Gentoo Archives: gentoo-commits

From: Jason Zaman <perfinion@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: doc/, policy/modules/kernel/, policy/
Date: Sat, 03 Sep 2022 19:54:16
Message-Id: 1662233121.7cd9bdfa316e15e20ac537746de9e17b1c740faa.perfinion@gentoo
1 commit: 7cd9bdfa316e15e20ac537746de9e17b1c740faa
2 Author: Jason Zaman <perfinion <AT> gentoo <DOT> org>
3 AuthorDate: Sat Sep 3 19:25:21 2022 +0000
4 Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org>
5 CommitDate: Sat Sep 3 19:25:21 2022 +0000
6 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=7cd9bdfa
7
8 Update generated policy and doc files
9
10 Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org>
11
12 doc/policy.xml | 15408 +++++++++++++++++----------------
13 policy/booleans.conf | 44 +
14 policy/modules.conf | 21 +
15 policy/modules/kernel/corenetwork.if | 18 +
16 policy/modules/kernel/corenetwork.te | 1 +
17 5 files changed, 8226 insertions(+), 7266 deletions(-)
18
19 diff --git a/doc/policy.xml b/doc/policy.xml
20 index 35687d71..6dd4831a 100644
21 --- a/doc/policy.xml
22 +++ b/doc/policy.xml
23 @@ -940,6 +940,70 @@ Role allowed access.
24 </param>
25 </interface>
26 </module>
27 +<module name="cloudinit" filename="policy/modules/admin/cloudinit.if">
28 +<summary>Init scripts for cloud VMs</summary>
29 +<interface name="cloudinit_create_runtime_dirs" lineno="13">
30 +<summary>
31 +Create cloud-init runtime directory.
32 +</summary>
33 +<param name="domain">
34 +<summary>
35 +Domain allowed access.
36 +</summary>
37 +</param>
38 +</interface>
39 +<interface name="cloudinit_write_runtime_files" lineno="32">
40 +<summary>
41 +Write cloud-init runtime files.
42 +</summary>
43 +<param name="domain">
44 +<summary>
45 +Domain allowed access.
46 +</summary>
47 +</param>
48 +</interface>
49 +<interface name="cloudinit_create_runtime_files" lineno="51">
50 +<summary>
51 +Create cloud-init runtime files.
52 +</summary>
53 +<param name="domain">
54 +<summary>
55 +Domain allowed access.
56 +</summary>
57 +</param>
58 +</interface>
59 +<interface name="cloudinit_filetrans_runtime" lineno="81">
60 +<summary>
61 +Create files in /run with the type used for
62 +cloud-init runtime files.
63 +</summary>
64 +<param name="domain">
65 +<summary>
66 +Domain allowed access.
67 +</summary>
68 +</param>
69 +<param name="object_class">
70 +<summary>
71 +The class of the object to be created.
72 +</summary>
73 +</param>
74 +<param name="name" optional="true">
75 +<summary>
76 +The name of the object being created.
77 +</summary>
78 +</param>
79 +</interface>
80 +<interface name="cloudinit_getattr_state_files" lineno="99">
81 +<summary>
82 +Get the attribute of cloud-init state files.
83 +</summary>
84 +<param name="domain">
85 +<summary>
86 +Domain allowed access.
87 +</summary>
88 +</param>
89 +</interface>
90 +</module>
91 <module name="consoletype" filename="policy/modules/admin/consoletype.if">
92 <summary>
93 Determine of the console connected to the controlling terminal.
94 @@ -954,7 +1018,7 @@ Domain allowed to transition.
95 </summary>
96 </param>
97 </interface>
98 -<interface name="consoletype_run" lineno="44">
99 +<interface name="consoletype_run" lineno="42">
100 <summary>
101 Execute consoletype in the consoletype domain, and
102 allow the specified role the consoletype domain.
103 @@ -970,7 +1034,7 @@ Role allowed access.
104 </summary>
105 </param>
106 </interface>
107 -<interface name="consoletype_exec" lineno="64">
108 +<interface name="consoletype_exec" lineno="62">
109 <summary>
110 Execute consoletype in the caller domain.
111 </summary>
112 @@ -2482,7 +2546,7 @@ Domain allowed to transition.
113 </summary>
114 </param>
115 </interface>
116 -<interface name="prelink_exec" lineno="37">
117 +<interface name="prelink_exec" lineno="35">
118 <summary>
119 Execute prelink in the caller domain.
120 </summary>
121 @@ -2492,7 +2556,7 @@ Domain allowed access.
122 </summary>
123 </param>
124 </interface>
125 -<interface name="prelink_run" lineno="64">
126 +<interface name="prelink_run" lineno="62">
127 <summary>
128 Execute prelink in the prelink
129 domain, and allow the specified role
130 @@ -2510,7 +2574,7 @@ Role allowed access.
131 </param>
132 <rolecap/>
133 </interface>
134 -<interface name="prelink_object_file" lineno="83">
135 +<interface name="prelink_object_file" lineno="81">
136 <summary>
137 Make the specified file type prelinkable.
138 </summary>
139 @@ -2520,7 +2584,7 @@ File type to be prelinked.
140 </summary>
141 </param>
142 </interface>
143 -<interface name="prelink_read_cache" lineno="101">
144 +<interface name="prelink_read_cache" lineno="99">
145 <summary>
146 Read prelink cache files.
147 </summary>
148 @@ -2530,7 +2594,7 @@ Domain allowed access.
149 </summary>
150 </param>
151 </interface>
152 -<interface name="prelink_delete_cache" lineno="120">
153 +<interface name="prelink_delete_cache" lineno="118">
154 <summary>
155 Delete prelink cache files.
156 </summary>
157 @@ -2540,7 +2604,7 @@ Domain allowed access.
158 </summary>
159 </param>
160 </interface>
161 -<interface name="prelink_manage_log" lineno="140">
162 +<interface name="prelink_manage_log" lineno="138">
163 <summary>
164 Create, read, write, and delete
165 prelink log files.
166 @@ -2551,7 +2615,7 @@ Domain allowed access.
167 </summary>
168 </param>
169 </interface>
170 -<interface name="prelink_manage_lib" lineno="160">
171 +<interface name="prelink_manage_lib" lineno="158">
172 <summary>
173 Create, read, write, and delete
174 prelink var_lib files.
175 @@ -2562,7 +2626,7 @@ Domain allowed access.
176 </summary>
177 </param>
178 </interface>
179 -<interface name="prelink_relabelfrom_lib" lineno="179">
180 +<interface name="prelink_relabelfrom_lib" lineno="177">
181 <summary>
182 Relabel from prelink lib files.
183 </summary>
184 @@ -2572,7 +2636,7 @@ Domain allowed access.
185 </summary>
186 </param>
187 </interface>
188 -<interface name="prelink_relabel_lib" lineno="198">
189 +<interface name="prelink_relabel_lib" lineno="196">
190 <summary>
191 Relabel prelink lib files.
192 </summary>
193 @@ -3753,7 +3817,7 @@ Role allowed access
194 </summary>
195 </param>
196 </template>
197 -<interface name="sudo_sigchld" lineno="215">
198 +<interface name="sudo_sigchld" lineno="220">
199 <summary>
200 Send a SIGCHLD signal to the sudo domain.
201 </summary>
202 @@ -4068,7 +4132,7 @@ Domain allowed to transition.
203 </summary>
204 </param>
205 </interface>
206 -<interface name="usermanage_run_chfn" lineno="42">
207 +<interface name="usermanage_run_chfn" lineno="40">
208 <summary>
209 Execute chfn in the chfn domain, and
210 allow the specified role the chfn domain.
211 @@ -4084,7 +4148,7 @@ Role allowed access.
212 </summary>
213 </param>
214 </interface>
215 -<interface name="usermanage_domtrans_groupadd" lineno="61">
216 +<interface name="usermanage_domtrans_groupadd" lineno="59">
217 <summary>
218 Execute groupadd in the groupadd domain.
219 </summary>
220 @@ -4094,7 +4158,7 @@ Domain allowed to transition.
221 </summary>
222 </param>
223 </interface>
224 -<interface name="usermanage_run_groupadd" lineno="91">
225 +<interface name="usermanage_run_groupadd" lineno="87">
226 <summary>
227 Execute groupadd in the groupadd domain, and
228 allow the specified role the groupadd domain.
229 @@ -4111,7 +4175,7 @@ Role allowed access.
230 </param>
231 <rolecap/>
232 </interface>
233 -<interface name="usermanage_domtrans_passwd" lineno="110">
234 +<interface name="usermanage_domtrans_passwd" lineno="106">
235 <summary>
236 Execute passwd in the passwd domain.
237 </summary>
238 @@ -4121,7 +4185,7 @@ Domain allowed to transition.
239 </summary>
240 </param>
241 </interface>
242 -<interface name="usermanage_kill_passwd" lineno="133">
243 +<interface name="usermanage_kill_passwd" lineno="127">
244 <summary>
245 Send sigkills to passwd.
246 </summary>
247 @@ -4131,7 +4195,7 @@ Domain allowed access.
248 </summary>
249 </param>
250 </interface>
251 -<interface name="usermanage_check_exec_passwd" lineno="151">
252 +<interface name="usermanage_check_exec_passwd" lineno="145">
253 <summary>
254 Check if the passwd binary is executable.
255 </summary>
256 @@ -4141,7 +4205,7 @@ Domain allowed access.
257 </summary>
258 </param>
259 </interface>
260 -<interface name="usermanage_run_passwd" lineno="175">
261 +<interface name="usermanage_run_passwd" lineno="169">
262 <summary>
263 Execute passwd in the passwd domain, and
264 allow the specified role the passwd domain.
265 @@ -4157,7 +4221,7 @@ Role allowed access.
266 </summary>
267 </param>
268 </interface>
269 -<interface name="usermanage_domtrans_admin_passwd" lineno="195">
270 +<interface name="usermanage_domtrans_admin_passwd" lineno="189">
271 <summary>
272 Execute password admin functions in
273 the admin passwd domain.
274 @@ -4168,7 +4232,7 @@ Domain allowed to transition.
275 </summary>
276 </param>
277 </interface>
278 -<interface name="usermanage_run_admin_passwd" lineno="222">
279 +<interface name="usermanage_run_admin_passwd" lineno="216">
280 <summary>
281 Execute passwd admin functions in the admin
282 passwd domain, and allow the specified role
283 @@ -4186,7 +4250,7 @@ Role allowed access.
284 </param>
285 <rolecap/>
286 </interface>
287 -<interface name="usermanage_dontaudit_use_useradd_fds" lineno="241">
288 +<interface name="usermanage_dontaudit_use_useradd_fds" lineno="235">
289 <summary>
290 Do not audit attempts to use useradd fds.
291 </summary>
292 @@ -4196,7 +4260,7 @@ Domain to not audit.
293 </summary>
294 </param>
295 </interface>
296 -<interface name="usermanage_domtrans_useradd" lineno="259">
297 +<interface name="usermanage_domtrans_useradd" lineno="253">
298 <summary>
299 Execute useradd in the useradd domain.
300 </summary>
301 @@ -4206,7 +4270,7 @@ Domain allowed to transition.
302 </summary>
303 </param>
304 </interface>
305 -<interface name="usermanage_check_exec_useradd" lineno="282">
306 +<interface name="usermanage_check_exec_useradd" lineno="274">
307 <summary>
308 Check if the useradd binaries are executable.
309 </summary>
310 @@ -4216,7 +4280,7 @@ Domain allowed access.
311 </summary>
312 </param>
313 </interface>
314 -<interface name="usermanage_run_useradd" lineno="307">
315 +<interface name="usermanage_run_useradd" lineno="299">
316 <summary>
317 Execute useradd in the useradd domain, and
318 allow the specified role the useradd domain.
319 @@ -4233,7 +4297,7 @@ Role allowed access.
320 </param>
321 <rolecap/>
322 </interface>
323 -<interface name="usermanage_read_crack_db" lineno="326">
324 +<interface name="usermanage_read_crack_db" lineno="318">
325 <summary>
326 Read the crack database.
327 </summary>
328 @@ -7667,7 +7731,7 @@ Role allowed access.
329 </summary>
330 </param>
331 </interface>
332 -<interface name="seunshare_role" lineno="69">
333 +<interface name="seunshare_role" lineno="67">
334 <summary>
335 Role access for seunshare
336 </summary>
337 @@ -9868,7 +9932,17 @@ Domain to not audit.
338 </summary>
339 </param>
340 </interface>
341 -<interface name="corecmd_getattr_bin_files" lineno="155">
342 +<interface name="corecmd_watch_bin_dirs" lineno="155">
343 +<summary>
344 +Watch bin directories.
345 +</summary>
346 +<param name="domain">
347 +<summary>
348 +Domain allowed access.
349 +</summary>
350 +</param>
351 +</interface>
352 +<interface name="corecmd_getattr_bin_files" lineno="173">
353 <summary>
354 Get the attributes of files in bin directories.
355 </summary>
356 @@ -9878,7 +9952,7 @@ Domain allowed access.
357 </summary>
358 </param>
359 </interface>
360 -<interface name="corecmd_dontaudit_getattr_bin_files" lineno="174">
361 +<interface name="corecmd_dontaudit_getattr_bin_files" lineno="192">
362 <summary>
363 Do not audit attempts to get the attributes of files in bin directories.
364 </summary>
365 @@ -9888,7 +9962,7 @@ Domain to not audit.
366 </summary>
367 </param>
368 </interface>
369 -<interface name="corecmd_check_exec_bin_files" lineno="193">
370 +<interface name="corecmd_check_exec_bin_files" lineno="211">
371 <summary>
372 Check if files in bin directories are executable (DAC-wise)
373 </summary>
374 @@ -9898,7 +9972,7 @@ Domain allowed access.
375 </summary>
376 </param>
377 </interface>
378 -<interface name="corecmd_read_bin_files" lineno="212">
379 +<interface name="corecmd_read_bin_files" lineno="230">
380 <summary>
381 Read files in bin directories.
382 </summary>
383 @@ -9908,7 +9982,7 @@ Domain allowed access.
384 </summary>
385 </param>
386 </interface>
387 -<interface name="corecmd_dontaudit_write_bin_files" lineno="231">
388 +<interface name="corecmd_dontaudit_write_bin_files" lineno="249">
389 <summary>
390 Do not audit attempts to write bin files.
391 </summary>
392 @@ -9918,7 +9992,7 @@ Domain to not audit.
393 </summary>
394 </param>
395 </interface>
396 -<interface name="corecmd_read_bin_pipes" lineno="249">
397 +<interface name="corecmd_read_bin_pipes" lineno="267">
398 <summary>
399 Read pipes in bin directories.
400 </summary>
401 @@ -9928,7 +10002,7 @@ Domain allowed access.
402 </summary>
403 </param>
404 </interface>
405 -<interface name="corecmd_read_bin_sockets" lineno="268">
406 +<interface name="corecmd_read_bin_sockets" lineno="286">
407 <summary>
408 Read named sockets in bin directories.
409 </summary>
410 @@ -9938,7 +10012,7 @@ Domain allowed access.
411 </summary>
412 </param>
413 </interface>
414 -<interface name="corecmd_exec_bin" lineno="308">
415 +<interface name="corecmd_exec_bin" lineno="326">
416 <summary>
417 Execute generic programs in bin directories,
418 in the caller domain.
419 @@ -9969,7 +10043,7 @@ Domain allowed access.
420 </summary>
421 </param>
422 </interface>
423 -<interface name="corecmd_manage_bin_files" lineno="327">
424 +<interface name="corecmd_manage_bin_files" lineno="345">
425 <summary>
426 Create, read, write, and delete bin files.
427 </summary>
428 @@ -9979,7 +10053,7 @@ Domain allowed access.
429 </summary>
430 </param>
431 </interface>
432 -<interface name="corecmd_manage_bin_symlinks" lineno="346">
433 +<interface name="corecmd_manage_bin_symlinks" lineno="364">
434 <summary>
435 Manage symlinks for bin files.
436 </summary>
437 @@ -9989,7 +10063,7 @@ Domain allowed access.
438 </summary>
439 </param>
440 </interface>
441 -<interface name="corecmd_relabel_bin_files" lineno="365">
442 +<interface name="corecmd_relabel_bin_files" lineno="383">
443 <summary>
444 Relabel to and from the bin type.
445 </summary>
446 @@ -9999,7 +10073,7 @@ Domain allowed access.
447 </summary>
448 </param>
449 </interface>
450 -<interface name="corecmd_mmap_bin_files" lineno="384">
451 +<interface name="corecmd_mmap_bin_files" lineno="402">
452 <summary>
453 Mmap a bin file as executable.
454 </summary>
455 @@ -10009,7 +10083,7 @@ Domain allowed access.
456 </summary>
457 </param>
458 </interface>
459 -<interface name="corecmd_bin_spec_domtrans" lineno="429">
460 +<interface name="corecmd_bin_spec_domtrans" lineno="447">
461 <summary>
462 Execute a file in a bin directory
463 in the specified domain but do not
464 @@ -10045,7 +10119,7 @@ The type of the new process.
465 </summary>
466 </param>
467 </interface>
468 -<interface name="corecmd_bin_domtrans" lineno="472">
469 +<interface name="corecmd_bin_domtrans" lineno="490">
470 <summary>
471 Execute a file in a bin directory
472 in the specified domain.
473 @@ -10079,7 +10153,7 @@ The type of the new process.
474 </summary>
475 </param>
476 </interface>
477 -<interface name="corecmd_check_exec_shell" lineno="491">
478 +<interface name="corecmd_check_exec_shell" lineno="509">
479 <summary>
480 Check if a shell is executable (DAC-wise).
481 </summary>
482 @@ -10089,7 +10163,7 @@ Domain allowed access.
483 </summary>
484 </param>
485 </interface>
486 -<interface name="corecmd_exec_shell" lineno="528">
487 +<interface name="corecmd_exec_shell" lineno="546">
488 <summary>
489 Execute shells in the caller domain.
490 </summary>
491 @@ -10117,7 +10191,7 @@ Domain allowed access.
492 </summary>
493 </param>
494 </interface>
495 -<interface name="corecmd_shell_spec_domtrans" lineno="566">
496 +<interface name="corecmd_shell_spec_domtrans" lineno="584">
497 <summary>
498 Execute a shell in the target domain. This
499 is an explicit transition, requiring the
500 @@ -10146,7 +10220,7 @@ The type of the shell process.
501 </summary>
502 </param>
503 </interface>
504 -<interface name="corecmd_shell_domtrans" lineno="600">
505 +<interface name="corecmd_shell_domtrans" lineno="618">
506 <summary>
507 Execute a shell in the specified domain.
508 </summary>
509 @@ -10171,7 +10245,7 @@ The type of the shell process.
510 </summary>
511 </param>
512 </interface>
513 -<interface name="corecmd_exec_chroot" lineno="619">
514 +<interface name="corecmd_exec_chroot" lineno="637">
515 <summary>
516 Execute chroot in the caller domain.
517 </summary>
518 @@ -10181,7 +10255,7 @@ Domain allowed access.
519 </summary>
520 </param>
521 </interface>
522 -<interface name="corecmd_getattr_all_executables" lineno="640">
523 +<interface name="corecmd_getattr_all_executables" lineno="658">
524 <summary>
525 Get the attributes of all executable files.
526 </summary>
527 @@ -10192,7 +10266,7 @@ Domain allowed access.
528 </param>
529 <rolecap/>
530 </interface>
531 -<interface name="corecmd_read_all_executables" lineno="661">
532 +<interface name="corecmd_read_all_executables" lineno="679">
533 <summary>
534 Read all executable files.
535 </summary>
536 @@ -10203,7 +10277,7 @@ Domain allowed access.
537 </param>
538 <rolecap/>
539 </interface>
540 -<interface name="corecmd_exec_all_executables" lineno="681">
541 +<interface name="corecmd_exec_all_executables" lineno="699">
542 <summary>
543 Execute all executable files.
544 </summary>
545 @@ -10214,7 +10288,7 @@ Domain allowed access.
546 </param>
547 <rolecap/>
548 </interface>
549 -<interface name="corecmd_dontaudit_exec_all_executables" lineno="702">
550 +<interface name="corecmd_dontaudit_exec_all_executables" lineno="720">
551 <summary>
552 Do not audit attempts to execute all executables.
553 </summary>
554 @@ -10224,7 +10298,7 @@ Domain to not audit.
555 </summary>
556 </param>
557 </interface>
558 -<interface name="corecmd_manage_all_executables" lineno="721">
559 +<interface name="corecmd_manage_all_executables" lineno="739">
560 <summary>
561 Create, read, write, and all executable files.
562 </summary>
563 @@ -10235,7 +10309,7 @@ Domain allowed access.
564 </param>
565 <rolecap/>
566 </interface>
567 -<interface name="corecmd_relabel_all_executables" lineno="743">
568 +<interface name="corecmd_relabel_all_executables" lineno="761">
569 <summary>
570 Relabel to and from the bin type.
571 </summary>
572 @@ -10246,7 +10320,7 @@ Domain allowed access.
573 </param>
574 <rolecap/>
575 </interface>
576 -<interface name="corecmd_mmap_all_executables" lineno="763">
577 +<interface name="corecmd_mmap_all_executables" lineno="781">
578 <summary>
579 Mmap all executables as executable.
580 </summary>
581 @@ -10256,7 +10330,7 @@ Domain allowed access.
582 </summary>
583 </param>
584 </interface>
585 -<interface name="corecmd_relabel_bin_dirs" lineno="785">
586 +<interface name="corecmd_relabel_bin_dirs" lineno="803">
587 <summary>
588 Relabel to and from the bin type.
589 </summary>
590 @@ -10266,7 +10340,7 @@ Domain allowed access.
591 </summary>
592 </param>
593 </interface>
594 -<interface name="corecmd_relabel_bin_lnk_files" lineno="803">
595 +<interface name="corecmd_relabel_bin_lnk_files" lineno="821">
596 <summary>
597 Relabel to and from the bin type.
598 </summary>
599 @@ -10893,7 +10967,17 @@ Domain allowed access.
600 </param>
601 <infoflow type="read" weight="1"/>
602 </interface>
603 -<interface name="corenet_udp_bind_generic_node" lineno="942">
604 +<interface name="corenet_dontaudit_tcp_bind_generic_node" lineno="927">
605 +<summary>
606 +Do not audit denials on binding TCP sockets to generic nodes.
607 +</summary>
608 +<param name="domain">
609 +<summary>
610 +Domain to not audit.
611 +</summary>
612 +</param>
613 +</interface>
614 +<interface name="corenet_udp_bind_generic_node" lineno="960">
615 <summary>
616 Bind UDP sockets to generic nodes.
617 </summary>
618 @@ -10918,7 +11002,7 @@ Domain allowed access.
619 </param>
620 <infoflow type="read" weight="1"/>
621 </interface>
622 -<interface name="corenet_raw_bind_generic_node" lineno="961">
623 +<interface name="corenet_raw_bind_generic_node" lineno="979">
624 <summary>
625 Bind raw sockets to generic nodes.
626 </summary>
627 @@ -10928,7 +11012,7 @@ Domain allowed access.
628 </summary>
629 </param>
630 </interface>
631 -<interface name="corenet_out_generic_node" lineno="980">
632 +<interface name="corenet_out_generic_node" lineno="998">
633 <summary>
634 Allow outgoing network traffic to generic nodes.
635 </summary>
636 @@ -10939,7 +11023,7 @@ The peer label of the outgoing network traffic.
637 </param>
638 <infoflow type="write" weight="10"/>
639 </interface>
640 -<interface name="corenet_in_generic_node" lineno="999">
641 +<interface name="corenet_in_generic_node" lineno="1017">
642 <summary>
643 Allow incoming network traffic from generic nodes.
644 </summary>
645 @@ -10950,7 +11034,7 @@ The peer label of the incoming network traffic.
646 </param>
647 <infoflow type="read" weight="10"/>
648 </interface>
649 -<interface name="corenet_inout_generic_node" lineno="1018">
650 +<interface name="corenet_inout_generic_node" lineno="1036">
651 <summary>
652 Allow incoming and outgoing network traffic with generic nodes.
653 </summary>
654 @@ -10961,7 +11045,7 @@ The peer label of the network traffic.
655 </param>
656 <infoflow type="both" weight="10"/>
657 </interface>
658 -<interface name="corenet_tcp_sendrecv_all_nodes" lineno="1033">
659 +<interface name="corenet_tcp_sendrecv_all_nodes" lineno="1051">
660 <summary>
661 Send and receive TCP network traffic on all nodes.
662 </summary>
663 @@ -10971,7 +11055,7 @@ Domain allowed access.
664 </summary>
665 </param>
666 </interface>
667 -<interface name="corenet_udp_send_all_nodes" lineno="1051">
668 +<interface name="corenet_udp_send_all_nodes" lineno="1069">
669 <summary>
670 Send UDP network traffic on all nodes.
671 </summary>
672 @@ -10981,7 +11065,7 @@ Domain allowed access.
673 </summary>
674 </param>
675 </interface>
676 -<interface name="corenet_dontaudit_udp_send_all_nodes" lineno="1070">
677 +<interface name="corenet_dontaudit_udp_send_all_nodes" lineno="1088">
678 <summary>
679 Do not audit attempts to send UDP network
680 traffic on any nodes.
681 @@ -10992,7 +11076,7 @@ Domain to not audit.
682 </summary>
683 </param>
684 </interface>
685 -<interface name="corenet_sctp_sendrecv_all_nodes" lineno="1088">
686 +<interface name="corenet_sctp_sendrecv_all_nodes" lineno="1106">
687 <summary>
688 Send and receive SCTP network traffic on all nodes.
689 </summary>
690 @@ -11002,7 +11086,7 @@ Domain allowed access.
691 </summary>
692 </param>
693 </interface>
694 -<interface name="corenet_udp_receive_all_nodes" lineno="1106">
695 +<interface name="corenet_udp_receive_all_nodes" lineno="1124">
696 <summary>
697 Receive UDP network traffic on all nodes.
698 </summary>
699 @@ -11012,7 +11096,7 @@ Domain allowed access.
700 </summary>
701 </param>
702 </interface>
703 -<interface name="corenet_dontaudit_udp_receive_all_nodes" lineno="1125">
704 +<interface name="corenet_dontaudit_udp_receive_all_nodes" lineno="1143">
705 <summary>
706 Do not audit attempts to receive UDP
707 network traffic on all nodes.
708 @@ -11023,7 +11107,7 @@ Domain to not audit.
709 </summary>
710 </param>
711 </interface>
712 -<interface name="corenet_udp_sendrecv_all_nodes" lineno="1143">
713 +<interface name="corenet_udp_sendrecv_all_nodes" lineno="1161">
714 <summary>
715 Send and receive UDP network traffic on all nodes.
716 </summary>
717 @@ -11033,7 +11117,7 @@ Domain allowed access.
718 </summary>
719 </param>
720 </interface>
721 -<interface name="corenet_dontaudit_udp_sendrecv_all_nodes" lineno="1159">
722 +<interface name="corenet_dontaudit_udp_sendrecv_all_nodes" lineno="1177">
723 <summary>
724 Do not audit attempts to send and receive UDP
725 network traffic on any nodes nodes.
726 @@ -11044,7 +11128,7 @@ Domain to not audit.
727 </summary>
728 </param>
729 </interface>
730 -<interface name="corenet_raw_send_all_nodes" lineno="1174">
731 +<interface name="corenet_raw_send_all_nodes" lineno="1192">
732 <summary>
733 Send raw IP packets on all nodes.
734 </summary>
735 @@ -11054,7 +11138,7 @@ Domain allowed access.
736 </summary>
737 </param>
738 </interface>
739 -<interface name="corenet_raw_receive_all_nodes" lineno="1192">
740 +<interface name="corenet_raw_receive_all_nodes" lineno="1210">
741 <summary>
742 Receive raw IP packets on all nodes.
743 </summary>
744 @@ -11064,7 +11148,7 @@ Domain allowed access.
745 </summary>
746 </param>
747 </interface>
748 -<interface name="corenet_raw_sendrecv_all_nodes" lineno="1210">
749 +<interface name="corenet_raw_sendrecv_all_nodes" lineno="1228">
750 <summary>
751 Send and receive raw IP packets on all nodes.
752 </summary>
753 @@ -11074,7 +11158,7 @@ Domain allowed access.
754 </summary>
755 </param>
756 </interface>
757 -<interface name="corenet_tcp_bind_all_nodes" lineno="1225">
758 +<interface name="corenet_tcp_bind_all_nodes" lineno="1243">
759 <summary>
760 Bind TCP sockets to all nodes.
761 </summary>
762 @@ -11084,7 +11168,7 @@ Domain allowed access.
763 </summary>
764 </param>
765 </interface>
766 -<interface name="corenet_udp_bind_all_nodes" lineno="1243">
767 +<interface name="corenet_udp_bind_all_nodes" lineno="1261">
768 <summary>
769 Bind UDP sockets to all nodes.
770 </summary>
771 @@ -11094,7 +11178,7 @@ Domain allowed access.
772 </summary>
773 </param>
774 </interface>
775 -<interface name="corenet_raw_bind_all_nodes" lineno="1262">
776 +<interface name="corenet_raw_bind_all_nodes" lineno="1280">
777 <summary>
778 Bind raw sockets to all nodes.
779 </summary>
780 @@ -11104,7 +11188,7 @@ Domain allowed access.
781 </summary>
782 </param>
783 </interface>
784 -<interface name="corenet_tcp_sendrecv_generic_port" lineno="1280">
785 +<interface name="corenet_tcp_sendrecv_generic_port" lineno="1298">
786 <summary>
787 Send and receive TCP network traffic on generic ports.
788 </summary>
789 @@ -11114,7 +11198,7 @@ Domain allowed access.
790 </summary>
791 </param>
792 </interface>
793 -<interface name="corenet_sctp_bind_all_nodes" lineno="1294">
794 +<interface name="corenet_sctp_bind_all_nodes" lineno="1312">
795 <summary>
796 Bind SCTP sockets to all nodes.
797 </summary>
798 @@ -11124,7 +11208,7 @@ Domain allowed access.
799 </summary>
800 </param>
801 </interface>
802 -<interface name="corenet_dontaudit_tcp_sendrecv_generic_port" lineno="1313">
803 +<interface name="corenet_dontaudit_tcp_sendrecv_generic_port" lineno="1331">
804 <summary>
805 Do not audit send and receive TCP network traffic on generic ports.
806 </summary>
807 @@ -11134,7 +11218,7 @@ Domain allowed access.
808 </summary>
809 </param>
810 </interface>
811 -<interface name="corenet_udp_send_generic_port" lineno="1327">
812 +<interface name="corenet_udp_send_generic_port" lineno="1345">
813 <summary>
814 Send UDP network traffic on generic ports.
815 </summary>
816 @@ -11144,7 +11228,7 @@ Domain allowed access.
817 </summary>
818 </param>
819 </interface>
820 -<interface name="corenet_udp_receive_generic_port" lineno="1341">
821 +<interface name="corenet_udp_receive_generic_port" lineno="1359">
822 <summary>
823 Receive UDP network traffic on generic ports.
824 </summary>
825 @@ -11154,7 +11238,7 @@ Domain allowed access.
826 </summary>
827 </param>
828 </interface>
829 -<interface name="corenet_udp_sendrecv_generic_port" lineno="1355">
830 +<interface name="corenet_udp_sendrecv_generic_port" lineno="1373">
831 <summary>
832 Send and receive UDP network traffic on generic ports.
833 </summary>
834 @@ -11164,7 +11248,7 @@ Domain allowed access.
835 </summary>
836 </param>
837 </interface>
838 -<interface name="corenet_tcp_bind_generic_port" lineno="1369">
839 +<interface name="corenet_tcp_bind_generic_port" lineno="1387">
840 <summary>
841 Bind TCP sockets to generic ports.
842 </summary>
843 @@ -11174,7 +11258,7 @@ Domain allowed access.
844 </summary>
845 </param>
846 </interface>
847 -<interface name="corenet_dontaudit_tcp_bind_generic_port" lineno="1389">
848 +<interface name="corenet_dontaudit_tcp_bind_generic_port" lineno="1407">
849 <summary>
850 Do not audit bind TCP sockets to generic ports.
851 </summary>
852 @@ -11184,7 +11268,7 @@ Domain to not audit.
853 </summary>
854 </param>
855 </interface>
856 -<interface name="corenet_udp_bind_generic_port" lineno="1407">
857 +<interface name="corenet_udp_bind_generic_port" lineno="1425">
858 <summary>
859 Bind UDP sockets to generic ports.
860 </summary>
861 @@ -11194,7 +11278,7 @@ Domain allowed access.
862 </summary>
863 </param>
864 </interface>
865 -<interface name="corenet_tcp_connect_generic_port" lineno="1427">
866 +<interface name="corenet_tcp_connect_generic_port" lineno="1445">
867 <summary>
868 Connect TCP sockets to generic ports.
869 </summary>
870 @@ -11204,7 +11288,7 @@ Domain allowed access.
871 </summary>
872 </param>
873 </interface>
874 -<interface name="corenet_tcp_sendrecv_all_ports" lineno="1471">
875 +<interface name="corenet_tcp_sendrecv_all_ports" lineno="1489">
876 <summary>
877 Send and receive TCP network traffic on all ports.
878 </summary>
879 @@ -11240,7 +11324,7 @@ Domain allowed access.
880 </param>
881 <infoflow type="both" weight="10"/>
882 </interface>
883 -<interface name="corenet_udp_send_all_ports" lineno="1485">
884 +<interface name="corenet_udp_send_all_ports" lineno="1503">
885 <summary>
886 Send UDP network traffic on all ports.
887 </summary>
888 @@ -11250,7 +11334,7 @@ Domain allowed access.
889 </summary>
890 </param>
891 </interface>
892 -<interface name="corenet_sctp_bind_generic_port" lineno="1499">
893 +<interface name="corenet_sctp_bind_generic_port" lineno="1517">
894 <summary>
895 Bind SCTP sockets to generic ports.
896 </summary>
897 @@ -11260,7 +11344,7 @@ Domain allowed access.
898 </summary>
899 </param>
900 </interface>
901 -<interface name="corenet_udp_receive_all_ports" lineno="1519">
902 +<interface name="corenet_udp_receive_all_ports" lineno="1537">
903 <summary>
904 Receive UDP network traffic on all ports.
905 </summary>
906 @@ -11270,7 +11354,7 @@ Domain allowed access.
907 </summary>
908 </param>
909 </interface>
910 -<interface name="corenet_udp_sendrecv_all_ports" lineno="1557">
911 +<interface name="corenet_udp_sendrecv_all_ports" lineno="1575">
912 <summary>
913 Send and receive UDP network traffic on all ports.
914 </summary>
915 @@ -11304,7 +11388,7 @@ Domain allowed access.
916 </param>
917 <infoflow type="both" weight="10"/>
918 </interface>
919 -<interface name="corenet_dontaudit_sctp_bind_generic_port" lineno="1572">
920 +<interface name="corenet_dontaudit_sctp_bind_generic_port" lineno="1590">
921 <summary>
922 Do not audit attempts to bind SCTP
923 sockets to generic ports.
924 @@ -11315,7 +11399,7 @@ Domain to not audit.
925 </summary>
926 </param>
927 </interface>
928 -<interface name="corenet_tcp_bind_all_ports" lineno="1590">
929 +<interface name="corenet_tcp_bind_all_ports" lineno="1608">
930 <summary>
931 Bind TCP sockets to all ports.
932 </summary>
933 @@ -11325,7 +11409,7 @@ Domain allowed access.
934 </summary>
935 </param>
936 </interface>
937 -<interface name="corenet_dontaudit_tcp_bind_all_ports" lineno="1609">
938 +<interface name="corenet_dontaudit_tcp_bind_all_ports" lineno="1627">
939 <summary>
940 Do not audit attepts to bind TCP sockets to any ports.
941 </summary>
942 @@ -11335,7 +11419,7 @@ Domain to not audit.
943 </summary>
944 </param>
945 </interface>
946 -<interface name="corenet_udp_bind_all_ports" lineno="1627">
947 +<interface name="corenet_udp_bind_all_ports" lineno="1645">
948 <summary>
949 Bind UDP sockets to all ports.
950 </summary>
951 @@ -11345,7 +11429,7 @@ Domain allowed access.
952 </summary>
953 </param>
954 </interface>
955 -<interface name="corenet_sctp_connect_generic_port" lineno="1646">
956 +<interface name="corenet_sctp_connect_generic_port" lineno="1664">
957 <summary>
958 Connect SCTP sockets to generic ports.
959 </summary>
960 @@ -11355,7 +11439,7 @@ Domain allowed access.
961 </summary>
962 </param>
963 </interface>
964 -<interface name="corenet_dontaudit_udp_bind_all_ports" lineno="1664">
965 +<interface name="corenet_dontaudit_udp_bind_all_ports" lineno="1682">
966 <summary>
967 Do not audit attepts to bind UDP sockets to any ports.
968 </summary>
969 @@ -11365,7 +11449,7 @@ Domain to not audit.
970 </summary>
971 </param>
972 </interface>
973 -<interface name="corenet_tcp_connect_all_ports" lineno="1710">
974 +<interface name="corenet_tcp_connect_all_ports" lineno="1728">
975 <summary>
976 Connect TCP sockets to all ports.
977 </summary>
978 @@ -11403,7 +11487,7 @@ Domain allowed access.
979 </param>
980 <infoflow type="write" weight="1"/>
981 </interface>
982 -<interface name="corenet_dontaudit_tcp_connect_all_ports" lineno="1729">
983 +<interface name="corenet_dontaudit_tcp_connect_all_ports" lineno="1747">
984 <summary>
985 Do not audit attempts to connect TCP sockets
986 to all ports.
987 @@ -11414,7 +11498,7 @@ Domain to not audit.
988 </summary>
989 </param>
990 </interface>
991 -<interface name="corenet_tcp_sendrecv_reserved_port" lineno="1747">
992 +<interface name="corenet_tcp_sendrecv_reserved_port" lineno="1765">
993 <summary>
994 Send and receive TCP network traffic on generic reserved ports.
995 </summary>
996 @@ -11424,7 +11508,7 @@ Domain allowed access.
997 </summary>
998 </param>
999 </interface>
1000 -<interface name="corenet_udp_send_reserved_port" lineno="1761">
1001 +<interface name="corenet_udp_send_reserved_port" lineno="1779">
1002 <summary>
1003 Send UDP network traffic on generic reserved ports.
1004 </summary>
1005 @@ -11434,7 +11518,7 @@ Domain allowed access.
1006 </summary>
1007 </param>
1008 </interface>
1009 -<interface name="corenet_udp_receive_reserved_port" lineno="1775">
1010 +<interface name="corenet_udp_receive_reserved_port" lineno="1793">
1011 <summary>
1012 Receive UDP network traffic on generic reserved ports.
1013 </summary>
1014 @@ -11444,7 +11528,7 @@ Domain allowed access.
1015 </summary>
1016 </param>
1017 </interface>
1018 -<interface name="corenet_udp_sendrecv_reserved_port" lineno="1789">
1019 +<interface name="corenet_udp_sendrecv_reserved_port" lineno="1807">
1020 <summary>
1021 Send and receive UDP network traffic on generic reserved ports.
1022 </summary>
1023 @@ -11454,7 +11538,7 @@ Domain allowed access.
1024 </summary>
1025 </param>
1026 </interface>
1027 -<interface name="corenet_tcp_bind_reserved_port" lineno="1803">
1028 +<interface name="corenet_tcp_bind_reserved_port" lineno="1821">
1029 <summary>
1030 Bind TCP sockets to generic reserved ports.
1031 </summary>
1032 @@ -11464,7 +11548,7 @@ Domain allowed access.
1033 </summary>
1034 </param>
1035 </interface>
1036 -<interface name="corenet_sctp_bind_all_ports" lineno="1822">
1037 +<interface name="corenet_sctp_bind_all_ports" lineno="1840">
1038 <summary>
1039 Bind SCTP sockets to all ports.
1040 </summary>
1041 @@ -11474,7 +11558,7 @@ Domain allowed access.
1042 </summary>
1043 </param>
1044 </interface>
1045 -<interface name="corenet_udp_bind_reserved_port" lineno="1841">
1046 +<interface name="corenet_udp_bind_reserved_port" lineno="1859">
1047 <summary>
1048 Bind UDP sockets to generic reserved ports.
1049 </summary>
1050 @@ -11484,7 +11568,7 @@ Domain allowed access.
1051 </summary>
1052 </param>
1053 </interface>
1054 -<interface name="corenet_tcp_connect_reserved_port" lineno="1860">
1055 +<interface name="corenet_tcp_connect_reserved_port" lineno="1878">
1056 <summary>
1057 Connect TCP sockets to generic reserved ports.
1058 </summary>
1059 @@ -11494,7 +11578,7 @@ Domain allowed access.
1060 </summary>
1061 </param>
1062 </interface>
1063 -<interface name="corenet_dontaudit_sctp_bind_all_ports" lineno="1878">
1064 +<interface name="corenet_dontaudit_sctp_bind_all_ports" lineno="1896">
1065 <summary>
1066 Do not audit attempts to bind SCTP sockets to any ports.
1067 </summary>
1068 @@ -11504,7 +11588,7 @@ Domain to not audit.
1069 </summary>
1070 </param>
1071 </interface>
1072 -<interface name="corenet_tcp_sendrecv_all_reserved_ports" lineno="1896">
1073 +<interface name="corenet_tcp_sendrecv_all_reserved_ports" lineno="1914">
1074 <summary>
1075 Send and receive TCP network traffic on all reserved ports.
1076 </summary>
1077 @@ -11514,7 +11598,7 @@ Domain allowed access.
1078 </summary>
1079 </param>
1080 </interface>
1081 -<interface name="corenet_udp_send_all_reserved_ports" lineno="1910">
1082 +<interface name="corenet_udp_send_all_reserved_ports" lineno="1928">
1083 <summary>
1084 Send UDP network traffic on all reserved ports.
1085 </summary>
1086 @@ -11524,7 +11608,7 @@ Domain allowed access.
1087 </summary>
1088 </param>
1089 </interface>
1090 -<interface name="corenet_udp_receive_all_reserved_ports" lineno="1924">
1091 +<interface name="corenet_udp_receive_all_reserved_ports" lineno="1942">
1092 <summary>
1093 Receive UDP network traffic on all reserved ports.
1094 </summary>
1095 @@ -11534,7 +11618,7 @@ Domain allowed access.
1096 </summary>
1097 </param>
1098 </interface>
1099 -<interface name="corenet_udp_sendrecv_all_reserved_ports" lineno="1938">
1100 +<interface name="corenet_udp_sendrecv_all_reserved_ports" lineno="1956">
1101 <summary>
1102 Send and receive UDP network traffic on all reserved ports.
1103 </summary>
1104 @@ -11544,7 +11628,7 @@ Domain allowed access.
1105 </summary>
1106 </param>
1107 </interface>
1108 -<interface name="corenet_sctp_connect_all_ports" lineno="1952">
1109 +<interface name="corenet_sctp_connect_all_ports" lineno="1970">
1110 <summary>
1111 Connect SCTP sockets to all ports.
1112 </summary>
1113 @@ -11554,7 +11638,7 @@ Domain allowed access.
1114 </summary>
1115 </param>
1116 </interface>
1117 -<interface name="corenet_tcp_bind_all_reserved_ports" lineno="1970">
1118 +<interface name="corenet_tcp_bind_all_reserved_ports" lineno="1988">
1119 <summary>
1120 Bind TCP sockets to all reserved ports.
1121 </summary>
1122 @@ -11564,7 +11648,7 @@ Domain allowed access.
1123 </summary>
1124 </param>
1125 </interface>
1126 -<interface name="corenet_dontaudit_tcp_bind_all_reserved_ports" lineno="1989">
1127 +<interface name="corenet_dontaudit_tcp_bind_all_reserved_ports" lineno="2007">
1128 <summary>
1129 Do not audit attempts to bind TCP sockets to all reserved ports.
1130 </summary>
1131 @@ -11574,7 +11658,7 @@ Domain to not audit.
1132 </summary>
1133 </param>
1134 </interface>
1135 -<interface name="corenet_udp_bind_all_reserved_ports" lineno="2007">
1136 +<interface name="corenet_udp_bind_all_reserved_ports" lineno="2025">
1137 <summary>
1138 Bind UDP sockets to all reserved ports.
1139 </summary>
1140 @@ -11584,7 +11668,7 @@ Domain allowed access.
1141 </summary>
1142 </param>
1143 </interface>
1144 -<interface name="corenet_dontaudit_udp_bind_all_reserved_ports" lineno="2026">
1145 +<interface name="corenet_dontaudit_udp_bind_all_reserved_ports" lineno="2044">
1146 <summary>
1147 Do not audit attempts to bind UDP sockets to all reserved ports.
1148 </summary>
1149 @@ -11594,7 +11678,7 @@ Domain to not audit.
1150 </summary>
1151 </param>
1152 </interface>
1153 -<interface name="corenet_dontaudit_sctp_connect_all_ports" lineno="2045">
1154 +<interface name="corenet_dontaudit_sctp_connect_all_ports" lineno="2063">
1155 <summary>
1156 Do not audit attempts to connect SCTP sockets
1157 to all ports.
1158 @@ -11605,7 +11689,7 @@ Domain to not audit.
1159 </summary>
1160 </param>
1161 </interface>
1162 -<interface name="corenet_tcp_bind_all_unreserved_ports" lineno="2063">
1163 +<interface name="corenet_tcp_bind_all_unreserved_ports" lineno="2081">
1164 <summary>
1165 Bind TCP sockets to all ports > 1024.
1166 </summary>
1167 @@ -11615,7 +11699,7 @@ Domain allowed access.
1168 </summary>
1169 </param>
1170 </interface>
1171 -<interface name="corenet_udp_bind_all_unreserved_ports" lineno="2081">
1172 +<interface name="corenet_udp_bind_all_unreserved_ports" lineno="2099">
1173 <summary>
1174 Bind UDP sockets to all ports > 1024.
1175 </summary>
1176 @@ -11625,7 +11709,7 @@ Domain allowed access.
1177 </summary>
1178 </param>
1179 </interface>
1180 -<interface name="corenet_tcp_connect_all_reserved_ports" lineno="2099">
1181 +<interface name="corenet_tcp_connect_all_reserved_ports" lineno="2117">
1182 <summary>
1183 Connect TCP sockets to reserved ports.
1184 </summary>
1185 @@ -11635,7 +11719,7 @@ Domain allowed access.
1186 </summary>
1187 </param>
1188 </interface>
1189 -<interface name="corenet_sctp_connect_all_unreserved_ports" lineno="2117">
1190 +<interface name="corenet_sctp_connect_all_unreserved_ports" lineno="2135">
1191 <summary>
1192 Connect SCTP sockets to all ports > 1024.
1193 </summary>
1194 @@ -11645,7 +11729,7 @@ Domain allowed access.
1195 </summary>
1196 </param>
1197 </interface>
1198 -<interface name="corenet_dontaudit_tcp_connect_all_unreserved_ports" lineno="2136">
1199 +<interface name="corenet_dontaudit_tcp_connect_all_unreserved_ports" lineno="2154">
1200 <summary>
1201 Do not audit connect attempts to TCP sockets on
1202 ports greater than 1024.
1203 @@ -11656,7 +11740,7 @@ Domain not to audit access to.
1204 </summary>
1205 </param>
1206 </interface>
1207 -<interface name="corenet_tcp_connect_all_unreserved_ports" lineno="2154">
1208 +<interface name="corenet_tcp_connect_all_unreserved_ports" lineno="2172">
1209 <summary>
1210 Connect TCP sockets to all ports > 1024.
1211 </summary>
1212 @@ -11666,7 +11750,7 @@ Domain allowed access.
1213 </summary>
1214 </param>
1215 </interface>
1216 -<interface name="corenet_dontaudit_tcp_connect_all_reserved_ports" lineno="2173">
1217 +<interface name="corenet_dontaudit_tcp_connect_all_reserved_ports" lineno="2191">
1218 <summary>
1219 Do not audit attempts to connect TCP sockets
1220 all reserved ports.
1221 @@ -11677,7 +11761,7 @@ Domain to not audit.
1222 </summary>
1223 </param>
1224 </interface>
1225 -<interface name="corenet_tcp_connect_all_rpc_ports" lineno="2191">
1226 +<interface name="corenet_tcp_connect_all_rpc_ports" lineno="2209">
1227 <summary>
1228 Connect TCP sockets to rpc ports.
1229 </summary>
1230 @@ -11687,7 +11771,7 @@ Domain allowed access.
1231 </summary>
1232 </param>
1233 </interface>
1234 -<interface name="corenet_dontaudit_tcp_connect_all_rpc_ports" lineno="2210">
1235 +<interface name="corenet_dontaudit_tcp_connect_all_rpc_ports" lineno="2228">
1236 <summary>
1237 Do not audit attempts to connect TCP sockets
1238 all rpc ports.
1239 @@ -11698,7 +11782,7 @@ Domain to not audit.
1240 </summary>
1241 </param>
1242 </interface>
1243 -<interface name="corenet_sctp_bind_reserved_port" lineno="2228">
1244 +<interface name="corenet_sctp_bind_reserved_port" lineno="2246">
1245 <summary>
1246 Bind SCTP sockets to generic reserved ports.
1247 </summary>
1248 @@ -11708,7 +11792,7 @@ Domain allowed access.
1249 </summary>
1250 </param>
1251 </interface>
1252 -<interface name="corenet_read_tun_tap_dev" lineno="2247">
1253 +<interface name="corenet_read_tun_tap_dev" lineno="2265">
1254 <summary>
1255 Read the TUN/TAP virtual network device.
1256 </summary>
1257 @@ -11718,7 +11802,7 @@ The domain read allowed access.
1258 </summary>
1259 </param>
1260 </interface>
1261 -<interface name="corenet_write_tun_tap_dev" lineno="2266">
1262 +<interface name="corenet_write_tun_tap_dev" lineno="2284">
1263 <summary>
1264 Write the TUN/TAP virtual network device.
1265 </summary>
1266 @@ -11728,7 +11812,7 @@ The domain allowed write access.
1267 </summary>
1268 </param>
1269 </interface>
1270 -<interface name="corenet_rw_tun_tap_dev" lineno="2285">
1271 +<interface name="corenet_rw_tun_tap_dev" lineno="2303">
1272 <summary>
1273 Read and write the TUN/TAP virtual network device.
1274 </summary>
1275 @@ -11738,7 +11822,7 @@ The domain allowed access.
1276 </summary>
1277 </param>
1278 </interface>
1279 -<interface name="corenet_sctp_connect_reserved_port" lineno="2304">
1280 +<interface name="corenet_sctp_connect_reserved_port" lineno="2322">
1281 <summary>
1282 Connect SCTP sockets to generic reserved ports.
1283 </summary>
1284 @@ -11748,7 +11832,7 @@ Domain allowed access.
1285 </summary>
1286 </param>
1287 </interface>
1288 -<interface name="corenet_dontaudit_rw_tun_tap_dev" lineno="2323">
1289 +<interface name="corenet_dontaudit_rw_tun_tap_dev" lineno="2341">
1290 <summary>
1291 Do not audit attempts to read or write the TUN/TAP
1292 virtual network device.
1293 @@ -11759,7 +11843,7 @@ Domain to not audit.
1294 </summary>
1295 </param>
1296 </interface>
1297 -<interface name="corenet_getattr_ppp_dev" lineno="2341">
1298 +<interface name="corenet_getattr_ppp_dev" lineno="2359">
1299 <summary>
1300 Getattr the point-to-point device.
1301 </summary>
1302 @@ -11769,7 +11853,7 @@ The domain allowed access.
1303 </summary>
1304 </param>
1305 </interface>
1306 -<interface name="corenet_rw_ppp_dev" lineno="2359">
1307 +<interface name="corenet_rw_ppp_dev" lineno="2377">
1308 <summary>
1309 Read and write the point-to-point device.
1310 </summary>
1311 @@ -11779,7 +11863,7 @@ The domain allowed access.
1312 </summary>
1313 </param>
1314 </interface>
1315 -<interface name="corenet_tcp_bind_all_rpc_ports" lineno="2378">
1316 +<interface name="corenet_tcp_bind_all_rpc_ports" lineno="2396">
1317 <summary>
1318 Bind TCP sockets to all RPC ports.
1319 </summary>
1320 @@ -11789,7 +11873,7 @@ Domain allowed access.
1321 </summary>
1322 </param>
1323 </interface>
1324 -<interface name="corenet_dontaudit_tcp_bind_all_rpc_ports" lineno="2397">
1325 +<interface name="corenet_dontaudit_tcp_bind_all_rpc_ports" lineno="2415">
1326 <summary>
1327 Do not audit attempts to bind TCP sockets to all RPC ports.
1328 </summary>
1329 @@ -11799,7 +11883,7 @@ Domain to not audit.
1330 </summary>
1331 </param>
1332 </interface>
1333 -<interface name="corenet_udp_bind_all_rpc_ports" lineno="2415">
1334 +<interface name="corenet_udp_bind_all_rpc_ports" lineno="2433">
1335 <summary>
1336 Bind UDP sockets to all RPC ports.
1337 </summary>
1338 @@ -11809,7 +11893,7 @@ Domain allowed access.
1339 </summary>
1340 </param>
1341 </interface>
1342 -<interface name="corenet_dontaudit_udp_bind_all_rpc_ports" lineno="2434">
1343 +<interface name="corenet_dontaudit_udp_bind_all_rpc_ports" lineno="2452">
1344 <summary>
1345 Do not audit attempts to bind UDP sockets to all RPC ports.
1346 </summary>
1347 @@ -11819,7 +11903,7 @@ Domain to not audit.
1348 </summary>
1349 </param>
1350 </interface>
1351 -<interface name="corenet_sctp_bind_all_reserved_ports" lineno="2452">
1352 +<interface name="corenet_sctp_bind_all_reserved_ports" lineno="2470">
1353 <summary>
1354 Bind SCTP sockets to all reserved ports.
1355 </summary>
1356 @@ -11829,7 +11913,7 @@ Domain allowed access.
1357 </summary>
1358 </param>
1359 </interface>
1360 -<interface name="corenet_tcp_recvfrom_netlabel" lineno="2471">
1361 +<interface name="corenet_tcp_recvfrom_netlabel" lineno="2489">
1362 <summary>
1363 Receive TCP packets from a NetLabel connection.
1364 </summary>
1365 @@ -11839,7 +11923,7 @@ Domain allowed access.
1366 </summary>
1367 </param>
1368 </interface>
1369 -<interface name="corenet_tcp_recvfrom_unlabeled" lineno="2490">
1370 +<interface name="corenet_tcp_recvfrom_unlabeled" lineno="2508">
1371 <summary>
1372 Receive TCP packets from an unlabled connection.
1373 </summary>
1374 @@ -11849,7 +11933,7 @@ Domain allowed access.
1375 </summary>
1376 </param>
1377 </interface>
1378 -<interface name="corenet_dontaudit_sctp_bind_all_reserved_ports" lineno="2510">
1379 +<interface name="corenet_dontaudit_sctp_bind_all_reserved_ports" lineno="2528">
1380 <summary>
1381 Do not audit attempts to bind SCTP sockets to all reserved ports.
1382 </summary>
1383 @@ -11859,7 +11943,7 @@ Domain to not audit.
1384 </summary>
1385 </param>
1386 </interface>
1387 -<interface name="corenet_dontaudit_tcp_recvfrom_netlabel" lineno="2529">
1388 +<interface name="corenet_dontaudit_tcp_recvfrom_netlabel" lineno="2547">
1389 <summary>
1390 Do not audit attempts to receive TCP packets from a NetLabel
1391 connection.
1392 @@ -11870,7 +11954,7 @@ Domain to not audit.
1393 </summary>
1394 </param>
1395 </interface>
1396 -<interface name="corenet_dontaudit_tcp_recvfrom_unlabeled" lineno="2549">
1397 +<interface name="corenet_dontaudit_tcp_recvfrom_unlabeled" lineno="2567">
1398 <summary>
1399 Do not audit attempts to receive TCP packets from an unlabeled
1400 connection.
1401 @@ -11881,7 +11965,7 @@ Domain to not audit.
1402 </summary>
1403 </param>
1404 </interface>
1405 -<interface name="corenet_udp_recvfrom_netlabel" lineno="2569">
1406 +<interface name="corenet_udp_recvfrom_netlabel" lineno="2587">
1407 <summary>
1408 Receive UDP packets from a NetLabel connection.
1409 </summary>
1410 @@ -11891,7 +11975,7 @@ Domain allowed access.
1411 </summary>
1412 </param>
1413 </interface>
1414 -<interface name="corenet_udp_recvfrom_unlabeled" lineno="2588">
1415 +<interface name="corenet_udp_recvfrom_unlabeled" lineno="2606">
1416 <summary>
1417 Receive UDP packets from an unlabeled connection.
1418 </summary>
1419 @@ -11901,7 +11985,7 @@ Domain allowed access.
1420 </summary>
1421 </param>
1422 </interface>
1423 -<interface name="corenet_sctp_bind_all_unreserved_ports" lineno="2608">
1424 +<interface name="corenet_sctp_bind_all_unreserved_ports" lineno="2626">
1425 <summary>
1426 Bind SCTP sockets to all ports > 1024.
1427 </summary>
1428 @@ -11911,7 +11995,7 @@ Domain allowed access.
1429 </summary>
1430 </param>
1431 </interface>
1432 -<interface name="corenet_dontaudit_udp_recvfrom_netlabel" lineno="2627">
1433 +<interface name="corenet_dontaudit_udp_recvfrom_netlabel" lineno="2645">
1434 <summary>
1435 Do not audit attempts to receive UDP packets from a NetLabel
1436 connection.
1437 @@ -11922,7 +12006,7 @@ Domain to not audit.
1438 </summary>
1439 </param>
1440 </interface>
1441 -<interface name="corenet_dontaudit_udp_recvfrom_unlabeled" lineno="2647">
1442 +<interface name="corenet_dontaudit_udp_recvfrom_unlabeled" lineno="2665">
1443 <summary>
1444 Do not audit attempts to receive UDP packets from an unlabeled
1445 connection.
1446 @@ -11933,7 +12017,7 @@ Domain to not audit.
1447 </summary>
1448 </param>
1449 </interface>
1450 -<interface name="corenet_raw_recvfrom_netlabel" lineno="2667">
1451 +<interface name="corenet_raw_recvfrom_netlabel" lineno="2685">
1452 <summary>
1453 Receive Raw IP packets from a NetLabel connection.
1454 </summary>
1455 @@ -11943,7 +12027,7 @@ Domain allowed access.
1456 </summary>
1457 </param>
1458 </interface>
1459 -<interface name="corenet_raw_recvfrom_unlabeled" lineno="2686">
1460 +<interface name="corenet_raw_recvfrom_unlabeled" lineno="2704">
1461 <summary>
1462 Receive Raw IP packets from an unlabeled connection.
1463 </summary>
1464 @@ -11953,7 +12037,7 @@ Domain allowed access.
1465 </summary>
1466 </param>
1467 </interface>
1468 -<interface name="corenet_dontaudit_raw_recvfrom_netlabel" lineno="2707">
1469 +<interface name="corenet_dontaudit_raw_recvfrom_netlabel" lineno="2725">
1470 <summary>
1471 Do not audit attempts to receive Raw IP packets from a NetLabel
1472 connection.
1473 @@ -11964,7 +12048,7 @@ Domain to not audit.
1474 </summary>
1475 </param>
1476 </interface>
1477 -<interface name="corenet_sctp_connect_all_reserved_ports" lineno="2726">
1478 +<interface name="corenet_sctp_connect_all_reserved_ports" lineno="2744">
1479 <summary>
1480 Connect SCTP sockets to reserved ports.
1481 </summary>
1482 @@ -11974,7 +12058,7 @@ Domain allowed access.
1483 </summary>
1484 </param>
1485 </interface>
1486 -<interface name="corenet_dontaudit_raw_recvfrom_unlabeled" lineno="2745">
1487 +<interface name="corenet_dontaudit_raw_recvfrom_unlabeled" lineno="2763">
1488 <summary>
1489 Do not audit attempts to receive Raw IP packets from an unlabeled
1490 connection.
1491 @@ -11985,7 +12069,7 @@ Domain to not audit.
1492 </summary>
1493 </param>
1494 </interface>
1495 -<interface name="corenet_all_recvfrom_unlabeled" lineno="2777">
1496 +<interface name="corenet_all_recvfrom_unlabeled" lineno="2795">
1497 <summary>
1498 Receive packets from an unlabeled connection.
1499 </summary>
1500 @@ -12007,7 +12091,7 @@ Domain allowed access.
1501 </param>
1502 <infoflow type="read" weight="10"/>
1503 </interface>
1504 -<interface name="corenet_all_recvfrom_netlabel" lineno="2810">
1505 +<interface name="corenet_all_recvfrom_netlabel" lineno="2828">
1506 <summary>
1507 Receive packets from a NetLabel connection.
1508 </summary>
1509 @@ -12028,7 +12112,7 @@ Domain allowed access.
1510 </param>
1511 <infoflow type="read" weight="10"/>
1512 </interface>
1513 -<interface name="corenet_dontaudit_all_recvfrom_unlabeled" lineno="2829">
1514 +<interface name="corenet_dontaudit_all_recvfrom_unlabeled" lineno="2847">
1515 <summary>
1516 Do not audit attempts to receive packets from an unlabeled connection.
1517 </summary>
1518 @@ -12038,7 +12122,7 @@ Domain allowed access.
1519 </summary>
1520 </param>
1521 </interface>
1522 -<interface name="corenet_dontaudit_sctp_connect_all_reserved_ports" lineno="2852">
1523 +<interface name="corenet_dontaudit_sctp_connect_all_reserved_ports" lineno="2870">
1524 <summary>
1525 Do not audit attempts to connect SCTP sockets
1526 all reserved ports.
1527 @@ -12049,7 +12133,7 @@ Domain to not audit.
1528 </summary>
1529 </param>
1530 </interface>
1531 -<interface name="corenet_dontaudit_all_recvfrom_netlabel" lineno="2871">
1532 +<interface name="corenet_dontaudit_all_recvfrom_netlabel" lineno="2889">
1533 <summary>
1534 Do not audit attempts to receive packets from a NetLabel
1535 connection.
1536 @@ -12060,7 +12144,7 @@ Domain to not audit.
1537 </summary>
1538 </param>
1539 </interface>
1540 -<interface name="corenet_tcp_recvfrom_labeled" lineno="2903">
1541 +<interface name="corenet_tcp_recvfrom_labeled" lineno="2921">
1542 <summary>
1543 Rules for receiving labeled TCP packets.
1544 </summary>
1545 @@ -12083,7 +12167,7 @@ Peer domain.
1546 </summary>
1547 </param>
1548 </interface>
1549 -<interface name="corenet_udp_recvfrom_labeled" lineno="2931">
1550 +<interface name="corenet_udp_recvfrom_labeled" lineno="2949">
1551 <summary>
1552 Rules for receiving labeled UDP packets.
1553 </summary>
1554 @@ -12098,7 +12182,7 @@ Peer domain.
1555 </summary>
1556 </param>
1557 </interface>
1558 -<interface name="corenet_raw_recvfrom_labeled" lineno="2956">
1559 +<interface name="corenet_raw_recvfrom_labeled" lineno="2974">
1560 <summary>
1561 Rules for receiving labeled raw IP packets.
1562 </summary>
1563 @@ -12113,7 +12197,7 @@ Peer domain.
1564 </summary>
1565 </param>
1566 </interface>
1567 -<interface name="corenet_all_recvfrom_labeled" lineno="2990">
1568 +<interface name="corenet_all_recvfrom_labeled" lineno="3008">
1569 <summary>
1570 Rules for receiving labeled packets via TCP, UDP and raw IP.
1571 </summary>
1572 @@ -12137,7 +12221,7 @@ Peer domain.
1573 </summary>
1574 </param>
1575 </interface>
1576 -<interface name="corenet_setcontext_all_spds" lineno="3008">
1577 +<interface name="corenet_setcontext_all_spds" lineno="3026">
1578 <summary>
1579 Allow specified type to set the context of
1580 a SPD entry for labeled ipsec associations.
1581 @@ -12148,7 +12232,7 @@ Domain allowed access.
1582 </summary>
1583 </param>
1584 </interface>
1585 -<interface name="corenet_send_generic_client_packets" lineno="3026">
1586 +<interface name="corenet_send_generic_client_packets" lineno="3044">
1587 <summary>
1588 Send generic client packets.
1589 </summary>
1590 @@ -12158,7 +12242,7 @@ Domain allowed access.
1591 </summary>
1592 </param>
1593 </interface>
1594 -<interface name="corenet_receive_generic_client_packets" lineno="3044">
1595 +<interface name="corenet_receive_generic_client_packets" lineno="3062">
1596 <summary>
1597 Receive generic client packets.
1598 </summary>
1599 @@ -12168,7 +12252,7 @@ Domain allowed access.
1600 </summary>
1601 </param>
1602 </interface>
1603 -<interface name="corenet_sendrecv_generic_client_packets" lineno="3062">
1604 +<interface name="corenet_sendrecv_generic_client_packets" lineno="3080">
1605 <summary>
1606 Send and receive generic client packets.
1607 </summary>
1608 @@ -12178,7 +12262,7 @@ Domain allowed access.
1609 </summary>
1610 </param>
1611 </interface>
1612 -<interface name="corenet_relabelto_generic_client_packets" lineno="3077">
1613 +<interface name="corenet_relabelto_generic_client_packets" lineno="3095">
1614 <summary>
1615 Relabel packets to the generic client packet type.
1616 </summary>
1617 @@ -12188,7 +12272,7 @@ Domain allowed access.
1618 </summary>
1619 </param>
1620 </interface>
1621 -<interface name="corenet_send_generic_server_packets" lineno="3095">
1622 +<interface name="corenet_send_generic_server_packets" lineno="3113">
1623 <summary>
1624 Send generic server packets.
1625 </summary>
1626 @@ -12198,7 +12282,7 @@ Domain allowed access.
1627 </summary>
1628 </param>
1629 </interface>
1630 -<interface name="corenet_receive_generic_server_packets" lineno="3113">
1631 +<interface name="corenet_receive_generic_server_packets" lineno="3131">
1632 <summary>
1633 Receive generic server packets.
1634 </summary>
1635 @@ -12208,7 +12292,7 @@ Domain allowed access.
1636 </summary>
1637 </param>
1638 </interface>
1639 -<interface name="corenet_sendrecv_generic_server_packets" lineno="3131">
1640 +<interface name="corenet_sendrecv_generic_server_packets" lineno="3149">
1641 <summary>
1642 Send and receive generic server packets.
1643 </summary>
1644 @@ -12218,7 +12302,7 @@ Domain allowed access.
1645 </summary>
1646 </param>
1647 </interface>
1648 -<interface name="corenet_relabelto_generic_server_packets" lineno="3146">
1649 +<interface name="corenet_relabelto_generic_server_packets" lineno="3164">
1650 <summary>
1651 Relabel packets to the generic server packet type.
1652 </summary>
1653 @@ -12228,7 +12312,7 @@ Domain allowed access.
1654 </summary>
1655 </param>
1656 </interface>
1657 -<interface name="corenet_sendrecv_unlabeled_packets" lineno="3171">
1658 +<interface name="corenet_sendrecv_unlabeled_packets" lineno="3189">
1659 <summary>
1660 Send and receive unlabeled packets.
1661 </summary>
1662 @@ -12245,7 +12329,7 @@ Domain allowed access.
1663 </summary>
1664 </param>
1665 </interface>
1666 -<interface name="corenet_send_all_client_packets" lineno="3185">
1667 +<interface name="corenet_send_all_client_packets" lineno="3203">
1668 <summary>
1669 Send all client packets.
1670 </summary>
1671 @@ -12255,7 +12339,7 @@ Domain allowed access.
1672 </summary>
1673 </param>
1674 </interface>
1675 -<interface name="corenet_receive_all_client_packets" lineno="3203">
1676 +<interface name="corenet_receive_all_client_packets" lineno="3221">
1677 <summary>
1678 Receive all client packets.
1679 </summary>
1680 @@ -12265,7 +12349,7 @@ Domain allowed access.
1681 </summary>
1682 </param>
1683 </interface>
1684 -<interface name="corenet_sendrecv_all_client_packets" lineno="3221">
1685 +<interface name="corenet_sendrecv_all_client_packets" lineno="3239">
1686 <summary>
1687 Send and receive all client packets.
1688 </summary>
1689 @@ -12275,7 +12359,7 @@ Domain allowed access.
1690 </summary>
1691 </param>
1692 </interface>
1693 -<interface name="corenet_relabelto_all_client_packets" lineno="3236">
1694 +<interface name="corenet_relabelto_all_client_packets" lineno="3254">
1695 <summary>
1696 Relabel packets to any client packet type.
1697 </summary>
1698 @@ -12285,7 +12369,7 @@ Domain allowed access.
1699 </summary>
1700 </param>
1701 </interface>
1702 -<interface name="corenet_send_all_server_packets" lineno="3254">
1703 +<interface name="corenet_send_all_server_packets" lineno="3272">
1704 <summary>
1705 Send all server packets.
1706 </summary>
1707 @@ -12295,7 +12379,7 @@ Domain allowed access.
1708 </summary>
1709 </param>
1710 </interface>
1711 -<interface name="corenet_sctp_recvfrom_netlabel" lineno="3272">
1712 +<interface name="corenet_sctp_recvfrom_netlabel" lineno="3290">
1713 <summary>
1714 Receive SCTP packets from a NetLabel connection.
1715 </summary>
1716 @@ -12305,7 +12389,7 @@ Domain allowed access.
1717 </summary>
1718 </param>
1719 </interface>
1720 -<interface name="corenet_receive_all_server_packets" lineno="3290">
1721 +<interface name="corenet_receive_all_server_packets" lineno="3308">
1722 <summary>
1723 Receive all server packets.
1724 </summary>
1725 @@ -12315,7 +12399,7 @@ Domain allowed access.
1726 </summary>
1727 </param>
1728 </interface>
1729 -<interface name="corenet_sendrecv_all_server_packets" lineno="3308">
1730 +<interface name="corenet_sendrecv_all_server_packets" lineno="3326">
1731 <summary>
1732 Send and receive all server packets.
1733 </summary>
1734 @@ -12325,7 +12409,7 @@ Domain allowed access.
1735 </summary>
1736 </param>
1737 </interface>
1738 -<interface name="corenet_relabelto_all_server_packets" lineno="3323">
1739 +<interface name="corenet_relabelto_all_server_packets" lineno="3341">
1740 <summary>
1741 Relabel packets to any server packet type.
1742 </summary>
1743 @@ -12335,7 +12419,7 @@ Domain allowed access.
1744 </summary>
1745 </param>
1746 </interface>
1747 -<interface name="corenet_sctp_recvfrom_unlabeled" lineno="3341">
1748 +<interface name="corenet_sctp_recvfrom_unlabeled" lineno="3359">
1749 <summary>
1750 Receive SCTP packets from an unlabled connection.
1751 </summary>
1752 @@ -12345,7 +12429,7 @@ Domain allowed access.
1753 </summary>
1754 </param>
1755 </interface>
1756 -<interface name="corenet_send_all_packets" lineno="3356">
1757 +<interface name="corenet_send_all_packets" lineno="3374">
1758 <summary>
1759 Send all packets.
1760 </summary>
1761 @@ -12355,7 +12439,7 @@ Domain allowed access.
1762 </summary>
1763 </param>
1764 </interface>
1765 -<interface name="corenet_receive_all_packets" lineno="3374">
1766 +<interface name="corenet_receive_all_packets" lineno="3392">
1767 <summary>
1768 Receive all packets.
1769 </summary>
1770 @@ -12365,7 +12449,7 @@ Domain allowed access.
1771 </summary>
1772 </param>
1773 </interface>
1774 -<interface name="corenet_sendrecv_all_packets" lineno="3392">
1775 +<interface name="corenet_sendrecv_all_packets" lineno="3410">
1776 <summary>
1777 Send and receive all packets.
1778 </summary>
1779 @@ -12375,7 +12459,7 @@ Domain allowed access.
1780 </summary>
1781 </param>
1782 </interface>
1783 -<interface name="corenet_relabelto_all_packets" lineno="3407">
1784 +<interface name="corenet_relabelto_all_packets" lineno="3425">
1785 <summary>
1786 Relabel packets to any packet type.
1787 </summary>
1788 @@ -12385,7 +12469,7 @@ Domain allowed access.
1789 </summary>
1790 </param>
1791 </interface>
1792 -<interface name="corenet_ib_access_unlabeled_pkeys" lineno="3425">
1793 +<interface name="corenet_ib_access_unlabeled_pkeys" lineno="3443">
1794 <summary>
1795 Access unlabeled infiniband pkeys.
1796 </summary>
1797 @@ -12395,7 +12479,7 @@ Domain allowed access.
1798 </summary>
1799 </param>
1800 </interface>
1801 -<interface name="corenet_ib_access_all_pkeys" lineno="3439">
1802 +<interface name="corenet_ib_access_all_pkeys" lineno="3457">
1803 <summary>
1804 Access all labeled infiniband pkeys.
1805 </summary>
1806 @@ -12405,7 +12489,7 @@ Domain allowed access.
1807 </summary>
1808 </param>
1809 </interface>
1810 -<interface name="corenet_ib_manage_subnet_all_endports" lineno="3457">
1811 +<interface name="corenet_ib_manage_subnet_all_endports" lineno="3475">
1812 <summary>
1813 Manage subnets on all labeled Infiniband endports
1814 </summary>
1815 @@ -12415,7 +12499,7 @@ Domain allowed access.
1816 </summary>
1817 </param>
1818 </interface>
1819 -<interface name="corenet_ib_manage_subnet_unlabeled_endports" lineno="3475">
1820 +<interface name="corenet_ib_manage_subnet_unlabeled_endports" lineno="3493">
1821 <summary>
1822 Manage subnet on all unlabeled Infiniband endports
1823 </summary>
1824 @@ -12425,7 +12509,7 @@ Domain allowed access.
1825 </summary>
1826 </param>
1827 </interface>
1828 -<interface name="corenet_sctp_recvfrom_labeled" lineno="3494">
1829 +<interface name="corenet_sctp_recvfrom_labeled" lineno="3512">
1830 <summary>
1831 Rules for receiving labeled SCTP packets.
1832 </summary>
1833 @@ -12440,7 +12524,7 @@ Peer domain.
1834 </summary>
1835 </param>
1836 </interface>
1837 -<interface name="corenet_unconfined" lineno="3517">
1838 +<interface name="corenet_unconfined" lineno="3535">
1839 <summary>
1840 Unconfined access to network objects.
1841 </summary>
1842 @@ -12450,7 +12534,7 @@ The domain allowed access.
1843 </summary>
1844 </param>
1845 </interface>
1846 -<interface name="corenet_send_icmp_packets" lineno="3537">
1847 +<interface name="corenet_send_icmp_packets" lineno="3555">
1848 <summary>
1849 Send icmp packets.
1850 </summary>
1851 @@ -12461,7 +12545,7 @@ Domain allowed access.
1852 </param>
1853 <infoflow type="write" weight="10"/>
1854 </interface>
1855 -<interface name="corenet_dontaudit_send_icmp_packets" lineno="3556">
1856 +<interface name="corenet_dontaudit_send_icmp_packets" lineno="3574">
1857 <summary>
1858 Do not audit attempts to send icmp packets.
1859 </summary>
1860 @@ -12472,7 +12556,7 @@ Domain to not audit.
1861 </param>
1862 <infoflow type="none"/>
1863 </interface>
1864 -<interface name="corenet_receive_icmp_packets" lineno="3575">
1865 +<interface name="corenet_receive_icmp_packets" lineno="3593">
1866 <summary>
1867 Receive icmp packets.
1868 </summary>
1869 @@ -12483,7 +12567,7 @@ Domain allowed access.
1870 </param>
1871 <infoflow type="read" weight="10"/>
1872 </interface>
1873 -<interface name="corenet_dontaudit_receive_icmp_packets" lineno="3594">
1874 +<interface name="corenet_dontaudit_receive_icmp_packets" lineno="3612">
1875 <summary>
1876 Do not audit attempts to receive icmp packets.
1877 </summary>
1878 @@ -12494,7 +12578,7 @@ Domain allowed access.
1879 </param>
1880 <infoflow type="none"/>
1881 </interface>
1882 -<interface name="corenet_sendrecv_icmp_packets" lineno="3613">
1883 +<interface name="corenet_sendrecv_icmp_packets" lineno="3631">
1884 <summary>
1885 Send and receive icmp packets.
1886 </summary>
1887 @@ -12505,7 +12589,7 @@ Domain allowed access.
1888 </param>
1889 <infoflow type="both" weight="10"/>
1890 </interface>
1891 -<interface name="corenet_dontaudit_sendrecv_icmp_packets" lineno="3629">
1892 +<interface name="corenet_dontaudit_sendrecv_icmp_packets" lineno="3647">
1893 <summary>
1894 Do not audit attempts to send and receive icmp packets.
1895 </summary>
1896 @@ -12516,7 +12600,7 @@ Domain to not audit.
1897 </param>
1898 <infoflow type="none"/>
1899 </interface>
1900 -<interface name="corenet_relabelto_icmp_packets" lineno="3644">
1901 +<interface name="corenet_relabelto_icmp_packets" lineno="3662">
1902 <summary>
1903 Relabel packets to icmp the packet type.
1904 </summary>
1905 @@ -12526,7 +12610,7 @@ Domain allowed access.
1906 </summary>
1907 </param>
1908 </interface>
1909 -<interface name="corenet_tcp_sendrecv_adb_port" lineno="3666">
1910 +<interface name="corenet_tcp_sendrecv_adb_port" lineno="3684">
1911 <summary>
1912 Send and receive TCP traffic on the adb port.
1913 </summary>
1914 @@ -12537,7 +12621,7 @@ Domain allowed access.
1915 </param>
1916 <infoflow type="both" weight="10"/>
1917 </interface>
1918 -<interface name="corenet_udp_send_adb_port" lineno="3681">
1919 +<interface name="corenet_udp_send_adb_port" lineno="3699">
1920 <summary>
1921 Send UDP traffic on the adb port.
1922 </summary>
1923 @@ -12548,7 +12632,7 @@ Domain allowed access.
1924 </param>
1925 <infoflow type="write" weight="10"/>
1926 </interface>
1927 -<interface name="corenet_dontaudit_udp_send_adb_port" lineno="3696">
1928 +<interface name="corenet_dontaudit_udp_send_adb_port" lineno="3714">
1929 <summary>
1930 Do not audit attempts to send UDP traffic on the adb port.
1931 </summary>
1932 @@ -12559,7 +12643,7 @@ Domain to not audit.
1933 </param>
1934 <infoflow type="none"/>
1935 </interface>
1936 -<interface name="corenet_udp_receive_adb_port" lineno="3711">
1937 +<interface name="corenet_udp_receive_adb_port" lineno="3729">
1938 <summary>
1939 Receive UDP traffic on the adb port.
1940 </summary>
1941 @@ -12570,7 +12654,7 @@ Domain allowed access.
