
73572 +<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="1074">
73573 <summary>
73574 Allow domain to relabel to systemd tmpfiles config directory
73575 </summary>
73576 @@ -120247,7 +121327,7 @@ Domain allowed access.
73577 </summary>
73578 </param>
73579 </interface>
73580 -<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="964">
73581 +<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="1092">
73582 <summary>
73583 Allow domain to relabel to systemd tmpfiles config files
73584 </summary>
73585 @@ -120257,7 +121337,7 @@ Domain allowed access.
73586 </summary>
73587 </param>
73588 </interface>
73589 -<interface name="systemd_tmpfilesd_managed" lineno="987">
73590 +<interface name="systemd_tmpfilesd_managed" lineno="1115">
73591 <summary>
73592 Allow systemd_tmpfiles_t to manage filesystem objects
73593 </summary>
73594 @@ -120272,7 +121352,7 @@ object class to manage
73595 </summary>
73596 </param>
73597 </interface>
73598 -<interface name="systemd_dbus_chat_resolved" lineno="1006">
73599 +<interface name="systemd_dbus_chat_resolved" lineno="1134">
73600 <summary>
73601 Send and receive messages from
73602 systemd resolved over dbus.
73603 @@ -120283,7 +121363,7 @@ Domain allowed access.
73604 </summary>
73605 </param>
73606 </interface>
73607 -<interface name="systemd_read_resolved_runtime" lineno="1026">
73608 +<interface name="systemd_read_resolved_runtime" lineno="1154">
73609 <summary>
73610 Allow domain to read resolv.conf file generated by systemd_resolved
73611 </summary>
73612 @@ -120293,7 +121373,7 @@ domain allowed access
73613 </summary>
73614 </param>
73615 </interface>
73616 -<interface name="systemd_getattr_updated_runtime" lineno="1044">
73617 +<interface name="systemd_getattr_updated_runtime" lineno="1172">
73618 <summary>
73619 Allow domain to getattr on .updated file (generated by systemd-update-done
73620 </summary>
73621 @@ -120303,7 +121383,7 @@ domain allowed access
73622 </summary>
73623 </param>
73624 </interface>
73625 -<interface name="systemd_search_all_user_keys" lineno="1062">
73626 +<interface name="systemd_search_all_user_keys" lineno="1190">
73627 <summary>
73628 Search keys for the all systemd --user domains.
73629 </summary>
73630 @@ -120313,7 +121393,7 @@ Domain allowed access.
73631 </summary>
73632 </param>
73633 </interface>
73634 -<interface name="systemd_create_all_user_keys" lineno="1080">
73635 +<interface name="systemd_create_all_user_keys" lineno="1208">
73636 <summary>
73637 Create keys for the all systemd --user domains.
73638 </summary>
73639 @@ -120323,7 +121403,7 @@ Domain allowed access.
73640 </summary>
73641 </param>
73642 </interface>
73643 -<interface name="systemd_write_all_user_keys" lineno="1098">
73644 +<interface name="systemd_write_all_user_keys" lineno="1226">
73645 <summary>
73646 Write keys for the all systemd --user domains.
73647 </summary>
73648 @@ -120333,6 +121413,33 @@ Domain allowed access.
73649 </summary>
73650 </param>
73651 </interface>
73652 +<interface name="systemd_domtrans_sysusers" lineno="1245">
73653 +<summary>
73654 +Execute systemd-sysusers in the
73655 +systemd sysusers domain.
73656 +</summary>
73657 +<param name="domain">
73658 +<summary>
73659 +Domain allowed access.
73660 +</summary>
73661 +</param>
73662 +</interface>
73663 +<interface name="systemd_run_sysusers" lineno="1270">
73664 +<summary>
73665 +Run systemd-sysusers with a domain transition.
73666 +</summary>
73667 +<param name="domain">
73668 +<summary>
73669 +Domain allowed access.
73670 +</summary>
73671 +</param>
73672 +<param name="role">
73673 +<summary>
73674 +Role allowed access.
73675 +</summary>
73676 +</param>
73677 +<rolecap/>
73678 +</interface>
73679 <tunable name="systemd_tmpfiles_manage_all" dftval="false">
73680 <desc>
73681 <p>
73682 @@ -120357,6 +121464,22 @@ BootLoaderEntries, etc.)
73683 </p>
73684 </desc>
73685 </tunable>
73686 +<tunable name="systemd_socket_proxyd_bind_any" dftval="false">
73687 +<desc>
73688 +<p>
73689 +Allow systemd-socket-proxyd to bind any port instead of one labelled
73690 +with systemd_socket_proxyd_port_t.
73691 +</p>
73692 +</desc>
73693 +</tunable>
73694 +<tunable name="systemd_socket_proxyd_connect_any" dftval="false">
73695 +<desc>
73696 +<p>
73697 +Allow systemd-socket-proxyd to connect to any port instead of
73698 +labelled ones.
73699 +</p>
73700 +</desc>
73701 +</tunable>
73702 </module>
73703 <module name="tmpfiles" filename="policy/modules/system/tmpfiles.if">
73704 <summary>Policy for tmpfiles, a boot-time temporary file handler</summary>
73705 @@ -120580,7 +121703,7 @@ Domain allowed access.
73706 </interface>
73707 <interface name="udev_dontaudit_search_db" lineno="236">
73708 <summary>
73709 -Do not audit search of udev database directories.
73710 +Do not audit search of udev database directories. (Deprecated)
73711 </summary>
73712 <param name="domain">
73713 <summary>
73714 @@ -120588,13 +121711,13 @@ Domain to not audit.
73715 </summary>
73716 </param>
73717 </interface>
73718 -<interface name="udev_read_db" lineno="260">
73719 +<interface name="udev_read_db" lineno="256">
73720 <summary>
73721 -Read the udev device table.
73722 +Read the udev device table. (Deprecated)
73723 </summary>
73724 <desc>
73725 <p>
73726 -Allow the specified domain to read the udev device table.
73727 +Allow the specified domain to read the udev device table. (Deprecated)
73728 </p>
73729 </desc>
73730 <param name="domain">
73731 @@ -120604,9 +121727,9 @@ Domain allowed access.
73732 </param>
73733 <infoflow type="read" weight="10"/>
73734 </interface>
73735 -<interface name="udev_rw_db" lineno="288">
73736 +<interface name="udev_rw_db" lineno="270">
73737 <summary>
73738 -Allow process to modify list of devices.
73739 +Allow process to modify list of devices. (Deprecated)
73740 </summary>
73741 <param name="domain">
73742 <summary>
73743 @@ -120614,7 +121737,7 @@ Domain allowed access.
73744 </summary>
73745 </param>
73746 </interface>
73747 -<interface name="udev_create_db_dirs" lineno="307">
73748 +<interface name="udev_create_db_dirs" lineno="284">
73749 <summary>
73750 Create udev database directories
73751 </summary>
73752 @@ -120624,7 +121747,7 @@ Domain allowed access.
73753 </summary>
73754 </param>
73755 </interface>
73756 -<interface name="udev_pid_filetrans_db" lineno="338">
73757 +<interface name="udev_pid_filetrans_db" lineno="315">
73758 <summary>
73759 Write in /var/run/udev with the udev_tbl_t (udev database) file type
73760 </summary>
73761 @@ -120644,9 +121767,9 @@ Name of the directory that the file transition will work on
73762 </summary>
73763 </param>
73764 </interface>
73765 -<interface name="udev_relabelto_db" lineno="357">
73766 +<interface name="udev_relabelto_db" lineno="334">
73767 <summary>
73768 -Allow process to relabelto udev database
73769 +Allow process to relabelto udev database (Deprecated)
73770 </summary>
73771 <param name="domain">
73772 <summary>
73773 @@ -120654,9 +121777,9 @@ Domain allowed access.
73774 </summary>
73775 </param>
73776 </interface>
73777 -<interface name="udev_relabelto_db_sockets" lineno="377">
73778 +<interface name="udev_relabelto_db_sockets" lineno="348">
73779 <summary>
73780 -Allow process to relabelto sockets in /run/udev
73781 +Allow process to relabelto sockets in /run/udev (Deprecated)
73782 </summary>
73783 <param name="domain">
73784 <summary>
73785 @@ -120664,9 +121787,9 @@ Domain allowed access.
73786 </summary>
73787 </param>
73788 </interface>
73789 -<interface name="udev_search_pids" lineno="395">
73790 +<interface name="udev_search_pids" lineno="362">
73791 <summary>
73792 -Search through udev pid content
73793 +Search through udev pid content (Deprecated)
73794 </summary>
73795 <param name="domain">
73796 <summary>
73797 @@ -120674,9 +121797,9 @@ Domain allowed access.
73798 </summary>
73799 </param>
73800 </interface>
73801 -<interface name="udev_list_pids" lineno="414">
73802 +<interface name="udev_list_pids" lineno="377">
73803 <summary>
73804 -list udev pid content
73805 +list udev pid content (Deprecated)
73806 </summary>
73807 <param name="domain">
73808 <summary>
73809 @@ -120684,10 +121807,10 @@ Domain allowed access.
73810 </summary>
73811 </param>
73812 </interface>
73813 -<interface name="udev_manage_pid_dirs" lineno="434">
73814 +<interface name="udev_manage_pid_dirs" lineno="393">
73815 <summary>
73816 Create, read, write, and delete
73817 -udev run directories
73818 +udev pid directories (Deprecated)
73819 </summary>
73820 <param name="domain">
73821 <summary>
73822 @@ -120695,9 +121818,9 @@ Domain allowed access.
73823 </summary>
73824 </param>
73825 </interface>
73826 -<interface name="udev_read_pid_files" lineno="453">
73827 +<interface name="udev_read_pid_files" lineno="408">
73828 <summary>
73829 -Read udev pid files
73830 +Read udev pid files. (Deprecated)
73831 </summary>
73832 <param name="domain">
73833 <summary>
73834 @@ -120705,9 +121828,9 @@ Domain allowed access.
73835 </summary>
73836 </param>
73837 </interface>
73838 -<interface name="udev_dontaudit_rw_pid_files" lineno="473">
73839 +<interface name="udev_dontaudit_rw_pid_files" lineno="423">
73840 <summary>
73841 -dontaudit attempts to read/write udev pidfiles
73842 +dontaudit attempts to read/write udev pidfiles (Deprecated)
73843 </summary>
73844 <param name="domain">
73845 <summary>
73846 @@ -120715,10 +121838,10 @@ Domain allowed access.
73847 </summary>
73848 </param>
73849 </interface>
73850 -<interface name="udev_manage_pid_files" lineno="492">
73851 +<interface name="udev_manage_pid_files" lineno="439">
73852 <summary>
73853 Create, read, write, and delete
73854 -udev pid files.
73855 +udev pid files. (Deprecated)
73856 </summary>
73857 <param name="domain">
73858 <summary>
73859 @@ -120726,10 +121849,9 @@ Domain allowed access.
73860 </summary>
73861 </param>
73862 </interface>
73863 -<interface name="udev_generic_pid_filetrans_run_dirs" lineno="517">
73864 +<interface name="udev_generic_pid_filetrans_run_dirs" lineno="459">
73865 <summary>
73866 -Write dirs in /var/run with the udev_runtime file type.
73867 -This method is deprecated in favor of the init_daemon_run_dir call.
73868 +Create directories in the run location with udev_runtime_t type (Deprecated)
73869 </summary>
73870 <param name="domain">
73871 <summary>
73872 @@ -120738,11 +121860,73 @@ Domain allowed access.
73873 </param>
73874 <param name="name" optional="true">
73875 <summary>
73876 -Name of the directory that the file transition will work on
73877 +Name of the directory that is created
73878 +</summary>
73879 +</param>
73880 +</interface>
73881 +<interface name="udev_search_runtime" lineno="473">
73882 +<summary>
73883 +Search through udev runtime dirs.
73884 +</summary>
73885 +<param name="domain">
73886 +<summary>
73887 +Domain allowed access.
73888 +</summary>
73889 +</param>
73890 +</interface>
73891 +<interface name="udev_list_runtime" lineno="492">
73892 +<summary>
73893 +List udev runtime dirs.
73894 +</summary>
73895 +<param name="domain">
73896 +<summary>
73897 +Domain allowed access.
73898 </summary>
73899 </param>
73900 </interface>
73901 -<interface name="udevadm_domtrans" lineno="531">
73902 +<interface name="udev_manage_runtime_dirs" lineno="512">
73903 +<summary>
73904 +Create, read, write, and delete
73905 +udev runtime directories
73906 +</summary>
73907 +<param name="domain">
73908 +<summary>
73909 +Domain allowed access.
73910 +</summary>
73911 +</param>
73912 +</interface>
73913 +<interface name="udev_read_runtime_files" lineno="531">
73914 +<summary>
73915 +Read udev runtime files.
73916 +</summary>
73917 +<param name="domain">
73918 +<summary>
73919 +Domain allowed access.
73920 +</summary>
73921 +</param>
73922 +</interface>
73923 +<interface name="udev_dontaudit_rw_runtime_files" lineno="551">
73924 +<summary>
73925 +dontaudit attempts to read/write udev runtime files.
73926 +</summary>
73927 +<param name="domain">
73928 +<summary>
73929 +Domain allowed access.
73930 +</summary>
73931 +</param>
73932 +</interface>
73933 +<interface name="udev_manage_runtime_files" lineno="570">
73934 +<summary>
73935 +Create, read, write, and delete
73936 +udev runtime files.
73937 +</summary>
73938 +<param name="domain">
73939 +<summary>
73940 +Domain allowed access.
73941 +</summary>
73942 +</param>
73943 +</interface>
73944 +<interface name="udev_domtrans_udevadm" lineno="589">
73945 <summary>
73946 Execute udev admin in the udevadm domain.
73947 </summary>
73948 @@ -120752,7 +121936,34 @@ Domain allowed to transition.
73949 </summary>
73950 </param>
73951 </interface>
73952 -<interface name="udevadm_run" lineno="556">
73953 +<interface name="udevadm_domtrans" lineno="607">
73954 +<summary>
73955 +Execute udev admin in the udevadm domain. (Deprecated)
73956 +</summary>
73957 +<param name="domain">
73958 +<summary>
73959 +Domain allowed to transition.
73960 +</summary>
73961 +</param>
73962 +</interface>
73963 +<interface name="udevadm_run" lineno="629">
73964 +<summary>
73965 +Execute udevadm in the udevadm domain, and
73966 +allow the specified role the udevadm domain. (Deprecated)
73967 +</summary>
73968 +<param name="domain">
73969 +<summary>
73970 +Domain allowed to transition.
73971 +</summary>
73972 +</param>
73973 +<param name="role">
73974 +<summary>
73975 +Role allowed access.
73976 +</summary>
73977 +</param>
73978 +<rolecap/>
73979 +</interface>
73980 +<interface name="udev_run_udevadm" lineno="651">
73981 <summary>
73982 Execute udevadm in the udevadm domain, and
73983 allow the specified role the udevadm domain.
73984 @@ -120769,7 +121980,17 @@ Role allowed access.
73985 </param>
73986 <rolecap/>
73987 </interface>
73988 -<interface name="udevadm_exec" lineno="575">
73989 +<interface name="udevadm_exec" lineno="670">
73990 +<summary>
73991 +Execute udevadm in the caller domain. (Deprecated)
73992 +</summary>
73993 +<param name="domain">
73994 +<summary>
73995 +Domain allowed access.
73996 +</summary>
73997 +</param>
73998 +</interface>
73999 +<interface name="udev_exec_udevadm" lineno="685">
74000 <summary>
74001 Execute udevadm in the caller domain.
74002 </summary>
74003 @@ -120779,7 +122000,7 @@ Domain allowed access.
74004 </summary>
74005 </param>
74006 </interface>
74007 -<interface name="udev_pid_filetrans_rules" lineno="605">
74008 +<interface name="udev_pid_filetrans_rules" lineno="715">
74009 <summary>
74010 Write in /var/run/udev with the udev_rules_t (udev rules) file type
74011 </summary>
74012 @@ -120799,7 +122020,7 @@ Name of the directory that the file transition will work on
74013 </summary>
74014 </param>
74015 </interface>
74016 -<interface name="udev_create_rules_dirs" lineno="624">
74017 +<interface name="udev_create_rules_dirs" lineno="734">
74018 <summary>
74019 Create udev rules directories
74020 </summary>
74021 @@ -120812,7 +122033,17 @@ Domain allowed access.
74022 </module>
74023 <module name="unconfined" filename="policy/modules/system/unconfined.if">
74024 <summary>The unconfined domain.</summary>
74025 -<interface name="unconfined_domain_noaudit" lineno="13">
74026 +<interface name="unconfined_stub" lineno="13">
74027 +<summary>
74028 +Unconfined stub interface. No access allowed.
74029 +</summary>
74030 +<param name="domain" unused="true">
74031 +<summary>
74032 +Domain allowed access.
74033 +</summary>
74034 +</param>
74035 +</interface>
74036 +<interface name="unconfined_domain_noaudit" lineno="29">
74037 <summary>
74038 Make the specified domain unconfined.
74039 </summary>
74040 @@ -120822,7 +122053,7 @@ Domain to make unconfined.
74041 </summary>
74042 </param>
74043 </interface>
74044 -<interface name="unconfined_domain" lineno="133">
74045 +<interface name="unconfined_domain" lineno="150">
74046 <summary>
74047 Make the specified domain unconfined and
74048 audit executable heap usage.
74049 @@ -120850,7 +122081,7 @@ Domain to make unconfined.
74050 </summary>
74051 </param>
74052 </interface>
74053 -<interface name="unconfined_domtrans" lineno="151">
74054 +<interface name="unconfined_domtrans" lineno="168">
74055 <summary>
74056 Transition to the unconfined domain.
74057 </summary>
74058 @@ -120860,7 +122091,7 @@ Domain allowed to transition.
74059 </summary>
74060 </param>
74061 </interface>
74062 -<interface name="unconfined_run" lineno="174">
74063 +<interface name="unconfined_run" lineno="191">
74064 <summary>
74065 Execute specified programs in the unconfined domain.
74066 </summary>
74067 @@ -120875,7 +122106,7 @@ The role to allow the unconfined domain.
74068 </summary>
74069 </param>
74070 </interface>
74071 -<interface name="unconfined_shell_domtrans" lineno="193">
74072 +<interface name="unconfined_shell_domtrans" lineno="210">
74073 <summary>
74074 Transition to the unconfined domain by executing a shell.
74075 </summary>
74076 @@ -120885,7 +122116,7 @@ Domain allowed to transition.
74077 </summary>
74078 </param>
74079 </interface>
74080 -<interface name="unconfined_domtrans_to" lineno="231">
74081 +<interface name="unconfined_domtrans_to" lineno="248">
74082 <summary>
74083 Allow unconfined to execute the specified program in
74084 the specified domain.
74085 @@ -120912,7 +122143,7 @@ Domain entry point file.
74086 </summary>
74087 </param>
74088 </interface>
74089 -<interface name="unconfined_run_to" lineno="268">
74090 +<interface name="unconfined_run_to" lineno="285">
74091 <summary>
74092 Allow unconfined to execute the specified program in
74093 the specified domain. Allow the specified domain the
74094 @@ -120941,7 +122172,7 @@ Domain entry point file.
74095 </summary>
74096 </param>
74097 </interface>
74098 -<interface name="unconfined_use_fds" lineno="289">
74099 +<interface name="unconfined_use_fds" lineno="306">
74100 <summary>
74101 Inherit file descriptors from the unconfined domain.
74102 </summary>
74103 @@ -120951,7 +122182,7 @@ Domain allowed access.