1942 </param>
1943 <infoflow type="read" weight="10"/>
1944 </interface>
1945 -<interface name="corenet_dontaudit_udp_receive_adb_port" lineno="3726">
1946 +<interface name="corenet_dontaudit_udp_receive_adb_port" lineno="3744">
1947 <summary>
1948 Do not audit attempts to receive UDP traffic on the adb port.
1949 </summary>
1950 @@ -12581,7 +12665,7 @@ Domain to not audit.
1951 </param>
1952 <infoflow type="none"/>
1953 </interface>
1954 -<interface name="corenet_udp_sendrecv_adb_port" lineno="3741">
1955 +<interface name="corenet_udp_sendrecv_adb_port" lineno="3759">
1956 <summary>
1957 Send and receive UDP traffic on the adb port.
1958 </summary>
1959 @@ -12592,7 +12676,7 @@ Domain allowed access.
1960 </param>
1961 <infoflow type="both" weight="10"/>
1962 </interface>
1963 -<interface name="corenet_dontaudit_udp_sendrecv_adb_port" lineno="3757">
1964 +<interface name="corenet_dontaudit_udp_sendrecv_adb_port" lineno="3775">
1965 <summary>
1966 Do not audit attempts to send and receive
1967 UDP traffic on the adb port.
1968 @@ -12604,7 +12688,7 @@ Domain to not audit.
1969 </param>
1970 <infoflow type="none"/>
1971 </interface>
1972 -<interface name="corenet_tcp_bind_adb_port" lineno="3772">
1973 +<interface name="corenet_tcp_bind_adb_port" lineno="3790">
1974 <summary>
1975 Bind TCP sockets to the adb port.
1976 </summary>
1977 @@ -12615,7 +12699,7 @@ Domain allowed access.
1978 </param>
1979 <infoflow type="none"/>
1980 </interface>
1981 -<interface name="corenet_udp_bind_adb_port" lineno="3792">
1982 +<interface name="corenet_udp_bind_adb_port" lineno="3810">
1983 <summary>
1984 Bind UDP sockets to the adb port.
1985 </summary>
1986 @@ -12626,7 +12710,7 @@ Domain allowed access.
1987 </param>
1988 <infoflow type="none"/>
1989 </interface>
1990 -<interface name="corenet_tcp_connect_adb_port" lineno="3811">
1991 +<interface name="corenet_tcp_connect_adb_port" lineno="3829">
1992 <summary>
1993 Make a TCP connection to the adb port.
1994 </summary>
1995 @@ -12636,7 +12720,7 @@ Domain allowed access.
1996 </summary>
1997 </param>
1998 </interface>
1999 -<interface name="corenet_send_adb_client_packets" lineno="3831">
2000 +<interface name="corenet_send_adb_client_packets" lineno="3849">
2001 <summary>
2002 Send adb_client packets.
2003 </summary>
2004 @@ -12647,7 +12731,7 @@ Domain allowed access.
2005 </param>
2006 <infoflow type="write" weight="10"/>
2007 </interface>
2008 -<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3850">
2009 +<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3868">
2010 <summary>
2011 Do not audit attempts to send adb_client packets.
2012 </summary>
2013 @@ -12658,7 +12742,7 @@ Domain to not audit.
2014 </param>
2015 <infoflow type="none"/>
2016 </interface>
2017 -<interface name="corenet_receive_adb_client_packets" lineno="3869">
2018 +<interface name="corenet_receive_adb_client_packets" lineno="3887">
2019 <summary>
2020 Receive adb_client packets.
2021 </summary>
2022 @@ -12669,7 +12753,7 @@ Domain allowed access.
2023 </param>
2024 <infoflow type="read" weight="10"/>
2025 </interface>
2026 -<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3888">
2027 +<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3906">
2028 <summary>
2029 Do not audit attempts to receive adb_client packets.
2030 </summary>
2031 @@ -12680,7 +12764,7 @@ Domain allowed access.
2032 </param>
2033 <infoflow type="none"/>
2034 </interface>
2035 -<interface name="corenet_sendrecv_adb_client_packets" lineno="3907">
2036 +<interface name="corenet_sendrecv_adb_client_packets" lineno="3925">
2037 <summary>
2038 Send and receive adb_client packets.
2039 </summary>
2040 @@ -12691,7 +12775,7 @@ Domain allowed access.
2041 </param>
2042 <infoflow type="both" weight="10"/>
2043 </interface>
2044 -<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3923">
2045 +<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3941">
2046 <summary>
2047 Do not audit attempts to send and receive adb_client packets.
2048 </summary>
2049 @@ -12702,7 +12786,7 @@ Domain to not audit.
2050 </param>
2051 <infoflow type="none"/>
2052 </interface>
2053 -<interface name="corenet_relabelto_adb_client_packets" lineno="3938">
2054 +<interface name="corenet_relabelto_adb_client_packets" lineno="3956">
2055 <summary>
2056 Relabel packets to adb_client the packet type.
2057 </summary>
2058 @@ -12712,7 +12796,7 @@ Domain allowed access.
2059 </summary>
2060 </param>
2061 </interface>
2062 -<interface name="corenet_send_adb_server_packets" lineno="3958">
2063 +<interface name="corenet_send_adb_server_packets" lineno="3976">
2064 <summary>
2065 Send adb_server packets.
2066 </summary>
2067 @@ -12723,7 +12807,7 @@ Domain allowed access.
2068 </param>
2069 <infoflow type="write" weight="10"/>
2070 </interface>
2071 -<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3977">
2072 +<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3995">
2073 <summary>
2074 Do not audit attempts to send adb_server packets.
2075 </summary>
2076 @@ -12734,7 +12818,7 @@ Domain to not audit.
2077 </param>
2078 <infoflow type="none"/>
2079 </interface>
2080 -<interface name="corenet_receive_adb_server_packets" lineno="3996">
2081 +<interface name="corenet_receive_adb_server_packets" lineno="4014">
2082 <summary>
2083 Receive adb_server packets.
2084 </summary>
2085 @@ -12745,7 +12829,7 @@ Domain allowed access.
2086 </param>
2087 <infoflow type="read" weight="10"/>
2088 </interface>
2089 -<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="4015">
2090 +<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="4033">
2091 <summary>
2092 Do not audit attempts to receive adb_server packets.
2093 </summary>
2094 @@ -12756,7 +12840,7 @@ Domain allowed access.
2095 </param>
2096 <infoflow type="none"/>
2097 </interface>
2098 -<interface name="corenet_sendrecv_adb_server_packets" lineno="4034">
2099 +<interface name="corenet_sendrecv_adb_server_packets" lineno="4052">
2100 <summary>
2101 Send and receive adb_server packets.
2102 </summary>
2103 @@ -12767,7 +12851,7 @@ Domain allowed access.
2104 </param>
2105 <infoflow type="both" weight="10"/>
2106 </interface>
2107 -<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="4050">
2108 +<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="4068">
2109 <summary>
2110 Do not audit attempts to send and receive adb_server packets.
2111 </summary>
2112 @@ -12778,7 +12862,7 @@ Domain to not audit.
2113 </param>
2114 <infoflow type="none"/>
2115 </interface>
2116 -<interface name="corenet_relabelto_adb_server_packets" lineno="4065">
2117 +<interface name="corenet_relabelto_adb_server_packets" lineno="4083">
2118 <summary>
2119 Relabel packets to adb_server the packet type.
2120 </summary>
2121 @@ -12788,7 +12872,7 @@ Domain allowed access.
2122 </summary>
2123 </param>
2124 </interface>
2125 -<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="4087">
2126 +<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="4105">
2127 <summary>
2128 Send and receive TCP traffic on the afs_bos port.
2129 </summary>
2130 @@ -12799,7 +12883,7 @@ Domain allowed access.
2131 </param>
2132 <infoflow type="both" weight="10"/>
2133 </interface>
2134 -<interface name="corenet_udp_send_afs_bos_port" lineno="4102">
2135 +<interface name="corenet_udp_send_afs_bos_port" lineno="4120">
2136 <summary>
2137 Send UDP traffic on the afs_bos port.
2138 </summary>
2139 @@ -12810,7 +12894,7 @@ Domain allowed access.
2140 </param>
2141 <infoflow type="write" weight="10"/>
2142 </interface>
2143 -<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="4117">
2144 +<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="4135">
2145 <summary>
2146 Do not audit attempts to send UDP traffic on the afs_bos port.
2147 </summary>
2148 @@ -12821,7 +12905,7 @@ Domain to not audit.
2149 </param>
2150 <infoflow type="none"/>
2151 </interface>
2152 -<interface name="corenet_udp_receive_afs_bos_port" lineno="4132">
2153 +<interface name="corenet_udp_receive_afs_bos_port" lineno="4150">
2154 <summary>
2155 Receive UDP traffic on the afs_bos port.
2156 </summary>
2157 @@ -12832,7 +12916,7 @@ Domain allowed access.
2158 </param>
2159 <infoflow type="read" weight="10"/>
2160 </interface>
2161 -<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="4147">
2162 +<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="4165">
2163 <summary>
2164 Do not audit attempts to receive UDP traffic on the afs_bos port.
2165 </summary>
2166 @@ -12843,7 +12927,7 @@ Domain to not audit.
2167 </param>
2168 <infoflow type="none"/>
2169 </interface>
2170 -<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="4162">
2171 +<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="4180">
2172 <summary>
2173 Send and receive UDP traffic on the afs_bos port.
2174 </summary>
2175 @@ -12854,7 +12938,7 @@ Domain allowed access.
2176 </param>
2177 <infoflow type="both" weight="10"/>
2178 </interface>
2179 -<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="4178">
2180 +<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="4196">
2181 <summary>
2182 Do not audit attempts to send and receive
2183 UDP traffic on the afs_bos port.
2184 @@ -12866,7 +12950,7 @@ Domain to not audit.
2185 </param>
2186 <infoflow type="none"/>
2187 </interface>
2188 -<interface name="corenet_tcp_bind_afs_bos_port" lineno="4193">
2189 +<interface name="corenet_tcp_bind_afs_bos_port" lineno="4211">
2190 <summary>
2191 Bind TCP sockets to the afs_bos port.
2192 </summary>
2193 @@ -12877,7 +12961,7 @@ Domain allowed access.
2194 </param>
2195 <infoflow type="none"/>
2196 </interface>
2197 -<interface name="corenet_udp_bind_afs_bos_port" lineno="4213">
2198 +<interface name="corenet_udp_bind_afs_bos_port" lineno="4231">
2199 <summary>
2200 Bind UDP sockets to the afs_bos port.
2201 </summary>
2202 @@ -12888,7 +12972,7 @@ Domain allowed access.
2203 </param>
2204 <infoflow type="none"/>
2205 </interface>
2206 -<interface name="corenet_tcp_connect_afs_bos_port" lineno="4232">
2207 +<interface name="corenet_tcp_connect_afs_bos_port" lineno="4250">
2208 <summary>
2209 Make a TCP connection to the afs_bos port.
2210 </summary>
2211 @@ -12898,7 +12982,7 @@ Domain allowed access.
2212 </summary>
2213 </param>
2214 </interface>
2215 -<interface name="corenet_send_afs_bos_client_packets" lineno="4252">
2216 +<interface name="corenet_send_afs_bos_client_packets" lineno="4270">
2217 <summary>
2218 Send afs_bos_client packets.
2219 </summary>
2220 @@ -12909,7 +12993,7 @@ Domain allowed access.
2221 </param>
2222 <infoflow type="write" weight="10"/>
2223 </interface>
2224 -<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4271">
2225 +<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4289">
2226 <summary>
2227 Do not audit attempts to send afs_bos_client packets.
2228 </summary>
2229 @@ -12920,7 +13004,7 @@ Domain to not audit.
2230 </param>
2231 <infoflow type="none"/>
2232 </interface>
2233 -<interface name="corenet_receive_afs_bos_client_packets" lineno="4290">
2234 +<interface name="corenet_receive_afs_bos_client_packets" lineno="4308">
2235 <summary>
2236 Receive afs_bos_client packets.
2237 </summary>
2238 @@ -12931,7 +13015,7 @@ Domain allowed access.
2239 </param>
2240 <infoflow type="read" weight="10"/>
2241 </interface>
2242 -<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4309">
2243 +<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4327">
2244 <summary>
2245 Do not audit attempts to receive afs_bos_client packets.
2246 </summary>
2247 @@ -12942,7 +13026,7 @@ Domain allowed access.
2248 </param>
2249 <infoflow type="none"/>
2250 </interface>
2251 -<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4328">
2252 +<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4346">
2253 <summary>
2254 Send and receive afs_bos_client packets.
2255 </summary>
2256 @@ -12953,7 +13037,7 @@ Domain allowed access.
2257 </param>
2258 <infoflow type="both" weight="10"/>
2259 </interface>
2260 -<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4344">
2261 +<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4362">
2262 <summary>
2263 Do not audit attempts to send and receive afs_bos_client packets.
2264 </summary>
2265 @@ -12964,7 +13048,7 @@ Domain to not audit.
2266 </param>
2267 <infoflow type="none"/>
2268 </interface>
2269 -<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4359">
2270 +<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4377">
2271 <summary>
2272 Relabel packets to afs_bos_client the packet type.
2273 </summary>
2274 @@ -12974,7 +13058,7 @@ Domain allowed access.
2275 </summary>
2276 </param>
2277 </interface>
2278 -<interface name="corenet_send_afs_bos_server_packets" lineno="4379">
2279 +<interface name="corenet_send_afs_bos_server_packets" lineno="4397">
2280 <summary>
2281 Send afs_bos_server packets.
2282 </summary>
2283 @@ -12985,7 +13069,7 @@ Domain allowed access.
2284 </param>
2285 <infoflow type="write" weight="10"/>
2286 </interface>
2287 -<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4398">
2288 +<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4416">
2289 <summary>
2290 Do not audit attempts to send afs_bos_server packets.
2291 </summary>
2292 @@ -12996,7 +13080,7 @@ Domain to not audit.
2293 </param>
2294 <infoflow type="none"/>
2295 </interface>
2296 -<interface name="corenet_receive_afs_bos_server_packets" lineno="4417">
2297 +<interface name="corenet_receive_afs_bos_server_packets" lineno="4435">
2298 <summary>
2299 Receive afs_bos_server packets.
2300 </summary>
2301 @@ -13007,7 +13091,7 @@ Domain allowed access.
2302 </param>
2303 <infoflow type="read" weight="10"/>
2304 </interface>
2305 -<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4436">
2306 +<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4454">
2307 <summary>
2308 Do not audit attempts to receive afs_bos_server packets.
2309 </summary>
2310 @@ -13018,7 +13102,7 @@ Domain allowed access.
2311 </param>
2312 <infoflow type="none"/>
2313 </interface>
2314 -<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4455">
2315 +<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4473">
2316 <summary>
2317 Send and receive afs_bos_server packets.
2318 </summary>
2319 @@ -13029,7 +13113,7 @@ Domain allowed access.
2320 </param>
2321 <infoflow type="both" weight="10"/>
2322 </interface>
2323 -<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4471">
2324 +<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4489">
2325 <summary>
2326 Do not audit attempts to send and receive afs_bos_server packets.
2327 </summary>
2328 @@ -13040,7 +13124,7 @@ Domain to not audit.
2329 </param>
2330 <infoflow type="none"/>
2331 </interface>
2332 -<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4486">
2333 +<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4504">
2334 <summary>
2335 Relabel packets to afs_bos_server the packet type.
2336 </summary>
2337 @@ -13050,7 +13134,7 @@ Domain allowed access.
2338 </summary>
2339 </param>
2340 </interface>
2341 -<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="4508">
2342 +<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="4526">
2343 <summary>
2344 Send and receive TCP traffic on the afs_fs port.
2345 </summary>
2346 @@ -13061,7 +13145,7 @@ Domain allowed access.
2347 </param>
2348 <infoflow type="both" weight="10"/>
2349 </interface>
2350 -<interface name="corenet_udp_send_afs_fs_port" lineno="4523">
2351 +<interface name="corenet_udp_send_afs_fs_port" lineno="4541">
2352 <summary>
2353 Send UDP traffic on the afs_fs port.
2354 </summary>
2355 @@ -13072,7 +13156,7 @@ Domain allowed access.
2356 </param>
2357 <infoflow type="write" weight="10"/>
2358 </interface>
2359 -<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="4538">
2360 +<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="4556">
2361 <summary>
2362 Do not audit attempts to send UDP traffic on the afs_fs port.
2363 </summary>
2364 @@ -13083,7 +13167,7 @@ Domain to not audit.
2365 </param>
2366 <infoflow type="none"/>
2367 </interface>
2368 -<interface name="corenet_udp_receive_afs_fs_port" lineno="4553">
2369 +<interface name="corenet_udp_receive_afs_fs_port" lineno="4571">
2370 <summary>
2371 Receive UDP traffic on the afs_fs port.
2372 </summary>
2373 @@ -13094,7 +13178,7 @@ Domain allowed access.
2374 </param>
2375 <infoflow type="read" weight="10"/>
2376 </interface>
2377 -<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="4568">
2378 +<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="4586">
2379 <summary>
2380 Do not audit attempts to receive UDP traffic on the afs_fs port.
2381 </summary>
2382 @@ -13105,7 +13189,7 @@ Domain to not audit.
2383 </param>
2384 <infoflow type="none"/>
2385 </interface>
2386 -<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="4583">
2387 +<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="4601">
2388 <summary>
2389 Send and receive UDP traffic on the afs_fs port.
2390 </summary>
2391 @@ -13116,7 +13200,7 @@ Domain allowed access.
2392 </param>
2393 <infoflow type="both" weight="10"/>
2394 </interface>
2395 -<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="4599">
2396 +<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="4617">
2397 <summary>
2398 Do not audit attempts to send and receive
2399 UDP traffic on the afs_fs port.
2400 @@ -13128,7 +13212,7 @@ Domain to not audit.
2401 </param>
2402 <infoflow type="none"/>
2403 </interface>
2404 -<interface name="corenet_tcp_bind_afs_fs_port" lineno="4614">
2405 +<interface name="corenet_tcp_bind_afs_fs_port" lineno="4632">
2406 <summary>
2407 Bind TCP sockets to the afs_fs port.
2408 </summary>
2409 @@ -13139,7 +13223,7 @@ Domain allowed access.
2410 </param>
2411 <infoflow type="none"/>
2412 </interface>
2413 -<interface name="corenet_udp_bind_afs_fs_port" lineno="4634">
2414 +<interface name="corenet_udp_bind_afs_fs_port" lineno="4652">
2415 <summary>
2416 Bind UDP sockets to the afs_fs port.
2417 </summary>
2418 @@ -13150,7 +13234,7 @@ Domain allowed access.
2419 </param>
2420 <infoflow type="none"/>
2421 </interface>
2422 -<interface name="corenet_tcp_connect_afs_fs_port" lineno="4653">
2423 +<interface name="corenet_tcp_connect_afs_fs_port" lineno="4671">
2424 <summary>
2425 Make a TCP connection to the afs_fs port.
2426 </summary>
2427 @@ -13160,7 +13244,7 @@ Domain allowed access.
2428 </summary>
2429 </param>
2430 </interface>
2431 -<interface name="corenet_send_afs_fs_client_packets" lineno="4673">
2432 +<interface name="corenet_send_afs_fs_client_packets" lineno="4691">
2433 <summary>
2434 Send afs_fs_client packets.
2435 </summary>
2436 @@ -13171,7 +13255,7 @@ Domain allowed access.
2437 </param>
2438 <infoflow type="write" weight="10"/>
2439 </interface>
2440 -<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4692">
2441 +<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4710">
2442 <summary>
2443 Do not audit attempts to send afs_fs_client packets.
2444 </summary>
2445 @@ -13182,7 +13266,7 @@ Domain to not audit.
2446 </param>
2447 <infoflow type="none"/>
2448 </interface>
2449 -<interface name="corenet_receive_afs_fs_client_packets" lineno="4711">
2450 +<interface name="corenet_receive_afs_fs_client_packets" lineno="4729">
2451 <summary>
2452 Receive afs_fs_client packets.
2453 </summary>
2454 @@ -13193,7 +13277,7 @@ Domain allowed access.
2455 </param>
2456 <infoflow type="read" weight="10"/>
2457 </interface>
2458 -<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4730">
2459 +<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4748">
2460 <summary>
2461 Do not audit attempts to receive afs_fs_client packets.
2462 </summary>
2463 @@ -13204,7 +13288,7 @@ Domain allowed access.
2464 </param>
2465 <infoflow type="none"/>
2466 </interface>
2467 -<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4749">
2468 +<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4767">
2469 <summary>
2470 Send and receive afs_fs_client packets.
2471 </summary>
2472 @@ -13215,7 +13299,7 @@ Domain allowed access.
2473 </param>
2474 <infoflow type="both" weight="10"/>
2475 </interface>
2476 -<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4765">
2477 +<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4783">
2478 <summary>
2479 Do not audit attempts to send and receive afs_fs_client packets.
2480 </summary>
2481 @@ -13226,7 +13310,7 @@ Domain to not audit.
2482 </param>
2483 <infoflow type="none"/>
2484 </interface>
2485 -<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4780">
2486 +<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4798">
2487 <summary>
2488 Relabel packets to afs_fs_client the packet type.
2489 </summary>
2490 @@ -13236,7 +13320,7 @@ Domain allowed access.
2491 </summary>
2492 </param>
2493 </interface>
2494 -<interface name="corenet_send_afs_fs_server_packets" lineno="4800">
2495 +<interface name="corenet_send_afs_fs_server_packets" lineno="4818">
2496 <summary>
2497 Send afs_fs_server packets.
2498 </summary>
2499 @@ -13247,7 +13331,7 @@ Domain allowed access.
2500 </param>
2501 <infoflow type="write" weight="10"/>
2502 </interface>
2503 -<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4819">
2504 +<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4837">
2505 <summary>
2506 Do not audit attempts to send afs_fs_server packets.
2507 </summary>
2508 @@ -13258,7 +13342,7 @@ Domain to not audit.
2509 </param>
2510 <infoflow type="none"/>
2511 </interface>
2512 -<interface name="corenet_receive_afs_fs_server_packets" lineno="4838">
2513 +<interface name="corenet_receive_afs_fs_server_packets" lineno="4856">
2514 <summary>
2515 Receive afs_fs_server packets.
2516 </summary>
2517 @@ -13269,7 +13353,7 @@ Domain allowed access.
2518 </param>
2519 <infoflow type="read" weight="10"/>
2520 </interface>
2521 -<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4857">
2522 +<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4875">
2523 <summary>
2524 Do not audit attempts to receive afs_fs_server packets.
2525 </summary>
2526 @@ -13280,7 +13364,7 @@ Domain allowed access.
2527 </param>
2528 <infoflow type="none"/>
2529 </interface>
2530 -<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4876">
2531 +<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4894">
2532 <summary>
2533 Send and receive afs_fs_server packets.
2534 </summary>
2535 @@ -13291,7 +13375,7 @@ Domain allowed access.
2536 </param>
2537 <infoflow type="both" weight="10"/>
2538 </interface>
2539 -<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4892">
2540 +<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4910">
2541 <summary>
2542 Do not audit attempts to send and receive afs_fs_server packets.
2543 </summary>
2544 @@ -13302,7 +13386,7 @@ Domain to not audit.
2545 </param>
2546 <infoflow type="none"/>
2547 </interface>
2548 -<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4907">
2549 +<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4925">
2550 <summary>
2551 Relabel packets to afs_fs_server the packet type.
2552 </summary>
2553 @@ -13312,7 +13396,7 @@ Domain allowed access.
2554 </summary>
2555 </param>
2556 </interface>
2557 -<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4929">
2558 +<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4947">
2559 <summary>
2560 Send and receive TCP traffic on the afs_ka port.
2561 </summary>
2562 @@ -13323,7 +13407,7 @@ Domain allowed access.
2563 </param>
2564 <infoflow type="both" weight="10"/>
2565 </interface>
2566 -<interface name="corenet_udp_send_afs_ka_port" lineno="4944">
2567 +<interface name="corenet_udp_send_afs_ka_port" lineno="4962">
2568 <summary>
2569 Send UDP traffic on the afs_ka port.
2570 </summary>
2571 @@ -13334,7 +13418,7 @@ Domain allowed access.
2572 </param>
2573 <infoflow type="write" weight="10"/>
2574 </interface>
2575 -<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4959">
2576 +<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4977">
2577 <summary>
2578 Do not audit attempts to send UDP traffic on the afs_ka port.
2579 </summary>
2580 @@ -13345,7 +13429,7 @@ Domain to not audit.
2581 </param>
2582 <infoflow type="none"/>
2583 </interface>
2584 -<interface name="corenet_udp_receive_afs_ka_port" lineno="4974">
2585 +<interface name="corenet_udp_receive_afs_ka_port" lineno="4992">
2586 <summary>
2587 Receive UDP traffic on the afs_ka port.
2588 </summary>
2589 @@ -13356,7 +13440,7 @@ Domain allowed access.
2590 </param>
2591 <infoflow type="read" weight="10"/>
2592 </interface>
2593 -<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="4989">
2594 +<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="5007">
2595 <summary>
2596 Do not audit attempts to receive UDP traffic on the afs_ka port.
2597 </summary>
2598 @@ -13367,7 +13451,7 @@ Domain to not audit.
2599 </param>
2600 <infoflow type="none"/>
2601 </interface>
2602 -<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="5004">
2603 +<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="5022">
2604 <summary>
2605 Send and receive UDP traffic on the afs_ka port.
2606 </summary>
2607 @@ -13378,7 +13462,7 @@ Domain allowed access.
2608 </param>
2609 <infoflow type="both" weight="10"/>
2610 </interface>
2611 -<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="5020">
2612 +<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="5038">
2613 <summary>
2614 Do not audit attempts to send and receive
2615 UDP traffic on the afs_ka port.
2616 @@ -13390,7 +13474,7 @@ Domain to not audit.
2617 </param>
2618 <infoflow type="none"/>
2619 </interface>
2620 -<interface name="corenet_tcp_bind_afs_ka_port" lineno="5035">
2621 +<interface name="corenet_tcp_bind_afs_ka_port" lineno="5053">
2622 <summary>
2623 Bind TCP sockets to the afs_ka port.
2624 </summary>
2625 @@ -13401,7 +13485,7 @@ Domain allowed access.
2626 </param>
2627 <infoflow type="none"/>
2628 </interface>
2629 -<interface name="corenet_udp_bind_afs_ka_port" lineno="5055">
2630 +<interface name="corenet_udp_bind_afs_ka_port" lineno="5073">
2631 <summary>
2632 Bind UDP sockets to the afs_ka port.
2633 </summary>
2634 @@ -13412,7 +13496,7 @@ Domain allowed access.
2635 </param>
2636 <infoflow type="none"/>
2637 </interface>
2638 -<interface name="corenet_tcp_connect_afs_ka_port" lineno="5074">
2639 +<interface name="corenet_tcp_connect_afs_ka_port" lineno="5092">
2640 <summary>
2641 Make a TCP connection to the afs_ka port.
2642 </summary>
2643 @@ -13422,7 +13506,7 @@ Domain allowed access.
2644 </summary>
2645 </param>
2646 </interface>
2647 -<interface name="corenet_send_afs_ka_client_packets" lineno="5094">
2648 +<interface name="corenet_send_afs_ka_client_packets" lineno="5112">
2649 <summary>
2650 Send afs_ka_client packets.
2651 </summary>
2652 @@ -13433,7 +13517,7 @@ Domain allowed access.
2653 </param>
2654 <infoflow type="write" weight="10"/>
2655 </interface>
2656 -<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="5113">
2657 +<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="5131">
2658 <summary>
2659 Do not audit attempts to send afs_ka_client packets.
2660 </summary>
2661 @@ -13444,7 +13528,7 @@ Domain to not audit.
2662 </param>
2663 <infoflow type="none"/>
2664 </interface>
2665 -<interface name="corenet_receive_afs_ka_client_packets" lineno="5132">
2666 +<interface name="corenet_receive_afs_ka_client_packets" lineno="5150">
2667 <summary>
2668 Receive afs_ka_client packets.
2669 </summary>
2670 @@ -13455,7 +13539,7 @@ Domain allowed access.
2671 </param>
2672 <infoflow type="read" weight="10"/>
2673 </interface>
2674 -<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="5151">
2675 +<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="5169">
2676 <summary>
2677 Do not audit attempts to receive afs_ka_client packets.
2678 </summary>
2679 @@ -13466,7 +13550,7 @@ Domain allowed access.
2680 </param>
2681 <infoflow type="none"/>
2682 </interface>
2683 -<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="5170">
2684 +<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="5188">
2685 <summary>
2686 Send and receive afs_ka_client packets.
2687 </summary>
2688 @@ -13477,7 +13561,7 @@ Domain allowed access.
2689 </param>
2690 <infoflow type="both" weight="10"/>
2691 </interface>
2692 -<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="5186">
2693 +<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="5204">
2694 <summary>
2695 Do not audit attempts to send and receive afs_ka_client packets.
2696 </summary>
2697 @@ -13488,7 +13572,7 @@ Domain to not audit.
2698 </param>
2699 <infoflow type="none"/>
2700 </interface>
2701 -<interface name="corenet_relabelto_afs_ka_client_packets" lineno="5201">
2702 +<interface name="corenet_relabelto_afs_ka_client_packets" lineno="5219">
2703 <summary>
2704 Relabel packets to afs_ka_client the packet type.
2705 </summary>
2706 @@ -13498,7 +13582,7 @@ Domain allowed access.
2707 </summary>
2708 </param>
2709 </interface>
2710 -<interface name="corenet_send_afs_ka_server_packets" lineno="5221">
2711 +<interface name="corenet_send_afs_ka_server_packets" lineno="5239">
2712 <summary>
2713 Send afs_ka_server packets.
2714 </summary>
2715 @@ -13509,7 +13593,7 @@ Domain allowed access.
2716 </param>
2717 <infoflow type="write" weight="10"/>
2718 </interface>
2719 -<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="5240">
2720 +<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="5258">
2721 <summary>
2722 Do not audit attempts to send afs_ka_server packets.
2723 </summary>
2724 @@ -13520,7 +13604,7 @@ Domain to not audit.
2725 </param>
2726 <infoflow type="none"/>
2727 </interface>
2728 -<interface name="corenet_receive_afs_ka_server_packets" lineno="5259">
2729 +<interface name="corenet_receive_afs_ka_server_packets" lineno="5277">
2730 <summary>
2731 Receive afs_ka_server packets.
2732 </summary>
2733 @@ -13531,7 +13615,7 @@ Domain allowed access.
2734 </param>
2735 <infoflow type="read" weight="10"/>
2736 </interface>
2737 -<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="5278">
2738 +<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="5296">
2739 <summary>
2740 Do not audit attempts to receive afs_ka_server packets.
2741 </summary>
2742 @@ -13542,7 +13626,7 @@ Domain allowed access.
2743 </param>
2744 <infoflow type="none"/>
2745 </interface>
2746 -<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="5297">
2747 +<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="5315">
2748 <summary>
2749 Send and receive afs_ka_server packets.
2750 </summary>
2751 @@ -13553,7 +13637,7 @@ Domain allowed access.
2752 </param>
2753 <infoflow type="both" weight="10"/>
2754 </interface>
2755 -<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="5313">
2756 +<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="5331">
2757 <summary>
2758 Do not audit attempts to send and receive afs_ka_server packets.
2759 </summary>
2760 @@ -13564,7 +13648,7 @@ Domain to not audit.
2761 </param>
2762 <infoflow type="none"/>
2763 </interface>
2764 -<interface name="corenet_relabelto_afs_ka_server_packets" lineno="5328">
2765 +<interface name="corenet_relabelto_afs_ka_server_packets" lineno="5346">
2766 <summary>
2767 Relabel packets to afs_ka_server the packet type.
2768 </summary>
2769 @@ -13574,7 +13658,7 @@ Domain allowed access.
2770 </summary>
2771 </param>
2772 </interface>
2773 -<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="5350">
2774 +<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="5368">
2775 <summary>
2776 Send and receive TCP traffic on the afs_pt port.
2777 </summary>
2778 @@ -13585,7 +13669,7 @@ Domain allowed access.
2779 </param>
2780 <infoflow type="both" weight="10"/>
2781 </interface>
2782 -<interface name="corenet_udp_send_afs_pt_port" lineno="5365">
2783 +<interface name="corenet_udp_send_afs_pt_port" lineno="5383">
2784 <summary>
2785 Send UDP traffic on the afs_pt port.
2786 </summary>
2787 @@ -13596,7 +13680,7 @@ Domain allowed access.
2788 </param>
2789 <infoflow type="write" weight="10"/>
2790 </interface>
2791 -<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="5380">
2792 +<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="5398">
2793 <summary>
2794 Do not audit attempts to send UDP traffic on the afs_pt port.
2795 </summary>
2796 @@ -13607,7 +13691,7 @@ Domain to not audit.
2797 </param>
2798 <infoflow type="none"/>
2799 </interface>
2800 -<interface name="corenet_udp_receive_afs_pt_port" lineno="5395">
2801 +<interface name="corenet_udp_receive_afs_pt_port" lineno="5413">
2802 <summary>
2803 Receive UDP traffic on the afs_pt port.
2804 </summary>
2805 @@ -13618,7 +13702,7 @@ Domain allowed access.
2806 </param>
2807 <infoflow type="read" weight="10"/>
2808 </interface>
2809 -<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="5410">
2810 +<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="5428">
2811 <summary>
2812 Do not audit attempts to receive UDP traffic on the afs_pt port.
2813 </summary>
2814 @@ -13629,7 +13713,7 @@ Domain to not audit.
2815 </param>
2816 <infoflow type="none"/>
2817 </interface>
2818 -<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="5425">
2819 +<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="5443">
2820 <summary>
2821 Send and receive UDP traffic on the afs_pt port.
2822 </summary>
2823 @@ -13640,7 +13724,7 @@ Domain allowed access.
2824 </param>
2825 <infoflow type="both" weight="10"/>
2826 </interface>
2827 -<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="5441">
2828 +<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="5459">
2829 <summary>
2830 Do not audit attempts to send and receive
2831 UDP traffic on the afs_pt port.
2832 @@ -13652,7 +13736,7 @@ Domain to not audit.
2833 </param>
2834 <infoflow type="none"/>
2835 </interface>
2836 -<interface name="corenet_tcp_bind_afs_pt_port" lineno="5456">
2837 +<interface name="corenet_tcp_bind_afs_pt_port" lineno="5474">
2838 <summary>
2839 Bind TCP sockets to the afs_pt port.
2840 </summary>
2841 @@ -13663,7 +13747,7 @@ Domain allowed access.
2842 </param>
2843 <infoflow type="none"/>
2844 </interface>
2845 -<interface name="corenet_udp_bind_afs_pt_port" lineno="5476">
2846 +<interface name="corenet_udp_bind_afs_pt_port" lineno="5494">
2847 <summary>
2848 Bind UDP sockets to the afs_pt port.
2849 </summary>
2850 @@ -13674,7 +13758,7 @@ Domain allowed access.
2851 </param>
2852 <infoflow type="none"/>
2853 </interface>
2854 -<interface name="corenet_tcp_connect_afs_pt_port" lineno="5495">
2855 +<interface name="corenet_tcp_connect_afs_pt_port" lineno="5513">
2856 <summary>
2857 Make a TCP connection to the afs_pt port.
2858 </summary>
2859 @@ -13684,7 +13768,7 @@ Domain allowed access.
2860 </summary>
2861 </param>
2862 </interface>
2863 -<interface name="corenet_send_afs_pt_client_packets" lineno="5515">
2864 +<interface name="corenet_send_afs_pt_client_packets" lineno="5533">
2865 <summary>
2866 Send afs_pt_client packets.
2867 </summary>
2868 @@ -13695,7 +13779,7 @@ Domain allowed access.
2869 </param>
2870 <infoflow type="write" weight="10"/>
2871 </interface>
2872 -<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5534">
2873 +<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5552">
2874 <summary>
2875 Do not audit attempts to send afs_pt_client packets.
2876 </summary>
2877 @@ -13706,7 +13790,7 @@ Domain to not audit.
2878 </param>
2879 <infoflow type="none"/>
2880 </interface>
2881 -<interface name="corenet_receive_afs_pt_client_packets" lineno="5553">
2882 +<interface name="corenet_receive_afs_pt_client_packets" lineno="5571">
2883 <summary>
2884 Receive afs_pt_client packets.
2885 </summary>
2886 @@ -13717,7 +13801,7 @@ Domain allowed access.
2887 </param>
2888 <infoflow type="read" weight="10"/>
2889 </interface>
2890 -<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5572">
2891 +<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5590">
2892 <summary>
2893 Do not audit attempts to receive afs_pt_client packets.
2894 </summary>
2895 @@ -13728,7 +13812,7 @@ Domain allowed access.
2896 </param>
2897 <infoflow type="none"/>
2898 </interface>
2899 -<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5591">
2900 +<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5609">
2901 <summary>
2902 Send and receive afs_pt_client packets.
2903 </summary>
2904 @@ -13739,7 +13823,7 @@ Domain allowed access.
2905 </param>
2906 <infoflow type="both" weight="10"/>
2907 </interface>
2908 -<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5607">
2909 +<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5625">
2910 <summary>
2911 Do not audit attempts to send and receive afs_pt_client packets.
2912 </summary>
2913 @@ -13750,7 +13834,7 @@ Domain to not audit.
2914 </param>
2915 <infoflow type="none"/>
2916 </interface>
2917 -<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5622">
2918 +<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5640">
2919 <summary>
2920 Relabel packets to afs_pt_client the packet type.
2921 </summary>
2922 @@ -13760,7 +13844,7 @@ Domain allowed access.
2923 </summary>
2924 </param>
2925 </interface>
2926 -<interface name="corenet_send_afs_pt_server_packets" lineno="5642">
2927 +<interface name="corenet_send_afs_pt_server_packets" lineno="5660">
2928 <summary>
2929 Send afs_pt_server packets.
2930 </summary>
2931 @@ -13771,7 +13855,7 @@ Domain allowed access.
2932 </param>
2933 <infoflow type="write" weight="10"/>
2934 </interface>
2935 -<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5661">
2936 +<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5679">
2937 <summary>
2938 Do not audit attempts to send afs_pt_server packets.
2939 </summary>
2940 @@ -13782,7 +13866,7 @@ Domain to not audit.
2941 </param>
2942 <infoflow type="none"/>
2943 </interface>
2944 -<interface name="corenet_receive_afs_pt_server_packets" lineno="5680">
2945 +<interface name="corenet_receive_afs_pt_server_packets" lineno="5698">
2946 <summary>
2947 Receive afs_pt_server packets.
2948 </summary>
2949 @@ -13793,7 +13877,7 @@ Domain allowed access.
2950 </param>
2951 <infoflow type="read" weight="10"/>
2952 </interface>
2953 -<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5699">
2954 +<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5717">
2955 <summary>
2956 Do not audit attempts to receive afs_pt_server packets.
2957 </summary>
2958 @@ -13804,7 +13888,7 @@ Domain allowed access.
2959 </param>
2960 <infoflow type="none"/>
2961 </interface>
2962 -<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5718">
2963 +<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5736">
2964 <summary>
2965 Send and receive afs_pt_server packets.
2966 </summary>
2967 @@ -13815,7 +13899,7 @@ Domain allowed access.
2968 </param>
2969 <infoflow type="both" weight="10"/>
2970 </interface>
2971 -<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5734">
2972 +<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5752">
2973 <summary>
2974 Do not audit attempts to send and receive afs_pt_server packets.
2975 </summary>
2976 @@ -13826,7 +13910,7 @@ Domain to not audit.
2977 </param>
2978 <infoflow type="none"/>
2979 </interface>
2980 -<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5749">
2981 +<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5767">
2982 <summary>
2983 Relabel packets to afs_pt_server the packet type.
2984 </summary>
2985 @@ -13836,7 +13920,7 @@ Domain allowed access.
2986 </summary>
2987 </param>
2988 </interface>
2989 -<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="5771">
2990 +<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="5789">
2991 <summary>
2992 Send and receive TCP traffic on the afs_vl port.
2993 </summary>
2994 @@ -13847,7 +13931,7 @@ Domain allowed access.
2995 </param>
2996 <infoflow type="both" weight="10"/>
2997 </interface>
2998 -<interface name="corenet_udp_send_afs_vl_port" lineno="5786">
2999 +<interface name="corenet_udp_send_afs_vl_port" lineno="5804">
3000 <summary>
3001 Send UDP traffic on the afs_vl port.
3002 </summary>
3003 @@ -13858,7 +13942,7 @@ Domain allowed access.
3004 </param>
3005 <infoflow type="write" weight="10"/>
3006 </interface>
3007 -<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="5801">
3008 +<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="5819">
3009 <summary>
3010 Do not audit attempts to send UDP traffic on the afs_vl port.
3011 </summary>
3012 @@ -13869,7 +13953,7 @@ Domain to not audit.
3013 </param>
3014 <infoflow type="none"/>
3015 </interface>
3016 -<interface name="corenet_udp_receive_afs_vl_port" lineno="5816">
3017 +<interface name="corenet_udp_receive_afs_vl_port" lineno="5834">
3018 <summary>
3019 Receive UDP traffic on the afs_vl port.
3020 </summary>
3021 @@ -13880,7 +13964,7 @@ Domain allowed access.
3022 </param>
3023 <infoflow type="read" weight="10"/>
3024 </interface>
3025 -<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5831">
3026 +<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5849">
3027 <summary>
3028 Do not audit attempts to receive UDP traffic on the afs_vl port.
3029 </summary>
3030 @@ -13891,7 +13975,7 @@ Domain to not audit.
3031 </param>
3032 <infoflow type="none"/>
3033 </interface>
3034 -<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5846">
3035 +<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5864">
3036 <summary>
3037 Send and receive UDP traffic on the afs_vl port.
3038 </summary>
3039 @@ -13902,7 +13986,7 @@ Domain allowed access.
3040 </param>
3041 <infoflow type="both" weight="10"/>
3042 </interface>
3043 -<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5862">
3044 +<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5880">
3045 <summary>
3046 Do not audit attempts to send and receive
3047 UDP traffic on the afs_vl port.
3048 @@ -13914,7 +13998,7 @@ Domain to not audit.
3049 </param>
3050 <infoflow type="none"/>
3051 </interface>
3052 -<interface name="corenet_tcp_bind_afs_vl_port" lineno="5877">
3053 +<interface name="corenet_tcp_bind_afs_vl_port" lineno="5895">
3054 <summary>
3055 Bind TCP sockets to the afs_vl port.
3056 </summary>
3057 @@ -13925,7 +14009,7 @@ Domain allowed access.
3058 </param>
3059 <infoflow type="none"/>
3060 </interface>
3061 -<interface name="corenet_udp_bind_afs_vl_port" lineno="5897">
3062 +<interface name="corenet_udp_bind_afs_vl_port" lineno="5915">
3063 <summary>
3064 Bind UDP sockets to the afs_vl port.
3065 </summary>
3066 @@ -13936,7 +14020,7 @@ Domain allowed access.
3067 </param>
3068 <infoflow type="none"/>
3069 </interface>
3070 -<interface name="corenet_tcp_connect_afs_vl_port" lineno="5916">
3071 +<interface name="corenet_tcp_connect_afs_vl_port" lineno="5934">
3072 <summary>
3073 Make a TCP connection to the afs_vl port.
3074 </summary>
3075 @@ -13946,7 +14030,7 @@ Domain allowed access.
3076 </summary>
3077 </param>
3078 </interface>
3079 -<interface name="corenet_send_afs_vl_client_packets" lineno="5936">
3080 +<interface name="corenet_send_afs_vl_client_packets" lineno="5954">
3081 <summary>
3082 Send afs_vl_client packets.
3083 </summary>
3084 @@ -13957,7 +14041,7 @@ Domain allowed access.
3085 </param>
3086 <infoflow type="write" weight="10"/>
3087 </interface>
3088 -<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5955">
3089 +<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5973">
3090 <summary>
3091 Do not audit attempts to send afs_vl_client packets.
3092 </summary>
3093 @@ -13968,7 +14052,7 @@ Domain to not audit.
3094 </param>
3095 <infoflow type="none"/>
3096 </interface>
3097 -<interface name="corenet_receive_afs_vl_client_packets" lineno="5974">
3098 +<interface name="corenet_receive_afs_vl_client_packets" lineno="5992">
3099 <summary>
3100 Receive afs_vl_client packets.
3101 </summary>
3102 @@ -13979,7 +14063,7 @@ Domain allowed access.
3103 </param>
3104 <infoflow type="read" weight="10"/>
3105 </interface>
3106 -<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="5993">
3107 +<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="6011">
3108 <summary>
3109 Do not audit attempts to receive afs_vl_client packets.
3110 </summary>
3111 @@ -13990,7 +14074,7 @@ Domain allowed access.
3112 </param>
3113 <infoflow type="none"/>
3114 </interface>
3115 -<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="6012">
3116 +<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="6030">
3117 <summary>
3118 Send and receive afs_vl_client packets.
3119 </summary>
3120 @@ -14001,7 +14085,7 @@ Domain allowed access.
3121 </param>
3122 <infoflow type="both" weight="10"/>
3123 </interface>
3124 -<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="6028">
3125 +<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="6046">
3126 <summary>
3127 Do not audit attempts to send and receive afs_vl_client packets.
3128 </summary>
3129 @@ -14012,7 +14096,7 @@ Domain to not audit.
3130 </param>
3131 <infoflow type="none"/>
3132 </interface>
3133 -<interface name="corenet_relabelto_afs_vl_client_packets" lineno="6043">
3134 +<interface name="corenet_relabelto_afs_vl_client_packets" lineno="6061">
3135 <summary>
3136 Relabel packets to afs_vl_client the packet type.
3137 </summary>
3138 @@ -14022,7 +14106,7 @@ Domain allowed access.
3139 </summary>
3140 </param>
3141 </interface>
3142 -<interface name="corenet_send_afs_vl_server_packets" lineno="6063">
3143 +<interface name="corenet_send_afs_vl_server_packets" lineno="6081">
3144 <summary>
3145 Send afs_vl_server packets.
3146 </summary>
3147 @@ -14033,7 +14117,7 @@ Domain allowed access.
3148 </param>
3149 <infoflow type="write" weight="10"/>
3150 </interface>
3151 -<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="6082">
3152 +<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="6100">
3153 <summary>
3154 Do not audit attempts to send afs_vl_server packets.
3155 </summary>
3156 @@ -14044,7 +14128,7 @@ Domain to not audit.
3157 </param>
3158 <infoflow type="none"/>
3159 </interface>
3160 -<interface name="corenet_receive_afs_vl_server_packets" lineno="6101">
3161 +<interface name="corenet_receive_afs_vl_server_packets" lineno="6119">
3162 <summary>
3163 Receive afs_vl_server packets.
3164 </summary>
3165 @@ -14055,7 +14139,7 @@ Domain allowed access.
3166 </param>
3167 <infoflow type="read" weight="10"/>
3168 </interface>
3169 -<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="6120">
3170 +<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="6138">
3171 <summary>
3172 Do not audit attempts to receive afs_vl_server packets.
3173 </summary>
3174 @@ -14066,7 +14150,7 @@ Domain allowed access.
3175 </param>
3176 <infoflow type="none"/>
3177 </interface>
3178 -<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="6139">
3179 +<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="6157">
3180 <summary>
3181 Send and receive afs_vl_server packets.
3182 </summary>
3183 @@ -14077,7 +14161,7 @@ Domain allowed access.
3184 </param>
3185 <infoflow type="both" weight="10"/>
3186 </interface>
3187 -<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="6155">
3188 +<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="6173">
3189 <summary>
3190 Do not audit attempts to send and receive afs_vl_server packets.
3191 </summary>
3192 @@ -14088,7 +14172,7 @@ Domain to not audit.
3193 </param>
3194 <infoflow type="none"/>
3195 </interface>
3196 -<interface name="corenet_relabelto_afs_vl_server_packets" lineno="6170">
3197 +<interface name="corenet_relabelto_afs_vl_server_packets" lineno="6188">
3198 <summary>
3199 Relabel packets to afs_vl_server the packet type.
3200 </summary>
3201 @@ -14098,7 +14182,7 @@ Domain allowed access.
3202 </summary>
3203 </param>
3204 </interface>
3205 -<interface name="corenet_tcp_sendrecv_afs3_callback_port" lineno="6192">
3206 +<interface name="corenet_tcp_sendrecv_afs3_callback_port" lineno="6210">
3207 <summary>
3208 Send and receive TCP traffic on the afs3_callback port.
3209 </summary>
3210 @@ -14109,7 +14193,7 @@ Domain allowed access.
3211 </param>
3212 <infoflow type="both" weight="10"/>
3213 </interface>
3214 -<interface name="corenet_udp_send_afs3_callback_port" lineno="6207">
3215 +<interface name="corenet_udp_send_afs3_callback_port" lineno="6225">
3216 <summary>
3217 Send UDP traffic on the afs3_callback port.
3218 </summary>
3219 @@ -14120,7 +14204,7 @@ Domain allowed access.
3220 </param>
3221 <infoflow type="write" weight="10"/>
3222 </interface>
3223 -<interface name="corenet_dontaudit_udp_send_afs3_callback_port" lineno="6222">
3224 +<interface name="corenet_dontaudit_udp_send_afs3_callback_port" lineno="6240">
3225 <summary>
3226 Do not audit attempts to send UDP traffic on the afs3_callback port.
3227 </summary>
3228 @@ -14131,7 +14215,7 @@ Domain to not audit.
3229 </param>
3230 <infoflow type="none"/>
3231 </interface>
3232 -<interface name="corenet_udp_receive_afs3_callback_port" lineno="6237">
3233 +<interface name="corenet_udp_receive_afs3_callback_port" lineno="6255">
3234 <summary>
3235 Receive UDP traffic on the afs3_callback port.
3236 </summary>
3237 @@ -14142,7 +14226,7 @@ Domain allowed access.
3238 </param>
3239 <infoflow type="read" weight="10"/>
3240 </interface>
3241 -<interface name="corenet_dontaudit_udp_receive_afs3_callback_port" lineno="6252">
3242 +<interface name="corenet_dontaudit_udp_receive_afs3_callback_port" lineno="6270">
3243 <summary>
3244 Do not audit attempts to receive UDP traffic on the afs3_callback port.
3245 </summary>
3246 @@ -14153,7 +14237,7 @@ Domain to not audit.
3247 </param>
3248 <infoflow type="none"/>
3249 </interface>
3250 -<interface name="corenet_udp_sendrecv_afs3_callback_port" lineno="6267">
3251 +<interface name="corenet_udp_sendrecv_afs3_callback_port" lineno="6285">
3252 <summary>
3253 Send and receive UDP traffic on the afs3_callback port.
3254 </summary>
3255 @@ -14164,7 +14248,7 @@ Domain allowed access.
3256 </param>
3257 <infoflow type="both" weight="10"/>
3258 </interface>
3259 -<interface name="corenet_dontaudit_udp_sendrecv_afs3_callback_port" lineno="6283">
3260 +<interface name="corenet_dontaudit_udp_sendrecv_afs3_callback_port" lineno="6301">
3261 <summary>
3262 Do not audit attempts to send and receive
3263 UDP traffic on the afs3_callback port.
3264 @@ -14176,7 +14260,7 @@ Domain to not audit.
3265 </param>
3266 <infoflow type="none"/>
3267 </interface>
3268 -<interface name="corenet_tcp_bind_afs3_callback_port" lineno="6298">
3269 +<interface name="corenet_tcp_bind_afs3_callback_port" lineno="6316">
3270 <summary>
3271 Bind TCP sockets to the afs3_callback port.
3272 </summary>
3273 @@ -14187,7 +14271,7 @@ Domain allowed access.
3274 </param>
3275 <infoflow type="none"/>
3276 </interface>
3277 -<interface name="corenet_udp_bind_afs3_callback_port" lineno="6318">
3278 +<interface name="corenet_udp_bind_afs3_callback_port" lineno="6336">
3279 <summary>
3280 Bind UDP sockets to the afs3_callback port.
3281 </summary>
3282 @@ -14198,7 +14282,7 @@ Domain allowed access.
3283 </param>
3284 <infoflow type="none"/>
3285 </interface>
3286 -<interface name="corenet_tcp_connect_afs3_callback_port" lineno="6337">
3287 +<interface name="corenet_tcp_connect_afs3_callback_port" lineno="6355">
3288 <summary>
3289 Make a TCP connection to the afs3_callback port.
3290 </summary>
3291 @@ -14208,7 +14292,7 @@ Domain allowed access.
3292 </summary>
3293 </param>
3294 </interface>
3295 -<interface name="corenet_send_afs3_callback_client_packets" lineno="6357">
3296 +<interface name="corenet_send_afs3_callback_client_packets" lineno="6375">
3297 <summary>
3298 Send afs3_callback_client packets.
3299 </summary>
3300 @@ -14219,7 +14303,7 @@ Domain allowed access.
3301 </param>
3302 <infoflow type="write" weight="10"/>
3303 </interface>
3304 -<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="6376">
3305 +<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="6394">
3306 <summary>
3307 Do not audit attempts to send afs3_callback_client packets.
3308 </summary>
3309 @@ -14230,7 +14314,7 @@ Domain to not audit.
3310 </param>
3311 <infoflow type="none"/>
3312 </interface>
3313 -<interface name="corenet_receive_afs3_callback_client_packets" lineno="6395">
3314 +<interface name="corenet_receive_afs3_callback_client_packets" lineno="6413">
3315 <summary>
3316 Receive afs3_callback_client packets.
3317 </summary>
3318 @@ -14241,7 +14325,7 @@ Domain allowed access.
3319 </param>
3320 <infoflow type="read" weight="10"/>
3321 </interface>
3322 -<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="6414">
3323 +<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="6432">
3324 <summary>
3325 Do not audit attempts to receive afs3_callback_client packets.
3326 </summary>
3327 @@ -14252,7 +14336,7 @@ Domain allowed access.
3328 </param>
3329 <infoflow type="none"/>
3330 </interface>
3331 -<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="6433">
3332 +<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="6451">
3333 <summary>
3334 Send and receive afs3_callback_client packets.
3335 </summary>
3336 @@ -14263,7 +14347,7 @@ Domain allowed access.
3337 </param>
3338 <infoflow type="both" weight="10"/>
3339 </interface>
3340 -<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="6449">
3341 +<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="6467">
3342 <summary>
3343 Do not audit attempts to send and receive afs3_callback_client packets.
3344 </summary>
3345 @@ -14274,7 +14358,7 @@ Domain to not audit.
3346 </param>
3347 <infoflow type="none"/>
3348 </interface>
3349 -<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="6464">
3350 +<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="6482">
3351 <summary>
3352 Relabel packets to afs3_callback_client the packet type.
3353 </summary>
3354 @@ -14284,7 +14368,7 @@ Domain allowed access.
3355 </summary>
3356 </param>
3357 </interface>
3358 -<interface name="corenet_send_afs3_callback_server_packets" lineno="6484">
3359 +<interface name="corenet_send_afs3_callback_server_packets" lineno="6502">
3360 <summary>
3361 Send afs3_callback_server packets.
3362 </summary>
3363 @@ -14295,7 +14379,7 @@ Domain allowed access.
3364 </param>
3365 <infoflow type="write" weight="10"/>
3366 </interface>
3367 -<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="6503">
3368 +<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="6521">
3369 <summary>
3370 Do not audit attempts to send afs3_callback_server packets.
3371 </summary>
3372 @@ -14306,7 +14390,7 @@ Domain to not audit.
3373 </param>
3374 <infoflow type="none"/>
3375 </interface>
3376 -<interface name="corenet_receive_afs3_callback_server_packets" lineno="6522">
3377 +<interface name="corenet_receive_afs3_callback_server_packets" lineno="6540">
3378 <summary>
3379 Receive afs3_callback_server packets.
3380 </summary>
3381 @@ -14317,7 +14401,7 @@ Domain allowed access.
3382 </param>
3383 <infoflow type="read" weight="10"/>
3384 </interface>
3385 -<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="6541">
3386 +<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="6559">
3387 <summary>
3388 Do not audit attempts to receive afs3_callback_server packets.
3389 </summary>
3390 @@ -14328,7 +14412,7 @@ Domain allowed access.
3391 </param>
3392 <infoflow type="none"/>
3393 </interface>
3394 -<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="6560">
3395 +<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="6578">
3396 <summary>
3397 Send and receive afs3_callback_server packets.
3398 </summary>
3399 @@ -14339,7 +14423,7 @@ Domain allowed access.
3400 </param>
3401 <infoflow type="both" weight="10"/>
3402 </interface>
3403 -<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="6576">
3404 +<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="6594">
3405 <summary>
3406 Do not audit attempts to send and receive afs3_callback_server packets.
3407 </summary>
3408 @@ -14350,7 +14434,7 @@ Domain to not audit.
3409 </param>
3410 <infoflow type="none"/>
3411 </interface>
3412 -<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="6591">
3413 +<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="6609">
3414 <summary>
3415 Relabel packets to afs3_callback_server the packet type.
3416 </summary>
3417 @@ -14360,7 +14444,7 @@ Domain allowed access.
3418 </summary>
3419 </param>
3420 </interface>
3421 -<interface name="corenet_tcp_sendrecv_agentx_port" lineno="6613">
3422 +<interface name="corenet_tcp_sendrecv_agentx_port" lineno="6631">
3423 <summary>
3424 Send and receive TCP traffic on the agentx port.
3425 </summary>
3426 @@ -14371,7 +14455,7 @@ Domain allowed access.
3427 </param>
3428 <infoflow type="both" weight="10"/>
3429 </interface>
3430 -<interface name="corenet_udp_send_agentx_port" lineno="6628">
3431 +<interface name="corenet_udp_send_agentx_port" lineno="6646">
3432 <summary>
3433 Send UDP traffic on the agentx port.
3434 </summary>
3435 @@ -14382,7 +14466,7 @@ Domain allowed access.
3436 </param>
3437 <infoflow type="write" weight="10"/>
3438 </interface>
3439 -<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="6643">
3440 +<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="6661">
3441 <summary>
3442 Do not audit attempts to send UDP traffic on the agentx port.
3443 </summary>
3444 @@ -14393,7 +14477,7 @@ Domain to not audit.
3445 </param>
3446 <infoflow type="none"/>
3447 </interface>
3448 -<interface name="corenet_udp_receive_agentx_port" lineno="6658">
3449 +<interface name="corenet_udp_receive_agentx_port" lineno="6676">
3450 <summary>
3451 Receive UDP traffic on the agentx port.
3452 </summary>
3453 @@ -14404,7 +14488,7 @@ Domain allowed access.
3454 </param>
3455 <infoflow type="read" weight="10"/>
3456 </interface>
3457 -<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="6673">
3458 +<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="6691">
3459 <summary>
3460 Do not audit attempts to receive UDP traffic on the agentx port.
3461 </summary>
3462 @@ -14415,7 +14499,7 @@ Domain to not audit.
3463 </param>
3464 <infoflow type="none"/>
3465 </interface>
3466 -<interface name="corenet_udp_sendrecv_agentx_port" lineno="6688">
3467 +<interface name="corenet_udp_sendrecv_agentx_port" lineno="6706">
3468 <summary>
3469 Send and receive UDP traffic on the agentx port.
3470 </summary>
3471 @@ -14426,7 +14510,7 @@ Domain allowed access.
3472 </param>
3473 <infoflow type="both" weight="10"/>
3474 </interface>
3475 -<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="6704">
3476 +<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="6722">
3477 <summary>
3478 Do not audit attempts to send and receive
3479 UDP traffic on the agentx port.
3480 @@ -14438,7 +14522,7 @@ Domain to not audit.
3481 </param>
3482 <infoflow type="none"/>
3483 </interface>
3484 -<interface name="corenet_tcp_bind_agentx_port" lineno="6719">
3485 +<interface name="corenet_tcp_bind_agentx_port" lineno="6737">
3486 <summary>
3487 Bind TCP sockets to the agentx port.
3488 </summary>
3489 @@ -14449,7 +14533,7 @@ Domain allowed access.
3490 </param>
3491 <infoflow type="none"/>
3492 </interface>
3493 -<interface name="corenet_udp_bind_agentx_port" lineno="6739">
3494 +<interface name="corenet_udp_bind_agentx_port" lineno="6757">
3495 <summary>
3496 Bind UDP sockets to the agentx port.
3497 </summary>
3498 @@ -14460,7 +14544,7 @@ Domain allowed access.
3499 </param>
3500 <infoflow type="none"/>
3501 </interface>
3502 -<interface name="corenet_tcp_connect_agentx_port" lineno="6758">
3503 +<interface name="corenet_tcp_connect_agentx_port" lineno="6776">
3504 <summary>
3505 Make a TCP connection to the agentx port.
3506 </summary>
3507 @@ -14470,7 +14554,7 @@ Domain allowed access.
3508 </summary>
3509 </param>
3510 </interface>
3511 -<interface name="corenet_send_agentx_client_packets" lineno="6778">
3512 +<interface name="corenet_send_agentx_client_packets" lineno="6796">
3513 <summary>
3514 Send agentx_client packets.
3515 </summary>
3516 @@ -14481,7 +14565,7 @@ Domain allowed access.
3517 </param>
3518 <infoflow type="write" weight="10"/>
3519 </interface>
3520 -<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="6797">
3521 +<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="6815">
3522 <summary>
3523 Do not audit attempts to send agentx_client packets.
3524 </summary>
3525 @@ -14492,7 +14576,7 @@ Domain to not audit.
3526 </param>
3527 <infoflow type="none"/>
3528 </interface>
3529 -<interface name="corenet_receive_agentx_client_packets" lineno="6816">
3530 +<interface name="corenet_receive_agentx_client_packets" lineno="6834">
3531 <summary>
3532 Receive agentx_client packets.
3533 </summary>
3534 @@ -14503,7 +14587,7 @@ Domain allowed access.
3535 </param>
3536 <infoflow type="read" weight="10"/>
3537 </interface>
3538 -<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6835">
3539 +<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6853">
3540 <summary>
3541 Do not audit attempts to receive agentx_client packets.
3542 </summary>
3543 @@ -14514,7 +14598,7 @@ Domain allowed access.
3544 </param>
3545 <infoflow type="none"/>
3546 </interface>
3547 -<interface name="corenet_sendrecv_agentx_client_packets" lineno="6854">
3548 +<interface name="corenet_sendrecv_agentx_client_packets" lineno="6872">
3549 <summary>
3550 Send and receive agentx_client packets.
3551 </summary>
3552 @@ -14525,7 +14609,7 @@ Domain allowed access.
3553 </param>
3554 <infoflow type="both" weight="10"/>
3555 </interface>
3556 -<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6870">
3557 +<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6888">
3558 <summary>
3559 Do not audit attempts to send and receive agentx_client packets.
3560 </summary>
3561 @@ -14536,7 +14620,7 @@ Domain to not audit.
3562 </param>
3563 <infoflow type="none"/>
3564 </interface>
3565 -<interface name="corenet_relabelto_agentx_client_packets" lineno="6885">
3566 +<interface name="corenet_relabelto_agentx_client_packets" lineno="6903">
3567 <summary>
3568 Relabel packets to agentx_client the packet type.
3569 </summary>
3570 @@ -14546,7 +14630,7 @@ Domain allowed access.
3571 </summary>
3572 </param>
3573 </interface>
3574 -<interface name="corenet_send_agentx_server_packets" lineno="6905">
3575 +<interface name="corenet_send_agentx_server_packets" lineno="6923">
3576 <summary>
3577 Send agentx_server packets.
3578 </summary>
3579 @@ -14557,7 +14641,7 @@ Domain allowed access.
3580 </param>
3581 <infoflow type="write" weight="10"/>
3582 </interface>
3583 -<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6924">
3584 +<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6942">
3585 <summary>
3586 Do not audit attempts to send agentx_server packets.
3587 </summary>
3588 @@ -14568,7 +14652,7 @@ Domain to not audit.
3589 </param>
3590 <infoflow type="none"/>
3591 </interface>
3592 -<interface name="corenet_receive_agentx_server_packets" lineno="6943">
3593 +<interface name="corenet_receive_agentx_server_packets" lineno="6961">
3594 <summary>
3595 Receive agentx_server packets.
3596 </summary>
3597 @@ -14579,7 +14663,7 @@ Domain allowed access.
3598 </param>
3599 <infoflow type="read" weight="10"/>
3600 </interface>
3601 -<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6962">
3602 +<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6980">
3603 <summary>
3604 Do not audit attempts to receive agentx_server packets.
3605 </summary>
3606 @@ -14590,7 +14674,7 @@ Domain allowed access.
3607 </param>
3608 <infoflow type="none"/>
3609 </interface>
3610 -<interface name="corenet_sendrecv_agentx_server_packets" lineno="6981">
3611 +<interface name="corenet_sendrecv_agentx_server_packets" lineno="6999">
3612 <summary>
3613 Send and receive agentx_server packets.
3614 </summary>
3615 @@ -14601,7 +14685,7 @@ Domain allowed access.
3616 </param>
3617 <infoflow type="both" weight="10"/>
3618 </interface>
3619 -<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="6997">
3620 +<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="7015">
3621 <summary>
3622 Do not audit attempts to send and receive agentx_server packets.
3623 </summary>
3624 @@ -14612,7 +14696,7 @@ Domain to not audit.
3625 </param>
3626 <infoflow type="none"/>
3627 </interface>
3628 -<interface name="corenet_relabelto_agentx_server_packets" lineno="7012">
3629 +<interface name="corenet_relabelto_agentx_server_packets" lineno="7030">
3630 <summary>
3631 Relabel packets to agentx_server the packet type.
3632 </summary>
3633 @@ -14622,7 +14706,7 @@ Domain allowed access.
3634 </summary>
3635 </param>
3636 </interface>
3637 -<interface name="corenet_tcp_sendrecv_amanda_port" lineno="7034">
3638 +<interface name="corenet_tcp_sendrecv_amanda_port" lineno="7052">
3639 <summary>
3640 Send and receive TCP traffic on the amanda port.
3641 </summary>
3642 @@ -14633,7 +14717,7 @@ Domain allowed access.
3643 </param>
3644 <infoflow type="both" weight="10"/>
3645 </interface>
3646 -<interface name="corenet_udp_send_amanda_port" lineno="7049">
3647 +<interface name="corenet_udp_send_amanda_port" lineno="7067">
3648 <summary>
3649 Send UDP traffic on the amanda port.
3650 </summary>
3651 @@ -14644,7 +14728,7 @@ Domain allowed access.
3652 </param>
3653 <infoflow type="write" weight="10"/>
3654 </interface>
3655 -<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="7064">
3656 +<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="7082">
3657 <summary>
3658 Do not audit attempts to send UDP traffic on the amanda port.
3659 </summary>
3660 @@ -14655,7 +14739,7 @@ Domain to not audit.
3661 </param>
3662 <infoflow type="none"/>
3663 </interface>
3664 -<interface name="corenet_udp_receive_amanda_port" lineno="7079">
3665 +<interface name="corenet_udp_receive_amanda_port" lineno="7097">
3666 <summary>
3667 Receive UDP traffic on the amanda port.
3668 </summary>
3669 @@ -14666,7 +14750,7 @@ Domain allowed access.
3670 </param>
3671 <infoflow type="read" weight="10"/>
3672 </interface>
3673 -<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="7094">
3674 +<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="7112">
3675 <summary>
3676 Do not audit attempts to receive UDP traffic on the amanda port.
3677 </summary>
3678 @@ -14677,7 +14761,7 @@ Domain to not audit.
3679 </param>
3680 <infoflow type="none"/>
3681 </interface>
3682 -<interface name="corenet_udp_sendrecv_amanda_port" lineno="7109">
3683 +<interface name="corenet_udp_sendrecv_amanda_port" lineno="7127">
3684 <summary>
3685 Send and receive UDP traffic on the amanda port.
3686 </summary>
3687 @@ -14688,7 +14772,7 @@ Domain allowed access.
3688 </param>
3689 <infoflow type="both" weight="10"/>
3690 </interface>
3691 -<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="7125">
3692 +<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="7143">
3693 <summary>
3694 Do not audit attempts to send and receive
3695 UDP traffic on the amanda port.
3696 @@ -14700,7 +14784,7 @@ Domain to not audit.
3697 </param>
3698 <infoflow type="none"/>
3699 </interface>
3700 -<interface name="corenet_tcp_bind_amanda_port" lineno="7140">
3701 +<interface name="corenet_tcp_bind_amanda_port" lineno="7158">
3702 <summary>
3703 Bind TCP sockets to the amanda port.
3704 </summary>
3705 @@ -14711,7 +14795,7 @@ Domain allowed access.
3706 </param>
3707 <infoflow type="none"/>
3708 </interface>
3709 -<interface name="corenet_udp_bind_amanda_port" lineno="7160">
3710 +<interface name="corenet_udp_bind_amanda_port" lineno="7178">
3711 <summary>
3712 Bind UDP sockets to the amanda port.
3713 </summary>
3714 @@ -14722,7 +14806,7 @@ Domain allowed access.
3715 </param>
3716 <infoflow type="none"/>
3717 </interface>
3718 -<interface name="corenet_tcp_connect_amanda_port" lineno="7179">
3719 +<interface name="corenet_tcp_connect_amanda_port" lineno="7197">
3720 <summary>
3721 Make a TCP connection to the amanda port.
3722 </summary>
3723 @@ -14732,7 +14816,7 @@ Domain allowed access.
3724 </summary>
3725 </param>
3726 </interface>
3727 -<interface name="corenet_send_amanda_client_packets" lineno="7199">
3728 +<interface name="corenet_send_amanda_client_packets" lineno="7217">
3729 <summary>
3730 Send amanda_client packets.
3731 </summary>
3732 @@ -14743,7 +14827,7 @@ Domain allowed access.
3733 </param>
3734 <infoflow type="write" weight="10"/>
3735 </interface>
3736 -<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="7218">
3737 +<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="7236">
3738 <summary>
3739 Do not audit attempts to send amanda_client packets.
3740 </summary>
3741 @@ -14754,7 +14838,7 @@ Domain to not audit.
3742 </param>
3743 <infoflow type="none"/>
3744 </interface>
3745 -<interface name="corenet_receive_amanda_client_packets" lineno="7237">
3746 +<interface name="corenet_receive_amanda_client_packets" lineno="7255">
3747 <summary>
3748 Receive amanda_client packets.
3749 </summary>
3750 @@ -14765,7 +14849,7 @@ Domain allowed access.
3751 </param>
3752 <infoflow type="read" weight="10"/>
3753 </interface>
3754 -<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="7256">
3755 +<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="7274">
3756 <summary>
3757 Do not audit attempts to receive amanda_client packets.
3758 </summary>
3759 @@ -14776,7 +14860,7 @@ Domain allowed access.
3760 </param>
3761 <infoflow type="none"/>
3762 </interface>
3763 -<interface name="corenet_sendrecv_amanda_client_packets" lineno="7275">
3764 +<interface name="corenet_sendrecv_amanda_client_packets" lineno="7293">
3765 <summary>
3766 Send and receive amanda_client packets.
3767 </summary>
3768 @@ -14787,7 +14871,7 @@ Domain allowed access.
3769 </param>
3770 <infoflow type="both" weight="10"/>
3771 </interface>
3772 -<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="7291">
3773 +<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="7309">
3774 <summary>
3775 Do not audit attempts to send and receive amanda_client packets.
3776 </summary>
3777 @@ -14798,7 +14882,7 @@ Domain to not audit.
3778 </param>
3779 <infoflow type="none"/>
3780 </interface>
3781 -<interface name="corenet_relabelto_amanda_client_packets" lineno="7306">
3782 +<interface name="corenet_relabelto_amanda_client_packets" lineno="7324">
3783 <summary>
3784 Relabel packets to amanda_client the packet type.
3785 </summary>
3786 @@ -14808,7 +14892,7 @@ Domain allowed access.
3787 </summary>
3788 </param>
3789 </interface>
3790 -<interface name="corenet_send_amanda_server_packets" lineno="7326">
3791 +<interface name="corenet_send_amanda_server_packets" lineno="7344">
3792 <summary>
3793 Send amanda_server packets.
3794 </summary>
3795 @@ -14819,7 +14903,7 @@ Domain allowed access.
3796 </param>
3797 <infoflow type="write" weight="10"/>
3798 </interface>
3799 -<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="7345">
3800 +<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="7363">
3801 <summary>
3802 Do not audit attempts to send amanda_server packets.
3803 </summary>
3804 @@ -14830,7 +14914,7 @@ Domain to not audit.
3805 </param>
3806 <infoflow type="none"/>
3807 </interface>
3808 -<interface name="corenet_receive_amanda_server_packets" lineno="7364">
3809 +<interface name="corenet_receive_amanda_server_packets" lineno="7382">
3810 <summary>
3811 Receive amanda_server packets.
3812 </summary>
3813 @@ -14841,7 +14925,7 @@ Domain allowed access.
3814 </param>
3815 <infoflow type="read" weight="10"/>
3816 </interface>
3817 -<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="7383">
3818 +<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="7401">
3819 <summary>
3820 Do not audit attempts to receive amanda_server packets.
3821 </summary>
3822 @@ -14852,7 +14936,7 @@ Domain allowed access.
3823 </param>
3824 <infoflow type="none"/>
3825 </interface>
3826 -<interface name="corenet_sendrecv_amanda_server_packets" lineno="7402">
3827 +<interface name="corenet_sendrecv_amanda_server_packets" lineno="7420">
3828 <summary>
3829 Send and receive amanda_server packets.
3830 </summary>
3831 @@ -14863,7 +14947,7 @@ Domain allowed access.
3832 </param>
3833 <infoflow type="both" weight="10"/>
3834 </interface>
3835 -<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="7418">
3836 +<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="7436">
3837 <summary>
3838 Do not audit attempts to send and receive amanda_server packets.
3839 </summary>
3840 @@ -14874,7 +14958,7 @@ Domain to not audit.
3841 </param>
3842 <infoflow type="none"/>
3843 </interface>
3844 -<interface name="corenet_relabelto_amanda_server_packets" lineno="7433">
3845 +<interface name="corenet_relabelto_amanda_server_packets" lineno="7451">
3846 <summary>
3847 Relabel packets to amanda_server the packet type.
3848 </summary>
3849 @@ -14884,7 +14968,7 @@ Domain allowed access.
3850 </summary>
3851 </param>
3852 </interface>
3853 -<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="7455">
3854 +<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="7473">
3855 <summary>
3856 Send and receive TCP traffic on the amavisd_recv port.
3857 </summary>
3858 @@ -14895,7 +14979,7 @@ Domain allowed access.
3859 </param>
3860 <infoflow type="both" weight="10"/>
3861 </interface>
3862 -<interface name="corenet_udp_send_amavisd_recv_port" lineno="7470">
3863 +<interface name="corenet_udp_send_amavisd_recv_port" lineno="7488">
3864 <summary>
3865 Send UDP traffic on the amavisd_recv port.
3866 </summary>
3867 @@ -14906,7 +14990,7 @@ Domain allowed access.
3868 </param>
3869 <infoflow type="write" weight="10"/>
3870 </interface>
3871 -<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="7485">
3872 +<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="7503">
3873 <summary>
3874 Do not audit attempts to send UDP traffic on the amavisd_recv port.
3875 </summary>
3876 @@ -14917,7 +15001,7 @@ Domain to not audit.
3877 </param>
3878 <infoflow type="none"/>
3879 </interface>
3880 -<interface name="corenet_udp_receive_amavisd_recv_port" lineno="7500">
3881 +<interface name="corenet_udp_receive_amavisd_recv_port" lineno="7518">
3882 <summary>
3883 Receive UDP traffic on the amavisd_recv port.
3884 </summary>
3885 @@ -14928,7 +15012,7 @@ Domain allowed access.
3886 </param>
3887 <infoflow type="read" weight="10"/>
3888 </interface>
3889 -<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="7515">
3890 +<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="7533">
3891 <summary>
3892 Do not audit attempts to receive UDP traffic on the amavisd_recv port.
3893 </summary>
3894 @@ -14939,7 +15023,7 @@ Domain to not audit.
3895 </param>
3896 <infoflow type="none"/>
3897 </interface>
3898 -<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="7530">
3899 +<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="7548">
3900 <summary>
3901 Send and receive UDP traffic on the amavisd_recv port.
3902 </summary>
3903 @@ -14950,7 +15034,7 @@ Domain allowed access.
3904 </param>
3905 <infoflow type="both" weight="10"/>
3906 </interface>
3907 -<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="7546">
3908 +<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="7564">
3909 <summary>
3910 Do not audit attempts to send and receive
3911 UDP traffic on the amavisd_recv port.
3912 @@ -14962,7 +15046,7 @@ Domain to not audit.
3913 </param>
3914 <infoflow type="none"/>
3915 </interface>
3916 -<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="7561">
3917 +<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="7579">
3918 <summary>
3919 Bind TCP sockets to the amavisd_recv port.
3920 </summary>
3921 @@ -14973,7 +15057,7 @@ Domain allowed access.
3922 </param>
3923 <infoflow type="none"/>
3924 </interface>
3925 -<interface name="corenet_udp_bind_amavisd_recv_port" lineno="7581">
3926 +<interface name="corenet_udp_bind_amavisd_recv_port" lineno="7599">
3927 <summary>
3928 Bind UDP sockets to the amavisd_recv port.
3929 </summary>
3930 @@ -14984,7 +15068,7 @@ Domain allowed access.
3931 </param>
3932 <infoflow type="none"/>
3933 </interface>
3934 -<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="7600">
3935 +<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="7618">
3936 <summary>
3937 Make a TCP connection to the amavisd_recv port.
3938 </summary>
3939 @@ -14994,7 +15078,7 @@ Domain allowed access.
3940 </summary>
3941 </param>
3942 </interface>
3943 -<interface name="corenet_send_amavisd_recv_client_packets" lineno="7620">
3944 +<interface name="corenet_send_amavisd_recv_client_packets" lineno="7638">
3945 <summary>
3946 Send amavisd_recv_client packets.
3947 </summary>
3948 @@ -15005,7 +15089,7 @@ Domain allowed access.
3949 </param>
3950 <infoflow type="write" weight="10"/>
3951 </interface>
3952 -<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="7639">
3953 +<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="7657">
3954 <summary>
3955 Do not audit attempts to send amavisd_recv_client packets.
3956 </summary>
3957 @@ -15016,7 +15100,7 @@ Domain to not audit.
3958 </param>
3959 <infoflow type="none"/>
3960 </interface>
3961 -<interface name="corenet_receive_amavisd_recv_client_packets" lineno="7658">
3962 +<interface name="corenet_receive_amavisd_recv_client_packets" lineno="7676">
3963 <summary>
3964 Receive amavisd_recv_client packets.
3965 </summary>
3966 @@ -15027,7 +15111,7 @@ Domain allowed access.
3967 </param>
3968 <infoflow type="read" weight="10"/>
3969 </interface>
3970 -<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="7677">
3971 +<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="7695">
3972 <summary>
3973 Do not audit attempts to receive amavisd_recv_client packets.
3974 </summary>
3975 @@ -15038,7 +15122,7 @@ Domain allowed access.
3976 </param>
3977 <infoflow type="none"/>
3978 </interface>
3979 -<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="7696">
3980 +<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="7714">
3981 <summary>
3982 Send and receive amavisd_recv_client packets.
3983 </summary>
3984 @@ -15049,7 +15133,7 @@ Domain allowed access.
3985 </param>
3986 <infoflow type="both" weight="10"/>
3987 </interface>
3988 -<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="7712">
3989 +<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="7730">
3990 <summary>
3991 Do not audit attempts to send and receive amavisd_recv_client packets.
3992 </summary>
3993 @@ -15060,7 +15144,7 @@ Domain to not audit.
3994 </param>
3995 <infoflow type="none"/>
3996 </interface>
3997 -<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="7727">
3998 +<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="7745">
3999 <summary>
4000 Relabel packets to amavisd_recv_client the packet type.
4001 </summary>
4002 @@ -15070,7 +15154,7 @@ Domain allowed access.
4003 </summary>
4004 </param>
4005 </interface>
4006 -<interface name="corenet_send_amavisd_recv_server_packets" lineno="7747">
4007 +<interface name="corenet_send_amavisd_recv_server_packets" lineno="7765">
4008 <summary>
4009 Send amavisd_recv_server packets.
4010 </summary>
4011 @@ -15081,7 +15165,7 @@ Domain allowed access.
4012 </param>
4013 <infoflow type="write" weight="10"/>
4014 </interface>
4015 -<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="7766">
4016 +<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="7784">
4017 <summary>
4018 Do not audit attempts to send amavisd_recv_server packets.
4019 </summary>
4020 @@ -15092,7 +15176,7 @@ Domain to not audit.
4021 </param>
4022 <infoflow type="none"/>
4023 </interface>
4024 -<interface name="corenet_receive_amavisd_recv_server_packets" lineno="7785">
4025 +<interface name="corenet_receive_amavisd_recv_server_packets" lineno="7803">
4026 <summary>
4027 Receive amavisd_recv_server packets.
4028 </summary>
4029 @@ -15103,7 +15187,7 @@ Domain allowed access.
4030 </param>
4031 <infoflow type="read" weight="10"/>
4032 </interface>
4033 -<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="7804">
4034 +<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="7822">
4035 <summary>
4036 Do not audit attempts to receive amavisd_recv_server packets.
4037 </summary>
4038 @@ -15114,7 +15198,7 @@ Domain allowed access.
4039 </param>
4040 <infoflow type="none"/>
4041 </interface>
4042 -<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="7823">
4043 +<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="7841">
4044 <summary>
4045 Send and receive amavisd_recv_server packets.
4046 </summary>
4047 @@ -15125,7 +15209,7 @@ Domain allowed access.
4048 </param>
4049 <infoflow type="both" weight="10"/>
4050 </interface>
4051 -<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="7839">
4052 +<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="7857">
4053 <summary>
4054 Do not audit attempts to send and receive amavisd_recv_server packets.
4055 </summary>
4056 @@ -15136,7 +15220,7 @@ Domain to not audit.
4057 </param>
4058 <infoflow type="none"/>
4059 </interface>
4060 -<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="7854">
4061 +<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="7872">
4062 <summary>
4063 Relabel packets to amavisd_recv_server the packet type.
4064 </summary>
4065 @@ -15146,7 +15230,7 @@ Domain allowed access.
4066 </summary>
4067 </param>
4068 </interface>
4069 -<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="7876">
4070 +<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="7894">
4071 <summary>
4072 Send and receive TCP traffic on the amavisd_send port.
4073 </summary>
4074 @@ -15157,7 +15241,7 @@ Domain allowed access.
4075 </param>
4076 <infoflow type="both" weight="10"/>
4077 </interface>
4078 -<interface name="corenet_udp_send_amavisd_send_port" lineno="7891">
4079 +<interface name="corenet_udp_send_amavisd_send_port" lineno="7909">
4080 <summary>
4081 Send UDP traffic on the amavisd_send port.
4082 </summary>
4083 @@ -15168,7 +15252,7 @@ Domain allowed access.
4084 </param>
4085 <infoflow type="write" weight="10"/>
4086 </interface>
4087 -<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="7906">
4088 +<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="7924">
4089 <summary>
4090 Do not audit attempts to send UDP traffic on the amavisd_send port.
4091 </summary>
4092 @@ -15179,7 +15263,7 @@ Domain to not audit.
4093 </param>
4094 <infoflow type="none"/>
4095 </interface>
4096 -<interface name="corenet_udp_receive_amavisd_send_port" lineno="7921">
4097 +<interface name="corenet_udp_receive_amavisd_send_port" lineno="7939">
4098 <summary>
4099 Receive UDP traffic on the amavisd_send port.
4100 </summary>
4101 @@ -15190,7 +15274,7 @@ Domain allowed access.
4102 </param>
4103 <infoflow type="read" weight="10"/>
4104 </interface>
4105 -<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="7936">
4106 +<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="7954">
4107 <summary>
4108 Do not audit attempts to receive UDP traffic on the amavisd_send port.
4109 </summary>
4110 @@ -15201,7 +15285,7 @@ Domain to not audit.
4111 </param>
4112 <infoflow type="none"/>
4113 </interface>
4114 -<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="7951">
4115 +<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="7969">
4116 <summary>
4117 Send and receive UDP traffic on the amavisd_send port.
4118 </summary>
4119 @@ -15212,7 +15296,7 @@ Domain allowed access.
4120 </param>
4121 <infoflow type="both" weight="10"/>
4122 </interface>
4123 -<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="7967">
4124 +<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="7985">
4125 <summary>
4126 Do not audit attempts to send and receive
4127 UDP traffic on the amavisd_send port.
4128 @@ -15224,7 +15308,7 @@ Domain to not audit.
4129 </param>
4130 <infoflow type="none"/>
4131 </interface>
4132 -<interface name="corenet_tcp_bind_amavisd_send_port" lineno="7982">
4133 +<interface name="corenet_tcp_bind_amavisd_send_port" lineno="8000">
4134 <summary>
4135 Bind TCP sockets to the amavisd_send port.
4136 </summary>
4137 @@ -15235,7 +15319,7 @@ Domain allowed access.
4138 </param>
4139 <infoflow type="none"/>
4140 </interface>
4141 -<interface name="corenet_udp_bind_amavisd_send_port" lineno="8002">
4142 +<interface name="corenet_udp_bind_amavisd_send_port" lineno="8020">
4143 <summary>
4144 Bind UDP sockets to the amavisd_send port.
4145 </summary>
4146 @@ -15246,7 +15330,7 @@ Domain allowed access.
4147 </param>
4148 <infoflow type="none"/>
4149 </interface>
4150 -<interface name="corenet_tcp_connect_amavisd_send_port" lineno="8021">
4151 +<interface name="corenet_tcp_connect_amavisd_send_port" lineno="8039">
4152 <summary>
4153 Make a TCP connection to the amavisd_send port.
4154 </summary>
4155 @@ -15256,7 +15340,7 @@ Domain allowed access.
4156 </summary>
4157 </param>
4158 </interface>
4159 -<interface name="corenet_send_amavisd_send_client_packets" lineno="8041">
4160 +<interface name="corenet_send_amavisd_send_client_packets" lineno="8059">
4161 <summary>
4162 Send amavisd_send_client packets.
4163 </summary>
4164 @@ -15267,7 +15351,7 @@ Domain allowed access.
4165 </param>
4166 <infoflow type="write" weight="10"/>
4167 </interface>
4168 -<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="8060">
4169 +<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="8078">
4170 <summary>
4171 Do not audit attempts to send amavisd_send_client packets.
4172 </summary>
4173 @@ -15278,7 +15362,7 @@ Domain to not audit.
4174 </param>
4175 <infoflow type="none"/>
4176 </interface>
4177 -<interface name="corenet_receive_amavisd_send_client_packets" lineno="8079">
4178 +<interface name="corenet_receive_amavisd_send_client_packets" lineno="8097">
4179 <summary>
4180 Receive amavisd_send_client packets.
4181 </summary>
4182 @@ -15289,7 +15373,7 @@ Domain allowed access.
4183 </param>
4184 <infoflow type="read" weight="10"/>
4185 </interface>
4186 -<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="8098">
4187 +<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="8116">
4188 <summary>
4189 Do not audit attempts to receive amavisd_send_client packets.
4190 </summary>
4191 @@ -15300,7 +15384,7 @@ Domain allowed access.
4192 </param>
4193 <infoflow type="none"/>
4194 </interface>
4195 -<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="8117">
4196 +<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="8135">
4197 <summary>
4198 Send and receive amavisd_send_client packets.
4199 </summary>
4200 @@ -15311,7 +15395,7 @@ Domain allowed access.
4201 </param>
4202 <infoflow type="both" weight="10"/>
4203 </interface>
4204 -<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="8133">
4205 +<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="8151">
4206 <summary>
4207 Do not audit attempts to send and receive amavisd_send_client packets.
4208 </summary>
4209 @@ -15322,7 +15406,7 @@ Domain to not audit.
4210 </param>
4211 <infoflow type="none"/>
4212 </interface>
4213 -<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="8148">
4214 +<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="8166">
4215 <summary>
4216 Relabel packets to amavisd_send_client the packet type.
4217 </summary>
4218 @@ -15332,7 +15416,7 @@ Domain allowed access.
4219 </summary>
4220 </param>
4221 </interface>
4222 -<interface name="corenet_send_amavisd_send_server_packets" lineno="8168">
4223 +<interface name="corenet_send_amavisd_send_server_packets" lineno="8186">
4224 <summary>
4225 Send amavisd_send_server packets.
4226 </summary>
4227 @@ -15343,7 +15427,7 @@ Domain allowed access.
4228 </param>
4229 <infoflow type="write" weight="10"/>
4230 </interface>
4231 -<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="8187">
4232 +<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="8205">
4233 <summary>
4234 Do not audit attempts to send amavisd_send_server packets.
4235 </summary>
4236 @@ -15354,7 +15438,7 @@ Domain to not audit.
4237 </param>
4238 <infoflow type="none"/>
4239 </interface>
4240 -<interface name="corenet_receive_amavisd_send_server_packets" lineno="8206">
4241 +<interface name="corenet_receive_amavisd_send_server_packets" lineno="8224">
4242 <summary>
4243 Receive amavisd_send_server packets.
4244 </summary>
4245 @@ -15365,7 +15449,7 @@ Domain allowed access.
4246 </param>
4247 <infoflow type="read" weight="10"/>
4248 </interface>
4249 -<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="8225">
4250 +<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="8243">
4251 <summary>
4252 Do not audit attempts to receive amavisd_send_server packets.
4253 </summary>
4254 @@ -15376,7 +15460,7 @@ Domain allowed access.
4255 </param>
4256 <infoflow type="none"/>
4257 </interface>
4258 -<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="8244">
4259 +<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="8262">
4260 <summary>
4261 Send and receive amavisd_send_server packets.
4262 </summary>
4263 @@ -15387,7 +15471,7 @@ Domain allowed access.
4264 </param>
4265 <infoflow type="both" weight="10"/>
4266 </interface>
4267 -<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="8260">
4268 +<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="8278">
4269 <summary>
4270 Do not audit attempts to send and receive amavisd_send_server packets.
4271 </summary>
4272 @@ -15398,7 +15482,7 @@ Domain to not audit.
4273 </param>
4274 <infoflow type="none"/>
4275 </interface>
4276 -<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="8275">
4277 +<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="8293">
4278 <summary>
4279 Relabel packets to amavisd_send_server the packet type.
4280 </summary>
4281 @@ -15408,7 +15492,7 @@ Domain allowed access.
4282 </summary>
4283 </param>
4284 </interface>
4285 -<interface name="corenet_tcp_sendrecv_amqp_port" lineno="8297">
4286 +<interface name="corenet_tcp_sendrecv_amqp_port" lineno="8315">
4287 <summary>
4288 Send and receive TCP traffic on the amqp port.
4289 </summary>
4290 @@ -15419,7 +15503,7 @@ Domain allowed access.
4291 </param>
4292 <infoflow type="both" weight="10"/>
4293 </interface>
4294 -<interface name="corenet_udp_send_amqp_port" lineno="8312">
4295 +<interface name="corenet_udp_send_amqp_port" lineno="8330">
4296 <summary>
4297 Send UDP traffic on the amqp port.
4298 </summary>
4299 @@ -15430,7 +15514,7 @@ Domain allowed access.
4300 </param>
4301 <infoflow type="write" weight="10"/>
4302 </interface>
4303 -<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="8327">
4304 +<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="8345">
4305 <summary>
4306 Do not audit attempts to send UDP traffic on the amqp port.
4307 </summary>
4308 @@ -15441,7 +15525,7 @@ Domain to not audit.
4309 </param>
4310 <infoflow type="none"/>
4311 </interface>
4312 -<interface name="corenet_udp_receive_amqp_port" lineno="8342">
4313 +<interface name="corenet_udp_receive_amqp_port" lineno="8360">
4314 <summary>
4315 Receive UDP traffic on the amqp port.
4316 </summary>
4317 @@ -15452,7 +15536,7 @@ Domain allowed access.
4318 </param>
4319 <infoflow type="read" weight="10"/>
4320 </interface>
4321 -<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="8357">
4322 +<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="8375">
4323 <summary>
4324 Do not audit attempts to receive UDP traffic on the amqp port.
4325 </summary>
4326 @@ -15463,7 +15547,7 @@ Domain to not audit.
4327 </param>
4328 <infoflow type="none"/>
4329 </interface>
4330 -<interface name="corenet_udp_sendrecv_amqp_port" lineno="8372">
4331 +<interface name="corenet_udp_sendrecv_amqp_port" lineno="8390">
4332 <summary>
4333 Send and receive UDP traffic on the amqp port.
4334 </summary>
4335 @@ -15474,7 +15558,7 @@ Domain allowed access.
4336 </param>
4337 <infoflow type="both" weight="10"/>
4338 </interface>
4339 -<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="8388">
4340 +<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="8406">
4341 <summary>
4342 Do not audit attempts to send and receive
4343 UDP traffic on the amqp port.
4344 @@ -15486,7 +15570,7 @@ Domain to not audit.
4345 </param>
4346 <infoflow type="none"/>
4347 </interface>
4348 -<interface name="corenet_tcp_bind_amqp_port" lineno="8403">
4349 +<interface name="corenet_tcp_bind_amqp_port" lineno="8421">
4350 <summary>
4351 Bind TCP sockets to the amqp port.
4352 </summary>
4353 @@ -15497,7 +15581,7 @@ Domain allowed access.
4354 </param>
4355 <infoflow type="none"/>
4356 </interface>
4357 -<interface name="corenet_udp_bind_amqp_port" lineno="8423">
4358 +<interface name="corenet_udp_bind_amqp_port" lineno="8441">
4359 <summary>
4360 Bind UDP sockets to the amqp port.
4361 </summary>
4362 @@ -15508,7 +15592,7 @@ Domain allowed access.
4363 </param>
4364 <infoflow type="none"/>
4365 </interface>
4366 -<interface name="corenet_tcp_connect_amqp_port" lineno="8442">
4367 +<interface name="corenet_tcp_connect_amqp_port" lineno="8460">
4368 <summary>
4369 Make a TCP connection to the amqp port.
4370 </summary>
4371 @@ -15518,7 +15602,7 @@ Domain allowed access.
4372 </summary>
4373 </param>
4374 </interface>
4375 -<interface name="corenet_send_amqp_client_packets" lineno="8462">
4376 +<interface name="corenet_send_amqp_client_packets" lineno="8480">
4377 <summary>
4378 Send amqp_client packets.
4379 </summary>
4380 @@ -15529,7 +15613,7 @@ Domain allowed access.
4381 </param>
4382 <infoflow type="write" weight="10"/>
4383 </interface>
4384 -<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="8481">
4385 +<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="8499">
4386 <summary>
4387 Do not audit attempts to send amqp_client packets.
4388 </summary>
4389 @@ -15540,7 +15624,7 @@ Domain to not audit.
4390 </param>
4391 <infoflow type="none"/>
4392 </interface>
4393 -<interface name="corenet_receive_amqp_client_packets" lineno="8500">
4394 +<interface name="corenet_receive_amqp_client_packets" lineno="8518">
4395 <summary>
4396 Receive amqp_client packets.
4397 </summary>
4398 @@ -15551,7 +15635,7 @@ Domain allowed access.
4399 </param>
4400 <infoflow type="read" weight="10"/>
4401 </interface>
4402 -<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="8519">
4403 +<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="8537">
4404 <summary>
4405 Do not audit attempts to receive amqp_client packets.
4406 </summary>
4407 @@ -15562,7 +15646,7 @@ Domain allowed access.
4408 </param>
4409 <infoflow type="none"/>
4410 </interface>
4411 -<interface name="corenet_sendrecv_amqp_client_packets" lineno="8538">
4412 +<interface name="corenet_sendrecv_amqp_client_packets" lineno="8556">
4413 <summary>
4414 Send and receive amqp_client packets.
4415 </summary>
4416 @@ -15573,7 +15657,7 @@ Domain allowed access.
4417 </param>
4418 <infoflow type="both" weight="10"/>
4419 </interface>
4420 -<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="8554">
4421 +<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="8572">
4422 <summary>
4423 Do not audit attempts to send and receive amqp_client packets.
4424 </summary>
4425 @@ -15584,7 +15668,7 @@ Domain to not audit.
4426 </param>
4427 <infoflow type="none"/>
4428 </interface>
4429 -<interface name="corenet_relabelto_amqp_client_packets" lineno="8569">
4430 +<interface name="corenet_relabelto_amqp_client_packets" lineno="8587">
4431 <summary>
4432 Relabel packets to amqp_client the packet type.
4433 </summary>
4434 @@ -15594,7 +15678,7 @@ Domain allowed access.
4435 </summary>
4436 </param>
4437 </interface>
4438 -<interface name="corenet_send_amqp_server_packets" lineno="8589">
4439 +<interface name="corenet_send_amqp_server_packets" lineno="8607">
4440 <summary>
4441 Send amqp_server packets.
4442 </summary>
4443 @@ -15605,7 +15689,7 @@ Domain allowed access.
4444 </param>
4445 <infoflow type="write" weight="10"/>
4446 </interface>
4447 -<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="8608">
4448 +<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="8626">
4449 <summary>
4450 Do not audit attempts to send amqp_server packets.
4451 </summary>
4452 @@ -15616,7 +15700,7 @@ Domain to not audit.
4453 </param>
4454 <infoflow type="none"/>
4455 </interface>
4456 -<interface name="corenet_receive_amqp_server_packets" lineno="8627">
4457 +<interface name="corenet_receive_amqp_server_packets" lineno="8645">
4458 <summary>
4459 Receive amqp_server packets.
4460 </summary>
4461 @@ -15627,7 +15711,7 @@ Domain allowed access.
4462 </param>
4463 <infoflow type="read" weight="10"/>
4464 </interface>
4465 -<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="8646">
4466 +<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="8664">
4467 <summary>
4468 Do not audit attempts to receive amqp_server packets.
4469 </summary>
4470 @@ -15638,7 +15722,7 @@ Domain allowed access.
4471 </param>
4472 <infoflow type="none"/>
4473 </interface>
4474 -<interface name="corenet_sendrecv_amqp_server_packets" lineno="8665">
4475 +<interface name="corenet_sendrecv_amqp_server_packets" lineno="8683">
4476 <summary>
4477 Send and receive amqp_server packets.
4478 </summary>
4479 @@ -15649,7 +15733,7 @@ Domain allowed access.
4480 </param>
4481 <infoflow type="both" weight="10"/>
4482 </interface>
4483 -<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="8681">
4484 +<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="8699">
4485 <summary>
4486 Do not audit attempts to send and receive amqp_server packets.
4487 </summary>
4488 @@ -15660,7 +15744,7 @@ Domain to not audit.
4489 </param>
4490 <infoflow type="none"/>
4491 </interface>
4492 -<interface name="corenet_relabelto_amqp_server_packets" lineno="8696">
4493 +<interface name="corenet_relabelto_amqp_server_packets" lineno="8714">
4494 <summary>
4495 Relabel packets to amqp_server the packet type.
4496 </summary>
4497 @@ -15670,7 +15754,7 @@ Domain allowed access.
4498 </summary>
4499 </param>
4500 </interface>
4501 -<interface name="corenet_tcp_sendrecv_aol_port" lineno="8718">
4502 +<interface name="corenet_tcp_sendrecv_aol_port" lineno="8736">
4503 <summary>
4504 Send and receive TCP traffic on the aol port.
4505 </summary>
4506 @@ -15681,7 +15765,7 @@ Domain allowed access.
4507 </param>
4508 <infoflow type="both" weight="10"/>
4509 </interface>
4510 -<interface name="corenet_udp_send_aol_port" lineno="8733">
4511 +<interface name="corenet_udp_send_aol_port" lineno="8751">
4512 <summary>
4513 Send UDP traffic on the aol port.
4514 </summary>
4515 @@ -15692,7 +15776,7 @@ Domain allowed access.
4516 </param>
4517 <infoflow type="write" weight="10"/>
4518 </interface>
4519 -<interface name="corenet_dontaudit_udp_send_aol_port" lineno="8748">
4520 +<interface name="corenet_dontaudit_udp_send_aol_port" lineno="8766">
4521 <summary>
4522 Do not audit attempts to send UDP traffic on the aol port.
4523 </summary>
4524 @@ -15703,7 +15787,7 @@ Domain to not audit.
4525 </param>
4526 <infoflow type="none"/>
4527 </interface>
4528 -<interface name="corenet_udp_receive_aol_port" lineno="8763">
4529 +<interface name="corenet_udp_receive_aol_port" lineno="8781">
4530 <summary>
4531 Receive UDP traffic on the aol port.
4532 </summary>
4533 @@ -15714,7 +15798,7 @@ Domain allowed access.
4534 </param>
4535 <infoflow type="read" weight="10"/>
4536 </interface>
4537 -<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="8778">
4538 +<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="8796">
4539 <summary>
4540 Do not audit attempts to receive UDP traffic on the aol port.
4541 </summary>
4542 @@ -15725,7 +15809,7 @@ Domain to not audit.
4543 </param>
4544 <infoflow type="none"/>
4545 </interface>
4546 -<interface name="corenet_udp_sendrecv_aol_port" lineno="8793">
4547 +<interface name="corenet_udp_sendrecv_aol_port" lineno="8811">
4548 <summary>
4549 Send and receive UDP traffic on the aol port.
4550 </summary>
4551 @@ -15736,7 +15820,7 @@ Domain allowed access.
4552 </param>
4553 <infoflow type="both" weight="10"/>
4554 </interface>
4555 -<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="8809">
4556 +<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="8827">
4557 <summary>
4558 Do not audit attempts to send and receive
4559 UDP traffic on the aol port.
4560 @@ -15748,7 +15832,7 @@ Domain to not audit.
4561 </param>
4562 <infoflow type="none"/>
4563 </interface>
4564 -<interface name="corenet_tcp_bind_aol_port" lineno="8824">
4565 +<interface name="corenet_tcp_bind_aol_port" lineno="8842">
4566 <summary>
4567 Bind TCP sockets to the aol port.
4568 </summary>
4569 @@ -15759,7 +15843,7 @@ Domain allowed access.
4570 </param>
4571 <infoflow type="none"/>
4572 </interface>
4573 -<interface name="corenet_udp_bind_aol_port" lineno="8844">
4574 +<interface name="corenet_udp_bind_aol_port" lineno="8862">
4575 <summary>
4576 Bind UDP sockets to the aol port.
4577 </summary>
4578 @@ -15770,7 +15854,7 @@ Domain allowed access.
4579 </param>
4580 <infoflow type="none"/>
4581 </interface>
4582 -<interface name="corenet_tcp_connect_aol_port" lineno="8863">
4583 +<interface name="corenet_tcp_connect_aol_port" lineno="8881">
4584 <summary>
4585 Make a TCP connection to the aol port.
4586 </summary>
4587 @@ -15780,7 +15864,7 @@ Domain allowed access.
4588 </summary>
4589 </param>
4590 </interface>
4591 -<interface name="corenet_send_aol_client_packets" lineno="8883">
4592 +<interface name="corenet_send_aol_client_packets" lineno="8901">
4593 <summary>
4594 Send aol_client packets.
4595 </summary>
4596 @@ -15791,7 +15875,7 @@ Domain allowed access.
4597 </param>
4598 <infoflow type="write" weight="10"/>
4599 </interface>
4600 -<interface name="corenet_dontaudit_send_aol_client_packets" lineno="8902">
4601 +<interface name="corenet_dontaudit_send_aol_client_packets" lineno="8920">
4602 <summary>
4603 Do not audit attempts to send aol_client packets.
4604 </summary>
4605 @@ -15802,7 +15886,7 @@ Domain to not audit.
4606 </param>
4607 <infoflow type="none"/>
4608 </interface>
4609 -<interface name="corenet_receive_aol_client_packets" lineno="8921">
4610 +<interface name="corenet_receive_aol_client_packets" lineno="8939">
4611 <summary>
4612 Receive aol_client packets.
4613 </summary>
4614 @@ -15813,7 +15897,7 @@ Domain allowed access.
4615 </param>
4616 <infoflow type="read" weight="10"/>
4617 </interface>
4618 -<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="8940">
4619 +<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="8958">
4620 <summary>
4621 Do not audit attempts to receive aol_client packets.
4622 </summary>
4623 @@ -15824,7 +15908,7 @@ Domain allowed access.
4624 </param>
4625 <infoflow type="none"/>
4626 </interface>
4627 -<interface name="corenet_sendrecv_aol_client_packets" lineno="8959">
4628 +<interface name="corenet_sendrecv_aol_client_packets" lineno="8977">
4629 <summary>
4630 Send and receive aol_client packets.
4631 </summary>
4632 @@ -15835,7 +15919,7 @@ Domain allowed access.
4633 </param>
4634 <infoflow type="both" weight="10"/>
4635 </interface>
4636 -<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="8975">
4637 +<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="8993">
4638 <summary>
4639 Do not audit attempts to send and receive aol_client packets.
4640 </summary>
4641 @@ -15846,7 +15930,7 @@ Domain to not audit.
4642 </param>
4643 <infoflow type="none"/>
4644 </interface>
4645 -<interface name="corenet_relabelto_aol_client_packets" lineno="8990">
4646 +<interface name="corenet_relabelto_aol_client_packets" lineno="9008">
4647 <summary>
4648 Relabel packets to aol_client the packet type.
4649 </summary>
4650 @@ -15856,7 +15940,7 @@ Domain allowed access.
4651 </summary>
4652 </param>
4653 </interface>
4654 -<interface name="corenet_send_aol_server_packets" lineno="9010">
4655 +<interface name="corenet_send_aol_server_packets" lineno="9028">
4656 <summary>
4657 Send aol_server packets.
4658 </summary>
4659 @@ -15867,7 +15951,7 @@ Domain allowed access.
4660 </param>
4661 <infoflow type="write" weight="10"/>
4662 </interface>
4663 -<interface name="corenet_dontaudit_send_aol_server_packets" lineno="9029">
4664 +<interface name="corenet_dontaudit_send_aol_server_packets" lineno="9047">
4665 <summary>
4666 Do not audit attempts to send aol_server packets.
4667 </summary>
4668 @@ -15878,7 +15962,7 @@ Domain to not audit.
4669 </param>
4670 <infoflow type="none"/>
4671 </interface>
4672 -<interface name="corenet_receive_aol_server_packets" lineno="9048">
4673 +<interface name="corenet_receive_aol_server_packets" lineno="9066">
4674 <summary>
4675 Receive aol_server packets.
4676 </summary>
4677 @@ -15889,7 +15973,7 @@ Domain allowed access.
4678 </param>
4679 <infoflow type="read" weight="10"/>
4680 </interface>
4681 -<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="9067">
4682 +<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="9085">
4683 <summary>
4684 Do not audit attempts to receive aol_server packets.
4685 </summary>
4686 @@ -15900,7 +15984,7 @@ Domain allowed access.
4687 </param>
4688 <infoflow type="none"/>
4689 </interface>
4690 -<interface name="corenet_sendrecv_aol_server_packets" lineno="9086">
4691 +<interface name="corenet_sendrecv_aol_server_packets" lineno="9104">
4692 <summary>
4693 Send and receive aol_server packets.
4694 </summary>
4695 @@ -15911,7 +15995,7 @@ Domain allowed access.
4696 </param>
4697 <infoflow type="both" weight="10"/>
4698 </interface>
4699 -<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="9102">
4700 +<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="9120">
4701 <summary>
4702 Do not audit attempts to send and receive aol_server packets.
4703 </summary>
4704 @@ -15922,7 +16006,7 @@ Domain to not audit.
4705 </param>
4706 <infoflow type="none"/>
4707 </interface>
4708 -<interface name="corenet_relabelto_aol_server_packets" lineno="9117">
4709 +<interface name="corenet_relabelto_aol_server_packets" lineno="9135">
4710 <summary>
4711 Relabel packets to aol_server the packet type.
4712 </summary>
4713 @@ -15932,7 +16016,7 @@ Domain allowed access.
4714 </summary>
4715 </param>
4716 </interface>
4717 -<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="9139">
4718 +<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="9157">
4719 <summary>
4720 Send and receive TCP traffic on the apcupsd port.
4721 </summary>
4722 @@ -15943,7 +16027,7 @@ Domain allowed access.
4723 </param>
4724 <infoflow type="both" weight="10"/>
4725 </interface>
4726 -<interface name="corenet_udp_send_apcupsd_port" lineno="9154">
4727 +<interface name="corenet_udp_send_apcupsd_port" lineno="9172">
4728 <summary>
4729 Send UDP traffic on the apcupsd port.
4730 </summary>
4731 @@ -15954,7 +16038,7 @@ Domain allowed access.
4732 </param>
4733 <infoflow type="write" weight="10"/>
4734 </interface>
4735 -<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="9169">
4736 +<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="9187">
4737 <summary>
4738 Do not audit attempts to send UDP traffic on the apcupsd port.
4739 </summary>
4740 @@ -15965,7 +16049,7 @@ Domain to not audit.
4741 </param>
4742 <infoflow type="none"/>
4743 </interface>
4744 -<interface name="corenet_udp_receive_apcupsd_port" lineno="9184">
4745 +<interface name="corenet_udp_receive_apcupsd_port" lineno="9202">
4746 <summary>
4747 Receive UDP traffic on the apcupsd port.
4748 </summary>
4749 @@ -15976,7 +16060,7 @@ Domain allowed access.
4750 </param>
4751 <infoflow type="read" weight="10"/>
4752 </interface>
4753 -<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="9199">
4754 +<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="9217">
4755 <summary>
4756 Do not audit attempts to receive UDP traffic on the apcupsd port.
4757 </summary>
4758 @@ -15987,7 +16071,7 @@ Domain to not audit.
4759 </param>
4760 <infoflow type="none"/>
4761 </interface>
4762 -<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="9214">
4763 +<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="9232">
4764 <summary>
4765 Send and receive UDP traffic on the apcupsd port.
4766 </summary>
4767 @@ -15998,7 +16082,7 @@ Domain allowed access.
4768 </param>
4769 <infoflow type="both" weight="10"/>
4770 </interface>
4771 -<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="9230">
4772 +<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="9248">
4773 <summary>
4774 Do not audit attempts to send and receive
4775 UDP traffic on the apcupsd port.
4776 @@ -16010,7 +16094,7 @@ Domain to not audit.
4777 </param>
4778 <infoflow type="none"/>
4779 </interface>
4780 -<interface name="corenet_tcp_bind_apcupsd_port" lineno="9245">
4781 +<interface name="corenet_tcp_bind_apcupsd_port" lineno="9263">
4782 <summary>
4783 Bind TCP sockets to the apcupsd port.
4784 </summary>
4785 @@ -16021,7 +16105,7 @@ Domain allowed access.
4786 </param>
4787 <infoflow type="none"/>
4788 </interface>
4789 -<interface name="corenet_udp_bind_apcupsd_port" lineno="9265">
4790 +<interface name="corenet_udp_bind_apcupsd_port" lineno="9283">
4791 <summary>
4792 Bind UDP sockets to the apcupsd port.
4793 </summary>
4794 @@ -16032,7 +16116,7 @@ Domain allowed access.
4795 </param>
4796 <infoflow type="none"/>
4797 </interface>
4798 -<interface name="corenet_tcp_connect_apcupsd_port" lineno="9284">
4799 +<interface name="corenet_tcp_connect_apcupsd_port" lineno="9302">
4800 <summary>
4801 Make a TCP connection to the apcupsd port.
4802 </summary>
4803 @@ -16042,7 +16126,7 @@ Domain allowed access.
4804 </summary>
4805 </param>
4806 </interface>
4807 -<interface name="corenet_send_apcupsd_client_packets" lineno="9304">
4808 +<interface name="corenet_send_apcupsd_client_packets" lineno="9322">
4809 <summary>
4810 Send apcupsd_client packets.
4811 </summary>
4812 @@ -16053,7 +16137,7 @@ Domain allowed access.
4813 </param>
4814 <infoflow type="write" weight="10"/>
4815 </interface>
4816 -<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="9323">
4817 +<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="9341">
4818 <summary>
4819 Do not audit attempts to send apcupsd_client packets.
4820 </summary>
4821 @@ -16064,7 +16148,7 @@ Domain to not audit.
4822 </param>
4823 <infoflow type="none"/>
4824 </interface>
4825 -<interface name="corenet_receive_apcupsd_client_packets" lineno="9342">
4826 +<interface name="corenet_receive_apcupsd_client_packets" lineno="9360">
4827 <summary>
4828 Receive apcupsd_client packets.
4829 </summary>
4830 @@ -16075,7 +16159,7 @@ Domain allowed access.
4831 </param>
4832 <infoflow type="read" weight="10"/>
4833 </interface>
4834 -<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="9361">
4835 +<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="9379">
4836 <summary>
4837 Do not audit attempts to receive apcupsd_client packets.
4838 </summary>
4839 @@ -16086,7 +16170,7 @@ Domain allowed access.
4840 </param>
4841 <infoflow type="none"/>
4842 </interface>
4843 -<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="9380">
4844 +<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="9398">
4845 <summary>
4846 Send and receive apcupsd_client packets.
4847 </summary>
4848 @@ -16097,7 +16181,7 @@ Domain allowed access.
4849 </param>
4850 <infoflow type="both" weight="10"/>
4851 </interface>
4852 -<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="9396">
4853 +<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="9414">
4854 <summary>
4855 Do not audit attempts to send and receive apcupsd_client packets.
4856 </summary>
4857 @@ -16108,7 +16192,7 @@ Domain to not audit.
4858 </param>
4859 <infoflow type="none"/>
4860 </interface>
4861 -<interface name="corenet_relabelto_apcupsd_client_packets" lineno="9411">
4862 +<interface name="corenet_relabelto_apcupsd_client_packets" lineno="9429">
4863 <summary>
4864 Relabel packets to apcupsd_client the packet type.
4865 </summary>
4866 @@ -16118,7 +16202,7 @@ Domain allowed access.
4867 </summary>
4868 </param>
4869 </interface>
4870 -<interface name="corenet_send_apcupsd_server_packets" lineno="9431">
4871 +<interface name="corenet_send_apcupsd_server_packets" lineno="9449">
4872 <summary>
4873 Send apcupsd_server packets.
4874 </summary>
4875 @@ -16129,7 +16213,7 @@ Domain allowed access.
4876 </param>
4877 <infoflow type="write" weight="10"/>
4878 </interface>
4879 -<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="9450">
4880 +<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="9468">
4881 <summary>
4882 Do not audit attempts to send apcupsd_server packets.
4883 </summary>
4884 @@ -16140,7 +16224,7 @@ Domain to not audit.
4885 </param>
4886 <infoflow type="none"/>
4887 </interface>
4888 -<interface name="corenet_receive_apcupsd_server_packets" lineno="9469">
4889 +<interface name="corenet_receive_apcupsd_server_packets" lineno="9487">
4890 <summary>
4891 Receive apcupsd_server packets.
4892 </summary>
4893 @@ -16151,7 +16235,7 @@ Domain allowed access.
4894 </param>
4895 <infoflow type="read" weight="10"/>
4896 </interface>
4897 -<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="9488">
4898 +<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="9506">
4899 <summary>
4900 Do not audit attempts to receive apcupsd_server packets.
4901 </summary>
4902 @@ -16162,7 +16246,7 @@ Domain allowed access.
4903 </param>
4904 <infoflow type="none"/>
4905 </interface>
4906 -<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="9507">
4907 +<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="9525">
4908 <summary>
4909 Send and receive apcupsd_server packets.
4910 </summary>
4911 @@ -16173,7 +16257,7 @@ Domain allowed access.
4912 </param>
4913 <infoflow type="both" weight="10"/>
4914 </interface>
4915 -<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="9523">
4916 +<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="9541">
4917 <summary>
4918 Do not audit attempts to send and receive apcupsd_server packets.
4919 </summary>
4920 @@ -16184,7 +16268,7 @@ Domain to not audit.
4921 </param>
4922 <infoflow type="none"/>
4923 </interface>
4924 -<interface name="corenet_relabelto_apcupsd_server_packets" lineno="9538">
4925 +<interface name="corenet_relabelto_apcupsd_server_packets" lineno="9556">
4926 <summary>
4927 Relabel packets to apcupsd_server the packet type.
4928 </summary>
4929 @@ -16194,7 +16278,7 @@ Domain allowed access.
4930 </summary>
4931 </param>
4932 </interface>
4933 -<interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="9560">
4934 +<interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="9578">
4935 <summary>
4936 Send and receive TCP traffic on the apertus_ldp port.
4937 </summary>
4938 @@ -16205,7 +16289,7 @@ Domain allowed access.
4939 </param>
4940 <infoflow type="both" weight="10"/>
4941 </interface>
4942 -<interface name="corenet_udp_send_apertus_ldp_port" lineno="9575">
4943 +<interface name="corenet_udp_send_apertus_ldp_port" lineno="9593">
4944 <summary>
4945 Send UDP traffic on the apertus_ldp port.
4946 </summary>
4947 @@ -16216,7 +16300,7 @@ Domain allowed access.
4948 </param>
4949 <infoflow type="write" weight="10"/>
4950 </interface>
4951 -<interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="9590">
4952 +<interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="9608">
4953 <summary>
4954 Do not audit attempts to send UDP traffic on the apertus_ldp port.
4955 </summary>
4956 @@ -16227,7 +16311,7 @@ Domain to not audit.
4957 </param>
4958 <infoflow type="none"/>
4959 </interface>
4960 -<interface name="corenet_udp_receive_apertus_ldp_port" lineno="9605">
4961 +<interface name="corenet_udp_receive_apertus_ldp_port" lineno="9623">
4962 <summary>
4963 Receive UDP traffic on the apertus_ldp port.
4964 </summary>
4965 @@ -16238,7 +16322,7 @@ Domain allowed access.
4966 </param>
4967 <infoflow type="read" weight="10"/>
4968 </interface>
4969 -<interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="9620">
4970 +<interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="9638">
4971 <summary>
4972 Do not audit attempts to receive UDP traffic on the apertus_ldp port.
4973 </summary>
4974 @@ -16249,7 +16333,7 @@ Domain to not audit.
4975 </param>
4976 <infoflow type="none"/>
4977 </interface>
4978 -<interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="9635">
4979 +<interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="9653">
4980 <summary>
4981 Send and receive UDP traffic on the apertus_ldp port.
4982 </summary>
4983 @@ -16260,7 +16344,7 @@ Domain allowed access.
4984 </param>
4985 <infoflow type="both" weight="10"/>
4986 </interface>
4987 -<interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="9651">
4988 +<interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="9669">
4989 <summary>
4990 Do not audit attempts to send and receive
4991 UDP traffic on the apertus_ldp port.
4992 @@ -16272,7 +16356,7 @@ Domain to not audit.
4993 </param>
4994 <infoflow type="none"/>
4995 </interface>
4996 -<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="9666">
4997 +<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="9684">
4998 <summary>
4999 Bind TCP sockets to the apertus_ldp port.
5000 </summary>
5001 @@ -16283,7 +16367,7 @@ Domain allowed access.
5002 </param>
5003 <infoflow type="none"/>
5004 </interface>
5005 -<interface name="corenet_udp_bind_apertus_ldp_port" lineno="9686">
5006 +<interface name="corenet_udp_bind_apertus_ldp_port" lineno="9704">
5007 <summary>
5008 Bind UDP sockets to the apertus_ldp port.
5009 </summary>
5010 @@ -16294,7 +16378,7 @@ Domain allowed access.
5011 </param>
5012 <infoflow type="none"/>
5013 </interface>
5014 -<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="9705">
5015 +<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="9723">
5016 <summary>
5017 Make a TCP connection to the apertus_ldp port.
5018 </summary>
5019 @@ -16304,7 +16388,7 @@ Domain allowed access.
5020 </summary>
5021 </param>
5022 </interface>
5023 -<interface name="corenet_send_apertus_ldp_client_packets" lineno="9725">
5024 +<interface name="corenet_send_apertus_ldp_client_packets" lineno="9743">
5025 <summary>
5026 Send apertus_ldp_client packets.
5027 </summary>
5028 @@ -16315,7 +16399,7 @@ Domain allowed access.
5029 </param>
5030 <infoflow type="write" weight="10"/>
5031 </interface>
5032 -<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="9744">
5033 +<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="9762">
5034 <summary>
5035 Do not audit attempts to send apertus_ldp_client packets.
5036 </summary>
5037 @@ -16326,7 +16410,7 @@ Domain to not audit.
5038 </param>
5039 <infoflow type="none"/>
5040 </interface>
5041 -<interface name="corenet_receive_apertus_ldp_client_packets" lineno="9763">
5042 +<interface name="corenet_receive_apertus_ldp_client_packets" lineno="9781">
5043 <summary>
5044 Receive apertus_ldp_client packets.
5045 </summary>
5046 @@ -16337,7 +16421,7 @@ Domain allowed access.
5047 </param>
5048 <infoflow type="read" weight="10"/>
5049 </interface>
5050 -<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="9782">
5051 +<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="9800">
5052 <summary>
5053 Do not audit attempts to receive apertus_ldp_client packets.
5054 </summary>
5055 @@ -16348,7 +16432,7 @@ Domain allowed access.
5056 </param>
5057 <infoflow type="none"/>
5058 </interface>
5059 -<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="9801">
5060 +<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="9819">
5061 <summary>
5062 Send and receive apertus_ldp_client packets.
5063 </summary>
5064 @@ -16359,7 +16443,7 @@ Domain allowed access.
5065 </param>
5066 <infoflow type="both" weight="10"/>
5067 </interface>
5068 -<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="9817">
5069 +<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="9835">
5070 <summary>
5071 Do not audit attempts to send and receive apertus_ldp_client packets.
5072 </summary>
5073 @@ -16370,7 +16454,7 @@ Domain to not audit.
5074 </param>
5075 <infoflow type="none"/>
5076 </interface>
5077 -<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="9832">
5078 +<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="9850">
5079 <summary>
5080 Relabel packets to apertus_ldp_client the packet type.
5081 </summary>
5082 @@ -16380,7 +16464,7 @@ Domain allowed access.
5083 </summary>
5084 </param>
5085 </interface>
5086 -<interface name="corenet_send_apertus_ldp_server_packets" lineno="9852">
5087 +<interface name="corenet_send_apertus_ldp_server_packets" lineno="9870">
5088 <summary>
5089 Send apertus_ldp_server packets.
5090 </summary>
5091 @@ -16391,7 +16475,7 @@ Domain allowed access.
5092 </param>
5093 <infoflow type="write" weight="10"/>
5094 </interface>
5095 -<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="9871">
5096 +<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="9889">
5097 <summary>
5098 Do not audit attempts to send apertus_ldp_server packets.
5099 </summary>
5100 @@ -16402,7 +16486,7 @@ Domain to not audit.
5101 </param>
5102 <infoflow type="none"/>
5103 </interface>
5104 -<interface name="corenet_receive_apertus_ldp_server_packets" lineno="9890">
5105 +<interface name="corenet_receive_apertus_ldp_server_packets" lineno="9908">
5106 <summary>
5107 Receive apertus_ldp_server packets.
5108 </summary>
5109 @@ -16413,7 +16497,7 @@ Domain allowed access.
5110 </param>
5111 <infoflow type="read" weight="10"/>
5112 </interface>
5113 -<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="9909">
5114 +<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="9927">
5115 <summary>
5116 Do not audit attempts to receive apertus_ldp_server packets.
5117 </summary>
5118 @@ -16424,7 +16508,7 @@ Domain allowed access.
5119 </param>
5120 <infoflow type="none"/>
5121 </interface>
5122 -<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="9928">
5123 +<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="9946">
5124 <summary>
5125 Send and receive apertus_ldp_server packets.
5126 </summary>
5127 @@ -16435,7 +16519,7 @@ Domain allowed access.
5128 </param>
5129 <infoflow type="both" weight="10"/>
5130 </interface>
5131 -<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="9944">
5132 +<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="9962">
5133 <summary>
5134 Do not audit attempts to send and receive apertus_ldp_server packets.
5135 </summary>
5136 @@ -16446,7 +16530,7 @@ Domain to not audit.
5137 </param>
5138 <infoflow type="none"/>
5139 </interface>
5140 -<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="9959">
5141 +<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="9977">
5142 <summary>
5143 Relabel packets to apertus_ldp_server the packet type.
5144 </summary>
5145 @@ -16456,7 +16540,7 @@ Domain allowed access.
5146 </summary>
5147 </param>
5148 </interface>
5149 -<interface name="corenet_tcp_sendrecv_aptcacher_port" lineno="9981">
5150 +<interface name="corenet_tcp_sendrecv_aptcacher_port" lineno="9999">
5151 <summary>
5152 Send and receive TCP traffic on the aptcacher port.
5153 </summary>
5154 @@ -16467,7 +16551,7 @@ Domain allowed access.
5155 </param>
5156 <infoflow type="both" weight="10"/>
5157 </interface>
5158 -<interface name="corenet_udp_send_aptcacher_port" lineno="9996">
5159 +<interface name="corenet_udp_send_aptcacher_port" lineno="10014">
5160 <summary>
5161 Send UDP traffic on the aptcacher port.
5162 </summary>
5163 @@ -16478,7 +16562,7 @@ Domain allowed access.
5164 </param>
5165 <infoflow type="write" weight="10"/>
5166 </interface>
5167 -<interface name="corenet_dontaudit_udp_send_aptcacher_port" lineno="10011">
5168 +<interface name="corenet_dontaudit_udp_send_aptcacher_port" lineno="10029">
5169 <summary>
5170 Do not audit attempts to send UDP traffic on the aptcacher port.
5171 </summary>
5172 @@ -16489,7 +16573,7 @@ Domain to not audit.
5173 </param>
5174 <infoflow type="none"/>
5175 </interface>
5176 -<interface name="corenet_udp_receive_aptcacher_port" lineno="10026">
5177 +<interface name="corenet_udp_receive_aptcacher_port" lineno="10044">
5178 <summary>
5179 Receive UDP traffic on the aptcacher port.
5180 </summary>
5181 @@ -16500,7 +16584,7 @@ Domain allowed access.
5182 </param>
5183 <infoflow type="read" weight="10"/>
5184 </interface>
5185 -<interface name="corenet_dontaudit_udp_receive_aptcacher_port" lineno="10041">
5186 +<interface name="corenet_dontaudit_udp_receive_aptcacher_port" lineno="10059">
5187 <summary>
5188 Do not audit attempts to receive UDP traffic on the aptcacher port.
5189 </summary>
5190 @@ -16511,7 +16595,7 @@ Domain to not audit.
5191 </param>
5192 <infoflow type="none"/>
5193 </interface>
5194 -<interface name="corenet_udp_sendrecv_aptcacher_port" lineno="10056">
5195 +<interface name="corenet_udp_sendrecv_aptcacher_port" lineno="10074">
5196 <summary>
5197 Send and receive UDP traffic on the aptcacher port.
5198 </summary>
5199 @@ -16522,7 +16606,7 @@ Domain allowed access.
5200 </param>
5201 <infoflow type="both" weight="10"/>
5202 </interface>
5203 -<interface name="corenet_dontaudit_udp_sendrecv_aptcacher_port" lineno="10072">
5204 +<interface name="corenet_dontaudit_udp_sendrecv_aptcacher_port" lineno="10090">
5205 <summary>
5206 Do not audit attempts to send and receive
5207 UDP traffic on the aptcacher port.
5208 @@ -16534,7 +16618,7 @@ Domain to not audit.
5209 </param>
5210 <infoflow type="none"/>
5211 </interface>
5212 -<interface name="corenet_tcp_bind_aptcacher_port" lineno="10087">
5213 +<interface name="corenet_tcp_bind_aptcacher_port" lineno="10105">
5214 <summary>
5215 Bind TCP sockets to the aptcacher port.
5216 </summary>
5217 @@ -16545,7 +16629,7 @@ Domain allowed access.
5218 </param>
5219 <infoflow type="none"/>
5220 </interface>
5221 -<interface name="corenet_udp_bind_aptcacher_port" lineno="10107">
5222 +<interface name="corenet_udp_bind_aptcacher_port" lineno="10125">
5223 <summary>
5224 Bind UDP sockets to the aptcacher port.
5225 </summary>
5226 @@ -16556,7 +16640,7 @@ Domain allowed access.
5227 </param>
5228 <infoflow type="none"/>
5229 </interface>
5230 -<interface name="corenet_tcp_connect_aptcacher_port" lineno="10126">
5231 +<interface name="corenet_tcp_connect_aptcacher_port" lineno="10144">
5232 <summary>
5233 Make a TCP connection to the aptcacher port.
5234 </summary>
5235 @@ -16566,7 +16650,7 @@ Domain allowed access.
5236 </summary>
5237 </param>
5238 </interface>
5239 -<interface name="corenet_send_aptcacher_client_packets" lineno="10146">
5240 +<interface name="corenet_send_aptcacher_client_packets" lineno="10164">
5241 <summary>
5242 Send aptcacher_client packets.
5243 </summary>
5244 @@ -16577,7 +16661,7 @@ Domain allowed access.
5245 </param>
5246 <infoflow type="write" weight="10"/>
5247 </interface>
5248 -<interface name="corenet_dontaudit_send_aptcacher_client_packets" lineno="10165">
5249 +<interface name="corenet_dontaudit_send_aptcacher_client_packets" lineno="10183">
5250 <summary>
5251 Do not audit attempts to send aptcacher_client packets.
5252 </summary>
5253 @@ -16588,7 +16672,7 @@ Domain to not audit.
5254 </param>
5255 <infoflow type="none"/>
5256 </interface>
5257 -<interface name="corenet_receive_aptcacher_client_packets" lineno="10184">
5258 +<interface name="corenet_receive_aptcacher_client_packets" lineno="10202">
5259 <summary>
5260 Receive aptcacher_client packets.
5261 </summary>
5262 @@ -16599,7 +16683,7 @@ Domain allowed access.
5263 </param>
5264 <infoflow type="read" weight="10"/>
5265 </interface>
5266 -<interface name="corenet_dontaudit_receive_aptcacher_client_packets" lineno="10203">
5267 +<interface name="corenet_dontaudit_receive_aptcacher_client_packets" lineno="10221">
5268 <summary>
5269 Do not audit attempts to receive aptcacher_client packets.
5270 </summary>
5271 @@ -16610,7 +16694,7 @@ Domain allowed access.
5272 </param>
5273 <infoflow type="none"/>
5274 </interface>
5275 -<interface name="corenet_sendrecv_aptcacher_client_packets" lineno="10222">
5276 +<interface name="corenet_sendrecv_aptcacher_client_packets" lineno="10240">
5277 <summary>
5278 Send and receive aptcacher_client packets.
5279 </summary>
5280 @@ -16621,7 +16705,7 @@ Domain allowed access.
5281 </param>
5282 <infoflow type="both" weight="10"/>
5283 </interface>
5284 -<interface name="corenet_dontaudit_sendrecv_aptcacher_client_packets" lineno="10238">
5285 +<interface name="corenet_dontaudit_sendrecv_aptcacher_client_packets" lineno="10256">
5286 <summary>
5287 Do not audit attempts to send and receive aptcacher_client packets.
5288 </summary>
5289 @@ -16632,7 +16716,7 @@ Domain to not audit.
5290 </param>
5291 <infoflow type="none"/>
5292 </interface>
5293 -<interface name="corenet_relabelto_aptcacher_client_packets" lineno="10253">
5294 +<interface name="corenet_relabelto_aptcacher_client_packets" lineno="10271">
5295 <summary>
5296 Relabel packets to aptcacher_client the packet type.
5297 </summary>
5298 @@ -16642,7 +16726,7 @@ Domain allowed access.
5299 </summary>
5300 </param>
5301 </interface>
5302 -<interface name="corenet_send_aptcacher_server_packets" lineno="10273">
5303 +<interface name="corenet_send_aptcacher_server_packets" lineno="10291">
5304 <summary>
5305 Send aptcacher_server packets.
5306 </summary>
5307 @@ -16653,7 +16737,7 @@ Domain allowed access.
5308 </param>
5309 <infoflow type="write" weight="10"/>
5310 </interface>
5311 -<interface name="corenet_dontaudit_send_aptcacher_server_packets" lineno="10292">
5312 +<interface name="corenet_dontaudit_send_aptcacher_server_packets" lineno="10310">
5313 <summary>
5314 Do not audit attempts to send aptcacher_server packets.
5315 </summary>
5316 @@ -16664,7 +16748,7 @@ Domain to not audit.
5317 </param>
5318 <infoflow type="none"/>
5319 </interface>
5320 -<interface name="corenet_receive_aptcacher_server_packets" lineno="10311">
5321 +<interface name="corenet_receive_aptcacher_server_packets" lineno="10329">
5322 <summary>
5323 Receive aptcacher_server packets.
5324 </summary>
5325 @@ -16675,7 +16759,7 @@ Domain allowed access.
5326 </param>
5327 <infoflow type="read" weight="10"/>
5328 </interface>
5329 -<interface name="corenet_dontaudit_receive_aptcacher_server_packets" lineno="10330">
5330 +<interface name="corenet_dontaudit_receive_aptcacher_server_packets" lineno="10348">
5331 <summary>
5332 Do not audit attempts to receive aptcacher_server packets.
5333 </summary>
5334 @@ -16686,7 +16770,7 @@ Domain allowed access.
5335 </param>
5336 <infoflow type="none"/>
5337 </interface>
5338 -<interface name="corenet_sendrecv_aptcacher_server_packets" lineno="10349">
5339 +<interface name="corenet_sendrecv_aptcacher_server_packets" lineno="10367">
5340 <summary>
5341 Send and receive aptcacher_server packets.
5342 </summary>
5343 @@ -16697,7 +16781,7 @@ Domain allowed access.
5344 </param>
5345 <infoflow type="both" weight="10"/>
5346 </interface>
5347 -<interface name="corenet_dontaudit_sendrecv_aptcacher_server_packets" lineno="10365">
5348 +<interface name="corenet_dontaudit_sendrecv_aptcacher_server_packets" lineno="10383">
5349 <summary>
5350 Do not audit attempts to send and receive aptcacher_server packets.
5351 </summary>
5352 @@ -16708,7 +16792,7 @@ Domain to not audit.
5353 </param>
5354 <infoflow type="none"/>
5355 </interface>
5356 -<interface name="corenet_relabelto_aptcacher_server_packets" lineno="10380">
5357 +<interface name="corenet_relabelto_aptcacher_server_packets" lineno="10398">
5358 <summary>
5359 Relabel packets to aptcacher_server the packet type.
5360 </summary>
5361 @@ -16718,7 +16802,7 @@ Domain allowed access.
5362 </summary>
5363 </param>
5364 </interface>
5365 -<interface name="corenet_tcp_sendrecv_armtechdaemon_port" lineno="10402">
5366 +<interface name="corenet_tcp_sendrecv_armtechdaemon_port" lineno="10420">
5367 <summary>
5368 Send and receive TCP traffic on the armtechdaemon port.
5369 </summary>
5370 @@ -16729,7 +16813,7 @@ Domain allowed access.
5371 </param>
5372 <infoflow type="both" weight="10"/>
5373 </interface>
5374 -<interface name="corenet_udp_send_armtechdaemon_port" lineno="10417">
5375 +<interface name="corenet_udp_send_armtechdaemon_port" lineno="10435">
5376 <summary>
5377 Send UDP traffic on the armtechdaemon port.
5378 </summary>
5379 @@ -16740,7 +16824,7 @@ Domain allowed access.
5380 </param>
5381 <infoflow type="write" weight="10"/>
5382 </interface>
5383 -<interface name="corenet_dontaudit_udp_send_armtechdaemon_port" lineno="10432">
5384 +<interface name="corenet_dontaudit_udp_send_armtechdaemon_port" lineno="10450">
5385 <summary>
5386 Do not audit attempts to send UDP traffic on the armtechdaemon port.
5387 </summary>
5388 @@ -16751,7 +16835,7 @@ Domain to not audit.
5389 </param>
5390 <infoflow type="none"/>
5391 </interface>
5392 -<interface name="corenet_udp_receive_armtechdaemon_port" lineno="10447">
5393 +<interface name="corenet_udp_receive_armtechdaemon_port" lineno="10465">
5394 <summary>
5395 Receive UDP traffic on the armtechdaemon port.
5396 </summary>
5397 @@ -16762,7 +16846,7 @@ Domain allowed access.
5398 </param>
5399 <infoflow type="read" weight="10"/>
5400 </interface>
5401 -<interface name="corenet_dontaudit_udp_receive_armtechdaemon_port" lineno="10462">
5402 +<interface name="corenet_dontaudit_udp_receive_armtechdaemon_port" lineno="10480">
5403 <summary>
5404 Do not audit attempts to receive UDP traffic on the armtechdaemon port.
5405 </summary>
5406 @@ -16773,7 +16857,7 @@ Domain to not audit.
5407 </param>
5408 <infoflow type="none"/>
5409 </interface>
5410 -<interface name="corenet_udp_sendrecv_armtechdaemon_port" lineno="10477">
5411 +<interface name="corenet_udp_sendrecv_armtechdaemon_port" lineno="10495">
5412 <summary>
5413 Send and receive UDP traffic on the armtechdaemon port.
5414 </summary>
5415 @@ -16784,7 +16868,7 @@ Domain allowed access.
5416 </param>
5417 <infoflow type="both" weight="10"/>
5418 </interface>
5419 -<interface name="corenet_dontaudit_udp_sendrecv_armtechdaemon_port" lineno="10493">
5420 +<interface name="corenet_dontaudit_udp_sendrecv_armtechdaemon_port" lineno="10511">
5421 <summary>
5422 Do not audit attempts to send and receive
5423 UDP traffic on the armtechdaemon port.
5424 @@ -16796,7 +16880,7 @@ Domain to not audit.
5425 </param>
5426 <infoflow type="none"/>
5427 </interface>
5428 -<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="10508">
5429 +<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="10526">
5430 <summary>
5431 Bind TCP sockets to the armtechdaemon port.
5432 </summary>
5433 @@ -16807,7 +16891,7 @@ Domain allowed access.
5434 </param>
5435 <infoflow type="none"/>
5436 </interface>
5437 -<interface name="corenet_udp_bind_armtechdaemon_port" lineno="10528">
5438 +<interface name="corenet_udp_bind_armtechdaemon_port" lineno="10546">
5439 <summary>
5440 Bind UDP sockets to the armtechdaemon port.
5441 </summary>
5442 @@ -16818,7 +16902,7 @@ Domain allowed access.
5443 </param>
5444 <infoflow type="none"/>
5445 </interface>
5446 -<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="10547">
5447 +<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="10565">
5448 <summary>
5449 Make a TCP connection to the armtechdaemon port.
5450 </summary>
5451 @@ -16828,7 +16912,7 @@ Domain allowed access.
5452 </summary>
5453 </param>
5454 </interface>
5455 -<interface name="corenet_send_armtechdaemon_client_packets" lineno="10567">
5456 +<interface name="corenet_send_armtechdaemon_client_packets" lineno="10585">
5457 <summary>
5458 Send armtechdaemon_client packets.
5459 </summary>
5460 @@ -16839,7 +16923,7 @@ Domain allowed access.
5461 </param>
5462 <infoflow type="write" weight="10"/>
5463 </interface>
5464 -<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="10586">
5465 +<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="10604">
5466 <summary>
5467 Do not audit attempts to send armtechdaemon_client packets.
5468 </summary>
5469 @@ -16850,7 +16934,7 @@ Domain to not audit.
5470 </param>
5471 <infoflow type="none"/>
5472 </interface>
5473 -<interface name="corenet_receive_armtechdaemon_client_packets" lineno="10605">
5474 +<interface name="corenet_receive_armtechdaemon_client_packets" lineno="10623">
5475 <summary>
5476 Receive armtechdaemon_client packets.
5477 </summary>
5478 @@ -16861,7 +16945,7 @@ Domain allowed access.
5479 </param>
5480 <infoflow type="read" weight="10"/>
5481 </interface>
5482 -<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="10624">
5483 +<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="10642">
5484 <summary>
5485 Do not audit attempts to receive armtechdaemon_client packets.
5486 </summary>
5487 @@ -16872,7 +16956,7 @@ Domain allowed access.
5488 </param>
5489 <infoflow type="none"/>
5490 </interface>
5491 -<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="10643">
5492 +<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="10661">
5493 <summary>
5494 Send and receive armtechdaemon_client packets.
5495 </summary>
5496 @@ -16883,7 +16967,7 @@ Domain allowed access.
5497 </param>
5498 <infoflow type="both" weight="10"/>
5499 </interface>
5500 -<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="10659">
5501 +<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="10677">
5502 <summary>
5503 Do not audit attempts to send and receive armtechdaemon_client packets.
5504 </summary>
5505 @@ -16894,7 +16978,7 @@ Domain to not audit.
5506 </param>
5507 <infoflow type="none"/>
5508 </interface>
5509 -<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="10674">
5510 +<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="10692">
5511 <summary>
5512 Relabel packets to armtechdaemon_client the packet type.
5513 </summary>
5514 @@ -16904,7 +16988,7 @@ Domain allowed access.
5515 </summary>
5516 </param>
5517 </interface>
5518 -<interface name="corenet_send_armtechdaemon_server_packets" lineno="10694">
5519 +<interface name="corenet_send_armtechdaemon_server_packets" lineno="10712">
5520 <summary>
5521 Send armtechdaemon_server packets.
5522 </summary>
5523 @@ -16915,7 +16999,7 @@ Domain allowed access.
5524 </param>
5525 <infoflow type="write" weight="10"/>
5526 </interface>
5527 -<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="10713">
5528 +<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="10731">
5529 <summary>
5530 Do not audit attempts to send armtechdaemon_server packets.
5531 </summary>
5532 @@ -16926,7 +17010,7 @@ Domain to not audit.
5533 </param>
5534 <infoflow type="none"/>
5535 </interface>
5536 -<interface name="corenet_receive_armtechdaemon_server_packets" lineno="10732">
5537 +<interface name="corenet_receive_armtechdaemon_server_packets" lineno="10750">
5538 <summary>
5539 Receive armtechdaemon_server packets.
5540 </summary>
5541 @@ -16937,7 +17021,7 @@ Domain allowed access.
5542 </param>
5543 <infoflow type="read" weight="10"/>
5544 </interface>
5545 -<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="10751">
5546 +<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="10769">
5547 <summary>
5548 Do not audit attempts to receive armtechdaemon_server packets.
5549 </summary>
5550 @@ -16948,7 +17032,7 @@ Domain allowed access.
5551 </param>
5552 <infoflow type="none"/>
5553 </interface>
5554 -<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="10770">
5555 +<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="10788">
5556 <summary>
5557 Send and receive armtechdaemon_server packets.
5558 </summary>
5559 @@ -16959,7 +17043,7 @@ Domain allowed access.
5560 </param>
5561 <infoflow type="both" weight="10"/>
5562 </interface>
5563 -<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="10786">
5564 +<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="10804">
5565 <summary>
5566 Do not audit attempts to send and receive armtechdaemon_server packets.
5567 </summary>
5568 @@ -16970,7 +17054,7 @@ Domain to not audit.
5569 </param>
5570 <infoflow type="none"/>
5571 </interface>
5572 -<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="10801">
5573 +<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="10819">
5574 <summary>
5575 Relabel packets to armtechdaemon_server the packet type.
5576 </summary>
5577 @@ -16980,7 +17064,7 @@ Domain allowed access.
5578 </summary>
5579 </param>
5580 </interface>
5581 -<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="10823">
5582 +<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="10841">
5583 <summary>
5584 Send and receive TCP traffic on the asterisk port.
5585 </summary>
5586 @@ -16991,7 +17075,7 @@ Domain allowed access.
5587 </param>
5588 <infoflow type="both" weight="10"/>
5589 </interface>
5590 -<interface name="corenet_udp_send_asterisk_port" lineno="10838">
5591 +<interface name="corenet_udp_send_asterisk_port" lineno="10856">
5592 <summary>
5593 Send UDP traffic on the asterisk port.
5594 </summary>
5595 @@ -17002,7 +17086,7 @@ Domain allowed access.
5596 </param>
5597 <infoflow type="write" weight="10"/>
5598 </interface>
5599 -<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="10853">
5600 +<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="10871">
5601 <summary>
5602 Do not audit attempts to send UDP traffic on the asterisk port.
5603 </summary>
5604 @@ -17013,7 +17097,7 @@ Domain to not audit.
5605 </param>
5606 <infoflow type="none"/>
5607 </interface>
5608 -<interface name="corenet_udp_receive_asterisk_port" lineno="10868">
5609 +<interface name="corenet_udp_receive_asterisk_port" lineno="10886">
5610 <summary>
5611 Receive UDP traffic on the asterisk port.
5612 </summary>
5613 @@ -17024,7 +17108,7 @@ Domain allowed access.
5614 </param>
5615 <infoflow type="read" weight="10"/>
5616 </interface>
5617 -<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="10883">
5618 +<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="10901">
5619 <summary>
5620 Do not audit attempts to receive UDP traffic on the asterisk port.
5621 </summary>
5622 @@ -17035,7 +17119,7 @@ Domain to not audit.
5623 </param>
5624 <infoflow type="none"/>
5625 </interface>
5626 -<interface name="corenet_udp_sendrecv_asterisk_port" lineno="10898">
5627 +<interface name="corenet_udp_sendrecv_asterisk_port" lineno="10916">
5628 <summary>
5629 Send and receive UDP traffic on the asterisk port.
5630 </summary>
5631 @@ -17046,7 +17130,7 @@ Domain allowed access.
5632 </param>
5633 <infoflow type="both" weight="10"/>
5634 </interface>
5635 -<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="10914">
5636 +<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="10932">
5637 <summary>
5638 Do not audit attempts to send and receive
5639 UDP traffic on the asterisk port.
5640 @@ -17058,7 +17142,7 @@ Domain to not audit.
5641 </param>
5642 <infoflow type="none"/>
5643 </interface>
5644 -<interface name="corenet_tcp_bind_asterisk_port" lineno="10929">
5645 +<interface name="corenet_tcp_bind_asterisk_port" lineno="10947">
5646 <summary>
5647 Bind TCP sockets to the asterisk port.
5648 </summary>
5649 @@ -17069,7 +17153,7 @@ Domain allowed access.
5650 </param>
5651 <infoflow type="none"/>
5652 </interface>
5653 -<interface name="corenet_udp_bind_asterisk_port" lineno="10949">
5654 +<interface name="corenet_udp_bind_asterisk_port" lineno="10967">
5655 <summary>
5656 Bind UDP sockets to the asterisk port.
5657 </summary>
5658 @@ -17080,7 +17164,7 @@ Domain allowed access.
5659 </param>
5660 <infoflow type="none"/>
5661 </interface>
5662 -<interface name="corenet_tcp_connect_asterisk_port" lineno="10968">
5663 +<interface name="corenet_tcp_connect_asterisk_port" lineno="10986">
5664 <summary>
5665 Make a TCP connection to the asterisk port.
5666 </summary>
5667 @@ -17090,7 +17174,7 @@ Domain allowed access.
5668 </summary>
5669 </param>
5670 </interface>
5671 -<interface name="corenet_send_asterisk_client_packets" lineno="10988">
5672 +<interface name="corenet_send_asterisk_client_packets" lineno="11006">
5673 <summary>
5674 Send asterisk_client packets.
5675 </summary>
5676 @@ -17101,7 +17185,7 @@ Domain allowed access.
5677 </param>
5678 <infoflow type="write" weight="10"/>
5679 </interface>
5680 -<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="11007">
5681 +<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="11025">
5682 <summary>
5683 Do not audit attempts to send asterisk_client packets.
5684 </summary>
5685 @@ -17112,7 +17196,7 @@ Domain to not audit.
5686 </param>
5687 <infoflow type="none"/>
5688 </interface>
5689 -<interface name="corenet_receive_asterisk_client_packets" lineno="11026">
5690 +<interface name="corenet_receive_asterisk_client_packets" lineno="11044">
5691 <summary>
5692 Receive asterisk_client packets.
5693 </summary>
5694 @@ -17123,7 +17207,7 @@ Domain allowed access.
5695 </param>
5696 <infoflow type="read" weight="10"/>
5697 </interface>
5698 -<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="11045">
5699 +<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="11063">
5700 <summary>
5701 Do not audit attempts to receive asterisk_client packets.
5702 </summary>
5703 @@ -17134,7 +17218,7 @@ Domain allowed access.
5704 </param>
5705 <infoflow type="none"/>
5706 </interface>
5707 -<interface name="corenet_sendrecv_asterisk_client_packets" lineno="11064">
5708 +<interface name="corenet_sendrecv_asterisk_client_packets" lineno="11082">
5709 <summary>
5710 Send and receive asterisk_client packets.
5711 </summary>
5712 @@ -17145,7 +17229,7 @@ Domain allowed access.
5713 </param>
5714 <infoflow type="both" weight="10"/>
5715 </interface>
5716 -<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="11080">
5717 +<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="11098">
5718 <summary>
5719 Do not audit attempts to send and receive asterisk_client packets.
5720 </summary>
5721 @@ -17156,7 +17240,7 @@ Domain to not audit.
5722 </param>
5723 <infoflow type="none"/>
5724 </interface>
5725 -<interface name="corenet_relabelto_asterisk_client_packets" lineno="11095">
5726 +<interface name="corenet_relabelto_asterisk_client_packets" lineno="11113">
5727 <summary>
5728 Relabel packets to asterisk_client the packet type.
5729 </summary>
5730 @@ -17166,7 +17250,7 @@ Domain allowed access.
5731 </summary>
5732 </param>
5733 </interface>
5734 -<interface name="corenet_send_asterisk_server_packets" lineno="11115">
5735 +<interface name="corenet_send_asterisk_server_packets" lineno="11133">
5736 <summary>
5737 Send asterisk_server packets.
5738 </summary>
5739 @@ -17177,7 +17261,7 @@ Domain allowed access.
5740 </param>
5741 <infoflow type="write" weight="10"/>
5742 </interface>
5743 -<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="11134">
5744 +<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="11152">
5745 <summary>
5746 Do not audit attempts to send asterisk_server packets.
5747 </summary>
5748 @@ -17188,7 +17272,7 @@ Domain to not audit.
5749 </param>
5750 <infoflow type="none"/>
5751 </interface>
5752 -<interface name="corenet_receive_asterisk_server_packets" lineno="11153">
5753 +<interface name="corenet_receive_asterisk_server_packets" lineno="11171">
5754 <summary>
5755 Receive asterisk_server packets.
5756 </summary>
5757 @@ -17199,7 +17283,7 @@ Domain allowed access.
5758 </param>
5759 <infoflow type="read" weight="10"/>
5760 </interface>
5761 -<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="11172">
5762 +<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="11190">
5763 <summary>
5764 Do not audit attempts to receive asterisk_server packets.
5765 </summary>
5766 @@ -17210,7 +17294,7 @@ Domain allowed access.
5767 </param>
5768 <infoflow type="none"/>
5769 </interface>
5770 -<interface name="corenet_sendrecv_asterisk_server_packets" lineno="11191">
5771 +<interface name="corenet_sendrecv_asterisk_server_packets" lineno="11209">
5772 <summary>
5773 Send and receive asterisk_server packets.
5774 </summary>
5775 @@ -17221,7 +17305,7 @@ Domain allowed access.
5776 </param>
5777 <infoflow type="both" weight="10"/>
5778 </interface>
5779 -<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="11207">
5780 +<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="11225">
5781 <summary>
5782 Do not audit attempts to send and receive asterisk_server packets.
5783 </summary>
5784 @@ -17232,7 +17316,7 @@ Domain to not audit.
5785 </param>
5786 <infoflow type="none"/>
5787 </interface>
5788 -<interface name="corenet_relabelto_asterisk_server_packets" lineno="11222">
5789 +<interface name="corenet_relabelto_asterisk_server_packets" lineno="11240">
5790 <summary>
5791 Relabel packets to asterisk_server the packet type.
5792 </summary>
5793 @@ -17242,7 +17326,7 @@ Domain allowed access.
5794 </summary>
5795 </param>
5796 </interface>
5797 -<interface name="corenet_tcp_sendrecv_audit_port" lineno="11244">
5798 +<interface name="corenet_tcp_sendrecv_audit_port" lineno="11262">
5799 <summary>
5800 Send and receive TCP traffic on the audit port.
5801 </summary>
5802 @@ -17253,7 +17337,7 @@ Domain allowed access.
5803 </param>
5804 <infoflow type="both" weight="10"/>
5805 </interface>
5806 -<interface name="corenet_udp_send_audit_port" lineno="11259">
5807 +<interface name="corenet_udp_send_audit_port" lineno="11277">
5808 <summary>
5809 Send UDP traffic on the audit port.
5810 </summary>
5811 @@ -17264,7 +17348,7 @@ Domain allowed access.
5812 </param>
5813 <infoflow type="write" weight="10"/>
5814 </interface>
5815 -<interface name="corenet_dontaudit_udp_send_audit_port" lineno="11274">
5816 +<interface name="corenet_dontaudit_udp_send_audit_port" lineno="11292">
5817 <summary>
5818 Do not audit attempts to send UDP traffic on the audit port.
5819 </summary>
5820 @@ -17275,7 +17359,7 @@ Domain to not audit.
5821 </param>
5822 <infoflow type="none"/>
5823 </interface>
5824 -<interface name="corenet_udp_receive_audit_port" lineno="11289">
5825 +<interface name="corenet_udp_receive_audit_port" lineno="11307">
5826 <summary>
5827 Receive UDP traffic on the audit port.
5828 </summary>
5829 @@ -17286,7 +17370,7 @@ Domain allowed access.
5830 </param>
5831 <infoflow type="read" weight="10"/>
5832 </interface>
5833 -<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="11304">
5834 +<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="11322">
5835 <summary>
5836 Do not audit attempts to receive UDP traffic on the audit port.
5837 </summary>
5838 @@ -17297,7 +17381,7 @@ Domain to not audit.
5839 </param>
5840 <infoflow type="none"/>
5841 </interface>
5842 -<interface name="corenet_udp_sendrecv_audit_port" lineno="11319">
5843 +<interface name="corenet_udp_sendrecv_audit_port" lineno="11337">
5844 <summary>
5845 Send and receive UDP traffic on the audit port.
5846 </summary>
5847 @@ -17308,7 +17392,7 @@ Domain allowed access.
5848 </param>
5849 <infoflow type="both" weight="10"/>
5850 </interface>
5851 -<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="11335">
5852 +<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="11353">
5853 <summary>
5854 Do not audit attempts to send and receive
5855 UDP traffic on the audit port.
5856 @@ -17320,7 +17404,7 @@ Domain to not audit.
5857 </param>
5858 <infoflow type="none"/>
5859 </interface>
5860 -<interface name="corenet_tcp_bind_audit_port" lineno="11350">
5861 +<interface name="corenet_tcp_bind_audit_port" lineno="11368">
5862 <summary>
5863 Bind TCP sockets to the audit port.
5864 </summary>
5865 @@ -17331,7 +17415,7 @@ Domain allowed access.
5866 </param>
5867 <infoflow type="none"/>
5868 </interface>
5869 -<interface name="corenet_udp_bind_audit_port" lineno="11370">
5870 +<interface name="corenet_udp_bind_audit_port" lineno="11388">
5871 <summary>
5872 Bind UDP sockets to the audit port.
5873 </summary>
5874 @@ -17342,7 +17426,7 @@ Domain allowed access.
5875 </param>
5876 <infoflow type="none"/>
5877 </interface>
5878 -<interface name="corenet_tcp_connect_audit_port" lineno="11389">
5879 +<interface name="corenet_tcp_connect_audit_port" lineno="11407">
5880 <summary>
5881 Make a TCP connection to the audit port.
5882 </summary>
5883 @@ -17352,7 +17436,7 @@ Domain allowed access.
5884 </summary>
5885 </param>
5886 </interface>
5887 -<interface name="corenet_send_audit_client_packets" lineno="11409">
5888 +<interface name="corenet_send_audit_client_packets" lineno="11427">
5889 <summary>
5890 Send audit_client packets.
5891 </summary>
5892 @@ -17363,7 +17447,7 @@ Domain allowed access.
5893 </param>
5894 <infoflow type="write" weight="10"/>
5895 </interface>
5896 -<interface name="corenet_dontaudit_send_audit_client_packets" lineno="11428">
5897 +<interface name="corenet_dontaudit_send_audit_client_packets" lineno="11446">
5898 <summary>
5899 Do not audit attempts to send audit_client packets.
5900 </summary>
5901 @@ -17374,7 +17458,7 @@ Domain to not audit.
5902 </param>
5903 <infoflow type="none"/>
5904 </interface>
5905 -<interface name="corenet_receive_audit_client_packets" lineno="11447">
5906 +<interface name="corenet_receive_audit_client_packets" lineno="11465">
5907 <summary>
5908 Receive audit_client packets.
5909 </summary>
5910 @@ -17385,7 +17469,7 @@ Domain allowed access.
5911 </param>
5912 <infoflow type="read" weight="10"/>
5913 </interface>
5914 -<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="11466">
5915 +<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="11484">
5916 <summary>
5917 Do not audit attempts to receive audit_client packets.
5918 </summary>
5919 @@ -17396,7 +17480,7 @@ Domain allowed access.
5920 </param>
5921 <infoflow type="none"/>
5922 </interface>
5923 -<interface name="corenet_sendrecv_audit_client_packets" lineno="11485">
5924 +<interface name="corenet_sendrecv_audit_client_packets" lineno="11503">
5925 <summary>
5926 Send and receive audit_client packets.
5927 </summary>
5928 @@ -17407,7 +17491,7 @@ Domain allowed access.