74104 </summary>
74105 </param>
74106 </interface>
74107 -<interface name="unconfined_sigchld" lineno="307">
74108 +<interface name="unconfined_sigchld" lineno="324">
74109 <summary>
74110 Send a SIGCHLD signal to the unconfined domain.
74111 </summary>
74112 @@ -120961,7 +122192,7 @@ Domain allowed access.
74113 </summary>
74114 </param>
74115 </interface>
74116 -<interface name="unconfined_signull" lineno="325">
74117 +<interface name="unconfined_signull" lineno="342">
74118 <summary>
74119 Send a SIGNULL signal to the unconfined domain.
74120 </summary>
74121 @@ -120971,7 +122202,7 @@ Domain allowed access.
74122 </summary>
74123 </param>
74124 </interface>
74125 -<interface name="unconfined_signal" lineno="343">
74126 +<interface name="unconfined_signal" lineno="360">
74127 <summary>
74128 Send generic signals to the unconfined domain.
74129 </summary>
74130 @@ -120981,7 +122212,7 @@ Domain allowed access.
74131 </summary>
74132 </param>
74133 </interface>
74134 -<interface name="unconfined_read_pipes" lineno="361">
74135 +<interface name="unconfined_read_pipes" lineno="378">
74136 <summary>
74137 Read unconfined domain unnamed pipes.
74138 </summary>
74139 @@ -120991,7 +122222,7 @@ Domain allowed access.
74140 </summary>
74141 </param>
74142 </interface>
74143 -<interface name="unconfined_dontaudit_read_pipes" lineno="379">
74144 +<interface name="unconfined_dontaudit_read_pipes" lineno="396">
74145 <summary>
74146 Do not audit attempts to read unconfined domain unnamed pipes.
74147 </summary>
74148 @@ -121001,7 +122232,7 @@ Domain to not audit.
74149 </summary>
74150 </param>
74151 </interface>
74152 -<interface name="unconfined_rw_pipes" lineno="397">
74153 +<interface name="unconfined_rw_pipes" lineno="414">
74154 <summary>
74155 Read and write unconfined domain unnamed pipes.
74156 </summary>
74157 @@ -121011,7 +122242,7 @@ Domain allowed access.
74158 </summary>
74159 </param>
74160 </interface>
74161 -<interface name="unconfined_dontaudit_rw_pipes" lineno="416">
74162 +<interface name="unconfined_dontaudit_rw_pipes" lineno="433">
74163 <summary>
74164 Do not audit attempts to read and write
74165 unconfined domain unnamed pipes.
74166 @@ -121022,7 +122253,7 @@ Domain to not audit.
74167 </summary>
74168 </param>
74169 </interface>
74170 -<interface name="unconfined_stream_connect" lineno="435">
74171 +<interface name="unconfined_stream_connect" lineno="452">
74172 <summary>
74173 Connect to the unconfined domain using
74174 a unix domain stream socket.
74175 @@ -121033,7 +122264,7 @@ Domain allowed access.
74176 </summary>
74177 </param>
74178 </interface>
74179 -<interface name="unconfined_dontaudit_rw_stream_sockets" lineno="454">
74180 +<interface name="unconfined_dontaudit_rw_stream_sockets" lineno="471">
74181 <summary>
74182 Do not audit attempts to read and write
74183 unconfined domain stream.
74184 @@ -121044,7 +122275,7 @@ Domain to not audit.
74185 </summary>
74186 </param>
74187 </interface>
74188 -<interface name="unconfined_dontaudit_rw_tcp_sockets" lineno="483">
74189 +<interface name="unconfined_dontaudit_rw_tcp_sockets" lineno="500">
74190 <summary>
74191 Do not audit attempts to read or write
74192 unconfined domain tcp sockets.
74193 @@ -121065,7 +122296,7 @@ Domain to not audit.
74194 </summary>
74195 </param>
74196 </interface>
74197 -<interface name="unconfined_search_keys" lineno="501">
74198 +<interface name="unconfined_search_keys" lineno="518">
74199 <summary>
74200 Search keys for the unconfined domain.
74201 </summary>
74202 @@ -121075,7 +122306,7 @@ Domain allowed access.
74203 </summary>
74204 </param>
74205 </interface>
74206 -<interface name="unconfined_create_keys" lineno="519">
74207 +<interface name="unconfined_create_keys" lineno="536">
74208 <summary>
74209 Create keys for the unconfined domain.
74210 </summary>
74211 @@ -121085,7 +122316,7 @@ Domain allowed access.
74212 </summary>
74213 </param>
74214 </interface>
74215 -<interface name="unconfined_write_keys" lineno="537">
74216 +<interface name="unconfined_write_keys" lineno="554">
74217 <summary>
74218 Write keys for the unconfined domain.
74219 </summary>
74220 @@ -121095,7 +122326,7 @@ Domain allowed access.
74221 </summary>
74222 </param>
74223 </interface>
74224 -<interface name="unconfined_dbus_send" lineno="555">
74225 +<interface name="unconfined_dbus_send" lineno="572">
74226 <summary>
74227 Send messages to the unconfined domain over dbus.
74228 </summary>
74229 @@ -121105,7 +122336,7 @@ Domain allowed access.
74230 </summary>
74231 </param>
74232 </interface>
74233 -<interface name="unconfined_dbus_chat" lineno="575">
74234 +<interface name="unconfined_dbus_chat" lineno="592">
74235 <summary>
74236 Send and receive messages from
74237 unconfined_t over dbus.
74238 @@ -121116,7 +122347,7 @@ Domain allowed access.
74239 </summary>
74240 </param>
74241 </interface>
74242 -<interface name="unconfined_dbus_connect" lineno="596">
74243 +<interface name="unconfined_dbus_connect" lineno="613">
74244 <summary>
74245 Connect to the the unconfined DBUS
74246 for service (acquire_svc).
74247 @@ -121151,7 +122382,7 @@ is the prefix for user_t).
74248 </param>
74249 <rolebase/>
74250 </template>
74251 -<template name="userdom_user_content_access_template" lineno="175">
74252 +<template name="userdom_user_content_access_template" lineno="179">
74253 <summary>
74254 Template for handling user content through standard tunables
74255 </summary>
74256 @@ -121180,7 +122411,7 @@ The application domain which is granted the necessary privileges
74257 </param>
74258 <rolebase/>
74259 </template>
74260 -<interface name="userdom_ro_home_role" lineno="266">
74261 +<interface name="userdom_ro_home_role" lineno="270">
74262 <summary>
74263 Allow a home directory for which the
74264 role has read-only access.
74265 @@ -121206,7 +122437,7 @@ The user domain
74266 </param>
74267 <rolebase/>
74268 </interface>
74269 -<interface name="userdom_manage_home_role" lineno="337">
74270 +<interface name="userdom_manage_home_role" lineno="347">
74271 <summary>
74272 Allow a home directory for which the
74273 role has full access.
74274 @@ -121232,7 +122463,7 @@ The user domain
74275 </param>
74276 <rolebase/>
74277 </interface>
74278 -<interface name="userdom_manage_tmp_role" lineno="417">
74279 +<interface name="userdom_manage_tmp_role" lineno="433">
74280 <summary>
74281 Manage user temporary files
74282 </summary>
74283 @@ -121248,7 +122479,7 @@ Domain allowed access.
74284 </param>
74285 <rolebase/>
74286 </interface>
74287 -<interface name="userdom_exec_user_tmp_files" lineno="444">
74288 +<interface name="userdom_exec_user_tmp_files" lineno="460">
74289 <summary>
74290 The execute access user temporary files.
74291 </summary>
74292 @@ -121259,7 +122490,7 @@ Domain allowed access.
74293 </param>
74294 <rolebase/>
74295 </interface>
74296 -<interface name="userdom_manage_tmpfs_role" lineno="480">
74297 +<interface name="userdom_manage_tmpfs_role" lineno="496">
74298 <summary>
74299 Role access for the user tmpfs type
74300 that the user has full access.
74301 @@ -121285,7 +122516,7 @@ Domain allowed access.
74302 </param>
74303 <rolecap/>
74304 </interface>
74305 -<template name="userdom_basic_networking_template" lineno="506">
74306 +<template name="userdom_basic_networking_template" lineno="522">
74307 <summary>
74308 The template allowing the user basic
74309 network permissions
74310 @@ -121298,7 +122529,7 @@ is the prefix for user_t).
74311 </param>
74312 <rolebase/>
74313 </template>
74314 -<template name="userdom_change_password_template" lineno="547">
74315 +<template name="userdom_change_password_template" lineno="562">
74316 <summary>
74317 The template for allowing the user to change passwords.
74318 </summary>
74319 @@ -121310,7 +122541,7 @@ is the prefix for user_t).
74320 </param>
74321 <rolebase/>
74322 </template>
74323 -<template name="userdom_common_user_template" lineno="577">
74324 +<template name="userdom_common_user_template" lineno="592">
74325 <summary>
74326 The template containing rules common to unprivileged
74327 users and administrative users.
74328 @@ -121328,7 +122559,7 @@ is the prefix for user_t).
74329 </summary>
74330 </param>
74331 </template>
74332 -<template name="userdom_login_user_template" lineno="906">
74333 +<template name="userdom_login_user_template" lineno="914">
74334 <summary>
74335 The template for creating a login user.
74336 </summary>
74337 @@ -121346,7 +122577,7 @@ is the prefix for user_t).
74338 </summary>
74339 </param>
74340 </template>
74341 -<template name="userdom_restricted_user_template" lineno="1029">
74342 +<template name="userdom_restricted_user_template" lineno="1037">
74343 <summary>
74344 The template for creating a unprivileged login user.
74345 </summary>
74346 @@ -121364,7 +122595,7 @@ is the prefix for user_t).
74347 </summary>
74348 </param>
74349 </template>
74350 -<template name="userdom_restricted_xwindows_user_template" lineno="1070">
74351 +<template name="userdom_restricted_xwindows_user_template" lineno="1078">
74352 <summary>
74353 The template for creating a unprivileged xwindows login user.
74354 </summary>
74355 @@ -121385,7 +122616,7 @@ is the prefix for user_t).
74356 </summary>
74357 </param>
74358 </template>
74359 -<template name="userdom_unpriv_user_template" lineno="1157">
74360 +<template name="userdom_unpriv_user_template" lineno="1161">
74361 <summary>
74362 The template for creating a unprivileged user roughly
74363 equivalent to a regular linux user.
74364 @@ -121408,7 +122639,7 @@ is the prefix for user_t).
74365 </summary>
74366 </param>
74367 </template>
74368 -<template name="userdom_admin_user_template" lineno="1255">
74369 +<template name="userdom_admin_user_template" lineno="1281">
74370 <summary>
74371 The template for creating an administrative user.
74372 </summary>
74373 @@ -121437,7 +122668,7 @@ is the prefix for sysadm_t).
74374 </summary>
74375 </param>
74376 </template>
74377 -<template name="userdom_security_admin_template" lineno="1429">
74378 +<template name="userdom_security_admin_template" lineno="1456">
74379 <summary>
74380 Allow user to run as a secadm
74381 </summary>
74382 @@ -121463,7 +122694,28 @@ The role of the object to create.
74383 </summary>
74384 </param>
74385 </template>
74386 -<interface name="userdom_user_application_type" lineno="1509">
74387 +<template name="userdom_xdg_user_template" lineno="1554">
74388 +<summary>
74389 +Allow user to interact with xdg content types
74390 +</summary>
74391 +<desc>
74392 +<p>
74393 +Create rules to allow a user to manage xdg
74394 +content in a user home directory with an
74395 +automatic type transition to those types.
74396 +</p>
74397 +<p>
74398 +This is a templated interface, and should only
74399 +be called from a per-userdomain template.
74400 +</p>
74401 +</desc>
74402 +<param name="domain">
74403 +<summary>
74404 +Domain allowed access.
74405 +</summary>
74406 +</param>
74407 +</template>
74408 +<interface name="userdom_user_application_type" lineno="1603">
74409 <summary>
74410 Make the specified type usable as
74411 a user application domain type.
74412 @@ -121474,7 +122726,7 @@ Type to be used as a user application domain.
74413 </summary>
74414 </param>
74415 </interface>
74416 -<interface name="userdom_user_application_domain" lineno="1530">
74417 +<interface name="userdom_user_application_domain" lineno="1624">
74418 <summary>
74419 Make the specified type usable as
74420 a user application domain.
74421 @@ -121490,7 +122742,7 @@ Type to be used as the domain entry point.
74422 </summary>
74423 </param>
74424 </interface>
74425 -<interface name="userdom_user_home_content" lineno="1547">
74426 +<interface name="userdom_user_home_content" lineno="1641">
74427 <summary>
74428 Make the specified type usable in a
74429 user home directory.
74430 @@ -121502,7 +122754,7 @@ user home directory.
74431 </summary>
74432 </param>
74433 </interface>
74434 -<interface name="userdom_user_tmp_file" lineno="1573">
74435 +<interface name="userdom_user_tmp_file" lineno="1667">
74436 <summary>
74437 Make the specified type usable as a
74438 user temporary file.
74439 @@ -121514,7 +122766,7 @@ temporary directories.
74440 </summary>
74441 </param>
74442 </interface>
74443 -<interface name="userdom_user_tmpfs_file" lineno="1590">
74444 +<interface name="userdom_user_tmpfs_file" lineno="1684">
74445 <summary>
74446 Make the specified type usable as a
74447 user tmpfs file.
74448 @@ -121526,7 +122778,7 @@ tmpfs directories.
74449 </summary>
74450 </param>
74451 </interface>
74452 -<interface name="userdom_attach_admin_tun_iface" lineno="1605">
74453 +<interface name="userdom_attach_admin_tun_iface" lineno="1699">
74454 <summary>
74455 Allow domain to attach to TUN devices created by administrative users.
74456 </summary>
74457 @@ -121536,7 +122788,7 @@ Domain allowed access.
74458 </summary>
74459 </param>
74460 </interface>
74461 -<interface name="userdom_setattr_user_ptys" lineno="1624">
74462 +<interface name="userdom_setattr_user_ptys" lineno="1718">
74463 <summary>
74464 Set the attributes of a user pty.
74465 </summary>
74466 @@ -121546,7 +122798,7 @@ Domain allowed access.
74467 </summary>
74468 </param>
74469 </interface>
74470 -<interface name="userdom_create_user_pty" lineno="1642">
74471 +<interface name="userdom_create_user_pty" lineno="1736">
74472 <summary>
74473 Create a user pty.
74474 </summary>
74475 @@ -121556,7 +122808,7 @@ Domain allowed access.
74476 </summary>
74477 </param>
74478 </interface>
74479 -<interface name="userdom_getattr_user_home_dirs" lineno="1660">
74480 +<interface name="userdom_getattr_user_home_dirs" lineno="1754">
74481 <summary>
74482 Get the attributes of user home directories.
74483 </summary>
74484 @@ -121566,7 +122818,7 @@ Domain allowed access.
74485 </summary>
74486 </param>
74487 </interface>
74488 -<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1679">
74489 +<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1773">
74490 <summary>
74491 Do not audit attempts to get the attributes of user home directories.
74492 </summary>
74493 @@ -121576,7 +122828,7 @@ Domain to not audit.
74494 </summary>
74495 </param>
74496 </interface>
74497 -<interface name="userdom_search_user_home_dirs" lineno="1697">
74498 +<interface name="userdom_search_user_home_dirs" lineno="1791">
74499 <summary>
74500 Search user home directories.
74501 </summary>
74502 @@ -121586,7 +122838,7 @@ Domain allowed access.
74503 </summary>
74504 </param>
74505 </interface>
74506 -<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1724">
74507 +<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1818">
74508 <summary>
74509 Do not audit attempts to search user home directories.
74510 </summary>
74511 @@ -121604,7 +122856,7 @@ Domain to not audit.
74512 </param>
74513 <infoflow type="none"/>
74514 </interface>
74515 -<interface name="userdom_list_user_home_dirs" lineno="1742">
74516 +<interface name="userdom_list_user_home_dirs" lineno="1836">
74517 <summary>
74518 List user home directories.
74519 </summary>
74520 @@ -121614,7 +122866,7 @@ Domain allowed access.
74521 </summary>
74522 </param>
74523 </interface>
74524 -<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1761">
74525 +<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1855">
74526 <summary>
74527 Do not audit attempts to list user home subdirectories.
74528 </summary>
74529 @@ -121624,7 +122876,7 @@ Domain to not audit.
74530 </summary>
74531 </param>
74532 </interface>
74533 -<interface name="userdom_create_user_home_dirs" lineno="1779">
74534 +<interface name="userdom_create_user_home_dirs" lineno="1873">
74535 <summary>
74536 Create user home directories.
74537 </summary>
74538 @@ -121634,7 +122886,7 @@ Domain allowed access.
74539 </summary>
74540 </param>
74541 </interface>
74542 -<interface name="userdom_manage_user_home_dirs" lineno="1797">
74543 +<interface name="userdom_manage_user_home_dirs" lineno="1891">
74544 <summary>
74545 Manage user home directories.
74546 </summary>
74547 @@ -121644,7 +122896,7 @@ Domain allowed access.
74548 </summary>
74549 </param>
74550 </interface>
74551 -<interface name="userdom_relabelto_user_home_dirs" lineno="1815">
74552 +<interface name="userdom_relabelto_user_home_dirs" lineno="1909">
74553 <summary>
74554 Relabel to user home directories.
74555 </summary>
74556 @@ -121654,7 +122906,7 @@ Domain allowed access.
74557 </summary>
74558 </param>
74559 </interface>
74560 -<interface name="userdom_home_filetrans_user_home_dir" lineno="1839">
74561 +<interface name="userdom_home_filetrans_user_home_dir" lineno="1933">
74562 <summary>
74563 Create directories in the home dir root with
74564 the user home directory type.
74565 @@ -121670,7 +122922,7 @@ The name of the object being created.
74566 </summary>
74567 </param>
74568 </interface>
74569 -<interface name="userdom_user_home_domtrans" lineno="1876">
74570 +<interface name="userdom_user_home_domtrans" lineno="1970">
74571 <summary>
74572 Do a domain transition to the specified
74573 domain when executing a program in the
74574 @@ -121699,7 +122951,7 @@ Domain to transition to.
74575 </summary>
74576 </param>
74577 </interface>
74578 -<interface name="userdom_dontaudit_search_user_home_content" lineno="1896">
74579 +<interface name="userdom_dontaudit_search_user_home_content" lineno="1990">
74580 <summary>
74581 Do not audit attempts to search user home content directories.
74582 </summary>
74583 @@ -121709,7 +122961,7 @@ Domain to not audit.
74584 </summary>
74585 </param>
74586 </interface>
74587 -<interface name="userdom_list_all_user_home_content" lineno="1914">
74588 +<interface name="userdom_list_all_user_home_content" lineno="2008">
74589 <summary>
74590 List all users home content directories.
74591 </summary>
74592 @@ -121719,7 +122971,7 @@ Domain allowed access.
74593 </summary>
74594 </param>
74595 </interface>
74596 -<interface name="userdom_list_user_home_content" lineno="1933">
74597 +<interface name="userdom_list_user_home_content" lineno="2027">
74598 <summary>
74599 List contents of users home directory.
74600 </summary>
74601 @@ -121729,7 +122981,7 @@ Domain allowed access.
74602 </summary>
74603 </param>
74604 </interface>
74605 -<interface name="userdom_manage_user_home_content_dirs" lineno="1952">
74606 +<interface name="userdom_manage_user_home_content_dirs" lineno="2046">
74607 <summary>
74608 Create, read, write, and delete directories
74609 in a user home subdirectory.
74610 @@ -121740,7 +122992,7 @@ Domain allowed access.
74611 </summary>
74612 </param>
74613 </interface>
74614 -<interface name="userdom_delete_all_user_home_content_dirs" lineno="1971">
74615 +<interface name="userdom_delete_all_user_home_content_dirs" lineno="2065">
74616 <summary>
74617 Delete all user home content directories.
74618 </summary>
74619 @@ -121750,7 +123002,7 @@ Domain allowed access.
74620 </summary>
74621 </param>
74622 </interface>
74623 -<interface name="userdom_delete_user_home_content_dirs" lineno="1991">
74624 +<interface name="userdom_delete_user_home_content_dirs" lineno="2085">
74625 <summary>
74626 Delete directories in a user home subdirectory.
74627 </summary>
74628 @@ -121760,7 +123012,7 @@ Domain allowed access.
74629 </summary>
74630 </param>
74631 </interface>
74632 -<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2009">
74633 +<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2103">
74634 <summary>
74635 Set attributes of all user home content directories.
74636 </summary>
74637 @@ -121770,7 +123022,7 @@ Domain allowed access.
74638 </summary>
74639 </param>
74640 </interface>
74641 -<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2029">
74642 +<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2123">
74643 <summary>
74644 Do not audit attempts to set the
74645 attributes of user home files.
74646 @@ -121781,7 +123033,7 @@ Domain to not audit.
74647 </summary>
74648 </param>
74649 </interface>
74650 -<interface name="userdom_map_user_home_content_files" lineno="2047">
74651 +<interface name="userdom_map_user_home_content_files" lineno="2141">
74652 <summary>
74653 Map user home files.
74654 </summary>
74655 @@ -121791,7 +123043,7 @@ Domain allowed access.
74656 </summary>
74657 </param>
74658 </interface>
74659 -<interface name="userdom_mmap_user_home_content_files" lineno="2065">
74660 +<interface name="userdom_mmap_user_home_content_files" lineno="2159">
74661 <summary>
74662 Mmap user home files.
74663 </summary>
74664 @@ -121801,7 +123053,7 @@ Domain allowed access.
74665 </summary>
74666 </param>
74667 </interface>
74668 -<interface name="userdom_read_user_home_content_files" lineno="2084">
74669 +<interface name="userdom_read_user_home_content_files" lineno="2178">
74670 <summary>
74671 Read user home files.
74672 </summary>
74673 @@ -121811,7 +123063,7 @@ Domain allowed access.
74674 </summary>
74675 </param>
74676 </interface>
74677 -<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2103">
74678 +<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2197">
74679 <summary>
74680 Do not audit attempts to read user home files.
74681 </summary>
74682 @@ -121821,7 +123073,7 @@ Domain to not audit.
74683 </summary>
74684 </param>
74685 </interface>
74686 -<interface name="userdom_read_all_user_home_content" lineno="2122">
74687 +<interface name="userdom_read_all_user_home_content" lineno="2216">
74688 <summary>
74689 Read all user home content, including application-specific resources.
74690 </summary>
74691 @@ -121831,7 +123083,7 @@ Domain allowed access
74692 </summary>
74693 </param>
74694 </interface>
74695 -<interface name="userdom_manage_all_user_home_content" lineno="2144">
74696 +<interface name="userdom_manage_all_user_home_content" lineno="2238">
74697 <summary>
74698 Manage all user home content, including application-specific resources.
74699 </summary>
74700 @@ -121841,7 +123093,7 @@ Domain allowed access
74701 </summary>
74702 </param>
74703 </interface>
74704 -<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2166">
74705 +<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2260">
74706 <summary>
74707 Do not audit attempts to append user home files.
74708 </summary>
74709 @@ -121851,7 +123103,7 @@ Domain to not audit.
74710 </summary>
74711 </param>
74712 </interface>
74713 -<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2184">
74714 +<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2278">
74715 <summary>
74716 Do not audit attempts to write user home files.
74717 </summary>
74718 @@ -121861,7 +123113,7 @@ Domain to not audit.
74719 </summary>
74720 </param>
74721 </interface>
74722 -<interface name="userdom_delete_all_user_home_content_files" lineno="2202">
74723 +<interface name="userdom_delete_all_user_home_content_files" lineno="2296">
74724 <summary>
74725 Delete all user home content files.
74726 </summary>
74727 @@ -121871,7 +123123,7 @@ Domain allowed access.
74728 </summary>
74729 </param>
74730 </interface>
74731 -<interface name="userdom_delete_user_home_content_files" lineno="2222">
74732 +<interface name="userdom_delete_user_home_content_files" lineno="2316">
74733 <summary>
74734 Delete files in a user home subdirectory.
74735 </summary>
74736 @@ -121881,7 +123133,7 @@ Domain allowed access.
74737 </summary>
74738 </param>
74739 </interface>
74740 -<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2240">
74741 +<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2334">
74742 <summary>
74743 Do not audit attempts to relabel user home files.
74744 </summary>
74745 @@ -121891,7 +123143,7 @@ Domain to not audit.
74746 </summary>
74747 </param>
74748 </interface>
74749 -<interface name="userdom_read_user_home_content_symlinks" lineno="2258">
74750 +<interface name="userdom_read_user_home_content_symlinks" lineno="2352">
74751 <summary>
74752 Read user home subdirectory symbolic links.
74753 </summary>
74754 @@ -121901,7 +123153,7 @@ Domain allowed access.
74755 </summary>
74756 </param>
74757 </interface>
74758 -<interface name="userdom_exec_user_home_content_files" lineno="2278">
74759 +<interface name="userdom_exec_user_home_content_files" lineno="2372">
74760 <summary>
74761 Execute user home files.
74762 </summary>
74763 @@ -121912,7 +123164,7 @@ Domain allowed access.
74764 </param>
74765 <rolecap/>
74766 </interface>
74767 -<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2305">
74768 +<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2399">
74769 <summary>
74770 Do not audit attempts to execute user home files.
74771 </summary>
74772 @@ -121922,7 +123174,7 @@ Domain to not audit.
74773 </summary>
74774 </param>
74775 </interface>
74776 -<interface name="userdom_manage_user_home_content_files" lineno="2324">
74777 +<interface name="userdom_manage_user_home_content_files" lineno="2418">
74778 <summary>
74779 Create, read, write, and delete files
74780 in a user home subdirectory.
74781 @@ -121933,7 +123185,7 @@ Domain allowed access.
74782 </summary>
74783 </param>
74784 </interface>
74785 -<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2345">
74786 +<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2439">
74787 <summary>
74788 Do not audit attempts to create, read, write, and delete directories
74789 in a user home subdirectory.
74790 @@ -121944,7 +123196,7 @@ Domain to not audit.
74791 </summary>
74792 </param>
74793 </interface>
74794 -<interface name="userdom_manage_user_home_content_symlinks" lineno="2364">
74795 +<interface name="userdom_manage_user_home_content_symlinks" lineno="2458">
74796 <summary>
74797 Create, read, write, and delete symbolic links
74798 in a user home subdirectory.
74799 @@ -121955,7 +123207,7 @@ Domain allowed access.
74800 </summary>
74801 </param>
74802 </interface>
74803 -<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2384">
74804 +<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2478">
74805 <summary>
74806 Delete all user home content symbolic links.
74807 </summary>
74808 @@ -121965,7 +123217,7 @@ Domain allowed access.
74809 </summary>
74810 </param>
74811 </interface>
74812 -<interface name="userdom_delete_user_home_content_symlinks" lineno="2404">
74813 +<interface name="userdom_delete_user_home_content_symlinks" lineno="2498">
74814 <summary>
74815 Delete symbolic links in a user home directory.
74816 </summary>
74817 @@ -121975,7 +123227,7 @@ Domain allowed access.
74818 </summary>
74819 </param>
74820 </interface>
74821 -<interface name="userdom_manage_user_home_content_pipes" lineno="2423">
74822 +<interface name="userdom_manage_user_home_content_pipes" lineno="2517">
74823 <summary>
74824 Create, read, write, and delete named pipes
74825 in a user home subdirectory.
74826 @@ -121986,7 +123238,7 @@ Domain allowed access.
74827 </summary>
74828 </param>
74829 </interface>
74830 -<interface name="userdom_manage_user_home_content_sockets" lineno="2444">
74831 +<interface name="userdom_manage_user_home_content_sockets" lineno="2538">
74832 <summary>
74833 Create, read, write, and delete named sockets
74834 in a user home subdirectory.
74835 @@ -121997,7 +123249,7 @@ Domain allowed access.
74836 </summary>
74837 </param>
74838 </interface>
74839 -<interface name="userdom_user_home_dir_filetrans" lineno="2481">
74840 +<interface name="userdom_user_home_dir_filetrans" lineno="2575">
74841 <summary>
74842 Create objects in a user home directory
74843 with an automatic type transition to
74844 @@ -122024,7 +123276,7 @@ The name of the object being created.
74845 </summary>
74846 </param>
74847 </interface>
74848 -<interface name="userdom_user_home_content_filetrans" lineno="2518">
74849 +<interface name="userdom_user_home_content_filetrans" lineno="2612">
74850 <summary>
74851 Create objects in a directory located
74852 in a user home directory with an
74853 @@ -122052,7 +123304,7 @@ The name of the object being created.
74854 </summary>
74855 </param>
74856 </interface>
74857 -<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2549">
74858 +<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2643">
74859 <summary>
74860 Automatically use the user_cert_t label for selected resources
74861 created in a users home directory
74862 @@ -122073,7 +123325,7 @@ Name of the resource that is being created
74863 </summary>
74864 </param>
74865 </interface>
74866 -<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2579">
74867 +<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2673">
74868 <summary>
74869 Create objects in a user home directory
74870 with an automatic type transition to
74871 @@ -122095,7 +123347,7 @@ The name of the object being created.
74872 </summary>
74873 </param>
74874 </interface>
74875 -<interface name="userdom_read_user_certs" lineno="2599">
74876 +<interface name="userdom_read_user_certs" lineno="2693">
74877 <summary>
74878 Read user SSL certificates.
74879 </summary>
74880 @@ -122106,7 +123358,7 @@ Domain allowed access.
74881 </param>
74882 <rolecap/>
74883 </interface>
74884 -<interface name="userdom_dontaudit_manage_user_certs" lineno="2622">
74885 +<interface name="userdom_dontaudit_manage_user_certs" lineno="2716">
74886 <summary>
74887 Do not audit attempts to manage
74888 the user SSL certificates.
74889 @@ -122118,7 +123370,7 @@ Domain allowed access.
74890 </param>
74891 <rolecap/>
74892 </interface>
74893 -<interface name="userdom_manage_user_certs" lineno="2642">
74894 +<interface name="userdom_manage_user_certs" lineno="2736">
74895 <summary>
74896 Manage user SSL certificates.
74897 </summary>
74898 @@ -122128,7 +123380,7 @@ Domain allowed access.
74899 </summary>
74900 </param>
74901 </interface>
74902 -<interface name="userdom_write_user_tmp_sockets" lineno="2663">
74903 +<interface name="userdom_write_user_tmp_sockets" lineno="2757">
74904 <summary>
74905 Write to user temporary named sockets.
74906 </summary>
74907 @@ -122138,7 +123390,7 @@ Domain allowed access.
74908 </summary>
74909 </param>
74910 </interface>
74911 -<interface name="userdom_list_user_tmp" lineno="2683">
74912 +<interface name="userdom_list_user_tmp" lineno="2777">
74913 <summary>
74914 List user temporary directories.
74915 </summary>
74916 @@ -122148,7 +123400,7 @@ Domain allowed access.
74917 </summary>
74918 </param>
74919 </interface>
74920 -<interface name="userdom_dontaudit_list_user_tmp" lineno="2705">
74921 +<interface name="userdom_dontaudit_list_user_tmp" lineno="2799">
74922 <summary>
74923 Do not audit attempts to list user
74924 temporary directories.
74925 @@ -122159,7 +123411,7 @@ Domain to not audit.
74926 </summary>
74927 </param>
74928 </interface>
74929 -<interface name="userdom_delete_user_tmp_dirs" lineno="2723">
74930 +<interface name="userdom_delete_user_tmp_dirs" lineno="2817">
74931 <summary>
74932 Delete users temporary directories.
74933 </summary>
74934 @@ -122169,7 +123421,7 @@ Domain allowed access.
74935 </summary>
74936 </param>
74937 </interface>
74938 -<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2742">
74939 +<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2836">
74940 <summary>
74941 Do not audit attempts to manage users
74942 temporary directories.
74943 @@ -122180,7 +123432,7 @@ Domain to not audit.
74944 </summary>
74945 </param>
74946 </interface>
74947 -<interface name="userdom_read_user_tmp_files" lineno="2760">
74948 +<interface name="userdom_read_user_tmp_files" lineno="2854">
74949 <summary>
74950 Read user temporary files.
74951 </summary>
74952 @@ -122190,7 +123442,7 @@ Domain allowed access.
74953 </summary>
74954 </param>
74955 </interface>
74956 -<interface name="userdom_map_user_tmp_files" lineno="2781">
74957 +<interface name="userdom_map_user_tmp_files" lineno="2875">
74958 <summary>
74959 Map user temporary files.
74960 </summary>
74961 @@ -122200,7 +123452,7 @@ Domain allowed access.
74962 </summary>
74963 </param>
74964 </interface>
74965 -<interface name="userdom_dontaudit_read_user_tmp_files" lineno="2800">
74966 +<interface name="userdom_dontaudit_read_user_tmp_files" lineno="2894">
74967 <summary>
74968 Do not audit attempts to read users
74969 temporary files.
74970 @@ -122211,7 +123463,7 @@ Domain to not audit.
74971 </summary>
74972 </param>
74973 </interface>
74974 -<interface name="userdom_dontaudit_append_user_tmp_files" lineno="2819">
74975 +<interface name="userdom_dontaudit_append_user_tmp_files" lineno="2913">
74976 <summary>
74977 Do not audit attempts to append users
74978 temporary files.
74979 @@ -122222,7 +123474,7 @@ Domain to not audit.
74980 </summary>
74981 </param>
74982 </interface>
74983 -<interface name="userdom_rw_user_tmp_files" lineno="2837">
74984 +<interface name="userdom_rw_user_tmp_files" lineno="2931">
74985 <summary>
74986 Read and write user temporary files.
74987 </summary>
74988 @@ -122232,7 +123484,7 @@ Domain allowed access.
74989 </summary>
74990 </param>
74991 </interface>
74992 -<interface name="userdom_delete_user_tmp_files" lineno="2858">
74993 +<interface name="userdom_delete_user_tmp_files" lineno="2952">
74994 <summary>
74995 Delete users temporary files.
74996 </summary>
74997 @@ -122242,7 +123494,7 @@ Domain allowed access.
74998 </summary>
74999 </param>
75000 </interface>
75001 -<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="2877">
75002 +<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="2971">
75003 <summary>
75004 Do not audit attempts to manage users
75005 temporary files.
75006 @@ -122253,7 +123505,7 @@ Domain to not audit.
75007 </summary>
75008 </param>
75009 </interface>
75010 -<interface name="userdom_read_user_tmp_symlinks" lineno="2895">
75011 +<interface name="userdom_read_user_tmp_symlinks" lineno="2989">
75012 <summary>
75013 Read user temporary symbolic links.
75014 </summary>
75015 @@ -122263,7 +123515,7 @@ Domain allowed access.
75016 </summary>
75017 </param>
75018 </interface>
75019 -<interface name="userdom_delete_user_tmp_symlinks" lineno="2916">
75020 +<interface name="userdom_delete_user_tmp_symlinks" lineno="3010">
75021 <summary>
75022 Delete users temporary symbolic links.
75023 </summary>
75024 @@ -122273,7 +123525,7 @@ Domain allowed access.
75025 </summary>
75026 </param>
75027 </interface>
75028 -<interface name="userdom_manage_user_tmp_dirs" lineno="2935">
75029 +<interface name="userdom_manage_user_tmp_dirs" lineno="3029">
75030 <summary>
75031 Create, read, write, and delete user
75032 temporary directories.
75033 @@ -122284,7 +123536,7 @@ Domain allowed access.
75034 </summary>
75035 </param>
75036 </interface>
75037 -<interface name="userdom_delete_user_tmp_named_pipes" lineno="2955">
75038 +<interface name="userdom_delete_user_tmp_named_pipes" lineno="3049">
75039 <summary>
75040 Delete users temporary named pipes.
75041 </summary>
75042 @@ -122294,7 +123546,7 @@ Domain allowed access.
75043 </summary>
75044 </param>
75045 </interface>
75046 -<interface name="userdom_manage_user_tmp_files" lineno="2974">
75047 +<interface name="userdom_manage_user_tmp_files" lineno="3068">
75048 <summary>
75049 Create, read, write, and delete user
75050 temporary files.
75051 @@ -122305,7 +123557,7 @@ Domain allowed access.
75052 </summary>
75053 </param>
75054 </interface>
75055 -<interface name="userdom_delete_user_tmp_named_sockets" lineno="2994">
75056 +<interface name="userdom_delete_user_tmp_named_sockets" lineno="3088">
75057 <summary>
75058 Delete users temporary named sockets.
75059 </summary>
75060 @@ -122315,7 +123567,7 @@ Domain allowed access.
75061 </summary>
75062 </param>
75063 </interface>
75064 -<interface name="userdom_manage_user_tmp_symlinks" lineno="3013">
75065 +<interface name="userdom_manage_user_tmp_symlinks" lineno="3107">
75066 <summary>
75067 Create, read, write, and delete user
75068 temporary symbolic links.
75069 @@ -122326,7 +123578,7 @@ Domain allowed access.
75070 </summary>
75071 </param>
75072 </interface>
75073 -<interface name="userdom_manage_user_tmp_pipes" lineno="3034">
75074 +<interface name="userdom_manage_user_tmp_pipes" lineno="3128">
75075 <summary>
75076 Create, read, write, and delete user
75077 temporary named pipes.
75078 @@ -122337,7 +123589,7 @@ Domain allowed access.
75079 </summary>
75080 </param>
75081 </interface>
75082 -<interface name="userdom_manage_user_tmp_sockets" lineno="3055">
75083 +<interface name="userdom_manage_user_tmp_sockets" lineno="3149">
75084 <summary>
75085 Create, read, write, and delete user
75086 temporary named sockets.
75087 @@ -122348,7 +123600,7 @@ Domain allowed access.
75088 </summary>
75089 </param>
75090 </interface>
75091 -<interface name="userdom_user_tmp_filetrans" lineno="3092">
75092 +<interface name="userdom_user_tmp_filetrans" lineno="3186">
75093 <summary>
75094 Create objects in a user temporary directory
75095 with an automatic type transition to
75096 @@ -122375,7 +123627,7 @@ The name of the object being created.
75097 </summary>
75098 </param>
75099 </interface>
75100 -<interface name="userdom_tmp_filetrans_user_tmp" lineno="3124">
75101 +<interface name="userdom_tmp_filetrans_user_tmp" lineno="3218">
75102 <summary>
75103 Create objects in the temporary directory
75104 with an automatic type transition to
75105 @@ -122397,7 +123649,7 @@ The name of the object being created.
75106 </summary>
75107 </param>
75108 </interface>
75109 -<interface name="userdom_map_user_tmpfs_files" lineno="3142">
75110 +<interface name="userdom_map_user_tmpfs_files" lineno="3236">
75111 <summary>
75112 Map user tmpfs files.
75113 </summary>
75114 @@ -122407,7 +123659,7 @@ Domain allowed access.