5929 </param>
5930 <infoflow type="both" weight="10"/>
5931 </interface>
5932 -<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="11501">
5933 +<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="11519">
5934 <summary>
5935 Do not audit attempts to send and receive audit_client packets.
5936 </summary>
5937 @@ -17418,7 +17502,7 @@ Domain to not audit.
5938 </param>
5939 <infoflow type="none"/>
5940 </interface>
5941 -<interface name="corenet_relabelto_audit_client_packets" lineno="11516">
5942 +<interface name="corenet_relabelto_audit_client_packets" lineno="11534">
5943 <summary>
5944 Relabel packets to audit_client the packet type.
5945 </summary>
5946 @@ -17428,7 +17512,7 @@ Domain allowed access.
5947 </summary>
5948 </param>
5949 </interface>
5950 -<interface name="corenet_send_audit_server_packets" lineno="11536">
5951 +<interface name="corenet_send_audit_server_packets" lineno="11554">
5952 <summary>
5953 Send audit_server packets.
5954 </summary>
5955 @@ -17439,7 +17523,7 @@ Domain allowed access.
5956 </param>
5957 <infoflow type="write" weight="10"/>
5958 </interface>
5959 -<interface name="corenet_dontaudit_send_audit_server_packets" lineno="11555">
5960 +<interface name="corenet_dontaudit_send_audit_server_packets" lineno="11573">
5961 <summary>
5962 Do not audit attempts to send audit_server packets.
5963 </summary>
5964 @@ -17450,7 +17534,7 @@ Domain to not audit.
5965 </param>
5966 <infoflow type="none"/>
5967 </interface>
5968 -<interface name="corenet_receive_audit_server_packets" lineno="11574">
5969 +<interface name="corenet_receive_audit_server_packets" lineno="11592">
5970 <summary>
5971 Receive audit_server packets.
5972 </summary>
5973 @@ -17461,7 +17545,7 @@ Domain allowed access.
5974 </param>
5975 <infoflow type="read" weight="10"/>
5976 </interface>
5977 -<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="11593">
5978 +<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="11611">
5979 <summary>
5980 Do not audit attempts to receive audit_server packets.
5981 </summary>
5982 @@ -17472,7 +17556,7 @@ Domain allowed access.
5983 </param>
5984 <infoflow type="none"/>
5985 </interface>
5986 -<interface name="corenet_sendrecv_audit_server_packets" lineno="11612">
5987 +<interface name="corenet_sendrecv_audit_server_packets" lineno="11630">
5988 <summary>
5989 Send and receive audit_server packets.
5990 </summary>
5991 @@ -17483,7 +17567,7 @@ Domain allowed access.
5992 </param>
5993 <infoflow type="both" weight="10"/>
5994 </interface>
5995 -<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="11628">
5996 +<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="11646">
5997 <summary>
5998 Do not audit attempts to send and receive audit_server packets.
5999 </summary>
6000 @@ -17494,7 +17578,7 @@ Domain to not audit.
6001 </param>
6002 <infoflow type="none"/>
6003 </interface>
6004 -<interface name="corenet_relabelto_audit_server_packets" lineno="11643">
6005 +<interface name="corenet_relabelto_audit_server_packets" lineno="11661">
6006 <summary>
6007 Relabel packets to audit_server the packet type.
6008 </summary>
6009 @@ -17504,7 +17588,7 @@ Domain allowed access.
6010 </summary>
6011 </param>
6012 </interface>
6013 -<interface name="corenet_tcp_sendrecv_auth_port" lineno="11665">
6014 +<interface name="corenet_tcp_sendrecv_auth_port" lineno="11683">
6015 <summary>
6016 Send and receive TCP traffic on the auth port.
6017 </summary>
6018 @@ -17515,7 +17599,7 @@ Domain allowed access.
6019 </param>
6020 <infoflow type="both" weight="10"/>
6021 </interface>
6022 -<interface name="corenet_udp_send_auth_port" lineno="11680">
6023 +<interface name="corenet_udp_send_auth_port" lineno="11698">
6024 <summary>
6025 Send UDP traffic on the auth port.
6026 </summary>
6027 @@ -17526,7 +17610,7 @@ Domain allowed access.
6028 </param>
6029 <infoflow type="write" weight="10"/>
6030 </interface>
6031 -<interface name="corenet_dontaudit_udp_send_auth_port" lineno="11695">
6032 +<interface name="corenet_dontaudit_udp_send_auth_port" lineno="11713">
6033 <summary>
6034 Do not audit attempts to send UDP traffic on the auth port.
6035 </summary>
6036 @@ -17537,7 +17621,7 @@ Domain to not audit.
6037 </param>
6038 <infoflow type="none"/>
6039 </interface>
6040 -<interface name="corenet_udp_receive_auth_port" lineno="11710">
6041 +<interface name="corenet_udp_receive_auth_port" lineno="11728">
6042 <summary>
6043 Receive UDP traffic on the auth port.
6044 </summary>
6045 @@ -17548,7 +17632,7 @@ Domain allowed access.
6046 </param>
6047 <infoflow type="read" weight="10"/>
6048 </interface>
6049 -<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="11725">
6050 +<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="11743">
6051 <summary>
6052 Do not audit attempts to receive UDP traffic on the auth port.
6053 </summary>
6054 @@ -17559,7 +17643,7 @@ Domain to not audit.
6055 </param>
6056 <infoflow type="none"/>
6057 </interface>
6058 -<interface name="corenet_udp_sendrecv_auth_port" lineno="11740">
6059 +<interface name="corenet_udp_sendrecv_auth_port" lineno="11758">
6060 <summary>
6061 Send and receive UDP traffic on the auth port.
6062 </summary>
6063 @@ -17570,7 +17654,7 @@ Domain allowed access.
6064 </param>
6065 <infoflow type="both" weight="10"/>
6066 </interface>
6067 -<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="11756">
6068 +<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="11774">
6069 <summary>
6070 Do not audit attempts to send and receive
6071 UDP traffic on the auth port.
6072 @@ -17582,7 +17666,7 @@ Domain to not audit.
6073 </param>
6074 <infoflow type="none"/>
6075 </interface>
6076 -<interface name="corenet_tcp_bind_auth_port" lineno="11771">
6077 +<interface name="corenet_tcp_bind_auth_port" lineno="11789">
6078 <summary>
6079 Bind TCP sockets to the auth port.
6080 </summary>
6081 @@ -17593,7 +17677,7 @@ Domain allowed access.
6082 </param>
6083 <infoflow type="none"/>
6084 </interface>
6085 -<interface name="corenet_udp_bind_auth_port" lineno="11791">
6086 +<interface name="corenet_udp_bind_auth_port" lineno="11809">
6087 <summary>
6088 Bind UDP sockets to the auth port.
6089 </summary>
6090 @@ -17604,7 +17688,7 @@ Domain allowed access.
6091 </param>
6092 <infoflow type="none"/>
6093 </interface>
6094 -<interface name="corenet_tcp_connect_auth_port" lineno="11810">
6095 +<interface name="corenet_tcp_connect_auth_port" lineno="11828">
6096 <summary>
6097 Make a TCP connection to the auth port.
6098 </summary>
6099 @@ -17614,7 +17698,7 @@ Domain allowed access.
6100 </summary>
6101 </param>
6102 </interface>
6103 -<interface name="corenet_send_auth_client_packets" lineno="11830">
6104 +<interface name="corenet_send_auth_client_packets" lineno="11848">
6105 <summary>
6106 Send auth_client packets.
6107 </summary>
6108 @@ -17625,7 +17709,7 @@ Domain allowed access.
6109 </param>
6110 <infoflow type="write" weight="10"/>
6111 </interface>
6112 -<interface name="corenet_dontaudit_send_auth_client_packets" lineno="11849">
6113 +<interface name="corenet_dontaudit_send_auth_client_packets" lineno="11867">
6114 <summary>
6115 Do not audit attempts to send auth_client packets.
6116 </summary>
6117 @@ -17636,7 +17720,7 @@ Domain to not audit.
6118 </param>
6119 <infoflow type="none"/>
6120 </interface>
6121 -<interface name="corenet_receive_auth_client_packets" lineno="11868">
6122 +<interface name="corenet_receive_auth_client_packets" lineno="11886">
6123 <summary>
6124 Receive auth_client packets.
6125 </summary>
6126 @@ -17647,7 +17731,7 @@ Domain allowed access.
6127 </param>
6128 <infoflow type="read" weight="10"/>
6129 </interface>
6130 -<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="11887">
6131 +<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="11905">
6132 <summary>
6133 Do not audit attempts to receive auth_client packets.
6134 </summary>
6135 @@ -17658,7 +17742,7 @@ Domain allowed access.
6136 </param>
6137 <infoflow type="none"/>
6138 </interface>
6139 -<interface name="corenet_sendrecv_auth_client_packets" lineno="11906">
6140 +<interface name="corenet_sendrecv_auth_client_packets" lineno="11924">
6141 <summary>
6142 Send and receive auth_client packets.
6143 </summary>
6144 @@ -17669,7 +17753,7 @@ Domain allowed access.
6145 </param>
6146 <infoflow type="both" weight="10"/>
6147 </interface>
6148 -<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="11922">
6149 +<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="11940">
6150 <summary>
6151 Do not audit attempts to send and receive auth_client packets.
6152 </summary>
6153 @@ -17680,7 +17764,7 @@ Domain to not audit.
6154 </param>
6155 <infoflow type="none"/>
6156 </interface>
6157 -<interface name="corenet_relabelto_auth_client_packets" lineno="11937">
6158 +<interface name="corenet_relabelto_auth_client_packets" lineno="11955">
6159 <summary>
6160 Relabel packets to auth_client the packet type.
6161 </summary>
6162 @@ -17690,7 +17774,7 @@ Domain allowed access.
6163 </summary>
6164 </param>
6165 </interface>
6166 -<interface name="corenet_send_auth_server_packets" lineno="11957">
6167 +<interface name="corenet_send_auth_server_packets" lineno="11975">
6168 <summary>
6169 Send auth_server packets.
6170 </summary>
6171 @@ -17701,7 +17785,7 @@ Domain allowed access.
6172 </param>
6173 <infoflow type="write" weight="10"/>
6174 </interface>
6175 -<interface name="corenet_dontaudit_send_auth_server_packets" lineno="11976">
6176 +<interface name="corenet_dontaudit_send_auth_server_packets" lineno="11994">
6177 <summary>
6178 Do not audit attempts to send auth_server packets.
6179 </summary>
6180 @@ -17712,7 +17796,7 @@ Domain to not audit.
6181 </param>
6182 <infoflow type="none"/>
6183 </interface>
6184 -<interface name="corenet_receive_auth_server_packets" lineno="11995">
6185 +<interface name="corenet_receive_auth_server_packets" lineno="12013">
6186 <summary>
6187 Receive auth_server packets.
6188 </summary>
6189 @@ -17723,7 +17807,7 @@ Domain allowed access.
6190 </param>
6191 <infoflow type="read" weight="10"/>
6192 </interface>
6193 -<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="12014">
6194 +<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="12032">
6195 <summary>
6196 Do not audit attempts to receive auth_server packets.
6197 </summary>
6198 @@ -17734,7 +17818,7 @@ Domain allowed access.
6199 </param>
6200 <infoflow type="none"/>
6201 </interface>
6202 -<interface name="corenet_sendrecv_auth_server_packets" lineno="12033">
6203 +<interface name="corenet_sendrecv_auth_server_packets" lineno="12051">
6204 <summary>
6205 Send and receive auth_server packets.
6206 </summary>
6207 @@ -17745,7 +17829,7 @@ Domain allowed access.
6208 </param>
6209 <infoflow type="both" weight="10"/>
6210 </interface>
6211 -<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="12049">
6212 +<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="12067">
6213 <summary>
6214 Do not audit attempts to send and receive auth_server packets.
6215 </summary>
6216 @@ -17756,7 +17840,7 @@ Domain to not audit.
6217 </param>
6218 <infoflow type="none"/>
6219 </interface>
6220 -<interface name="corenet_relabelto_auth_server_packets" lineno="12064">
6221 +<interface name="corenet_relabelto_auth_server_packets" lineno="12082">
6222 <summary>
6223 Relabel packets to auth_server the packet type.
6224 </summary>
6225 @@ -17766,7 +17850,7 @@ Domain allowed access.
6226 </summary>
6227 </param>
6228 </interface>
6229 -<interface name="corenet_tcp_sendrecv_bgp_port" lineno="12086">
6230 +<interface name="corenet_tcp_sendrecv_bgp_port" lineno="12104">
6231 <summary>
6232 Send and receive TCP traffic on the bgp port.
6233 </summary>
6234 @@ -17777,7 +17861,7 @@ Domain allowed access.
6235 </param>
6236 <infoflow type="both" weight="10"/>
6237 </interface>
6238 -<interface name="corenet_udp_send_bgp_port" lineno="12101">
6239 +<interface name="corenet_udp_send_bgp_port" lineno="12119">
6240 <summary>
6241 Send UDP traffic on the bgp port.
6242 </summary>
6243 @@ -17788,7 +17872,7 @@ Domain allowed access.
6244 </param>
6245 <infoflow type="write" weight="10"/>
6246 </interface>
6247 -<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="12116">
6248 +<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="12134">
6249 <summary>
6250 Do not audit attempts to send UDP traffic on the bgp port.
6251 </summary>
6252 @@ -17799,7 +17883,7 @@ Domain to not audit.
6253 </param>
6254 <infoflow type="none"/>
6255 </interface>
6256 -<interface name="corenet_udp_receive_bgp_port" lineno="12131">
6257 +<interface name="corenet_udp_receive_bgp_port" lineno="12149">
6258 <summary>
6259 Receive UDP traffic on the bgp port.
6260 </summary>
6261 @@ -17810,7 +17894,7 @@ Domain allowed access.
6262 </param>
6263 <infoflow type="read" weight="10"/>
6264 </interface>
6265 -<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="12146">
6266 +<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="12164">
6267 <summary>
6268 Do not audit attempts to receive UDP traffic on the bgp port.
6269 </summary>
6270 @@ -17821,7 +17905,7 @@ Domain to not audit.
6271 </param>
6272 <infoflow type="none"/>
6273 </interface>
6274 -<interface name="corenet_udp_sendrecv_bgp_port" lineno="12161">
6275 +<interface name="corenet_udp_sendrecv_bgp_port" lineno="12179">
6276 <summary>
6277 Send and receive UDP traffic on the bgp port.
6278 </summary>
6279 @@ -17832,7 +17916,7 @@ Domain allowed access.
6280 </param>
6281 <infoflow type="both" weight="10"/>
6282 </interface>
6283 -<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="12177">
6284 +<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="12195">
6285 <summary>
6286 Do not audit attempts to send and receive
6287 UDP traffic on the bgp port.
6288 @@ -17844,7 +17928,7 @@ Domain to not audit.
6289 </param>
6290 <infoflow type="none"/>
6291 </interface>
6292 -<interface name="corenet_tcp_bind_bgp_port" lineno="12192">
6293 +<interface name="corenet_tcp_bind_bgp_port" lineno="12210">
6294 <summary>
6295 Bind TCP sockets to the bgp port.
6296 </summary>
6297 @@ -17855,7 +17939,7 @@ Domain allowed access.
6298 </param>
6299 <infoflow type="none"/>
6300 </interface>
6301 -<interface name="corenet_udp_bind_bgp_port" lineno="12212">
6302 +<interface name="corenet_udp_bind_bgp_port" lineno="12230">
6303 <summary>
6304 Bind UDP sockets to the bgp port.
6305 </summary>
6306 @@ -17866,7 +17950,7 @@ Domain allowed access.
6307 </param>
6308 <infoflow type="none"/>
6309 </interface>
6310 -<interface name="corenet_tcp_connect_bgp_port" lineno="12231">
6311 +<interface name="corenet_tcp_connect_bgp_port" lineno="12249">
6312 <summary>
6313 Make a TCP connection to the bgp port.
6314 </summary>
6315 @@ -17876,7 +17960,7 @@ Domain allowed access.
6316 </summary>
6317 </param>
6318 </interface>
6319 -<interface name="corenet_send_bgp_client_packets" lineno="12251">
6320 +<interface name="corenet_send_bgp_client_packets" lineno="12269">
6321 <summary>
6322 Send bgp_client packets.
6323 </summary>
6324 @@ -17887,7 +17971,7 @@ Domain allowed access.
6325 </param>
6326 <infoflow type="write" weight="10"/>
6327 </interface>
6328 -<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="12270">
6329 +<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="12288">
6330 <summary>
6331 Do not audit attempts to send bgp_client packets.
6332 </summary>
6333 @@ -17898,7 +17982,7 @@ Domain to not audit.
6334 </param>
6335 <infoflow type="none"/>
6336 </interface>
6337 -<interface name="corenet_receive_bgp_client_packets" lineno="12289">
6338 +<interface name="corenet_receive_bgp_client_packets" lineno="12307">
6339 <summary>
6340 Receive bgp_client packets.
6341 </summary>
6342 @@ -17909,7 +17993,7 @@ Domain allowed access.
6343 </param>
6344 <infoflow type="read" weight="10"/>
6345 </interface>
6346 -<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="12308">
6347 +<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="12326">
6348 <summary>
6349 Do not audit attempts to receive bgp_client packets.
6350 </summary>
6351 @@ -17920,7 +18004,7 @@ Domain allowed access.
6352 </param>
6353 <infoflow type="none"/>
6354 </interface>
6355 -<interface name="corenet_sendrecv_bgp_client_packets" lineno="12327">
6356 +<interface name="corenet_sendrecv_bgp_client_packets" lineno="12345">
6357 <summary>
6358 Send and receive bgp_client packets.
6359 </summary>
6360 @@ -17931,7 +18015,7 @@ Domain allowed access.
6361 </param>
6362 <infoflow type="both" weight="10"/>
6363 </interface>
6364 -<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="12343">
6365 +<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="12361">
6366 <summary>
6367 Do not audit attempts to send and receive bgp_client packets.
6368 </summary>
6369 @@ -17942,7 +18026,7 @@ Domain to not audit.
6370 </param>
6371 <infoflow type="none"/>
6372 </interface>
6373 -<interface name="corenet_relabelto_bgp_client_packets" lineno="12358">
6374 +<interface name="corenet_relabelto_bgp_client_packets" lineno="12376">
6375 <summary>
6376 Relabel packets to bgp_client the packet type.
6377 </summary>
6378 @@ -17952,7 +18036,7 @@ Domain allowed access.
6379 </summary>
6380 </param>
6381 </interface>
6382 -<interface name="corenet_send_bgp_server_packets" lineno="12378">
6383 +<interface name="corenet_send_bgp_server_packets" lineno="12396">
6384 <summary>
6385 Send bgp_server packets.
6386 </summary>
6387 @@ -17963,7 +18047,7 @@ Domain allowed access.
6388 </param>
6389 <infoflow type="write" weight="10"/>
6390 </interface>
6391 -<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="12397">
6392 +<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="12415">
6393 <summary>
6394 Do not audit attempts to send bgp_server packets.
6395 </summary>
6396 @@ -17974,7 +18058,7 @@ Domain to not audit.
6397 </param>
6398 <infoflow type="none"/>
6399 </interface>
6400 -<interface name="corenet_receive_bgp_server_packets" lineno="12416">
6401 +<interface name="corenet_receive_bgp_server_packets" lineno="12434">
6402 <summary>
6403 Receive bgp_server packets.
6404 </summary>
6405 @@ -17985,7 +18069,7 @@ Domain allowed access.
6406 </param>
6407 <infoflow type="read" weight="10"/>
6408 </interface>
6409 -<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="12435">
6410 +<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="12453">
6411 <summary>
6412 Do not audit attempts to receive bgp_server packets.
6413 </summary>
6414 @@ -17996,7 +18080,7 @@ Domain allowed access.
6415 </param>
6416 <infoflow type="none"/>
6417 </interface>
6418 -<interface name="corenet_sendrecv_bgp_server_packets" lineno="12454">
6419 +<interface name="corenet_sendrecv_bgp_server_packets" lineno="12472">
6420 <summary>
6421 Send and receive bgp_server packets.
6422 </summary>
6423 @@ -18007,7 +18091,7 @@ Domain allowed access.
6424 </param>
6425 <infoflow type="both" weight="10"/>
6426 </interface>
6427 -<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="12470">
6428 +<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="12488">
6429 <summary>
6430 Do not audit attempts to send and receive bgp_server packets.
6431 </summary>
6432 @@ -18018,7 +18102,7 @@ Domain to not audit.
6433 </param>
6434 <infoflow type="none"/>
6435 </interface>
6436 -<interface name="corenet_relabelto_bgp_server_packets" lineno="12485">
6437 +<interface name="corenet_relabelto_bgp_server_packets" lineno="12503">
6438 <summary>
6439 Relabel packets to bgp_server the packet type.
6440 </summary>
6441 @@ -18028,7 +18112,7 @@ Domain allowed access.
6442 </summary>
6443 </param>
6444 </interface>
6445 -<interface name="corenet_tcp_sendrecv_bitcoin_port" lineno="12507">
6446 +<interface name="corenet_tcp_sendrecv_bitcoin_port" lineno="12525">
6447 <summary>
6448 Send and receive TCP traffic on the bitcoin port.
6449 </summary>
6450 @@ -18039,7 +18123,7 @@ Domain allowed access.
6451 </param>
6452 <infoflow type="both" weight="10"/>
6453 </interface>
6454 -<interface name="corenet_udp_send_bitcoin_port" lineno="12522">
6455 +<interface name="corenet_udp_send_bitcoin_port" lineno="12540">
6456 <summary>
6457 Send UDP traffic on the bitcoin port.
6458 </summary>
6459 @@ -18050,7 +18134,7 @@ Domain allowed access.
6460 </param>
6461 <infoflow type="write" weight="10"/>
6462 </interface>
6463 -<interface name="corenet_dontaudit_udp_send_bitcoin_port" lineno="12537">
6464 +<interface name="corenet_dontaudit_udp_send_bitcoin_port" lineno="12555">
6465 <summary>
6466 Do not audit attempts to send UDP traffic on the bitcoin port.
6467 </summary>
6468 @@ -18061,7 +18145,7 @@ Domain to not audit.
6469 </param>
6470 <infoflow type="none"/>
6471 </interface>
6472 -<interface name="corenet_udp_receive_bitcoin_port" lineno="12552">
6473 +<interface name="corenet_udp_receive_bitcoin_port" lineno="12570">
6474 <summary>
6475 Receive UDP traffic on the bitcoin port.
6476 </summary>
6477 @@ -18072,7 +18156,7 @@ Domain allowed access.
6478 </param>
6479 <infoflow type="read" weight="10"/>
6480 </interface>
6481 -<interface name="corenet_dontaudit_udp_receive_bitcoin_port" lineno="12567">
6482 +<interface name="corenet_dontaudit_udp_receive_bitcoin_port" lineno="12585">
6483 <summary>
6484 Do not audit attempts to receive UDP traffic on the bitcoin port.
6485 </summary>
6486 @@ -18083,7 +18167,7 @@ Domain to not audit.
6487 </param>
6488 <infoflow type="none"/>
6489 </interface>
6490 -<interface name="corenet_udp_sendrecv_bitcoin_port" lineno="12582">
6491 +<interface name="corenet_udp_sendrecv_bitcoin_port" lineno="12600">
6492 <summary>
6493 Send and receive UDP traffic on the bitcoin port.
6494 </summary>
6495 @@ -18094,7 +18178,7 @@ Domain allowed access.
6496 </param>
6497 <infoflow type="both" weight="10"/>
6498 </interface>
6499 -<interface name="corenet_dontaudit_udp_sendrecv_bitcoin_port" lineno="12598">
6500 +<interface name="corenet_dontaudit_udp_sendrecv_bitcoin_port" lineno="12616">
6501 <summary>
6502 Do not audit attempts to send and receive
6503 UDP traffic on the bitcoin port.
6504 @@ -18106,7 +18190,7 @@ Domain to not audit.
6505 </param>
6506 <infoflow type="none"/>
6507 </interface>
6508 -<interface name="corenet_tcp_bind_bitcoin_port" lineno="12613">
6509 +<interface name="corenet_tcp_bind_bitcoin_port" lineno="12631">
6510 <summary>
6511 Bind TCP sockets to the bitcoin port.
6512 </summary>
6513 @@ -18117,7 +18201,7 @@ Domain allowed access.
6514 </param>
6515 <infoflow type="none"/>
6516 </interface>
6517 -<interface name="corenet_udp_bind_bitcoin_port" lineno="12633">
6518 +<interface name="corenet_udp_bind_bitcoin_port" lineno="12651">
6519 <summary>
6520 Bind UDP sockets to the bitcoin port.
6521 </summary>
6522 @@ -18128,7 +18212,7 @@ Domain allowed access.
6523 </param>
6524 <infoflow type="none"/>
6525 </interface>
6526 -<interface name="corenet_tcp_connect_bitcoin_port" lineno="12652">
6527 +<interface name="corenet_tcp_connect_bitcoin_port" lineno="12670">
6528 <summary>
6529 Make a TCP connection to the bitcoin port.
6530 </summary>
6531 @@ -18138,7 +18222,7 @@ Domain allowed access.
6532 </summary>
6533 </param>
6534 </interface>
6535 -<interface name="corenet_send_bitcoin_client_packets" lineno="12672">
6536 +<interface name="corenet_send_bitcoin_client_packets" lineno="12690">
6537 <summary>
6538 Send bitcoin_client packets.
6539 </summary>
6540 @@ -18149,7 +18233,7 @@ Domain allowed access.
6541 </param>
6542 <infoflow type="write" weight="10"/>
6543 </interface>
6544 -<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="12691">
6545 +<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="12709">
6546 <summary>
6547 Do not audit attempts to send bitcoin_client packets.
6548 </summary>
6549 @@ -18160,7 +18244,7 @@ Domain to not audit.
6550 </param>
6551 <infoflow type="none"/>
6552 </interface>
6553 -<interface name="corenet_receive_bitcoin_client_packets" lineno="12710">
6554 +<interface name="corenet_receive_bitcoin_client_packets" lineno="12728">
6555 <summary>
6556 Receive bitcoin_client packets.
6557 </summary>
6558 @@ -18171,7 +18255,7 @@ Domain allowed access.
6559 </param>
6560 <infoflow type="read" weight="10"/>
6561 </interface>
6562 -<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="12729">
6563 +<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="12747">
6564 <summary>
6565 Do not audit attempts to receive bitcoin_client packets.
6566 </summary>
6567 @@ -18182,7 +18266,7 @@ Domain allowed access.
6568 </param>
6569 <infoflow type="none"/>
6570 </interface>
6571 -<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="12748">
6572 +<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="12766">
6573 <summary>
6574 Send and receive bitcoin_client packets.
6575 </summary>
6576 @@ -18193,7 +18277,7 @@ Domain allowed access.
6577 </param>
6578 <infoflow type="both" weight="10"/>
6579 </interface>
6580 -<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="12764">
6581 +<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="12782">
6582 <summary>
6583 Do not audit attempts to send and receive bitcoin_client packets.
6584 </summary>
6585 @@ -18204,7 +18288,7 @@ Domain to not audit.
6586 </param>
6587 <infoflow type="none"/>
6588 </interface>
6589 -<interface name="corenet_relabelto_bitcoin_client_packets" lineno="12779">
6590 +<interface name="corenet_relabelto_bitcoin_client_packets" lineno="12797">
6591 <summary>
6592 Relabel packets to bitcoin_client the packet type.
6593 </summary>
6594 @@ -18214,7 +18298,7 @@ Domain allowed access.
6595 </summary>
6596 </param>
6597 </interface>
6598 -<interface name="corenet_send_bitcoin_server_packets" lineno="12799">
6599 +<interface name="corenet_send_bitcoin_server_packets" lineno="12817">
6600 <summary>
6601 Send bitcoin_server packets.
6602 </summary>
6603 @@ -18225,7 +18309,7 @@ Domain allowed access.
6604 </param>
6605 <infoflow type="write" weight="10"/>
6606 </interface>
6607 -<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="12818">
6608 +<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="12836">
6609 <summary>
6610 Do not audit attempts to send bitcoin_server packets.
6611 </summary>
6612 @@ -18236,7 +18320,7 @@ Domain to not audit.
6613 </param>
6614 <infoflow type="none"/>
6615 </interface>
6616 -<interface name="corenet_receive_bitcoin_server_packets" lineno="12837">
6617 +<interface name="corenet_receive_bitcoin_server_packets" lineno="12855">
6618 <summary>
6619 Receive bitcoin_server packets.
6620 </summary>
6621 @@ -18247,7 +18331,7 @@ Domain allowed access.
6622 </param>
6623 <infoflow type="read" weight="10"/>
6624 </interface>
6625 -<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="12856">
6626 +<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="12874">
6627 <summary>
6628 Do not audit attempts to receive bitcoin_server packets.
6629 </summary>
6630 @@ -18258,7 +18342,7 @@ Domain allowed access.
6631 </param>
6632 <infoflow type="none"/>
6633 </interface>
6634 -<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="12875">
6635 +<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="12893">
6636 <summary>
6637 Send and receive bitcoin_server packets.
6638 </summary>
6639 @@ -18269,7 +18353,7 @@ Domain allowed access.
6640 </param>
6641 <infoflow type="both" weight="10"/>
6642 </interface>
6643 -<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="12891">
6644 +<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="12909">
6645 <summary>
6646 Do not audit attempts to send and receive bitcoin_server packets.
6647 </summary>
6648 @@ -18280,7 +18364,7 @@ Domain to not audit.
6649 </param>
6650 <infoflow type="none"/>
6651 </interface>
6652 -<interface name="corenet_relabelto_bitcoin_server_packets" lineno="12906">
6653 +<interface name="corenet_relabelto_bitcoin_server_packets" lineno="12924">
6654 <summary>
6655 Relabel packets to bitcoin_server the packet type.
6656 </summary>
6657 @@ -18290,7 +18374,7 @@ Domain allowed access.
6658 </summary>
6659 </param>
6660 </interface>
6661 -<interface name="corenet_tcp_sendrecv_boinc_port" lineno="12928">
6662 +<interface name="corenet_tcp_sendrecv_boinc_port" lineno="12946">
6663 <summary>
6664 Send and receive TCP traffic on the boinc port.
6665 </summary>
6666 @@ -18301,7 +18385,7 @@ Domain allowed access.
6667 </param>
6668 <infoflow type="both" weight="10"/>
6669 </interface>
6670 -<interface name="corenet_udp_send_boinc_port" lineno="12943">
6671 +<interface name="corenet_udp_send_boinc_port" lineno="12961">
6672 <summary>
6673 Send UDP traffic on the boinc port.
6674 </summary>
6675 @@ -18312,7 +18396,7 @@ Domain allowed access.
6676 </param>
6677 <infoflow type="write" weight="10"/>
6678 </interface>
6679 -<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="12958">
6680 +<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="12976">
6681 <summary>
6682 Do not audit attempts to send UDP traffic on the boinc port.
6683 </summary>
6684 @@ -18323,7 +18407,7 @@ Domain to not audit.
6685 </param>
6686 <infoflow type="none"/>
6687 </interface>
6688 -<interface name="corenet_udp_receive_boinc_port" lineno="12973">
6689 +<interface name="corenet_udp_receive_boinc_port" lineno="12991">
6690 <summary>
6691 Receive UDP traffic on the boinc port.
6692 </summary>
6693 @@ -18334,7 +18418,7 @@ Domain allowed access.
6694 </param>
6695 <infoflow type="read" weight="10"/>
6696 </interface>
6697 -<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="12988">
6698 +<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="13006">
6699 <summary>
6700 Do not audit attempts to receive UDP traffic on the boinc port.
6701 </summary>
6702 @@ -18345,7 +18429,7 @@ Domain to not audit.
6703 </param>
6704 <infoflow type="none"/>
6705 </interface>
6706 -<interface name="corenet_udp_sendrecv_boinc_port" lineno="13003">
6707 +<interface name="corenet_udp_sendrecv_boinc_port" lineno="13021">
6708 <summary>
6709 Send and receive UDP traffic on the boinc port.
6710 </summary>
6711 @@ -18356,7 +18440,7 @@ Domain allowed access.
6712 </param>
6713 <infoflow type="both" weight="10"/>
6714 </interface>
6715 -<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="13019">
6716 +<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="13037">
6717 <summary>
6718 Do not audit attempts to send and receive
6719 UDP traffic on the boinc port.
6720 @@ -18368,7 +18452,7 @@ Domain to not audit.
6721 </param>
6722 <infoflow type="none"/>
6723 </interface>
6724 -<interface name="corenet_tcp_bind_boinc_port" lineno="13034">
6725 +<interface name="corenet_tcp_bind_boinc_port" lineno="13052">
6726 <summary>
6727 Bind TCP sockets to the boinc port.
6728 </summary>
6729 @@ -18379,7 +18463,7 @@ Domain allowed access.
6730 </param>
6731 <infoflow type="none"/>
6732 </interface>
6733 -<interface name="corenet_udp_bind_boinc_port" lineno="13054">
6734 +<interface name="corenet_udp_bind_boinc_port" lineno="13072">
6735 <summary>
6736 Bind UDP sockets to the boinc port.
6737 </summary>
6738 @@ -18390,7 +18474,7 @@ Domain allowed access.
6739 </param>
6740 <infoflow type="none"/>
6741 </interface>
6742 -<interface name="corenet_tcp_connect_boinc_port" lineno="13073">
6743 +<interface name="corenet_tcp_connect_boinc_port" lineno="13091">
6744 <summary>
6745 Make a TCP connection to the boinc port.
6746 </summary>
6747 @@ -18400,7 +18484,7 @@ Domain allowed access.
6748 </summary>
6749 </param>
6750 </interface>
6751 -<interface name="corenet_send_boinc_client_packets" lineno="13093">
6752 +<interface name="corenet_send_boinc_client_packets" lineno="13111">
6753 <summary>
6754 Send boinc_client packets.
6755 </summary>
6756 @@ -18411,7 +18495,7 @@ Domain allowed access.
6757 </param>
6758 <infoflow type="write" weight="10"/>
6759 </interface>
6760 -<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="13112">
6761 +<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="13130">
6762 <summary>
6763 Do not audit attempts to send boinc_client packets.
6764 </summary>
6765 @@ -18422,7 +18506,7 @@ Domain to not audit.
6766 </param>
6767 <infoflow type="none"/>
6768 </interface>
6769 -<interface name="corenet_receive_boinc_client_packets" lineno="13131">
6770 +<interface name="corenet_receive_boinc_client_packets" lineno="13149">
6771 <summary>
6772 Receive boinc_client packets.
6773 </summary>
6774 @@ -18433,7 +18517,7 @@ Domain allowed access.
6775 </param>
6776 <infoflow type="read" weight="10"/>
6777 </interface>
6778 -<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="13150">
6779 +<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="13168">
6780 <summary>
6781 Do not audit attempts to receive boinc_client packets.
6782 </summary>
6783 @@ -18444,7 +18528,7 @@ Domain allowed access.
6784 </param>
6785 <infoflow type="none"/>
6786 </interface>
6787 -<interface name="corenet_sendrecv_boinc_client_packets" lineno="13169">
6788 +<interface name="corenet_sendrecv_boinc_client_packets" lineno="13187">
6789 <summary>
6790 Send and receive boinc_client packets.
6791 </summary>
6792 @@ -18455,7 +18539,7 @@ Domain allowed access.
6793 </param>
6794 <infoflow type="both" weight="10"/>
6795 </interface>
6796 -<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="13185">
6797 +<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="13203">
6798 <summary>
6799 Do not audit attempts to send and receive boinc_client packets.
6800 </summary>
6801 @@ -18466,7 +18550,7 @@ Domain to not audit.
6802 </param>
6803 <infoflow type="none"/>
6804 </interface>
6805 -<interface name="corenet_relabelto_boinc_client_packets" lineno="13200">
6806 +<interface name="corenet_relabelto_boinc_client_packets" lineno="13218">
6807 <summary>
6808 Relabel packets to boinc_client the packet type.
6809 </summary>
6810 @@ -18476,7 +18560,7 @@ Domain allowed access.
6811 </summary>
6812 </param>
6813 </interface>
6814 -<interface name="corenet_send_boinc_server_packets" lineno="13220">
6815 +<interface name="corenet_send_boinc_server_packets" lineno="13238">
6816 <summary>
6817 Send boinc_server packets.
6818 </summary>
6819 @@ -18487,7 +18571,7 @@ Domain allowed access.
6820 </param>
6821 <infoflow type="write" weight="10"/>
6822 </interface>
6823 -<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="13239">
6824 +<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="13257">
6825 <summary>
6826 Do not audit attempts to send boinc_server packets.
6827 </summary>
6828 @@ -18498,7 +18582,7 @@ Domain to not audit.
6829 </param>
6830 <infoflow type="none"/>
6831 </interface>
6832 -<interface name="corenet_receive_boinc_server_packets" lineno="13258">
6833 +<interface name="corenet_receive_boinc_server_packets" lineno="13276">
6834 <summary>
6835 Receive boinc_server packets.
6836 </summary>
6837 @@ -18509,7 +18593,7 @@ Domain allowed access.
6838 </param>
6839 <infoflow type="read" weight="10"/>
6840 </interface>
6841 -<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="13277">
6842 +<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="13295">
6843 <summary>
6844 Do not audit attempts to receive boinc_server packets.
6845 </summary>
6846 @@ -18520,7 +18604,7 @@ Domain allowed access.
6847 </param>
6848 <infoflow type="none"/>
6849 </interface>
6850 -<interface name="corenet_sendrecv_boinc_server_packets" lineno="13296">
6851 +<interface name="corenet_sendrecv_boinc_server_packets" lineno="13314">
6852 <summary>
6853 Send and receive boinc_server packets.
6854 </summary>
6855 @@ -18531,7 +18615,7 @@ Domain allowed access.
6856 </param>
6857 <infoflow type="both" weight="10"/>
6858 </interface>
6859 -<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="13312">
6860 +<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="13330">
6861 <summary>
6862 Do not audit attempts to send and receive boinc_server packets.
6863 </summary>
6864 @@ -18542,7 +18626,7 @@ Domain to not audit.
6865 </param>
6866 <infoflow type="none"/>
6867 </interface>
6868 -<interface name="corenet_relabelto_boinc_server_packets" lineno="13327">
6869 +<interface name="corenet_relabelto_boinc_server_packets" lineno="13345">
6870 <summary>
6871 Relabel packets to boinc_server the packet type.
6872 </summary>
6873 @@ -18552,7 +18636,7 @@ Domain allowed access.
6874 </summary>
6875 </param>
6876 </interface>
6877 -<interface name="corenet_tcp_sendrecv_boinc_client_port" lineno="13349">
6878 +<interface name="corenet_tcp_sendrecv_boinc_client_port" lineno="13367">
6879 <summary>
6880 Send and receive TCP traffic on the boinc_client port.
6881 </summary>
6882 @@ -18563,7 +18647,7 @@ Domain allowed access.
6883 </param>
6884 <infoflow type="both" weight="10"/>
6885 </interface>
6886 -<interface name="corenet_udp_send_boinc_client_port" lineno="13364">
6887 +<interface name="corenet_udp_send_boinc_client_port" lineno="13382">
6888 <summary>
6889 Send UDP traffic on the boinc_client port.
6890 </summary>
6891 @@ -18574,7 +18658,7 @@ Domain allowed access.
6892 </param>
6893 <infoflow type="write" weight="10"/>
6894 </interface>
6895 -<interface name="corenet_dontaudit_udp_send_boinc_client_port" lineno="13379">
6896 +<interface name="corenet_dontaudit_udp_send_boinc_client_port" lineno="13397">
6897 <summary>
6898 Do not audit attempts to send UDP traffic on the boinc_client port.
6899 </summary>
6900 @@ -18585,7 +18669,7 @@ Domain to not audit.
6901 </param>
6902 <infoflow type="none"/>
6903 </interface>
6904 -<interface name="corenet_udp_receive_boinc_client_port" lineno="13394">
6905 +<interface name="corenet_udp_receive_boinc_client_port" lineno="13412">
6906 <summary>
6907 Receive UDP traffic on the boinc_client port.
6908 </summary>
6909 @@ -18596,7 +18680,7 @@ Domain allowed access.
6910 </param>
6911 <infoflow type="read" weight="10"/>
6912 </interface>
6913 -<interface name="corenet_dontaudit_udp_receive_boinc_client_port" lineno="13409">
6914 +<interface name="corenet_dontaudit_udp_receive_boinc_client_port" lineno="13427">
6915 <summary>
6916 Do not audit attempts to receive UDP traffic on the boinc_client port.
6917 </summary>
6918 @@ -18607,7 +18691,7 @@ Domain to not audit.
6919 </param>
6920 <infoflow type="none"/>
6921 </interface>
6922 -<interface name="corenet_udp_sendrecv_boinc_client_port" lineno="13424">
6923 +<interface name="corenet_udp_sendrecv_boinc_client_port" lineno="13442">
6924 <summary>
6925 Send and receive UDP traffic on the boinc_client port.
6926 </summary>
6927 @@ -18618,7 +18702,7 @@ Domain allowed access.
6928 </param>
6929 <infoflow type="both" weight="10"/>
6930 </interface>
6931 -<interface name="corenet_dontaudit_udp_sendrecv_boinc_client_port" lineno="13440">
6932 +<interface name="corenet_dontaudit_udp_sendrecv_boinc_client_port" lineno="13458">
6933 <summary>
6934 Do not audit attempts to send and receive
6935 UDP traffic on the boinc_client port.
6936 @@ -18630,7 +18714,7 @@ Domain to not audit.
6937 </param>
6938 <infoflow type="none"/>
6939 </interface>
6940 -<interface name="corenet_tcp_bind_boinc_client_port" lineno="13455">
6941 +<interface name="corenet_tcp_bind_boinc_client_port" lineno="13473">
6942 <summary>
6943 Bind TCP sockets to the boinc_client port.
6944 </summary>
6945 @@ -18641,7 +18725,7 @@ Domain allowed access.
6946 </param>
6947 <infoflow type="none"/>
6948 </interface>
6949 -<interface name="corenet_udp_bind_boinc_client_port" lineno="13475">
6950 +<interface name="corenet_udp_bind_boinc_client_port" lineno="13493">
6951 <summary>
6952 Bind UDP sockets to the boinc_client port.
6953 </summary>
6954 @@ -18652,7 +18736,7 @@ Domain allowed access.
6955 </param>
6956 <infoflow type="none"/>
6957 </interface>
6958 -<interface name="corenet_tcp_connect_boinc_client_port" lineno="13494">
6959 +<interface name="corenet_tcp_connect_boinc_client_port" lineno="13512">
6960 <summary>
6961 Make a TCP connection to the boinc_client port.
6962 </summary>
6963 @@ -18662,7 +18746,7 @@ Domain allowed access.
6964 </summary>
6965 </param>
6966 </interface>
6967 -<interface name="corenet_send_boinc_client_client_packets" lineno="13514">
6968 +<interface name="corenet_send_boinc_client_client_packets" lineno="13532">
6969 <summary>
6970 Send boinc_client_client packets.
6971 </summary>
6972 @@ -18673,7 +18757,7 @@ Domain allowed access.
6973 </param>
6974 <infoflow type="write" weight="10"/>
6975 </interface>
6976 -<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="13533">
6977 +<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="13551">
6978 <summary>
6979 Do not audit attempts to send boinc_client_client packets.
6980 </summary>
6981 @@ -18684,7 +18768,7 @@ Domain to not audit.
6982 </param>
6983 <infoflow type="none"/>
6984 </interface>
6985 -<interface name="corenet_receive_boinc_client_client_packets" lineno="13552">
6986 +<interface name="corenet_receive_boinc_client_client_packets" lineno="13570">
6987 <summary>
6988 Receive boinc_client_client packets.
6989 </summary>
6990 @@ -18695,7 +18779,7 @@ Domain allowed access.
6991 </param>
6992 <infoflow type="read" weight="10"/>
6993 </interface>
6994 -<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="13571">
6995 +<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="13589">
6996 <summary>
6997 Do not audit attempts to receive boinc_client_client packets.
6998 </summary>
6999 @@ -18706,7 +18790,7 @@ Domain allowed access.
7000 </param>
7001 <infoflow type="none"/>
7002 </interface>
7003 -<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="13590">
7004 +<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="13608">
7005 <summary>
7006 Send and receive boinc_client_client packets.
7007 </summary>
7008 @@ -18717,7 +18801,7 @@ Domain allowed access.
7009 </param>
7010 <infoflow type="both" weight="10"/>
7011 </interface>
7012 -<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="13606">
7013 +<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="13624">
7014 <summary>
7015 Do not audit attempts to send and receive boinc_client_client packets.
7016 </summary>
7017 @@ -18728,7 +18812,7 @@ Domain to not audit.
7018 </param>
7019 <infoflow type="none"/>
7020 </interface>
7021 -<interface name="corenet_relabelto_boinc_client_client_packets" lineno="13621">
7022 +<interface name="corenet_relabelto_boinc_client_client_packets" lineno="13639">
7023 <summary>
7024 Relabel packets to boinc_client_client the packet type.
7025 </summary>
7026 @@ -18738,7 +18822,7 @@ Domain allowed access.
7027 </summary>
7028 </param>
7029 </interface>
7030 -<interface name="corenet_send_boinc_client_server_packets" lineno="13641">
7031 +<interface name="corenet_send_boinc_client_server_packets" lineno="13659">
7032 <summary>
7033 Send boinc_client_server packets.
7034 </summary>
7035 @@ -18749,7 +18833,7 @@ Domain allowed access.
7036 </param>
7037 <infoflow type="write" weight="10"/>
7038 </interface>
7039 -<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="13660">
7040 +<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="13678">
7041 <summary>
7042 Do not audit attempts to send boinc_client_server packets.
7043 </summary>
7044 @@ -18760,7 +18844,7 @@ Domain to not audit.
7045 </param>
7046 <infoflow type="none"/>
7047 </interface>
7048 -<interface name="corenet_receive_boinc_client_server_packets" lineno="13679">
7049 +<interface name="corenet_receive_boinc_client_server_packets" lineno="13697">
7050 <summary>
7051 Receive boinc_client_server packets.
7052 </summary>
7053 @@ -18771,7 +18855,7 @@ Domain allowed access.
7054 </param>
7055 <infoflow type="read" weight="10"/>
7056 </interface>
7057 -<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="13698">
7058 +<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="13716">
7059 <summary>
7060 Do not audit attempts to receive boinc_client_server packets.
7061 </summary>
7062 @@ -18782,7 +18866,7 @@ Domain allowed access.
7063 </param>
7064 <infoflow type="none"/>
7065 </interface>
7066 -<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="13717">
7067 +<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="13735">
7068 <summary>
7069 Send and receive boinc_client_server packets.
7070 </summary>
7071 @@ -18793,7 +18877,7 @@ Domain allowed access.
7072 </param>
7073 <infoflow type="both" weight="10"/>
7074 </interface>
7075 -<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="13733">
7076 +<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="13751">
7077 <summary>
7078 Do not audit attempts to send and receive boinc_client_server packets.
7079 </summary>
7080 @@ -18804,7 +18888,7 @@ Domain to not audit.
7081 </param>
7082 <infoflow type="none"/>
7083 </interface>
7084 -<interface name="corenet_relabelto_boinc_client_server_packets" lineno="13748">
7085 +<interface name="corenet_relabelto_boinc_client_server_packets" lineno="13766">
7086 <summary>
7087 Relabel packets to boinc_client_server the packet type.
7088 </summary>
7089 @@ -18814,7 +18898,7 @@ Domain allowed access.
7090 </summary>
7091 </param>
7092 </interface>
7093 -<interface name="corenet_tcp_sendrecv_biff_port" lineno="13770">
7094 +<interface name="corenet_tcp_sendrecv_biff_port" lineno="13788">
7095 <summary>
7096 Send and receive TCP traffic on the biff port.
7097 </summary>
7098 @@ -18825,7 +18909,7 @@ Domain allowed access.
7099 </param>
7100 <infoflow type="both" weight="10"/>
7101 </interface>
7102 -<interface name="corenet_udp_send_biff_port" lineno="13785">
7103 +<interface name="corenet_udp_send_biff_port" lineno="13803">
7104 <summary>
7105 Send UDP traffic on the biff port.
7106 </summary>
7107 @@ -18836,7 +18920,7 @@ Domain allowed access.
7108 </param>
7109 <infoflow type="write" weight="10"/>
7110 </interface>
7111 -<interface name="corenet_dontaudit_udp_send_biff_port" lineno="13800">
7112 +<interface name="corenet_dontaudit_udp_send_biff_port" lineno="13818">
7113 <summary>
7114 Do not audit attempts to send UDP traffic on the biff port.
7115 </summary>
7116 @@ -18847,7 +18931,7 @@ Domain to not audit.
7117 </param>
7118 <infoflow type="none"/>
7119 </interface>
7120 -<interface name="corenet_udp_receive_biff_port" lineno="13815">
7121 +<interface name="corenet_udp_receive_biff_port" lineno="13833">
7122 <summary>
7123 Receive UDP traffic on the biff port.
7124 </summary>
7125 @@ -18858,7 +18942,7 @@ Domain allowed access.
7126 </param>
7127 <infoflow type="read" weight="10"/>
7128 </interface>
7129 -<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="13830">
7130 +<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="13848">
7131 <summary>
7132 Do not audit attempts to receive UDP traffic on the biff port.
7133 </summary>
7134 @@ -18869,7 +18953,7 @@ Domain to not audit.
7135 </param>
7136 <infoflow type="none"/>
7137 </interface>
7138 -<interface name="corenet_udp_sendrecv_biff_port" lineno="13845">
7139 +<interface name="corenet_udp_sendrecv_biff_port" lineno="13863">
7140 <summary>
7141 Send and receive UDP traffic on the biff port.
7142 </summary>
7143 @@ -18880,7 +18964,7 @@ Domain allowed access.
7144 </param>
7145 <infoflow type="both" weight="10"/>
7146 </interface>
7147 -<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="13861">
7148 +<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="13879">
7149 <summary>
7150 Do not audit attempts to send and receive
7151 UDP traffic on the biff port.
7152 @@ -18892,7 +18976,7 @@ Domain to not audit.
7153 </param>
7154 <infoflow type="none"/>
7155 </interface>
7156 -<interface name="corenet_tcp_bind_biff_port" lineno="13876">
7157 +<interface name="corenet_tcp_bind_biff_port" lineno="13894">
7158 <summary>
7159 Bind TCP sockets to the biff port.
7160 </summary>
7161 @@ -18903,7 +18987,7 @@ Domain allowed access.
7162 </param>
7163 <infoflow type="none"/>
7164 </interface>
7165 -<interface name="corenet_udp_bind_biff_port" lineno="13896">
7166 +<interface name="corenet_udp_bind_biff_port" lineno="13914">
7167 <summary>
7168 Bind UDP sockets to the biff port.
7169 </summary>
7170 @@ -18914,7 +18998,7 @@ Domain allowed access.
7171 </param>
7172 <infoflow type="none"/>
7173 </interface>
7174 -<interface name="corenet_tcp_connect_biff_port" lineno="13915">
7175 +<interface name="corenet_tcp_connect_biff_port" lineno="13933">
7176 <summary>
7177 Make a TCP connection to the biff port.
7178 </summary>
7179 @@ -18924,7 +19008,7 @@ Domain allowed access.
7180 </summary>
7181 </param>
7182 </interface>
7183 -<interface name="corenet_send_biff_client_packets" lineno="13935">
7184 +<interface name="corenet_send_biff_client_packets" lineno="13953">
7185 <summary>
7186 Send biff_client packets.
7187 </summary>
7188 @@ -18935,7 +19019,7 @@ Domain allowed access.
7189 </param>
7190 <infoflow type="write" weight="10"/>
7191 </interface>
7192 -<interface name="corenet_dontaudit_send_biff_client_packets" lineno="13954">
7193 +<interface name="corenet_dontaudit_send_biff_client_packets" lineno="13972">
7194 <summary>
7195 Do not audit attempts to send biff_client packets.
7196 </summary>
7197 @@ -18946,7 +19030,7 @@ Domain to not audit.
7198 </param>
7199 <infoflow type="none"/>
7200 </interface>
7201 -<interface name="corenet_receive_biff_client_packets" lineno="13973">
7202 +<interface name="corenet_receive_biff_client_packets" lineno="13991">
7203 <summary>
7204 Receive biff_client packets.
7205 </summary>
7206 @@ -18957,7 +19041,7 @@ Domain allowed access.
7207 </param>
7208 <infoflow type="read" weight="10"/>
7209 </interface>
7210 -<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="13992">
7211 +<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="14010">
7212 <summary>
7213 Do not audit attempts to receive biff_client packets.
7214 </summary>
7215 @@ -18968,7 +19052,7 @@ Domain allowed access.
7216 </param>
7217 <infoflow type="none"/>
7218 </interface>
7219 -<interface name="corenet_sendrecv_biff_client_packets" lineno="14011">
7220 +<interface name="corenet_sendrecv_biff_client_packets" lineno="14029">
7221 <summary>
7222 Send and receive biff_client packets.
7223 </summary>
7224 @@ -18979,7 +19063,7 @@ Domain allowed access.
7225 </param>
7226 <infoflow type="both" weight="10"/>
7227 </interface>
7228 -<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="14027">
7229 +<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="14045">
7230 <summary>
7231 Do not audit attempts to send and receive biff_client packets.
7232 </summary>
7233 @@ -18990,7 +19074,7 @@ Domain to not audit.
7234 </param>
7235 <infoflow type="none"/>
7236 </interface>
7237 -<interface name="corenet_relabelto_biff_client_packets" lineno="14042">
7238 +<interface name="corenet_relabelto_biff_client_packets" lineno="14060">
7239 <summary>
7240 Relabel packets to biff_client the packet type.
7241 </summary>
7242 @@ -19000,7 +19084,7 @@ Domain allowed access.
7243 </summary>
7244 </param>
7245 </interface>
7246 -<interface name="corenet_send_biff_server_packets" lineno="14062">
7247 +<interface name="corenet_send_biff_server_packets" lineno="14080">
7248 <summary>
7249 Send biff_server packets.
7250 </summary>
7251 @@ -19011,7 +19095,7 @@ Domain allowed access.
7252 </param>
7253 <infoflow type="write" weight="10"/>
7254 </interface>
7255 -<interface name="corenet_dontaudit_send_biff_server_packets" lineno="14081">
7256 +<interface name="corenet_dontaudit_send_biff_server_packets" lineno="14099">
7257 <summary>
7258 Do not audit attempts to send biff_server packets.
7259 </summary>
7260 @@ -19022,7 +19106,7 @@ Domain to not audit.
7261 </param>
7262 <infoflow type="none"/>
7263 </interface>
7264 -<interface name="corenet_receive_biff_server_packets" lineno="14100">
7265 +<interface name="corenet_receive_biff_server_packets" lineno="14118">
7266 <summary>
7267 Receive biff_server packets.
7268 </summary>
7269 @@ -19033,7 +19117,7 @@ Domain allowed access.
7270 </param>
7271 <infoflow type="read" weight="10"/>
7272 </interface>
7273 -<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="14119">
7274 +<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="14137">
7275 <summary>
7276 Do not audit attempts to receive biff_server packets.
7277 </summary>
7278 @@ -19044,7 +19128,7 @@ Domain allowed access.
7279 </param>
7280 <infoflow type="none"/>
7281 </interface>
7282 -<interface name="corenet_sendrecv_biff_server_packets" lineno="14138">
7283 +<interface name="corenet_sendrecv_biff_server_packets" lineno="14156">
7284 <summary>
7285 Send and receive biff_server packets.
7286 </summary>
7287 @@ -19055,7 +19139,7 @@ Domain allowed access.
7288 </param>
7289 <infoflow type="both" weight="10"/>
7290 </interface>
7291 -<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="14154">
7292 +<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="14172">
7293 <summary>
7294 Do not audit attempts to send and receive biff_server packets.
7295 </summary>
7296 @@ -19066,7 +19150,7 @@ Domain to not audit.
7297 </param>
7298 <infoflow type="none"/>
7299 </interface>
7300 -<interface name="corenet_relabelto_biff_server_packets" lineno="14169">
7301 +<interface name="corenet_relabelto_biff_server_packets" lineno="14187">
7302 <summary>
7303 Relabel packets to biff_server the packet type.
7304 </summary>
7305 @@ -19076,7 +19160,7 @@ Domain allowed access.
7306 </summary>
7307 </param>
7308 </interface>
7309 -<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="14191">
7310 +<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="14209">
7311 <summary>
7312 Send and receive TCP traffic on the certmaster port.
7313 </summary>
7314 @@ -19087,7 +19171,7 @@ Domain allowed access.
7315 </param>
7316 <infoflow type="both" weight="10"/>
7317 </interface>
7318 -<interface name="corenet_udp_send_certmaster_port" lineno="14206">
7319 +<interface name="corenet_udp_send_certmaster_port" lineno="14224">
7320 <summary>
7321 Send UDP traffic on the certmaster port.
7322 </summary>
7323 @@ -19098,7 +19182,7 @@ Domain allowed access.
7324 </param>
7325 <infoflow type="write" weight="10"/>
7326 </interface>
7327 -<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="14221">
7328 +<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="14239">
7329 <summary>
7330 Do not audit attempts to send UDP traffic on the certmaster port.
7331 </summary>
7332 @@ -19109,7 +19193,7 @@ Domain to not audit.
7333 </param>
7334 <infoflow type="none"/>
7335 </interface>
7336 -<interface name="corenet_udp_receive_certmaster_port" lineno="14236">
7337 +<interface name="corenet_udp_receive_certmaster_port" lineno="14254">
7338 <summary>
7339 Receive UDP traffic on the certmaster port.
7340 </summary>
7341 @@ -19120,7 +19204,7 @@ Domain allowed access.
7342 </param>
7343 <infoflow type="read" weight="10"/>
7344 </interface>
7345 -<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="14251">
7346 +<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="14269">
7347 <summary>
7348 Do not audit attempts to receive UDP traffic on the certmaster port.
7349 </summary>
7350 @@ -19131,7 +19215,7 @@ Domain to not audit.
7351 </param>
7352 <infoflow type="none"/>
7353 </interface>
7354 -<interface name="corenet_udp_sendrecv_certmaster_port" lineno="14266">
7355 +<interface name="corenet_udp_sendrecv_certmaster_port" lineno="14284">
7356 <summary>
7357 Send and receive UDP traffic on the certmaster port.
7358 </summary>
7359 @@ -19142,7 +19226,7 @@ Domain allowed access.
7360 </param>
7361 <infoflow type="both" weight="10"/>
7362 </interface>
7363 -<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="14282">
7364 +<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="14300">
7365 <summary>
7366 Do not audit attempts to send and receive
7367 UDP traffic on the certmaster port.
7368 @@ -19154,7 +19238,7 @@ Domain to not audit.
7369 </param>
7370 <infoflow type="none"/>
7371 </interface>
7372 -<interface name="corenet_tcp_bind_certmaster_port" lineno="14297">
7373 +<interface name="corenet_tcp_bind_certmaster_port" lineno="14315">
7374 <summary>
7375 Bind TCP sockets to the certmaster port.
7376 </summary>
7377 @@ -19165,7 +19249,7 @@ Domain allowed access.
7378 </param>
7379 <infoflow type="none"/>
7380 </interface>
7381 -<interface name="corenet_udp_bind_certmaster_port" lineno="14317">
7382 +<interface name="corenet_udp_bind_certmaster_port" lineno="14335">
7383 <summary>
7384 Bind UDP sockets to the certmaster port.
7385 </summary>
7386 @@ -19176,7 +19260,7 @@ Domain allowed access.
7387 </param>
7388 <infoflow type="none"/>
7389 </interface>
7390 -<interface name="corenet_tcp_connect_certmaster_port" lineno="14336">
7391 +<interface name="corenet_tcp_connect_certmaster_port" lineno="14354">
7392 <summary>
7393 Make a TCP connection to the certmaster port.
7394 </summary>
7395 @@ -19186,7 +19270,7 @@ Domain allowed access.
7396 </summary>
7397 </param>
7398 </interface>
7399 -<interface name="corenet_send_certmaster_client_packets" lineno="14356">
7400 +<interface name="corenet_send_certmaster_client_packets" lineno="14374">
7401 <summary>
7402 Send certmaster_client packets.
7403 </summary>
7404 @@ -19197,7 +19281,7 @@ Domain allowed access.
7405 </param>
7406 <infoflow type="write" weight="10"/>
7407 </interface>
7408 -<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="14375">
7409 +<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="14393">
7410 <summary>
7411 Do not audit attempts to send certmaster_client packets.
7412 </summary>
7413 @@ -19208,7 +19292,7 @@ Domain to not audit.
7414 </param>
7415 <infoflow type="none"/>
7416 </interface>
7417 -<interface name="corenet_receive_certmaster_client_packets" lineno="14394">
7418 +<interface name="corenet_receive_certmaster_client_packets" lineno="14412">
7419 <summary>
7420 Receive certmaster_client packets.
7421 </summary>
7422 @@ -19219,7 +19303,7 @@ Domain allowed access.
7423 </param>
7424 <infoflow type="read" weight="10"/>
7425 </interface>
7426 -<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="14413">
7427 +<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="14431">
7428 <summary>
7429 Do not audit attempts to receive certmaster_client packets.
7430 </summary>
7431 @@ -19230,7 +19314,7 @@ Domain allowed access.
7432 </param>
7433 <infoflow type="none"/>
7434 </interface>
7435 -<interface name="corenet_sendrecv_certmaster_client_packets" lineno="14432">
7436 +<interface name="corenet_sendrecv_certmaster_client_packets" lineno="14450">
7437 <summary>
7438 Send and receive certmaster_client packets.
7439 </summary>
7440 @@ -19241,7 +19325,7 @@ Domain allowed access.
7441 </param>
7442 <infoflow type="both" weight="10"/>
7443 </interface>
7444 -<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="14448">
7445 +<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="14466">
7446 <summary>
7447 Do not audit attempts to send and receive certmaster_client packets.
7448 </summary>
7449 @@ -19252,7 +19336,7 @@ Domain to not audit.
7450 </param>
7451 <infoflow type="none"/>
7452 </interface>
7453 -<interface name="corenet_relabelto_certmaster_client_packets" lineno="14463">
7454 +<interface name="corenet_relabelto_certmaster_client_packets" lineno="14481">
7455 <summary>
7456 Relabel packets to certmaster_client the packet type.
7457 </summary>
7458 @@ -19262,7 +19346,7 @@ Domain allowed access.
7459 </summary>
7460 </param>
7461 </interface>
7462 -<interface name="corenet_send_certmaster_server_packets" lineno="14483">
7463 +<interface name="corenet_send_certmaster_server_packets" lineno="14501">
7464 <summary>
7465 Send certmaster_server packets.
7466 </summary>
7467 @@ -19273,7 +19357,7 @@ Domain allowed access.
7468 </param>
7469 <infoflow type="write" weight="10"/>
7470 </interface>
7471 -<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="14502">
7472 +<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="14520">
7473 <summary>
7474 Do not audit attempts to send certmaster_server packets.
7475 </summary>
7476 @@ -19284,7 +19368,7 @@ Domain to not audit.
7477 </param>
7478 <infoflow type="none"/>
7479 </interface>
7480 -<interface name="corenet_receive_certmaster_server_packets" lineno="14521">
7481 +<interface name="corenet_receive_certmaster_server_packets" lineno="14539">
7482 <summary>
7483 Receive certmaster_server packets.
7484 </summary>
7485 @@ -19295,7 +19379,7 @@ Domain allowed access.
7486 </param>
7487 <infoflow type="read" weight="10"/>
7488 </interface>
7489 -<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="14540">
7490 +<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="14558">
7491 <summary>
7492 Do not audit attempts to receive certmaster_server packets.
7493 </summary>
7494 @@ -19306,7 +19390,7 @@ Domain allowed access.
7495 </param>
7496 <infoflow type="none"/>
7497 </interface>
7498 -<interface name="corenet_sendrecv_certmaster_server_packets" lineno="14559">
7499 +<interface name="corenet_sendrecv_certmaster_server_packets" lineno="14577">
7500 <summary>
7501 Send and receive certmaster_server packets.
7502 </summary>
7503 @@ -19317,7 +19401,7 @@ Domain allowed access.
7504 </param>
7505 <infoflow type="both" weight="10"/>
7506 </interface>
7507 -<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="14575">
7508 +<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="14593">
7509 <summary>
7510 Do not audit attempts to send and receive certmaster_server packets.
7511 </summary>
7512 @@ -19328,7 +19412,7 @@ Domain to not audit.
7513 </param>
7514 <infoflow type="none"/>
7515 </interface>
7516 -<interface name="corenet_relabelto_certmaster_server_packets" lineno="14590">
7517 +<interface name="corenet_relabelto_certmaster_server_packets" lineno="14608">
7518 <summary>
7519 Relabel packets to certmaster_server the packet type.
7520 </summary>
7521 @@ -19338,7 +19422,7 @@ Domain allowed access.
7522 </summary>
7523 </param>
7524 </interface>
7525 -<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="14612">
7526 +<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="14630">
7527 <summary>
7528 Send and receive TCP traffic on the chronyd port.
7529 </summary>
7530 @@ -19349,7 +19433,7 @@ Domain allowed access.
7531 </param>
7532 <infoflow type="both" weight="10"/>
7533 </interface>
7534 -<interface name="corenet_udp_send_chronyd_port" lineno="14627">
7535 +<interface name="corenet_udp_send_chronyd_port" lineno="14645">
7536 <summary>
7537 Send UDP traffic on the chronyd port.
7538 </summary>
7539 @@ -19360,7 +19444,7 @@ Domain allowed access.
7540 </param>
7541 <infoflow type="write" weight="10"/>
7542 </interface>
7543 -<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="14642">
7544 +<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="14660">
7545 <summary>
7546 Do not audit attempts to send UDP traffic on the chronyd port.
7547 </summary>
7548 @@ -19371,7 +19455,7 @@ Domain to not audit.
7549 </param>
7550 <infoflow type="none"/>
7551 </interface>
7552 -<interface name="corenet_udp_receive_chronyd_port" lineno="14657">
7553 +<interface name="corenet_udp_receive_chronyd_port" lineno="14675">
7554 <summary>
7555 Receive UDP traffic on the chronyd port.
7556 </summary>
7557 @@ -19382,7 +19466,7 @@ Domain allowed access.
7558 </param>
7559 <infoflow type="read" weight="10"/>
7560 </interface>
7561 -<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="14672">
7562 +<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="14690">
7563 <summary>
7564 Do not audit attempts to receive UDP traffic on the chronyd port.
7565 </summary>
7566 @@ -19393,7 +19477,7 @@ Domain to not audit.
7567 </param>
7568 <infoflow type="none"/>
7569 </interface>
7570 -<interface name="corenet_udp_sendrecv_chronyd_port" lineno="14687">
7571 +<interface name="corenet_udp_sendrecv_chronyd_port" lineno="14705">
7572 <summary>
7573 Send and receive UDP traffic on the chronyd port.
7574 </summary>
7575 @@ -19404,7 +19488,7 @@ Domain allowed access.
7576 </param>
7577 <infoflow type="both" weight="10"/>
7578 </interface>
7579 -<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="14703">
7580 +<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="14721">
7581 <summary>
7582 Do not audit attempts to send and receive
7583 UDP traffic on the chronyd port.
7584 @@ -19416,7 +19500,7 @@ Domain to not audit.
7585 </param>
7586 <infoflow type="none"/>
7587 </interface>
7588 -<interface name="corenet_tcp_bind_chronyd_port" lineno="14718">
7589 +<interface name="corenet_tcp_bind_chronyd_port" lineno="14736">
7590 <summary>
7591 Bind TCP sockets to the chronyd port.
7592 </summary>
7593 @@ -19427,7 +19511,7 @@ Domain allowed access.
7594 </param>
7595 <infoflow type="none"/>
7596 </interface>
7597 -<interface name="corenet_udp_bind_chronyd_port" lineno="14738">
7598 +<interface name="corenet_udp_bind_chronyd_port" lineno="14756">
7599 <summary>
7600 Bind UDP sockets to the chronyd port.
7601 </summary>
7602 @@ -19438,7 +19522,7 @@ Domain allowed access.
7603 </param>
7604 <infoflow type="none"/>
7605 </interface>
7606 -<interface name="corenet_tcp_connect_chronyd_port" lineno="14757">
7607 +<interface name="corenet_tcp_connect_chronyd_port" lineno="14775">
7608 <summary>
7609 Make a TCP connection to the chronyd port.
7610 </summary>
7611 @@ -19448,7 +19532,7 @@ Domain allowed access.
7612 </summary>
7613 </param>
7614 </interface>
7615 -<interface name="corenet_send_chronyd_client_packets" lineno="14777">
7616 +<interface name="corenet_send_chronyd_client_packets" lineno="14795">
7617 <summary>
7618 Send chronyd_client packets.
7619 </summary>
7620 @@ -19459,7 +19543,7 @@ Domain allowed access.
7621 </param>
7622 <infoflow type="write" weight="10"/>
7623 </interface>
7624 -<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="14796">
7625 +<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="14814">
7626 <summary>
7627 Do not audit attempts to send chronyd_client packets.
7628 </summary>
7629 @@ -19470,7 +19554,7 @@ Domain to not audit.
7630 </param>
7631 <infoflow type="none"/>
7632 </interface>
7633 -<interface name="corenet_receive_chronyd_client_packets" lineno="14815">
7634 +<interface name="corenet_receive_chronyd_client_packets" lineno="14833">
7635 <summary>
7636 Receive chronyd_client packets.
7637 </summary>
7638 @@ -19481,7 +19565,7 @@ Domain allowed access.
7639 </param>
7640 <infoflow type="read" weight="10"/>
7641 </interface>
7642 -<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="14834">
7643 +<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="14852">
7644 <summary>
7645 Do not audit attempts to receive chronyd_client packets.
7646 </summary>
7647 @@ -19492,7 +19576,7 @@ Domain allowed access.
7648 </param>
7649 <infoflow type="none"/>
7650 </interface>
7651 -<interface name="corenet_sendrecv_chronyd_client_packets" lineno="14853">
7652 +<interface name="corenet_sendrecv_chronyd_client_packets" lineno="14871">
7653 <summary>
7654 Send and receive chronyd_client packets.
7655 </summary>
7656 @@ -19503,7 +19587,7 @@ Domain allowed access.
7657 </param>
7658 <infoflow type="both" weight="10"/>
7659 </interface>
7660 -<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="14869">
7661 +<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="14887">
7662 <summary>
7663 Do not audit attempts to send and receive chronyd_client packets.
7664 </summary>
7665 @@ -19514,7 +19598,7 @@ Domain to not audit.
7666 </param>
7667 <infoflow type="none"/>
7668 </interface>
7669 -<interface name="corenet_relabelto_chronyd_client_packets" lineno="14884">
7670 +<interface name="corenet_relabelto_chronyd_client_packets" lineno="14902">
7671 <summary>
7672 Relabel packets to chronyd_client the packet type.
7673 </summary>
7674 @@ -19524,7 +19608,7 @@ Domain allowed access.
7675 </summary>
7676 </param>
7677 </interface>
7678 -<interface name="corenet_send_chronyd_server_packets" lineno="14904">
7679 +<interface name="corenet_send_chronyd_server_packets" lineno="14922">
7680 <summary>
7681 Send chronyd_server packets.
7682 </summary>
7683 @@ -19535,7 +19619,7 @@ Domain allowed access.
7684 </param>
7685 <infoflow type="write" weight="10"/>
7686 </interface>
7687 -<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="14923">
7688 +<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="14941">
7689 <summary>
7690 Do not audit attempts to send chronyd_server packets.
7691 </summary>
7692 @@ -19546,7 +19630,7 @@ Domain to not audit.
7693 </param>
7694 <infoflow type="none"/>
7695 </interface>
7696 -<interface name="corenet_receive_chronyd_server_packets" lineno="14942">
7697 +<interface name="corenet_receive_chronyd_server_packets" lineno="14960">
7698 <summary>
7699 Receive chronyd_server packets.
7700 </summary>
7701 @@ -19557,7 +19641,7 @@ Domain allowed access.
7702 </param>
7703 <infoflow type="read" weight="10"/>
7704 </interface>
7705 -<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="14961">
7706 +<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="14979">
7707 <summary>
7708 Do not audit attempts to receive chronyd_server packets.
7709 </summary>
7710 @@ -19568,7 +19652,7 @@ Domain allowed access.
7711 </param>
7712 <infoflow type="none"/>
7713 </interface>
7714 -<interface name="corenet_sendrecv_chronyd_server_packets" lineno="14980">
7715 +<interface name="corenet_sendrecv_chronyd_server_packets" lineno="14998">
7716 <summary>
7717 Send and receive chronyd_server packets.
7718 </summary>
7719 @@ -19579,7 +19663,7 @@ Domain allowed access.
7720 </param>
7721 <infoflow type="both" weight="10"/>
7722 </interface>
7723 -<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="14996">
7724 +<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="15014">
7725 <summary>
7726 Do not audit attempts to send and receive chronyd_server packets.
7727 </summary>
7728 @@ -19590,7 +19674,7 @@ Domain to not audit.
7729 </param>
7730 <infoflow type="none"/>
7731 </interface>
7732 -<interface name="corenet_relabelto_chronyd_server_packets" lineno="15011">
7733 +<interface name="corenet_relabelto_chronyd_server_packets" lineno="15029">
7734 <summary>
7735 Relabel packets to chronyd_server the packet type.
7736 </summary>
7737 @@ -19600,7 +19684,7 @@ Domain allowed access.
7738 </summary>
7739 </param>
7740 </interface>
7741 -<interface name="corenet_tcp_sendrecv_clamd_port" lineno="15033">
7742 +<interface name="corenet_tcp_sendrecv_clamd_port" lineno="15051">
7743 <summary>
7744 Send and receive TCP traffic on the clamd port.
7745 </summary>
7746 @@ -19611,7 +19695,7 @@ Domain allowed access.
7747 </param>
7748 <infoflow type="both" weight="10"/>
7749 </interface>
7750 -<interface name="corenet_udp_send_clamd_port" lineno="15048">
7751 +<interface name="corenet_udp_send_clamd_port" lineno="15066">
7752 <summary>
7753 Send UDP traffic on the clamd port.
7754 </summary>
7755 @@ -19622,7 +19706,7 @@ Domain allowed access.
7756 </param>
7757 <infoflow type="write" weight="10"/>
7758 </interface>
7759 -<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="15063">
7760 +<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="15081">
7761 <summary>
7762 Do not audit attempts to send UDP traffic on the clamd port.
7763 </summary>
7764 @@ -19633,7 +19717,7 @@ Domain to not audit.
7765 </param>
7766 <infoflow type="none"/>
7767 </interface>
7768 -<interface name="corenet_udp_receive_clamd_port" lineno="15078">
7769 +<interface name="corenet_udp_receive_clamd_port" lineno="15096">
7770 <summary>
7771 Receive UDP traffic on the clamd port.
7772 </summary>
7773 @@ -19644,7 +19728,7 @@ Domain allowed access.
7774 </param>
7775 <infoflow type="read" weight="10"/>
7776 </interface>
7777 -<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="15093">
7778 +<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="15111">
7779 <summary>
7780 Do not audit attempts to receive UDP traffic on the clamd port.
7781 </summary>
7782 @@ -19655,7 +19739,7 @@ Domain to not audit.
7783 </param>
7784 <infoflow type="none"/>
7785 </interface>
7786 -<interface name="corenet_udp_sendrecv_clamd_port" lineno="15108">
7787 +<interface name="corenet_udp_sendrecv_clamd_port" lineno="15126">
7788 <summary>
7789 Send and receive UDP traffic on the clamd port.
7790 </summary>
7791 @@ -19666,7 +19750,7 @@ Domain allowed access.
7792 </param>
7793 <infoflow type="both" weight="10"/>
7794 </interface>
7795 -<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="15124">
7796 +<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="15142">
7797 <summary>
7798 Do not audit attempts to send and receive
7799 UDP traffic on the clamd port.
7800 @@ -19678,7 +19762,7 @@ Domain to not audit.
7801 </param>
7802 <infoflow type="none"/>
7803 </interface>
7804 -<interface name="corenet_tcp_bind_clamd_port" lineno="15139">
7805 +<interface name="corenet_tcp_bind_clamd_port" lineno="15157">
7806 <summary>
7807 Bind TCP sockets to the clamd port.
7808 </summary>
7809 @@ -19689,7 +19773,7 @@ Domain allowed access.
7810 </param>
7811 <infoflow type="none"/>
7812 </interface>
7813 -<interface name="corenet_udp_bind_clamd_port" lineno="15159">
7814 +<interface name="corenet_udp_bind_clamd_port" lineno="15177">
7815 <summary>
7816 Bind UDP sockets to the clamd port.
7817 </summary>
7818 @@ -19700,7 +19784,7 @@ Domain allowed access.
7819 </param>
7820 <infoflow type="none"/>
7821 </interface>
7822 -<interface name="corenet_tcp_connect_clamd_port" lineno="15178">
7823 +<interface name="corenet_tcp_connect_clamd_port" lineno="15196">
7824 <summary>
7825 Make a TCP connection to the clamd port.
7826 </summary>
7827 @@ -19710,7 +19794,7 @@ Domain allowed access.
7828 </summary>
7829 </param>
7830 </interface>
7831 -<interface name="corenet_send_clamd_client_packets" lineno="15198">
7832 +<interface name="corenet_send_clamd_client_packets" lineno="15216">
7833 <summary>
7834 Send clamd_client packets.
7835 </summary>
7836 @@ -19721,7 +19805,7 @@ Domain allowed access.
7837 </param>
7838 <infoflow type="write" weight="10"/>
7839 </interface>
7840 -<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="15217">
7841 +<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="15235">
7842 <summary>
7843 Do not audit attempts to send clamd_client packets.
7844 </summary>
7845 @@ -19732,7 +19816,7 @@ Domain to not audit.
7846 </param>
7847 <infoflow type="none"/>
7848 </interface>
7849 -<interface name="corenet_receive_clamd_client_packets" lineno="15236">
7850 +<interface name="corenet_receive_clamd_client_packets" lineno="15254">
7851 <summary>
7852 Receive clamd_client packets.
7853 </summary>
7854 @@ -19743,7 +19827,7 @@ Domain allowed access.
7855 </param>
7856 <infoflow type="read" weight="10"/>
7857 </interface>
7858 -<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="15255">
7859 +<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="15273">
7860 <summary>
7861 Do not audit attempts to receive clamd_client packets.
7862 </summary>
7863 @@ -19754,7 +19838,7 @@ Domain allowed access.
7864 </param>
7865 <infoflow type="none"/>
7866 </interface>
7867 -<interface name="corenet_sendrecv_clamd_client_packets" lineno="15274">
7868 +<interface name="corenet_sendrecv_clamd_client_packets" lineno="15292">
7869 <summary>
7870 Send and receive clamd_client packets.
7871 </summary>
7872 @@ -19765,7 +19849,7 @@ Domain allowed access.