75115 </summary>
75116 </param>
75117 </interface>
75118 -<interface name="userdom_read_user_tmpfs_files" lineno="3160">
75119 +<interface name="userdom_read_user_tmpfs_files" lineno="3254">
75120 <summary>
75121 Read user tmpfs files.
75122 </summary>
75123 @@ -122417,7 +123669,7 @@ Domain allowed access.
75124 </summary>
75125 </param>
75126 </interface>
75127 -<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3180">
75128 +<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3274">
75129 <summary>
75130 dontaudit Read attempts of user tmpfs files.
75131 </summary>
75132 @@ -122427,7 +123679,7 @@ Domain allowed access.
75133 </summary>
75134 </param>
75135 </interface>
75136 -<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3199">
75137 +<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3293">
75138 <summary>
75139 relabel to/from user tmpfs dirs
75140 </summary>
75141 @@ -122437,7 +123689,7 @@ Domain allowed access.
75142 </summary>
75143 </param>
75144 </interface>
75145 -<interface name="userdom_relabel_user_tmpfs_files" lineno="3218">
75146 +<interface name="userdom_relabel_user_tmpfs_files" lineno="3312">
75147 <summary>
75148 relabel to/from user tmpfs files
75149 </summary>
75150 @@ -122447,7 +123699,7 @@ Domain allowed access.
75151 </summary>
75152 </param>
75153 </interface>
75154 -<interface name="userdom_user_runtime_content" lineno="3240">
75155 +<interface name="userdom_user_runtime_content" lineno="3334">
75156 <summary>
75157 Make the specified type usable in
75158 the directory /run/user/%{USERID}/.
75159 @@ -122459,7 +123711,7 @@ user_runtime_content_dir_t.
75160 </summary>
75161 </param>
75162 </interface>
75163 -<interface name="userdom_search_user_runtime" lineno="3260">
75164 +<interface name="userdom_search_user_runtime" lineno="3354">
75165 <summary>
75166 Search users runtime directories.
75167 </summary>
75168 @@ -122469,7 +123721,7 @@ Domain allowed access.
75169 </summary>
75170 </param>
75171 </interface>
75172 -<interface name="userdom_search_user_runtime_root" lineno="3279">
75173 +<interface name="userdom_search_user_runtime_root" lineno="3373">
75174 <summary>
75175 Search user runtime root directories.
75176 </summary>
75177 @@ -122479,7 +123731,7 @@ Domain allowed access.
75178 </summary>
75179 </param>
75180 </interface>
75181 -<interface name="userdom_manage_user_runtime_root_dirs" lineno="3299">
75182 +<interface name="userdom_manage_user_runtime_root_dirs" lineno="3393">
75183 <summary>
75184 Create, read, write, and delete user
75185 runtime root dirs.
75186 @@ -122490,7 +123742,7 @@ Domain allowed access.
75187 </summary>
75188 </param>
75189 </interface>
75190 -<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3318">
75191 +<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3412">
75192 <summary>
75193 Relabel to and from user runtime root dirs.
75194 </summary>
75195 @@ -122500,7 +123752,7 @@ Domain allowed access.
75196 </summary>
75197 </param>
75198 </interface>
75199 -<interface name="userdom_manage_user_runtime_dirs" lineno="3337">
75200 +<interface name="userdom_manage_user_runtime_dirs" lineno="3431">
75201 <summary>
75202 Create, read, write, and delete user
75203 runtime dirs.
75204 @@ -122511,7 +123763,7 @@ Domain allowed access.
75205 </summary>
75206 </param>
75207 </interface>
75208 -<interface name="userdom_mounton_user_runtime_dirs" lineno="3357">
75209 +<interface name="userdom_mounton_user_runtime_dirs" lineno="3451">
75210 <summary>
75211 Mount a filesystem on user runtime dir
75212 directories.
75213 @@ -122522,7 +123774,7 @@ Domain allowed access.
75214 </summary>
75215 </param>
75216 </interface>
75217 -<interface name="userdom_relabelto_user_runtime_dirs" lineno="3375">
75218 +<interface name="userdom_relabelto_user_runtime_dirs" lineno="3469">
75219 <summary>
75220 Relabel to user runtime directories.
75221 </summary>
75222 @@ -122532,7 +123784,7 @@ Domain allowed access.
75223 </summary>
75224 </param>
75225 </interface>
75226 -<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3393">
75227 +<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3487">
75228 <summary>
75229 Relabel from user runtime directories.
75230 </summary>
75231 @@ -122542,7 +123794,7 @@ Domain allowed access.
75232 </summary>
75233 </param>
75234 </interface>
75235 -<interface name="userdom_delete_user_runtime_files" lineno="3411">
75236 +<interface name="userdom_delete_user_runtime_files" lineno="3505">
75237 <summary>
75238 delete user runtime files
75239 </summary>
75240 @@ -122552,7 +123804,7 @@ Domain allowed access.
75241 </summary>
75242 </param>
75243 </interface>
75244 -<interface name="userdom_search_all_user_runtime" lineno="3430">
75245 +<interface name="userdom_search_all_user_runtime" lineno="3524">
75246 <summary>
75247 Search users runtime directories.
75248 </summary>
75249 @@ -122562,7 +123814,7 @@ Domain allowed access.
75250 </summary>
75251 </param>
75252 </interface>
75253 -<interface name="userdom_list_all_user_runtime" lineno="3449">
75254 +<interface name="userdom_list_all_user_runtime" lineno="3543">
75255 <summary>
75256 List user runtime directories.
75257 </summary>
75258 @@ -122572,7 +123824,7 @@ Domain allowed access.
75259 </summary>
75260 </param>
75261 </interface>
75262 -<interface name="userdom_delete_all_user_runtime_dirs" lineno="3468">
75263 +<interface name="userdom_delete_all_user_runtime_dirs" lineno="3562">
75264 <summary>
75265 delete user runtime directories
75266 </summary>
75267 @@ -122582,7 +123834,7 @@ Domain allowed access.
75268 </summary>
75269 </param>
75270 </interface>
75271 -<interface name="userdom_delete_all_user_runtime_files" lineno="3486">
75272 +<interface name="userdom_delete_all_user_runtime_files" lineno="3580">
75273 <summary>
75274 delete user runtime files
75275 </summary>
75276 @@ -122592,7 +123844,7 @@ Domain allowed access.
75277 </summary>
75278 </param>
75279 </interface>
75280 -<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3505">
75281 +<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3599">
75282 <summary>
75283 delete user runtime symlink files
75284 </summary>
75285 @@ -122602,7 +123854,7 @@ Domain allowed access.
75286 </summary>
75287 </param>
75288 </interface>
75289 -<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3524">
75290 +<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3618">
75291 <summary>
75292 delete user runtime fifo files
75293 </summary>
75294 @@ -122612,7 +123864,7 @@ Domain allowed access.
75295 </summary>
75296 </param>
75297 </interface>
75298 -<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3543">
75299 +<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3637">
75300 <summary>
75301 delete user runtime socket files
75302 </summary>
75303 @@ -122622,10 +123874,32 @@ Domain allowed access.
75304 </summary>
75305 </param>
75306 </interface>
75307 -<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3574">
75308 +<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3668">
75309 <summary>
75310 Create objects in the pid directory
75311 with an automatic type transition to
75312 +the user runtime root type. (Deprecated)
75313 +</summary>
75314 +<param name="domain">
75315 +<summary>
75316 +Domain allowed access.
75317 +</summary>
75318 +</param>
75319 +<param name="object_class">
75320 +<summary>
75321 +The class of the object to be created.
75322 +</summary>
75323 +</param>
75324 +<param name="name" optional="true">
75325 +<summary>
75326 +The name of the object being created.
75327 +</summary>
75328 +</param>
75329 +</interface>
75330 +<interface name="userdom_runtime_filetrans_user_runtime_root" lineno="3695">
75331 +<summary>
75332 +Create objects in the runtime directory
75333 +with an automatic type transition to
75334 the user runtime root type.
75335 </summary>
75336 <param name="domain">
75337 @@ -122644,7 +123918,7 @@ The name of the object being created.
75338 </summary>
75339 </param>
75340 </interface>
75341 -<interface name="userdom_user_runtime_filetrans" lineno="3610">
75342 +<interface name="userdom_user_runtime_filetrans" lineno="3731">
75343 <summary>
75344 Create objects in a user runtime
75345 directory with an automatic type
75346 @@ -122672,7 +123946,7 @@ The name of the object being created.
75347 </summary>
75348 </param>
75349 </interface>
75350 -<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3641">
75351 +<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3762">
75352 <summary>
75353 Create objects in the user runtime directory
75354 with an automatic type transition to
75355 @@ -122694,7 +123968,7 @@ The name of the object being created.
75356 </summary>
75357 </param>
75358 </interface>
75359 -<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="3671">
75360 +<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="3792">
75361 <summary>
75362 Create objects in the user runtime root
75363 directory with an automatic type transition
75364 @@ -122716,7 +123990,7 @@ The name of the object being created.
75365 </summary>
75366 </param>
75367 </interface>
75368 -<interface name="userdom_user_run_filetrans_user_runtime" lineno="3702">
75369 +<interface name="userdom_user_run_filetrans_user_runtime" lineno="3823">
75370 <summary>
75371 Create objects in the user runtime root
75372 directory with an automatic type transition
75373 @@ -122738,7 +124012,7 @@ The name of the object being created.
75374 </summary>
75375 </param>
75376 </interface>
75377 -<interface name="userdom_rw_user_tmpfs_files" lineno="3720">
75378 +<interface name="userdom_rw_user_tmpfs_files" lineno="3841">
75379 <summary>
75380 Read and write user tmpfs files.
75381 </summary>
75382 @@ -122748,7 +124022,7 @@ Domain allowed access.
75383 </summary>
75384 </param>
75385 </interface>
75386 -<interface name="userdom_delete_user_tmpfs_files" lineno="3741">
75387 +<interface name="userdom_delete_user_tmpfs_files" lineno="3862">
75388 <summary>
75389 Delete user tmpfs files.
75390 </summary>
75391 @@ -122758,7 +124032,7 @@ Domain allowed access.
75392 </summary>
75393 </param>
75394 </interface>
75395 -<interface name="userdom_manage_user_tmpfs_files" lineno="3760">
75396 +<interface name="userdom_manage_user_tmpfs_files" lineno="3881">
75397 <summary>
75398 Create, read, write, and delete user tmpfs files.
75399 </summary>
75400 @@ -122768,7 +124042,7 @@ Domain allowed access.
75401 </summary>
75402 </param>
75403 </interface>
75404 -<interface name="userdom_getattr_user_ttys" lineno="3780">
75405 +<interface name="userdom_getattr_user_ttys" lineno="3901">
75406 <summary>
75407 Get the attributes of a user domain tty.
75408 </summary>
75409 @@ -122778,7 +124052,7 @@ Domain allowed access.
75410 </summary>
75411 </param>
75412 </interface>
75413 -<interface name="userdom_dontaudit_getattr_user_ttys" lineno="3798">
75414 +<interface name="userdom_dontaudit_getattr_user_ttys" lineno="3919">
75415 <summary>
75416 Do not audit attempts to get the attributes of a user domain tty.
75417 </summary>
75418 @@ -122788,7 +124062,7 @@ Domain to not audit.
75419 </summary>
75420 </param>
75421 </interface>
75422 -<interface name="userdom_setattr_user_ttys" lineno="3816">
75423 +<interface name="userdom_setattr_user_ttys" lineno="3937">
75424 <summary>
75425 Set the attributes of a user domain tty.
75426 </summary>
75427 @@ -122798,7 +124072,7 @@ Domain allowed access.
75428 </summary>
75429 </param>
75430 </interface>
75431 -<interface name="userdom_dontaudit_setattr_user_ttys" lineno="3834">
75432 +<interface name="userdom_dontaudit_setattr_user_ttys" lineno="3955">
75433 <summary>
75434 Do not audit attempts to set the attributes of a user domain tty.
75435 </summary>
75436 @@ -122808,7 +124082,7 @@ Domain to not audit.
75437 </summary>
75438 </param>
75439 </interface>
75440 -<interface name="userdom_use_user_ttys" lineno="3852">
75441 +<interface name="userdom_use_user_ttys" lineno="3973">
75442 <summary>
75443 Read and write a user domain tty.
75444 </summary>
75445 @@ -122818,7 +124092,7 @@ Domain allowed access.
75446 </summary>
75447 </param>
75448 </interface>
75449 -<interface name="userdom_use_user_ptys" lineno="3870">
75450 +<interface name="userdom_use_user_ptys" lineno="3991">
75451 <summary>
75452 Read and write a user domain pty.
75453 </summary>
75454 @@ -122828,7 +124102,7 @@ Domain allowed access.
75455 </summary>
75456 </param>
75457 </interface>
75458 -<interface name="userdom_use_inherited_user_terminals" lineno="3905">
75459 +<interface name="userdom_use_inherited_user_terminals" lineno="4026">
75460 <summary>
75461 Read and write a user TTYs and PTYs.
75462 </summary>
75463 @@ -122854,7 +124128,7 @@ Domain allowed access.
75464 </param>
75465 <infoflow type="both" weight="10"/>
75466 </interface>
75467 -<interface name="userdom_use_user_terminals" lineno="3946">
75468 +<interface name="userdom_use_user_terminals" lineno="4067">
75469 <summary>
75470 Read, write and open a user TTYs and PTYs.
75471 </summary>
75472 @@ -122886,7 +124160,7 @@ Domain allowed access.
75473 </param>
75474 <infoflow type="both" weight="10"/>
75475 </interface>
75476 -<interface name="userdom_dontaudit_use_user_terminals" lineno="3962">
75477 +<interface name="userdom_dontaudit_use_user_terminals" lineno="4083">
75478 <summary>
75479 Do not audit attempts to read and write
75480 a user domain tty and pty.
75481 @@ -122897,7 +124171,7 @@ Domain to not audit.
75482 </summary>
75483 </param>
75484 </interface>
75485 -<interface name="userdom_spec_domtrans_all_users" lineno="3983">
75486 +<interface name="userdom_spec_domtrans_all_users" lineno="4104">
75487 <summary>
75488 Execute a shell in all user domains. This
75489 is an explicit transition, requiring the
75490 @@ -122909,7 +124183,7 @@ Domain allowed to transition.
75491 </summary>
75492 </param>
75493 </interface>
75494 -<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4006">
75495 +<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4127">
75496 <summary>
75497 Execute an Xserver session in all user domains. This
75498 is an explicit transition, requiring the
75499 @@ -122921,7 +124195,7 @@ Domain allowed to transition.
75500 </summary>
75501 </param>
75502 </interface>
75503 -<interface name="userdom_spec_domtrans_unpriv_users" lineno="4029">
75504 +<interface name="userdom_spec_domtrans_unpriv_users" lineno="4150">
75505 <summary>
75506 Execute a shell in all unprivileged user domains. This
75507 is an explicit transition, requiring the
75508 @@ -122933,7 +124207,7 @@ Domain allowed to transition.
75509 </summary>
75510 </param>
75511 </interface>
75512 -<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4052">
75513 +<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4173">
75514 <summary>
75515 Execute an Xserver session in all unprivileged user domains. This
75516 is an explicit transition, requiring the
75517 @@ -122945,7 +124219,7 @@ Domain allowed to transition.
75518 </summary>
75519 </param>
75520 </interface>
75521 -<interface name="userdom_rw_unpriv_user_semaphores" lineno="4073">
75522 +<interface name="userdom_rw_unpriv_user_semaphores" lineno="4194">
75523 <summary>
75524 Read and write unpriviledged user SysV sempaphores.
75525 </summary>
75526 @@ -122955,7 +124229,7 @@ Domain allowed access.
75527 </summary>
75528 </param>
75529 </interface>
75530 -<interface name="userdom_manage_unpriv_user_semaphores" lineno="4091">
75531 +<interface name="userdom_manage_unpriv_user_semaphores" lineno="4212">
75532 <summary>
75533 Manage unpriviledged user SysV sempaphores.
75534 </summary>
75535 @@ -122965,7 +124239,7 @@ Domain allowed access.
75536 </summary>
75537 </param>
75538 </interface>
75539 -<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4110">
75540 +<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4231">
75541 <summary>
75542 Read and write unpriviledged user SysV shared
75543 memory segments.
75544 @@ -122976,7 +124250,7 @@ Domain allowed access.
75545 </summary>
75546 </param>
75547 </interface>
75548 -<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4129">
75549 +<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4250">
75550 <summary>
75551 Manage unpriviledged user SysV shared
75552 memory segments.
75553 @@ -122987,7 +124261,7 @@ Domain allowed access.
75554 </summary>
75555 </param>
75556 </interface>
75557 -<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4149">
75558 +<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4270">
75559 <summary>
75560 Execute bin_t in the unprivileged user domains. This
75561 is an explicit transition, requiring the
75562 @@ -122999,7 +124273,7 @@ Domain allowed to transition.
75563 </summary>
75564 </param>
75565 </interface>
75566 -<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4172">
75567 +<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4293">
75568 <summary>
75569 Execute all entrypoint files in unprivileged user
75570 domains. This is an explicit transition, requiring the
75571 @@ -123011,7 +124285,7 @@ Domain allowed access.
75572 </summary>
75573 </param>
75574 </interface>
75575 -<interface name="userdom_search_user_home_content" lineno="4193">
75576 +<interface name="userdom_search_user_home_content" lineno="4314">
75577 <summary>
75578 Search users home directories.
75579 </summary>
75580 @@ -123021,7 +124295,7 @@ Domain allowed access.
75581 </summary>
75582 </param>
75583 </interface>
75584 -<interface name="userdom_signull_unpriv_users" lineno="4212">
75585 +<interface name="userdom_signull_unpriv_users" lineno="4333">
75586 <summary>
75587 Send signull to unprivileged user domains.
75588 </summary>
75589 @@ -123031,7 +124305,7 @@ Domain allowed access.
75590 </summary>
75591 </param>
75592 </interface>
75593 -<interface name="userdom_signal_unpriv_users" lineno="4230">
75594 +<interface name="userdom_signal_unpriv_users" lineno="4351">
75595 <summary>
75596 Send general signals to unprivileged user domains.
75597 </summary>
75598 @@ -123041,7 +124315,7 @@ Domain allowed access.
75599 </summary>
75600 </param>
75601 </interface>
75602 -<interface name="userdom_use_unpriv_users_fds" lineno="4248">
75603 +<interface name="userdom_use_unpriv_users_fds" lineno="4369">
75604 <summary>
75605 Inherit the file descriptors from unprivileged user domains.
75606 </summary>
75607 @@ -123051,7 +124325,7 @@ Domain allowed access.
75608 </summary>
75609 </param>
75610 </interface>
75611 -<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4276">
75612 +<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4397">
75613 <summary>
75614 Do not audit attempts to inherit the file descriptors
75615 from unprivileged user domains.
75616 @@ -123071,7 +124345,7 @@ Domain to not audit.
75617 </param>
75618 <infoflow type="none"/>
75619 </interface>
75620 -<interface name="userdom_dontaudit_use_user_ptys" lineno="4294">
75621 +<interface name="userdom_dontaudit_use_user_ptys" lineno="4415">
75622 <summary>
75623 Do not audit attempts to use user ptys.
75624 </summary>
75625 @@ -123081,7 +124355,7 @@ Domain to not audit.