7873 </param>
7874 <infoflow type="both" weight="10"/>
7875 </interface>
7876 -<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="15290">
7877 +<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="15308">
7878 <summary>
7879 Do not audit attempts to send and receive clamd_client packets.
7880 </summary>
7881 @@ -19776,7 +19860,7 @@ Domain to not audit.
7882 </param>
7883 <infoflow type="none"/>
7884 </interface>
7885 -<interface name="corenet_relabelto_clamd_client_packets" lineno="15305">
7886 +<interface name="corenet_relabelto_clamd_client_packets" lineno="15323">
7887 <summary>
7888 Relabel packets to clamd_client the packet type.
7889 </summary>
7890 @@ -19786,7 +19870,7 @@ Domain allowed access.
7891 </summary>
7892 </param>
7893 </interface>
7894 -<interface name="corenet_send_clamd_server_packets" lineno="15325">
7895 +<interface name="corenet_send_clamd_server_packets" lineno="15343">
7896 <summary>
7897 Send clamd_server packets.
7898 </summary>
7899 @@ -19797,7 +19881,7 @@ Domain allowed access.
7900 </param>
7901 <infoflow type="write" weight="10"/>
7902 </interface>
7903 -<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="15344">
7904 +<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="15362">
7905 <summary>
7906 Do not audit attempts to send clamd_server packets.
7907 </summary>
7908 @@ -19808,7 +19892,7 @@ Domain to not audit.
7909 </param>
7910 <infoflow type="none"/>
7911 </interface>
7912 -<interface name="corenet_receive_clamd_server_packets" lineno="15363">
7913 +<interface name="corenet_receive_clamd_server_packets" lineno="15381">
7914 <summary>
7915 Receive clamd_server packets.
7916 </summary>
7917 @@ -19819,7 +19903,7 @@ Domain allowed access.
7918 </param>
7919 <infoflow type="read" weight="10"/>
7920 </interface>
7921 -<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="15382">
7922 +<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="15400">
7923 <summary>
7924 Do not audit attempts to receive clamd_server packets.
7925 </summary>
7926 @@ -19830,7 +19914,7 @@ Domain allowed access.
7927 </param>
7928 <infoflow type="none"/>
7929 </interface>
7930 -<interface name="corenet_sendrecv_clamd_server_packets" lineno="15401">
7931 +<interface name="corenet_sendrecv_clamd_server_packets" lineno="15419">
7932 <summary>
7933 Send and receive clamd_server packets.
7934 </summary>
7935 @@ -19841,7 +19925,7 @@ Domain allowed access.
7936 </param>
7937 <infoflow type="both" weight="10"/>
7938 </interface>
7939 -<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="15417">
7940 +<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="15435">
7941 <summary>
7942 Do not audit attempts to send and receive clamd_server packets.
7943 </summary>
7944 @@ -19852,7 +19936,7 @@ Domain to not audit.
7945 </param>
7946 <infoflow type="none"/>
7947 </interface>
7948 -<interface name="corenet_relabelto_clamd_server_packets" lineno="15432">
7949 +<interface name="corenet_relabelto_clamd_server_packets" lineno="15450">
7950 <summary>
7951 Relabel packets to clamd_server the packet type.
7952 </summary>
7953 @@ -19862,7 +19946,7 @@ Domain allowed access.
7954 </summary>
7955 </param>
7956 </interface>
7957 -<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="15454">
7958 +<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="15472">
7959 <summary>
7960 Send and receive TCP traffic on the clockspeed port.
7961 </summary>
7962 @@ -19873,7 +19957,7 @@ Domain allowed access.
7963 </param>
7964 <infoflow type="both" weight="10"/>
7965 </interface>
7966 -<interface name="corenet_udp_send_clockspeed_port" lineno="15469">
7967 +<interface name="corenet_udp_send_clockspeed_port" lineno="15487">
7968 <summary>
7969 Send UDP traffic on the clockspeed port.
7970 </summary>
7971 @@ -19884,7 +19968,7 @@ Domain allowed access.
7972 </param>
7973 <infoflow type="write" weight="10"/>
7974 </interface>
7975 -<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="15484">
7976 +<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="15502">
7977 <summary>
7978 Do not audit attempts to send UDP traffic on the clockspeed port.
7979 </summary>
7980 @@ -19895,7 +19979,7 @@ Domain to not audit.
7981 </param>
7982 <infoflow type="none"/>
7983 </interface>
7984 -<interface name="corenet_udp_receive_clockspeed_port" lineno="15499">
7985 +<interface name="corenet_udp_receive_clockspeed_port" lineno="15517">
7986 <summary>
7987 Receive UDP traffic on the clockspeed port.
7988 </summary>
7989 @@ -19906,7 +19990,7 @@ Domain allowed access.
7990 </param>
7991 <infoflow type="read" weight="10"/>
7992 </interface>
7993 -<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="15514">
7994 +<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="15532">
7995 <summary>
7996 Do not audit attempts to receive UDP traffic on the clockspeed port.
7997 </summary>
7998 @@ -19917,7 +20001,7 @@ Domain to not audit.
7999 </param>
8000 <infoflow type="none"/>
8001 </interface>
8002 -<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="15529">
8003 +<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="15547">
8004 <summary>
8005 Send and receive UDP traffic on the clockspeed port.
8006 </summary>
8007 @@ -19928,7 +20012,7 @@ Domain allowed access.
8008 </param>
8009 <infoflow type="both" weight="10"/>
8010 </interface>
8011 -<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="15545">
8012 +<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="15563">
8013 <summary>
8014 Do not audit attempts to send and receive
8015 UDP traffic on the clockspeed port.
8016 @@ -19940,7 +20024,7 @@ Domain to not audit.
8017 </param>
8018 <infoflow type="none"/>
8019 </interface>
8020 -<interface name="corenet_tcp_bind_clockspeed_port" lineno="15560">
8021 +<interface name="corenet_tcp_bind_clockspeed_port" lineno="15578">
8022 <summary>
8023 Bind TCP sockets to the clockspeed port.
8024 </summary>
8025 @@ -19951,7 +20035,7 @@ Domain allowed access.
8026 </param>
8027 <infoflow type="none"/>
8028 </interface>
8029 -<interface name="corenet_udp_bind_clockspeed_port" lineno="15580">
8030 +<interface name="corenet_udp_bind_clockspeed_port" lineno="15598">
8031 <summary>
8032 Bind UDP sockets to the clockspeed port.
8033 </summary>
8034 @@ -19962,7 +20046,7 @@ Domain allowed access.
8035 </param>
8036 <infoflow type="none"/>
8037 </interface>
8038 -<interface name="corenet_tcp_connect_clockspeed_port" lineno="15599">
8039 +<interface name="corenet_tcp_connect_clockspeed_port" lineno="15617">
8040 <summary>
8041 Make a TCP connection to the clockspeed port.
8042 </summary>
8043 @@ -19972,7 +20056,7 @@ Domain allowed access.
8044 </summary>
8045 </param>
8046 </interface>
8047 -<interface name="corenet_send_clockspeed_client_packets" lineno="15619">
8048 +<interface name="corenet_send_clockspeed_client_packets" lineno="15637">
8049 <summary>
8050 Send clockspeed_client packets.
8051 </summary>
8052 @@ -19983,7 +20067,7 @@ Domain allowed access.
8053 </param>
8054 <infoflow type="write" weight="10"/>
8055 </interface>
8056 -<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="15638">
8057 +<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="15656">
8058 <summary>
8059 Do not audit attempts to send clockspeed_client packets.
8060 </summary>
8061 @@ -19994,7 +20078,7 @@ Domain to not audit.
8062 </param>
8063 <infoflow type="none"/>
8064 </interface>
8065 -<interface name="corenet_receive_clockspeed_client_packets" lineno="15657">
8066 +<interface name="corenet_receive_clockspeed_client_packets" lineno="15675">
8067 <summary>
8068 Receive clockspeed_client packets.
8069 </summary>
8070 @@ -20005,7 +20089,7 @@ Domain allowed access.
8071 </param>
8072 <infoflow type="read" weight="10"/>
8073 </interface>
8074 -<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="15676">
8075 +<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="15694">
8076 <summary>
8077 Do not audit attempts to receive clockspeed_client packets.
8078 </summary>
8079 @@ -20016,7 +20100,7 @@ Domain allowed access.
8080 </param>
8081 <infoflow type="none"/>
8082 </interface>
8083 -<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="15695">
8084 +<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="15713">
8085 <summary>
8086 Send and receive clockspeed_client packets.
8087 </summary>
8088 @@ -20027,7 +20111,7 @@ Domain allowed access.
8089 </param>
8090 <infoflow type="both" weight="10"/>
8091 </interface>
8092 -<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="15711">
8093 +<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="15729">
8094 <summary>
8095 Do not audit attempts to send and receive clockspeed_client packets.
8096 </summary>
8097 @@ -20038,7 +20122,7 @@ Domain to not audit.
8098 </param>
8099 <infoflow type="none"/>
8100 </interface>
8101 -<interface name="corenet_relabelto_clockspeed_client_packets" lineno="15726">
8102 +<interface name="corenet_relabelto_clockspeed_client_packets" lineno="15744">
8103 <summary>
8104 Relabel packets to clockspeed_client the packet type.
8105 </summary>
8106 @@ -20048,7 +20132,7 @@ Domain allowed access.
8107 </summary>
8108 </param>
8109 </interface>
8110 -<interface name="corenet_send_clockspeed_server_packets" lineno="15746">
8111 +<interface name="corenet_send_clockspeed_server_packets" lineno="15764">
8112 <summary>
8113 Send clockspeed_server packets.
8114 </summary>
8115 @@ -20059,7 +20143,7 @@ Domain allowed access.
8116 </param>
8117 <infoflow type="write" weight="10"/>
8118 </interface>
8119 -<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="15765">
8120 +<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="15783">
8121 <summary>
8122 Do not audit attempts to send clockspeed_server packets.
8123 </summary>
8124 @@ -20070,7 +20154,7 @@ Domain to not audit.
8125 </param>
8126 <infoflow type="none"/>
8127 </interface>
8128 -<interface name="corenet_receive_clockspeed_server_packets" lineno="15784">
8129 +<interface name="corenet_receive_clockspeed_server_packets" lineno="15802">
8130 <summary>
8131 Receive clockspeed_server packets.
8132 </summary>
8133 @@ -20081,7 +20165,7 @@ Domain allowed access.
8134 </param>
8135 <infoflow type="read" weight="10"/>
8136 </interface>
8137 -<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="15803">
8138 +<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="15821">
8139 <summary>
8140 Do not audit attempts to receive clockspeed_server packets.
8141 </summary>
8142 @@ -20092,7 +20176,7 @@ Domain allowed access.
8143 </param>
8144 <infoflow type="none"/>
8145 </interface>
8146 -<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="15822">
8147 +<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="15840">
8148 <summary>
8149 Send and receive clockspeed_server packets.
8150 </summary>
8151 @@ -20103,7 +20187,7 @@ Domain allowed access.
8152 </param>
8153 <infoflow type="both" weight="10"/>
8154 </interface>
8155 -<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="15838">
8156 +<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="15856">
8157 <summary>
8158 Do not audit attempts to send and receive clockspeed_server packets.
8159 </summary>
8160 @@ -20114,7 +20198,7 @@ Domain to not audit.
8161 </param>
8162 <infoflow type="none"/>
8163 </interface>
8164 -<interface name="corenet_relabelto_clockspeed_server_packets" lineno="15853">
8165 +<interface name="corenet_relabelto_clockspeed_server_packets" lineno="15871">
8166 <summary>
8167 Relabel packets to clockspeed_server the packet type.
8168 </summary>
8169 @@ -20124,7 +20208,7 @@ Domain allowed access.
8170 </summary>
8171 </param>
8172 </interface>
8173 -<interface name="corenet_tcp_sendrecv_cluster_port" lineno="15875">
8174 +<interface name="corenet_tcp_sendrecv_cluster_port" lineno="15893">
8175 <summary>
8176 Send and receive TCP traffic on the cluster port.
8177 </summary>
8178 @@ -20135,7 +20219,7 @@ Domain allowed access.
8179 </param>
8180 <infoflow type="both" weight="10"/>
8181 </interface>
8182 -<interface name="corenet_udp_send_cluster_port" lineno="15890">
8183 +<interface name="corenet_udp_send_cluster_port" lineno="15908">
8184 <summary>
8185 Send UDP traffic on the cluster port.
8186 </summary>
8187 @@ -20146,7 +20230,7 @@ Domain allowed access.
8188 </param>
8189 <infoflow type="write" weight="10"/>
8190 </interface>
8191 -<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="15905">
8192 +<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="15923">
8193 <summary>
8194 Do not audit attempts to send UDP traffic on the cluster port.
8195 </summary>
8196 @@ -20157,7 +20241,7 @@ Domain to not audit.
8197 </param>
8198 <infoflow type="none"/>
8199 </interface>
8200 -<interface name="corenet_udp_receive_cluster_port" lineno="15920">
8201 +<interface name="corenet_udp_receive_cluster_port" lineno="15938">
8202 <summary>
8203 Receive UDP traffic on the cluster port.
8204 </summary>
8205 @@ -20168,7 +20252,7 @@ Domain allowed access.
8206 </param>
8207 <infoflow type="read" weight="10"/>
8208 </interface>
8209 -<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="15935">
8210 +<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="15953">
8211 <summary>
8212 Do not audit attempts to receive UDP traffic on the cluster port.
8213 </summary>
8214 @@ -20179,7 +20263,7 @@ Domain to not audit.
8215 </param>
8216 <infoflow type="none"/>
8217 </interface>
8218 -<interface name="corenet_udp_sendrecv_cluster_port" lineno="15950">
8219 +<interface name="corenet_udp_sendrecv_cluster_port" lineno="15968">
8220 <summary>
8221 Send and receive UDP traffic on the cluster port.
8222 </summary>
8223 @@ -20190,7 +20274,7 @@ Domain allowed access.
8224 </param>
8225 <infoflow type="both" weight="10"/>
8226 </interface>
8227 -<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="15966">
8228 +<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="15984">
8229 <summary>
8230 Do not audit attempts to send and receive
8231 UDP traffic on the cluster port.
8232 @@ -20202,7 +20286,7 @@ Domain to not audit.
8233 </param>
8234 <infoflow type="none"/>
8235 </interface>
8236 -<interface name="corenet_tcp_bind_cluster_port" lineno="15981">
8237 +<interface name="corenet_tcp_bind_cluster_port" lineno="15999">
8238 <summary>
8239 Bind TCP sockets to the cluster port.
8240 </summary>
8241 @@ -20213,7 +20297,7 @@ Domain allowed access.
8242 </param>
8243 <infoflow type="none"/>
8244 </interface>
8245 -<interface name="corenet_udp_bind_cluster_port" lineno="16001">
8246 +<interface name="corenet_udp_bind_cluster_port" lineno="16019">
8247 <summary>
8248 Bind UDP sockets to the cluster port.
8249 </summary>
8250 @@ -20224,7 +20308,7 @@ Domain allowed access.
8251 </param>
8252 <infoflow type="none"/>
8253 </interface>
8254 -<interface name="corenet_tcp_connect_cluster_port" lineno="16020">
8255 +<interface name="corenet_tcp_connect_cluster_port" lineno="16038">
8256 <summary>
8257 Make a TCP connection to the cluster port.
8258 </summary>
8259 @@ -20234,7 +20318,7 @@ Domain allowed access.
8260 </summary>
8261 </param>
8262 </interface>
8263 -<interface name="corenet_send_cluster_client_packets" lineno="16040">
8264 +<interface name="corenet_send_cluster_client_packets" lineno="16058">
8265 <summary>
8266 Send cluster_client packets.
8267 </summary>
8268 @@ -20245,7 +20329,7 @@ Domain allowed access.
8269 </param>
8270 <infoflow type="write" weight="10"/>
8271 </interface>
8272 -<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="16059">
8273 +<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="16077">
8274 <summary>
8275 Do not audit attempts to send cluster_client packets.
8276 </summary>
8277 @@ -20256,7 +20340,7 @@ Domain to not audit.
8278 </param>
8279 <infoflow type="none"/>
8280 </interface>
8281 -<interface name="corenet_receive_cluster_client_packets" lineno="16078">
8282 +<interface name="corenet_receive_cluster_client_packets" lineno="16096">
8283 <summary>
8284 Receive cluster_client packets.
8285 </summary>
8286 @@ -20267,7 +20351,7 @@ Domain allowed access.
8287 </param>
8288 <infoflow type="read" weight="10"/>
8289 </interface>
8290 -<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="16097">
8291 +<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="16115">
8292 <summary>
8293 Do not audit attempts to receive cluster_client packets.
8294 </summary>
8295 @@ -20278,7 +20362,7 @@ Domain allowed access.
8296 </param>
8297 <infoflow type="none"/>
8298 </interface>
8299 -<interface name="corenet_sendrecv_cluster_client_packets" lineno="16116">
8300 +<interface name="corenet_sendrecv_cluster_client_packets" lineno="16134">
8301 <summary>
8302 Send and receive cluster_client packets.
8303 </summary>
8304 @@ -20289,7 +20373,7 @@ Domain allowed access.
8305 </param>
8306 <infoflow type="both" weight="10"/>
8307 </interface>
8308 -<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="16132">
8309 +<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="16150">
8310 <summary>
8311 Do not audit attempts to send and receive cluster_client packets.
8312 </summary>
8313 @@ -20300,7 +20384,7 @@ Domain to not audit.
8314 </param>
8315 <infoflow type="none"/>
8316 </interface>
8317 -<interface name="corenet_relabelto_cluster_client_packets" lineno="16147">
8318 +<interface name="corenet_relabelto_cluster_client_packets" lineno="16165">
8319 <summary>
8320 Relabel packets to cluster_client the packet type.
8321 </summary>
8322 @@ -20310,7 +20394,7 @@ Domain allowed access.
8323 </summary>
8324 </param>
8325 </interface>
8326 -<interface name="corenet_send_cluster_server_packets" lineno="16167">
8327 +<interface name="corenet_send_cluster_server_packets" lineno="16185">
8328 <summary>
8329 Send cluster_server packets.
8330 </summary>
8331 @@ -20321,7 +20405,7 @@ Domain allowed access.
8332 </param>
8333 <infoflow type="write" weight="10"/>
8334 </interface>
8335 -<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="16186">
8336 +<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="16204">
8337 <summary>
8338 Do not audit attempts to send cluster_server packets.
8339 </summary>
8340 @@ -20332,7 +20416,7 @@ Domain to not audit.
8341 </param>
8342 <infoflow type="none"/>
8343 </interface>
8344 -<interface name="corenet_receive_cluster_server_packets" lineno="16205">
8345 +<interface name="corenet_receive_cluster_server_packets" lineno="16223">
8346 <summary>
8347 Receive cluster_server packets.
8348 </summary>
8349 @@ -20343,7 +20427,7 @@ Domain allowed access.
8350 </param>
8351 <infoflow type="read" weight="10"/>
8352 </interface>
8353 -<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="16224">
8354 +<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="16242">
8355 <summary>
8356 Do not audit attempts to receive cluster_server packets.
8357 </summary>
8358 @@ -20354,7 +20438,7 @@ Domain allowed access.
8359 </param>
8360 <infoflow type="none"/>
8361 </interface>
8362 -<interface name="corenet_sendrecv_cluster_server_packets" lineno="16243">
8363 +<interface name="corenet_sendrecv_cluster_server_packets" lineno="16261">
8364 <summary>
8365 Send and receive cluster_server packets.
8366 </summary>
8367 @@ -20365,7 +20449,7 @@ Domain allowed access.
8368 </param>
8369 <infoflow type="both" weight="10"/>
8370 </interface>
8371 -<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="16259">
8372 +<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="16277">
8373 <summary>
8374 Do not audit attempts to send and receive cluster_server packets.
8375 </summary>
8376 @@ -20376,7 +20460,7 @@ Domain to not audit.
8377 </param>
8378 <infoflow type="none"/>
8379 </interface>
8380 -<interface name="corenet_relabelto_cluster_server_packets" lineno="16274">
8381 +<interface name="corenet_relabelto_cluster_server_packets" lineno="16292">
8382 <summary>
8383 Relabel packets to cluster_server the packet type.
8384 </summary>
8385 @@ -20386,7 +20470,7 @@ Domain allowed access.
8386 </summary>
8387 </param>
8388 </interface>
8389 -<interface name="corenet_tcp_sendrecv_cma_port" lineno="16296">
8390 +<interface name="corenet_tcp_sendrecv_cma_port" lineno="16314">
8391 <summary>
8392 Send and receive TCP traffic on the cma port.
8393 </summary>
8394 @@ -20397,7 +20481,7 @@ Domain allowed access.
8395 </param>
8396 <infoflow type="both" weight="10"/>
8397 </interface>
8398 -<interface name="corenet_udp_send_cma_port" lineno="16311">
8399 +<interface name="corenet_udp_send_cma_port" lineno="16329">
8400 <summary>
8401 Send UDP traffic on the cma port.
8402 </summary>
8403 @@ -20408,7 +20492,7 @@ Domain allowed access.
8404 </param>
8405 <infoflow type="write" weight="10"/>
8406 </interface>
8407 -<interface name="corenet_dontaudit_udp_send_cma_port" lineno="16326">
8408 +<interface name="corenet_dontaudit_udp_send_cma_port" lineno="16344">
8409 <summary>
8410 Do not audit attempts to send UDP traffic on the cma port.
8411 </summary>
8412 @@ -20419,7 +20503,7 @@ Domain to not audit.
8413 </param>
8414 <infoflow type="none"/>
8415 </interface>
8416 -<interface name="corenet_udp_receive_cma_port" lineno="16341">
8417 +<interface name="corenet_udp_receive_cma_port" lineno="16359">
8418 <summary>
8419 Receive UDP traffic on the cma port.
8420 </summary>
8421 @@ -20430,7 +20514,7 @@ Domain allowed access.
8422 </param>
8423 <infoflow type="read" weight="10"/>
8424 </interface>
8425 -<interface name="corenet_dontaudit_udp_receive_cma_port" lineno="16356">
8426 +<interface name="corenet_dontaudit_udp_receive_cma_port" lineno="16374">
8427 <summary>
8428 Do not audit attempts to receive UDP traffic on the cma port.
8429 </summary>
8430 @@ -20441,7 +20525,7 @@ Domain to not audit.
8431 </param>
8432 <infoflow type="none"/>
8433 </interface>
8434 -<interface name="corenet_udp_sendrecv_cma_port" lineno="16371">
8435 +<interface name="corenet_udp_sendrecv_cma_port" lineno="16389">
8436 <summary>
8437 Send and receive UDP traffic on the cma port.
8438 </summary>
8439 @@ -20452,7 +20536,7 @@ Domain allowed access.
8440 </param>
8441 <infoflow type="both" weight="10"/>
8442 </interface>
8443 -<interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="16387">
8444 +<interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="16405">
8445 <summary>
8446 Do not audit attempts to send and receive
8447 UDP traffic on the cma port.
8448 @@ -20464,7 +20548,7 @@ Domain to not audit.
8449 </param>
8450 <infoflow type="none"/>
8451 </interface>
8452 -<interface name="corenet_tcp_bind_cma_port" lineno="16402">
8453 +<interface name="corenet_tcp_bind_cma_port" lineno="16420">
8454 <summary>
8455 Bind TCP sockets to the cma port.
8456 </summary>
8457 @@ -20475,7 +20559,7 @@ Domain allowed access.
8458 </param>
8459 <infoflow type="none"/>
8460 </interface>
8461 -<interface name="corenet_udp_bind_cma_port" lineno="16422">
8462 +<interface name="corenet_udp_bind_cma_port" lineno="16440">
8463 <summary>
8464 Bind UDP sockets to the cma port.
8465 </summary>
8466 @@ -20486,7 +20570,7 @@ Domain allowed access.
8467 </param>
8468 <infoflow type="none"/>
8469 </interface>
8470 -<interface name="corenet_tcp_connect_cma_port" lineno="16441">
8471 +<interface name="corenet_tcp_connect_cma_port" lineno="16459">
8472 <summary>
8473 Make a TCP connection to the cma port.
8474 </summary>
8475 @@ -20496,7 +20580,7 @@ Domain allowed access.
8476 </summary>
8477 </param>
8478 </interface>
8479 -<interface name="corenet_send_cma_client_packets" lineno="16461">
8480 +<interface name="corenet_send_cma_client_packets" lineno="16479">
8481 <summary>
8482 Send cma_client packets.
8483 </summary>
8484 @@ -20507,7 +20591,7 @@ Domain allowed access.
8485 </param>
8486 <infoflow type="write" weight="10"/>
8487 </interface>
8488 -<interface name="corenet_dontaudit_send_cma_client_packets" lineno="16480">
8489 +<interface name="corenet_dontaudit_send_cma_client_packets" lineno="16498">
8490 <summary>
8491 Do not audit attempts to send cma_client packets.
8492 </summary>
8493 @@ -20518,7 +20602,7 @@ Domain to not audit.
8494 </param>
8495 <infoflow type="none"/>
8496 </interface>
8497 -<interface name="corenet_receive_cma_client_packets" lineno="16499">
8498 +<interface name="corenet_receive_cma_client_packets" lineno="16517">
8499 <summary>
8500 Receive cma_client packets.
8501 </summary>
8502 @@ -20529,7 +20613,7 @@ Domain allowed access.
8503 </param>
8504 <infoflow type="read" weight="10"/>
8505 </interface>
8506 -<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="16518">
8507 +<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="16536">
8508 <summary>
8509 Do not audit attempts to receive cma_client packets.
8510 </summary>
8511 @@ -20540,7 +20624,7 @@ Domain allowed access.
8512 </param>
8513 <infoflow type="none"/>
8514 </interface>
8515 -<interface name="corenet_sendrecv_cma_client_packets" lineno="16537">
8516 +<interface name="corenet_sendrecv_cma_client_packets" lineno="16555">
8517 <summary>
8518 Send and receive cma_client packets.
8519 </summary>
8520 @@ -20551,7 +20635,7 @@ Domain allowed access.
8521 </param>
8522 <infoflow type="both" weight="10"/>
8523 </interface>
8524 -<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="16553">
8525 +<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="16571">
8526 <summary>
8527 Do not audit attempts to send and receive cma_client packets.
8528 </summary>
8529 @@ -20562,7 +20646,7 @@ Domain to not audit.
8530 </param>
8531 <infoflow type="none"/>
8532 </interface>
8533 -<interface name="corenet_relabelto_cma_client_packets" lineno="16568">
8534 +<interface name="corenet_relabelto_cma_client_packets" lineno="16586">
8535 <summary>
8536 Relabel packets to cma_client the packet type.
8537 </summary>
8538 @@ -20572,7 +20656,7 @@ Domain allowed access.
8539 </summary>
8540 </param>
8541 </interface>
8542 -<interface name="corenet_send_cma_server_packets" lineno="16588">
8543 +<interface name="corenet_send_cma_server_packets" lineno="16606">
8544 <summary>
8545 Send cma_server packets.
8546 </summary>
8547 @@ -20583,7 +20667,7 @@ Domain allowed access.
8548 </param>
8549 <infoflow type="write" weight="10"/>
8550 </interface>
8551 -<interface name="corenet_dontaudit_send_cma_server_packets" lineno="16607">
8552 +<interface name="corenet_dontaudit_send_cma_server_packets" lineno="16625">
8553 <summary>
8554 Do not audit attempts to send cma_server packets.
8555 </summary>
8556 @@ -20594,7 +20678,7 @@ Domain to not audit.
8557 </param>
8558 <infoflow type="none"/>
8559 </interface>
8560 -<interface name="corenet_receive_cma_server_packets" lineno="16626">
8561 +<interface name="corenet_receive_cma_server_packets" lineno="16644">
8562 <summary>
8563 Receive cma_server packets.
8564 </summary>
8565 @@ -20605,7 +20689,7 @@ Domain allowed access.
8566 </param>
8567 <infoflow type="read" weight="10"/>
8568 </interface>
8569 -<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="16645">
8570 +<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="16663">
8571 <summary>
8572 Do not audit attempts to receive cma_server packets.
8573 </summary>
8574 @@ -20616,7 +20700,7 @@ Domain allowed access.
8575 </param>
8576 <infoflow type="none"/>
8577 </interface>
8578 -<interface name="corenet_sendrecv_cma_server_packets" lineno="16664">
8579 +<interface name="corenet_sendrecv_cma_server_packets" lineno="16682">
8580 <summary>
8581 Send and receive cma_server packets.
8582 </summary>
8583 @@ -20627,7 +20711,7 @@ Domain allowed access.
8584 </param>
8585 <infoflow type="both" weight="10"/>
8586 </interface>
8587 -<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="16680">
8588 +<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="16698">
8589 <summary>
8590 Do not audit attempts to send and receive cma_server packets.
8591 </summary>
8592 @@ -20638,7 +20722,7 @@ Domain to not audit.
8593 </param>
8594 <infoflow type="none"/>
8595 </interface>
8596 -<interface name="corenet_relabelto_cma_server_packets" lineno="16695">
8597 +<interface name="corenet_relabelto_cma_server_packets" lineno="16713">
8598 <summary>
8599 Relabel packets to cma_server the packet type.
8600 </summary>
8601 @@ -20648,7 +20732,7 @@ Domain allowed access.
8602 </summary>
8603 </param>
8604 </interface>
8605 -<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="16717">
8606 +<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="16735">
8607 <summary>
8608 Send and receive TCP traffic on the cobbler port.
8609 </summary>
8610 @@ -20659,7 +20743,7 @@ Domain allowed access.
8611 </param>
8612 <infoflow type="both" weight="10"/>
8613 </interface>
8614 -<interface name="corenet_udp_send_cobbler_port" lineno="16732">
8615 +<interface name="corenet_udp_send_cobbler_port" lineno="16750">
8616 <summary>
8617 Send UDP traffic on the cobbler port.
8618 </summary>
8619 @@ -20670,7 +20754,7 @@ Domain allowed access.
8620 </param>
8621 <infoflow type="write" weight="10"/>
8622 </interface>
8623 -<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="16747">
8624 +<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="16765">
8625 <summary>
8626 Do not audit attempts to send UDP traffic on the cobbler port.
8627 </summary>
8628 @@ -20681,7 +20765,7 @@ Domain to not audit.
8629 </param>
8630 <infoflow type="none"/>
8631 </interface>
8632 -<interface name="corenet_udp_receive_cobbler_port" lineno="16762">
8633 +<interface name="corenet_udp_receive_cobbler_port" lineno="16780">
8634 <summary>
8635 Receive UDP traffic on the cobbler port.
8636 </summary>
8637 @@ -20692,7 +20776,7 @@ Domain allowed access.
8638 </param>
8639 <infoflow type="read" weight="10"/>
8640 </interface>
8641 -<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="16777">
8642 +<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="16795">
8643 <summary>
8644 Do not audit attempts to receive UDP traffic on the cobbler port.
8645 </summary>
8646 @@ -20703,7 +20787,7 @@ Domain to not audit.
8647 </param>
8648 <infoflow type="none"/>
8649 </interface>
8650 -<interface name="corenet_udp_sendrecv_cobbler_port" lineno="16792">
8651 +<interface name="corenet_udp_sendrecv_cobbler_port" lineno="16810">
8652 <summary>
8653 Send and receive UDP traffic on the cobbler port.
8654 </summary>
8655 @@ -20714,7 +20798,7 @@ Domain allowed access.
8656 </param>
8657 <infoflow type="both" weight="10"/>
8658 </interface>
8659 -<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="16808">
8660 +<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="16826">
8661 <summary>
8662 Do not audit attempts to send and receive
8663 UDP traffic on the cobbler port.
8664 @@ -20726,7 +20810,7 @@ Domain to not audit.
8665 </param>
8666 <infoflow type="none"/>
8667 </interface>
8668 -<interface name="corenet_tcp_bind_cobbler_port" lineno="16823">
8669 +<interface name="corenet_tcp_bind_cobbler_port" lineno="16841">
8670 <summary>
8671 Bind TCP sockets to the cobbler port.
8672 </summary>
8673 @@ -20737,7 +20821,7 @@ Domain allowed access.
8674 </param>
8675 <infoflow type="none"/>
8676 </interface>
8677 -<interface name="corenet_udp_bind_cobbler_port" lineno="16843">
8678 +<interface name="corenet_udp_bind_cobbler_port" lineno="16861">
8679 <summary>
8680 Bind UDP sockets to the cobbler port.
8681 </summary>
8682 @@ -20748,7 +20832,7 @@ Domain allowed access.
8683 </param>
8684 <infoflow type="none"/>
8685 </interface>
8686 -<interface name="corenet_tcp_connect_cobbler_port" lineno="16862">
8687 +<interface name="corenet_tcp_connect_cobbler_port" lineno="16880">
8688 <summary>
8689 Make a TCP connection to the cobbler port.
8690 </summary>
8691 @@ -20758,7 +20842,7 @@ Domain allowed access.
8692 </summary>
8693 </param>
8694 </interface>
8695 -<interface name="corenet_send_cobbler_client_packets" lineno="16882">
8696 +<interface name="corenet_send_cobbler_client_packets" lineno="16900">
8697 <summary>
8698 Send cobbler_client packets.
8699 </summary>
8700 @@ -20769,7 +20853,7 @@ Domain allowed access.
8701 </param>
8702 <infoflow type="write" weight="10"/>
8703 </interface>
8704 -<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="16901">
8705 +<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="16919">
8706 <summary>
8707 Do not audit attempts to send cobbler_client packets.
8708 </summary>
8709 @@ -20780,7 +20864,7 @@ Domain to not audit.
8710 </param>
8711 <infoflow type="none"/>
8712 </interface>
8713 -<interface name="corenet_receive_cobbler_client_packets" lineno="16920">
8714 +<interface name="corenet_receive_cobbler_client_packets" lineno="16938">
8715 <summary>
8716 Receive cobbler_client packets.
8717 </summary>
8718 @@ -20791,7 +20875,7 @@ Domain allowed access.
8719 </param>
8720 <infoflow type="read" weight="10"/>
8721 </interface>
8722 -<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="16939">
8723 +<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="16957">
8724 <summary>
8725 Do not audit attempts to receive cobbler_client packets.
8726 </summary>
8727 @@ -20802,7 +20886,7 @@ Domain allowed access.
8728 </param>
8729 <infoflow type="none"/>
8730 </interface>
8731 -<interface name="corenet_sendrecv_cobbler_client_packets" lineno="16958">
8732 +<interface name="corenet_sendrecv_cobbler_client_packets" lineno="16976">
8733 <summary>
8734 Send and receive cobbler_client packets.
8735 </summary>
8736 @@ -20813,7 +20897,7 @@ Domain allowed access.
8737 </param>
8738 <infoflow type="both" weight="10"/>
8739 </interface>
8740 -<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="16974">
8741 +<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="16992">
8742 <summary>
8743 Do not audit attempts to send and receive cobbler_client packets.
8744 </summary>
8745 @@ -20824,7 +20908,7 @@ Domain to not audit.
8746 </param>
8747 <infoflow type="none"/>
8748 </interface>
8749 -<interface name="corenet_relabelto_cobbler_client_packets" lineno="16989">
8750 +<interface name="corenet_relabelto_cobbler_client_packets" lineno="17007">
8751 <summary>
8752 Relabel packets to cobbler_client the packet type.
8753 </summary>
8754 @@ -20834,7 +20918,7 @@ Domain allowed access.
8755 </summary>
8756 </param>
8757 </interface>
8758 -<interface name="corenet_send_cobbler_server_packets" lineno="17009">
8759 +<interface name="corenet_send_cobbler_server_packets" lineno="17027">
8760 <summary>
8761 Send cobbler_server packets.
8762 </summary>
8763 @@ -20845,7 +20929,7 @@ Domain allowed access.
8764 </param>
8765 <infoflow type="write" weight="10"/>
8766 </interface>
8767 -<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="17028">
8768 +<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="17046">
8769 <summary>
8770 Do not audit attempts to send cobbler_server packets.
8771 </summary>
8772 @@ -20856,7 +20940,7 @@ Domain to not audit.
8773 </param>
8774 <infoflow type="none"/>
8775 </interface>
8776 -<interface name="corenet_receive_cobbler_server_packets" lineno="17047">
8777 +<interface name="corenet_receive_cobbler_server_packets" lineno="17065">
8778 <summary>
8779 Receive cobbler_server packets.
8780 </summary>
8781 @@ -20867,7 +20951,7 @@ Domain allowed access.
8782 </param>
8783 <infoflow type="read" weight="10"/>
8784 </interface>
8785 -<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="17066">
8786 +<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="17084">
8787 <summary>
8788 Do not audit attempts to receive cobbler_server packets.
8789 </summary>
8790 @@ -20878,7 +20962,7 @@ Domain allowed access.
8791 </param>
8792 <infoflow type="none"/>
8793 </interface>
8794 -<interface name="corenet_sendrecv_cobbler_server_packets" lineno="17085">
8795 +<interface name="corenet_sendrecv_cobbler_server_packets" lineno="17103">
8796 <summary>
8797 Send and receive cobbler_server packets.
8798 </summary>
8799 @@ -20889,7 +20973,7 @@ Domain allowed access.
8800 </param>
8801 <infoflow type="both" weight="10"/>
8802 </interface>
8803 -<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="17101">
8804 +<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="17119">
8805 <summary>
8806 Do not audit attempts to send and receive cobbler_server packets.
8807 </summary>
8808 @@ -20900,7 +20984,7 @@ Domain to not audit.
8809 </param>
8810 <infoflow type="none"/>
8811 </interface>
8812 -<interface name="corenet_relabelto_cobbler_server_packets" lineno="17116">
8813 +<interface name="corenet_relabelto_cobbler_server_packets" lineno="17134">
8814 <summary>
8815 Relabel packets to cobbler_server the packet type.
8816 </summary>
8817 @@ -20910,7 +20994,7 @@ Domain allowed access.
8818 </summary>
8819 </param>
8820 </interface>
8821 -<interface name="corenet_tcp_sendrecv_commplex_link_port" lineno="17138">
8822 +<interface name="corenet_tcp_sendrecv_commplex_link_port" lineno="17156">
8823 <summary>
8824 Send and receive TCP traffic on the commplex_link port.
8825 </summary>
8826 @@ -20921,7 +21005,7 @@ Domain allowed access.
8827 </param>
8828 <infoflow type="both" weight="10"/>
8829 </interface>
8830 -<interface name="corenet_udp_send_commplex_link_port" lineno="17153">
8831 +<interface name="corenet_udp_send_commplex_link_port" lineno="17171">
8832 <summary>
8833 Send UDP traffic on the commplex_link port.
8834 </summary>
8835 @@ -20932,7 +21016,7 @@ Domain allowed access.
8836 </param>
8837 <infoflow type="write" weight="10"/>
8838 </interface>
8839 -<interface name="corenet_dontaudit_udp_send_commplex_link_port" lineno="17168">
8840 +<interface name="corenet_dontaudit_udp_send_commplex_link_port" lineno="17186">
8841 <summary>
8842 Do not audit attempts to send UDP traffic on the commplex_link port.
8843 </summary>
8844 @@ -20943,7 +21027,7 @@ Domain to not audit.
8845 </param>
8846 <infoflow type="none"/>
8847 </interface>
8848 -<interface name="corenet_udp_receive_commplex_link_port" lineno="17183">
8849 +<interface name="corenet_udp_receive_commplex_link_port" lineno="17201">
8850 <summary>
8851 Receive UDP traffic on the commplex_link port.
8852 </summary>
8853 @@ -20954,7 +21038,7 @@ Domain allowed access.
8854 </param>
8855 <infoflow type="read" weight="10"/>
8856 </interface>
8857 -<interface name="corenet_dontaudit_udp_receive_commplex_link_port" lineno="17198">
8858 +<interface name="corenet_dontaudit_udp_receive_commplex_link_port" lineno="17216">
8859 <summary>
8860 Do not audit attempts to receive UDP traffic on the commplex_link port.
8861 </summary>
8862 @@ -20965,7 +21049,7 @@ Domain to not audit.
8863 </param>
8864 <infoflow type="none"/>
8865 </interface>
8866 -<interface name="corenet_udp_sendrecv_commplex_link_port" lineno="17213">
8867 +<interface name="corenet_udp_sendrecv_commplex_link_port" lineno="17231">
8868 <summary>
8869 Send and receive UDP traffic on the commplex_link port.
8870 </summary>
8871 @@ -20976,7 +21060,7 @@ Domain allowed access.
8872 </param>
8873 <infoflow type="both" weight="10"/>
8874 </interface>
8875 -<interface name="corenet_dontaudit_udp_sendrecv_commplex_link_port" lineno="17229">
8876 +<interface name="corenet_dontaudit_udp_sendrecv_commplex_link_port" lineno="17247">
8877 <summary>
8878 Do not audit attempts to send and receive
8879 UDP traffic on the commplex_link port.
8880 @@ -20988,7 +21072,7 @@ Domain to not audit.
8881 </param>
8882 <infoflow type="none"/>
8883 </interface>
8884 -<interface name="corenet_tcp_bind_commplex_link_port" lineno="17244">
8885 +<interface name="corenet_tcp_bind_commplex_link_port" lineno="17262">
8886 <summary>
8887 Bind TCP sockets to the commplex_link port.
8888 </summary>
8889 @@ -20999,7 +21083,7 @@ Domain allowed access.
8890 </param>
8891 <infoflow type="none"/>
8892 </interface>
8893 -<interface name="corenet_udp_bind_commplex_link_port" lineno="17264">
8894 +<interface name="corenet_udp_bind_commplex_link_port" lineno="17282">
8895 <summary>
8896 Bind UDP sockets to the commplex_link port.
8897 </summary>
8898 @@ -21010,7 +21094,7 @@ Domain allowed access.
8899 </param>
8900 <infoflow type="none"/>
8901 </interface>
8902 -<interface name="corenet_tcp_connect_commplex_link_port" lineno="17283">
8903 +<interface name="corenet_tcp_connect_commplex_link_port" lineno="17301">
8904 <summary>
8905 Make a TCP connection to the commplex_link port.
8906 </summary>
8907 @@ -21020,7 +21104,7 @@ Domain allowed access.
8908 </summary>
8909 </param>
8910 </interface>
8911 -<interface name="corenet_send_commplex_link_client_packets" lineno="17303">
8912 +<interface name="corenet_send_commplex_link_client_packets" lineno="17321">
8913 <summary>
8914 Send commplex_link_client packets.
8915 </summary>
8916 @@ -21031,7 +21115,7 @@ Domain allowed access.
8917 </param>
8918 <infoflow type="write" weight="10"/>
8919 </interface>
8920 -<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="17322">
8921 +<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="17340">
8922 <summary>
8923 Do not audit attempts to send commplex_link_client packets.
8924 </summary>
8925 @@ -21042,7 +21126,7 @@ Domain to not audit.
8926 </param>
8927 <infoflow type="none"/>
8928 </interface>
8929 -<interface name="corenet_receive_commplex_link_client_packets" lineno="17341">
8930 +<interface name="corenet_receive_commplex_link_client_packets" lineno="17359">
8931 <summary>
8932 Receive commplex_link_client packets.
8933 </summary>
8934 @@ -21053,7 +21137,7 @@ Domain allowed access.
8935 </param>
8936 <infoflow type="read" weight="10"/>
8937 </interface>
8938 -<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="17360">
8939 +<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="17378">
8940 <summary>
8941 Do not audit attempts to receive commplex_link_client packets.
8942 </summary>
8943 @@ -21064,7 +21148,7 @@ Domain allowed access.
8944 </param>
8945 <infoflow type="none"/>
8946 </interface>
8947 -<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="17379">
8948 +<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="17397">
8949 <summary>
8950 Send and receive commplex_link_client packets.
8951 </summary>
8952 @@ -21075,7 +21159,7 @@ Domain allowed access.
8953 </param>
8954 <infoflow type="both" weight="10"/>
8955 </interface>
8956 -<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="17395">
8957 +<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="17413">
8958 <summary>
8959 Do not audit attempts to send and receive commplex_link_client packets.
8960 </summary>
8961 @@ -21086,7 +21170,7 @@ Domain to not audit.
8962 </param>
8963 <infoflow type="none"/>
8964 </interface>
8965 -<interface name="corenet_relabelto_commplex_link_client_packets" lineno="17410">
8966 +<interface name="corenet_relabelto_commplex_link_client_packets" lineno="17428">
8967 <summary>
8968 Relabel packets to commplex_link_client the packet type.
8969 </summary>
8970 @@ -21096,7 +21180,7 @@ Domain allowed access.
8971 </summary>
8972 </param>
8973 </interface>
8974 -<interface name="corenet_send_commplex_link_server_packets" lineno="17430">
8975 +<interface name="corenet_send_commplex_link_server_packets" lineno="17448">
8976 <summary>
8977 Send commplex_link_server packets.
8978 </summary>
8979 @@ -21107,7 +21191,7 @@ Domain allowed access.
8980 </param>
8981 <infoflow type="write" weight="10"/>
8982 </interface>
8983 -<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="17449">
8984 +<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="17467">
8985 <summary>
8986 Do not audit attempts to send commplex_link_server packets.
8987 </summary>
8988 @@ -21118,7 +21202,7 @@ Domain to not audit.
8989 </param>
8990 <infoflow type="none"/>
8991 </interface>
8992 -<interface name="corenet_receive_commplex_link_server_packets" lineno="17468">
8993 +<interface name="corenet_receive_commplex_link_server_packets" lineno="17486">
8994 <summary>
8995 Receive commplex_link_server packets.
8996 </summary>
8997 @@ -21129,7 +21213,7 @@ Domain allowed access.
8998 </param>
8999 <infoflow type="read" weight="10"/>
9000 </interface>
9001 -<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="17487">
9002 +<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="17505">
9003 <summary>
9004 Do not audit attempts to receive commplex_link_server packets.
9005 </summary>
9006 @@ -21140,7 +21224,7 @@ Domain allowed access.
9007 </param>
9008 <infoflow type="none"/>
9009 </interface>
9010 -<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="17506">
9011 +<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="17524">
9012 <summary>
9013 Send and receive commplex_link_server packets.
9014 </summary>
9015 @@ -21151,7 +21235,7 @@ Domain allowed access.
9016 </param>
9017 <infoflow type="both" weight="10"/>
9018 </interface>
9019 -<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="17522">
9020 +<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="17540">
9021 <summary>
9022 Do not audit attempts to send and receive commplex_link_server packets.
9023 </summary>
9024 @@ -21162,7 +21246,7 @@ Domain to not audit.
9025 </param>
9026 <infoflow type="none"/>
9027 </interface>
9028 -<interface name="corenet_relabelto_commplex_link_server_packets" lineno="17537">
9029 +<interface name="corenet_relabelto_commplex_link_server_packets" lineno="17555">
9030 <summary>
9031 Relabel packets to commplex_link_server the packet type.
9032 </summary>
9033 @@ -21172,7 +21256,7 @@ Domain allowed access.
9034 </summary>
9035 </param>
9036 </interface>
9037 -<interface name="corenet_tcp_sendrecv_commplex_main_port" lineno="17559">
9038 +<interface name="corenet_tcp_sendrecv_commplex_main_port" lineno="17577">
9039 <summary>
9040 Send and receive TCP traffic on the commplex_main port.
9041 </summary>
9042 @@ -21183,7 +21267,7 @@ Domain allowed access.
9043 </param>
9044 <infoflow type="both" weight="10"/>
9045 </interface>
9046 -<interface name="corenet_udp_send_commplex_main_port" lineno="17574">
9047 +<interface name="corenet_udp_send_commplex_main_port" lineno="17592">
9048 <summary>
9049 Send UDP traffic on the commplex_main port.
9050 </summary>
9051 @@ -21194,7 +21278,7 @@ Domain allowed access.
9052 </param>
9053 <infoflow type="write" weight="10"/>
9054 </interface>
9055 -<interface name="corenet_dontaudit_udp_send_commplex_main_port" lineno="17589">
9056 +<interface name="corenet_dontaudit_udp_send_commplex_main_port" lineno="17607">
9057 <summary>
9058 Do not audit attempts to send UDP traffic on the commplex_main port.
9059 </summary>
9060 @@ -21205,7 +21289,7 @@ Domain to not audit.
9061 </param>
9062 <infoflow type="none"/>
9063 </interface>
9064 -<interface name="corenet_udp_receive_commplex_main_port" lineno="17604">
9065 +<interface name="corenet_udp_receive_commplex_main_port" lineno="17622">
9066 <summary>
9067 Receive UDP traffic on the commplex_main port.
9068 </summary>
9069 @@ -21216,7 +21300,7 @@ Domain allowed access.
9070 </param>
9071 <infoflow type="read" weight="10"/>
9072 </interface>
9073 -<interface name="corenet_dontaudit_udp_receive_commplex_main_port" lineno="17619">
9074 +<interface name="corenet_dontaudit_udp_receive_commplex_main_port" lineno="17637">
9075 <summary>
9076 Do not audit attempts to receive UDP traffic on the commplex_main port.
9077 </summary>
9078 @@ -21227,7 +21311,7 @@ Domain to not audit.
9079 </param>
9080 <infoflow type="none"/>
9081 </interface>
9082 -<interface name="corenet_udp_sendrecv_commplex_main_port" lineno="17634">
9083 +<interface name="corenet_udp_sendrecv_commplex_main_port" lineno="17652">
9084 <summary>
9085 Send and receive UDP traffic on the commplex_main port.
9086 </summary>
9087 @@ -21238,7 +21322,7 @@ Domain allowed access.
9088 </param>
9089 <infoflow type="both" weight="10"/>
9090 </interface>
9091 -<interface name="corenet_dontaudit_udp_sendrecv_commplex_main_port" lineno="17650">
9092 +<interface name="corenet_dontaudit_udp_sendrecv_commplex_main_port" lineno="17668">
9093 <summary>
9094 Do not audit attempts to send and receive
9095 UDP traffic on the commplex_main port.
9096 @@ -21250,7 +21334,7 @@ Domain to not audit.
9097 </param>
9098 <infoflow type="none"/>
9099 </interface>
9100 -<interface name="corenet_tcp_bind_commplex_main_port" lineno="17665">
9101 +<interface name="corenet_tcp_bind_commplex_main_port" lineno="17683">
9102 <summary>
9103 Bind TCP sockets to the commplex_main port.
9104 </summary>
9105 @@ -21261,7 +21345,7 @@ Domain allowed access.
9106 </param>
9107 <infoflow type="none"/>
9108 </interface>
9109 -<interface name="corenet_udp_bind_commplex_main_port" lineno="17685">
9110 +<interface name="corenet_udp_bind_commplex_main_port" lineno="17703">
9111 <summary>
9112 Bind UDP sockets to the commplex_main port.
9113 </summary>
9114 @@ -21272,7 +21356,7 @@ Domain allowed access.
9115 </param>
9116 <infoflow type="none"/>
9117 </interface>
9118 -<interface name="corenet_tcp_connect_commplex_main_port" lineno="17704">
9119 +<interface name="corenet_tcp_connect_commplex_main_port" lineno="17722">
9120 <summary>
9121 Make a TCP connection to the commplex_main port.
9122 </summary>
9123 @@ -21282,7 +21366,7 @@ Domain allowed access.
9124 </summary>
9125 </param>
9126 </interface>
9127 -<interface name="corenet_send_commplex_main_client_packets" lineno="17724">
9128 +<interface name="corenet_send_commplex_main_client_packets" lineno="17742">
9129 <summary>
9130 Send commplex_main_client packets.
9131 </summary>
9132 @@ -21293,7 +21377,7 @@ Domain allowed access.
9133 </param>
9134 <infoflow type="write" weight="10"/>
9135 </interface>
9136 -<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="17743">
9137 +<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="17761">
9138 <summary>
9139 Do not audit attempts to send commplex_main_client packets.
9140 </summary>
9141 @@ -21304,7 +21388,7 @@ Domain to not audit.
9142 </param>
9143 <infoflow type="none"/>
9144 </interface>
9145 -<interface name="corenet_receive_commplex_main_client_packets" lineno="17762">
9146 +<interface name="corenet_receive_commplex_main_client_packets" lineno="17780">
9147 <summary>
9148 Receive commplex_main_client packets.
9149 </summary>
9150 @@ -21315,7 +21399,7 @@ Domain allowed access.
9151 </param>
9152 <infoflow type="read" weight="10"/>
9153 </interface>
9154 -<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="17781">
9155 +<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="17799">
9156 <summary>
9157 Do not audit attempts to receive commplex_main_client packets.
9158 </summary>
9159 @@ -21326,7 +21410,7 @@ Domain allowed access.
9160 </param>
9161 <infoflow type="none"/>
9162 </interface>
9163 -<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="17800">
9164 +<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="17818">
9165 <summary>
9166 Send and receive commplex_main_client packets.
9167 </summary>
9168 @@ -21337,7 +21421,7 @@ Domain allowed access.
9169 </param>
9170 <infoflow type="both" weight="10"/>
9171 </interface>
9172 -<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="17816">
9173 +<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="17834">
9174 <summary>
9175 Do not audit attempts to send and receive commplex_main_client packets.
9176 </summary>
9177 @@ -21348,7 +21432,7 @@ Domain to not audit.
9178 </param>
9179 <infoflow type="none"/>
9180 </interface>
9181 -<interface name="corenet_relabelto_commplex_main_client_packets" lineno="17831">
9182 +<interface name="corenet_relabelto_commplex_main_client_packets" lineno="17849">
9183 <summary>
9184 Relabel packets to commplex_main_client the packet type.
9185 </summary>
9186 @@ -21358,7 +21442,7 @@ Domain allowed access.
9187 </summary>
9188 </param>
9189 </interface>
9190 -<interface name="corenet_send_commplex_main_server_packets" lineno="17851">
9191 +<interface name="corenet_send_commplex_main_server_packets" lineno="17869">
9192 <summary>
9193 Send commplex_main_server packets.
9194 </summary>
9195 @@ -21369,7 +21453,7 @@ Domain allowed access.
9196 </param>
9197 <infoflow type="write" weight="10"/>
9198 </interface>
9199 -<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="17870">
9200 +<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="17888">
9201 <summary>
9202 Do not audit attempts to send commplex_main_server packets.
9203 </summary>
9204 @@ -21380,7 +21464,7 @@ Domain to not audit.
9205 </param>
9206 <infoflow type="none"/>
9207 </interface>
9208 -<interface name="corenet_receive_commplex_main_server_packets" lineno="17889">
9209 +<interface name="corenet_receive_commplex_main_server_packets" lineno="17907">
9210 <summary>
9211 Receive commplex_main_server packets.
9212 </summary>
9213 @@ -21391,7 +21475,7 @@ Domain allowed access.
9214 </param>
9215 <infoflow type="read" weight="10"/>
9216 </interface>
9217 -<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="17908">
9218 +<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="17926">
9219 <summary>
9220 Do not audit attempts to receive commplex_main_server packets.
9221 </summary>
9222 @@ -21402,7 +21486,7 @@ Domain allowed access.
9223 </param>
9224 <infoflow type="none"/>
9225 </interface>
9226 -<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="17927">
9227 +<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="17945">
9228 <summary>
9229 Send and receive commplex_main_server packets.
9230 </summary>
9231 @@ -21413,7 +21497,7 @@ Domain allowed access.
9232 </param>
9233 <infoflow type="both" weight="10"/>
9234 </interface>
9235 -<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="17943">
9236 +<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="17961">
9237 <summary>
9238 Do not audit attempts to send and receive commplex_main_server packets.
9239 </summary>
9240 @@ -21424,7 +21508,7 @@ Domain to not audit.
9241 </param>
9242 <infoflow type="none"/>
9243 </interface>
9244 -<interface name="corenet_relabelto_commplex_main_server_packets" lineno="17958">
9245 +<interface name="corenet_relabelto_commplex_main_server_packets" lineno="17976">
9246 <summary>
9247 Relabel packets to commplex_main_server the packet type.
9248 </summary>
9249 @@ -21434,7 +21518,7 @@ Domain allowed access.
9250 </summary>
9251 </param>
9252 </interface>
9253 -<interface name="corenet_tcp_sendrecv_comsat_port" lineno="17980">
9254 +<interface name="corenet_tcp_sendrecv_comsat_port" lineno="17998">
9255 <summary>
9256 Send and receive TCP traffic on the comsat port.
9257 </summary>
9258 @@ -21445,7 +21529,7 @@ Domain allowed access.
9259 </param>
9260 <infoflow type="both" weight="10"/>
9261 </interface>
9262 -<interface name="corenet_udp_send_comsat_port" lineno="17995">
9263 +<interface name="corenet_udp_send_comsat_port" lineno="18013">
9264 <summary>
9265 Send UDP traffic on the comsat port.
9266 </summary>
9267 @@ -21456,7 +21540,7 @@ Domain allowed access.
9268 </param>
9269 <infoflow type="write" weight="10"/>
9270 </interface>
9271 -<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="18010">
9272 +<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="18028">
9273 <summary>
9274 Do not audit attempts to send UDP traffic on the comsat port.
9275 </summary>
9276 @@ -21467,7 +21551,7 @@ Domain to not audit.
9277 </param>
9278 <infoflow type="none"/>
9279 </interface>
9280 -<interface name="corenet_udp_receive_comsat_port" lineno="18025">
9281 +<interface name="corenet_udp_receive_comsat_port" lineno="18043">
9282 <summary>
9283 Receive UDP traffic on the comsat port.
9284 </summary>
9285 @@ -21478,7 +21562,7 @@ Domain allowed access.
9286 </param>
9287 <infoflow type="read" weight="10"/>
9288 </interface>
9289 -<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="18040">
9290 +<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="18058">
9291 <summary>
9292 Do not audit attempts to receive UDP traffic on the comsat port.
9293 </summary>
9294 @@ -21489,7 +21573,7 @@ Domain to not audit.
9295 </param>
9296 <infoflow type="none"/>
9297 </interface>
9298 -<interface name="corenet_udp_sendrecv_comsat_port" lineno="18055">
9299 +<interface name="corenet_udp_sendrecv_comsat_port" lineno="18073">
9300 <summary>
9301 Send and receive UDP traffic on the comsat port.
9302 </summary>
9303 @@ -21500,7 +21584,7 @@ Domain allowed access.
9304 </param>
9305 <infoflow type="both" weight="10"/>
9306 </interface>
9307 -<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="18071">
9308 +<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="18089">
9309 <summary>
9310 Do not audit attempts to send and receive
9311 UDP traffic on the comsat port.
9312 @@ -21512,7 +21596,7 @@ Domain to not audit.
9313 </param>
9314 <infoflow type="none"/>
9315 </interface>
9316 -<interface name="corenet_tcp_bind_comsat_port" lineno="18086">
9317 +<interface name="corenet_tcp_bind_comsat_port" lineno="18104">
9318 <summary>
9319 Bind TCP sockets to the comsat port.
9320 </summary>
9321 @@ -21523,7 +21607,7 @@ Domain allowed access.
9322 </param>
9323 <infoflow type="none"/>
9324 </interface>
9325 -<interface name="corenet_udp_bind_comsat_port" lineno="18106">
9326 +<interface name="corenet_udp_bind_comsat_port" lineno="18124">
9327 <summary>
9328 Bind UDP sockets to the comsat port.
9329 </summary>
9330 @@ -21534,7 +21618,7 @@ Domain allowed access.
9331 </param>
9332 <infoflow type="none"/>
9333 </interface>
9334 -<interface name="corenet_tcp_connect_comsat_port" lineno="18125">
9335 +<interface name="corenet_tcp_connect_comsat_port" lineno="18143">
9336 <summary>
9337 Make a TCP connection to the comsat port.
9338 </summary>
9339 @@ -21544,7 +21628,7 @@ Domain allowed access.
9340 </summary>
9341 </param>
9342 </interface>
9343 -<interface name="corenet_send_comsat_client_packets" lineno="18145">
9344 +<interface name="corenet_send_comsat_client_packets" lineno="18163">
9345 <summary>
9346 Send comsat_client packets.
9347 </summary>
9348 @@ -21555,7 +21639,7 @@ Domain allowed access.
9349 </param>
9350 <infoflow type="write" weight="10"/>
9351 </interface>
9352 -<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="18164">
9353 +<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="18182">
9354 <summary>
9355 Do not audit attempts to send comsat_client packets.
9356 </summary>
9357 @@ -21566,7 +21650,7 @@ Domain to not audit.
9358 </param>
9359 <infoflow type="none"/>
9360 </interface>
9361 -<interface name="corenet_receive_comsat_client_packets" lineno="18183">
9362 +<interface name="corenet_receive_comsat_client_packets" lineno="18201">
9363 <summary>
9364 Receive comsat_client packets.
9365 </summary>
9366 @@ -21577,7 +21661,7 @@ Domain allowed access.
9367 </param>
9368 <infoflow type="read" weight="10"/>
9369 </interface>
9370 -<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="18202">
9371 +<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="18220">
9372 <summary>
9373 Do not audit attempts to receive comsat_client packets.
9374 </summary>
9375 @@ -21588,7 +21672,7 @@ Domain allowed access.
9376 </param>
9377 <infoflow type="none"/>
9378 </interface>
9379 -<interface name="corenet_sendrecv_comsat_client_packets" lineno="18221">
9380 +<interface name="corenet_sendrecv_comsat_client_packets" lineno="18239">
9381 <summary>
9382 Send and receive comsat_client packets.
9383 </summary>
9384 @@ -21599,7 +21683,7 @@ Domain allowed access.
9385 </param>
9386 <infoflow type="both" weight="10"/>
9387 </interface>
9388 -<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="18237">
9389 +<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="18255">
9390 <summary>
9391 Do not audit attempts to send and receive comsat_client packets.
9392 </summary>
9393 @@ -21610,7 +21694,7 @@ Domain to not audit.
9394 </param>
9395 <infoflow type="none"/>
9396 </interface>
9397 -<interface name="corenet_relabelto_comsat_client_packets" lineno="18252">
9398 +<interface name="corenet_relabelto_comsat_client_packets" lineno="18270">
9399 <summary>
9400 Relabel packets to comsat_client the packet type.
9401 </summary>
9402 @@ -21620,7 +21704,7 @@ Domain allowed access.
9403 </summary>
9404 </param>
9405 </interface>
9406 -<interface name="corenet_send_comsat_server_packets" lineno="18272">
9407 +<interface name="corenet_send_comsat_server_packets" lineno="18290">
9408 <summary>
9409 Send comsat_server packets.
9410 </summary>
9411 @@ -21631,7 +21715,7 @@ Domain allowed access.
9412 </param>
9413 <infoflow type="write" weight="10"/>
9414 </interface>
9415 -<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="18291">
9416 +<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="18309">
9417 <summary>
9418 Do not audit attempts to send comsat_server packets.
9419 </summary>
9420 @@ -21642,7 +21726,7 @@ Domain to not audit.
9421 </param>
9422 <infoflow type="none"/>
9423 </interface>
9424 -<interface name="corenet_receive_comsat_server_packets" lineno="18310">
9425 +<interface name="corenet_receive_comsat_server_packets" lineno="18328">
9426 <summary>
9427 Receive comsat_server packets.
9428 </summary>
9429 @@ -21653,7 +21737,7 @@ Domain allowed access.
9430 </param>
9431 <infoflow type="read" weight="10"/>
9432 </interface>
9433 -<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="18329">
9434 +<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="18347">
9435 <summary>
9436 Do not audit attempts to receive comsat_server packets.
9437 </summary>
9438 @@ -21664,7 +21748,7 @@ Domain allowed access.
9439 </param>
9440 <infoflow type="none"/>
9441 </interface>
9442 -<interface name="corenet_sendrecv_comsat_server_packets" lineno="18348">
9443 +<interface name="corenet_sendrecv_comsat_server_packets" lineno="18366">
9444 <summary>
9445 Send and receive comsat_server packets.
9446 </summary>
9447 @@ -21675,7 +21759,7 @@ Domain allowed access.
9448 </param>
9449 <infoflow type="both" weight="10"/>
9450 </interface>
9451 -<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="18364">
9452 +<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="18382">
9453 <summary>
9454 Do not audit attempts to send and receive comsat_server packets.
9455 </summary>
9456 @@ -21686,7 +21770,7 @@ Domain to not audit.
9457 </param>
9458 <infoflow type="none"/>
9459 </interface>
9460 -<interface name="corenet_relabelto_comsat_server_packets" lineno="18379">
9461 +<interface name="corenet_relabelto_comsat_server_packets" lineno="18397">
9462 <summary>
9463 Relabel packets to comsat_server the packet type.
9464 </summary>
9465 @@ -21696,7 +21780,7 @@ Domain allowed access.
9466 </summary>
9467 </param>
9468 </interface>
9469 -<interface name="corenet_tcp_sendrecv_condor_port" lineno="18401">
9470 +<interface name="corenet_tcp_sendrecv_condor_port" lineno="18419">
9471 <summary>
9472 Send and receive TCP traffic on the condor port.
9473 </summary>
9474 @@ -21707,7 +21791,7 @@ Domain allowed access.
9475 </param>
9476 <infoflow type="both" weight="10"/>
9477 </interface>
9478 -<interface name="corenet_udp_send_condor_port" lineno="18416">
9479 +<interface name="corenet_udp_send_condor_port" lineno="18434">
9480 <summary>
9481 Send UDP traffic on the condor port.
9482 </summary>
9483 @@ -21718,7 +21802,7 @@ Domain allowed access.
9484 </param>
9485 <infoflow type="write" weight="10"/>
9486 </interface>
9487 -<interface name="corenet_dontaudit_udp_send_condor_port" lineno="18431">
9488 +<interface name="corenet_dontaudit_udp_send_condor_port" lineno="18449">
9489 <summary>
9490 Do not audit attempts to send UDP traffic on the condor port.
9491 </summary>
9492 @@ -21729,7 +21813,7 @@ Domain to not audit.
9493 </param>
9494 <infoflow type="none"/>
9495 </interface>
9496 -<interface name="corenet_udp_receive_condor_port" lineno="18446">
9497 +<interface name="corenet_udp_receive_condor_port" lineno="18464">
9498 <summary>
9499 Receive UDP traffic on the condor port.
9500 </summary>
9501 @@ -21740,7 +21824,7 @@ Domain allowed access.
9502 </param>
9503 <infoflow type="read" weight="10"/>
9504 </interface>
9505 -<interface name="corenet_dontaudit_udp_receive_condor_port" lineno="18461">
9506 +<interface name="corenet_dontaudit_udp_receive_condor_port" lineno="18479">
9507 <summary>
9508 Do not audit attempts to receive UDP traffic on the condor port.
9509 </summary>
9510 @@ -21751,7 +21835,7 @@ Domain to not audit.
9511 </param>
9512 <infoflow type="none"/>
9513 </interface>
9514 -<interface name="corenet_udp_sendrecv_condor_port" lineno="18476">
9515 +<interface name="corenet_udp_sendrecv_condor_port" lineno="18494">
9516 <summary>
9517 Send and receive UDP traffic on the condor port.
9518 </summary>
9519 @@ -21762,7 +21846,7 @@ Domain allowed access.
9520 </param>
9521 <infoflow type="both" weight="10"/>
9522 </interface>
9523 -<interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="18492">
9524 +<interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="18510">
9525 <summary>
9526 Do not audit attempts to send and receive
9527 UDP traffic on the condor port.
9528 @@ -21774,7 +21858,7 @@ Domain to not audit.
9529 </param>
9530 <infoflow type="none"/>
9531 </interface>
9532 -<interface name="corenet_tcp_bind_condor_port" lineno="18507">
9533 +<interface name="corenet_tcp_bind_condor_port" lineno="18525">
9534 <summary>
9535 Bind TCP sockets to the condor port.
9536 </summary>
9537 @@ -21785,7 +21869,7 @@ Domain allowed access.
9538 </param>
9539 <infoflow type="none"/>
9540 </interface>
9541 -<interface name="corenet_udp_bind_condor_port" lineno="18527">
9542 +<interface name="corenet_udp_bind_condor_port" lineno="18545">
9543 <summary>
9544 Bind UDP sockets to the condor port.
9545 </summary>
9546 @@ -21796,7 +21880,7 @@ Domain allowed access.
9547 </param>
9548 <infoflow type="none"/>
9549 </interface>
9550 -<interface name="corenet_tcp_connect_condor_port" lineno="18546">
9551 +<interface name="corenet_tcp_connect_condor_port" lineno="18564">
9552 <summary>
9553 Make a TCP connection to the condor port.
9554 </summary>
9555 @@ -21806,7 +21890,7 @@ Domain allowed access.
9556 </summary>
9557 </param>
9558 </interface>
9559 -<interface name="corenet_send_condor_client_packets" lineno="18566">
9560 +<interface name="corenet_send_condor_client_packets" lineno="18584">
9561 <summary>
9562 Send condor_client packets.
9563 </summary>
9564 @@ -21817,7 +21901,7 @@ Domain allowed access.
9565 </param>
9566 <infoflow type="write" weight="10"/>
9567 </interface>
9568 -<interface name="corenet_dontaudit_send_condor_client_packets" lineno="18585">
9569 +<interface name="corenet_dontaudit_send_condor_client_packets" lineno="18603">
9570 <summary>
9571 Do not audit attempts to send condor_client packets.
9572 </summary>
9573 @@ -21828,7 +21912,7 @@ Domain to not audit.
9574 </param>
9575 <infoflow type="none"/>
9576 </interface>
9577 -<interface name="corenet_receive_condor_client_packets" lineno="18604">
9578 +<interface name="corenet_receive_condor_client_packets" lineno="18622">
9579 <summary>
9580 Receive condor_client packets.
9581 </summary>
9582 @@ -21839,7 +21923,7 @@ Domain allowed access.
9583 </param>
9584 <infoflow type="read" weight="10"/>
9585 </interface>
9586 -<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="18623">
9587 +<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="18641">
9588 <summary>
9589 Do not audit attempts to receive condor_client packets.
9590 </summary>
9591 @@ -21850,7 +21934,7 @@ Domain allowed access.
9592 </param>
9593 <infoflow type="none"/>
9594 </interface>
9595 -<interface name="corenet_sendrecv_condor_client_packets" lineno="18642">
9596 +<interface name="corenet_sendrecv_condor_client_packets" lineno="18660">
9597 <summary>
9598 Send and receive condor_client packets.
9599 </summary>
9600 @@ -21861,7 +21945,7 @@ Domain allowed access.
9601 </param>
9602 <infoflow type="both" weight="10"/>
9603 </interface>
9604 -<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="18658">
9605 +<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="18676">
9606 <summary>
9607 Do not audit attempts to send and receive condor_client packets.
9608 </summary>
9609 @@ -21872,7 +21956,7 @@ Domain to not audit.
9610 </param>
9611 <infoflow type="none"/>
9612 </interface>
9613 -<interface name="corenet_relabelto_condor_client_packets" lineno="18673">
9614 +<interface name="corenet_relabelto_condor_client_packets" lineno="18691">
9615 <summary>
9616 Relabel packets to condor_client the packet type.
9617 </summary>
9618 @@ -21882,7 +21966,7 @@ Domain allowed access.
9619 </summary>
9620 </param>
9621 </interface>
9622 -<interface name="corenet_send_condor_server_packets" lineno="18693">
9623 +<interface name="corenet_send_condor_server_packets" lineno="18711">
9624 <summary>
9625 Send condor_server packets.
9626 </summary>
9627 @@ -21893,7 +21977,7 @@ Domain allowed access.
9628 </param>
9629 <infoflow type="write" weight="10"/>
9630 </interface>
9631 -<interface name="corenet_dontaudit_send_condor_server_packets" lineno="18712">
9632 +<interface name="corenet_dontaudit_send_condor_server_packets" lineno="18730">
9633 <summary>
9634 Do not audit attempts to send condor_server packets.
9635 </summary>
9636 @@ -21904,7 +21988,7 @@ Domain to not audit.
9637 </param>
9638 <infoflow type="none"/>
9639 </interface>
9640 -<interface name="corenet_receive_condor_server_packets" lineno="18731">
9641 +<interface name="corenet_receive_condor_server_packets" lineno="18749">
9642 <summary>
9643 Receive condor_server packets.
9644 </summary>
9645 @@ -21915,7 +21999,7 @@ Domain allowed access.
9646 </param>
9647 <infoflow type="read" weight="10"/>
9648 </interface>
9649 -<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="18750">
9650 +<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="18768">
9651 <summary>
9652 Do not audit attempts to receive condor_server packets.
9653 </summary>
9654 @@ -21926,7 +22010,7 @@ Domain allowed access.
9655 </param>
9656 <infoflow type="none"/>
9657 </interface>
9658 -<interface name="corenet_sendrecv_condor_server_packets" lineno="18769">
9659 +<interface name="corenet_sendrecv_condor_server_packets" lineno="18787">
9660 <summary>
9661 Send and receive condor_server packets.
9662 </summary>
9663 @@ -21937,7 +22021,7 @@ Domain allowed access.
9664 </param>
9665 <infoflow type="both" weight="10"/>
9666 </interface>
9667 -<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="18785">
9668 +<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="18803">
9669 <summary>
9670 Do not audit attempts to send and receive condor_server packets.
9671 </summary>
9672 @@ -21948,7 +22032,7 @@ Domain to not audit.
9673 </param>
9674 <infoflow type="none"/>
9675 </interface>
9676 -<interface name="corenet_relabelto_condor_server_packets" lineno="18800">
9677 +<interface name="corenet_relabelto_condor_server_packets" lineno="18818">
9678 <summary>
9679 Relabel packets to condor_server the packet type.
9680 </summary>
9681 @@ -21958,7 +22042,7 @@ Domain allowed access.
9682 </summary>
9683 </param>
9684 </interface>
9685 -<interface name="corenet_tcp_sendrecv_couchdb_port" lineno="18822">
9686 +<interface name="corenet_tcp_sendrecv_couchdb_port" lineno="18840">
9687 <summary>
9688 Send and receive TCP traffic on the couchdb port.
9689 </summary>
9690 @@ -21969,7 +22053,7 @@ Domain allowed access.
9691 </param>
9692 <infoflow type="both" weight="10"/>
9693 </interface>
9694 -<interface name="corenet_udp_send_couchdb_port" lineno="18837">
9695 +<interface name="corenet_udp_send_couchdb_port" lineno="18855">
9696 <summary>
9697 Send UDP traffic on the couchdb port.
9698 </summary>
9699 @@ -21980,7 +22064,7 @@ Domain allowed access.
9700 </param>
9701 <infoflow type="write" weight="10"/>
9702 </interface>
9703 -<interface name="corenet_dontaudit_udp_send_couchdb_port" lineno="18852">
9704 +<interface name="corenet_dontaudit_udp_send_couchdb_port" lineno="18870">
9705 <summary>
9706 Do not audit attempts to send UDP traffic on the couchdb port.
9707 </summary>
9708 @@ -21991,7 +22075,7 @@ Domain to not audit.
9709 </param>
9710 <infoflow type="none"/>
9711 </interface>
9712 -<interface name="corenet_udp_receive_couchdb_port" lineno="18867">
9713 +<interface name="corenet_udp_receive_couchdb_port" lineno="18885">
9714 <summary>
9715 Receive UDP traffic on the couchdb port.
9716 </summary>
9717 @@ -22002,7 +22086,7 @@ Domain allowed access.
9718 </param>
9719 <infoflow type="read" weight="10"/>
9720 </interface>
9721 -<interface name="corenet_dontaudit_udp_receive_couchdb_port" lineno="18882">
9722 +<interface name="corenet_dontaudit_udp_receive_couchdb_port" lineno="18900">
9723 <summary>
9724 Do not audit attempts to receive UDP traffic on the couchdb port.
9725 </summary>
9726 @@ -22013,7 +22097,7 @@ Domain to not audit.
9727 </param>
9728 <infoflow type="none"/>
9729 </interface>
9730 -<interface name="corenet_udp_sendrecv_couchdb_port" lineno="18897">
9731 +<interface name="corenet_udp_sendrecv_couchdb_port" lineno="18915">
9732 <summary>
9733 Send and receive UDP traffic on the couchdb port.
9734 </summary>
9735 @@ -22024,7 +22108,7 @@ Domain allowed access.
9736 </param>
9737 <infoflow type="both" weight="10"/>
9738 </interface>
9739 -<interface name="corenet_dontaudit_udp_sendrecv_couchdb_port" lineno="18913">
9740 +<interface name="corenet_dontaudit_udp_sendrecv_couchdb_port" lineno="18931">
9741 <summary>
9742 Do not audit attempts to send and receive
9743 UDP traffic on the couchdb port.
9744 @@ -22036,7 +22120,7 @@ Domain to not audit.
9745 </param>
9746 <infoflow type="none"/>
9747 </interface>
9748 -<interface name="corenet_tcp_bind_couchdb_port" lineno="18928">
9749 +<interface name="corenet_tcp_bind_couchdb_port" lineno="18946">
9750 <summary>
9751 Bind TCP sockets to the couchdb port.
9752 </summary>
9753 @@ -22047,7 +22131,7 @@ Domain allowed access.
9754 </param>
9755 <infoflow type="none"/>
9756 </interface>
9757 -<interface name="corenet_udp_bind_couchdb_port" lineno="18948">
9758 +<interface name="corenet_udp_bind_couchdb_port" lineno="18966">
9759 <summary>
9760 Bind UDP sockets to the couchdb port.
9761 </summary>
9762 @@ -22058,7 +22142,7 @@ Domain allowed access.
9763 </param>
9764 <infoflow type="none"/>
9765 </interface>
9766 -<interface name="corenet_tcp_connect_couchdb_port" lineno="18967">
9767 +<interface name="corenet_tcp_connect_couchdb_port" lineno="18985">
9768 <summary>
9769 Make a TCP connection to the couchdb port.
9770 </summary>
9771 @@ -22068,7 +22152,7 @@ Domain allowed access.
9772 </summary>
9773 </param>
9774 </interface>
9775 -<interface name="corenet_send_couchdb_client_packets" lineno="18987">
9776 +<interface name="corenet_send_couchdb_client_packets" lineno="19005">
9777 <summary>
9778 Send couchdb_client packets.
9779 </summary>
9780 @@ -22079,7 +22163,7 @@ Domain allowed access.
9781 </param>
9782 <infoflow type="write" weight="10"/>
9783 </interface>
9784 -<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="19006">
9785 +<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="19024">
9786 <summary>
9787 Do not audit attempts to send couchdb_client packets.
9788 </summary>
9789 @@ -22090,7 +22174,7 @@ Domain to not audit.
9790 </param>
9791 <infoflow type="none"/>
9792 </interface>
9793 -<interface name="corenet_receive_couchdb_client_packets" lineno="19025">
9794 +<interface name="corenet_receive_couchdb_client_packets" lineno="19043">
9795 <summary>
9796 Receive couchdb_client packets.
9797 </summary>
9798 @@ -22101,7 +22185,7 @@ Domain allowed access.
9799 </param>
9800 <infoflow type="read" weight="10"/>
9801 </interface>
9802 -<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="19044">
9803 +<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="19062">
9804 <summary>
9805 Do not audit attempts to receive couchdb_client packets.
9806 </summary>
9807 @@ -22112,7 +22196,7 @@ Domain allowed access.
9808 </param>
9809 <infoflow type="none"/>
9810 </interface>
9811 -<interface name="corenet_sendrecv_couchdb_client_packets" lineno="19063">
9812 +<interface name="corenet_sendrecv_couchdb_client_packets" lineno="19081">
9813 <summary>
9814 Send and receive couchdb_client packets.
9815 </summary>
9816 @@ -22123,7 +22207,7 @@ Domain allowed access.
9817 </param>
9818 <infoflow type="both" weight="10"/>
9819 </interface>
9820 -<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="19079">
9821 +<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="19097">
9822 <summary>
9823 Do not audit attempts to send and receive couchdb_client packets.
9824 </summary>
9825 @@ -22134,7 +22218,7 @@ Domain to not audit.
9826 </param>
9827 <infoflow type="none"/>
9828 </interface>
9829 -<interface name="corenet_relabelto_couchdb_client_packets" lineno="19094">
9830 +<interface name="corenet_relabelto_couchdb_client_packets" lineno="19112">
9831 <summary>
9832 Relabel packets to couchdb_client the packet type.
9833 </summary>
9834 @@ -22144,7 +22228,7 @@ Domain allowed access.
9835 </summary>
9836 </param>
9837 </interface>
9838 -<interface name="corenet_send_couchdb_server_packets" lineno="19114">
9839 +<interface name="corenet_send_couchdb_server_packets" lineno="19132">
9840 <summary>
9841 Send couchdb_server packets.
9842 </summary>
9843 @@ -22155,7 +22239,7 @@ Domain allowed access.
9844 </param>
9845 <infoflow type="write" weight="10"/>
9846 </interface>
9847 -<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="19133">
9848 +<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="19151">
9849 <summary>
9850 Do not audit attempts to send couchdb_server packets.
9851 </summary>
9852 @@ -22166,7 +22250,7 @@ Domain to not audit.
9853 </param>
9854 <infoflow type="none"/>
9855 </interface>
9856 -<interface name="corenet_receive_couchdb_server_packets" lineno="19152">
9857 +<interface name="corenet_receive_couchdb_server_packets" lineno="19170">
9858 <summary>
9859 Receive couchdb_server packets.
9860 </summary>
9861 @@ -22177,7 +22261,7 @@ Domain allowed access.
9862 </param>
9863 <infoflow type="read" weight="10"/>
9864 </interface>
9865 -<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="19171">
9866 +<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="19189">
9867 <summary>
9868 Do not audit attempts to receive couchdb_server packets.
9869 </summary>
9870 @@ -22188,7 +22272,7 @@ Domain allowed access.
9871 </param>
9872 <infoflow type="none"/>
9873 </interface>
9874 -<interface name="corenet_sendrecv_couchdb_server_packets" lineno="19190">
9875 +<interface name="corenet_sendrecv_couchdb_server_packets" lineno="19208">
9876 <summary>
9877 Send and receive couchdb_server packets.
9878 </summary>
9879 @@ -22199,7 +22283,7 @@ Domain allowed access.
9880 </param>
9881 <infoflow type="both" weight="10"/>
9882 </interface>
9883 -<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="19206">
9884 +<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="19224">
9885 <summary>
9886 Do not audit attempts to send and receive couchdb_server packets.
9887 </summary>
9888 @@ -22210,7 +22294,7 @@ Domain to not audit.
9889 </param>
9890 <infoflow type="none"/>
9891 </interface>
9892 -<interface name="corenet_relabelto_couchdb_server_packets" lineno="19221">
9893 +<interface name="corenet_relabelto_couchdb_server_packets" lineno="19239">
9894 <summary>
9895 Relabel packets to couchdb_server the packet type.
9896 </summary>
9897 @@ -22220,7 +22304,7 @@ Domain allowed access.
9898 </summary>
9899 </param>
9900 </interface>
9901 -<interface name="corenet_tcp_sendrecv_cslistener_port" lineno="19243">
9902 +<interface name="corenet_tcp_sendrecv_cslistener_port" lineno="19261">
9903 <summary>
9904 Send and receive TCP traffic on the cslistener port.
9905 </summary>
9906 @@ -22231,7 +22315,7 @@ Domain allowed access.
9907 </param>
9908 <infoflow type="both" weight="10"/>
9909 </interface>
9910 -<interface name="corenet_udp_send_cslistener_port" lineno="19258">
9911 +<interface name="corenet_udp_send_cslistener_port" lineno="19276">
9912 <summary>
9913 Send UDP traffic on the cslistener port.
9914 </summary>
9915 @@ -22242,7 +22326,7 @@ Domain allowed access.
9916 </param>
9917 <infoflow type="write" weight="10"/>
9918 </interface>
9919 -<interface name="corenet_dontaudit_udp_send_cslistener_port" lineno="19273">
9920 +<interface name="corenet_dontaudit_udp_send_cslistener_port" lineno="19291">
9921 <summary>
9922 Do not audit attempts to send UDP traffic on the cslistener port.
9923 </summary>
9924 @@ -22253,7 +22337,7 @@ Domain to not audit.
9925 </param>
9926 <infoflow type="none"/>
9927 </interface>
9928 -<interface name="corenet_udp_receive_cslistener_port" lineno="19288">
9929 +<interface name="corenet_udp_receive_cslistener_port" lineno="19306">
9930 <summary>
9931 Receive UDP traffic on the cslistener port.
9932 </summary>
9933 @@ -22264,7 +22348,7 @@ Domain allowed access.
9934 </param>
9935 <infoflow type="read" weight="10"/>
9936 </interface>
9937 -<interface name="corenet_dontaudit_udp_receive_cslistener_port" lineno="19303">
9938 +<interface name="corenet_dontaudit_udp_receive_cslistener_port" lineno="19321">
9939 <summary>
9940 Do not audit attempts to receive UDP traffic on the cslistener port.
9941 </summary>
9942 @@ -22275,7 +22359,7 @@ Domain to not audit.
9943 </param>
9944 <infoflow type="none"/>
9945 </interface>
9946 -<interface name="corenet_udp_sendrecv_cslistener_port" lineno="19318">
9947 +<interface name="corenet_udp_sendrecv_cslistener_port" lineno="19336">
9948 <summary>
9949 Send and receive UDP traffic on the cslistener port.
9950 </summary>
9951 @@ -22286,7 +22370,7 @@ Domain allowed access.
9952 </param>
9953 <infoflow type="both" weight="10"/>
9954 </interface>
9955 -<interface name="corenet_dontaudit_udp_sendrecv_cslistener_port" lineno="19334">
9956 +<interface name="corenet_dontaudit_udp_sendrecv_cslistener_port" lineno="19352">
9957 <summary>
9958 Do not audit attempts to send and receive
9959 UDP traffic on the cslistener port.
9960 @@ -22298,7 +22382,7 @@ Domain to not audit.
9961 </param>
9962 <infoflow type="none"/>
9963 </interface>
9964 -<interface name="corenet_tcp_bind_cslistener_port" lineno="19349">
9965 +<interface name="corenet_tcp_bind_cslistener_port" lineno="19367">
9966 <summary>
9967 Bind TCP sockets to the cslistener port.
9968 </summary>
9969 @@ -22309,7 +22393,7 @@ Domain allowed access.
9970 </param>
9971 <infoflow type="none"/>
9972 </interface>
9973 -<interface name="corenet_udp_bind_cslistener_port" lineno="19369">
9974 +<interface name="corenet_udp_bind_cslistener_port" lineno="19387">
9975 <summary>
9976 Bind UDP sockets to the cslistener port.
9977 </summary>
9978 @@ -22320,7 +22404,7 @@ Domain allowed access.
9979 </param>
9980 <infoflow type="none"/>
9981 </interface>
9982 -<interface name="corenet_tcp_connect_cslistener_port" lineno="19388">
9983 +<interface name="corenet_tcp_connect_cslistener_port" lineno="19406">
9984 <summary>
9985 Make a TCP connection to the cslistener port.
9986 </summary>
9987 @@ -22330,7 +22414,7 @@ Domain allowed access.
9988 </summary>
9989 </param>
9990 </interface>
9991 -<interface name="corenet_send_cslistener_client_packets" lineno="19408">
9992 +<interface name="corenet_send_cslistener_client_packets" lineno="19426">
9993 <summary>
9994 Send cslistener_client packets.
9995 </summary>
9996 @@ -22341,7 +22425,7 @@ Domain allowed access.
9997 </param>
9998 <infoflow type="write" weight="10"/>
9999 </interface>
10000 -<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="19427">
10001 +<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="19445">
10002 <summary>
10003 Do not audit attempts to send cslistener_client packets.
10004 </summary>
10005 @@ -22352,7 +22436,7 @@ Domain to not audit.
10006 </param>
10007 <infoflow type="none"/>
10008 </interface>
10009 -<interface name="corenet_receive_cslistener_client_packets" lineno="19446">
10010 +<interface name="corenet_receive_cslistener_client_packets" lineno="19464">
10011 <summary>
10012 Receive cslistener_client packets.
10013 </summary>
10014 @@ -22363,7 +22447,7 @@ Domain allowed access.
10015 </param>
10016 <infoflow type="read" weight="10"/>
10017 </interface>
10018 -<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="19465">
10019 +<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="19483">
10020 <summary>
10021 Do not audit attempts to receive cslistener_client packets.
10022 </summary>
10023 @@ -22374,7 +22458,7 @@ Domain allowed access.
10024 </param>
10025 <infoflow type="none"/>
10026 </interface>
10027 -<interface name="corenet_sendrecv_cslistener_client_packets" lineno="19484">
10028 +<interface name="corenet_sendrecv_cslistener_client_packets" lineno="19502">
10029 <summary>
10030 Send and receive cslistener_client packets.
10031 </summary>
10032 @@ -22385,7 +22469,7 @@ Domain allowed access.
10033 </param>
10034 <infoflow type="both" weight="10"/>
10035 </interface>
10036 -<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="19500">
10037 +<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="19518">
10038 <summary>
10039 Do not audit attempts to send and receive cslistener_client packets.
10040 </summary>
10041 @@ -22396,7 +22480,7 @@ Domain to not audit.
10042 </param>
10043 <infoflow type="none"/>
10044 </interface>
10045 -<interface name="corenet_relabelto_cslistener_client_packets" lineno="19515">
10046 +<interface name="corenet_relabelto_cslistener_client_packets" lineno="19533">
10047 <summary>
10048 Relabel packets to cslistener_client the packet type.
10049 </summary>
10050 @@ -22406,7 +22490,7 @@ Domain allowed access.
10051 </summary>
10052 </param>
10053 </interface>
10054 -<interface name="corenet_send_cslistener_server_packets" lineno="19535">
10055 +<interface name="corenet_send_cslistener_server_packets" lineno="19553">
10056 <summary>
10057 Send cslistener_server packets.
10058 </summary>
10059 @@ -22417,7 +22501,7 @@ Domain allowed access.
10060 </param>
10061 <infoflow type="write" weight="10"/>
10062 </interface>
10063 -<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="19554">
10064 +<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="19572">
10065 <summary>
10066 Do not audit attempts to send cslistener_server packets.
10067 </summary>
10068 @@ -22428,7 +22512,7 @@ Domain to not audit.
10069 </param>
10070 <infoflow type="none"/>
10071 </interface>
10072 -<interface name="corenet_receive_cslistener_server_packets" lineno="19573">
10073 +<interface name="corenet_receive_cslistener_server_packets" lineno="19591">
10074 <summary>
10075 Receive cslistener_server packets.
10076 </summary>
10077 @@ -22439,7 +22523,7 @@ Domain allowed access.
10078 </param>
10079 <infoflow type="read" weight="10"/>
10080 </interface>
10081 -<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="19592">
10082 +<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="19610">
10083 <summary>
10084 Do not audit attempts to receive cslistener_server packets.
10085 </summary>
10086 @@ -22450,7 +22534,7 @@ Domain allowed access.
10087 </param>
10088 <infoflow type="none"/>
10089 </interface>
10090 -<interface name="corenet_sendrecv_cslistener_server_packets" lineno="19611">
10091 +<interface name="corenet_sendrecv_cslistener_server_packets" lineno="19629">
10092 <summary>
10093 Send and receive cslistener_server packets.
10094 </summary>
10095 @@ -22461,7 +22545,7 @@ Domain allowed access.
10096 </param>
10097 <infoflow type="both" weight="10"/>
10098 </interface>
10099 -<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="19627">
10100 +<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="19645">
10101 <summary>
10102 Do not audit attempts to send and receive cslistener_server packets.
10103 </summary>
10104 @@ -22472,7 +22556,7 @@ Domain to not audit.
10105 </param>
10106 <infoflow type="none"/>
10107 </interface>
10108 -<interface name="corenet_relabelto_cslistener_server_packets" lineno="19642">
10109 +<interface name="corenet_relabelto_cslistener_server_packets" lineno="19660">
10110 <summary>
10111 Relabel packets to cslistener_server the packet type.
10112 </summary>
10113 @@ -22482,7 +22566,7 @@ Domain allowed access.
10114 </summary>
10115 </param>
10116 </interface>
10117 -<interface name="corenet_tcp_sendrecv_ctdb_port" lineno="19664">
10118 +<interface name="corenet_tcp_sendrecv_ctdb_port" lineno="19682">
10119 <summary>
10120 Send and receive TCP traffic on the ctdb port.
10121 </summary>
10122 @@ -22493,7 +22577,7 @@ Domain allowed access.
10123 </param>
10124 <infoflow type="both" weight="10"/>
10125 </interface>
10126 -<interface name="corenet_udp_send_ctdb_port" lineno="19679">
10127 +<interface name="corenet_udp_send_ctdb_port" lineno="19697">
10128 <summary>
10129 Send UDP traffic on the ctdb port.
10130 </summary>
10131 @@ -22504,7 +22588,7 @@ Domain allowed access.
10132 </param>
10133 <infoflow type="write" weight="10"/>
10134 </interface>
10135 -<interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="19694">
10136 +<interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="19712">
10137 <summary>
10138 Do not audit attempts to send UDP traffic on the ctdb port.
10139 </summary>
10140 @@ -22515,7 +22599,7 @@ Domain to not audit.
10141 </param>
10142 <infoflow type="none"/>
10143 </interface>
10144 -<interface name="corenet_udp_receive_ctdb_port" lineno="19709">
10145 +<interface name="corenet_udp_receive_ctdb_port" lineno="19727">
10146 <summary>
10147 Receive UDP traffic on the ctdb port.
10148 </summary>
10149 @@ -22526,7 +22610,7 @@ Domain allowed access.
10150 </param>
10151 <infoflow type="read" weight="10"/>
10152 </interface>
10153 -<interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="19724">
10154 +<interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="19742">
10155 <summary>
10156 Do not audit attempts to receive UDP traffic on the ctdb port.
10157 </summary>
10158 @@ -22537,7 +22621,7 @@ Domain to not audit.
10159 </param>
10160 <infoflow type="none"/>
10161 </interface>
10162 -<interface name="corenet_udp_sendrecv_ctdb_port" lineno="19739">
10163 +<interface name="corenet_udp_sendrecv_ctdb_port" lineno="19757">
10164 <summary>
10165 Send and receive UDP traffic on the ctdb port.
10166 </summary>
10167 @@ -22548,7 +22632,7 @@ Domain allowed access.
10168 </param>
10169 <infoflow type="both" weight="10"/>
10170 </interface>
10171 -<interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="19755">
10172 +<interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="19773">
10173 <summary>
10174 Do not audit attempts to send and receive
10175 UDP traffic on the ctdb port.
10176 @@ -22560,7 +22644,7 @@ Domain to not audit.
10177 </param>
10178 <infoflow type="none"/>
10179 </interface>
10180 -<interface name="corenet_tcp_bind_ctdb_port" lineno="19770">
10181 +<interface name="corenet_tcp_bind_ctdb_port" lineno="19788">
10182 <summary>
10183 Bind TCP sockets to the ctdb port.
10184 </summary>
10185 @@ -22571,7 +22655,7 @@ Domain allowed access.
10186 </param>
10187 <infoflow type="none"/>
10188 </interface>
10189 -<interface name="corenet_udp_bind_ctdb_port" lineno="19790">
10190 +<interface name="corenet_udp_bind_ctdb_port" lineno="19808">
10191 <summary>
10192 Bind UDP sockets to the ctdb port.
10193 </summary>
10194 @@ -22582,7 +22666,7 @@ Domain allowed access.
10195 </param>
10196 <infoflow type="none"/>
10197 </interface>
10198 -<interface name="corenet_tcp_connect_ctdb_port" lineno="19809">
10199 +<interface name="corenet_tcp_connect_ctdb_port" lineno="19827">
10200 <summary>
10201 Make a TCP connection to the ctdb port.
10202 </summary>
10203 @@ -22592,7 +22676,7 @@ Domain allowed access.
10204 </summary>
10205 </param>
10206 </interface>
10207 -<interface name="corenet_send_ctdb_client_packets" lineno="19829">
10208 +<interface name="corenet_send_ctdb_client_packets" lineno="19847">
10209 <summary>
10210 Send ctdb_client packets.
10211 </summary>
10212 @@ -22603,7 +22687,7 @@ Domain allowed access.
10213 </param>
10214 <infoflow type="write" weight="10"/>
10215 </interface>
10216 -<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="19848">
10217 +<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="19866">
10218 <summary>
10219 Do not audit attempts to send ctdb_client packets.
10220 </summary>
10221 @@ -22614,7 +22698,7 @@ Domain to not audit.
10222 </param>
10223 <infoflow type="none"/>
10224 </interface>
10225 -<interface name="corenet_receive_ctdb_client_packets" lineno="19867">
10226 +<interface name="corenet_receive_ctdb_client_packets" lineno="19885">
10227 <summary>
10228 Receive ctdb_client packets.
10229 </summary>
10230 @@ -22625,7 +22709,7 @@ Domain allowed access.
10231 </param>
10232 <infoflow type="read" weight="10"/>
10233 </interface>
10234 -<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="19886">
10235 +<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="19904">
10236 <summary>
10237 Do not audit attempts to receive ctdb_client packets.
10238 </summary>
10239 @@ -22636,7 +22720,7 @@ Domain allowed access.
10240 </param>
10241 <infoflow type="none"/>
10242 </interface>
10243 -<interface name="corenet_sendrecv_ctdb_client_packets" lineno="19905">
10244 +<interface name="corenet_sendrecv_ctdb_client_packets" lineno="19923">
10245 <summary>
10246 Send and receive ctdb_client packets.
10247 </summary>
10248 @@ -22647,7 +22731,7 @@ Domain allowed access.
10249 </param>
10250 <infoflow type="both" weight="10"/>
10251 </interface>
10252 -<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="19921">
10253 +<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="19939">
10254 <summary>
10255 Do not audit attempts to send and receive ctdb_client packets.
10256 </summary>
10257 @@ -22658,7 +22742,7 @@ Domain to not audit.
10258 </param>
10259 <infoflow type="none"/>
10260 </interface>
10261 -<interface name="corenet_relabelto_ctdb_client_packets" lineno="19936">
10262 +<interface name="corenet_relabelto_ctdb_client_packets" lineno="19954">
10263 <summary>
10264 Relabel packets to ctdb_client the packet type.
10265 </summary>
10266 @@ -22668,7 +22752,7 @@ Domain allowed access.
10267 </summary>
10268 </param>
10269 </interface>
10270 -<interface name="corenet_send_ctdb_server_packets" lineno="19956">
10271 +<interface name="corenet_send_ctdb_server_packets" lineno="19974">
10272 <summary>
10273 Send ctdb_server packets.
10274 </summary>
10275 @@ -22679,7 +22763,7 @@ Domain allowed access.
10276 </param>
10277 <infoflow type="write" weight="10"/>
10278 </interface>
10279 -<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="19975">
10280 +<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="19993">
10281 <summary>
10282 Do not audit attempts to send ctdb_server packets.
10283 </summary>
10284 @@ -22690,7 +22774,7 @@ Domain to not audit.
10285 </param>
10286 <infoflow type="none"/>
10287 </interface>
10288 -<interface name="corenet_receive_ctdb_server_packets" lineno="19994">
10289 +<interface name="corenet_receive_ctdb_server_packets" lineno="20012">
10290 <summary>
10291 Receive ctdb_server packets.
10292 </summary>
10293 @@ -22701,7 +22785,7 @@ Domain allowed access.
10294 </param>
10295 <infoflow type="read" weight="10"/>
10296 </interface>
10297 -<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="20013">
10298 +<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="20031">
10299 <summary>
10300 Do not audit attempts to receive ctdb_server packets.
10301 </summary>
10302 @@ -22712,7 +22796,7 @@ Domain allowed access.
10303 </param>
10304 <infoflow type="none"/>
10305 </interface>
10306 -<interface name="corenet_sendrecv_ctdb_server_packets" lineno="20032">
10307 +<interface name="corenet_sendrecv_ctdb_server_packets" lineno="20050">
10308 <summary>
10309 Send and receive ctdb_server packets.
10310 </summary>
10311 @@ -22723,7 +22807,7 @@ Domain allowed access.
10312 </param>
10313 <infoflow type="both" weight="10"/>
10314 </interface>
10315 -<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="20048">
10316 +<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="20066">
10317 <summary>
10318 Do not audit attempts to send and receive ctdb_server packets.
10319 </summary>
10320 @@ -22734,7 +22818,7 @@ Domain to not audit.
10321 </param>
10322 <infoflow type="none"/>
10323 </interface>
10324 -<interface name="corenet_relabelto_ctdb_server_packets" lineno="20063">
10325 +<interface name="corenet_relabelto_ctdb_server_packets" lineno="20081">
10326 <summary>
10327 Relabel packets to ctdb_server the packet type.
10328 </summary>
10329 @@ -22744,7 +22828,7 @@ Domain allowed access.
10330 </summary>
10331 </param>
10332 </interface>
10333 -<interface name="corenet_tcp_sendrecv_cvs_port" lineno="20085">
10334 +<interface name="corenet_tcp_sendrecv_cvs_port" lineno="20103">
10335 <summary>
10336 Send and receive TCP traffic on the cvs port.
10337 </summary>
10338 @@ -22755,7 +22839,7 @@ Domain allowed access.
10339 </param>
10340 <infoflow type="both" weight="10"/>
10341 </interface>
10342 -<interface name="corenet_udp_send_cvs_port" lineno="20100">
10343 +<interface name="corenet_udp_send_cvs_port" lineno="20118">
10344 <summary>
10345 Send UDP traffic on the cvs port.
10346 </summary>
10347 @@ -22766,7 +22850,7 @@ Domain allowed access.
10348 </param>
10349 <infoflow type="write" weight="10"/>
10350 </interface>
10351 -<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="20115">
10352 +<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="20133">
10353 <summary>
10354 Do not audit attempts to send UDP traffic on the cvs port.
10355 </summary>
10356 @@ -22777,7 +22861,7 @@ Domain to not audit.
10357 </param>
10358 <infoflow type="none"/>
10359 </interface>
10360 -<interface name="corenet_udp_receive_cvs_port" lineno="20130">
10361 +<interface name="corenet_udp_receive_cvs_port" lineno="20148">
10362 <summary>
10363 Receive UDP traffic on the cvs port.
10364 </summary>
10365 @@ -22788,7 +22872,7 @@ Domain allowed access.
10366 </param>
10367 <infoflow type="read" weight="10"/>
10368 </interface>
10369 -<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="20145">
10370 +<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="20163">
10371 <summary>
10372 Do not audit attempts to receive UDP traffic on the cvs port.
10373 </summary>
10374 @@ -22799,7 +22883,7 @@ Domain to not audit.
10375 </param>
10376 <infoflow type="none"/>
10377 </interface>
10378 -<interface name="corenet_udp_sendrecv_cvs_port" lineno="20160">
10379 +<interface name="corenet_udp_sendrecv_cvs_port" lineno="20178">
10380 <summary>
10381 Send and receive UDP traffic on the cvs port.
10382 </summary>
10383 @@ -22810,7 +22894,7 @@ Domain allowed access.
10384 </param>
10385 <infoflow type="both" weight="10"/>
10386 </interface>
10387 -<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="20176">
10388 +<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="20194">
10389 <summary>
10390 Do not audit attempts to send and receive
10391 UDP traffic on the cvs port.
10392 @@ -22822,7 +22906,7 @@ Domain to not audit.
10393 </param>
10394 <infoflow type="none"/>
10395 </interface>
10396 -<interface name="corenet_tcp_bind_cvs_port" lineno="20191">
10397 +<interface name="corenet_tcp_bind_cvs_port" lineno="20209">
10398 <summary>
10399 Bind TCP sockets to the cvs port.
10400 </summary>
10401 @@ -22833,7 +22917,7 @@ Domain allowed access.
10402 </param>
10403 <infoflow type="none"/>
10404 </interface>
10405 -<interface name="corenet_udp_bind_cvs_port" lineno="20211">
10406 +<interface name="corenet_udp_bind_cvs_port" lineno="20229">
10407 <summary>
10408 Bind UDP sockets to the cvs port.
10409 </summary>
10410 @@ -22844,7 +22928,7 @@ Domain allowed access.
10411 </param>
10412 <infoflow type="none"/>
10413 </interface>
10414 -<interface name="corenet_tcp_connect_cvs_port" lineno="20230">
10415 +<interface name="corenet_tcp_connect_cvs_port" lineno="20248">
10416 <summary>
10417 Make a TCP connection to the cvs port.
10418 </summary>
10419 @@ -22854,7 +22938,7 @@ Domain allowed access.
10420 </summary>
10421 </param>
10422 </interface>
10423 -<interface name="corenet_send_cvs_client_packets" lineno="20250">
10424 +<interface name="corenet_send_cvs_client_packets" lineno="20268">
10425 <summary>
10426 Send cvs_client packets.
10427 </summary>
10428 @@ -22865,7 +22949,7 @@ Domain allowed access.
10429 </param>
10430 <infoflow type="write" weight="10"/>
10431 </interface>
10432 -<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="20269">
10433 +<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="20287">
10434 <summary>
10435 Do not audit attempts to send cvs_client packets.
10436 </summary>
10437 @@ -22876,7 +22960,7 @@ Domain to not audit.
10438 </param>
10439 <infoflow type="none"/>
10440 </interface>
10441 -<interface name="corenet_receive_cvs_client_packets" lineno="20288">
10442 +<interface name="corenet_receive_cvs_client_packets" lineno="20306">
10443 <summary>
10444 Receive cvs_client packets.
10445 </summary>
10446 @@ -22887,7 +22971,7 @@ Domain allowed access.
10447 </param>
10448 <infoflow type="read" weight="10"/>
10449 </interface>
10450 -<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="20307">
10451 +<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="20325">
10452 <summary>
10453 Do not audit attempts to receive cvs_client packets.
10454 </summary>
10455 @@ -22898,7 +22982,7 @@ Domain allowed access.
10456 </param>
10457 <infoflow type="none"/>
10458 </interface>
10459 -<interface name="corenet_sendrecv_cvs_client_packets" lineno="20326">
10460 +<interface name="corenet_sendrecv_cvs_client_packets" lineno="20344">
10461 <summary>
10462 Send and receive cvs_client packets.
10463 </summary>
10464 @@ -22909,7 +22993,7 @@ Domain allowed access.
10465 </param>
10466 <infoflow type="both" weight="10"/>
10467 </interface>
10468 -<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="20342">
10469 +<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="20360">
10470 <summary>
10471 Do not audit attempts to send and receive cvs_client packets.
10472 </summary>
10473 @@ -22920,7 +23004,7 @@ Domain to not audit.
10474 </param>
10475 <infoflow type="none"/>
10476 </interface>
10477 -<interface name="corenet_relabelto_cvs_client_packets" lineno="20357">
10478 +<interface name="corenet_relabelto_cvs_client_packets" lineno="20375">
10479 <summary>
10480 Relabel packets to cvs_client the packet type.
10481 </summary>
10482 @@ -22930,7 +23014,7 @@ Domain allowed access.
10483 </summary>
10484 </param>
10485 </interface>
10486 -<interface name="corenet_send_cvs_server_packets" lineno="20377">
10487 +<interface name="corenet_send_cvs_server_packets" lineno="20395">
10488 <summary>
10489 Send cvs_server packets.
10490 </summary>
10491 @@ -22941,7 +23025,7 @@ Domain allowed access.
10492 </param>
10493 <infoflow type="write" weight="10"/>
10494 </interface>
10495 -<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="20396">
10496 +<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="20414">
10497 <summary>
10498 Do not audit attempts to send cvs_server packets.
10499 </summary>
10500 @@ -22952,7 +23036,7 @@ Domain to not audit.
10501 </param>
10502 <infoflow type="none"/>
10503 </interface>
10504 -<interface name="corenet_receive_cvs_server_packets" lineno="20415">
10505 +<interface name="corenet_receive_cvs_server_packets" lineno="20433">
10506 <summary>
10507 Receive cvs_server packets.
10508 </summary>
10509 @@ -22963,7 +23047,7 @@ Domain allowed access.
10510 </param>
10511 <infoflow type="read" weight="10"/>
10512 </interface>
10513 -<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="20434">
10514 +<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="20452">
10515 <summary>
10516 Do not audit attempts to receive cvs_server packets.
10517 </summary>
10518 @@ -22974,7 +23058,7 @@ Domain allowed access.
10519 </param>
10520 <infoflow type="none"/>
10521 </interface>
10522 -<interface name="corenet_sendrecv_cvs_server_packets" lineno="20453">
10523 +<interface name="corenet_sendrecv_cvs_server_packets" lineno="20471">
10524 <summary>
10525 Send and receive cvs_server packets.
10526 </summary>
10527 @@ -22985,7 +23069,7 @@ Domain allowed access.
10528 </param>
10529 <infoflow type="both" weight="10"/>
10530 </interface>
10531 -<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="20469">
10532 +<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="20487">
10533 <summary>
10534 Do not audit attempts to send and receive cvs_server packets.
10535 </summary>
10536 @@ -22996,7 +23080,7 @@ Domain to not audit.
10537 </param>
10538 <infoflow type="none"/>
10539 </interface>
10540 -<interface name="corenet_relabelto_cvs_server_packets" lineno="20484">
10541 +<interface name="corenet_relabelto_cvs_server_packets" lineno="20502">
10542 <summary>
10543 Relabel packets to cvs_server the packet type.
10544 </summary>
10545 @@ -23006,7 +23090,7 @@ Domain allowed access.
10546 </summary>
10547 </param>
10548 </interface>
10549 -<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="20506">
10550 +<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="20524">
10551 <summary>
10552 Send and receive TCP traffic on the cyphesis port.
10553 </summary>
10554 @@ -23017,7 +23101,7 @@ Domain allowed access.
10555 </param>
10556 <infoflow type="both" weight="10"/>
10557 </interface>
10558 -<interface name="corenet_udp_send_cyphesis_port" lineno="20521">
10559 +<interface name="corenet_udp_send_cyphesis_port" lineno="20539">
10560 <summary>
10561 Send UDP traffic on the cyphesis port.
10562 </summary>
10563 @@ -23028,7 +23112,7 @@ Domain allowed access.
10564 </param>
10565 <infoflow type="write" weight="10"/>
10566 </interface>
10567 -<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="20536">
10568 +<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="20554">
10569 <summary>
10570 Do not audit attempts to send UDP traffic on the cyphesis port.
10571 </summary>
10572 @@ -23039,7 +23123,7 @@ Domain to not audit.
10573 </param>
10574 <infoflow type="none"/>
10575 </interface>
10576 -<interface name="corenet_udp_receive_cyphesis_port" lineno="20551">
10577 +<interface name="corenet_udp_receive_cyphesis_port" lineno="20569">
10578 <summary>
10579 Receive UDP traffic on the cyphesis port.
10580 </summary>
10581 @@ -23050,7 +23134,7 @@ Domain allowed access.
10582 </param>
10583 <infoflow type="read" weight="10"/>
10584 </interface>
10585 -<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="20566">
10586 +<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="20584">
10587 <summary>
10588 Do not audit attempts to receive UDP traffic on the cyphesis port.
10589 </summary>
10590 @@ -23061,7 +23145,7 @@ Domain to not audit.
10591 </param>
10592 <infoflow type="none"/>
10593 </interface>
10594 -<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="20581">
10595 +<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="20599">
10596 <summary>
10597 Send and receive UDP traffic on the cyphesis port.
10598 </summary>
10599 @@ -23072,7 +23156,7 @@ Domain allowed access.
10600 </param>
10601 <infoflow type="both" weight="10"/>
10602 </interface>
10603 -<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="20597">
10604 +<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="20615">
10605 <summary>
10606 Do not audit attempts to send and receive
10607 UDP traffic on the cyphesis port.
10608 @@ -23084,7 +23168,7 @@ Domain to not audit.
10609 </param>
10610 <infoflow type="none"/>
10611 </interface>
10612 -<interface name="corenet_tcp_bind_cyphesis_port" lineno="20612">
10613 +<interface name="corenet_tcp_bind_cyphesis_port" lineno="20630">
10614 <summary>
10615 Bind TCP sockets to the cyphesis port.
10616 </summary>
10617 @@ -23095,7 +23179,7 @@ Domain allowed access.
10618 </param>
10619 <infoflow type="none"/>
10620 </interface>
10621 -<interface name="corenet_udp_bind_cyphesis_port" lineno="20632">
10622 +<interface name="corenet_udp_bind_cyphesis_port" lineno="20650">
10623 <summary>
10624 Bind UDP sockets to the cyphesis port.
10625 </summary>
10626 @@ -23106,7 +23190,7 @@ Domain allowed access.
10627 </param>
10628 <infoflow type="none"/>
10629 </interface>
10630 -<interface name="corenet_tcp_connect_cyphesis_port" lineno="20651">
10631 +<interface name="corenet_tcp_connect_cyphesis_port" lineno="20669">
10632 <summary>
10633 Make a TCP connection to the cyphesis port.
10634 </summary>
10635 @@ -23116,7 +23200,7 @@ Domain allowed access.
10636 </summary>
10637 </param>
10638 </interface>
10639 -<interface name="corenet_send_cyphesis_client_packets" lineno="20671">
10640 +<interface name="corenet_send_cyphesis_client_packets" lineno="20689">
10641 <summary>
10642 Send cyphesis_client packets.
10643 </summary>
10644 @@ -23127,7 +23211,7 @@ Domain allowed access.
10645 </param>
10646 <infoflow type="write" weight="10"/>
10647 </interface>
10648 -<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="20690">
10649 +<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="20708">
10650 <summary>
10651 Do not audit attempts to send cyphesis_client packets.
10652 </summary>
10653 @@ -23138,7 +23222,7 @@ Domain to not audit.
10654 </param>
10655 <infoflow type="none"/>
10656 </interface>
10657 -<interface name="corenet_receive_cyphesis_client_packets" lineno="20709">
10658 +<interface name="corenet_receive_cyphesis_client_packets" lineno="20727">
10659 <summary>
10660 Receive cyphesis_client packets.
10661 </summary>
10662 @@ -23149,7 +23233,7 @@ Domain allowed access.
10663 </param>
10664 <infoflow type="read" weight="10"/>
10665 </interface>
10666 -<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="20728">
10667 +<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="20746">
10668 <summary>
10669 Do not audit attempts to receive cyphesis_client packets.
10670 </summary>
10671 @@ -23160,7 +23244,7 @@ Domain allowed access.
10672 </param>
10673 <infoflow type="none"/>
10674 </interface>
10675 -<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="20747">
10676 +<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="20765">
10677 <summary>
10678 Send and receive cyphesis_client packets.
10679 </summary>
10680 @@ -23171,7 +23255,7 @@ Domain allowed access.
10681 </param>
10682 <infoflow type="both" weight="10"/>
10683 </interface>
10684 -<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="20763">
10685 +<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="20781">
10686 <summary>
10687 Do not audit attempts to send and receive cyphesis_client packets.
10688 </summary>
10689 @@ -23182,7 +23266,7 @@ Domain to not audit.
10690 </param>
10691 <infoflow type="none"/>
10692 </interface>
10693 -<interface name="corenet_relabelto_cyphesis_client_packets" lineno="20778">
10694 +<interface name="corenet_relabelto_cyphesis_client_packets" lineno="20796">
10695 <summary>
10696 Relabel packets to cyphesis_client the packet type.
10697 </summary>
10698 @@ -23192,7 +23276,7 @@ Domain allowed access.
10699 </summary>
10700 </param>
10701 </interface>
10702 -<interface name="corenet_send_cyphesis_server_packets" lineno="20798">
10703 +<interface name="corenet_send_cyphesis_server_packets" lineno="20816">
10704 <summary>
10705 Send cyphesis_server packets.
10706 </summary>
10707 @@ -23203,7 +23287,7 @@ Domain allowed access.
10708 </param>
10709 <infoflow type="write" weight="10"/>
10710 </interface>
10711 -<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="20817">
10712 +<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="20835">
10713 <summary>
10714 Do not audit attempts to send cyphesis_server packets.
10715 </summary>
10716 @@ -23214,7 +23298,7 @@ Domain to not audit.
10717 </param>
10718 <infoflow type="none"/>
10719 </interface>
10720 -<interface name="corenet_receive_cyphesis_server_packets" lineno="20836">
10721 +<interface name="corenet_receive_cyphesis_server_packets" lineno="20854">
10722 <summary>
10723 Receive cyphesis_server packets.
10724 </summary>
10725 @@ -23225,7 +23309,7 @@ Domain allowed access.
10726 </param>
10727 <infoflow type="read" weight="10"/>
10728 </interface>
10729 -<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="20855">
10730 +<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="20873">
10731 <summary>
10732 Do not audit attempts to receive cyphesis_server packets.
10733 </summary>
10734 @@ -23236,7 +23320,7 @@ Domain allowed access.
10735 </param>
10736 <infoflow type="none"/>
10737 </interface>
10738 -<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="20874">
10739 +<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="20892">
10740 <summary>
10741 Send and receive cyphesis_server packets.
10742 </summary>
10743 @@ -23247,7 +23331,7 @@ Domain allowed access.
10744 </param>
10745 <infoflow type="both" weight="10"/>
10746 </interface>
10747 -<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="20890">
10748 +<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="20908">
10749 <summary>
10750 Do not audit attempts to send and receive cyphesis_server packets.
10751 </summary>
10752 @@ -23258,7 +23342,7 @@ Domain to not audit.
10753 </param>
10754 <infoflow type="none"/>
10755 </interface>
10756 -<interface name="corenet_relabelto_cyphesis_server_packets" lineno="20905">
10757 +<interface name="corenet_relabelto_cyphesis_server_packets" lineno="20923">
10758 <summary>
10759 Relabel packets to cyphesis_server the packet type.
10760 </summary>
10761 @@ -23268,7 +23352,7 @@ Domain allowed access.
10762 </summary>
10763 </param>
10764 </interface>
10765 -<interface name="corenet_tcp_sendrecv_daap_port" lineno="20927">
10766 +<interface name="corenet_tcp_sendrecv_daap_port" lineno="20945">
10767 <summary>
10768 Send and receive TCP traffic on the daap port.
10769 </summary>
10770 @@ -23279,7 +23363,7 @@ Domain allowed access.
10771 </param>
10772 <infoflow type="both" weight="10"/>
10773 </interface>
10774 -<interface name="corenet_udp_send_daap_port" lineno="20942">
10775 +<interface name="corenet_udp_send_daap_port" lineno="20960">
10776 <summary>
10777 Send UDP traffic on the daap port.
10778 </summary>
10779 @@ -23290,7 +23374,7 @@ Domain allowed access.
10780 </param>
10781 <infoflow type="write" weight="10"/>
10782 </interface>
10783 -<interface name="corenet_dontaudit_udp_send_daap_port" lineno="20957">
10784 +<interface name="corenet_dontaudit_udp_send_daap_port" lineno="20975">
10785 <summary>
10786 Do not audit attempts to send UDP traffic on the daap port.
10787 </summary>
10788 @@ -23301,7 +23385,7 @@ Domain to not audit.
10789 </param>
10790 <infoflow type="none"/>
10791 </interface>
10792 -<interface name="corenet_udp_receive_daap_port" lineno="20972">
10793 +<interface name="corenet_udp_receive_daap_port" lineno="20990">
10794 <summary>
10795 Receive UDP traffic on the daap port.
10796 </summary>
10797 @@ -23312,7 +23396,7 @@ Domain allowed access.
10798 </param>
10799 <infoflow type="read" weight="10"/>
10800 </interface>
10801 -<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="20987">
10802 +<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="21005">
10803 <summary>
10804 Do not audit attempts to receive UDP traffic on the daap port.
10805 </summary>
10806 @@ -23323,7 +23407,7 @@ Domain to not audit.
10807 </param>
10808 <infoflow type="none"/>
10809 </interface>
10810 -<interface name="corenet_udp_sendrecv_daap_port" lineno="21002">
10811 +<interface name="corenet_udp_sendrecv_daap_port" lineno="21020">
10812 <summary>
10813 Send and receive UDP traffic on the daap port.
10814 </summary>
10815 @@ -23334,7 +23418,7 @@ Domain allowed access.
10816 </param>
10817 <infoflow type="both" weight="10"/>
10818 </interface>
10819 -<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="21018">
10820 +<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="21036">
10821 <summary>
10822 Do not audit attempts to send and receive
10823 UDP traffic on the daap port.
10824 @@ -23346,7 +23430,7 @@ Domain to not audit.
10825 </param>
10826 <infoflow type="none"/>
10827 </interface>
10828 -<interface name="corenet_tcp_bind_daap_port" lineno="21033">
10829 +<interface name="corenet_tcp_bind_daap_port" lineno="21051">
10830 <summary>
10831 Bind TCP sockets to the daap port.
10832 </summary>
10833 @@ -23357,7 +23441,7 @@ Domain allowed access.
10834 </param>
10835 <infoflow type="none"/>
10836 </interface>
10837 -<interface name="corenet_udp_bind_daap_port" lineno="21053">
10838 +<interface name="corenet_udp_bind_daap_port" lineno="21071">
10839 <summary>
10840 Bind UDP sockets to the daap port.
10841 </summary>
10842 @@ -23368,7 +23452,7 @@ Domain allowed access.
10843 </param>
10844 <infoflow type="none"/>
10845 </interface>
10846 -<interface name="corenet_tcp_connect_daap_port" lineno="21072">
10847 +<interface name="corenet_tcp_connect_daap_port" lineno="21090">
10848 <summary>
10849 Make a TCP connection to the daap port.
10850 </summary>
10851 @@ -23378,7 +23462,7 @@ Domain allowed access.
10852 </summary>
10853 </param>
10854 </interface>
10855 -<interface name="corenet_send_daap_client_packets" lineno="21092">
10856 +<interface name="corenet_send_daap_client_packets" lineno="21110">
10857 <summary>
10858 Send daap_client packets.
10859 </summary>
10860 @@ -23389,7 +23473,7 @@ Domain allowed access.
10861 </param>
10862 <infoflow type="write" weight="10"/>
10863 </interface>
10864 -<interface name="corenet_dontaudit_send_daap_client_packets" lineno="21111">
10865 +<interface name="corenet_dontaudit_send_daap_client_packets" lineno="21129">
10866 <summary>
10867 Do not audit attempts to send daap_client packets.
10868 </summary>
10869 @@ -23400,7 +23484,7 @@ Domain to not audit.
10870 </param>
10871 <infoflow type="none"/>
10872 </interface>
10873 -<interface name="corenet_receive_daap_client_packets" lineno="21130">
10874 +<interface name="corenet_receive_daap_client_packets" lineno="21148">
10875 <summary>
10876 Receive daap_client packets.
10877 </summary>
10878 @@ -23411,7 +23495,7 @@ Domain allowed access.
10879 </param>
10880 <infoflow type="read" weight="10"/>
10881 </interface>
10882 -<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="21149">
10883 +<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="21167">
10884 <summary>
10885 Do not audit attempts to receive daap_client packets.
10886 </summary>
10887 @@ -23422,7 +23506,7 @@ Domain allowed access.
10888 </param>
10889 <infoflow type="none"/>
10890 </interface>
10891 -<interface name="corenet_sendrecv_daap_client_packets" lineno="21168">
10892 +<interface name="corenet_sendrecv_daap_client_packets" lineno="21186">
10893 <summary>
10894 Send and receive daap_client packets.
10895 </summary>
10896 @@ -23433,7 +23517,7 @@ Domain allowed access.
10897 </param>
10898 <infoflow type="both" weight="10"/>
10899 </interface>
10900 -<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="21184">
10901 +<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="21202">
10902 <summary>
10903 Do not audit attempts to send and receive daap_client packets.
10904 </summary>
10905 @@ -23444,7 +23528,7 @@ Domain to not audit.
10906 </param>
10907 <infoflow type="none"/>
10908 </interface>
10909 -<interface name="corenet_relabelto_daap_client_packets" lineno="21199">
10910 +<interface name="corenet_relabelto_daap_client_packets" lineno="21217">
10911 <summary>
10912 Relabel packets to daap_client the packet type.
10913 </summary>
10914 @@ -23454,7 +23538,7 @@ Domain allowed access.
10915 </summary>
10916 </param>
10917 </interface>
10918 -<interface name="corenet_send_daap_server_packets" lineno="21219">
10919 +<interface name="corenet_send_daap_server_packets" lineno="21237">
10920 <summary>
10921 Send daap_server packets.
10922 </summary>
10923 @@ -23465,7 +23549,7 @@ Domain allowed access.
10924 </param>
10925 <infoflow type="write" weight="10"/>
10926 </interface>
10927 -<interface name="corenet_dontaudit_send_daap_server_packets" lineno="21238">
10928 +<interface name="corenet_dontaudit_send_daap_server_packets" lineno="21256">
10929 <summary>
10930 Do not audit attempts to send daap_server packets.
10931 </summary>
10932 @@ -23476,7 +23560,7 @@ Domain to not audit.
10933 </param>
10934 <infoflow type="none"/>
10935 </interface>
10936 -<interface name="corenet_receive_daap_server_packets" lineno="21257">
10937 +<interface name="corenet_receive_daap_server_packets" lineno="21275">
10938 <summary>
10939 Receive daap_server packets.
10940 </summary>
10941 @@ -23487,7 +23571,7 @@ Domain allowed access.
10942 </param>
10943 <infoflow type="read" weight="10"/>
10944 </interface>
10945 -<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="21276">
10946 +<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="21294">
10947 <summary>
10948 Do not audit attempts to receive daap_server packets.
10949 </summary>
10950 @@ -23498,7 +23582,7 @@ Domain allowed access.
10951 </param>
10952 <infoflow type="none"/>
10953 </interface>
10954 -<interface name="corenet_sendrecv_daap_server_packets" lineno="21295">
10955 +<interface name="corenet_sendrecv_daap_server_packets" lineno="21313">
10956 <summary>
10957 Send and receive daap_server packets.
10958 </summary>
10959 @@ -23509,7 +23593,7 @@ Domain allowed access.
10960 </param>
10961 <infoflow type="both" weight="10"/>
10962 </interface>
10963 -<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="21311">
10964 +<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="21329">
10965 <summary>
10966 Do not audit attempts to send and receive daap_server packets.
10967 </summary>
10968 @@ -23520,7 +23604,7 @@ Domain to not audit.
10969 </param>
10970 <infoflow type="none"/>
10971 </interface>
10972 -<interface name="corenet_relabelto_daap_server_packets" lineno="21326">
10973 +<interface name="corenet_relabelto_daap_server_packets" lineno="21344">
10974 <summary>
10975 Relabel packets to daap_server the packet type.
10976 </summary>
10977 @@ -23530,7 +23614,7 @@ Domain allowed access.
10978 </summary>
10979 </param>
10980 </interface>
10981 -<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="21348">
10982 +<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="21366">
10983 <summary>
10984 Send and receive TCP traffic on the dbskkd port.
10985 </summary>
10986 @@ -23541,7 +23625,7 @@ Domain allowed access.
10987 </param>
10988 <infoflow type="both" weight="10"/>
10989 </interface>
10990 -<interface name="corenet_udp_send_dbskkd_port" lineno="21363">
10991 +<interface name="corenet_udp_send_dbskkd_port" lineno="21381">
10992 <summary>
10993 Send UDP traffic on the dbskkd port.
10994 </summary>
10995 @@ -23552,7 +23636,7 @@ Domain allowed access.
10996 </param>
10997 <infoflow type="write" weight="10"/>
10998 </interface>
10999 -<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="21378">
11000 +<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="21396">
11001 <summary>
11002 Do not audit attempts to send UDP traffic on the dbskkd port.
11003 </summary>
11004 @@ -23563,7 +23647,7 @@ Domain to not audit.
11005 </param>
11006 <infoflow type="none"/>
11007 </interface>
11008 -<interface name="corenet_udp_receive_dbskkd_port" lineno="21393">
11009 +<interface name="corenet_udp_receive_dbskkd_port" lineno="21411">
11010 <summary>
11011 Receive UDP traffic on the dbskkd port.
11012 </summary>
11013 @@ -23574,7 +23658,7 @@ Domain allowed access.
11014 </param>
11015 <infoflow type="read" weight="10"/>
11016 </interface>
11017 -<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="21408">
11018 +<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="21426">
11019 <summary>
11020 Do not audit attempts to receive UDP traffic on the dbskkd port.
11021 </summary>
11022 @@ -23585,7 +23669,7 @@ Domain to not audit.
11023 </param>
11024 <infoflow type="none"/>
11025 </interface>
11026 -<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="21423">
11027 +<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="21441">
11028 <summary>
11029 Send and receive UDP traffic on the dbskkd port.
11030 </summary>
11031 @@ -23596,7 +23680,7 @@ Domain allowed access.
11032 </param>
11033 <infoflow type="both" weight="10"/>
11034 </interface>
11035 -<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="21439">
11036 +<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="21457">
11037 <summary>
11038 Do not audit attempts to send and receive
11039 UDP traffic on the dbskkd port.
11040 @@ -23608,7 +23692,7 @@ Domain to not audit.
11041 </param>
11042 <infoflow type="none"/>
11043 </interface>
11044 -<interface name="corenet_tcp_bind_dbskkd_port" lineno="21454">
11045 +<interface name="corenet_tcp_bind_dbskkd_port" lineno="21472">
11046 <summary>
11047 Bind TCP sockets to the dbskkd port.
11048 </summary>
11049 @@ -23619,7 +23703,7 @@ Domain allowed access.
11050 </param>
11051 <infoflow type="none"/>
11052 </interface>
11053 -<interface name="corenet_udp_bind_dbskkd_port" lineno="21474">
11054 +<interface name="corenet_udp_bind_dbskkd_port" lineno="21492">
11055 <summary>
11056 Bind UDP sockets to the dbskkd port.
11057 </summary>
11058 @@ -23630,7 +23714,7 @@ Domain allowed access.
11059 </param>
11060 <infoflow type="none"/>
11061 </interface>
11062 -<interface name="corenet_tcp_connect_dbskkd_port" lineno="21493">
11063 +<interface name="corenet_tcp_connect_dbskkd_port" lineno="21511">
11064 <summary>
11065 Make a TCP connection to the dbskkd port.
11066 </summary>
11067 @@ -23640,7 +23724,7 @@ Domain allowed access.
11068 </summary>
11069 </param>
11070 </interface>
11071 -<interface name="corenet_send_dbskkd_client_packets" lineno="21513">
11072 +<interface name="corenet_send_dbskkd_client_packets" lineno="21531">
11073 <summary>
11074 Send dbskkd_client packets.
11075 </summary>
11076 @@ -23651,7 +23735,7 @@ Domain allowed access.
11077 </param>
11078 <infoflow type="write" weight="10"/>
11079 </interface>
11080 -<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="21532">
11081 +<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="21550">
11082 <summary>
11083 Do not audit attempts to send dbskkd_client packets.
11084 </summary>
11085 @@ -23662,7 +23746,7 @@ Domain to not audit.
11086 </param>
11087 <infoflow type="none"/>
11088 </interface>
11089 -<interface name="corenet_receive_dbskkd_client_packets" lineno="21551">
11090 +<interface name="corenet_receive_dbskkd_client_packets" lineno="21569">
11091 <summary>
11092 Receive dbskkd_client packets.
11093 </summary>
11094 @@ -23673,7 +23757,7 @@ Domain allowed access.
11095 </param>
11096 <infoflow type="read" weight="10"/>
11097 </interface>
11098 -<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="21570">
11099 +<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="21588">
11100 <summary>
11101 Do not audit attempts to receive dbskkd_client packets.
11102 </summary>
11103 @@ -23684,7 +23768,7 @@ Domain allowed access.
11104 </param>
11105 <infoflow type="none"/>
11106 </interface>
11107 -<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="21589">
11108 +<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="21607">
11109 <summary>
11110 Send and receive dbskkd_client packets.
11111 </summary>
11112 @@ -23695,7 +23779,7 @@ Domain allowed access.
11113 </param>
11114 <infoflow type="both" weight="10"/>
11115 </interface>
11116 -<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="21605">
11117 +<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="21623">
11118 <summary>
11119 Do not audit attempts to send and receive dbskkd_client packets.
11120 </summary>
11121 @@ -23706,7 +23790,7 @@ Domain to not audit.
11122 </param>
11123 <infoflow type="none"/>
11124 </interface>
11125 -<interface name="corenet_relabelto_dbskkd_client_packets" lineno="21620">
11126 +<interface name="corenet_relabelto_dbskkd_client_packets" lineno="21638">
11127 <summary>
11128 Relabel packets to dbskkd_client the packet type.
11129 </summary>
11130 @@ -23716,7 +23800,7 @@ Domain allowed access.
11131 </summary>
11132 </param>
11133 </interface>
11134 -<interface name="corenet_send_dbskkd_server_packets" lineno="21640">
11135 +<interface name="corenet_send_dbskkd_server_packets" lineno="21658">
11136 <summary>
11137 Send dbskkd_server packets.
11138 </summary>
11139 @@ -23727,7 +23811,7 @@ Domain allowed access.
11140 </param>
11141 <infoflow type="write" weight="10"/>
11142 </interface>
11143 -<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="21659">
11144 +<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="21677">
11145 <summary>
11146 Do not audit attempts to send dbskkd_server packets.
11147 </summary>
11148 @@ -23738,7 +23822,7 @@ Domain to not audit.
11149 </param>
11150 <infoflow type="none"/>
11151 </interface>
11152 -<interface name="corenet_receive_dbskkd_server_packets" lineno="21678">
11153 +<interface name="corenet_receive_dbskkd_server_packets" lineno="21696">
11154 <summary>
11155 Receive dbskkd_server packets.
11156 </summary>
11157 @@ -23749,7 +23833,7 @@ Domain allowed access.
11158 </param>
11159 <infoflow type="read" weight="10"/>
11160 </interface>
11161 -<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="21697">
11162 +<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="21715">
11163 <summary>
11164 Do not audit attempts to receive dbskkd_server packets.
11165 </summary>
11166 @@ -23760,7 +23844,7 @@ Domain allowed access.
11167 </param>
11168 <infoflow type="none"/>
11169 </interface>
11170 -<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="21716">
11171 +<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="21734">
11172 <summary>
11173 Send and receive dbskkd_server packets.
11174 </summary>
11175 @@ -23771,7 +23855,7 @@ Domain allowed access.
11176 </param>
11177 <infoflow type="both" weight="10"/>
11178 </interface>
11179 -<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="21732">
11180 +<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="21750">
11181 <summary>
11182 Do not audit attempts to send and receive dbskkd_server packets.
11183 </summary>
11184 @@ -23782,7 +23866,7 @@ Domain to not audit.
11185 </param>
11186 <infoflow type="none"/>
11187 </interface>
11188 -<interface name="corenet_relabelto_dbskkd_server_packets" lineno="21747">
11189 +<interface name="corenet_relabelto_dbskkd_server_packets" lineno="21765">
11190 <summary>
11191 Relabel packets to dbskkd_server the packet type.
11192 </summary>
11193 @@ -23792,7 +23876,7 @@ Domain allowed access.
11194 </summary>
11195 </param>
11196 </interface>
11197 -<interface name="corenet_tcp_sendrecv_dcc_port" lineno="21769">
11198 +<interface name="corenet_tcp_sendrecv_dcc_port" lineno="21787">
11199 <summary>
11200 Send and receive TCP traffic on the dcc port.
11201 </summary>
11202 @@ -23803,7 +23887,7 @@ Domain allowed access.
11203 </param>
11204 <infoflow type="both" weight="10"/>
11205 </interface>
11206 -<interface name="corenet_udp_send_dcc_port" lineno="21784">
11207 +<interface name="corenet_udp_send_dcc_port" lineno="21802">
11208 <summary>
11209 Send UDP traffic on the dcc port.
11210 </summary>
11211 @@ -23814,7 +23898,7 @@ Domain allowed access.
11212 </param>
11213 <infoflow type="write" weight="10"/>
11214 </interface>
11215 -<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="21799">
11216 +<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="21817">
11217 <summary>
11218 Do not audit attempts to send UDP traffic on the dcc port.
11219 </summary>
11220 @@ -23825,7 +23909,7 @@ Domain to not audit.
11221 </param>
11222 <infoflow type="none"/>
11223 </interface>
11224 -<interface name="corenet_udp_receive_dcc_port" lineno="21814">
11225 +<interface name="corenet_udp_receive_dcc_port" lineno="21832">
11226 <summary>
11227 Receive UDP traffic on the dcc port.
11228 </summary>
11229 @@ -23836,7 +23920,7 @@ Domain allowed access.
11230 </param>
11231 <infoflow type="read" weight="10"/>
11232 </interface>
11233 -<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="21829">
11234 +<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="21847">
11235 <summary>
11236 Do not audit attempts to receive UDP traffic on the dcc port.
11237 </summary>
11238 @@ -23847,7 +23931,7 @@ Domain to not audit.
11239 </param>
11240 <infoflow type="none"/>
11241 </interface>
11242 -<interface name="corenet_udp_sendrecv_dcc_port" lineno="21844">
11243 +<interface name="corenet_udp_sendrecv_dcc_port" lineno="21862">
11244 <summary>
11245 Send and receive UDP traffic on the dcc port.
11246 </summary>
11247 @@ -23858,7 +23942,7 @@ Domain allowed access.
11248 </param>
11249 <infoflow type="both" weight="10"/>
11250 </interface>
11251 -<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="21860">
11252 +<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="21878">
11253 <summary>
11254 Do not audit attempts to send and receive
11255 UDP traffic on the dcc port.
11256 @@ -23870,7 +23954,7 @@ Domain to not audit.
11257 </param>
11258 <infoflow type="none"/>
11259 </interface>
11260 -<interface name="corenet_tcp_bind_dcc_port" lineno="21875">
11261 +<interface name="corenet_tcp_bind_dcc_port" lineno="21893">
11262 <summary>
11263 Bind TCP sockets to the dcc port.
11264 </summary>
11265 @@ -23881,7 +23965,7 @@ Domain allowed access.
11266 </param>
11267 <infoflow type="none"/>
11268 </interface>
11269 -<interface name="corenet_udp_bind_dcc_port" lineno="21895">
11270 +<interface name="corenet_udp_bind_dcc_port" lineno="21913">
11271 <summary>
11272 Bind UDP sockets to the dcc port.
11273 </summary>
11274 @@ -23892,7 +23976,7 @@ Domain allowed access.
11275 </param>
11276 <infoflow type="none"/>
11277 </interface>
11278 -<interface name="corenet_tcp_connect_dcc_port" lineno="21914">
11279 +<interface name="corenet_tcp_connect_dcc_port" lineno="21932">
11280 <summary>
11281 Make a TCP connection to the dcc port.
11282 </summary>
11283 @@ -23902,7 +23986,7 @@ Domain allowed access.
11284 </summary>
11285 </param>
11286 </interface>
11287 -<interface name="corenet_send_dcc_client_packets" lineno="21934">
11288 +<interface name="corenet_send_dcc_client_packets" lineno="21952">
11289 <summary>
11290 Send dcc_client packets.
11291 </summary>
11292 @@ -23913,7 +23997,7 @@ Domain allowed access.
11293 </param>
11294 <infoflow type="write" weight="10"/>
11295 </interface>
11296 -<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="21953">
11297 +<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="21971">
11298 <summary>
11299 Do not audit attempts to send dcc_client packets.
11300 </summary>
11301 @@ -23924,7 +24008,7 @@ Domain to not audit.
11302 </param>
11303 <infoflow type="none"/>
11304 </interface>
11305 -<interface name="corenet_receive_dcc_client_packets" lineno="21972">
11306 +<interface name="corenet_receive_dcc_client_packets" lineno="21990">
11307 <summary>
11308 Receive dcc_client packets.
11309 </summary>
11310 @@ -23935,7 +24019,7 @@ Domain allowed access.
11311 </param>
11312 <infoflow type="read" weight="10"/>
11313 </interface>
11314 -<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="21991">
11315 +<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="22009">
11316 <summary>
11317 Do not audit attempts to receive dcc_client packets.
11318 </summary>
11319 @@ -23946,7 +24030,7 @@ Domain allowed access.
11320 </param>
11321 <infoflow type="none"/>
11322 </interface>
11323 -<interface name="corenet_sendrecv_dcc_client_packets" lineno="22010">
11324 +<interface name="corenet_sendrecv_dcc_client_packets" lineno="22028">
11325 <summary>
11326 Send and receive dcc_client packets.
11327 </summary>
11328 @@ -23957,7 +24041,7 @@ Domain allowed access.
11329 </param>
11330 <infoflow type="both" weight="10"/>
11331 </interface>
11332 -<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="22026">
11333 +<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="22044">
11334 <summary>
11335 Do not audit attempts to send and receive dcc_client packets.
11336 </summary>
11337 @@ -23968,7 +24052,7 @@ Domain to not audit.
11338 </param>
11339 <infoflow type="none"/>
11340 </interface>
11341 -<interface name="corenet_relabelto_dcc_client_packets" lineno="22041">
11342 +<interface name="corenet_relabelto_dcc_client_packets" lineno="22059">
11343 <summary>
11344 Relabel packets to dcc_client the packet type.
11345 </summary>
11346 @@ -23978,7 +24062,7 @@ Domain allowed access.
11347 </summary>
11348 </param>
11349 </interface>
11350 -<interface name="corenet_send_dcc_server_packets" lineno="22061">
11351 +<interface name="corenet_send_dcc_server_packets" lineno="22079">
11352 <summary>
11353 Send dcc_server packets.
11354 </summary>
11355 @@ -23989,7 +24073,7 @@ Domain allowed access.
11356 </param>
11357 <infoflow type="write" weight="10"/>
11358 </interface>
11359 -<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="22080">
11360 +<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="22098">
11361 <summary>
11362 Do not audit attempts to send dcc_server packets.
11363 </summary>
11364 @@ -24000,7 +24084,7 @@ Domain to not audit.
11365 </param>
11366 <infoflow type="none"/>
11367 </interface>
11368 -<interface name="corenet_receive_dcc_server_packets" lineno="22099">
11369 +<interface name="corenet_receive_dcc_server_packets" lineno="22117">
11370 <summary>
11371 Receive dcc_server packets.
11372 </summary>
11373 @@ -24011,7 +24095,7 @@ Domain allowed access.
11374 </param>
11375 <infoflow type="read" weight="10"/>
11376 </interface>
11377 -<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="22118">
11378 +<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="22136">
11379 <summary>
11380 Do not audit attempts to receive dcc_server packets.
11381 </summary>
11382 @@ -24022,7 +24106,7 @@ Domain allowed access.
11383 </param>
11384 <infoflow type="none"/>
11385 </interface>
11386 -<interface name="corenet_sendrecv_dcc_server_packets" lineno="22137">
11387 +<interface name="corenet_sendrecv_dcc_server_packets" lineno="22155">
11388 <summary>
11389 Send and receive dcc_server packets.
11390 </summary>
11391 @@ -24033,7 +24117,7 @@ Domain allowed access.
11392 </param>
11393 <infoflow type="both" weight="10"/>
11394 </interface>
11395 -<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="22153">
11396 +<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="22171">
11397 <summary>
11398 Do not audit attempts to send and receive dcc_server packets.
11399 </summary>
11400 @@ -24044,7 +24128,7 @@ Domain to not audit.
11401 </param>
11402 <infoflow type="none"/>
11403 </interface>
11404 -<interface name="corenet_relabelto_dcc_server_packets" lineno="22168">
11405 +<interface name="corenet_relabelto_dcc_server_packets" lineno="22186">
11406 <summary>
11407 Relabel packets to dcc_server the packet type.
11408 </summary>
11409 @@ -24054,7 +24138,7 @@ Domain allowed access.
11410 </summary>
11411 </param>
11412 </interface>
11413 -<interface name="corenet_tcp_sendrecv_dccm_port" lineno="22190">
11414 +<interface name="corenet_tcp_sendrecv_dccm_port" lineno="22208">
11415 <summary>
11416 Send and receive TCP traffic on the dccm port.
11417 </summary>
11418 @@ -24065,7 +24149,7 @@ Domain allowed access.
11419 </param>
11420 <infoflow type="both" weight="10"/>
11421 </interface>
11422 -<interface name="corenet_udp_send_dccm_port" lineno="22205">
11423 +<interface name="corenet_udp_send_dccm_port" lineno="22223">
11424 <summary>
11425 Send UDP traffic on the dccm port.
11426 </summary>
11427 @@ -24076,7 +24160,7 @@ Domain allowed access.
11428 </param>
11429 <infoflow type="write" weight="10"/>
11430 </interface>
11431 -<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="22220">
11432 +<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="22238">
11433 <summary>
11434 Do not audit attempts to send UDP traffic on the dccm port.
11435 </summary>
11436 @@ -24087,7 +24171,7 @@ Domain to not audit.
11437 </param>
11438 <infoflow type="none"/>
11439 </interface>
11440 -<interface name="corenet_udp_receive_dccm_port" lineno="22235">
11441 +<interface name="corenet_udp_receive_dccm_port" lineno="22253">
11442 <summary>
11443 Receive UDP traffic on the dccm port.
11444 </summary>
11445 @@ -24098,7 +24182,7 @@ Domain allowed access.
11446 </param>
11447 <infoflow type="read" weight="10"/>
11448 </interface>
11449 -<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="22250">
11450 +<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="22268">
11451 <summary>
11452 Do not audit attempts to receive UDP traffic on the dccm port.
11453 </summary>
11454 @@ -24109,7 +24193,7 @@ Domain to not audit.
11455 </param>
11456 <infoflow type="none"/>
11457 </interface>
11458 -<interface name="corenet_udp_sendrecv_dccm_port" lineno="22265">
11459 +<interface name="corenet_udp_sendrecv_dccm_port" lineno="22283">
11460 <summary>
11461 Send and receive UDP traffic on the dccm port.
11462 </summary>
11463 @@ -24120,7 +24204,7 @@ Domain allowed access.
11464 </param>
11465 <infoflow type="both" weight="10"/>
11466 </interface>
11467 -<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="22281">
11468 +<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="22299">
11469 <summary>
11470 Do not audit attempts to send and receive
11471 UDP traffic on the dccm port.
11472 @@ -24132,7 +24216,7 @@ Domain to not audit.
11473 </param>
11474 <infoflow type="none"/>
11475 </interface>
11476 -<interface name="corenet_tcp_bind_dccm_port" lineno="22296">
11477 +<interface name="corenet_tcp_bind_dccm_port" lineno="22314">
11478 <summary>
11479 Bind TCP sockets to the dccm port.
11480 </summary>
11481 @@ -24143,7 +24227,7 @@ Domain allowed access.
11482 </param>
11483 <infoflow type="none"/>
11484 </interface>
11485 -<interface name="corenet_udp_bind_dccm_port" lineno="22316">
11486 +<interface name="corenet_udp_bind_dccm_port" lineno="22334">
11487 <summary>
11488 Bind UDP sockets to the dccm port.
11489 </summary>
11490 @@ -24154,7 +24238,7 @@ Domain allowed access.
11491 </param>
11492 <infoflow type="none"/>
11493 </interface>
11494 -<interface name="corenet_tcp_connect_dccm_port" lineno="22335">
11495 +<interface name="corenet_tcp_connect_dccm_port" lineno="22353">
11496 <summary>
11497 Make a TCP connection to the dccm port.
11498 </summary>
11499 @@ -24164,7 +24248,7 @@ Domain allowed access.
11500 </summary>
11501 </param>
11502 </interface>
11503 -<interface name="corenet_send_dccm_client_packets" lineno="22355">
11504 +<interface name="corenet_send_dccm_client_packets" lineno="22373">
11505 <summary>
11506 Send dccm_client packets.
11507 </summary>
11508 @@ -24175,7 +24259,7 @@ Domain allowed access.
11509 </param>
11510 <infoflow type="write" weight="10"/>
11511 </interface>
11512 -<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="22374">
11513 +<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="22392">
11514 <summary>
11515 Do not audit attempts to send dccm_client packets.
11516 </summary>
11517 @@ -24186,7 +24270,7 @@ Domain to not audit.
11518 </param>
11519 <infoflow type="none"/>
11520 </interface>
11521 -<interface name="corenet_receive_dccm_client_packets" lineno="22393">
11522 +<interface name="corenet_receive_dccm_client_packets" lineno="22411">
11523 <summary>
11524 Receive dccm_client packets.
11525 </summary>
11526 @@ -24197,7 +24281,7 @@ Domain allowed access.
11527 </param>
11528 <infoflow type="read" weight="10"/>
11529 </interface>
11530 -<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="22412">
11531 +<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="22430">
11532 <summary>
11533 Do not audit attempts to receive dccm_client packets.
11534 </summary>
11535 @@ -24208,7 +24292,7 @@ Domain allowed access.
11536 </param>
11537 <infoflow type="none"/>
11538 </interface>
11539 -<interface name="corenet_sendrecv_dccm_client_packets" lineno="22431">
11540 +<interface name="corenet_sendrecv_dccm_client_packets" lineno="22449">
11541 <summary>
11542 Send and receive dccm_client packets.
11543 </summary>
11544 @@ -24219,7 +24303,7 @@ Domain allowed access.
11545 </param>
11546 <infoflow type="both" weight="10"/>
11547 </interface>
11548 -<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="22447">
11549 +<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="22465">
11550 <summary>
11551 Do not audit attempts to send and receive dccm_client packets.
11552 </summary>
11553 @@ -24230,7 +24314,7 @@ Domain to not audit.
11554 </param>
11555 <infoflow type="none"/>
11556 </interface>
11557 -<interface name="corenet_relabelto_dccm_client_packets" lineno="22462">
11558 +<interface name="corenet_relabelto_dccm_client_packets" lineno="22480">
11559 <summary>
11560 Relabel packets to dccm_client the packet type.
11561 </summary>
11562 @@ -24240,7 +24324,7 @@ Domain allowed access.
11563 </summary>
11564 </param>
11565 </interface>
11566 -<interface name="corenet_send_dccm_server_packets" lineno="22482">
11567 +<interface name="corenet_send_dccm_server_packets" lineno="22500">
11568 <summary>
11569 Send dccm_server packets.
11570 </summary>
11571 @@ -24251,7 +24335,7 @@ Domain allowed access.
11572 </param>
11573 <infoflow type="write" weight="10"/>
11574 </interface>
11575 -<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="22501">
11576 +<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="22519">
11577 <summary>
11578 Do not audit attempts to send dccm_server packets.
11579 </summary>
11580 @@ -24262,7 +24346,7 @@ Domain to not audit.
11581 </param>
11582 <infoflow type="none"/>
11583 </interface>
11584 -<interface name="corenet_receive_dccm_server_packets" lineno="22520">
11585 +<interface name="corenet_receive_dccm_server_packets" lineno="22538">
11586 <summary>
11587 Receive dccm_server packets.
11588 </summary>
11589 @@ -24273,7 +24357,7 @@ Domain allowed access.
11590 </param>
11591 <infoflow type="read" weight="10"/>
11592 </interface>
11593 -<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="22539">
11594 +<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="22557">
11595 <summary>
11596 Do not audit attempts to receive dccm_server packets.
11597 </summary>
11598 @@ -24284,7 +24368,7 @@ Domain allowed access.
11599 </param>
11600 <infoflow type="none"/>
11601 </interface>
11602 -<interface name="corenet_sendrecv_dccm_server_packets" lineno="22558">
11603 +<interface name="corenet_sendrecv_dccm_server_packets" lineno="22576">
11604 <summary>
11605 Send and receive dccm_server packets.
11606 </summary>
11607 @@ -24295,7 +24379,7 @@ Domain allowed access.
11608 </param>
11609 <infoflow type="both" weight="10"/>
11610 </interface>
11611 -<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="22574">
11612 +<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="22592">
11613 <summary>
11614 Do not audit attempts to send and receive dccm_server packets.
11615 </summary>
11616 @@ -24306,7 +24390,7 @@ Domain to not audit.
11617 </param>
11618 <infoflow type="none"/>
11619 </interface>
11620 -<interface name="corenet_relabelto_dccm_server_packets" lineno="22589">
11621 +<interface name="corenet_relabelto_dccm_server_packets" lineno="22607">
11622 <summary>
11623 Relabel packets to dccm_server the packet type.
11624 </summary>
11625 @@ -24316,7 +24400,7 @@ Domain allowed access.
11626 </summary>
11627 </param>
11628 </interface>
11629 -<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="22611">
11630 +<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="22629">
11631 <summary>
11632 Send and receive TCP traffic on the dhcpc port.
11633 </summary>
11634 @@ -24327,7 +24411,7 @@ Domain allowed access.
11635 </param>
11636 <infoflow type="both" weight="10"/>
11637 </interface>
11638 -<interface name="corenet_udp_send_dhcpc_port" lineno="22626">
11639 +<interface name="corenet_udp_send_dhcpc_port" lineno="22644">
11640 <summary>
11641 Send UDP traffic on the dhcpc port.
11642 </summary>
11643 @@ -24338,7 +24422,7 @@ Domain allowed access.
11644 </param>
11645 <infoflow type="write" weight="10"/>
11646 </interface>
11647 -<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="22641">
11648 +<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="22659">
11649 <summary>
11650 Do not audit attempts to send UDP traffic on the dhcpc port.
11651 </summary>
11652 @@ -24349,7 +24433,7 @@ Domain to not audit.
11653 </param>
11654 <infoflow type="none"/>
11655 </interface>
11656 -<interface name="corenet_udp_receive_dhcpc_port" lineno="22656">
11657 +<interface name="corenet_udp_receive_dhcpc_port" lineno="22674">
11658 <summary>
11659 Receive UDP traffic on the dhcpc port.
11660 </summary>
11661 @@ -24360,7 +24444,7 @@ Domain allowed access.
11662 </param>
11663 <infoflow type="read" weight="10"/>
11664 </interface>
11665 -<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="22671">
11666 +<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="22689">
11667 <summary>
11668 Do not audit attempts to receive UDP traffic on the dhcpc port.
11669 </summary>
11670 @@ -24371,7 +24455,7 @@ Domain to not audit.
11671 </param>
11672 <infoflow type="none"/>
11673 </interface>
11674 -<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="22686">
11675 +<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="22704">
11676 <summary>
11677 Send and receive UDP traffic on the dhcpc port.
11678 </summary>
11679 @@ -24382,7 +24466,7 @@ Domain allowed access.
11680 </param>
11681 <infoflow type="both" weight="10"/>
11682 </interface>
11683 -<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="22702">
11684 +<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="22720">
11685 <summary>
11686 Do not audit attempts to send and receive
11687 UDP traffic on the dhcpc port.
11688 @@ -24394,7 +24478,7 @@ Domain to not audit.
11689 </param>
11690 <infoflow type="none"/>
11691 </interface>
11692 -<interface name="corenet_tcp_bind_dhcpc_port" lineno="22717">
11693 +<interface name="corenet_tcp_bind_dhcpc_port" lineno="22735">
11694 <summary>
11695 Bind TCP sockets to the dhcpc port.
11696 </summary>
11697 @@ -24405,7 +24489,7 @@ Domain allowed access.
11698 </param>
11699 <infoflow type="none"/>
11700 </interface>
11701 -<interface name="corenet_udp_bind_dhcpc_port" lineno="22737">
11702 +<interface name="corenet_udp_bind_dhcpc_port" lineno="22755">
11703 <summary>
11704 Bind UDP sockets to the dhcpc port.
11705 </summary>
11706 @@ -24416,7 +24500,7 @@ Domain allowed access.
11707 </param>
11708 <infoflow type="none"/>
11709 </interface>
11710 -<interface name="corenet_tcp_connect_dhcpc_port" lineno="22756">
11711 +<interface name="corenet_tcp_connect_dhcpc_port" lineno="22774">
11712 <summary>
11713 Make a TCP connection to the dhcpc port.
11714 </summary>
11715 @@ -24426,7 +24510,7 @@ Domain allowed access.
11716 </summary>
11717 </param>
11718 </interface>
11719 -<interface name="corenet_send_dhcpc_client_packets" lineno="22776">
11720 +<interface name="corenet_send_dhcpc_client_packets" lineno="22794">
11721 <summary>
11722 Send dhcpc_client packets.
11723 </summary>
11724 @@ -24437,7 +24521,7 @@ Domain allowed access.
11725 </param>
11726 <infoflow type="write" weight="10"/>
11727 </interface>
11728 -<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="22795">
11729 +<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="22813">
11730 <summary>
11731 Do not audit attempts to send dhcpc_client packets.
11732 </summary>
11733 @@ -24448,7 +24532,7 @@ Domain to not audit.
11734 </param>
11735 <infoflow type="none"/>
11736 </interface>
11737 -<interface name="corenet_receive_dhcpc_client_packets" lineno="22814">
11738 +<interface name="corenet_receive_dhcpc_client_packets" lineno="22832">
11739 <summary>
11740 Receive dhcpc_client packets.
11741 </summary>
11742 @@ -24459,7 +24543,7 @@ Domain allowed access.
11743 </param>
11744 <infoflow type="read" weight="10"/>
11745 </interface>
11746 -<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="22833">
11747 +<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="22851">
11748 <summary>
11749 Do not audit attempts to receive dhcpc_client packets.
11750 </summary>
11751 @@ -24470,7 +24554,7 @@ Domain allowed access.
11752 </param>
11753 <infoflow type="none"/>
11754 </interface>
11755 -<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="22852">
11756 +<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="22870">
11757 <summary>
11758 Send and receive dhcpc_client packets.
11759 </summary>
11760 @@ -24481,7 +24565,7 @@ Domain allowed access.
11761 </param>
11762 <infoflow type="both" weight="10"/>
11763 </interface>
11764 -<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="22868">
11765 +<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="22886">
11766 <summary>
11767 Do not audit attempts to send and receive dhcpc_client packets.
11768 </summary>
11769 @@ -24492,7 +24576,7 @@ Domain to not audit.
11770 </param>
11771 <infoflow type="none"/>
11772 </interface>
11773 -<interface name="corenet_relabelto_dhcpc_client_packets" lineno="22883">
11774 +<interface name="corenet_relabelto_dhcpc_client_packets" lineno="22901">
11775 <summary>
11776 Relabel packets to dhcpc_client the packet type.
11777 </summary>
11778 @@ -24502,7 +24586,7 @@ Domain allowed access.