75626 </summary>
75627 </param>
75628 </interface>
75629 -<interface name="userdom_relabelto_user_ptys" lineno="4312">
75630 +<interface name="userdom_relabelto_user_ptys" lineno="4433">
75631 <summary>
75632 Relabel files to unprivileged user pty types.
75633 </summary>
75634 @@ -123091,7 +124365,7 @@ Domain allowed access.
75635 </summary>
75636 </param>
75637 </interface>
75638 -<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4331">
75639 +<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4452">
75640 <summary>
75641 Do not audit attempts to relabel files from
75642 user pty types.
75643 @@ -123102,7 +124376,7 @@ Domain to not audit.
75644 </summary>
75645 </param>
75646 </interface>
75647 -<interface name="userdom_write_user_tmp_files" lineno="4349">
75648 +<interface name="userdom_write_user_tmp_files" lineno="4470">
75649 <summary>
75650 Write all users files in /tmp
75651 </summary>
75652 @@ -123112,7 +124386,7 @@ Domain allowed access.
75653 </summary>
75654 </param>
75655 </interface>
75656 -<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4368">
75657 +<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4489">
75658 <summary>
75659 Do not audit attempts to write users
75660 temporary files.
75661 @@ -123123,7 +124397,7 @@ Domain to not audit.
75662 </summary>
75663 </param>
75664 </interface>
75665 -<interface name="userdom_dontaudit_use_user_ttys" lineno="4386">
75666 +<interface name="userdom_dontaudit_use_user_ttys" lineno="4507">
75667 <summary>
75668 Do not audit attempts to use user ttys.
75669 </summary>
75670 @@ -123133,7 +124407,7 @@ Domain to not audit.
75671 </summary>
75672 </param>
75673 </interface>
75674 -<interface name="userdom_read_all_users_state" lineno="4404">
75675 +<interface name="userdom_read_all_users_state" lineno="4525">
75676 <summary>
75677 Read the process state of all user domains.
75678 </summary>
75679 @@ -123143,7 +124417,7 @@ Domain allowed access.
75680 </summary>
75681 </param>
75682 </interface>
75683 -<interface name="userdom_getattr_all_users" lineno="4423">
75684 +<interface name="userdom_getattr_all_users" lineno="4545">
75685 <summary>
75686 Get the attributes of all user domains.
75687 </summary>
75688 @@ -123153,7 +124427,7 @@ Domain allowed access.
75689 </summary>
75690 </param>
75691 </interface>
75692 -<interface name="userdom_use_all_users_fds" lineno="4441">
75693 +<interface name="userdom_use_all_users_fds" lineno="4563">
75694 <summary>
75695 Inherit the file descriptors from all user domains
75696 </summary>
75697 @@ -123163,7 +124437,7 @@ Domain allowed access.
75698 </summary>
75699 </param>
75700 </interface>
75701 -<interface name="userdom_dontaudit_use_all_users_fds" lineno="4460">
75702 +<interface name="userdom_dontaudit_use_all_users_fds" lineno="4582">
75703 <summary>
75704 Do not audit attempts to inherit the file
75705 descriptors from any user domains.
75706 @@ -123174,7 +124448,7 @@ Domain to not audit.
75707 </summary>
75708 </param>
75709 </interface>
75710 -<interface name="userdom_signal_all_users" lineno="4478">
75711 +<interface name="userdom_signal_all_users" lineno="4600">
75712 <summary>
75713 Send general signals to all user domains.
75714 </summary>
75715 @@ -123184,7 +124458,7 @@ Domain allowed access.
75716 </summary>
75717 </param>
75718 </interface>
75719 -<interface name="userdom_sigchld_all_users" lineno="4496">
75720 +<interface name="userdom_sigchld_all_users" lineno="4618">
75721 <summary>
75722 Send a SIGCHLD signal to all user domains.
75723 </summary>
75724 @@ -123194,7 +124468,7 @@ Domain allowed access.
75725 </summary>
75726 </param>
75727 </interface>
75728 -<interface name="userdom_read_all_users_keys" lineno="4514">
75729 +<interface name="userdom_read_all_users_keys" lineno="4636">
75730 <summary>
75731 Read keys for all user domains.
75732 </summary>
75733 @@ -123204,7 +124478,7 @@ Domain allowed access.
75734 </summary>
75735 </param>
75736 </interface>
75737 -<interface name="userdom_write_all_users_keys" lineno="4532">
75738 +<interface name="userdom_write_all_users_keys" lineno="4654">
75739 <summary>
75740 Write keys for all user domains.
75741 </summary>
75742 @@ -123214,7 +124488,7 @@ Domain allowed access.
75743 </summary>
75744 </param>
75745 </interface>
75746 -<interface name="userdom_rw_all_users_keys" lineno="4550">
75747 +<interface name="userdom_rw_all_users_keys" lineno="4672">
75748 <summary>
75749 Read and write keys for all user domains.
75750 </summary>
75751 @@ -123224,7 +124498,7 @@ Domain allowed access.
75752 </summary>
75753 </param>
75754 </interface>
75755 -<interface name="userdom_create_all_users_keys" lineno="4568">
75756 +<interface name="userdom_create_all_users_keys" lineno="4690">
75757 <summary>
75758 Create keys for all user domains.
75759 </summary>
75760 @@ -123234,7 +124508,7 @@ Domain allowed access.
75761 </summary>
75762 </param>
75763 </interface>
75764 -<interface name="userdom_manage_all_users_keys" lineno="4586">
75765 +<interface name="userdom_manage_all_users_keys" lineno="4708">
75766 <summary>
75767 Manage keys for all user domains.
75768 </summary>
75769 @@ -123244,7 +124518,7 @@ Domain allowed access.
75770 </summary>
75771 </param>
75772 </interface>
75773 -<interface name="userdom_dbus_send_all_users" lineno="4604">
75774 +<interface name="userdom_dbus_send_all_users" lineno="4726">
75775 <summary>
75776 Send a dbus message to all user domains.
75777 </summary>
75778 @@ -123254,7 +124528,7 @@ Domain allowed access.
75779 </summary>
75780 </param>
75781 </interface>
75782 -<interface name="userdom_manage_user_tmp_chr_files" lineno="4626">
75783 +<interface name="userdom_manage_user_tmp_chr_files" lineno="4748">
75784 <summary>
75785 Create, read, write, and delete user
75786 temporary character files.
75787 @@ -123265,7 +124539,7 @@ Domain allowed access.
75788 </summary>
75789 </param>
75790 </interface>
75791 -<interface name="userdom_relabel_user_certs" lineno="4647">
75792 +<interface name="userdom_relabel_user_certs" lineno="4769">
75793 <summary>
75794 Allow relabeling resources to user_cert_t
75795 </summary>
75796 @@ -123275,7 +124549,7 @@ Domain allowed access
75797 </summary>
75798 </param>
75799 </interface>
75800 -<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="4670">
75801 +<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="4792">
75802 <summary>
75803 Do not audit attempts to read and write
75804 unserdomain stream.
75805 @@ -123391,7 +124665,27 @@ Domain allowed access.
75806 </summary>
75807 </param>
75808 </interface>
75809 -<interface name="xdg_read_cache_files" lineno="96">
75810 +<interface name="xdg_watch_cache_dirs" lineno="96">
75811 +<summary>
75812 +Watch the xdg cache home directories
75813 +</summary>
75814 +<param name="domain">
75815 +<summary>
75816 +Domain allowed access.
75817 +</summary>
75818 +</param>
75819 +</interface>
75820 +<interface name="xdg_watch_all_cache_dirs" lineno="114">
75821 +<summary>
75822 +Watch all the xdg cache home directories
75823 +</summary>
75824 +<param name="domain">
75825 +<summary>
75826 +Domain allowed access.
75827 +</summary>
75828 +</param>
75829 +</interface>
75830 +<interface name="xdg_read_cache_files" lineno="132">
75831 <summary>
75832 Read the xdg cache home files
75833 </summary>
75834 @@ -123401,7 +124695,7 @@ Domain allowed access.
75835 </summary>
75836 </param>
75837 </interface>
75838 -<interface name="xdg_read_all_cache_files" lineno="119">
75839 +<interface name="xdg_read_all_cache_files" lineno="155">
75840 <summary>
75841 Read all xdg_cache_type files
75842 </summary>
75843 @@ -123411,7 +124705,7 @@ Domain allowed access.
75844 </summary>
75845 </param>
75846 </interface>
75847 -<interface name="xdg_cache_filetrans" lineno="159">
75848 +<interface name="xdg_cache_filetrans" lineno="195">
75849 <summary>
75850 Create objects in an xdg_cache directory
75851 with an automatic type transition to
75852 @@ -123438,7 +124732,7 @@ Name of the file or directory created
75853 </summary>
75854 </param>
75855 </interface>
75856 -<interface name="xdg_generic_user_home_dir_filetrans_cache" lineno="192">
75857 +<interface name="xdg_generic_user_home_dir_filetrans_cache" lineno="228">
75858 <summary>
75859 Create objects in the user home dir with an automatic type transition to
75860 the xdg_cache_t type.
75861 @@ -123459,7 +124753,7 @@ Name of the directory created
75862 </summary>
75863 </param>
75864 </interface>
75865 -<interface name="xdg_create_cache_dirs" lineno="210">
75866 +<interface name="xdg_create_cache_dirs" lineno="246">
75867 <summary>
75868 Create xdg cache home directories
75869 </summary>
75870 @@ -123469,7 +124763,7 @@ Domain allowed access
75871 </summary>
75872 </param>
75873 </interface>
75874 -<interface name="xdg_manage_cache" lineno="228">
75875 +<interface name="xdg_manage_cache" lineno="264">
75876 <summary>
75877 Manage the xdg cache home files
75878 </summary>
75879 @@ -123479,7 +124773,7 @@ Domain allowed access.
75880 </summary>
75881 </param>
75882 </interface>
75883 -<interface name="xdg_manage_all_cache" lineno="253">
75884 +<interface name="xdg_manage_all_cache" lineno="289">
75885 <summary>
75886 Manage all the xdg cache home files regardless of their specific type
75887 </summary>
75888 @@ -123489,7 +124783,7 @@ Domain allowed access.
75889 </summary>
75890 </param>
75891 </interface>
75892 -<interface name="xdg_relabel_cache" lineno="278">
75893 +<interface name="xdg_relabel_cache" lineno="314">
75894 <summary>
75895 Allow relabeling the xdg cache home files
75896 </summary>
75897 @@ -123499,7 +124793,7 @@ Domain allowed access.
75898 </summary>
75899 </param>
75900 </interface>
75901 -<interface name="xdg_relabel_all_cache" lineno="302">
75902 +<interface name="xdg_relabel_all_cache" lineno="338">
75903 <summary>
75904 Allow relabeling the xdg cache home files, regardless of their specific type
75905 </summary>
75906 @@ -123509,7 +124803,7 @@ Domain allowed access.
75907 </summary>
75908 </param>
75909 </interface>
75910 -<interface name="xdg_search_config_dirs" lineno="326">
75911 +<interface name="xdg_search_config_dirs" lineno="362">
75912 <summary>
75913 Search through the xdg config home directories
75914 </summary>
75915 @@ -123519,7 +124813,27 @@ Domain allowed access.
75916 </summary>
75917 </param>
75918 </interface>
75919 -<interface name="xdg_read_config_files" lineno="346">
75920 +<interface name="xdg_watch_config_dirs" lineno="382">
75921 +<summary>
75922 +Watch the xdg config home directories
75923 +</summary>
75924 +<param name="domain">
75925 +<summary>
75926 +Domain allowed access.
75927 +</summary>
75928 +</param>
75929 +</interface>
75930 +<interface name="xdg_watch_all_config_dirs" lineno="400">
75931 +<summary>
75932 +Watch all the xdg config home directories
75933 +</summary>
75934 +<param name="domain">
75935 +<summary>
75936 +Domain allowed access.
75937 +</summary>
75938 +</param>
75939 +</interface>
75940 +<interface name="xdg_read_config_files" lineno="418">
75941 <summary>
75942 Read the xdg config home files
75943 </summary>
75944 @@ -123529,7 +124843,7 @@ Domain allowed access.
75945 </summary>
75946 </param>
75947 </interface>
75948 -<interface name="xdg_read_all_config_files" lineno="369">
75949 +<interface name="xdg_read_all_config_files" lineno="441">
75950 <summary>
75951 Read all xdg_config_type files
75952 </summary>
75953 @@ -123539,7 +124853,7 @@ Domain allowed access.
75954 </summary>
75955 </param>
75956 </interface>
75957 -<interface name="xdg_config_filetrans" lineno="409">
75958 +<interface name="xdg_config_filetrans" lineno="481">
75959 <summary>
75960 Create objects in an xdg_config directory
75961 with an automatic type transition to
75962 @@ -123566,7 +124880,7 @@ Name of the file or directory created
75963 </summary>
75964 </param>
75965 </interface>
75966 -<interface name="xdg_generic_user_home_dir_filetrans_config" lineno="442">
75967 +<interface name="xdg_generic_user_home_dir_filetrans_config" lineno="514">
75968 <summary>
75969 Create objects in the user home dir with an automatic type transition to
75970 the xdg_config_t type.
75971 @@ -123587,7 +124901,7 @@ Name of the directory created
75972 </summary>
75973 </param>
75974 </interface>
75975 -<interface name="xdg_create_config_dirs" lineno="460">
75976 +<interface name="xdg_create_config_dirs" lineno="532">
75977 <summary>
75978 Create xdg config home directories
75979 </summary>
75980 @@ -123597,7 +124911,7 @@ Domain allowed access
75981 </summary>
75982 </param>
75983 </interface>
75984 -<interface name="xdg_manage_config" lineno="478">
75985 +<interface name="xdg_manage_config" lineno="550">
75986 <summary>
75987 Manage the xdg config home files
75988 </summary>
75989 @@ -123607,7 +124921,7 @@ Domain allowed access.
75990 </summary>
75991 </param>
75992 </interface>
75993 -<interface name="xdg_manage_all_config" lineno="503">
75994 +<interface name="xdg_manage_all_config" lineno="575">
75995 <summary>
75996 Manage all the xdg config home files regardless of their specific type
75997 </summary>
75998 @@ -123617,7 +124931,7 @@ Domain allowed access.
75999 </summary>
76000 </param>
76001 </interface>
76002 -<interface name="xdg_relabel_config" lineno="528">
76003 +<interface name="xdg_relabel_config" lineno="600">
76004 <summary>
76005 Allow relabeling the xdg config home files
76006 </summary>
76007 @@ -123627,7 +124941,7 @@ Domain allowed access.
76008 </summary>
76009 </param>
76010 </interface>
76011 -<interface name="xdg_relabel_all_config" lineno="552">
76012 +<interface name="xdg_relabel_all_config" lineno="624">
76013 <summary>
76014 Allow relabeling the xdg config home files, regardless of their specific type
76015 </summary>
76016 @@ -123637,7 +124951,27 @@ Domain allowed access.
76017 </summary>
76018 </param>
76019 </interface>
76020 -<interface name="xdg_read_data_files" lineno="576">
76021 +<interface name="xdg_watch_data_dirs" lineno="648">
76022 +<summary>
76023 +Watch the xdg data home directories
76024 +</summary>
76025 +<param name="domain">
76026 +<summary>
76027 +Domain allowed access.
76028 +</summary>
76029 +</param>
76030 +</interface>
76031 +<interface name="xdg_watch_all_data_dirs" lineno="666">
76032 +<summary>
76033 +Watch all the xdg data home directories
76034 +</summary>
76035 +<param name="domain">
76036 +<summary>
76037 +Domain allowed access.
76038 +</summary>
76039 +</param>
76040 +</interface>
76041 +<interface name="xdg_read_data_files" lineno="684">
76042 <summary>
76043 Read the xdg data home files
76044 </summary>
76045 @@ -123647,7 +124981,7 @@ Domain allowed access.
76046 </summary>
76047 </param>
76048 </interface>
76049 -<interface name="xdg_read_all_data_files" lineno="599">
76050 +<interface name="xdg_read_all_data_files" lineno="707">
76051 <summary>
76052 Read all xdg_data_type files
76053 </summary>
76054 @@ -123657,7 +124991,7 @@ Domain allowed access.
76055 </summary>
76056 </param>
76057 </interface>
76058 -<interface name="xdg_data_filetrans" lineno="639">
76059 +<interface name="xdg_data_filetrans" lineno="747">
76060 <summary>
76061 Create objects in an xdg_data directory
76062 with an automatic type transition to
76063 @@ -123684,7 +125018,7 @@ Optional name of the file or directory created
76064 </summary>
76065 </param>
76066 </interface>
76067 -<interface name="xdg_generic_user_home_dir_filetrans_data" lineno="672">
76068 +<interface name="xdg_generic_user_home_dir_filetrans_data" lineno="780">
76069 <summary>
76070 Create objects in the user home dir with an automatic type transition to
76071 the xdg_data_t type.
76072 @@ -123705,7 +125039,7 @@ Name of the directory created
76073 </summary>
76074 </param>
76075 </interface>
76076 -<interface name="xdg_create_data_dirs" lineno="690">
76077 +<interface name="xdg_create_data_dirs" lineno="798">
76078 <summary>
76079 Create xdg data home directories
76080 </summary>
76081 @@ -123715,7 +125049,7 @@ Domain allowed access
76082 </summary>
76083 </param>
76084 </interface>
76085 -<interface name="xdg_manage_data" lineno="708">
76086 +<interface name="xdg_manage_data" lineno="816">
76087 <summary>
76088 Manage the xdg data home files
76089 </summary>
76090 @@ -123725,7 +125059,7 @@ Domain allowed access.
76091 </summary>
76092 </param>
76093 </interface>
76094 -<interface name="xdg_manage_all_data" lineno="733">
76095 +<interface name="xdg_manage_all_data" lineno="841">
76096 <summary>
76097 Manage all the xdg data home files, regardless of their specific type
76098 </summary>
76099 @@ -123735,7 +125069,7 @@ Domain allowed access.
76100 </summary>
76101 </param>
76102 </interface>
76103 -<interface name="xdg_relabel_data" lineno="758">
76104 +<interface name="xdg_relabel_data" lineno="866">
76105 <summary>
76106 Allow relabeling the xdg data home files
76107 </summary>
76108 @@ -123745,7 +125079,7 @@ Domain allowed access.
76109 </summary>
76110 </param>
76111 </interface>
76112 -<interface name="xdg_relabel_all_data" lineno="782">
76113 +<interface name="xdg_relabel_all_data" lineno="890">
76114 <summary>
76115 Allow relabeling the xdg data home files, regardless of their type
76116 </summary>
76117 @@ -123755,7 +125089,17 @@ Domain allowed access.
76118 </summary>
76119 </param>
76120 </interface>
76121 -<interface name="xdg_generic_user_home_dir_filetrans_documents" lineno="817">
76122 +<interface name="xdg_watch_documents_dirs" lineno="914">
76123 +<summary>
76124 +Watch the xdg documents home directories
76125 +</summary>
76126 +<param name="domain">
76127 +<summary>
76128 +Domain allowed access.
76129 +</summary>
76130 +</param>
76131 +</interface>
76132 +<interface name="xdg_generic_user_home_dir_filetrans_documents" lineno="943">
76133 <summary>
76134 Create objects in the user home dir with an automatic type transition to
76135 the xdg_documents_t type.
76136 @@ -123776,7 +125120,7 @@ Name of the directory created
76137 </summary>
76138 </param>
76139 </interface>
76140 -<interface name="xdg_manage_documents" lineno="835">
76141 +<interface name="xdg_manage_documents" lineno="961">
76142 <summary>
76143 Manage documents content
76144 </summary>
76145 @@ -123786,7 +125130,7 @@ Domain allowed access
76146 </summary>
76147 </param>
76148 </interface>
76149 -<interface name="xdg_relabel_documents" lineno="856">
76150 +<interface name="xdg_relabel_documents" lineno="982">
76151 <summary>
76152 Allow relabeling the documents resources
76153 </summary>
76154 @@ -123796,7 +125140,17 @@ Domain allowed access.