11779 </summary>
11780 </param>
11781 </interface>
11782 -<interface name="corenet_send_dhcpc_server_packets" lineno="22903">
11783 +<interface name="corenet_send_dhcpc_server_packets" lineno="22921">
11784 <summary>
11785 Send dhcpc_server packets.
11786 </summary>
11787 @@ -24513,7 +24597,7 @@ Domain allowed access.
11788 </param>
11789 <infoflow type="write" weight="10"/>
11790 </interface>
11791 -<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="22922">
11792 +<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="22940">
11793 <summary>
11794 Do not audit attempts to send dhcpc_server packets.
11795 </summary>
11796 @@ -24524,7 +24608,7 @@ Domain to not audit.
11797 </param>
11798 <infoflow type="none"/>
11799 </interface>
11800 -<interface name="corenet_receive_dhcpc_server_packets" lineno="22941">
11801 +<interface name="corenet_receive_dhcpc_server_packets" lineno="22959">
11802 <summary>
11803 Receive dhcpc_server packets.
11804 </summary>
11805 @@ -24535,7 +24619,7 @@ Domain allowed access.
11806 </param>
11807 <infoflow type="read" weight="10"/>
11808 </interface>
11809 -<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="22960">
11810 +<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="22978">
11811 <summary>
11812 Do not audit attempts to receive dhcpc_server packets.
11813 </summary>
11814 @@ -24546,7 +24630,7 @@ Domain allowed access.
11815 </param>
11816 <infoflow type="none"/>
11817 </interface>
11818 -<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="22979">
11819 +<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="22997">
11820 <summary>
11821 Send and receive dhcpc_server packets.
11822 </summary>
11823 @@ -24557,7 +24641,7 @@ Domain allowed access.
11824 </param>
11825 <infoflow type="both" weight="10"/>
11826 </interface>
11827 -<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="22995">
11828 +<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="23013">
11829 <summary>
11830 Do not audit attempts to send and receive dhcpc_server packets.
11831 </summary>
11832 @@ -24568,7 +24652,7 @@ Domain to not audit.
11833 </param>
11834 <infoflow type="none"/>
11835 </interface>
11836 -<interface name="corenet_relabelto_dhcpc_server_packets" lineno="23010">
11837 +<interface name="corenet_relabelto_dhcpc_server_packets" lineno="23028">
11838 <summary>
11839 Relabel packets to dhcpc_server the packet type.
11840 </summary>
11841 @@ -24578,7 +24662,7 @@ Domain allowed access.
11842 </summary>
11843 </param>
11844 </interface>
11845 -<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="23032">
11846 +<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="23050">
11847 <summary>
11848 Send and receive TCP traffic on the dhcpd port.
11849 </summary>
11850 @@ -24589,7 +24673,7 @@ Domain allowed access.
11851 </param>
11852 <infoflow type="both" weight="10"/>
11853 </interface>
11854 -<interface name="corenet_udp_send_dhcpd_port" lineno="23047">
11855 +<interface name="corenet_udp_send_dhcpd_port" lineno="23065">
11856 <summary>
11857 Send UDP traffic on the dhcpd port.
11858 </summary>
11859 @@ -24600,7 +24684,7 @@ Domain allowed access.
11860 </param>
11861 <infoflow type="write" weight="10"/>
11862 </interface>
11863 -<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="23062">
11864 +<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="23080">
11865 <summary>
11866 Do not audit attempts to send UDP traffic on the dhcpd port.
11867 </summary>
11868 @@ -24611,7 +24695,7 @@ Domain to not audit.
11869 </param>
11870 <infoflow type="none"/>
11871 </interface>
11872 -<interface name="corenet_udp_receive_dhcpd_port" lineno="23077">
11873 +<interface name="corenet_udp_receive_dhcpd_port" lineno="23095">
11874 <summary>
11875 Receive UDP traffic on the dhcpd port.
11876 </summary>
11877 @@ -24622,7 +24706,7 @@ Domain allowed access.
11878 </param>
11879 <infoflow type="read" weight="10"/>
11880 </interface>
11881 -<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="23092">
11882 +<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="23110">
11883 <summary>
11884 Do not audit attempts to receive UDP traffic on the dhcpd port.
11885 </summary>
11886 @@ -24633,7 +24717,7 @@ Domain to not audit.
11887 </param>
11888 <infoflow type="none"/>
11889 </interface>
11890 -<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="23107">
11891 +<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="23125">
11892 <summary>
11893 Send and receive UDP traffic on the dhcpd port.
11894 </summary>
11895 @@ -24644,7 +24728,7 @@ Domain allowed access.
11896 </param>
11897 <infoflow type="both" weight="10"/>
11898 </interface>
11899 -<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="23123">
11900 +<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="23141">
11901 <summary>
11902 Do not audit attempts to send and receive
11903 UDP traffic on the dhcpd port.
11904 @@ -24656,7 +24740,7 @@ Domain to not audit.
11905 </param>
11906 <infoflow type="none"/>
11907 </interface>
11908 -<interface name="corenet_tcp_bind_dhcpd_port" lineno="23138">
11909 +<interface name="corenet_tcp_bind_dhcpd_port" lineno="23156">
11910 <summary>
11911 Bind TCP sockets to the dhcpd port.
11912 </summary>
11913 @@ -24667,7 +24751,7 @@ Domain allowed access.
11914 </param>
11915 <infoflow type="none"/>
11916 </interface>
11917 -<interface name="corenet_udp_bind_dhcpd_port" lineno="23158">
11918 +<interface name="corenet_udp_bind_dhcpd_port" lineno="23176">
11919 <summary>
11920 Bind UDP sockets to the dhcpd port.
11921 </summary>
11922 @@ -24678,7 +24762,7 @@ Domain allowed access.
11923 </param>
11924 <infoflow type="none"/>
11925 </interface>
11926 -<interface name="corenet_tcp_connect_dhcpd_port" lineno="23177">
11927 +<interface name="corenet_tcp_connect_dhcpd_port" lineno="23195">
11928 <summary>
11929 Make a TCP connection to the dhcpd port.
11930 </summary>
11931 @@ -24688,7 +24772,7 @@ Domain allowed access.
11932 </summary>
11933 </param>
11934 </interface>
11935 -<interface name="corenet_send_dhcpd_client_packets" lineno="23197">
11936 +<interface name="corenet_send_dhcpd_client_packets" lineno="23215">
11937 <summary>
11938 Send dhcpd_client packets.
11939 </summary>
11940 @@ -24699,7 +24783,7 @@ Domain allowed access.
11941 </param>
11942 <infoflow type="write" weight="10"/>
11943 </interface>
11944 -<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="23216">
11945 +<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="23234">
11946 <summary>
11947 Do not audit attempts to send dhcpd_client packets.
11948 </summary>
11949 @@ -24710,7 +24794,7 @@ Domain to not audit.
11950 </param>
11951 <infoflow type="none"/>
11952 </interface>
11953 -<interface name="corenet_receive_dhcpd_client_packets" lineno="23235">
11954 +<interface name="corenet_receive_dhcpd_client_packets" lineno="23253">
11955 <summary>
11956 Receive dhcpd_client packets.
11957 </summary>
11958 @@ -24721,7 +24805,7 @@ Domain allowed access.
11959 </param>
11960 <infoflow type="read" weight="10"/>
11961 </interface>
11962 -<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="23254">
11963 +<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="23272">
11964 <summary>
11965 Do not audit attempts to receive dhcpd_client packets.
11966 </summary>
11967 @@ -24732,7 +24816,7 @@ Domain allowed access.
11968 </param>
11969 <infoflow type="none"/>
11970 </interface>
11971 -<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="23273">
11972 +<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="23291">
11973 <summary>
11974 Send and receive dhcpd_client packets.
11975 </summary>
11976 @@ -24743,7 +24827,7 @@ Domain allowed access.
11977 </param>
11978 <infoflow type="both" weight="10"/>
11979 </interface>
11980 -<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="23289">
11981 +<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="23307">
11982 <summary>
11983 Do not audit attempts to send and receive dhcpd_client packets.
11984 </summary>
11985 @@ -24754,7 +24838,7 @@ Domain to not audit.
11986 </param>
11987 <infoflow type="none"/>
11988 </interface>
11989 -<interface name="corenet_relabelto_dhcpd_client_packets" lineno="23304">
11990 +<interface name="corenet_relabelto_dhcpd_client_packets" lineno="23322">
11991 <summary>
11992 Relabel packets to dhcpd_client the packet type.
11993 </summary>
11994 @@ -24764,7 +24848,7 @@ Domain allowed access.
11995 </summary>
11996 </param>
11997 </interface>
11998 -<interface name="corenet_send_dhcpd_server_packets" lineno="23324">
11999 +<interface name="corenet_send_dhcpd_server_packets" lineno="23342">
12000 <summary>
12001 Send dhcpd_server packets.
12002 </summary>
12003 @@ -24775,7 +24859,7 @@ Domain allowed access.
12004 </param>
12005 <infoflow type="write" weight="10"/>
12006 </interface>
12007 -<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="23343">
12008 +<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="23361">
12009 <summary>
12010 Do not audit attempts to send dhcpd_server packets.
12011 </summary>
12012 @@ -24786,7 +24870,7 @@ Domain to not audit.
12013 </param>
12014 <infoflow type="none"/>
12015 </interface>
12016 -<interface name="corenet_receive_dhcpd_server_packets" lineno="23362">
12017 +<interface name="corenet_receive_dhcpd_server_packets" lineno="23380">
12018 <summary>
12019 Receive dhcpd_server packets.
12020 </summary>
12021 @@ -24797,7 +24881,7 @@ Domain allowed access.
12022 </param>
12023 <infoflow type="read" weight="10"/>
12024 </interface>
12025 -<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="23381">
12026 +<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="23399">
12027 <summary>
12028 Do not audit attempts to receive dhcpd_server packets.
12029 </summary>
12030 @@ -24808,7 +24892,7 @@ Domain allowed access.
12031 </param>
12032 <infoflow type="none"/>
12033 </interface>
12034 -<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="23400">
12035 +<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="23418">
12036 <summary>
12037 Send and receive dhcpd_server packets.
12038 </summary>
12039 @@ -24819,7 +24903,7 @@ Domain allowed access.
12040 </param>
12041 <infoflow type="both" weight="10"/>
12042 </interface>
12043 -<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="23416">
12044 +<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="23434">
12045 <summary>
12046 Do not audit attempts to send and receive dhcpd_server packets.
12047 </summary>
12048 @@ -24830,7 +24914,7 @@ Domain to not audit.
12049 </param>
12050 <infoflow type="none"/>
12051 </interface>
12052 -<interface name="corenet_relabelto_dhcpd_server_packets" lineno="23431">
12053 +<interface name="corenet_relabelto_dhcpd_server_packets" lineno="23449">
12054 <summary>
12055 Relabel packets to dhcpd_server the packet type.
12056 </summary>
12057 @@ -24840,7 +24924,7 @@ Domain allowed access.
12058 </summary>
12059 </param>
12060 </interface>
12061 -<interface name="corenet_tcp_sendrecv_dict_port" lineno="23453">
12062 +<interface name="corenet_tcp_sendrecv_dict_port" lineno="23471">
12063 <summary>
12064 Send and receive TCP traffic on the dict port.
12065 </summary>
12066 @@ -24851,7 +24935,7 @@ Domain allowed access.
12067 </param>
12068 <infoflow type="both" weight="10"/>
12069 </interface>
12070 -<interface name="corenet_udp_send_dict_port" lineno="23468">
12071 +<interface name="corenet_udp_send_dict_port" lineno="23486">
12072 <summary>
12073 Send UDP traffic on the dict port.
12074 </summary>
12075 @@ -24862,7 +24946,7 @@ Domain allowed access.
12076 </param>
12077 <infoflow type="write" weight="10"/>
12078 </interface>
12079 -<interface name="corenet_dontaudit_udp_send_dict_port" lineno="23483">
12080 +<interface name="corenet_dontaudit_udp_send_dict_port" lineno="23501">
12081 <summary>
12082 Do not audit attempts to send UDP traffic on the dict port.
12083 </summary>
12084 @@ -24873,7 +24957,7 @@ Domain to not audit.
12085 </param>
12086 <infoflow type="none"/>
12087 </interface>
12088 -<interface name="corenet_udp_receive_dict_port" lineno="23498">
12089 +<interface name="corenet_udp_receive_dict_port" lineno="23516">
12090 <summary>
12091 Receive UDP traffic on the dict port.
12092 </summary>
12093 @@ -24884,7 +24968,7 @@ Domain allowed access.
12094 </param>
12095 <infoflow type="read" weight="10"/>
12096 </interface>
12097 -<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="23513">
12098 +<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="23531">
12099 <summary>
12100 Do not audit attempts to receive UDP traffic on the dict port.
12101 </summary>
12102 @@ -24895,7 +24979,7 @@ Domain to not audit.
12103 </param>
12104 <infoflow type="none"/>
12105 </interface>
12106 -<interface name="corenet_udp_sendrecv_dict_port" lineno="23528">
12107 +<interface name="corenet_udp_sendrecv_dict_port" lineno="23546">
12108 <summary>
12109 Send and receive UDP traffic on the dict port.
12110 </summary>
12111 @@ -24906,7 +24990,7 @@ Domain allowed access.
12112 </param>
12113 <infoflow type="both" weight="10"/>
12114 </interface>
12115 -<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="23544">
12116 +<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="23562">
12117 <summary>
12118 Do not audit attempts to send and receive
12119 UDP traffic on the dict port.
12120 @@ -24918,7 +25002,7 @@ Domain to not audit.
12121 </param>
12122 <infoflow type="none"/>
12123 </interface>
12124 -<interface name="corenet_tcp_bind_dict_port" lineno="23559">
12125 +<interface name="corenet_tcp_bind_dict_port" lineno="23577">
12126 <summary>
12127 Bind TCP sockets to the dict port.
12128 </summary>
12129 @@ -24929,7 +25013,7 @@ Domain allowed access.
12130 </param>
12131 <infoflow type="none"/>
12132 </interface>
12133 -<interface name="corenet_udp_bind_dict_port" lineno="23579">
12134 +<interface name="corenet_udp_bind_dict_port" lineno="23597">
12135 <summary>
12136 Bind UDP sockets to the dict port.
12137 </summary>
12138 @@ -24940,7 +25024,7 @@ Domain allowed access.
12139 </param>
12140 <infoflow type="none"/>
12141 </interface>
12142 -<interface name="corenet_tcp_connect_dict_port" lineno="23598">
12143 +<interface name="corenet_tcp_connect_dict_port" lineno="23616">
12144 <summary>
12145 Make a TCP connection to the dict port.
12146 </summary>
12147 @@ -24950,7 +25034,7 @@ Domain allowed access.
12148 </summary>
12149 </param>
12150 </interface>
12151 -<interface name="corenet_send_dict_client_packets" lineno="23618">
12152 +<interface name="corenet_send_dict_client_packets" lineno="23636">
12153 <summary>
12154 Send dict_client packets.
12155 </summary>
12156 @@ -24961,7 +25045,7 @@ Domain allowed access.
12157 </param>
12158 <infoflow type="write" weight="10"/>
12159 </interface>
12160 -<interface name="corenet_dontaudit_send_dict_client_packets" lineno="23637">
12161 +<interface name="corenet_dontaudit_send_dict_client_packets" lineno="23655">
12162 <summary>
12163 Do not audit attempts to send dict_client packets.
12164 </summary>
12165 @@ -24972,7 +25056,7 @@ Domain to not audit.
12166 </param>
12167 <infoflow type="none"/>
12168 </interface>
12169 -<interface name="corenet_receive_dict_client_packets" lineno="23656">
12170 +<interface name="corenet_receive_dict_client_packets" lineno="23674">
12171 <summary>
12172 Receive dict_client packets.
12173 </summary>
12174 @@ -24983,7 +25067,7 @@ Domain allowed access.
12175 </param>
12176 <infoflow type="read" weight="10"/>
12177 </interface>
12178 -<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="23675">
12179 +<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="23693">
12180 <summary>
12181 Do not audit attempts to receive dict_client packets.
12182 </summary>
12183 @@ -24994,7 +25078,7 @@ Domain allowed access.
12184 </param>
12185 <infoflow type="none"/>
12186 </interface>
12187 -<interface name="corenet_sendrecv_dict_client_packets" lineno="23694">
12188 +<interface name="corenet_sendrecv_dict_client_packets" lineno="23712">
12189 <summary>
12190 Send and receive dict_client packets.
12191 </summary>
12192 @@ -25005,7 +25089,7 @@ Domain allowed access.
12193 </param>
12194 <infoflow type="both" weight="10"/>
12195 </interface>
12196 -<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="23710">
12197 +<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="23728">
12198 <summary>
12199 Do not audit attempts to send and receive dict_client packets.
12200 </summary>
12201 @@ -25016,7 +25100,7 @@ Domain to not audit.
12202 </param>
12203 <infoflow type="none"/>
12204 </interface>
12205 -<interface name="corenet_relabelto_dict_client_packets" lineno="23725">
12206 +<interface name="corenet_relabelto_dict_client_packets" lineno="23743">
12207 <summary>
12208 Relabel packets to dict_client the packet type.
12209 </summary>
12210 @@ -25026,7 +25110,7 @@ Domain allowed access.
12211 </summary>
12212 </param>
12213 </interface>
12214 -<interface name="corenet_send_dict_server_packets" lineno="23745">
12215 +<interface name="corenet_send_dict_server_packets" lineno="23763">
12216 <summary>
12217 Send dict_server packets.
12218 </summary>
12219 @@ -25037,7 +25121,7 @@ Domain allowed access.
12220 </param>
12221 <infoflow type="write" weight="10"/>
12222 </interface>
12223 -<interface name="corenet_dontaudit_send_dict_server_packets" lineno="23764">
12224 +<interface name="corenet_dontaudit_send_dict_server_packets" lineno="23782">
12225 <summary>
12226 Do not audit attempts to send dict_server packets.
12227 </summary>
12228 @@ -25048,7 +25132,7 @@ Domain to not audit.
12229 </param>
12230 <infoflow type="none"/>
12231 </interface>
12232 -<interface name="corenet_receive_dict_server_packets" lineno="23783">
12233 +<interface name="corenet_receive_dict_server_packets" lineno="23801">
12234 <summary>
12235 Receive dict_server packets.
12236 </summary>
12237 @@ -25059,7 +25143,7 @@ Domain allowed access.
12238 </param>
12239 <infoflow type="read" weight="10"/>
12240 </interface>
12241 -<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="23802">
12242 +<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="23820">
12243 <summary>
12244 Do not audit attempts to receive dict_server packets.
12245 </summary>
12246 @@ -25070,7 +25154,7 @@ Domain allowed access.
12247 </param>
12248 <infoflow type="none"/>
12249 </interface>
12250 -<interface name="corenet_sendrecv_dict_server_packets" lineno="23821">
12251 +<interface name="corenet_sendrecv_dict_server_packets" lineno="23839">
12252 <summary>
12253 Send and receive dict_server packets.
12254 </summary>
12255 @@ -25081,7 +25165,7 @@ Domain allowed access.
12256 </param>
12257 <infoflow type="both" weight="10"/>
12258 </interface>
12259 -<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="23837">
12260 +<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="23855">
12261 <summary>
12262 Do not audit attempts to send and receive dict_server packets.
12263 </summary>
12264 @@ -25092,7 +25176,7 @@ Domain to not audit.
12265 </param>
12266 <infoflow type="none"/>
12267 </interface>
12268 -<interface name="corenet_relabelto_dict_server_packets" lineno="23852">
12269 +<interface name="corenet_relabelto_dict_server_packets" lineno="23870">
12270 <summary>
12271 Relabel packets to dict_server the packet type.
12272 </summary>
12273 @@ -25102,7 +25186,7 @@ Domain allowed access.
12274 </summary>
12275 </param>
12276 </interface>
12277 -<interface name="corenet_tcp_sendrecv_distccd_port" lineno="23874">
12278 +<interface name="corenet_tcp_sendrecv_distccd_port" lineno="23892">
12279 <summary>
12280 Send and receive TCP traffic on the distccd port.
12281 </summary>
12282 @@ -25113,7 +25197,7 @@ Domain allowed access.
12283 </param>
12284 <infoflow type="both" weight="10"/>
12285 </interface>
12286 -<interface name="corenet_udp_send_distccd_port" lineno="23889">
12287 +<interface name="corenet_udp_send_distccd_port" lineno="23907">
12288 <summary>
12289 Send UDP traffic on the distccd port.
12290 </summary>
12291 @@ -25124,7 +25208,7 @@ Domain allowed access.
12292 </param>
12293 <infoflow type="write" weight="10"/>
12294 </interface>
12295 -<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="23904">
12296 +<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="23922">
12297 <summary>
12298 Do not audit attempts to send UDP traffic on the distccd port.
12299 </summary>
12300 @@ -25135,7 +25219,7 @@ Domain to not audit.
12301 </param>
12302 <infoflow type="none"/>
12303 </interface>
12304 -<interface name="corenet_udp_receive_distccd_port" lineno="23919">
12305 +<interface name="corenet_udp_receive_distccd_port" lineno="23937">
12306 <summary>
12307 Receive UDP traffic on the distccd port.
12308 </summary>
12309 @@ -25146,7 +25230,7 @@ Domain allowed access.
12310 </param>
12311 <infoflow type="read" weight="10"/>
12312 </interface>
12313 -<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="23934">
12314 +<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="23952">
12315 <summary>
12316 Do not audit attempts to receive UDP traffic on the distccd port.
12317 </summary>
12318 @@ -25157,7 +25241,7 @@ Domain to not audit.
12319 </param>
12320 <infoflow type="none"/>
12321 </interface>
12322 -<interface name="corenet_udp_sendrecv_distccd_port" lineno="23949">
12323 +<interface name="corenet_udp_sendrecv_distccd_port" lineno="23967">
12324 <summary>
12325 Send and receive UDP traffic on the distccd port.
12326 </summary>
12327 @@ -25168,7 +25252,7 @@ Domain allowed access.
12328 </param>
12329 <infoflow type="both" weight="10"/>
12330 </interface>
12331 -<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="23965">
12332 +<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="23983">
12333 <summary>
12334 Do not audit attempts to send and receive
12335 UDP traffic on the distccd port.
12336 @@ -25180,7 +25264,7 @@ Domain to not audit.
12337 </param>
12338 <infoflow type="none"/>
12339 </interface>
12340 -<interface name="corenet_tcp_bind_distccd_port" lineno="23980">
12341 +<interface name="corenet_tcp_bind_distccd_port" lineno="23998">
12342 <summary>
12343 Bind TCP sockets to the distccd port.
12344 </summary>
12345 @@ -25191,7 +25275,7 @@ Domain allowed access.
12346 </param>
12347 <infoflow type="none"/>
12348 </interface>
12349 -<interface name="corenet_udp_bind_distccd_port" lineno="24000">
12350 +<interface name="corenet_udp_bind_distccd_port" lineno="24018">
12351 <summary>
12352 Bind UDP sockets to the distccd port.
12353 </summary>
12354 @@ -25202,7 +25286,7 @@ Domain allowed access.
12355 </param>
12356 <infoflow type="none"/>
12357 </interface>
12358 -<interface name="corenet_tcp_connect_distccd_port" lineno="24019">
12359 +<interface name="corenet_tcp_connect_distccd_port" lineno="24037">
12360 <summary>
12361 Make a TCP connection to the distccd port.
12362 </summary>
12363 @@ -25212,7 +25296,7 @@ Domain allowed access.
12364 </summary>
12365 </param>
12366 </interface>
12367 -<interface name="corenet_send_distccd_client_packets" lineno="24039">
12368 +<interface name="corenet_send_distccd_client_packets" lineno="24057">
12369 <summary>
12370 Send distccd_client packets.
12371 </summary>
12372 @@ -25223,7 +25307,7 @@ Domain allowed access.
12373 </param>
12374 <infoflow type="write" weight="10"/>
12375 </interface>
12376 -<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="24058">
12377 +<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="24076">
12378 <summary>
12379 Do not audit attempts to send distccd_client packets.
12380 </summary>
12381 @@ -25234,7 +25318,7 @@ Domain to not audit.
12382 </param>
12383 <infoflow type="none"/>
12384 </interface>
12385 -<interface name="corenet_receive_distccd_client_packets" lineno="24077">
12386 +<interface name="corenet_receive_distccd_client_packets" lineno="24095">
12387 <summary>
12388 Receive distccd_client packets.
12389 </summary>
12390 @@ -25245,7 +25329,7 @@ Domain allowed access.
12391 </param>
12392 <infoflow type="read" weight="10"/>
12393 </interface>
12394 -<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="24096">
12395 +<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="24114">
12396 <summary>
12397 Do not audit attempts to receive distccd_client packets.
12398 </summary>
12399 @@ -25256,7 +25340,7 @@ Domain allowed access.
12400 </param>
12401 <infoflow type="none"/>
12402 </interface>
12403 -<interface name="corenet_sendrecv_distccd_client_packets" lineno="24115">
12404 +<interface name="corenet_sendrecv_distccd_client_packets" lineno="24133">
12405 <summary>
12406 Send and receive distccd_client packets.
12407 </summary>
12408 @@ -25267,7 +25351,7 @@ Domain allowed access.
12409 </param>
12410 <infoflow type="both" weight="10"/>
12411 </interface>
12412 -<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="24131">
12413 +<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="24149">
12414 <summary>
12415 Do not audit attempts to send and receive distccd_client packets.
12416 </summary>
12417 @@ -25278,7 +25362,7 @@ Domain to not audit.
12418 </param>
12419 <infoflow type="none"/>
12420 </interface>
12421 -<interface name="corenet_relabelto_distccd_client_packets" lineno="24146">
12422 +<interface name="corenet_relabelto_distccd_client_packets" lineno="24164">
12423 <summary>
12424 Relabel packets to distccd_client the packet type.
12425 </summary>
12426 @@ -25288,7 +25372,7 @@ Domain allowed access.
12427 </summary>
12428 </param>
12429 </interface>
12430 -<interface name="corenet_send_distccd_server_packets" lineno="24166">
12431 +<interface name="corenet_send_distccd_server_packets" lineno="24184">
12432 <summary>
12433 Send distccd_server packets.
12434 </summary>
12435 @@ -25299,7 +25383,7 @@ Domain allowed access.
12436 </param>
12437 <infoflow type="write" weight="10"/>
12438 </interface>
12439 -<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="24185">
12440 +<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="24203">
12441 <summary>
12442 Do not audit attempts to send distccd_server packets.
12443 </summary>
12444 @@ -25310,7 +25394,7 @@ Domain to not audit.
12445 </param>
12446 <infoflow type="none"/>
12447 </interface>
12448 -<interface name="corenet_receive_distccd_server_packets" lineno="24204">
12449 +<interface name="corenet_receive_distccd_server_packets" lineno="24222">
12450 <summary>
12451 Receive distccd_server packets.
12452 </summary>
12453 @@ -25321,7 +25405,7 @@ Domain allowed access.
12454 </param>
12455 <infoflow type="read" weight="10"/>
12456 </interface>
12457 -<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="24223">
12458 +<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="24241">
12459 <summary>
12460 Do not audit attempts to receive distccd_server packets.
12461 </summary>
12462 @@ -25332,7 +25416,7 @@ Domain allowed access.
12463 </param>
12464 <infoflow type="none"/>
12465 </interface>
12466 -<interface name="corenet_sendrecv_distccd_server_packets" lineno="24242">
12467 +<interface name="corenet_sendrecv_distccd_server_packets" lineno="24260">
12468 <summary>
12469 Send and receive distccd_server packets.
12470 </summary>
12471 @@ -25343,7 +25427,7 @@ Domain allowed access.
12472 </param>
12473 <infoflow type="both" weight="10"/>
12474 </interface>
12475 -<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="24258">
12476 +<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="24276">
12477 <summary>
12478 Do not audit attempts to send and receive distccd_server packets.
12479 </summary>
12480 @@ -25354,7 +25438,7 @@ Domain to not audit.
12481 </param>
12482 <infoflow type="none"/>
12483 </interface>
12484 -<interface name="corenet_relabelto_distccd_server_packets" lineno="24273">
12485 +<interface name="corenet_relabelto_distccd_server_packets" lineno="24291">
12486 <summary>
12487 Relabel packets to distccd_server the packet type.
12488 </summary>
12489 @@ -25364,7 +25448,7 @@ Domain allowed access.
12490 </summary>
12491 </param>
12492 </interface>
12493 -<interface name="corenet_tcp_sendrecv_dns_port" lineno="24295">
12494 +<interface name="corenet_tcp_sendrecv_dns_port" lineno="24313">
12495 <summary>
12496 Send and receive TCP traffic on the dns port.
12497 </summary>
12498 @@ -25375,7 +25459,7 @@ Domain allowed access.
12499 </param>
12500 <infoflow type="both" weight="10"/>
12501 </interface>
12502 -<interface name="corenet_udp_send_dns_port" lineno="24310">
12503 +<interface name="corenet_udp_send_dns_port" lineno="24328">
12504 <summary>
12505 Send UDP traffic on the dns port.
12506 </summary>
12507 @@ -25386,7 +25470,7 @@ Domain allowed access.
12508 </param>
12509 <infoflow type="write" weight="10"/>
12510 </interface>
12511 -<interface name="corenet_dontaudit_udp_send_dns_port" lineno="24325">
12512 +<interface name="corenet_dontaudit_udp_send_dns_port" lineno="24343">
12513 <summary>
12514 Do not audit attempts to send UDP traffic on the dns port.
12515 </summary>
12516 @@ -25397,7 +25481,7 @@ Domain to not audit.
12517 </param>
12518 <infoflow type="none"/>
12519 </interface>
12520 -<interface name="corenet_udp_receive_dns_port" lineno="24340">
12521 +<interface name="corenet_udp_receive_dns_port" lineno="24358">
12522 <summary>
12523 Receive UDP traffic on the dns port.
12524 </summary>
12525 @@ -25408,7 +25492,7 @@ Domain allowed access.
12526 </param>
12527 <infoflow type="read" weight="10"/>
12528 </interface>
12529 -<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="24355">
12530 +<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="24373">
12531 <summary>
12532 Do not audit attempts to receive UDP traffic on the dns port.
12533 </summary>
12534 @@ -25419,7 +25503,7 @@ Domain to not audit.
12535 </param>
12536 <infoflow type="none"/>
12537 </interface>
12538 -<interface name="corenet_udp_sendrecv_dns_port" lineno="24370">
12539 +<interface name="corenet_udp_sendrecv_dns_port" lineno="24388">
12540 <summary>
12541 Send and receive UDP traffic on the dns port.
12542 </summary>
12543 @@ -25430,7 +25514,7 @@ Domain allowed access.
12544 </param>
12545 <infoflow type="both" weight="10"/>
12546 </interface>
12547 -<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="24386">
12548 +<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="24404">
12549 <summary>
12550 Do not audit attempts to send and receive
12551 UDP traffic on the dns port.
12552 @@ -25442,7 +25526,7 @@ Domain to not audit.
12553 </param>
12554 <infoflow type="none"/>
12555 </interface>
12556 -<interface name="corenet_tcp_bind_dns_port" lineno="24401">
12557 +<interface name="corenet_tcp_bind_dns_port" lineno="24419">
12558 <summary>
12559 Bind TCP sockets to the dns port.
12560 </summary>
12561 @@ -25453,7 +25537,7 @@ Domain allowed access.
12562 </param>
12563 <infoflow type="none"/>
12564 </interface>
12565 -<interface name="corenet_udp_bind_dns_port" lineno="24421">
12566 +<interface name="corenet_udp_bind_dns_port" lineno="24439">
12567 <summary>
12568 Bind UDP sockets to the dns port.
12569 </summary>
12570 @@ -25464,7 +25548,7 @@ Domain allowed access.
12571 </param>
12572 <infoflow type="none"/>
12573 </interface>
12574 -<interface name="corenet_tcp_connect_dns_port" lineno="24440">
12575 +<interface name="corenet_tcp_connect_dns_port" lineno="24458">
12576 <summary>
12577 Make a TCP connection to the dns port.
12578 </summary>
12579 @@ -25474,7 +25558,7 @@ Domain allowed access.
12580 </summary>
12581 </param>
12582 </interface>
12583 -<interface name="corenet_send_dns_client_packets" lineno="24460">
12584 +<interface name="corenet_send_dns_client_packets" lineno="24478">
12585 <summary>
12586 Send dns_client packets.
12587 </summary>
12588 @@ -25485,7 +25569,7 @@ Domain allowed access.
12589 </param>
12590 <infoflow type="write" weight="10"/>
12591 </interface>
12592 -<interface name="corenet_dontaudit_send_dns_client_packets" lineno="24479">
12593 +<interface name="corenet_dontaudit_send_dns_client_packets" lineno="24497">
12594 <summary>
12595 Do not audit attempts to send dns_client packets.
12596 </summary>
12597 @@ -25496,7 +25580,7 @@ Domain to not audit.
12598 </param>
12599 <infoflow type="none"/>
12600 </interface>
12601 -<interface name="corenet_receive_dns_client_packets" lineno="24498">
12602 +<interface name="corenet_receive_dns_client_packets" lineno="24516">
12603 <summary>
12604 Receive dns_client packets.
12605 </summary>
12606 @@ -25507,7 +25591,7 @@ Domain allowed access.
12607 </param>
12608 <infoflow type="read" weight="10"/>
12609 </interface>
12610 -<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="24517">
12611 +<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="24535">
12612 <summary>
12613 Do not audit attempts to receive dns_client packets.
12614 </summary>
12615 @@ -25518,7 +25602,7 @@ Domain allowed access.
12616 </param>
12617 <infoflow type="none"/>
12618 </interface>
12619 -<interface name="corenet_sendrecv_dns_client_packets" lineno="24536">
12620 +<interface name="corenet_sendrecv_dns_client_packets" lineno="24554">
12621 <summary>
12622 Send and receive dns_client packets.
12623 </summary>
12624 @@ -25529,7 +25613,7 @@ Domain allowed access.
12625 </param>
12626 <infoflow type="both" weight="10"/>
12627 </interface>
12628 -<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="24552">
12629 +<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="24570">
12630 <summary>
12631 Do not audit attempts to send and receive dns_client packets.
12632 </summary>
12633 @@ -25540,7 +25624,7 @@ Domain to not audit.
12634 </param>
12635 <infoflow type="none"/>
12636 </interface>
12637 -<interface name="corenet_relabelto_dns_client_packets" lineno="24567">
12638 +<interface name="corenet_relabelto_dns_client_packets" lineno="24585">
12639 <summary>
12640 Relabel packets to dns_client the packet type.
12641 </summary>
12642 @@ -25550,7 +25634,7 @@ Domain allowed access.
12643 </summary>
12644 </param>
12645 </interface>
12646 -<interface name="corenet_send_dns_server_packets" lineno="24587">
12647 +<interface name="corenet_send_dns_server_packets" lineno="24605">
12648 <summary>
12649 Send dns_server packets.
12650 </summary>
12651 @@ -25561,7 +25645,7 @@ Domain allowed access.
12652 </param>
12653 <infoflow type="write" weight="10"/>
12654 </interface>
12655 -<interface name="corenet_dontaudit_send_dns_server_packets" lineno="24606">
12656 +<interface name="corenet_dontaudit_send_dns_server_packets" lineno="24624">
12657 <summary>
12658 Do not audit attempts to send dns_server packets.
12659 </summary>
12660 @@ -25572,7 +25656,7 @@ Domain to not audit.
12661 </param>
12662 <infoflow type="none"/>
12663 </interface>
12664 -<interface name="corenet_receive_dns_server_packets" lineno="24625">
12665 +<interface name="corenet_receive_dns_server_packets" lineno="24643">
12666 <summary>
12667 Receive dns_server packets.
12668 </summary>
12669 @@ -25583,7 +25667,7 @@ Domain allowed access.
12670 </param>
12671 <infoflow type="read" weight="10"/>
12672 </interface>
12673 -<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="24644">
12674 +<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="24662">
12675 <summary>
12676 Do not audit attempts to receive dns_server packets.
12677 </summary>
12678 @@ -25594,7 +25678,7 @@ Domain allowed access.
12679 </param>
12680 <infoflow type="none"/>
12681 </interface>
12682 -<interface name="corenet_sendrecv_dns_server_packets" lineno="24663">
12683 +<interface name="corenet_sendrecv_dns_server_packets" lineno="24681">
12684 <summary>
12685 Send and receive dns_server packets.
12686 </summary>
12687 @@ -25605,7 +25689,7 @@ Domain allowed access.
12688 </param>
12689 <infoflow type="both" weight="10"/>
12690 </interface>
12691 -<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="24679">
12692 +<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="24697">
12693 <summary>
12694 Do not audit attempts to send and receive dns_server packets.
12695 </summary>
12696 @@ -25616,7 +25700,7 @@ Domain to not audit.
12697 </param>
12698 <infoflow type="none"/>
12699 </interface>
12700 -<interface name="corenet_relabelto_dns_server_packets" lineno="24694">
12701 +<interface name="corenet_relabelto_dns_server_packets" lineno="24712">
12702 <summary>
12703 Relabel packets to dns_server the packet type.
12704 </summary>
12705 @@ -25626,7 +25710,7 @@ Domain allowed access.
12706 </summary>
12707 </param>
12708 </interface>
12709 -<interface name="corenet_tcp_sendrecv_dropbox_port" lineno="24716">
12710 +<interface name="corenet_tcp_sendrecv_dropbox_port" lineno="24734">
12711 <summary>
12712 Send and receive TCP traffic on the dropbox port.
12713 </summary>
12714 @@ -25637,7 +25721,7 @@ Domain allowed access.
12715 </param>
12716 <infoflow type="both" weight="10"/>
12717 </interface>
12718 -<interface name="corenet_udp_send_dropbox_port" lineno="24731">
12719 +<interface name="corenet_udp_send_dropbox_port" lineno="24749">
12720 <summary>
12721 Send UDP traffic on the dropbox port.
12722 </summary>
12723 @@ -25648,7 +25732,7 @@ Domain allowed access.
12724 </param>
12725 <infoflow type="write" weight="10"/>
12726 </interface>
12727 -<interface name="corenet_dontaudit_udp_send_dropbox_port" lineno="24746">
12728 +<interface name="corenet_dontaudit_udp_send_dropbox_port" lineno="24764">
12729 <summary>
12730 Do not audit attempts to send UDP traffic on the dropbox port.
12731 </summary>
12732 @@ -25659,7 +25743,7 @@ Domain to not audit.
12733 </param>
12734 <infoflow type="none"/>
12735 </interface>
12736 -<interface name="corenet_udp_receive_dropbox_port" lineno="24761">
12737 +<interface name="corenet_udp_receive_dropbox_port" lineno="24779">
12738 <summary>
12739 Receive UDP traffic on the dropbox port.
12740 </summary>
12741 @@ -25670,7 +25754,7 @@ Domain allowed access.
12742 </param>
12743 <infoflow type="read" weight="10"/>
12744 </interface>
12745 -<interface name="corenet_dontaudit_udp_receive_dropbox_port" lineno="24776">
12746 +<interface name="corenet_dontaudit_udp_receive_dropbox_port" lineno="24794">
12747 <summary>
12748 Do not audit attempts to receive UDP traffic on the dropbox port.
12749 </summary>
12750 @@ -25681,7 +25765,7 @@ Domain to not audit.
12751 </param>
12752 <infoflow type="none"/>
12753 </interface>
12754 -<interface name="corenet_udp_sendrecv_dropbox_port" lineno="24791">
12755 +<interface name="corenet_udp_sendrecv_dropbox_port" lineno="24809">
12756 <summary>
12757 Send and receive UDP traffic on the dropbox port.
12758 </summary>
12759 @@ -25692,7 +25776,7 @@ Domain allowed access.
12760 </param>
12761 <infoflow type="both" weight="10"/>
12762 </interface>
12763 -<interface name="corenet_dontaudit_udp_sendrecv_dropbox_port" lineno="24807">
12764 +<interface name="corenet_dontaudit_udp_sendrecv_dropbox_port" lineno="24825">
12765 <summary>
12766 Do not audit attempts to send and receive
12767 UDP traffic on the dropbox port.
12768 @@ -25704,7 +25788,7 @@ Domain to not audit.
12769 </param>
12770 <infoflow type="none"/>
12771 </interface>
12772 -<interface name="corenet_tcp_bind_dropbox_port" lineno="24822">
12773 +<interface name="corenet_tcp_bind_dropbox_port" lineno="24840">
12774 <summary>
12775 Bind TCP sockets to the dropbox port.
12776 </summary>
12777 @@ -25715,7 +25799,7 @@ Domain allowed access.
12778 </param>
12779 <infoflow type="none"/>
12780 </interface>
12781 -<interface name="corenet_udp_bind_dropbox_port" lineno="24842">
12782 +<interface name="corenet_udp_bind_dropbox_port" lineno="24860">
12783 <summary>
12784 Bind UDP sockets to the dropbox port.
12785 </summary>
12786 @@ -25726,7 +25810,7 @@ Domain allowed access.
12787 </param>
12788 <infoflow type="none"/>
12789 </interface>
12790 -<interface name="corenet_tcp_connect_dropbox_port" lineno="24861">
12791 +<interface name="corenet_tcp_connect_dropbox_port" lineno="24879">
12792 <summary>
12793 Make a TCP connection to the dropbox port.
12794 </summary>
12795 @@ -25736,7 +25820,7 @@ Domain allowed access.
12796 </summary>
12797 </param>
12798 </interface>
12799 -<interface name="corenet_send_dropbox_client_packets" lineno="24881">
12800 +<interface name="corenet_send_dropbox_client_packets" lineno="24899">
12801 <summary>
12802 Send dropbox_client packets.
12803 </summary>
12804 @@ -25747,7 +25831,7 @@ Domain allowed access.
12805 </param>
12806 <infoflow type="write" weight="10"/>
12807 </interface>
12808 -<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="24900">
12809 +<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="24918">
12810 <summary>
12811 Do not audit attempts to send dropbox_client packets.
12812 </summary>
12813 @@ -25758,7 +25842,7 @@ Domain to not audit.
12814 </param>
12815 <infoflow type="none"/>
12816 </interface>
12817 -<interface name="corenet_receive_dropbox_client_packets" lineno="24919">
12818 +<interface name="corenet_receive_dropbox_client_packets" lineno="24937">
12819 <summary>
12820 Receive dropbox_client packets.
12821 </summary>
12822 @@ -25769,7 +25853,7 @@ Domain allowed access.
12823 </param>
12824 <infoflow type="read" weight="10"/>
12825 </interface>
12826 -<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="24938">
12827 +<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="24956">
12828 <summary>
12829 Do not audit attempts to receive dropbox_client packets.
12830 </summary>
12831 @@ -25780,7 +25864,7 @@ Domain allowed access.
12832 </param>
12833 <infoflow type="none"/>
12834 </interface>
12835 -<interface name="corenet_sendrecv_dropbox_client_packets" lineno="24957">
12836 +<interface name="corenet_sendrecv_dropbox_client_packets" lineno="24975">
12837 <summary>
12838 Send and receive dropbox_client packets.
12839 </summary>
12840 @@ -25791,7 +25875,7 @@ Domain allowed access.
12841 </param>
12842 <infoflow type="both" weight="10"/>
12843 </interface>
12844 -<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="24973">
12845 +<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="24991">
12846 <summary>
12847 Do not audit attempts to send and receive dropbox_client packets.
12848 </summary>
12849 @@ -25802,7 +25886,7 @@ Domain to not audit.
12850 </param>
12851 <infoflow type="none"/>
12852 </interface>
12853 -<interface name="corenet_relabelto_dropbox_client_packets" lineno="24988">
12854 +<interface name="corenet_relabelto_dropbox_client_packets" lineno="25006">
12855 <summary>
12856 Relabel packets to dropbox_client the packet type.
12857 </summary>
12858 @@ -25812,7 +25896,7 @@ Domain allowed access.
12859 </summary>
12860 </param>
12861 </interface>
12862 -<interface name="corenet_send_dropbox_server_packets" lineno="25008">
12863 +<interface name="corenet_send_dropbox_server_packets" lineno="25026">
12864 <summary>
12865 Send dropbox_server packets.
12866 </summary>
12867 @@ -25823,7 +25907,7 @@ Domain allowed access.
12868 </param>
12869 <infoflow type="write" weight="10"/>
12870 </interface>
12871 -<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="25027">
12872 +<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="25045">
12873 <summary>
12874 Do not audit attempts to send dropbox_server packets.
12875 </summary>
12876 @@ -25834,7 +25918,7 @@ Domain to not audit.
12877 </param>
12878 <infoflow type="none"/>
12879 </interface>
12880 -<interface name="corenet_receive_dropbox_server_packets" lineno="25046">
12881 +<interface name="corenet_receive_dropbox_server_packets" lineno="25064">
12882 <summary>
12883 Receive dropbox_server packets.
12884 </summary>
12885 @@ -25845,7 +25929,7 @@ Domain allowed access.
12886 </param>
12887 <infoflow type="read" weight="10"/>
12888 </interface>
12889 -<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="25065">
12890 +<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="25083">
12891 <summary>
12892 Do not audit attempts to receive dropbox_server packets.
12893 </summary>
12894 @@ -25856,7 +25940,7 @@ Domain allowed access.
12895 </param>
12896 <infoflow type="none"/>
12897 </interface>
12898 -<interface name="corenet_sendrecv_dropbox_server_packets" lineno="25084">
12899 +<interface name="corenet_sendrecv_dropbox_server_packets" lineno="25102">
12900 <summary>
12901 Send and receive dropbox_server packets.
12902 </summary>
12903 @@ -25867,7 +25951,7 @@ Domain allowed access.
12904 </param>
12905 <infoflow type="both" weight="10"/>
12906 </interface>
12907 -<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="25100">
12908 +<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="25118">
12909 <summary>
12910 Do not audit attempts to send and receive dropbox_server packets.
12911 </summary>
12912 @@ -25878,7 +25962,7 @@ Domain to not audit.
12913 </param>
12914 <infoflow type="none"/>
12915 </interface>
12916 -<interface name="corenet_relabelto_dropbox_server_packets" lineno="25115">
12917 +<interface name="corenet_relabelto_dropbox_server_packets" lineno="25133">
12918 <summary>
12919 Relabel packets to dropbox_server the packet type.
12920 </summary>
12921 @@ -25888,7 +25972,7 @@ Domain allowed access.
12922 </summary>
12923 </param>
12924 </interface>
12925 -<interface name="corenet_tcp_sendrecv_efs_port" lineno="25137">
12926 +<interface name="corenet_tcp_sendrecv_efs_port" lineno="25155">
12927 <summary>
12928 Send and receive TCP traffic on the efs port.
12929 </summary>
12930 @@ -25899,7 +25983,7 @@ Domain allowed access.
12931 </param>
12932 <infoflow type="both" weight="10"/>
12933 </interface>
12934 -<interface name="corenet_udp_send_efs_port" lineno="25152">
12935 +<interface name="corenet_udp_send_efs_port" lineno="25170">
12936 <summary>
12937 Send UDP traffic on the efs port.
12938 </summary>
12939 @@ -25910,7 +25994,7 @@ Domain allowed access.
12940 </param>
12941 <infoflow type="write" weight="10"/>
12942 </interface>
12943 -<interface name="corenet_dontaudit_udp_send_efs_port" lineno="25167">
12944 +<interface name="corenet_dontaudit_udp_send_efs_port" lineno="25185">
12945 <summary>
12946 Do not audit attempts to send UDP traffic on the efs port.
12947 </summary>
12948 @@ -25921,7 +26005,7 @@ Domain to not audit.
12949 </param>
12950 <infoflow type="none"/>
12951 </interface>
12952 -<interface name="corenet_udp_receive_efs_port" lineno="25182">
12953 +<interface name="corenet_udp_receive_efs_port" lineno="25200">
12954 <summary>
12955 Receive UDP traffic on the efs port.
12956 </summary>
12957 @@ -25932,7 +26016,7 @@ Domain allowed access.
12958 </param>
12959 <infoflow type="read" weight="10"/>
12960 </interface>
12961 -<interface name="corenet_dontaudit_udp_receive_efs_port" lineno="25197">
12962 +<interface name="corenet_dontaudit_udp_receive_efs_port" lineno="25215">
12963 <summary>
12964 Do not audit attempts to receive UDP traffic on the efs port.
12965 </summary>
12966 @@ -25943,7 +26027,7 @@ Domain to not audit.
12967 </param>
12968 <infoflow type="none"/>
12969 </interface>
12970 -<interface name="corenet_udp_sendrecv_efs_port" lineno="25212">
12971 +<interface name="corenet_udp_sendrecv_efs_port" lineno="25230">
12972 <summary>
12973 Send and receive UDP traffic on the efs port.
12974 </summary>
12975 @@ -25954,7 +26038,7 @@ Domain allowed access.
12976 </param>
12977 <infoflow type="both" weight="10"/>
12978 </interface>
12979 -<interface name="corenet_dontaudit_udp_sendrecv_efs_port" lineno="25228">
12980 +<interface name="corenet_dontaudit_udp_sendrecv_efs_port" lineno="25246">
12981 <summary>
12982 Do not audit attempts to send and receive
12983 UDP traffic on the efs port.
12984 @@ -25966,7 +26050,7 @@ Domain to not audit.
12985 </param>
12986 <infoflow type="none"/>
12987 </interface>
12988 -<interface name="corenet_tcp_bind_efs_port" lineno="25243">
12989 +<interface name="corenet_tcp_bind_efs_port" lineno="25261">
12990 <summary>
12991 Bind TCP sockets to the efs port.
12992 </summary>
12993 @@ -25977,7 +26061,7 @@ Domain allowed access.
12994 </param>
12995 <infoflow type="none"/>
12996 </interface>
12997 -<interface name="corenet_udp_bind_efs_port" lineno="25263">
12998 +<interface name="corenet_udp_bind_efs_port" lineno="25281">
12999 <summary>
13000 Bind UDP sockets to the efs port.
13001 </summary>
13002 @@ -25988,7 +26072,7 @@ Domain allowed access.
13003 </param>
13004 <infoflow type="none"/>
13005 </interface>
13006 -<interface name="corenet_tcp_connect_efs_port" lineno="25282">
13007 +<interface name="corenet_tcp_connect_efs_port" lineno="25300">
13008 <summary>
13009 Make a TCP connection to the efs port.
13010 </summary>
13011 @@ -25998,7 +26082,7 @@ Domain allowed access.
13012 </summary>
13013 </param>
13014 </interface>
13015 -<interface name="corenet_send_efs_client_packets" lineno="25302">
13016 +<interface name="corenet_send_efs_client_packets" lineno="25320">
13017 <summary>
13018 Send efs_client packets.
13019 </summary>
13020 @@ -26009,7 +26093,7 @@ Domain allowed access.
13021 </param>
13022 <infoflow type="write" weight="10"/>
13023 </interface>
13024 -<interface name="corenet_dontaudit_send_efs_client_packets" lineno="25321">
13025 +<interface name="corenet_dontaudit_send_efs_client_packets" lineno="25339">
13026 <summary>
13027 Do not audit attempts to send efs_client packets.
13028 </summary>
13029 @@ -26020,7 +26104,7 @@ Domain to not audit.
13030 </param>
13031 <infoflow type="none"/>
13032 </interface>
13033 -<interface name="corenet_receive_efs_client_packets" lineno="25340">
13034 +<interface name="corenet_receive_efs_client_packets" lineno="25358">
13035 <summary>
13036 Receive efs_client packets.
13037 </summary>
13038 @@ -26031,7 +26115,7 @@ Domain allowed access.
13039 </param>
13040 <infoflow type="read" weight="10"/>
13041 </interface>
13042 -<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="25359">
13043 +<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="25377">
13044 <summary>
13045 Do not audit attempts to receive efs_client packets.
13046 </summary>
13047 @@ -26042,7 +26126,7 @@ Domain allowed access.
13048 </param>
13049 <infoflow type="none"/>
13050 </interface>
13051 -<interface name="corenet_sendrecv_efs_client_packets" lineno="25378">
13052 +<interface name="corenet_sendrecv_efs_client_packets" lineno="25396">
13053 <summary>
13054 Send and receive efs_client packets.
13055 </summary>
13056 @@ -26053,7 +26137,7 @@ Domain allowed access.
13057 </param>
13058 <infoflow type="both" weight="10"/>
13059 </interface>
13060 -<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="25394">
13061 +<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="25412">
13062 <summary>
13063 Do not audit attempts to send and receive efs_client packets.
13064 </summary>
13065 @@ -26064,7 +26148,7 @@ Domain to not audit.
13066 </param>
13067 <infoflow type="none"/>
13068 </interface>
13069 -<interface name="corenet_relabelto_efs_client_packets" lineno="25409">
13070 +<interface name="corenet_relabelto_efs_client_packets" lineno="25427">
13071 <summary>
13072 Relabel packets to efs_client the packet type.
13073 </summary>
13074 @@ -26074,7 +26158,7 @@ Domain allowed access.
13075 </summary>
13076 </param>
13077 </interface>
13078 -<interface name="corenet_send_efs_server_packets" lineno="25429">
13079 +<interface name="corenet_send_efs_server_packets" lineno="25447">
13080 <summary>
13081 Send efs_server packets.
13082 </summary>
13083 @@ -26085,7 +26169,7 @@ Domain allowed access.
13084 </param>
13085 <infoflow type="write" weight="10"/>
13086 </interface>
13087 -<interface name="corenet_dontaudit_send_efs_server_packets" lineno="25448">
13088 +<interface name="corenet_dontaudit_send_efs_server_packets" lineno="25466">
13089 <summary>
13090 Do not audit attempts to send efs_server packets.
13091 </summary>
13092 @@ -26096,7 +26180,7 @@ Domain to not audit.
13093 </param>
13094 <infoflow type="none"/>
13095 </interface>
13096 -<interface name="corenet_receive_efs_server_packets" lineno="25467">
13097 +<interface name="corenet_receive_efs_server_packets" lineno="25485">
13098 <summary>
13099 Receive efs_server packets.
13100 </summary>
13101 @@ -26107,7 +26191,7 @@ Domain allowed access.
13102 </param>
13103 <infoflow type="read" weight="10"/>
13104 </interface>
13105 -<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="25486">
13106 +<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="25504">
13107 <summary>
13108 Do not audit attempts to receive efs_server packets.
13109 </summary>
13110 @@ -26118,7 +26202,7 @@ Domain allowed access.
13111 </param>
13112 <infoflow type="none"/>
13113 </interface>
13114 -<interface name="corenet_sendrecv_efs_server_packets" lineno="25505">
13115 +<interface name="corenet_sendrecv_efs_server_packets" lineno="25523">
13116 <summary>
13117 Send and receive efs_server packets.
13118 </summary>
13119 @@ -26129,7 +26213,7 @@ Domain allowed access.
13120 </param>
13121 <infoflow type="both" weight="10"/>
13122 </interface>
13123 -<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="25521">
13124 +<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="25539">
13125 <summary>
13126 Do not audit attempts to send and receive efs_server packets.
13127 </summary>
13128 @@ -26140,7 +26224,7 @@ Domain to not audit.
13129 </param>
13130 <infoflow type="none"/>
13131 </interface>
13132 -<interface name="corenet_relabelto_efs_server_packets" lineno="25536">
13133 +<interface name="corenet_relabelto_efs_server_packets" lineno="25554">
13134 <summary>
13135 Relabel packets to efs_server the packet type.
13136 </summary>
13137 @@ -26150,7 +26234,7 @@ Domain allowed access.
13138 </summary>
13139 </param>
13140 </interface>
13141 -<interface name="corenet_tcp_sendrecv_embrace_dp_c_port" lineno="25558">
13142 +<interface name="corenet_tcp_sendrecv_embrace_dp_c_port" lineno="25576">
13143 <summary>
13144 Send and receive TCP traffic on the embrace_dp_c port.
13145 </summary>
13146 @@ -26161,7 +26245,7 @@ Domain allowed access.
13147 </param>
13148 <infoflow type="both" weight="10"/>
13149 </interface>
13150 -<interface name="corenet_udp_send_embrace_dp_c_port" lineno="25573">
13151 +<interface name="corenet_udp_send_embrace_dp_c_port" lineno="25591">
13152 <summary>
13153 Send UDP traffic on the embrace_dp_c port.
13154 </summary>
13155 @@ -26172,7 +26256,7 @@ Domain allowed access.
13156 </param>
13157 <infoflow type="write" weight="10"/>
13158 </interface>
13159 -<interface name="corenet_dontaudit_udp_send_embrace_dp_c_port" lineno="25588">
13160 +<interface name="corenet_dontaudit_udp_send_embrace_dp_c_port" lineno="25606">
13161 <summary>
13162 Do not audit attempts to send UDP traffic on the embrace_dp_c port.
13163 </summary>
13164 @@ -26183,7 +26267,7 @@ Domain to not audit.
13165 </param>
13166 <infoflow type="none"/>
13167 </interface>
13168 -<interface name="corenet_udp_receive_embrace_dp_c_port" lineno="25603">
13169 +<interface name="corenet_udp_receive_embrace_dp_c_port" lineno="25621">
13170 <summary>
13171 Receive UDP traffic on the embrace_dp_c port.
13172 </summary>
13173 @@ -26194,7 +26278,7 @@ Domain allowed access.
13174 </param>
13175 <infoflow type="read" weight="10"/>
13176 </interface>
13177 -<interface name="corenet_dontaudit_udp_receive_embrace_dp_c_port" lineno="25618">
13178 +<interface name="corenet_dontaudit_udp_receive_embrace_dp_c_port" lineno="25636">
13179 <summary>
13180 Do not audit attempts to receive UDP traffic on the embrace_dp_c port.
13181 </summary>
13182 @@ -26205,7 +26289,7 @@ Domain to not audit.
13183 </param>
13184 <infoflow type="none"/>
13185 </interface>
13186 -<interface name="corenet_udp_sendrecv_embrace_dp_c_port" lineno="25633">
13187 +<interface name="corenet_udp_sendrecv_embrace_dp_c_port" lineno="25651">
13188 <summary>
13189 Send and receive UDP traffic on the embrace_dp_c port.
13190 </summary>
13191 @@ -26216,7 +26300,7 @@ Domain allowed access.
13192 </param>
13193 <infoflow type="both" weight="10"/>
13194 </interface>
13195 -<interface name="corenet_dontaudit_udp_sendrecv_embrace_dp_c_port" lineno="25649">
13196 +<interface name="corenet_dontaudit_udp_sendrecv_embrace_dp_c_port" lineno="25667">
13197 <summary>
13198 Do not audit attempts to send and receive
13199 UDP traffic on the embrace_dp_c port.
13200 @@ -26228,7 +26312,7 @@ Domain to not audit.
13201 </param>
13202 <infoflow type="none"/>
13203 </interface>
13204 -<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="25664">
13205 +<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="25682">
13206 <summary>
13207 Bind TCP sockets to the embrace_dp_c port.
13208 </summary>
13209 @@ -26239,7 +26323,7 @@ Domain allowed access.
13210 </param>
13211 <infoflow type="none"/>
13212 </interface>
13213 -<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="25684">
13214 +<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="25702">
13215 <summary>
13216 Bind UDP sockets to the embrace_dp_c port.
13217 </summary>
13218 @@ -26250,7 +26334,7 @@ Domain allowed access.
13219 </param>
13220 <infoflow type="none"/>
13221 </interface>
13222 -<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="25703">
13223 +<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="25721">
13224 <summary>
13225 Make a TCP connection to the embrace_dp_c port.
13226 </summary>
13227 @@ -26260,7 +26344,7 @@ Domain allowed access.
13228 </summary>
13229 </param>
13230 </interface>
13231 -<interface name="corenet_send_embrace_dp_c_client_packets" lineno="25723">
13232 +<interface name="corenet_send_embrace_dp_c_client_packets" lineno="25741">
13233 <summary>
13234 Send embrace_dp_c_client packets.
13235 </summary>
13236 @@ -26271,7 +26355,7 @@ Domain allowed access.
13237 </param>
13238 <infoflow type="write" weight="10"/>
13239 </interface>
13240 -<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="25742">
13241 +<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="25760">
13242 <summary>
13243 Do not audit attempts to send embrace_dp_c_client packets.
13244 </summary>
13245 @@ -26282,7 +26366,7 @@ Domain to not audit.
13246 </param>
13247 <infoflow type="none"/>
13248 </interface>
13249 -<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="25761">
13250 +<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="25779">
13251 <summary>
13252 Receive embrace_dp_c_client packets.
13253 </summary>
13254 @@ -26293,7 +26377,7 @@ Domain allowed access.
13255 </param>
13256 <infoflow type="read" weight="10"/>
13257 </interface>
13258 -<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="25780">
13259 +<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="25798">
13260 <summary>
13261 Do not audit attempts to receive embrace_dp_c_client packets.
13262 </summary>
13263 @@ -26304,7 +26388,7 @@ Domain allowed access.
13264 </param>
13265 <infoflow type="none"/>
13266 </interface>
13267 -<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="25799">
13268 +<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="25817">
13269 <summary>
13270 Send and receive embrace_dp_c_client packets.
13271 </summary>
13272 @@ -26315,7 +26399,7 @@ Domain allowed access.
13273 </param>
13274 <infoflow type="both" weight="10"/>
13275 </interface>
13276 -<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="25815">
13277 +<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="25833">
13278 <summary>
13279 Do not audit attempts to send and receive embrace_dp_c_client packets.
13280 </summary>
13281 @@ -26326,7 +26410,7 @@ Domain to not audit.
13282 </param>
13283 <infoflow type="none"/>
13284 </interface>
13285 -<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="25830">
13286 +<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="25848">
13287 <summary>
13288 Relabel packets to embrace_dp_c_client the packet type.
13289 </summary>
13290 @@ -26336,7 +26420,7 @@ Domain allowed access.
13291 </summary>
13292 </param>
13293 </interface>
13294 -<interface name="corenet_send_embrace_dp_c_server_packets" lineno="25850">
13295 +<interface name="corenet_send_embrace_dp_c_server_packets" lineno="25868">
13296 <summary>
13297 Send embrace_dp_c_server packets.
13298 </summary>
13299 @@ -26347,7 +26431,7 @@ Domain allowed access.
13300 </param>
13301 <infoflow type="write" weight="10"/>
13302 </interface>
13303 -<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="25869">
13304 +<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="25887">
13305 <summary>
13306 Do not audit attempts to send embrace_dp_c_server packets.
13307 </summary>
13308 @@ -26358,7 +26442,7 @@ Domain to not audit.
13309 </param>
13310 <infoflow type="none"/>
13311 </interface>
13312 -<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="25888">
13313 +<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="25906">
13314 <summary>
13315 Receive embrace_dp_c_server packets.
13316 </summary>
13317 @@ -26369,7 +26453,7 @@ Domain allowed access.
13318 </param>
13319 <infoflow type="read" weight="10"/>
13320 </interface>
13321 -<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="25907">
13322 +<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="25925">
13323 <summary>
13324 Do not audit attempts to receive embrace_dp_c_server packets.
13325 </summary>
13326 @@ -26380,7 +26464,7 @@ Domain allowed access.
13327 </param>
13328 <infoflow type="none"/>
13329 </interface>
13330 -<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="25926">
13331 +<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="25944">
13332 <summary>
13333 Send and receive embrace_dp_c_server packets.
13334 </summary>
13335 @@ -26391,7 +26475,7 @@ Domain allowed access.
13336 </param>
13337 <infoflow type="both" weight="10"/>
13338 </interface>
13339 -<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="25942">
13340 +<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="25960">
13341 <summary>
13342 Do not audit attempts to send and receive embrace_dp_c_server packets.
13343 </summary>
13344 @@ -26402,7 +26486,7 @@ Domain to not audit.
13345 </param>
13346 <infoflow type="none"/>
13347 </interface>
13348 -<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="25957">
13349 +<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="25975">
13350 <summary>
13351 Relabel packets to embrace_dp_c_server the packet type.
13352 </summary>
13353 @@ -26412,7 +26496,7 @@ Domain allowed access.
13354 </summary>
13355 </param>
13356 </interface>
13357 -<interface name="corenet_tcp_sendrecv_epmap_port" lineno="25979">
13358 +<interface name="corenet_tcp_sendrecv_epmap_port" lineno="25997">
13359 <summary>
13360 Send and receive TCP traffic on the epmap port.
13361 </summary>
13362 @@ -26423,7 +26507,7 @@ Domain allowed access.
13363 </param>
13364 <infoflow type="both" weight="10"/>
13365 </interface>
13366 -<interface name="corenet_udp_send_epmap_port" lineno="25994">
13367 +<interface name="corenet_udp_send_epmap_port" lineno="26012">
13368 <summary>
13369 Send UDP traffic on the epmap port.
13370 </summary>
13371 @@ -26434,7 +26518,7 @@ Domain allowed access.
13372 </param>
13373 <infoflow type="write" weight="10"/>
13374 </interface>
13375 -<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="26009">
13376 +<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="26027">
13377 <summary>
13378 Do not audit attempts to send UDP traffic on the epmap port.
13379 </summary>
13380 @@ -26445,7 +26529,7 @@ Domain to not audit.
13381 </param>
13382 <infoflow type="none"/>
13383 </interface>
13384 -<interface name="corenet_udp_receive_epmap_port" lineno="26024">
13385 +<interface name="corenet_udp_receive_epmap_port" lineno="26042">
13386 <summary>
13387 Receive UDP traffic on the epmap port.
13388 </summary>
13389 @@ -26456,7 +26540,7 @@ Domain allowed access.
13390 </param>
13391 <infoflow type="read" weight="10"/>
13392 </interface>
13393 -<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="26039">
13394 +<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="26057">
13395 <summary>
13396 Do not audit attempts to receive UDP traffic on the epmap port.
13397 </summary>
13398 @@ -26467,7 +26551,7 @@ Domain to not audit.
13399 </param>
13400 <infoflow type="none"/>
13401 </interface>
13402 -<interface name="corenet_udp_sendrecv_epmap_port" lineno="26054">
13403 +<interface name="corenet_udp_sendrecv_epmap_port" lineno="26072">
13404 <summary>
13405 Send and receive UDP traffic on the epmap port.
13406 </summary>
13407 @@ -26478,7 +26562,7 @@ Domain allowed access.
13408 </param>
13409 <infoflow type="both" weight="10"/>
13410 </interface>
13411 -<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="26070">
13412 +<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="26088">
13413 <summary>
13414 Do not audit attempts to send and receive
13415 UDP traffic on the epmap port.
13416 @@ -26490,7 +26574,7 @@ Domain to not audit.
13417 </param>
13418 <infoflow type="none"/>
13419 </interface>
13420 -<interface name="corenet_tcp_bind_epmap_port" lineno="26085">
13421 +<interface name="corenet_tcp_bind_epmap_port" lineno="26103">
13422 <summary>
13423 Bind TCP sockets to the epmap port.
13424 </summary>
13425 @@ -26501,7 +26585,7 @@ Domain allowed access.
13426 </param>
13427 <infoflow type="none"/>
13428 </interface>
13429 -<interface name="corenet_udp_bind_epmap_port" lineno="26105">
13430 +<interface name="corenet_udp_bind_epmap_port" lineno="26123">
13431 <summary>
13432 Bind UDP sockets to the epmap port.
13433 </summary>
13434 @@ -26512,7 +26596,7 @@ Domain allowed access.
13435 </param>
13436 <infoflow type="none"/>
13437 </interface>
13438 -<interface name="corenet_tcp_connect_epmap_port" lineno="26124">
13439 +<interface name="corenet_tcp_connect_epmap_port" lineno="26142">
13440 <summary>
13441 Make a TCP connection to the epmap port.
13442 </summary>
13443 @@ -26522,7 +26606,7 @@ Domain allowed access.
13444 </summary>
13445 </param>
13446 </interface>
13447 -<interface name="corenet_send_epmap_client_packets" lineno="26144">
13448 +<interface name="corenet_send_epmap_client_packets" lineno="26162">
13449 <summary>
13450 Send epmap_client packets.
13451 </summary>
13452 @@ -26533,7 +26617,7 @@ Domain allowed access.
13453 </param>
13454 <infoflow type="write" weight="10"/>
13455 </interface>
13456 -<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="26163">
13457 +<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="26181">
13458 <summary>
13459 Do not audit attempts to send epmap_client packets.
13460 </summary>
13461 @@ -26544,7 +26628,7 @@ Domain to not audit.
13462 </param>
13463 <infoflow type="none"/>
13464 </interface>
13465 -<interface name="corenet_receive_epmap_client_packets" lineno="26182">
13466 +<interface name="corenet_receive_epmap_client_packets" lineno="26200">
13467 <summary>
13468 Receive epmap_client packets.
13469 </summary>
13470 @@ -26555,7 +26639,7 @@ Domain allowed access.
13471 </param>
13472 <infoflow type="read" weight="10"/>
13473 </interface>
13474 -<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="26201">
13475 +<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="26219">
13476 <summary>
13477 Do not audit attempts to receive epmap_client packets.
13478 </summary>
13479 @@ -26566,7 +26650,7 @@ Domain allowed access.
13480 </param>
13481 <infoflow type="none"/>
13482 </interface>
13483 -<interface name="corenet_sendrecv_epmap_client_packets" lineno="26220">
13484 +<interface name="corenet_sendrecv_epmap_client_packets" lineno="26238">
13485 <summary>
13486 Send and receive epmap_client packets.
13487 </summary>
13488 @@ -26577,7 +26661,7 @@ Domain allowed access.
13489 </param>
13490 <infoflow type="both" weight="10"/>
13491 </interface>
13492 -<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="26236">
13493 +<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="26254">
13494 <summary>
13495 Do not audit attempts to send and receive epmap_client packets.
13496 </summary>
13497 @@ -26588,7 +26672,7 @@ Domain to not audit.
13498 </param>
13499 <infoflow type="none"/>
13500 </interface>
13501 -<interface name="corenet_relabelto_epmap_client_packets" lineno="26251">
13502 +<interface name="corenet_relabelto_epmap_client_packets" lineno="26269">
13503 <summary>
13504 Relabel packets to epmap_client the packet type.
13505 </summary>
13506 @@ -26598,7 +26682,7 @@ Domain allowed access.
13507 </summary>
13508 </param>
13509 </interface>
13510 -<interface name="corenet_send_epmap_server_packets" lineno="26271">
13511 +<interface name="corenet_send_epmap_server_packets" lineno="26289">
13512 <summary>
13513 Send epmap_server packets.
13514 </summary>
13515 @@ -26609,7 +26693,7 @@ Domain allowed access.
13516 </param>
13517 <infoflow type="write" weight="10"/>
13518 </interface>
13519 -<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="26290">
13520 +<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="26308">
13521 <summary>
13522 Do not audit attempts to send epmap_server packets.
13523 </summary>
13524 @@ -26620,7 +26704,7 @@ Domain to not audit.
13525 </param>
13526 <infoflow type="none"/>
13527 </interface>
13528 -<interface name="corenet_receive_epmap_server_packets" lineno="26309">
13529 +<interface name="corenet_receive_epmap_server_packets" lineno="26327">
13530 <summary>
13531 Receive epmap_server packets.
13532 </summary>
13533 @@ -26631,7 +26715,7 @@ Domain allowed access.
13534 </param>
13535 <infoflow type="read" weight="10"/>
13536 </interface>
13537 -<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="26328">
13538 +<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="26346">
13539 <summary>
13540 Do not audit attempts to receive epmap_server packets.
13541 </summary>
13542 @@ -26642,7 +26726,7 @@ Domain allowed access.
13543 </param>
13544 <infoflow type="none"/>
13545 </interface>
13546 -<interface name="corenet_sendrecv_epmap_server_packets" lineno="26347">
13547 +<interface name="corenet_sendrecv_epmap_server_packets" lineno="26365">
13548 <summary>
13549 Send and receive epmap_server packets.
13550 </summary>
13551 @@ -26653,7 +26737,7 @@ Domain allowed access.
13552 </param>
13553 <infoflow type="both" weight="10"/>
13554 </interface>
13555 -<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="26363">
13556 +<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="26381">
13557 <summary>
13558 Do not audit attempts to send and receive epmap_server packets.
13559 </summary>
13560 @@ -26664,7 +26748,7 @@ Domain to not audit.
13561 </param>
13562 <infoflow type="none"/>
13563 </interface>
13564 -<interface name="corenet_relabelto_epmap_server_packets" lineno="26378">
13565 +<interface name="corenet_relabelto_epmap_server_packets" lineno="26396">
13566 <summary>
13567 Relabel packets to epmap_server the packet type.
13568 </summary>
13569 @@ -26674,7 +26758,7 @@ Domain allowed access.
13570 </summary>
13571 </param>
13572 </interface>
13573 -<interface name="corenet_tcp_sendrecv_epmd_port" lineno="26400">
13574 +<interface name="corenet_tcp_sendrecv_epmd_port" lineno="26418">
13575 <summary>
13576 Send and receive TCP traffic on the epmd port.
13577 </summary>
13578 @@ -26685,7 +26769,7 @@ Domain allowed access.
13579 </param>
13580 <infoflow type="both" weight="10"/>
13581 </interface>
13582 -<interface name="corenet_udp_send_epmd_port" lineno="26415">
13583 +<interface name="corenet_udp_send_epmd_port" lineno="26433">
13584 <summary>
13585 Send UDP traffic on the epmd port.
13586 </summary>
13587 @@ -26696,7 +26780,7 @@ Domain allowed access.
13588 </param>
13589 <infoflow type="write" weight="10"/>
13590 </interface>
13591 -<interface name="corenet_dontaudit_udp_send_epmd_port" lineno="26430">
13592 +<interface name="corenet_dontaudit_udp_send_epmd_port" lineno="26448">
13593 <summary>
13594 Do not audit attempts to send UDP traffic on the epmd port.
13595 </summary>
13596 @@ -26707,7 +26791,7 @@ Domain to not audit.
13597 </param>
13598 <infoflow type="none"/>
13599 </interface>
13600 -<interface name="corenet_udp_receive_epmd_port" lineno="26445">
13601 +<interface name="corenet_udp_receive_epmd_port" lineno="26463">
13602 <summary>
13603 Receive UDP traffic on the epmd port.
13604 </summary>
13605 @@ -26718,7 +26802,7 @@ Domain allowed access.
13606 </param>
13607 <infoflow type="read" weight="10"/>
13608 </interface>
13609 -<interface name="corenet_dontaudit_udp_receive_epmd_port" lineno="26460">
13610 +<interface name="corenet_dontaudit_udp_receive_epmd_port" lineno="26478">
13611 <summary>
13612 Do not audit attempts to receive UDP traffic on the epmd port.
13613 </summary>
13614 @@ -26729,7 +26813,7 @@ Domain to not audit.
13615 </param>
13616 <infoflow type="none"/>
13617 </interface>
13618 -<interface name="corenet_udp_sendrecv_epmd_port" lineno="26475">
13619 +<interface name="corenet_udp_sendrecv_epmd_port" lineno="26493">
13620 <summary>
13621 Send and receive UDP traffic on the epmd port.
13622 </summary>
13623 @@ -26740,7 +26824,7 @@ Domain allowed access.
13624 </param>
13625 <infoflow type="both" weight="10"/>
13626 </interface>
13627 -<interface name="corenet_dontaudit_udp_sendrecv_epmd_port" lineno="26491">
13628 +<interface name="corenet_dontaudit_udp_sendrecv_epmd_port" lineno="26509">
13629 <summary>
13630 Do not audit attempts to send and receive
13631 UDP traffic on the epmd port.
13632 @@ -26752,7 +26836,7 @@ Domain to not audit.
13633 </param>
13634 <infoflow type="none"/>
13635 </interface>
13636 -<interface name="corenet_tcp_bind_epmd_port" lineno="26506">
13637 +<interface name="corenet_tcp_bind_epmd_port" lineno="26524">
13638 <summary>
13639 Bind TCP sockets to the epmd port.
13640 </summary>
13641 @@ -26763,7 +26847,7 @@ Domain allowed access.
13642 </param>
13643 <infoflow type="none"/>
13644 </interface>
13645 -<interface name="corenet_udp_bind_epmd_port" lineno="26526">
13646 +<interface name="corenet_udp_bind_epmd_port" lineno="26544">
13647 <summary>
13648 Bind UDP sockets to the epmd port.
13649 </summary>
13650 @@ -26774,7 +26858,7 @@ Domain allowed access.
13651 </param>
13652 <infoflow type="none"/>
13653 </interface>
13654 -<interface name="corenet_tcp_connect_epmd_port" lineno="26545">
13655 +<interface name="corenet_tcp_connect_epmd_port" lineno="26563">
13656 <summary>
13657 Make a TCP connection to the epmd port.
13658 </summary>
13659 @@ -26784,7 +26868,7 @@ Domain allowed access.
13660 </summary>
13661 </param>
13662 </interface>
13663 -<interface name="corenet_send_epmd_client_packets" lineno="26565">
13664 +<interface name="corenet_send_epmd_client_packets" lineno="26583">
13665 <summary>
13666 Send epmd_client packets.
13667 </summary>
13668 @@ -26795,7 +26879,7 @@ Domain allowed access.
13669 </param>
13670 <infoflow type="write" weight="10"/>
13671 </interface>
13672 -<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="26584">
13673 +<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="26602">
13674 <summary>
13675 Do not audit attempts to send epmd_client packets.
13676 </summary>
13677 @@ -26806,7 +26890,7 @@ Domain to not audit.
13678 </param>
13679 <infoflow type="none"/>
13680 </interface>
13681 -<interface name="corenet_receive_epmd_client_packets" lineno="26603">
13682 +<interface name="corenet_receive_epmd_client_packets" lineno="26621">
13683 <summary>
13684 Receive epmd_client packets.
13685 </summary>
13686 @@ -26817,7 +26901,7 @@ Domain allowed access.
13687 </param>
13688 <infoflow type="read" weight="10"/>
13689 </interface>
13690 -<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="26622">
13691 +<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="26640">
13692 <summary>
13693 Do not audit attempts to receive epmd_client packets.
13694 </summary>
13695 @@ -26828,7 +26912,7 @@ Domain allowed access.
13696 </param>
13697 <infoflow type="none"/>
13698 </interface>
13699 -<interface name="corenet_sendrecv_epmd_client_packets" lineno="26641">
13700 +<interface name="corenet_sendrecv_epmd_client_packets" lineno="26659">
13701 <summary>
13702 Send and receive epmd_client packets.
13703 </summary>
13704 @@ -26839,7 +26923,7 @@ Domain allowed access.
13705 </param>
13706 <infoflow type="both" weight="10"/>
13707 </interface>
13708 -<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="26657">
13709 +<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="26675">
13710 <summary>
13711 Do not audit attempts to send and receive epmd_client packets.
13712 </summary>
13713 @@ -26850,7 +26934,7 @@ Domain to not audit.