76155 </summary>
76156 </param>
76157 </interface>
76158 -<interface name="xdg_read_downloads" lineno="878">
76159 +<interface name="xdg_watch_downloads_dirs" lineno="1004">
76160 +<summary>
76161 +Watch the xdg downloads home directories
76162 +</summary>
76163 +<param name="domain">
76164 +<summary>
76165 +Domain allowed access.
76166 +</summary>
76167 +</param>
76168 +</interface>
76169 +<interface name="xdg_read_downloads" lineno="1022">
76170 <summary>
76171 Read downloaded content
76172 </summary>
76173 @@ -123806,7 +125160,7 @@ Domain allowed access
76174 </summary>
76175 </param>
76176 </interface>
76177 -<interface name="xdg_create_downloads" lineno="901">
76178 +<interface name="xdg_create_downloads" lineno="1045">
76179 <summary>
76180 Create downloaded content
76181 </summary>
76182 @@ -123816,7 +125170,7 @@ Domain allowed access
76183 </summary>
76184 </param>
76185 </interface>
76186 -<interface name="xdg_write_downloads" lineno="924">
76187 +<interface name="xdg_write_downloads" lineno="1068">
76188 <summary>
76189 Write downloaded content
76190 </summary>
76191 @@ -123826,7 +125180,7 @@ Domain allowed access
76192 </summary>
76193 </param>
76194 </interface>
76195 -<interface name="xdg_generic_user_home_dir_filetrans_downloads" lineno="958">
76196 +<interface name="xdg_generic_user_home_dir_filetrans_downloads" lineno="1102">
76197 <summary>
76198 Create objects in the user home dir with an automatic type transition to
76199 the xdg_downloads_t type.
76200 @@ -123847,7 +125201,7 @@ Name of the directory created
76201 </summary>
76202 </param>
76203 </interface>
76204 -<interface name="xdg_manage_downloads" lineno="976">
76205 +<interface name="xdg_manage_downloads" lineno="1120">
76206 <summary>
76207 Manage downloaded content
76208 </summary>
76209 @@ -123857,7 +125211,7 @@ Domain allowed access
76210 </summary>
76211 </param>
76212 </interface>
76213 -<interface name="xdg_relabel_downloads" lineno="997">
76214 +<interface name="xdg_relabel_downloads" lineno="1141">
76215 <summary>
76216 Allow relabeling the downloads resources
76217 </summary>
76218 @@ -123867,7 +125221,17 @@ Domain allowed access.
76219 </summary>
76220 </param>
76221 </interface>
76222 -<interface name="xdg_read_pictures" lineno="1019">
76223 +<interface name="xdg_watch_pictures_dirs" lineno="1163">
76224 +<summary>
76225 +Watch the xdg pictures home directories
76226 +</summary>
76227 +<param name="domain">
76228 +<summary>
76229 +Domain allowed access.
76230 +</summary>
76231 +</param>
76232 +</interface>
76233 +<interface name="xdg_read_pictures" lineno="1181">
76234 <summary>
76235 Read user pictures content
76236 </summary>
76237 @@ -123877,7 +125241,7 @@ Domain allowed access
76238 </summary>
76239 </param>
76240 </interface>
76241 -<interface name="xdg_generic_user_home_dir_filetrans_pictures" lineno="1053">
76242 +<interface name="xdg_generic_user_home_dir_filetrans_pictures" lineno="1215">
76243 <summary>
76244 Create objects in the user home dir with an automatic type transition to
76245 the xdg_pictures_t type.
76246 @@ -123898,7 +125262,7 @@ Name of the directory created
76247 </summary>
76248 </param>
76249 </interface>
76250 -<interface name="xdg_manage_pictures" lineno="1071">
76251 +<interface name="xdg_manage_pictures" lineno="1233">
76252 <summary>
76253 Manage pictures content
76254 </summary>
76255 @@ -123908,7 +125272,7 @@ Domain allowed access
76256 </summary>
76257 </param>
76258 </interface>
76259 -<interface name="xdg_relabel_pictures" lineno="1092">
76260 +<interface name="xdg_relabel_pictures" lineno="1254">
76261 <summary>
76262 Allow relabeling the pictures resources
76263 </summary>
76264 @@ -123918,7 +125282,17 @@ Domain allowed access.
76265 </summary>
76266 </param>
76267 </interface>
76268 -<interface name="xdg_read_music" lineno="1114">
76269 +<interface name="xdg_watch_music_dirs" lineno="1276">
76270 +<summary>
76271 +Watch the xdg music home directories
76272 +</summary>
76273 +<param name="domain">
76274 +<summary>
76275 +Domain allowed access.
76276 +</summary>
76277 +</param>
76278 +</interface>
76279 +<interface name="xdg_read_music" lineno="1294">
76280 <summary>
76281 Read user music content
76282 </summary>
76283 @@ -123928,7 +125302,7 @@ Domain allowed access
76284 </summary>
76285 </param>
76286 </interface>
76287 -<interface name="xdg_generic_user_home_dir_filetrans_music" lineno="1148">
76288 +<interface name="xdg_generic_user_home_dir_filetrans_music" lineno="1328">
76289 <summary>
76290 Create objects in the user home dir with an automatic type transition to
76291 the xdg_pictures_t type.
76292 @@ -123949,7 +125323,7 @@ Name of the directory created
76293 </summary>
76294 </param>
76295 </interface>
76296 -<interface name="xdg_manage_music" lineno="1166">
76297 +<interface name="xdg_manage_music" lineno="1346">
76298 <summary>
76299 Manage music content
76300 </summary>
76301 @@ -123959,7 +125333,7 @@ Domain allowed access
76302 </summary>
76303 </param>
76304 </interface>
76305 -<interface name="xdg_relabel_music" lineno="1187">
76306 +<interface name="xdg_relabel_music" lineno="1367">
76307 <summary>
76308 Allow relabeling the music resources
76309 </summary>
76310 @@ -123969,7 +125343,17 @@ Domain allowed access.
76311 </summary>
76312 </param>
76313 </interface>
76314 -<interface name="xdg_read_videos" lineno="1209">
76315 +<interface name="xdg_watch_videos_dirs" lineno="1389">
76316 +<summary>
76317 +Watch the xdg video content
76318 +</summary>
76319 +<param name="domain">
76320 +<summary>
76321 +Domain allowed access.
76322 +</summary>
76323 +</param>
76324 +</interface>
76325 +<interface name="xdg_read_videos" lineno="1407">
76326 <summary>
76327 Read user video content
76328 </summary>
76329 @@ -123979,7 +125363,7 @@ Domain allowed access
76330 </summary>
76331 </param>
76332 </interface>
76333 -<interface name="xdg_generic_user_home_dir_filetrans_videos" lineno="1243">
76334 +<interface name="xdg_generic_user_home_dir_filetrans_videos" lineno="1441">
76335 <summary>
76336 Create objects in the user home dir with an automatic type transition to
76337 the xdg_videos_t type.
76338 @@ -124000,7 +125384,7 @@ Name of the directory created
76339 </summary>
76340 </param>
76341 </interface>
76342 -<interface name="xdg_manage_videos" lineno="1261">
76343 +<interface name="xdg_manage_videos" lineno="1459">
76344 <summary>
76345 Manage video content
76346 </summary>
76347 @@ -124010,7 +125394,7 @@ Domain allowed access
76348 </summary>
76349 </param>
76350 </interface>
76351 -<interface name="xdg_relabel_videos" lineno="1282">
76352 +<interface name="xdg_relabel_videos" lineno="1480">
76353 <summary>
76354 Allow relabeling the videos resources
76355 </summary>
76356 @@ -124020,7 +125404,7 @@ Domain allowed access.
76357 </summary>
76358 </param>
76359 </interface>
76360 -<interface name="xdg_cache_home_content" lineno="1308">
76361 +<interface name="xdg_cache_home_content" lineno="1506">
76362 <summary>
76363 Mark the selected type as an xdg_cache_home_type
76364 </summary>
76365 @@ -124030,7 +125414,7 @@ Type to give the xdg_cache_home_type attribute to
76366 </summary>
76367 </param>
76368 </interface>
76369 -<interface name="xdg_config_home_content" lineno="1322">
76370 +<interface name="xdg_config_home_content" lineno="1520">
76371 <summary>
76372 Mark the selected type as an xdg_config_home_type
76373 </summary>
76374 @@ -124040,7 +125424,7 @@ Type to give the xdg_config_home_type attribute to
76375 </summary>
76376 </param>
76377 </interface>
76378 -<interface name="xdg_data_home_content" lineno="1336">
76379 +<interface name="xdg_data_home_content" lineno="1534">
76380 <summary>
76381 Mark the selected type as an xdg_data_home_type
76382 </summary>
76383 @@ -124050,7 +125434,7 @@ Type to give the xdg_data_home_type attribute to
76384 </summary>
76385 </param>
76386 </interface>
76387 -<interface name="xdg_read_cache_home_files" lineno="1350">
76388 +<interface name="xdg_read_cache_home_files" lineno="1548">
76389 <summary>
76390 Read the xdg cache home files
76391 </summary>
76392 @@ -124060,7 +125444,7 @@ Domain allowed access.
76393 </summary>
76394 </param>
76395 </interface>
76396 -<interface name="xdg_read_all_cache_home_files" lineno="1364">
76397 +<interface name="xdg_read_all_cache_home_files" lineno="1562">
76398 <summary>
76399 Read all xdg_cache_home_type files
76400 </summary>
76401 @@ -124070,7 +125454,7 @@ Domain allowed access.
76402 </summary>
76403 </param>
76404 </interface>
76405 -<interface name="xdg_cache_home_filetrans" lineno="1395">
76406 +<interface name="xdg_cache_home_filetrans" lineno="1593">
76407 <summary>
76408 Create objects in an xdg_cache_home directory
76409 with an automatic type transition to
76410 @@ -124097,7 +125481,7 @@ Name of the file or directory created
76411 </summary>
76412 </param>
76413 </interface>
76414 -<interface name="xdg_generic_user_home_dir_filetrans_cache_home" lineno="1420">
76415 +<interface name="xdg_generic_user_home_dir_filetrans_cache_home" lineno="1618">
76416 <summary>
76417 Create objects in the user home dir with an automatic type transition to
76418 the xdg_cache_home_t type.
76419 @@ -124118,7 +125502,7 @@ Name of the directory created
76420 </summary>
76421 </param>
76422 </interface>
76423 -<interface name="xdg_create_cache_home_dirs" lineno="1434">
76424 +<interface name="xdg_create_cache_home_dirs" lineno="1632">
76425 <summary>
76426 Create xdg cache home directories
76427 </summary>
76428 @@ -124128,7 +125512,7 @@ Domain allowed access
76429 </summary>
76430 </param>
76431 </interface>
76432 -<interface name="xdg_manage_cache_home" lineno="1448">
76433 +<interface name="xdg_manage_cache_home" lineno="1646">
76434 <summary>
76435 Manage the xdg cache home files
76436 </summary>
76437 @@ -124138,7 +125522,7 @@ Domain allowed access.
76438 </summary>
76439 </param>
76440 </interface>
76441 -<interface name="xdg_manage_all_cache_home" lineno="1462">
76442 +<interface name="xdg_manage_all_cache_home" lineno="1660">
76443 <summary>
76444 Manage all the xdg cache home files regardless of their specific type
76445 </summary>
76446 @@ -124148,7 +125532,7 @@ Domain allowed access.
76447 </summary>
76448 </param>
76449 </interface>
76450 -<interface name="xdg_relabel_cache_home" lineno="1476">
76451 +<interface name="xdg_relabel_cache_home" lineno="1674">
76452 <summary>
76453 Allow relabeling the xdg cache home files
76454 </summary>
76455 @@ -124158,7 +125542,7 @@ Domain allowed access.
76456 </summary>
76457 </param>
76458 </interface>
76459 -<interface name="xdg_relabel_all_cache_home" lineno="1490">
76460 +<interface name="xdg_relabel_all_cache_home" lineno="1688">
76461 <summary>
76462 Allow relabeling the xdg cache home files, regardless of their specific type
76463 </summary>
76464 @@ -124168,7 +125552,7 @@ Domain allowed access.
76465 </summary>
76466 </param>
76467 </interface>
76468 -<interface name="xdg_search_config_home_dirs" lineno="1504">
76469 +<interface name="xdg_search_config_home_dirs" lineno="1702">
76470 <summary>
76471 Search through the xdg config home directories
76472 </summary>
76473 @@ -124178,7 +125562,7 @@ Domain allowed access.
76474 </summary>
76475 </param>
76476 </interface>
76477 -<interface name="xdg_read_config_home_files" lineno="1518">
76478 +<interface name="xdg_read_config_home_files" lineno="1716">
76479 <summary>
76480 Read the xdg config home files
76481 </summary>
76482 @@ -124188,7 +125572,7 @@ Domain allowed access.
76483 </summary>
76484 </param>
76485 </interface>
76486 -<interface name="xdg_read_all_config_home_files" lineno="1532">
76487 +<interface name="xdg_read_all_config_home_files" lineno="1730">
76488 <summary>
76489 Read all xdg_config_home_type files
76490 </summary>
76491 @@ -124198,7 +125582,7 @@ Domain allowed access.
76492 </summary>
76493 </param>
76494 </interface>
76495 -<interface name="xdg_config_home_filetrans" lineno="1563">
76496 +<interface name="xdg_config_home_filetrans" lineno="1761">
76497 <summary>
76498 Create objects in an xdg_config_home directory
76499 with an automatic type transition to
76500 @@ -124225,7 +125609,7 @@ Name of the file or directory created
76501 </summary>
76502 </param>
76503 </interface>
76504 -<interface name="xdg_generic_user_home_dir_filetrans_config_home" lineno="1588">
76505 +<interface name="xdg_generic_user_home_dir_filetrans_config_home" lineno="1786">
76506 <summary>
76507 Create objects in the user home dir with an automatic type transition to
76508 the xdg_config_home_t type.
76509 @@ -124246,7 +125630,7 @@ Name of the directory created
76510 </summary>
76511 </param>
76512 </interface>
76513 -<interface name="xdg_create_config_home_dirs" lineno="1602">
76514 +<interface name="xdg_create_config_home_dirs" lineno="1800">
76515 <summary>
76516 Create xdg config home directories
76517 </summary>
76518 @@ -124256,7 +125640,7 @@ Domain allowed access
76519 </summary>
76520 </param>
76521 </interface>
76522 -<interface name="xdg_manage_config_home" lineno="1616">
76523 +<interface name="xdg_manage_config_home" lineno="1814">
76524 <summary>
76525 Manage the xdg config home files
76526 </summary>
76527 @@ -124266,7 +125650,7 @@ Domain allowed access.
76528 </summary>
76529 </param>
76530 </interface>
76531 -<interface name="xdg_manage_all_config_home" lineno="1630">
76532 +<interface name="xdg_manage_all_config_home" lineno="1828">
76533 <summary>
76534 Manage all the xdg config home files regardless of their specific type
76535 </summary>
76536 @@ -124276,7 +125660,7 @@ Domain allowed access.
76537 </summary>
76538 </param>
76539 </interface>
76540 -<interface name="xdg_relabel_config_home" lineno="1644">
76541 +<interface name="xdg_relabel_config_home" lineno="1842">
76542 <summary>
76543 Allow relabeling the xdg config home files
76544 </summary>
76545 @@ -124286,7 +125670,7 @@ Domain allowed access.
76546 </summary>
76547 </param>
76548 </interface>
76549 -<interface name="xdg_relabel_all_config_home" lineno="1658">
76550 +<interface name="xdg_relabel_all_config_home" lineno="1856">
76551 <summary>
76552 Allow relabeling the xdg config home files, regardless of their specific type
76553 </summary>
76554 @@ -124296,7 +125680,7 @@ Domain allowed access.
76555 </summary>
76556 </param>
76557 </interface>
76558 -<interface name="xdg_read_data_home_files" lineno="1672">
76559 +<interface name="xdg_read_data_home_files" lineno="1870">
76560 <summary>
76561 Read the xdg data home files
76562 </summary>
76563 @@ -124306,7 +125690,7 @@ Domain allowed access.
76564 </summary>
76565 </param>
76566 </interface>
76567 -<interface name="xdg_read_all_data_home_files" lineno="1686">
76568 +<interface name="xdg_read_all_data_home_files" lineno="1884">
76569 <summary>
76570 Read all xdg_data_home_type files
76571 </summary>
76572 @@ -124316,7 +125700,7 @@ Domain allowed access.
76573 </summary>
76574 </param>
76575 </interface>
76576 -<interface name="xdg_data_home_filetrans" lineno="1717">
76577 +<interface name="xdg_data_home_filetrans" lineno="1915">
76578 <summary>
76579 Create objects in an xdg_data_home directory
76580 with an automatic type transition to
76581 @@ -124343,7 +125727,7 @@ Optional name of the file or directory created
76582 </summary>
76583 </param>
76584 </interface>
76585 -<interface name="xdg_generic_user_home_dir_filetrans_data_home" lineno="1742">
76586 +<interface name="xdg_generic_user_home_dir_filetrans_data_home" lineno="1940">
76587 <summary>
76588 Create objects in the user home dir with an automatic type transition to
76589 the xdg_data_home_t type.
76590 @@ -124364,7 +125748,7 @@ Name of the directory created
76591 </summary>
76592 </param>
76593 </interface>
76594 -<interface name="xdg_create_data_home_dirs" lineno="1756">
76595 +<interface name="xdg_create_data_home_dirs" lineno="1954">
76596 <summary>
76597 Create xdg data home directories
76598 </summary>
76599 @@ -124374,7 +125758,7 @@ Domain allowed access
76600 </summary>
76601 </param>
76602 </interface>
76603 -<interface name="xdg_manage_data_home" lineno="1770">
76604 +<interface name="xdg_manage_data_home" lineno="1968">
76605 <summary>
76606 Manage the xdg data home files
76607 </summary>
76608 @@ -124384,7 +125768,7 @@ Domain allowed access.
76609 </summary>
76610 </param>
76611 </interface>
76612 -<interface name="xdg_manage_all_data_home" lineno="1784">
76613 +<interface name="xdg_manage_all_data_home" lineno="1982">
76614 <summary>
76615 Manage all the xdg data home files, regardless of their specific type
76616 </summary>
76617 @@ -124394,7 +125778,7 @@ Domain allowed access.
76618 </summary>
76619 </param>
76620 </interface>
76621 -<interface name="xdg_relabel_data_home" lineno="1798">
76622 +<interface name="xdg_relabel_data_home" lineno="1996">
76623 <summary>
76624 Allow relabeling the xdg data home files
76625 </summary>
76626 @@ -124404,7 +125788,7 @@ Domain allowed access.
76627 </summary>
76628 </param>
76629 </interface>
76630 -<interface name="xdg_relabel_all_data_home" lineno="1812">
76631 +<interface name="xdg_relabel_all_data_home" lineno="2010">
76632 <summary>
76633 Allow relabeling the xdg data home files, regardless of their type
76634 </summary>
76635 @@ -124414,7 +125798,7 @@ Domain allowed access.
76636 </summary>
76637 </param>
76638 </interface>
76639 -<interface name="xdg_read_downloads_home" lineno="1826">
76640 +<interface name="xdg_read_downloads_home" lineno="2024">
76641 <summary>
76642 Read downloaded content
76643 </summary>
76644 @@ -124424,7 +125808,7 @@ Domain allowed access
76645 </summary>
76646 </param>
76647 </interface>
76648 -<interface name="xdg_read_videos_home" lineno="1840">
76649 +<interface name="xdg_read_videos_home" lineno="2038">
76650 <summary>
76651 Read user video content
76652 </summary>
76653 @@ -124434,7 +125818,7 @@ Domain allowed access
76654 </summary>
76655 </param>
76656 </interface>
76657 -<interface name="xdg_read_pictures_home" lineno="1854">
76658 +<interface name="xdg_read_pictures_home" lineno="2052">
76659 <summary>
76660 Read user pictures content
76661 </summary>
76662 @@ -124444,7 +125828,7 @@ Domain allowed access
76663 </summary>
76664 </param>
76665 </interface>
76666 -<interface name="xdg_read_music_home" lineno="1868">
76667 +<interface name="xdg_read_music_home" lineno="2066">
76668 <summary>
76669 Read user music content
76670 </summary>
76671 @@ -124454,7 +125838,7 @@ Domain allowed access
76672 </summary>
76673 </param>
76674 </interface>
76675 -<interface name="xdg_create_downloads_home" lineno="1882">
76676 +<interface name="xdg_create_downloads_home" lineno="2080">
76677 <summary>
76678 Create downloaded content
76679 </summary>
76680 @@ -124464,7 +125848,7 @@ Domain allowed access
76681 </summary>
76682 </param>
76683 </interface>
76684 -<interface name="xdg_write_downloads_home" lineno="1896">
76685 +<interface name="xdg_write_downloads_home" lineno="2094">
76686 <summary>
76687 Write downloaded content
76688 </summary>
76689 @@ -124474,7 +125858,7 @@ Domain allowed access
76690 </summary>
76691 </param>
76692 </interface>
76693 -<interface name="xdg_manage_downloads_home" lineno="1910">
76694 +<interface name="xdg_manage_downloads_home" lineno="2108">
76695 <summary>
76696 Manage downloaded content
76697 </summary>
76698 @@ -124484,7 +125868,7 @@ Domain allowed access
76699 </summary>
76700 </param>
76701 </interface>
76702 -<interface name="xdg_manage_documents_home" lineno="1924">
76703 +<interface name="xdg_manage_documents_home" lineno="2122">
76704 <summary>
76705 Manage documents content
76706 </summary>
76707 @@ -124494,7 +125878,7 @@ Domain allowed access
76708 </summary>
76709 </param>
76710 </interface>
76711 -<interface name="xdg_manage_music_home" lineno="1938">
76712 +<interface name="xdg_manage_music_home" lineno="2136">
76713 <summary>
76714 Manage music content
76715 </summary>
76716 @@ -124504,7 +125888,7 @@ Domain allowed access
76717 </summary>
76718 </param>
76719 </interface>
76720 -<interface name="xdg_manage_pictures_home" lineno="1952">
76721 +<interface name="xdg_manage_pictures_home" lineno="2150">
76722 <summary>
76723 Manage pictures content
76724 </summary>
76725 @@ -124514,7 +125898,7 @@ Domain allowed access
76726 </summary>
76727 </param>
76728 </interface>
76729 -<interface name="xdg_manage_videos_home" lineno="1966">
76730 +<interface name="xdg_manage_videos_home" lineno="2164">
76731 <summary>
76732 Manage video content
76733 </summary>
76734 @@ -124622,7 +126006,7 @@ Domain allowed access.
76735 </interface>
76736 <interface name="xen_read_xenstored_pid_files" lineno="189">
76737 <summary>
76738 -Read xenstored pid files.
76739 +Read xenstored pid files. (Deprecated)
76740 </summary>
76741 <param name="domain">
76742 <summary>
76743 @@ -124630,7 +126014,17 @@ Domain allowed access.
76744 </summary>
76745 </param>
76746 </interface>
76747 -<interface name="xen_dontaudit_rw_unix_stream_sockets" lineno="209">
76748 +<interface name="xen_read_xenstored_runtime_files" lineno="204">
76749 +<summary>
76750 +Read xenstored runtime files.
76751 +</summary>
76752 +<param name="domain">
76753 +<summary>
76754 +Domain allowed access.
76755 +</summary>
76756 +</param>
76757 +</interface>
76758 +<interface name="xen_dontaudit_rw_unix_stream_sockets" lineno="224">
76759 <summary>
76760 Do not audit attempts to read and write
76761 Xen unix domain stream sockets.
76762 @@ -124641,7 +126035,7 @@ Domain to not audit.
76763 </summary>
76764 </param>
76765 </interface>
76766 -<interface name="xen_stream_connect_xenstore" lineno="228">
76767 +<interface name="xen_stream_connect_xenstore" lineno="243">
76768 <summary>
76769 Connect to xenstored with a unix
76770 domain stream socket.
76771 @@ -124652,7 +126046,7 @@ Domain allowed access.
76772 </summary>
76773 </param>
76774 </interface>
76775 -<interface name="xen_stream_connect" lineno="248">
76776 +<interface name="xen_stream_connect" lineno="263">
76777 <summary>
76778 Connect to xend with a unix
76779 domain stream socket.
76780 @@ -124663,7 +126057,27 @@ Domain allowed access.
76781 </summary>
76782 </param>
76783 </interface>
76784 -<interface name="xen_pid_filetrans" lineno="280">
76785 +<interface name="xen_pid_filetrans" lineno="295">
76786 +<summary>
76787 +Create in a xend_runtime_t directory (Deprecated)
76788 +</summary>
76789 +<param name="domain">
76790 +<summary>
76791 +Domain allowed access.
76792 +</summary>
76793 +</param>
76794 +<param name="private type">
76795 +<summary>
76796 +The type of the object to be created.
76797 +</summary>
76798 +</param>
76799 +<param name="object">
76800 +<summary>
76801 +The object class of the object being created.
76802 +</summary>
76803 +</param>
76804 +</interface>
76805 +<interface name="xen_runtime_filetrans" lineno="320">
76806 <summary>
76807 Create in a xend_runtime_t directory
76808 </summary>
76809 @@ -124683,7 +126097,7 @@ The object class of the object being created.
76810 </summary>
76811 </param>
76812 </interface>
76813 -<interface name="xen_domtrans_xm" lineno="298">
76814 +<interface name="xen_domtrans_xm" lineno="338">
76815 <summary>
76816 Execute a domain transition to run xm.
76817 </summary>
76818 @@ -124693,7 +126107,7 @@ Domain allowed to transition.
76819 </summary>
76820 </param>
76821 </interface>
76822 -<interface name="xen_stream_connect_xm" lineno="318">
76823 +<interface name="xen_stream_connect_xm" lineno="358">
76824 <summary>
76825 Connect to xm with a unix
76826 domain stream socket.
76827 @@ -124766,6 +126180,16 @@ Allow unconfined executables to make their stack executable. This should never,
76828 </p>
76829 </desc>
76830 </tunable>
76831 +<tunable name="allow_raw_memory_access" dftval="false">
76832 +<desc>
76833 +<p>
76834 +Allow raw memory device (/dev/mem, /dev/kmem, /dev/mergemem,
76835 +dev/oldmem, /dev/port) access for confined executables. This is
76836 +extremely dangerous as it can bypass the SELinux protections, and
76837 +should only be used by trusted domains.
76838 +</p>
76839 +</desc>
76840 +</tunable>
76841 <tunable name="allow_polyinstantiation" dftval="false">
76842 <desc>
76843 <p>
76844
76845 diff --git a/policy/booleans.conf b/policy/booleans.conf
76846 index 1d130d20..4b1ccd81 100644
76847 --- a/policy/booleans.conf
76848 +++ b/policy/booleans.conf
76849 @@ -118,6 +118,22 @@ puppet_manage_all_files = false
76850 #
76851 rkhunter_connect_http = false
76852
76853 +#
76854 +# Determine whether all sudo domains
76855 +# can connect to TCP HTTP ports. This
76856 +# is needed if an additional authentication
76857 +# mechanism via an HTTP server is
76858 +# required for users to use sudo.
76859 +#
76860 +sudo_all_tcp_connect_http_port = false
76861 +
76862 +#
76863 +# Determine whether authorized users can control the daemon,
76864 +# which requires usbguard-daemon to be able modify its rules in
76865 +# /etc/usbguard.
76866 +#
76867 +usbguard_user_modify_rule_files = false
76868 +
76869 #
76870 # Determine whether attempts by
76871 # vbetool to mmap low regions should
76872 @@ -147,6 +163,16 @@ allow_httpd_awstats_script_anon_write = false
76873 #
76874 cdrecord_read_content = false
76875
76876 +#
76877 +# Allow chromium to access direct rendering interface
76878 +#
76879 +#
76880 +#
76881 +#
76882 +# Needed for good performance on complex sites
76883 +#
76884 +chromium_dri = true
76885 +
76886 #
76887 # Allow chromium to read system information
76888 #
76889 @@ -745,6 +771,12 @@ dbadm_read_user_files = false
76890 #
76891 allow_ptrace = false
76892
76893 +#
76894 +# Allow sysadm to read/write to fifo files inherited from
76895 +# a domain allowed to change role.
76896 +#
76897 +sysadm_allow_rw_inherited_fifo = false
76898 +
76899 #
76900 # Determine whether webadm can
76901 # manage generic user files.
76902 @@ -878,7 +910,7 @@ httpd_can_sendmail = false
76903 httpd_dbus_avahi = false
76904
76905 #
76906 -# Determine wether httpd can use support.
76907 +# Determine whether httpd can use support.
76908 #
76909 httpd_enable_cgi = false
76910
76911 @@ -1163,6 +1195,13 @@ allow_cvs_read_shadow = false
76912 #
76913 allow_httpd_cvs_script_anon_write = false
76914
76915 +#
76916 +# Allow dbus-daemon system bus to access /dev/net/tun
76917 +# which is needed to pass tun/tap device file descriptors
76918 +# over D-Bus. This is needed by openvpn3-linux.
76919 +#
76920 +dbus_pass_tuntap_fd = false
76921 +
76922 #
76923 # Determine whether DHCP daemon
76924 # can use LDAP backends.
76925 @@ -1464,6 +1503,11 @@ openvpn_enable_homedirs = false
76926 #
76927 openvpn_can_network_connect = false
76928
76929 +#
76930 +# Allow pacemaker to start/stop services
76931 +#
76932 +pacemaker_startstop_all_services = false
76933 +
76934 #
76935 # Determine whether Polipo system
76936 # daemon can access CIFS file systems.
76937 @@ -1744,6 +1788,12 @@ spamassassin_can_network = false
76938 #
76939 spamd_enable_home_dirs = false
76940
76941 +#
76942 +# Determine whether extra rules should
76943 +# be enabled to support rspamd.
76944 +#
76945 +rspamd_spamd = false
76946 +
76947 #
76948 # Determine whether squid can
76949 # connect to all TCP ports.
76950 @@ -1867,12 +1917,10 @@ virt_use_xserver = false
76951 virt_use_vfio = false
76952
76953 #
76954 -# Determine whether the script domain can
76955 -# modify public files used for public file
76956 -# transfer services. Directories/Files must
76957 -# be labeled public_content_rw_t.
76958 +# Determine whether confined virtual guests
76959 +# can use input devices via evdev pass through.
76960 #
76961 -allow_httpd_w3c_validator_script_anon_write = false
76962 +virt_use_evdev = false
76963
76964 #
76965 # Allows clients to write to the X server shared
76966 @@ -1896,6 +1944,11 @@ xserver_gnome_xdm = false
76967 #
76968 xserver_object_manager = false
76969
76970 +#
76971 +# Allow DRI access
76972 +#
76973 +xserver_allow_dri = false
76974 +
76975 #
76976 # Determine whether zabbix can
76977 # connect to all TCP ports
76978 @@ -1938,6 +1991,12 @@ racoon_read_shadow = false
76979 #
76980 allow_mount_anyfile = false
76981
76982 +#
76983 +# Determine whether DHCP client
76984 +# can manage samba
76985 +#
76986 +dhcpc_manage_samba = false
76987 +
76988 #
76989 # Enable support for systemd-tmpfiles to manage all non-security files.
76990 #
76991 @@ -1956,6 +2015,18 @@ systemd_nspawn_labeled_namespace = false
76992 #
76993 systemd_logind_get_bootloader = false
76994
76995 +#
76996 +# Allow systemd-socket-proxyd to bind any port instead of one labelled
76997 +# with systemd_socket_proxyd_port_t.
76998 +#
76999 +systemd_socket_proxyd_bind_any = false
77000 +
77001 +#
77002 +# Allow systemd-socket-proxyd to connect to any port instead of
77003 +# labelled ones.
77004 +#
77005 +systemd_socket_proxyd_connect_any = false
77006 +
77007 #
77008 # Determine whether tmpfiles can manage
77009 # all non-security sensitive resources.
77010 @@ -2052,6 +2123,14 @@ allow_execmod = false
77011 #
77012 allow_execstack = false
77013
77014 +#
77015 +# Allow raw memory device (/dev/mem, /dev/kmem, /dev/mergemem,
77016 +# dev/oldmem, /dev/port) access for confined executables. This is
77017 +# extremely dangerous as it can bypass the SELinux protections, and
77018 +# should only be used by trusted domains.
77019 +#
77020 +allow_raw_memory_access = false
77021 +
77022 #
77023 # Enable polyinstantiated directory support.
77024 #
77025
77026 diff --git a/policy/modules.conf b/policy/modules.conf
77027 index 2fdd98bc..205c52fe 100644
77028 --- a/policy/modules.conf
77029 +++ b/policy/modules.conf
77030 @@ -291,13 +291,6 @@ hwloc = module
77031 #
77032 kdump = module
77033
77034 -# Layer: admin
77035 -# Module: kdumpgui
77036 -#
77037 -# System-config-kdump GUI.
77038 -#
77039 -kdumpgui = module
77040 -
77041 # Layer: admin
77042 # Module: kismet
77043 #
77044 @@ -305,13 +298,6 @@ kdumpgui = module
77045 #
77046 kismet = module
77047
77048 -# Layer: admin
77049 -# Module: kudzu
77050 -#
77051 -# Hardware detection and configuration tools.
77052 -#
77053 -kudzu = module
77054 -
77055 # Layer: admin
77056 # Module: logrotate
77057 #
77058 @@ -389,13 +375,6 @@ puppet = module
77059 #
77060 quota = module
77061
77062 -# Layer: admin
77063 -# Module: readahead
77064 -#
77065 -# Read files into page cache for improved performance.
77066 -#
77067 -readahead = module
77068 -
77069 # Layer: admin
77070 # Module: rkhunter
77071 #
77072 @@ -424,13 +403,6 @@ samhain = module
77073 #
77074 sblim = module
77075
77076 -# Layer: admin
77077 -# Module: sectoolm
77078 -#
77079 -# Sectool security audit tool.
77080 -#
77081 -sectoolm = module
77082 -
77083 # Layer: admin
77084 # Module: shorewall
77085 #
77086 @@ -445,13 +417,6 @@ shorewall = module
77087 #
77088 shutdown = module
77089
77090 -# Layer: admin
77091 -# Module: smoltclient
77092 -#
77093 -# The Fedora hardware profiler client.
77094 -#
77095 -smoltclient = module
77096 -
77097 # Layer: admin
77098 # Module: sosreport
77099 #
77100 @@ -515,6 +480,14 @@ tzdata = module
77101 #
77102 updfstab = module
77103
77104 +# Layer: admin
77105 +# Module: usbguard
77106 +#
77107 +# Usbguard enforces the USB device authorization policy for all USB
77108 +# devices.
77109 +#
77110 +usbguard = module
77111 +
77112 # Layer: admin
77113 # Module: usbmodules
77114 #
77115 @@ -543,13 +516,6 @@ vbetool = module
77116 #
77117 vpn = module
77118
77119 -# Layer: apps
77120 -# Module: ada
77121 -#
77122 -# GNAT Ada95 compiler.
77123 -#
77124 -ada = module
77125 -
77126 # Layer: apps
77127 # Module: awstats
77128 #
77129 @@ -599,13 +565,6 @@ cryfs = module
77130 #
77131 evolution = module
77132
77133 -# Layer: apps
77134 -# Module: firewallgui
77135 -#
77136 -# system-config-firewall dbus system service.
77137 -#
77138 -firewallgui = module
77139 -
77140 # Layer: apps
77141 # Module: games
77142 #
77143 @@ -613,13 +572,6 @@ firewallgui = module
77144 #
77145 games = module
77146
77147 -# Layer: apps
77148 -# Module: gift
77149 -#
77150 -# Peer to peer file sharing tool.
77151 -#
77152 -gift = module
77153 -
77154 # Layer: apps
77155 # Module: gitosis
77156 #
77157 @@ -732,20 +684,6 @@ mplayer = module
77158 #
77159 openoffice = module
77160
77161 -# Layer: apps
77162 -# Module: podsleuth
77163 -#
77164 -# Podsleuth is a tool to get information about an Apple (TM) iPod (TM).
77165 -#
77166 -podsleuth = module
77167 -
77168 -# Layer: apps
77169 -# Module: ptchown
77170 -#
77171 -# helper function for grantpt(3), changes ownship and permissions of pseudotty.
77172 -#
77173 -ptchown = module
77174 -
77175 # Layer: apps
77176 # Module: pulseaudio
77177 #
77178 @@ -767,13 +705,6 @@ qemu = module
77179 #
77180 rssh = module
77181
77182 -# Layer: apps
77183 -# Module: sambagui
77184 -#
77185 -# system-config-samba dbus service.
77186 -#
77187 -sambagui = module
77188 -
77189 # Layer: apps
77190 # Module: screen
77191 #
77192 @@ -900,13 +831,6 @@ wm = module
77193 #
77194 xscreensaver = module
77195
77196 -# Layer: apps
77197 -# Module: yam
77198 -#
77199 -# Yum/Apt Mirroring.
77200 -#
77201 -yam = module
77202 -
77203 # Layer: contrib
77204 # Module: android
77205 #
77206 @@ -1113,7 +1037,7 @@ dbadm = module
77207 # Layer: roles
77208 # Module: guest
77209 #
77210 -# Least privledge terminal user role.
77211 +# Least privilege terminal user role.
77212 #
77213 guest = module
77214
77215 @@ -1162,7 +1086,7 @@ webadm = module
77216 # Layer: roles
77217 # Module: xguest
77218 #
77219 -# Least privledge xwindows user role.
77220 +# Least privilege xwindows user role.
77221 #
77222 xguest = module
77223
77224 @@ -1229,6 +1153,13 @@ apache = module
77225 #
77226 apcupsd = module
77227
77228 +# Layer: services
77229 +# Module: aptcacher
77230 +#
77231 +# apt-cacher, cache for Debian APT repositories.
77232 +#
77233 +aptcacher = module
77234 +
77235 # Layer: services
77236 # Module: arpwatch
77237 #
77238 @@ -1327,6 +1258,13 @@ canna = module
77239 #
77240 ccs = module
77241
77242 +# Layer: services
77243 +# Module: certbot
77244 +#
77245 +# SSL certificate requesting tool certbot AKA letsencrypt.
77246 +#
77247 +certbot = module
77248 +
77249 # Layer: services
77250 # Module: certmaster
77251 #
77252 @@ -1432,13 +1370,6 @@ comsat = module
77253 #
77254 condor = module
77255
77256 -# Layer: services
77257 -# Module: consolekit
77258 -#
77259 -# Framework for facilitating multiple user sessions on desktops.
77260 -#
77261 -consolekit = module
77262 -
77263 # Layer: services
77264 # Module: consolesetup
77265 #
77266 @@ -1614,13 +1545,6 @@ dkim = module
77267 #
77268 dnsmasq = module
77269
77270 -# Layer: services
77271 -# Module: dnssectrigger
77272 -#
77273 -# Enables DNSSEC protection for DNS traffic.
77274 -#
77275 -dnssectrigger = module
77276 -
77277 # Layer: services
77278 # Module: dovecot
77279 #
77280 @@ -1782,13 +1706,6 @@ gssproxy = module
77281 #
77282 hadoop = module
77283
77284 -# Layer: services
77285 -# Module: hal
77286 -#
77287 -# Hardware abstraction layer.
77288 -#
77289 -hal = module
77290 -
77291 # Layer: services
77292 # Module: hddtemp
77293 #
77294 @@ -1915,13 +1832,6 @@ kerberos = module
77295 #
77296 kerneloops = module
77297
77298 -# Layer: services
77299 -# Module: keyboardd
77300 -#
77301 -# Xorg.conf keyboard layout callout.
77302 -#
77303 -keyboardd = module
77304 -
77305 # Layer: services
77306 # Module: keystone
77307 #
77308 @@ -2027,6 +1937,13 @@ mediawiki = module
77309 #
77310 memcached = module
77311
77312 +# Layer: services
77313 +# Module: memlockd
77314 +#
77315 +# memory lock daemon, keeps important files in RAM.
77316 +#
77317 +memlockd = module
77318 +
77319 # Layer: services
77320 # Module: milter
77321 #
77322 @@ -2552,13 +2469,6 @@ rgmanager = module
77323 #
77324 rhcs = module
77325
77326 -# Layer: services
77327 -# Module: rhgb
77328 -#
77329 -# Red Hat Graphical Boot.
77330 -#
77331 -rhgb = module
77332 -
77333 # Layer: services
77334 # Module: rhsmcertd
77335 #
77336 @@ -2587,13 +2497,6 @@ rlogin = module
77337 #
77338 rngd = module
77339
77340 -# Layer: services
77341 -# Module: roundup
77342 -#
77343 -# Roundup Issue Tracking System.
77344 -#
77345 -roundup = module
77346 -
77347 # Layer: services
77348 # Module: rpc
77349 #
77350 @@ -2681,7 +2584,7 @@ setroubleshoot = module
77351 # Layer: services
77352 # Module: shibboleth
77353 #
77354 -# Shibboleth authentication deamon
77355 +# Shibboleth authentication daemon
77356 #
77357 shibboleth = module
77358
77359 @@ -2748,13 +2651,6 @@ soundserver = module
77360 #
77361 spamassassin = module
77362
77363 -# Layer: services
77364 -# Module: speedtouch
77365 -#
77366 -# Alcatel speedtouch USB ADSL modem
77367 -#
77368 -speedtouch = module
77369 -
77370 # Layer: services
77371 # Module: squid
77372 #
77373 @@ -2965,13 +2861,6 @@ virt = module
77374 #
77375 vnstatd = module
77376
77377 -# Layer: services
77378 -# Module: w3c
77379 -#
77380 -# W3C Markup Validator.
77381 -#
77382 -w3c = module
77383 -
77384 # Layer: services
77385 # Module: watchdog
77386 #
77387 @@ -3000,13 +2889,6 @@ wireguard = module
77388 #
77389 xfs = module
77390
77391 -# Layer: services
77392 -# Module: xprint
77393 -#
77394 -# A X11-based print system and API.
77395 -#
77396 -xprint = module
77397 -
77398 # Layer: services
77399 # Module: xserver
77400 #
77401 @@ -3091,14 +2973,6 @@ getty = module
77402 #
77403 hostname = module
77404
77405 -# Layer: system
77406 -# Module: hotplug
77407 -#
77408 -# Policy for hotplug system, for supporting the
77409 -# connection and disconnection of devices at runtime.
77410 -#
77411 -hotplug = module
77412 -
77413 # Layer: system
77414 # Module: init
77415 #
77416 @@ -3183,13 +3057,6 @@ mount = module
77417 #
77418 netlabel = module
77419
77420 -# Layer: system
77421 -# Module: pcmcia
77422 -#
77423 -# PCMCIA card management services.
77424 -#
77425 -pcmcia = module
77426 -
77427 # Layer: system
77428 # Module: raid
77429 #
77430
77431 diff --git a/policy/modules/kernel/corenetwork.if b/policy/modules/kernel/corenetwork.if
77432 index 368ad3b7..086f0fe8 100644
77433 --- a/policy/modules/kernel/corenetwork.if
77434 +++ b/policy/modules/kernel/corenetwork.if
77435 @@ -29333,427 +29333,6 @@ interface(`corenet_relabelto_gds_db_server_packets',`
77436
77437
77438
77439 -########################################
77440 -## <summary>
77441 -## Send and receive TCP traffic on the giftd port.
77442 -## </summary>
77443 -## <param name="domain">
77444 -## <summary>
77445 -## Domain allowed access.
77446 -## </summary>
77447 -## </param>
77448 -## <infoflow type="both" weight="10"/>
77449 -#
77450 -interface(`corenet_tcp_sendrecv_giftd_port',`
77451 - refpolicywarn(`$0() has been deprecated, please remove.')
77452 -')
77453 -
77454 -########################################
77455 -## <summary>
77456 -## Send UDP traffic on the giftd port.
77457 -## </summary>
77458 -## <param name="domain">
77459 -## <summary>
77460 -## Domain allowed access.
77461 -## </summary>
77462 -## </param>
77463 -## <infoflow type="write" weight="10"/>
77464 -#
77465 -interface(`corenet_udp_send_giftd_port',`
77466 - refpolicywarn(`$0() has been deprecated, please remove.')
77467 -')
77468 -
77469 -########################################
77470 -## <summary>
77471 -## Do not audit attempts to send UDP traffic on the giftd port.
77472 -## </summary>
77473 -## <param name="domain">
77474 -## <summary>
77475 -## Domain to not audit.
77476 -## </summary>
77477 -## </param>
77478 -## <infoflow type="none"/>
77479 -#
77480 -interface(`corenet_dontaudit_udp_send_giftd_port',`
77481 - refpolicywarn(`$0() has been deprecated, please remove.')
77482 -')
77483 -
77484 -########################################
77485 -## <summary>
77486 -## Receive UDP traffic on the giftd port.
77487 -## </summary>
77488 -## <param name="domain">
77489 -## <summary>
77490 -## Domain allowed access.
77491 -## </summary>
77492 -## </param>
77493 -## <infoflow type="read" weight="10"/>
77494 -#
77495 -interface(`corenet_udp_receive_giftd_port',`
77496 - refpolicywarn(`$0() has been deprecated, please remove.')
77497 -')
77498 -
77499 -########################################
77500 -## <summary>
77501 -## Do not audit attempts to receive UDP traffic on the giftd port.
77502 -## </summary>
77503 -## <param name="domain">
77504 -## <summary>
77505 -## Domain to not audit.
77506 -## </summary>
77507 -## </param>
77508 -## <infoflow type="none"/>
77509 -#
77510 -interface(`corenet_dontaudit_udp_receive_giftd_port',`
77511 - refpolicywarn(`$0() has been deprecated, please remove.')
77512 -')
77513 -
77514 -########################################
77515 -## <summary>
77516 -## Send and receive UDP traffic on the giftd port.
77517 -## </summary>
77518 -## <param name="domain">
77519 -## <summary>
77520 -## Domain allowed access.
77521 -## </summary>
77522 -## </param>
77523 -## <infoflow type="both" weight="10"/>
77524 -#
77525 -interface(`corenet_udp_sendrecv_giftd_port',`
77526 - refpolicywarn(`$0() has been deprecated, please remove.')
77527 -')
77528 -
77529 -########################################
77530 -## <summary>
77531 -## Do not audit attempts to send and receive
77532 -## UDP traffic on the giftd port.
77533 -## </summary>
77534 -## <param name="domain">
77535 -## <summary>
77536 -## Domain to not audit.
77537 -## </summary>
77538 -## </param>
77539 -## <infoflow type="none"/>
77540 -#
77541 -interface(`corenet_dontaudit_udp_sendrecv_giftd_port',`
77542 - refpolicywarn(`$0() has been deprecated, please remove.')
77543 -')
77544 -
77545 -########################################
77546 -## <summary>
77547 -## Bind TCP sockets to the giftd port.
77548 -## </summary>
77549 -## <param name="domain">
77550 -## <summary>
77551 -## Domain allowed access.
77552 -## </summary>
77553 -## </param>
77554 -## <infoflow type="none"/>
77555 -#
77556 -interface(`corenet_tcp_bind_giftd_port',`
77557 - gen_require(`
77558 - type giftd_port_t;
77559 - ')
77560 -
77561 - allow $1 giftd_port_t:tcp_socket name_bind;
77562 -
77563 -')
77564 -
77565 -########################################
77566 -## <summary>
77567 -## Bind UDP sockets to the giftd port.
77568 -## </summary>
77569 -## <param name="domain">
77570 -## <summary>
77571 -## Domain allowed access.
77572 -## </summary>
77573 -## </param>
77574 -## <infoflow type="none"/>
77575 -#
77576 -interface(`corenet_udp_bind_giftd_port',`
77577 - gen_require(`
77578 - type giftd_port_t;
77579 - ')
77580 -
77581 - allow $1 giftd_port_t:udp_socket name_bind;
77582 -
77583 -')
77584 -
77585 -########################################
77586 -## <summary>
77587 -## Make a TCP connection to the giftd port.
77588 -## </summary>
77589 -## <param name="domain">
77590 -## <summary>
77591 -## Domain allowed access.
77592 -## </summary>
77593 -## </param>
77594 -#
77595 -interface(`corenet_tcp_connect_giftd_port',`
77596 - gen_require(`
77597 - type giftd_port_t;
77598 - ')
77599 -
77600 - allow $1 giftd_port_t:tcp_socket name_connect;
77601 -')
77602 -
77603 -
77604 -########################################
77605 -## <summary>
77606 -## Send giftd_client packets.
77607 -## </summary>
77608 -## <param name="domain">
77609 -## <summary>
77610 -## Domain allowed access.
77611 -## </summary>
77612 -## </param>
77613 -## <infoflow type="write" weight="10"/>
77614 -#
77615 -interface(`corenet_send_giftd_client_packets',`
77616 - gen_require(`
77617 - type giftd_client_packet_t;
77618 - ')
77619 -
77620 - allow $1 giftd_client_packet_t:packet send;
77621 -')
77622 -
77623 -########################################
77624 -## <summary>
77625 -## Do not audit attempts to send giftd_client packets.
77626 -## </summary>
77627 -## <param name="domain">
77628 -## <summary>
77629 -## Domain to not audit.
77630 -## </summary>
77631 -## </param>
77632 -## <infoflow type="none"/>
77633 -#
77634 -interface(`corenet_dontaudit_send_giftd_client_packets',`
77635 - gen_require(`
77636 - type giftd_client_packet_t;
77637 - ')
77638 -
77639 - dontaudit $1 giftd_client_packet_t:packet send;
77640 -')
77641 -
77642 -########################################
77643 -## <summary>
77644 -## Receive giftd_client packets.
77645 -## </summary>
77646 -## <param name="domain">
77647 -## <summary>
77648 -## Domain allowed access.
77649 -## </summary>
77650 -## </param>
77651 -## <infoflow type="read" weight="10"/>
77652 -#
77653 -interface(`corenet_receive_giftd_client_packets',`
77654 - gen_require(`
77655 - type giftd_client_packet_t;
77656 - ')
77657 -
77658 - allow $1 giftd_client_packet_t:packet recv;
77659 -')
77660 -
77661 -########################################
77662 -## <summary>
77663 -## Do not audit attempts to receive giftd_client packets.
77664 -## </summary>
77665 -## <param name="domain">
77666 -## <summary>
77667 -## Domain allowed access.
77668 -## </summary>
77669 -## </param>
77670 -## <infoflow type="none"/>
77671 -#
77672 -interface(`corenet_dontaudit_receive_giftd_client_packets',`
77673 - gen_require(`
77674 - type giftd_client_packet_t;
77675 - ')
77676 -
77677 - dontaudit $1 giftd_client_packet_t:packet recv;
77678 -')
77679 -
77680 -########################################
77681 -## <summary>
77682 -## Send and receive giftd_client packets.
77683 -## </summary>
77684 -## <param name="domain">
77685 -## <summary>
77686 -## Domain allowed access.
77687 -## </summary>
77688 -## </param>
77689 -## <infoflow type="both" weight="10"/>
77690 -#
77691 -interface(`corenet_sendrecv_giftd_client_packets',`
77692 - corenet_send_giftd_client_packets($1)
77693 - corenet_receive_giftd_client_packets($1)
77694 -')
77695 -
77696 -########################################
77697 -## <summary>
77698 -## Do not audit attempts to send and receive giftd_client packets.
77699 -## </summary>
77700 -## <param name="domain">
77701 -## <summary>
77702 -## Domain to not audit.
77703 -## </summary>
77704 -## </param>
77705 -## <infoflow type="none"/>
77706 -#
77707 -interface(`corenet_dontaudit_sendrecv_giftd_client_packets',`
77708 - corenet_dontaudit_send_giftd_client_packets($1)
77709 - corenet_dontaudit_receive_giftd_client_packets($1)
77710 -')
77711 -
77712 -########################################
77713 -## <summary>
77714 -## Relabel packets to giftd_client the packet type.
77715 -## </summary>
77716 -## <param name="domain">
77717 -## <summary>
77718 -## Domain allowed access.
77719 -## </summary>
77720 -## </param>
77721 -#
77722 -interface(`corenet_relabelto_giftd_client_packets',`
77723 - gen_require(`
77724 - type giftd_client_packet_t;
77725 - ')
77726 -
77727 - allow $1 giftd_client_packet_t:packet relabelto;
77728 -')
77729 -
77730 -
77731 -########################################
77732 -## <summary>
77733 -## Send giftd_server packets.
77734 -## </summary>
77735 -## <param name="domain">
77736 -## <summary>
77737 -## Domain allowed access.
77738 -## </summary>
77739 -## </param>
77740 -## <infoflow type="write" weight="10"/>
77741 -#
77742 -interface(`corenet_send_giftd_server_packets',`
77743 - gen_require(`
77744 - type giftd_server_packet_t;
77745 - ')
77746 -
77747 - allow $1 giftd_server_packet_t:packet send;
77748 -')
77749 -
77750 -########################################
77751 -## <summary>
77752 -## Do not audit attempts to send giftd_server packets.
77753 -## </summary>
77754 -## <param name="domain">
77755 -## <summary>
77756 -## Domain to not audit.
77757 -## </summary>
77758 -## </param>
77759 -## <infoflow type="none"/>
77760 -#
77761 -interface(`corenet_dontaudit_send_giftd_server_packets',`
77762 - gen_require(`
77763 - type giftd_server_packet_t;
77764 - ')
77765 -
77766 - dontaudit $1 giftd_server_packet_t:packet send;
77767 -')
77768 -
77769 -########################################
77770 -## <summary>
77771 -## Receive giftd_server packets.
77772 -## </summary>
77773 -## <param name="domain">
77774 -## <summary>
77775 -## Domain allowed access.
77776 -## </summary>
77777 -## </param>
77778 -## <infoflow type="read" weight="10"/>
77779 -#
77780 -interface(`corenet_receive_giftd_server_packets',`
77781 - gen_require(`
77782 - type giftd_server_packet_t;
77783 - ')
77784 -
77785 - allow $1 giftd_server_packet_t:packet recv;
77786 -')
77787 -
77788 -########################################
77789 -## <summary>
77790 -## Do not audit attempts to receive giftd_server packets.
77791 -## </summary>
77792 -## <param name="domain">
77793 -## <summary>
77794 -## Domain allowed access.
77795 -## </summary>
77796 -## </param>
77797 -## <infoflow type="none"/>
77798 -#
77799 -interface(`corenet_dontaudit_receive_giftd_server_packets',`
77800 - gen_require(`
77801 - type giftd_server_packet_t;
77802 - ')
77803 -
77804 - dontaudit $1 giftd_server_packet_t:packet recv;
77805 -')
77806 -
77807 -########################################
77808 -## <summary>
77809 -## Send and receive giftd_server packets.
77810 -## </summary>
77811 -## <param name="domain">
77812 -## <summary>
77813 -## Domain allowed access.
77814 -## </summary>
77815 -## </param>
77816 -## <infoflow type="both" weight="10"/>
77817 -#
77818 -interface(`corenet_sendrecv_giftd_server_packets',`
77819 - corenet_send_giftd_server_packets($1)
77820 - corenet_receive_giftd_server_packets($1)
77821 -')
77822 -
77823 -########################################
77824 -## <summary>
77825 -## Do not audit attempts to send and receive giftd_server packets.
77826 -## </summary>
77827 -## <param name="domain">
77828 -## <summary>
77829 -## Domain to not audit.
77830 -## </summary>
77831 -## </param>
77832 -## <infoflow type="none"/>
77833 -#
77834 -interface(`corenet_dontaudit_sendrecv_giftd_server_packets',`
77835 - corenet_dontaudit_send_giftd_server_packets($1)
77836 - corenet_dontaudit_receive_giftd_server_packets($1)
77837 -')
77838 -
77839 -########################################
77840 -## <summary>
77841 -## Relabel packets to giftd_server the packet type.
77842 -## </summary>
77843 -## <param name="domain">
77844 -## <summary>
77845 -## Domain allowed access.
77846 -## </summary>
77847 -## </param>
77848 -#
77849 -interface(`corenet_relabelto_giftd_server_packets',`
77850 - gen_require(`
77851 - type giftd_server_packet_t;
77852 - ')
77853 -
77854 - allow $1 giftd_server_packet_t:packet relabelto;
77855 -')
77856 -
77857 -
77858 -
77859 -
77860 ########################################
77861 ## <summary>
77862 ## Send and receive TCP traffic on the git port.
77863
77864 diff --git a/policy/modules/kernel/corenetwork.te b/policy/modules/kernel/corenetwork.te
77865 index 030df0c0..1d0367c8 100644
77866 --- a/policy/modules/kernel/corenetwork.te
77867 +++ b/policy/modules/kernel/corenetwork.te
77868 @@ -2,7 +2,7 @@
77869 # This is a generated file! Instead of modifying this file, the
77870 # corenetwork.te.in or corenetwork.te.m4 file should be modified.
77871 #
77872 -policy_module(corenetwork, 1.28.0)
77873 +policy_module(corenetwork, 1.28.1)
77874
77875 ########################################
77876 #
77877 @@ -584,13 +584,6 @@ portcon tcp 3050 gen_context(system_u:object_r:gds_db_port_t,s0)
77878 portcon udp 3050 gen_context(system_u:object_r:gds_db_port_t,s0)
77879
77880
77881 -type giftd_port_t, port_type, defined_port_type;
77882 -type giftd_client_packet_t, packet_type, client_packet_type;
77883 -type giftd_server_packet_t, packet_type, server_packet_type;
77884 -typeattribute giftd_port_t unreserved_port_type;
77885 -portcon tcp 1213 gen_context(system_u:object_r:giftd_port_t,s0)
77886 -
77887 -
77888 type git_port_t, port_type, defined_port_type;
77889 type git_client_packet_t, packet_type, client_packet_type;
77890 type git_server_packet_t, packet_type, server_packet_type;