13714 </param>
13715 <infoflow type="none"/>
13716 </interface>
13717 -<interface name="corenet_relabelto_epmd_client_packets" lineno="26672">
13718 +<interface name="corenet_relabelto_epmd_client_packets" lineno="26690">
13719 <summary>
13720 Relabel packets to epmd_client the packet type.
13721 </summary>
13722 @@ -26860,7 +26944,7 @@ Domain allowed access.
13723 </summary>
13724 </param>
13725 </interface>
13726 -<interface name="corenet_send_epmd_server_packets" lineno="26692">
13727 +<interface name="corenet_send_epmd_server_packets" lineno="26710">
13728 <summary>
13729 Send epmd_server packets.
13730 </summary>
13731 @@ -26871,7 +26955,7 @@ Domain allowed access.
13732 </param>
13733 <infoflow type="write" weight="10"/>
13734 </interface>
13735 -<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="26711">
13736 +<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="26729">
13737 <summary>
13738 Do not audit attempts to send epmd_server packets.
13739 </summary>
13740 @@ -26882,7 +26966,7 @@ Domain to not audit.
13741 </param>
13742 <infoflow type="none"/>
13743 </interface>
13744 -<interface name="corenet_receive_epmd_server_packets" lineno="26730">
13745 +<interface name="corenet_receive_epmd_server_packets" lineno="26748">
13746 <summary>
13747 Receive epmd_server packets.
13748 </summary>
13749 @@ -26893,7 +26977,7 @@ Domain allowed access.
13750 </param>
13751 <infoflow type="read" weight="10"/>
13752 </interface>
13753 -<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="26749">
13754 +<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="26767">
13755 <summary>
13756 Do not audit attempts to receive epmd_server packets.
13757 </summary>
13758 @@ -26904,7 +26988,7 @@ Domain allowed access.
13759 </param>
13760 <infoflow type="none"/>
13761 </interface>
13762 -<interface name="corenet_sendrecv_epmd_server_packets" lineno="26768">
13763 +<interface name="corenet_sendrecv_epmd_server_packets" lineno="26786">
13764 <summary>
13765 Send and receive epmd_server packets.
13766 </summary>
13767 @@ -26915,7 +26999,7 @@ Domain allowed access.
13768 </param>
13769 <infoflow type="both" weight="10"/>
13770 </interface>
13771 -<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="26784">
13772 +<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="26802">
13773 <summary>
13774 Do not audit attempts to send and receive epmd_server packets.
13775 </summary>
13776 @@ -26926,7 +27010,7 @@ Domain to not audit.
13777 </param>
13778 <infoflow type="none"/>
13779 </interface>
13780 -<interface name="corenet_relabelto_epmd_server_packets" lineno="26799">
13781 +<interface name="corenet_relabelto_epmd_server_packets" lineno="26817">
13782 <summary>
13783 Relabel packets to epmd_server the packet type.
13784 </summary>
13785 @@ -26936,7 +27020,7 @@ Domain allowed access.
13786 </summary>
13787 </param>
13788 </interface>
13789 -<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="26821">
13790 +<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="26839">
13791 <summary>
13792 Send and receive TCP traffic on the fingerd port.
13793 </summary>
13794 @@ -26947,7 +27031,7 @@ Domain allowed access.
13795 </param>
13796 <infoflow type="both" weight="10"/>
13797 </interface>
13798 -<interface name="corenet_udp_send_fingerd_port" lineno="26836">
13799 +<interface name="corenet_udp_send_fingerd_port" lineno="26854">
13800 <summary>
13801 Send UDP traffic on the fingerd port.
13802 </summary>
13803 @@ -26958,7 +27042,7 @@ Domain allowed access.
13804 </param>
13805 <infoflow type="write" weight="10"/>
13806 </interface>
13807 -<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="26851">
13808 +<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="26869">
13809 <summary>
13810 Do not audit attempts to send UDP traffic on the fingerd port.
13811 </summary>
13812 @@ -26969,7 +27053,7 @@ Domain to not audit.
13813 </param>
13814 <infoflow type="none"/>
13815 </interface>
13816 -<interface name="corenet_udp_receive_fingerd_port" lineno="26866">
13817 +<interface name="corenet_udp_receive_fingerd_port" lineno="26884">
13818 <summary>
13819 Receive UDP traffic on the fingerd port.
13820 </summary>
13821 @@ -26980,7 +27064,7 @@ Domain allowed access.
13822 </param>
13823 <infoflow type="read" weight="10"/>
13824 </interface>
13825 -<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="26881">
13826 +<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="26899">
13827 <summary>
13828 Do not audit attempts to receive UDP traffic on the fingerd port.
13829 </summary>
13830 @@ -26991,7 +27075,7 @@ Domain to not audit.
13831 </param>
13832 <infoflow type="none"/>
13833 </interface>
13834 -<interface name="corenet_udp_sendrecv_fingerd_port" lineno="26896">
13835 +<interface name="corenet_udp_sendrecv_fingerd_port" lineno="26914">
13836 <summary>
13837 Send and receive UDP traffic on the fingerd port.
13838 </summary>
13839 @@ -27002,7 +27086,7 @@ Domain allowed access.
13840 </param>
13841 <infoflow type="both" weight="10"/>
13842 </interface>
13843 -<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="26912">
13844 +<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="26930">
13845 <summary>
13846 Do not audit attempts to send and receive
13847 UDP traffic on the fingerd port.
13848 @@ -27014,7 +27098,7 @@ Domain to not audit.
13849 </param>
13850 <infoflow type="none"/>
13851 </interface>
13852 -<interface name="corenet_tcp_bind_fingerd_port" lineno="26927">
13853 +<interface name="corenet_tcp_bind_fingerd_port" lineno="26945">
13854 <summary>
13855 Bind TCP sockets to the fingerd port.
13856 </summary>
13857 @@ -27025,7 +27109,7 @@ Domain allowed access.
13858 </param>
13859 <infoflow type="none"/>
13860 </interface>
13861 -<interface name="corenet_udp_bind_fingerd_port" lineno="26947">
13862 +<interface name="corenet_udp_bind_fingerd_port" lineno="26965">
13863 <summary>
13864 Bind UDP sockets to the fingerd port.
13865 </summary>
13866 @@ -27036,7 +27120,7 @@ Domain allowed access.
13867 </param>
13868 <infoflow type="none"/>
13869 </interface>
13870 -<interface name="corenet_tcp_connect_fingerd_port" lineno="26966">
13871 +<interface name="corenet_tcp_connect_fingerd_port" lineno="26984">
13872 <summary>
13873 Make a TCP connection to the fingerd port.
13874 </summary>
13875 @@ -27046,7 +27130,7 @@ Domain allowed access.
13876 </summary>
13877 </param>
13878 </interface>
13879 -<interface name="corenet_send_fingerd_client_packets" lineno="26986">
13880 +<interface name="corenet_send_fingerd_client_packets" lineno="27004">
13881 <summary>
13882 Send fingerd_client packets.
13883 </summary>
13884 @@ -27057,7 +27141,7 @@ Domain allowed access.
13885 </param>
13886 <infoflow type="write" weight="10"/>
13887 </interface>
13888 -<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="27005">
13889 +<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="27023">
13890 <summary>
13891 Do not audit attempts to send fingerd_client packets.
13892 </summary>
13893 @@ -27068,7 +27152,7 @@ Domain to not audit.
13894 </param>
13895 <infoflow type="none"/>
13896 </interface>
13897 -<interface name="corenet_receive_fingerd_client_packets" lineno="27024">
13898 +<interface name="corenet_receive_fingerd_client_packets" lineno="27042">
13899 <summary>
13900 Receive fingerd_client packets.
13901 </summary>
13902 @@ -27079,7 +27163,7 @@ Domain allowed access.
13903 </param>
13904 <infoflow type="read" weight="10"/>
13905 </interface>
13906 -<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="27043">
13907 +<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="27061">
13908 <summary>
13909 Do not audit attempts to receive fingerd_client packets.
13910 </summary>
13911 @@ -27090,7 +27174,7 @@ Domain allowed access.
13912 </param>
13913 <infoflow type="none"/>
13914 </interface>
13915 -<interface name="corenet_sendrecv_fingerd_client_packets" lineno="27062">
13916 +<interface name="corenet_sendrecv_fingerd_client_packets" lineno="27080">
13917 <summary>
13918 Send and receive fingerd_client packets.
13919 </summary>
13920 @@ -27101,7 +27185,7 @@ Domain allowed access.
13921 </param>
13922 <infoflow type="both" weight="10"/>
13923 </interface>
13924 -<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="27078">
13925 +<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="27096">
13926 <summary>
13927 Do not audit attempts to send and receive fingerd_client packets.
13928 </summary>
13929 @@ -27112,7 +27196,7 @@ Domain to not audit.
13930 </param>
13931 <infoflow type="none"/>
13932 </interface>
13933 -<interface name="corenet_relabelto_fingerd_client_packets" lineno="27093">
13934 +<interface name="corenet_relabelto_fingerd_client_packets" lineno="27111">
13935 <summary>
13936 Relabel packets to fingerd_client the packet type.
13937 </summary>
13938 @@ -27122,7 +27206,7 @@ Domain allowed access.
13939 </summary>
13940 </param>
13941 </interface>
13942 -<interface name="corenet_send_fingerd_server_packets" lineno="27113">
13943 +<interface name="corenet_send_fingerd_server_packets" lineno="27131">
13944 <summary>
13945 Send fingerd_server packets.
13946 </summary>
13947 @@ -27133,7 +27217,7 @@ Domain allowed access.
13948 </param>
13949 <infoflow type="write" weight="10"/>
13950 </interface>
13951 -<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="27132">
13952 +<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="27150">
13953 <summary>
13954 Do not audit attempts to send fingerd_server packets.
13955 </summary>
13956 @@ -27144,7 +27228,7 @@ Domain to not audit.
13957 </param>
13958 <infoflow type="none"/>
13959 </interface>
13960 -<interface name="corenet_receive_fingerd_server_packets" lineno="27151">
13961 +<interface name="corenet_receive_fingerd_server_packets" lineno="27169">
13962 <summary>
13963 Receive fingerd_server packets.
13964 </summary>
13965 @@ -27155,7 +27239,7 @@ Domain allowed access.
13966 </param>
13967 <infoflow type="read" weight="10"/>
13968 </interface>
13969 -<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="27170">
13970 +<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="27188">
13971 <summary>
13972 Do not audit attempts to receive fingerd_server packets.
13973 </summary>
13974 @@ -27166,7 +27250,7 @@ Domain allowed access.
13975 </param>
13976 <infoflow type="none"/>
13977 </interface>
13978 -<interface name="corenet_sendrecv_fingerd_server_packets" lineno="27189">
13979 +<interface name="corenet_sendrecv_fingerd_server_packets" lineno="27207">
13980 <summary>
13981 Send and receive fingerd_server packets.
13982 </summary>
13983 @@ -27177,7 +27261,7 @@ Domain allowed access.
13984 </param>
13985 <infoflow type="both" weight="10"/>
13986 </interface>
13987 -<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="27205">
13988 +<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="27223">
13989 <summary>
13990 Do not audit attempts to send and receive fingerd_server packets.
13991 </summary>
13992 @@ -27188,7 +27272,7 @@ Domain to not audit.
13993 </param>
13994 <infoflow type="none"/>
13995 </interface>
13996 -<interface name="corenet_relabelto_fingerd_server_packets" lineno="27220">
13997 +<interface name="corenet_relabelto_fingerd_server_packets" lineno="27238">
13998 <summary>
13999 Relabel packets to fingerd_server the packet type.
14000 </summary>
14001 @@ -27198,7 +27282,7 @@ Domain allowed access.
14002 </summary>
14003 </param>
14004 </interface>
14005 -<interface name="corenet_tcp_sendrecv_ftp_port" lineno="27242">
14006 +<interface name="corenet_tcp_sendrecv_ftp_port" lineno="27260">
14007 <summary>
14008 Send and receive TCP traffic on the ftp port.
14009 </summary>
14010 @@ -27209,7 +27293,7 @@ Domain allowed access.
14011 </param>
14012 <infoflow type="both" weight="10"/>
14013 </interface>
14014 -<interface name="corenet_udp_send_ftp_port" lineno="27257">
14015 +<interface name="corenet_udp_send_ftp_port" lineno="27275">
14016 <summary>
14017 Send UDP traffic on the ftp port.
14018 </summary>
14019 @@ -27220,7 +27304,7 @@ Domain allowed access.
14020 </param>
14021 <infoflow type="write" weight="10"/>
14022 </interface>
14023 -<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="27272">
14024 +<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="27290">
14025 <summary>
14026 Do not audit attempts to send UDP traffic on the ftp port.
14027 </summary>
14028 @@ -27231,7 +27315,7 @@ Domain to not audit.
14029 </param>
14030 <infoflow type="none"/>
14031 </interface>
14032 -<interface name="corenet_udp_receive_ftp_port" lineno="27287">
14033 +<interface name="corenet_udp_receive_ftp_port" lineno="27305">
14034 <summary>
14035 Receive UDP traffic on the ftp port.
14036 </summary>
14037 @@ -27242,7 +27326,7 @@ Domain allowed access.
14038 </param>
14039 <infoflow type="read" weight="10"/>
14040 </interface>
14041 -<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="27302">
14042 +<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="27320">
14043 <summary>
14044 Do not audit attempts to receive UDP traffic on the ftp port.
14045 </summary>
14046 @@ -27253,7 +27337,7 @@ Domain to not audit.
14047 </param>
14048 <infoflow type="none"/>
14049 </interface>
14050 -<interface name="corenet_udp_sendrecv_ftp_port" lineno="27317">
14051 +<interface name="corenet_udp_sendrecv_ftp_port" lineno="27335">
14052 <summary>
14053 Send and receive UDP traffic on the ftp port.
14054 </summary>
14055 @@ -27264,7 +27348,7 @@ Domain allowed access.
14056 </param>
14057 <infoflow type="both" weight="10"/>
14058 </interface>
14059 -<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="27333">
14060 +<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="27351">
14061 <summary>
14062 Do not audit attempts to send and receive
14063 UDP traffic on the ftp port.
14064 @@ -27276,7 +27360,7 @@ Domain to not audit.
14065 </param>
14066 <infoflow type="none"/>
14067 </interface>
14068 -<interface name="corenet_tcp_bind_ftp_port" lineno="27348">
14069 +<interface name="corenet_tcp_bind_ftp_port" lineno="27366">
14070 <summary>
14071 Bind TCP sockets to the ftp port.
14072 </summary>
14073 @@ -27287,7 +27371,7 @@ Domain allowed access.
14074 </param>
14075 <infoflow type="none"/>
14076 </interface>
14077 -<interface name="corenet_udp_bind_ftp_port" lineno="27368">
14078 +<interface name="corenet_udp_bind_ftp_port" lineno="27386">
14079 <summary>
14080 Bind UDP sockets to the ftp port.
14081 </summary>
14082 @@ -27298,7 +27382,7 @@ Domain allowed access.
14083 </param>
14084 <infoflow type="none"/>
14085 </interface>
14086 -<interface name="corenet_tcp_connect_ftp_port" lineno="27387">
14087 +<interface name="corenet_tcp_connect_ftp_port" lineno="27405">
14088 <summary>
14089 Make a TCP connection to the ftp port.
14090 </summary>
14091 @@ -27308,7 +27392,7 @@ Domain allowed access.
14092 </summary>
14093 </param>
14094 </interface>
14095 -<interface name="corenet_send_ftp_client_packets" lineno="27407">
14096 +<interface name="corenet_send_ftp_client_packets" lineno="27425">
14097 <summary>
14098 Send ftp_client packets.
14099 </summary>
14100 @@ -27319,7 +27403,7 @@ Domain allowed access.
14101 </param>
14102 <infoflow type="write" weight="10"/>
14103 </interface>
14104 -<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="27426">
14105 +<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="27444">
14106 <summary>
14107 Do not audit attempts to send ftp_client packets.
14108 </summary>
14109 @@ -27330,7 +27414,7 @@ Domain to not audit.
14110 </param>
14111 <infoflow type="none"/>
14112 </interface>
14113 -<interface name="corenet_receive_ftp_client_packets" lineno="27445">
14114 +<interface name="corenet_receive_ftp_client_packets" lineno="27463">
14115 <summary>
14116 Receive ftp_client packets.
14117 </summary>
14118 @@ -27341,7 +27425,7 @@ Domain allowed access.
14119 </param>
14120 <infoflow type="read" weight="10"/>
14121 </interface>
14122 -<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="27464">
14123 +<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="27482">
14124 <summary>
14125 Do not audit attempts to receive ftp_client packets.
14126 </summary>
14127 @@ -27352,7 +27436,7 @@ Domain allowed access.
14128 </param>
14129 <infoflow type="none"/>
14130 </interface>
14131 -<interface name="corenet_sendrecv_ftp_client_packets" lineno="27483">
14132 +<interface name="corenet_sendrecv_ftp_client_packets" lineno="27501">
14133 <summary>
14134 Send and receive ftp_client packets.
14135 </summary>
14136 @@ -27363,7 +27447,7 @@ Domain allowed access.
14137 </param>
14138 <infoflow type="both" weight="10"/>
14139 </interface>
14140 -<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="27499">
14141 +<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="27517">
14142 <summary>
14143 Do not audit attempts to send and receive ftp_client packets.
14144 </summary>
14145 @@ -27374,7 +27458,7 @@ Domain to not audit.
14146 </param>
14147 <infoflow type="none"/>
14148 </interface>
14149 -<interface name="corenet_relabelto_ftp_client_packets" lineno="27514">
14150 +<interface name="corenet_relabelto_ftp_client_packets" lineno="27532">
14151 <summary>
14152 Relabel packets to ftp_client the packet type.
14153 </summary>
14154 @@ -27384,7 +27468,7 @@ Domain allowed access.
14155 </summary>
14156 </param>
14157 </interface>
14158 -<interface name="corenet_send_ftp_server_packets" lineno="27534">
14159 +<interface name="corenet_send_ftp_server_packets" lineno="27552">
14160 <summary>
14161 Send ftp_server packets.
14162 </summary>
14163 @@ -27395,7 +27479,7 @@ Domain allowed access.
14164 </param>
14165 <infoflow type="write" weight="10"/>
14166 </interface>
14167 -<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="27553">
14168 +<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="27571">
14169 <summary>
14170 Do not audit attempts to send ftp_server packets.
14171 </summary>
14172 @@ -27406,7 +27490,7 @@ Domain to not audit.
14173 </param>
14174 <infoflow type="none"/>
14175 </interface>
14176 -<interface name="corenet_receive_ftp_server_packets" lineno="27572">
14177 +<interface name="corenet_receive_ftp_server_packets" lineno="27590">
14178 <summary>
14179 Receive ftp_server packets.
14180 </summary>
14181 @@ -27417,7 +27501,7 @@ Domain allowed access.
14182 </param>
14183 <infoflow type="read" weight="10"/>
14184 </interface>
14185 -<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="27591">
14186 +<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="27609">
14187 <summary>
14188 Do not audit attempts to receive ftp_server packets.
14189 </summary>
14190 @@ -27428,7 +27512,7 @@ Domain allowed access.
14191 </param>
14192 <infoflow type="none"/>
14193 </interface>
14194 -<interface name="corenet_sendrecv_ftp_server_packets" lineno="27610">
14195 +<interface name="corenet_sendrecv_ftp_server_packets" lineno="27628">
14196 <summary>
14197 Send and receive ftp_server packets.
14198 </summary>
14199 @@ -27439,7 +27523,7 @@ Domain allowed access.
14200 </param>
14201 <infoflow type="both" weight="10"/>
14202 </interface>
14203 -<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="27626">
14204 +<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="27644">
14205 <summary>
14206 Do not audit attempts to send and receive ftp_server packets.
14207 </summary>
14208 @@ -27450,7 +27534,7 @@ Domain to not audit.
14209 </param>
14210 <infoflow type="none"/>
14211 </interface>
14212 -<interface name="corenet_relabelto_ftp_server_packets" lineno="27641">
14213 +<interface name="corenet_relabelto_ftp_server_packets" lineno="27659">
14214 <summary>
14215 Relabel packets to ftp_server the packet type.
14216 </summary>
14217 @@ -27460,7 +27544,7 @@ Domain allowed access.
14218 </summary>
14219 </param>
14220 </interface>
14221 -<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="27663">
14222 +<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="27681">
14223 <summary>
14224 Send and receive TCP traffic on the ftp_data port.
14225 </summary>
14226 @@ -27471,7 +27555,7 @@ Domain allowed access.
14227 </param>
14228 <infoflow type="both" weight="10"/>
14229 </interface>
14230 -<interface name="corenet_udp_send_ftp_data_port" lineno="27678">
14231 +<interface name="corenet_udp_send_ftp_data_port" lineno="27696">
14232 <summary>
14233 Send UDP traffic on the ftp_data port.
14234 </summary>
14235 @@ -27482,7 +27566,7 @@ Domain allowed access.
14236 </param>
14237 <infoflow type="write" weight="10"/>
14238 </interface>
14239 -<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="27693">
14240 +<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="27711">
14241 <summary>
14242 Do not audit attempts to send UDP traffic on the ftp_data port.
14243 </summary>
14244 @@ -27493,7 +27577,7 @@ Domain to not audit.
14245 </param>
14246 <infoflow type="none"/>
14247 </interface>
14248 -<interface name="corenet_udp_receive_ftp_data_port" lineno="27708">
14249 +<interface name="corenet_udp_receive_ftp_data_port" lineno="27726">
14250 <summary>
14251 Receive UDP traffic on the ftp_data port.
14252 </summary>
14253 @@ -27504,7 +27588,7 @@ Domain allowed access.
14254 </param>
14255 <infoflow type="read" weight="10"/>
14256 </interface>
14257 -<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="27723">
14258 +<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="27741">
14259 <summary>
14260 Do not audit attempts to receive UDP traffic on the ftp_data port.
14261 </summary>
14262 @@ -27515,7 +27599,7 @@ Domain to not audit.
14263 </param>
14264 <infoflow type="none"/>
14265 </interface>
14266 -<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="27738">
14267 +<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="27756">
14268 <summary>
14269 Send and receive UDP traffic on the ftp_data port.
14270 </summary>
14271 @@ -27526,7 +27610,7 @@ Domain allowed access.
14272 </param>
14273 <infoflow type="both" weight="10"/>
14274 </interface>
14275 -<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="27754">
14276 +<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="27772">
14277 <summary>
14278 Do not audit attempts to send and receive
14279 UDP traffic on the ftp_data port.
14280 @@ -27538,7 +27622,7 @@ Domain to not audit.
14281 </param>
14282 <infoflow type="none"/>
14283 </interface>
14284 -<interface name="corenet_tcp_bind_ftp_data_port" lineno="27769">
14285 +<interface name="corenet_tcp_bind_ftp_data_port" lineno="27787">
14286 <summary>
14287 Bind TCP sockets to the ftp_data port.
14288 </summary>
14289 @@ -27549,7 +27633,7 @@ Domain allowed access.
14290 </param>
14291 <infoflow type="none"/>
14292 </interface>
14293 -<interface name="corenet_udp_bind_ftp_data_port" lineno="27789">
14294 +<interface name="corenet_udp_bind_ftp_data_port" lineno="27807">
14295 <summary>
14296 Bind UDP sockets to the ftp_data port.
14297 </summary>
14298 @@ -27560,7 +27644,7 @@ Domain allowed access.
14299 </param>
14300 <infoflow type="none"/>
14301 </interface>
14302 -<interface name="corenet_tcp_connect_ftp_data_port" lineno="27808">
14303 +<interface name="corenet_tcp_connect_ftp_data_port" lineno="27826">
14304 <summary>
14305 Make a TCP connection to the ftp_data port.
14306 </summary>
14307 @@ -27570,7 +27654,7 @@ Domain allowed access.
14308 </summary>
14309 </param>
14310 </interface>
14311 -<interface name="corenet_send_ftp_data_client_packets" lineno="27828">
14312 +<interface name="corenet_send_ftp_data_client_packets" lineno="27846">
14313 <summary>
14314 Send ftp_data_client packets.
14315 </summary>
14316 @@ -27581,7 +27665,7 @@ Domain allowed access.
14317 </param>
14318 <infoflow type="write" weight="10"/>
14319 </interface>
14320 -<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="27847">
14321 +<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="27865">
14322 <summary>
14323 Do not audit attempts to send ftp_data_client packets.
14324 </summary>
14325 @@ -27592,7 +27676,7 @@ Domain to not audit.
14326 </param>
14327 <infoflow type="none"/>
14328 </interface>
14329 -<interface name="corenet_receive_ftp_data_client_packets" lineno="27866">
14330 +<interface name="corenet_receive_ftp_data_client_packets" lineno="27884">
14331 <summary>
14332 Receive ftp_data_client packets.
14333 </summary>
14334 @@ -27603,7 +27687,7 @@ Domain allowed access.
14335 </param>
14336 <infoflow type="read" weight="10"/>
14337 </interface>
14338 -<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="27885">
14339 +<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="27903">
14340 <summary>
14341 Do not audit attempts to receive ftp_data_client packets.
14342 </summary>
14343 @@ -27614,7 +27698,7 @@ Domain allowed access.
14344 </param>
14345 <infoflow type="none"/>
14346 </interface>
14347 -<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="27904">
14348 +<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="27922">
14349 <summary>
14350 Send and receive ftp_data_client packets.
14351 </summary>
14352 @@ -27625,7 +27709,7 @@ Domain allowed access.
14353 </param>
14354 <infoflow type="both" weight="10"/>
14355 </interface>
14356 -<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="27920">
14357 +<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="27938">
14358 <summary>
14359 Do not audit attempts to send and receive ftp_data_client packets.
14360 </summary>
14361 @@ -27636,7 +27720,7 @@ Domain to not audit.
14362 </param>
14363 <infoflow type="none"/>
14364 </interface>
14365 -<interface name="corenet_relabelto_ftp_data_client_packets" lineno="27935">
14366 +<interface name="corenet_relabelto_ftp_data_client_packets" lineno="27953">
14367 <summary>
14368 Relabel packets to ftp_data_client the packet type.
14369 </summary>
14370 @@ -27646,7 +27730,7 @@ Domain allowed access.
14371 </summary>
14372 </param>
14373 </interface>
14374 -<interface name="corenet_send_ftp_data_server_packets" lineno="27955">
14375 +<interface name="corenet_send_ftp_data_server_packets" lineno="27973">
14376 <summary>
14377 Send ftp_data_server packets.
14378 </summary>
14379 @@ -27657,7 +27741,7 @@ Domain allowed access.
14380 </param>
14381 <infoflow type="write" weight="10"/>
14382 </interface>
14383 -<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="27974">
14384 +<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="27992">
14385 <summary>
14386 Do not audit attempts to send ftp_data_server packets.
14387 </summary>
14388 @@ -27668,7 +27752,7 @@ Domain to not audit.
14389 </param>
14390 <infoflow type="none"/>
14391 </interface>
14392 -<interface name="corenet_receive_ftp_data_server_packets" lineno="27993">
14393 +<interface name="corenet_receive_ftp_data_server_packets" lineno="28011">
14394 <summary>
14395 Receive ftp_data_server packets.
14396 </summary>
14397 @@ -27679,7 +27763,7 @@ Domain allowed access.
14398 </param>
14399 <infoflow type="read" weight="10"/>
14400 </interface>
14401 -<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="28012">
14402 +<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="28030">
14403 <summary>
14404 Do not audit attempts to receive ftp_data_server packets.
14405 </summary>
14406 @@ -27690,7 +27774,7 @@ Domain allowed access.
14407 </param>
14408 <infoflow type="none"/>
14409 </interface>
14410 -<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="28031">
14411 +<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="28049">
14412 <summary>
14413 Send and receive ftp_data_server packets.
14414 </summary>
14415 @@ -27701,7 +27785,7 @@ Domain allowed access.
14416 </param>
14417 <infoflow type="both" weight="10"/>
14418 </interface>
14419 -<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="28047">
14420 +<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="28065">
14421 <summary>
14422 Do not audit attempts to send and receive ftp_data_server packets.
14423 </summary>
14424 @@ -27712,7 +27796,7 @@ Domain to not audit.
14425 </param>
14426 <infoflow type="none"/>
14427 </interface>
14428 -<interface name="corenet_relabelto_ftp_data_server_packets" lineno="28062">
14429 +<interface name="corenet_relabelto_ftp_data_server_packets" lineno="28080">
14430 <summary>
14431 Relabel packets to ftp_data_server the packet type.
14432 </summary>
14433 @@ -27722,7 +27806,7 @@ Domain allowed access.
14434 </summary>
14435 </param>
14436 </interface>
14437 -<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="28084">
14438 +<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="28102">
14439 <summary>
14440 Send and receive TCP traffic on the gatekeeper port.
14441 </summary>
14442 @@ -27733,7 +27817,7 @@ Domain allowed access.
14443 </param>
14444 <infoflow type="both" weight="10"/>
14445 </interface>
14446 -<interface name="corenet_udp_send_gatekeeper_port" lineno="28099">
14447 +<interface name="corenet_udp_send_gatekeeper_port" lineno="28117">
14448 <summary>
14449 Send UDP traffic on the gatekeeper port.
14450 </summary>
14451 @@ -27744,7 +27828,7 @@ Domain allowed access.
14452 </param>
14453 <infoflow type="write" weight="10"/>
14454 </interface>
14455 -<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="28114">
14456 +<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="28132">
14457 <summary>
14458 Do not audit attempts to send UDP traffic on the gatekeeper port.
14459 </summary>
14460 @@ -27755,7 +27839,7 @@ Domain to not audit.
14461 </param>
14462 <infoflow type="none"/>
14463 </interface>
14464 -<interface name="corenet_udp_receive_gatekeeper_port" lineno="28129">
14465 +<interface name="corenet_udp_receive_gatekeeper_port" lineno="28147">
14466 <summary>
14467 Receive UDP traffic on the gatekeeper port.
14468 </summary>
14469 @@ -27766,7 +27850,7 @@ Domain allowed access.
14470 </param>
14471 <infoflow type="read" weight="10"/>
14472 </interface>
14473 -<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="28144">
14474 +<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="28162">
14475 <summary>
14476 Do not audit attempts to receive UDP traffic on the gatekeeper port.
14477 </summary>
14478 @@ -27777,7 +27861,7 @@ Domain to not audit.
14479 </param>
14480 <infoflow type="none"/>
14481 </interface>
14482 -<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="28159">
14483 +<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="28177">
14484 <summary>
14485 Send and receive UDP traffic on the gatekeeper port.
14486 </summary>
14487 @@ -27788,7 +27872,7 @@ Domain allowed access.
14488 </param>
14489 <infoflow type="both" weight="10"/>
14490 </interface>
14491 -<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="28175">
14492 +<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="28193">
14493 <summary>
14494 Do not audit attempts to send and receive
14495 UDP traffic on the gatekeeper port.
14496 @@ -27800,7 +27884,7 @@ Domain to not audit.
14497 </param>
14498 <infoflow type="none"/>
14499 </interface>
14500 -<interface name="corenet_tcp_bind_gatekeeper_port" lineno="28190">
14501 +<interface name="corenet_tcp_bind_gatekeeper_port" lineno="28208">
14502 <summary>
14503 Bind TCP sockets to the gatekeeper port.
14504 </summary>
14505 @@ -27811,7 +27895,7 @@ Domain allowed access.
14506 </param>
14507 <infoflow type="none"/>
14508 </interface>
14509 -<interface name="corenet_udp_bind_gatekeeper_port" lineno="28210">
14510 +<interface name="corenet_udp_bind_gatekeeper_port" lineno="28228">
14511 <summary>
14512 Bind UDP sockets to the gatekeeper port.
14513 </summary>
14514 @@ -27822,7 +27906,7 @@ Domain allowed access.
14515 </param>
14516 <infoflow type="none"/>
14517 </interface>
14518 -<interface name="corenet_tcp_connect_gatekeeper_port" lineno="28229">
14519 +<interface name="corenet_tcp_connect_gatekeeper_port" lineno="28247">
14520 <summary>
14521 Make a TCP connection to the gatekeeper port.
14522 </summary>
14523 @@ -27832,7 +27916,7 @@ Domain allowed access.
14524 </summary>
14525 </param>
14526 </interface>
14527 -<interface name="corenet_send_gatekeeper_client_packets" lineno="28249">
14528 +<interface name="corenet_send_gatekeeper_client_packets" lineno="28267">
14529 <summary>
14530 Send gatekeeper_client packets.
14531 </summary>
14532 @@ -27843,7 +27927,7 @@ Domain allowed access.
14533 </param>
14534 <infoflow type="write" weight="10"/>
14535 </interface>
14536 -<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="28268">
14537 +<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="28286">
14538 <summary>
14539 Do not audit attempts to send gatekeeper_client packets.
14540 </summary>
14541 @@ -27854,7 +27938,7 @@ Domain to not audit.
14542 </param>
14543 <infoflow type="none"/>
14544 </interface>
14545 -<interface name="corenet_receive_gatekeeper_client_packets" lineno="28287">
14546 +<interface name="corenet_receive_gatekeeper_client_packets" lineno="28305">
14547 <summary>
14548 Receive gatekeeper_client packets.
14549 </summary>
14550 @@ -27865,7 +27949,7 @@ Domain allowed access.
14551 </param>
14552 <infoflow type="read" weight="10"/>
14553 </interface>
14554 -<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="28306">
14555 +<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="28324">
14556 <summary>
14557 Do not audit attempts to receive gatekeeper_client packets.
14558 </summary>
14559 @@ -27876,7 +27960,7 @@ Domain allowed access.
14560 </param>
14561 <infoflow type="none"/>
14562 </interface>
14563 -<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="28325">
14564 +<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="28343">
14565 <summary>
14566 Send and receive gatekeeper_client packets.
14567 </summary>
14568 @@ -27887,7 +27971,7 @@ Domain allowed access.
14569 </param>
14570 <infoflow type="both" weight="10"/>
14571 </interface>
14572 -<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="28341">
14573 +<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="28359">
14574 <summary>
14575 Do not audit attempts to send and receive gatekeeper_client packets.
14576 </summary>
14577 @@ -27898,7 +27982,7 @@ Domain to not audit.
14578 </param>
14579 <infoflow type="none"/>
14580 </interface>
14581 -<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="28356">
14582 +<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="28374">
14583 <summary>
14584 Relabel packets to gatekeeper_client the packet type.
14585 </summary>
14586 @@ -27908,7 +27992,7 @@ Domain allowed access.
14587 </summary>
14588 </param>
14589 </interface>
14590 -<interface name="corenet_send_gatekeeper_server_packets" lineno="28376">
14591 +<interface name="corenet_send_gatekeeper_server_packets" lineno="28394">
14592 <summary>
14593 Send gatekeeper_server packets.
14594 </summary>
14595 @@ -27919,7 +28003,7 @@ Domain allowed access.
14596 </param>
14597 <infoflow type="write" weight="10"/>
14598 </interface>
14599 -<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="28395">
14600 +<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="28413">
14601 <summary>
14602 Do not audit attempts to send gatekeeper_server packets.
14603 </summary>
14604 @@ -27930,7 +28014,7 @@ Domain to not audit.
14605 </param>
14606 <infoflow type="none"/>
14607 </interface>
14608 -<interface name="corenet_receive_gatekeeper_server_packets" lineno="28414">
14609 +<interface name="corenet_receive_gatekeeper_server_packets" lineno="28432">
14610 <summary>
14611 Receive gatekeeper_server packets.
14612 </summary>
14613 @@ -27941,7 +28025,7 @@ Domain allowed access.
14614 </param>
14615 <infoflow type="read" weight="10"/>
14616 </interface>
14617 -<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="28433">
14618 +<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="28451">
14619 <summary>
14620 Do not audit attempts to receive gatekeeper_server packets.
14621 </summary>
14622 @@ -27952,7 +28036,7 @@ Domain allowed access.
14623 </param>
14624 <infoflow type="none"/>
14625 </interface>
14626 -<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="28452">
14627 +<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="28470">
14628 <summary>
14629 Send and receive gatekeeper_server packets.
14630 </summary>
14631 @@ -27963,7 +28047,7 @@ Domain allowed access.
14632 </param>
14633 <infoflow type="both" weight="10"/>
14634 </interface>
14635 -<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="28468">
14636 +<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="28486">
14637 <summary>
14638 Do not audit attempts to send and receive gatekeeper_server packets.
14639 </summary>
14640 @@ -27974,7 +28058,7 @@ Domain to not audit.
14641 </param>
14642 <infoflow type="none"/>
14643 </interface>
14644 -<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="28483">
14645 +<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="28501">
14646 <summary>
14647 Relabel packets to gatekeeper_server the packet type.
14648 </summary>
14649 @@ -27984,7 +28068,7 @@ Domain allowed access.
14650 </summary>
14651 </param>
14652 </interface>
14653 -<interface name="corenet_tcp_sendrecv_gdomap_port" lineno="28505">
14654 +<interface name="corenet_tcp_sendrecv_gdomap_port" lineno="28523">
14655 <summary>
14656 Send and receive TCP traffic on the gdomap port.
14657 </summary>
14658 @@ -27995,7 +28079,7 @@ Domain allowed access.
14659 </param>
14660 <infoflow type="both" weight="10"/>
14661 </interface>
14662 -<interface name="corenet_udp_send_gdomap_port" lineno="28520">
14663 +<interface name="corenet_udp_send_gdomap_port" lineno="28538">
14664 <summary>
14665 Send UDP traffic on the gdomap port.
14666 </summary>
14667 @@ -28006,7 +28090,7 @@ Domain allowed access.
14668 </param>
14669 <infoflow type="write" weight="10"/>
14670 </interface>
14671 -<interface name="corenet_dontaudit_udp_send_gdomap_port" lineno="28535">
14672 +<interface name="corenet_dontaudit_udp_send_gdomap_port" lineno="28553">
14673 <summary>
14674 Do not audit attempts to send UDP traffic on the gdomap port.
14675 </summary>
14676 @@ -28017,7 +28101,7 @@ Domain to not audit.
14677 </param>
14678 <infoflow type="none"/>
14679 </interface>
14680 -<interface name="corenet_udp_receive_gdomap_port" lineno="28550">
14681 +<interface name="corenet_udp_receive_gdomap_port" lineno="28568">
14682 <summary>
14683 Receive UDP traffic on the gdomap port.
14684 </summary>
14685 @@ -28028,7 +28112,7 @@ Domain allowed access.
14686 </param>
14687 <infoflow type="read" weight="10"/>
14688 </interface>
14689 -<interface name="corenet_dontaudit_udp_receive_gdomap_port" lineno="28565">
14690 +<interface name="corenet_dontaudit_udp_receive_gdomap_port" lineno="28583">
14691 <summary>
14692 Do not audit attempts to receive UDP traffic on the gdomap port.
14693 </summary>
14694 @@ -28039,7 +28123,7 @@ Domain to not audit.
14695 </param>
14696 <infoflow type="none"/>
14697 </interface>
14698 -<interface name="corenet_udp_sendrecv_gdomap_port" lineno="28580">
14699 +<interface name="corenet_udp_sendrecv_gdomap_port" lineno="28598">
14700 <summary>
14701 Send and receive UDP traffic on the gdomap port.
14702 </summary>
14703 @@ -28050,7 +28134,7 @@ Domain allowed access.
14704 </param>
14705 <infoflow type="both" weight="10"/>
14706 </interface>
14707 -<interface name="corenet_dontaudit_udp_sendrecv_gdomap_port" lineno="28596">
14708 +<interface name="corenet_dontaudit_udp_sendrecv_gdomap_port" lineno="28614">
14709 <summary>
14710 Do not audit attempts to send and receive
14711 UDP traffic on the gdomap port.
14712 @@ -28062,7 +28146,7 @@ Domain to not audit.
14713 </param>
14714 <infoflow type="none"/>
14715 </interface>
14716 -<interface name="corenet_tcp_bind_gdomap_port" lineno="28611">
14717 +<interface name="corenet_tcp_bind_gdomap_port" lineno="28629">
14718 <summary>
14719 Bind TCP sockets to the gdomap port.
14720 </summary>
14721 @@ -28073,7 +28157,7 @@ Domain allowed access.
14722 </param>
14723 <infoflow type="none"/>
14724 </interface>
14725 -<interface name="corenet_udp_bind_gdomap_port" lineno="28631">
14726 +<interface name="corenet_udp_bind_gdomap_port" lineno="28649">
14727 <summary>
14728 Bind UDP sockets to the gdomap port.
14729 </summary>
14730 @@ -28084,7 +28168,7 @@ Domain allowed access.
14731 </param>
14732 <infoflow type="none"/>
14733 </interface>
14734 -<interface name="corenet_tcp_connect_gdomap_port" lineno="28650">
14735 +<interface name="corenet_tcp_connect_gdomap_port" lineno="28668">
14736 <summary>
14737 Make a TCP connection to the gdomap port.
14738 </summary>
14739 @@ -28094,7 +28178,7 @@ Domain allowed access.
14740 </summary>
14741 </param>
14742 </interface>
14743 -<interface name="corenet_send_gdomap_client_packets" lineno="28670">
14744 +<interface name="corenet_send_gdomap_client_packets" lineno="28688">
14745 <summary>
14746 Send gdomap_client packets.
14747 </summary>
14748 @@ -28105,7 +28189,7 @@ Domain allowed access.
14749 </param>
14750 <infoflow type="write" weight="10"/>
14751 </interface>
14752 -<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="28689">
14753 +<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="28707">
14754 <summary>
14755 Do not audit attempts to send gdomap_client packets.
14756 </summary>
14757 @@ -28116,7 +28200,7 @@ Domain to not audit.
14758 </param>
14759 <infoflow type="none"/>
14760 </interface>
14761 -<interface name="corenet_receive_gdomap_client_packets" lineno="28708">
14762 +<interface name="corenet_receive_gdomap_client_packets" lineno="28726">
14763 <summary>
14764 Receive gdomap_client packets.
14765 </summary>
14766 @@ -28127,7 +28211,7 @@ Domain allowed access.
14767 </param>
14768 <infoflow type="read" weight="10"/>
14769 </interface>
14770 -<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="28727">
14771 +<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="28745">
14772 <summary>
14773 Do not audit attempts to receive gdomap_client packets.
14774 </summary>
14775 @@ -28138,7 +28222,7 @@ Domain allowed access.
14776 </param>
14777 <infoflow type="none"/>
14778 </interface>
14779 -<interface name="corenet_sendrecv_gdomap_client_packets" lineno="28746">
14780 +<interface name="corenet_sendrecv_gdomap_client_packets" lineno="28764">
14781 <summary>
14782 Send and receive gdomap_client packets.
14783 </summary>
14784 @@ -28149,7 +28233,7 @@ Domain allowed access.
14785 </param>
14786 <infoflow type="both" weight="10"/>
14787 </interface>
14788 -<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="28762">
14789 +<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="28780">
14790 <summary>
14791 Do not audit attempts to send and receive gdomap_client packets.
14792 </summary>
14793 @@ -28160,7 +28244,7 @@ Domain to not audit.
14794 </param>
14795 <infoflow type="none"/>
14796 </interface>
14797 -<interface name="corenet_relabelto_gdomap_client_packets" lineno="28777">
14798 +<interface name="corenet_relabelto_gdomap_client_packets" lineno="28795">
14799 <summary>
14800 Relabel packets to gdomap_client the packet type.
14801 </summary>
14802 @@ -28170,7 +28254,7 @@ Domain allowed access.
14803 </summary>
14804 </param>
14805 </interface>
14806 -<interface name="corenet_send_gdomap_server_packets" lineno="28797">
14807 +<interface name="corenet_send_gdomap_server_packets" lineno="28815">
14808 <summary>
14809 Send gdomap_server packets.
14810 </summary>
14811 @@ -28181,7 +28265,7 @@ Domain allowed access.
14812 </param>
14813 <infoflow type="write" weight="10"/>
14814 </interface>
14815 -<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="28816">
14816 +<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="28834">
14817 <summary>
14818 Do not audit attempts to send gdomap_server packets.
14819 </summary>
14820 @@ -28192,7 +28276,7 @@ Domain to not audit.
14821 </param>
14822 <infoflow type="none"/>
14823 </interface>
14824 -<interface name="corenet_receive_gdomap_server_packets" lineno="28835">
14825 +<interface name="corenet_receive_gdomap_server_packets" lineno="28853">
14826 <summary>
14827 Receive gdomap_server packets.
14828 </summary>
14829 @@ -28203,7 +28287,7 @@ Domain allowed access.
14830 </param>
14831 <infoflow type="read" weight="10"/>
14832 </interface>
14833 -<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="28854">
14834 +<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="28872">
14835 <summary>
14836 Do not audit attempts to receive gdomap_server packets.
14837 </summary>
14838 @@ -28214,7 +28298,7 @@ Domain allowed access.
14839 </param>
14840 <infoflow type="none"/>
14841 </interface>
14842 -<interface name="corenet_sendrecv_gdomap_server_packets" lineno="28873">
14843 +<interface name="corenet_sendrecv_gdomap_server_packets" lineno="28891">
14844 <summary>
14845 Send and receive gdomap_server packets.
14846 </summary>
14847 @@ -28225,7 +28309,7 @@ Domain allowed access.
14848 </param>
14849 <infoflow type="both" weight="10"/>
14850 </interface>
14851 -<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="28889">
14852 +<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="28907">
14853 <summary>
14854 Do not audit attempts to send and receive gdomap_server packets.
14855 </summary>
14856 @@ -28236,7 +28320,7 @@ Domain to not audit.
14857 </param>
14858 <infoflow type="none"/>
14859 </interface>
14860 -<interface name="corenet_relabelto_gdomap_server_packets" lineno="28904">
14861 +<interface name="corenet_relabelto_gdomap_server_packets" lineno="28922">
14862 <summary>
14863 Relabel packets to gdomap_server the packet type.
14864 </summary>
14865 @@ -28246,7 +28330,7 @@ Domain allowed access.
14866 </summary>
14867 </param>
14868 </interface>
14869 -<interface name="corenet_tcp_sendrecv_gds_db_port" lineno="28926">
14870 +<interface name="corenet_tcp_sendrecv_gds_db_port" lineno="28944">
14871 <summary>
14872 Send and receive TCP traffic on the gds_db port.
14873 </summary>
14874 @@ -28257,7 +28341,7 @@ Domain allowed access.
14875 </param>
14876 <infoflow type="both" weight="10"/>
14877 </interface>
14878 -<interface name="corenet_udp_send_gds_db_port" lineno="28941">
14879 +<interface name="corenet_udp_send_gds_db_port" lineno="28959">
14880 <summary>
14881 Send UDP traffic on the gds_db port.
14882 </summary>
14883 @@ -28268,7 +28352,7 @@ Domain allowed access.
14884 </param>
14885 <infoflow type="write" weight="10"/>
14886 </interface>
14887 -<interface name="corenet_dontaudit_udp_send_gds_db_port" lineno="28956">
14888 +<interface name="corenet_dontaudit_udp_send_gds_db_port" lineno="28974">
14889 <summary>
14890 Do not audit attempts to send UDP traffic on the gds_db port.
14891 </summary>
14892 @@ -28279,7 +28363,7 @@ Domain to not audit.
14893 </param>
14894 <infoflow type="none"/>
14895 </interface>
14896 -<interface name="corenet_udp_receive_gds_db_port" lineno="28971">
14897 +<interface name="corenet_udp_receive_gds_db_port" lineno="28989">
14898 <summary>
14899 Receive UDP traffic on the gds_db port.
14900 </summary>
14901 @@ -28290,7 +28374,7 @@ Domain allowed access.
14902 </param>
14903 <infoflow type="read" weight="10"/>
14904 </interface>
14905 -<interface name="corenet_dontaudit_udp_receive_gds_db_port" lineno="28986">
14906 +<interface name="corenet_dontaudit_udp_receive_gds_db_port" lineno="29004">
14907 <summary>
14908 Do not audit attempts to receive UDP traffic on the gds_db port.
14909 </summary>
14910 @@ -28301,7 +28385,7 @@ Domain to not audit.
14911 </param>
14912 <infoflow type="none"/>
14913 </interface>
14914 -<interface name="corenet_udp_sendrecv_gds_db_port" lineno="29001">
14915 +<interface name="corenet_udp_sendrecv_gds_db_port" lineno="29019">
14916 <summary>
14917 Send and receive UDP traffic on the gds_db port.
14918 </summary>
14919 @@ -28312,7 +28396,7 @@ Domain allowed access.
14920 </param>
14921 <infoflow type="both" weight="10"/>
14922 </interface>
14923 -<interface name="corenet_dontaudit_udp_sendrecv_gds_db_port" lineno="29017">
14924 +<interface name="corenet_dontaudit_udp_sendrecv_gds_db_port" lineno="29035">
14925 <summary>
14926 Do not audit attempts to send and receive
14927 UDP traffic on the gds_db port.
14928 @@ -28324,7 +28408,7 @@ Domain to not audit.
14929 </param>
14930 <infoflow type="none"/>
14931 </interface>
14932 -<interface name="corenet_tcp_bind_gds_db_port" lineno="29032">
14933 +<interface name="corenet_tcp_bind_gds_db_port" lineno="29050">
14934 <summary>
14935 Bind TCP sockets to the gds_db port.
14936 </summary>
14937 @@ -28335,7 +28419,7 @@ Domain allowed access.
14938 </param>
14939 <infoflow type="none"/>
14940 </interface>
14941 -<interface name="corenet_udp_bind_gds_db_port" lineno="29052">
14942 +<interface name="corenet_udp_bind_gds_db_port" lineno="29070">
14943 <summary>
14944 Bind UDP sockets to the gds_db port.
14945 </summary>
14946 @@ -28346,7 +28430,7 @@ Domain allowed access.
14947 </param>
14948 <infoflow type="none"/>
14949 </interface>
14950 -<interface name="corenet_tcp_connect_gds_db_port" lineno="29071">
14951 +<interface name="corenet_tcp_connect_gds_db_port" lineno="29089">
14952 <summary>
14953 Make a TCP connection to the gds_db port.
14954 </summary>
14955 @@ -28356,7 +28440,7 @@ Domain allowed access.
14956 </summary>
14957 </param>
14958 </interface>
14959 -<interface name="corenet_send_gds_db_client_packets" lineno="29091">
14960 +<interface name="corenet_send_gds_db_client_packets" lineno="29109">
14961 <summary>
14962 Send gds_db_client packets.
14963 </summary>
14964 @@ -28367,7 +28451,7 @@ Domain allowed access.
14965 </param>
14966 <infoflow type="write" weight="10"/>
14967 </interface>
14968 -<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="29110">
14969 +<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="29128">
14970 <summary>
14971 Do not audit attempts to send gds_db_client packets.
14972 </summary>
14973 @@ -28378,7 +28462,7 @@ Domain to not audit.
14974 </param>
14975 <infoflow type="none"/>
14976 </interface>
14977 -<interface name="corenet_receive_gds_db_client_packets" lineno="29129">
14978 +<interface name="corenet_receive_gds_db_client_packets" lineno="29147">
14979 <summary>
14980 Receive gds_db_client packets.
14981 </summary>
14982 @@ -28389,7 +28473,7 @@ Domain allowed access.
14983 </param>
14984 <infoflow type="read" weight="10"/>
14985 </interface>
14986 -<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="29148">
14987 +<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="29166">
14988 <summary>
14989 Do not audit attempts to receive gds_db_client packets.
14990 </summary>
14991 @@ -28400,7 +28484,7 @@ Domain allowed access.
14992 </param>
14993 <infoflow type="none"/>
14994 </interface>
14995 -<interface name="corenet_sendrecv_gds_db_client_packets" lineno="29167">
14996 +<interface name="corenet_sendrecv_gds_db_client_packets" lineno="29185">
14997 <summary>
14998 Send and receive gds_db_client packets.
14999 </summary>
15000 @@ -28411,7 +28495,7 @@ Domain allowed access.
15001 </param>
15002 <infoflow type="both" weight="10"/>
15003 </interface>
15004 -<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="29183">
15005 +<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="29201">
15006 <summary>
15007 Do not audit attempts to send and receive gds_db_client packets.
15008 </summary>
15009 @@ -28422,7 +28506,7 @@ Domain to not audit.
15010 </param>
15011 <infoflow type="none"/>
15012 </interface>
15013 -<interface name="corenet_relabelto_gds_db_client_packets" lineno="29198">
15014 +<interface name="corenet_relabelto_gds_db_client_packets" lineno="29216">
15015 <summary>
15016 Relabel packets to gds_db_client the packet type.
15017 </summary>
15018 @@ -28432,7 +28516,7 @@ Domain allowed access.
15019 </summary>
15020 </param>
15021 </interface>
15022 -<interface name="corenet_send_gds_db_server_packets" lineno="29218">
15023 +<interface name="corenet_send_gds_db_server_packets" lineno="29236">
15024 <summary>
15025 Send gds_db_server packets.
15026 </summary>
15027 @@ -28443,7 +28527,7 @@ Domain allowed access.
15028 </param>
15029 <infoflow type="write" weight="10"/>
15030 </interface>
15031 -<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="29237">
15032 +<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="29255">
15033 <summary>
15034 Do not audit attempts to send gds_db_server packets.
15035 </summary>
15036 @@ -28454,7 +28538,7 @@ Domain to not audit.
15037 </param>
15038 <infoflow type="none"/>
15039 </interface>
15040 -<interface name="corenet_receive_gds_db_server_packets" lineno="29256">
15041 +<interface name="corenet_receive_gds_db_server_packets" lineno="29274">
15042 <summary>
15043 Receive gds_db_server packets.
15044 </summary>
15045 @@ -28465,7 +28549,7 @@ Domain allowed access.
15046 </param>
15047 <infoflow type="read" weight="10"/>
15048 </interface>
15049 -<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="29275">
15050 +<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="29293">
15051 <summary>
15052 Do not audit attempts to receive gds_db_server packets.
15053 </summary>
15054 @@ -28476,7 +28560,7 @@ Domain allowed access.
15055 </param>
15056 <infoflow type="none"/>
15057 </interface>
15058 -<interface name="corenet_sendrecv_gds_db_server_packets" lineno="29294">
15059 +<interface name="corenet_sendrecv_gds_db_server_packets" lineno="29312">
15060 <summary>
15061 Send and receive gds_db_server packets.
15062 </summary>
15063 @@ -28487,7 +28571,7 @@ Domain allowed access.
15064 </param>
15065 <infoflow type="both" weight="10"/>
15066 </interface>
15067 -<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="29310">
15068 +<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="29328">
15069 <summary>
15070 Do not audit attempts to send and receive gds_db_server packets.
15071 </summary>
15072 @@ -28498,7 +28582,7 @@ Domain to not audit.
15073 </param>
15074 <infoflow type="none"/>
15075 </interface>
15076 -<interface name="corenet_relabelto_gds_db_server_packets" lineno="29325">
15077 +<interface name="corenet_relabelto_gds_db_server_packets" lineno="29343">
15078 <summary>
15079 Relabel packets to gds_db_server the packet type.
15080 </summary>
15081 @@ -28508,7 +28592,7 @@ Domain allowed access.
15082 </summary>
15083 </param>
15084 </interface>
15085 -<interface name="corenet_tcp_sendrecv_git_port" lineno="29347">
15086 +<interface name="corenet_tcp_sendrecv_git_port" lineno="29365">
15087 <summary>
15088 Send and receive TCP traffic on the git port.
15089 </summary>
15090 @@ -28519,7 +28603,7 @@ Domain allowed access.
15091 </param>
15092 <infoflow type="both" weight="10"/>
15093 </interface>
15094 -<interface name="corenet_udp_send_git_port" lineno="29362">
15095 +<interface name="corenet_udp_send_git_port" lineno="29380">
15096 <summary>
15097 Send UDP traffic on the git port.
15098 </summary>
15099 @@ -28530,7 +28614,7 @@ Domain allowed access.
15100 </param>
15101 <infoflow type="write" weight="10"/>
15102 </interface>
15103 -<interface name="corenet_dontaudit_udp_send_git_port" lineno="29377">
15104 +<interface name="corenet_dontaudit_udp_send_git_port" lineno="29395">
15105 <summary>
15106 Do not audit attempts to send UDP traffic on the git port.
15107 </summary>
15108 @@ -28541,7 +28625,7 @@ Domain to not audit.
15109 </param>
15110 <infoflow type="none"/>
15111 </interface>
15112 -<interface name="corenet_udp_receive_git_port" lineno="29392">
15113 +<interface name="corenet_udp_receive_git_port" lineno="29410">
15114 <summary>
15115 Receive UDP traffic on the git port.
15116 </summary>
15117 @@ -28552,7 +28636,7 @@ Domain allowed access.
15118 </param>
15119 <infoflow type="read" weight="10"/>
15120 </interface>
15121 -<interface name="corenet_dontaudit_udp_receive_git_port" lineno="29407">
15122 +<interface name="corenet_dontaudit_udp_receive_git_port" lineno="29425">
15123 <summary>
15124 Do not audit attempts to receive UDP traffic on the git port.
15125 </summary>
15126 @@ -28563,7 +28647,7 @@ Domain to not audit.
15127 </param>
15128 <infoflow type="none"/>
15129 </interface>
15130 -<interface name="corenet_udp_sendrecv_git_port" lineno="29422">
15131 +<interface name="corenet_udp_sendrecv_git_port" lineno="29440">
15132 <summary>
15133 Send and receive UDP traffic on the git port.
15134 </summary>
15135 @@ -28574,7 +28658,7 @@ Domain allowed access.
15136 </param>
15137 <infoflow type="both" weight="10"/>
15138 </interface>
15139 -<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="29438">
15140 +<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="29456">
15141 <summary>
15142 Do not audit attempts to send and receive
15143 UDP traffic on the git port.
15144 @@ -28586,7 +28670,7 @@ Domain to not audit.
15145 </param>
15146 <infoflow type="none"/>
15147 </interface>
15148 -<interface name="corenet_tcp_bind_git_port" lineno="29453">
15149 +<interface name="corenet_tcp_bind_git_port" lineno="29471">
15150 <summary>
15151 Bind TCP sockets to the git port.
15152 </summary>
15153 @@ -28597,7 +28681,7 @@ Domain allowed access.
15154 </param>
15155 <infoflow type="none"/>
15156 </interface>
15157 -<interface name="corenet_udp_bind_git_port" lineno="29473">
15158 +<interface name="corenet_udp_bind_git_port" lineno="29491">
15159 <summary>
15160 Bind UDP sockets to the git port.
15161 </summary>
15162 @@ -28608,7 +28692,7 @@ Domain allowed access.
15163 </param>
15164 <infoflow type="none"/>
15165 </interface>
15166 -<interface name="corenet_tcp_connect_git_port" lineno="29492">
15167 +<interface name="corenet_tcp_connect_git_port" lineno="29510">
15168 <summary>
15169 Make a TCP connection to the git port.
15170 </summary>
15171 @@ -28618,7 +28702,7 @@ Domain allowed access.
15172 </summary>
15173 </param>
15174 </interface>
15175 -<interface name="corenet_send_git_client_packets" lineno="29512">
15176 +<interface name="corenet_send_git_client_packets" lineno="29530">
15177 <summary>
15178 Send git_client packets.
15179 </summary>
15180 @@ -28629,7 +28713,7 @@ Domain allowed access.
15181 </param>
15182 <infoflow type="write" weight="10"/>
15183 </interface>
15184 -<interface name="corenet_dontaudit_send_git_client_packets" lineno="29531">
15185 +<interface name="corenet_dontaudit_send_git_client_packets" lineno="29549">
15186 <summary>
15187 Do not audit attempts to send git_client packets.
15188 </summary>
15189 @@ -28640,7 +28724,7 @@ Domain to not audit.
15190 </param>
15191 <infoflow type="none"/>
15192 </interface>
15193 -<interface name="corenet_receive_git_client_packets" lineno="29550">
15194 +<interface name="corenet_receive_git_client_packets" lineno="29568">
15195 <summary>
15196 Receive git_client packets.
15197 </summary>
15198 @@ -28651,7 +28735,7 @@ Domain allowed access.
15199 </param>
15200 <infoflow type="read" weight="10"/>
15201 </interface>
15202 -<interface name="corenet_dontaudit_receive_git_client_packets" lineno="29569">
15203 +<interface name="corenet_dontaudit_receive_git_client_packets" lineno="29587">
15204 <summary>
15205 Do not audit attempts to receive git_client packets.
15206 </summary>
15207 @@ -28662,7 +28746,7 @@ Domain allowed access.
15208 </param>
15209 <infoflow type="none"/>
15210 </interface>
15211 -<interface name="corenet_sendrecv_git_client_packets" lineno="29588">
15212 +<interface name="corenet_sendrecv_git_client_packets" lineno="29606">
15213 <summary>
15214 Send and receive git_client packets.
15215 </summary>
15216 @@ -28673,7 +28757,7 @@ Domain allowed access.
15217 </param>
15218 <infoflow type="both" weight="10"/>
15219 </interface>
15220 -<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="29604">
15221 +<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="29622">
15222 <summary>
15223 Do not audit attempts to send and receive git_client packets.
15224 </summary>
15225 @@ -28684,7 +28768,7 @@ Domain to not audit.
15226 </param>
15227 <infoflow type="none"/>
15228 </interface>
15229 -<interface name="corenet_relabelto_git_client_packets" lineno="29619">
15230 +<interface name="corenet_relabelto_git_client_packets" lineno="29637">
15231 <summary>
15232 Relabel packets to git_client the packet type.
15233 </summary>
15234 @@ -28694,7 +28778,7 @@ Domain allowed access.
15235 </summary>
15236 </param>
15237 </interface>
15238 -<interface name="corenet_send_git_server_packets" lineno="29639">
15239 +<interface name="corenet_send_git_server_packets" lineno="29657">
15240 <summary>
15241 Send git_server packets.
15242 </summary>
15243 @@ -28705,7 +28789,7 @@ Domain allowed access.
15244 </param>
15245 <infoflow type="write" weight="10"/>
15246 </interface>
15247 -<interface name="corenet_dontaudit_send_git_server_packets" lineno="29658">
15248 +<interface name="corenet_dontaudit_send_git_server_packets" lineno="29676">
15249 <summary>
15250 Do not audit attempts to send git_server packets.
15251 </summary>
15252 @@ -28716,7 +28800,7 @@ Domain to not audit.
15253 </param>
15254 <infoflow type="none"/>
15255 </interface>
15256 -<interface name="corenet_receive_git_server_packets" lineno="29677">
15257 +<interface name="corenet_receive_git_server_packets" lineno="29695">
15258 <summary>
15259 Receive git_server packets.
15260 </summary>
15261 @@ -28727,7 +28811,7 @@ Domain allowed access.
15262 </param>
15263 <infoflow type="read" weight="10"/>
15264 </interface>
15265 -<interface name="corenet_dontaudit_receive_git_server_packets" lineno="29696">
15266 +<interface name="corenet_dontaudit_receive_git_server_packets" lineno="29714">
15267 <summary>
15268 Do not audit attempts to receive git_server packets.
15269 </summary>
15270 @@ -28738,7 +28822,7 @@ Domain allowed access.
15271 </param>
15272 <infoflow type="none"/>
15273 </interface>
15274 -<interface name="corenet_sendrecv_git_server_packets" lineno="29715">
15275 +<interface name="corenet_sendrecv_git_server_packets" lineno="29733">
15276 <summary>
15277 Send and receive git_server packets.
15278 </summary>
15279 @@ -28749,7 +28833,7 @@ Domain allowed access.
15280 </param>
15281 <infoflow type="both" weight="10"/>
15282 </interface>
15283 -<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="29731">
15284 +<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="29749">
15285 <summary>
15286 Do not audit attempts to send and receive git_server packets.
15287 </summary>
15288 @@ -28760,7 +28844,7 @@ Domain to not audit.
15289 </param>
15290 <infoflow type="none"/>
15291 </interface>
15292 -<interface name="corenet_relabelto_git_server_packets" lineno="29746">
15293 +<interface name="corenet_relabelto_git_server_packets" lineno="29764">
15294 <summary>
15295 Relabel packets to git_server the packet type.
15296 </summary>
15297 @@ -28770,7 +28854,7 @@ Domain allowed access.
15298 </summary>
15299 </param>
15300 </interface>
15301 -<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="29768">
15302 +<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="29786">
15303 <summary>
15304 Send and receive TCP traffic on the glance_registry port.
15305 </summary>
15306 @@ -28781,7 +28865,7 @@ Domain allowed access.
15307 </param>
15308 <infoflow type="both" weight="10"/>
15309 </interface>
15310 -<interface name="corenet_udp_send_glance_registry_port" lineno="29783">
15311 +<interface name="corenet_udp_send_glance_registry_port" lineno="29801">
15312 <summary>
15313 Send UDP traffic on the glance_registry port.
15314 </summary>
15315 @@ -28792,7 +28876,7 @@ Domain allowed access.
15316 </param>
15317 <infoflow type="write" weight="10"/>
15318 </interface>
15319 -<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="29798">
15320 +<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="29816">
15321 <summary>
15322 Do not audit attempts to send UDP traffic on the glance_registry port.
15323 </summary>
15324 @@ -28803,7 +28887,7 @@ Domain to not audit.
15325 </param>
15326 <infoflow type="none"/>
15327 </interface>
15328 -<interface name="corenet_udp_receive_glance_registry_port" lineno="29813">
15329 +<interface name="corenet_udp_receive_glance_registry_port" lineno="29831">
15330 <summary>
15331 Receive UDP traffic on the glance_registry port.
15332 </summary>
15333 @@ -28814,7 +28898,7 @@ Domain allowed access.
15334 </param>
15335 <infoflow type="read" weight="10"/>
15336 </interface>
15337 -<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="29828">
15338 +<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="29846">
15339 <summary>
15340 Do not audit attempts to receive UDP traffic on the glance_registry port.
15341 </summary>
15342 @@ -28825,7 +28909,7 @@ Domain to not audit.
15343 </param>
15344 <infoflow type="none"/>
15345 </interface>
15346 -<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="29843">
15347 +<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="29861">
15348 <summary>
15349 Send and receive UDP traffic on the glance_registry port.
15350 </summary>
15351 @@ -28836,7 +28920,7 @@ Domain allowed access.
15352 </param>
15353 <infoflow type="both" weight="10"/>
15354 </interface>
15355 -<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="29859">
15356 +<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="29877">
15357 <summary>
15358 Do not audit attempts to send and receive
15359 UDP traffic on the glance_registry port.
15360 @@ -28848,7 +28932,7 @@ Domain to not audit.
15361 </param>
15362 <infoflow type="none"/>
15363 </interface>
15364 -<interface name="corenet_tcp_bind_glance_registry_port" lineno="29874">
15365 +<interface name="corenet_tcp_bind_glance_registry_port" lineno="29892">
15366 <summary>
15367 Bind TCP sockets to the glance_registry port.
15368 </summary>
15369 @@ -28859,7 +28943,7 @@ Domain allowed access.
15370 </param>
15371 <infoflow type="none"/>
15372 </interface>
15373 -<interface name="corenet_udp_bind_glance_registry_port" lineno="29894">
15374 +<interface name="corenet_udp_bind_glance_registry_port" lineno="29912">
15375 <summary>
15376 Bind UDP sockets to the glance_registry port.
15377 </summary>
15378 @@ -28870,7 +28954,7 @@ Domain allowed access.
15379 </param>
15380 <infoflow type="none"/>
15381 </interface>
15382 -<interface name="corenet_tcp_connect_glance_registry_port" lineno="29913">
15383 +<interface name="corenet_tcp_connect_glance_registry_port" lineno="29931">
15384 <summary>
15385 Make a TCP connection to the glance_registry port.
15386 </summary>
15387 @@ -28880,7 +28964,7 @@ Domain allowed access.
15388 </summary>
15389 </param>
15390 </interface>
15391 -<interface name="corenet_send_glance_registry_client_packets" lineno="29933">
15392 +<interface name="corenet_send_glance_registry_client_packets" lineno="29951">
15393 <summary>
15394 Send glance_registry_client packets.
15395 </summary>
15396 @@ -28891,7 +28975,7 @@ Domain allowed access.
15397 </param>
15398 <infoflow type="write" weight="10"/>
15399 </interface>
15400 -<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="29952">
15401 +<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="29970">
15402 <summary>
15403 Do not audit attempts to send glance_registry_client packets.
15404 </summary>
15405 @@ -28902,7 +28986,7 @@ Domain to not audit.
15406 </param>
15407 <infoflow type="none"/>
15408 </interface>
15409 -<interface name="corenet_receive_glance_registry_client_packets" lineno="29971">
15410 +<interface name="corenet_receive_glance_registry_client_packets" lineno="29989">
15411 <summary>
15412 Receive glance_registry_client packets.
15413 </summary>
15414 @@ -28913,7 +28997,7 @@ Domain allowed access.
15415 </param>
15416 <infoflow type="read" weight="10"/>
15417 </interface>
15418 -<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="29990">
15419 +<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="30008">
15420 <summary>
15421 Do not audit attempts to receive glance_registry_client packets.
15422 </summary>
15423 @@ -28924,7 +29008,7 @@ Domain allowed access.
15424 </param>
15425 <infoflow type="none"/>
15426 </interface>
15427 -<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="30009">
15428 +<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="30027">
15429 <summary>
15430 Send and receive glance_registry_client packets.
15431 </summary>
15432 @@ -28935,7 +29019,7 @@ Domain allowed access.
15433 </param>
15434 <infoflow type="both" weight="10"/>
15435 </interface>
15436 -<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="30025">
15437 +<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="30043">
15438 <summary>
15439 Do not audit attempts to send and receive glance_registry_client packets.
15440 </summary>
15441 @@ -28946,7 +29030,7 @@ Domain to not audit.
15442 </param>
15443 <infoflow type="none"/>
15444 </interface>
15445 -<interface name="corenet_relabelto_glance_registry_client_packets" lineno="30040">
15446 +<interface name="corenet_relabelto_glance_registry_client_packets" lineno="30058">
15447 <summary>
15448 Relabel packets to glance_registry_client the packet type.
15449 </summary>
15450 @@ -28956,7 +29040,7 @@ Domain allowed access.
15451 </summary>
15452 </param>
15453 </interface>
15454 -<interface name="corenet_send_glance_registry_server_packets" lineno="30060">
15455 +<interface name="corenet_send_glance_registry_server_packets" lineno="30078">
15456 <summary>
15457 Send glance_registry_server packets.
15458 </summary>
15459 @@ -28967,7 +29051,7 @@ Domain allowed access.
15460 </param>
15461 <infoflow type="write" weight="10"/>
15462 </interface>
15463 -<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="30079">
15464 +<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="30097">
15465 <summary>
15466 Do not audit attempts to send glance_registry_server packets.
15467 </summary>
15468 @@ -28978,7 +29062,7 @@ Domain to not audit.
15469 </param>
15470 <infoflow type="none"/>
15471 </interface>
15472 -<interface name="corenet_receive_glance_registry_server_packets" lineno="30098">
15473 +<interface name="corenet_receive_glance_registry_server_packets" lineno="30116">
15474 <summary>
15475 Receive glance_registry_server packets.
15476 </summary>
15477 @@ -28989,7 +29073,7 @@ Domain allowed access.
15478 </param>
15479 <infoflow type="read" weight="10"/>
15480 </interface>
15481 -<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="30117">
15482 +<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="30135">
15483 <summary>
15484 Do not audit attempts to receive glance_registry_server packets.
15485 </summary>
15486 @@ -29000,7 +29084,7 @@ Domain allowed access.
15487 </param>
15488 <infoflow type="none"/>
15489 </interface>
15490 -<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="30136">
15491 +<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="30154">
15492 <summary>
15493 Send and receive glance_registry_server packets.
15494 </summary>
15495 @@ -29011,7 +29095,7 @@ Domain allowed access.
15496 </param>
15497 <infoflow type="both" weight="10"/>
15498 </interface>
15499 -<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="30152">
15500 +<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="30170">
15501 <summary>
15502 Do not audit attempts to send and receive glance_registry_server packets.
15503 </summary>
15504 @@ -29022,7 +29106,7 @@ Domain to not audit.
15505 </param>
15506 <infoflow type="none"/>
15507 </interface>
15508 -<interface name="corenet_relabelto_glance_registry_server_packets" lineno="30167">
15509 +<interface name="corenet_relabelto_glance_registry_server_packets" lineno="30185">
15510 <summary>
15511 Relabel packets to glance_registry_server the packet type.
15512 </summary>
15513 @@ -29032,7 +29116,7 @@ Domain allowed access.
15514 </summary>
15515 </param>
15516 </interface>
15517 -<interface name="corenet_tcp_sendrecv_gopher_port" lineno="30189">
15518 +<interface name="corenet_tcp_sendrecv_gopher_port" lineno="30207">
15519 <summary>
15520 Send and receive TCP traffic on the gopher port.
15521 </summary>
15522 @@ -29043,7 +29127,7 @@ Domain allowed access.
15523 </param>
15524 <infoflow type="both" weight="10"/>
15525 </interface>
15526 -<interface name="corenet_udp_send_gopher_port" lineno="30204">
15527 +<interface name="corenet_udp_send_gopher_port" lineno="30222">
15528 <summary>
15529 Send UDP traffic on the gopher port.
15530 </summary>
15531 @@ -29054,7 +29138,7 @@ Domain allowed access.
15532 </param>
15533 <infoflow type="write" weight="10"/>
15534 </interface>
15535 -<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="30219">
15536 +<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="30237">
15537 <summary>
15538 Do not audit attempts to send UDP traffic on the gopher port.
15539 </summary>
15540 @@ -29065,7 +29149,7 @@ Domain to not audit.
15541 </param>
15542 <infoflow type="none"/>
15543 </interface>
15544 -<interface name="corenet_udp_receive_gopher_port" lineno="30234">
15545 +<interface name="corenet_udp_receive_gopher_port" lineno="30252">
15546 <summary>
15547 Receive UDP traffic on the gopher port.
15548 </summary>
15549 @@ -29076,7 +29160,7 @@ Domain allowed access.
15550 </param>
15551 <infoflow type="read" weight="10"/>
15552 </interface>
15553 -<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="30249">
15554 +<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="30267">
15555 <summary>
15556 Do not audit attempts to receive UDP traffic on the gopher port.
15557 </summary>
15558 @@ -29087,7 +29171,7 @@ Domain to not audit.
15559 </param>
15560 <infoflow type="none"/>
15561 </interface>
15562 -<interface name="corenet_udp_sendrecv_gopher_port" lineno="30264">
15563 +<interface name="corenet_udp_sendrecv_gopher_port" lineno="30282">
15564 <summary>
15565 Send and receive UDP traffic on the gopher port.
15566 </summary>
15567 @@ -29098,7 +29182,7 @@ Domain allowed access.
15568 </param>
15569 <infoflow type="both" weight="10"/>
15570 </interface>
15571 -<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="30280">
15572 +<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="30298">
15573 <summary>
15574 Do not audit attempts to send and receive
15575 UDP traffic on the gopher port.
15576 @@ -29110,7 +29194,7 @@ Domain to not audit.
15577 </param>
15578 <infoflow type="none"/>
15579 </interface>
15580 -<interface name="corenet_tcp_bind_gopher_port" lineno="30295">
15581 +<interface name="corenet_tcp_bind_gopher_port" lineno="30313">
15582 <summary>
15583 Bind TCP sockets to the gopher port.
15584 </summary>
15585 @@ -29121,7 +29205,7 @@ Domain allowed access.
15586 </param>
15587 <infoflow type="none"/>
15588 </interface>
15589 -<interface name="corenet_udp_bind_gopher_port" lineno="30315">
15590 +<interface name="corenet_udp_bind_gopher_port" lineno="30333">
15591 <summary>
15592 Bind UDP sockets to the gopher port.
15593 </summary>
15594 @@ -29132,7 +29216,7 @@ Domain allowed access.
15595 </param>
15596 <infoflow type="none"/>
15597 </interface>
15598 -<interface name="corenet_tcp_connect_gopher_port" lineno="30334">
15599 +<interface name="corenet_tcp_connect_gopher_port" lineno="30352">
15600 <summary>
15601 Make a TCP connection to the gopher port.
15602 </summary>
15603 @@ -29142,7 +29226,7 @@ Domain allowed access.
15604 </summary>
15605 </param>
15606 </interface>
15607 -<interface name="corenet_send_gopher_client_packets" lineno="30354">
15608 +<interface name="corenet_send_gopher_client_packets" lineno="30372">
15609 <summary>
15610 Send gopher_client packets.
15611 </summary>
15612 @@ -29153,7 +29237,7 @@ Domain allowed access.
15613 </param>
15614 <infoflow type="write" weight="10"/>
15615 </interface>
15616 -<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="30373">
15617 +<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="30391">
15618 <summary>
15619 Do not audit attempts to send gopher_client packets.
15620 </summary>
15621 @@ -29164,7 +29248,7 @@ Domain to not audit.
15622 </param>
15623 <infoflow type="none"/>
15624 </interface>
15625 -<interface name="corenet_receive_gopher_client_packets" lineno="30392">
15626 +<interface name="corenet_receive_gopher_client_packets" lineno="30410">
15627 <summary>
15628 Receive gopher_client packets.
15629 </summary>
15630 @@ -29175,7 +29259,7 @@ Domain allowed access.
15631 </param>
15632 <infoflow type="read" weight="10"/>
15633 </interface>
15634 -<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="30411">
15635 +<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="30429">
15636 <summary>
15637 Do not audit attempts to receive gopher_client packets.
15638 </summary>
15639 @@ -29186,7 +29270,7 @@ Domain allowed access.
15640 </param>
15641 <infoflow type="none"/>
15642 </interface>
15643 -<interface name="corenet_sendrecv_gopher_client_packets" lineno="30430">
15644 +<interface name="corenet_sendrecv_gopher_client_packets" lineno="30448">
15645 <summary>
15646 Send and receive gopher_client packets.
15647 </summary>
15648 @@ -29197,7 +29281,7 @@ Domain allowed access.
15649 </param>
15650 <infoflow type="both" weight="10"/>
15651 </interface>
15652 -<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="30446">
15653 +<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="30464">
15654 <summary>
15655 Do not audit attempts to send and receive gopher_client packets.
15656 </summary>
15657 @@ -29208,7 +29292,7 @@ Domain to not audit.
15658 </param>
15659 <infoflow type="none"/>
15660 </interface>
15661 -<interface name="corenet_relabelto_gopher_client_packets" lineno="30461">
15662 +<interface name="corenet_relabelto_gopher_client_packets" lineno="30479">
15663 <summary>
15664 Relabel packets to gopher_client the packet type.
15665 </summary>
15666 @@ -29218,7 +29302,7 @@ Domain allowed access.
15667 </summary>
15668 </param>
15669 </interface>
15670 -<interface name="corenet_send_gopher_server_packets" lineno="30481">
15671 +<interface name="corenet_send_gopher_server_packets" lineno="30499">
15672 <summary>
15673 Send gopher_server packets.
15674 </summary>
15675 @@ -29229,7 +29313,7 @@ Domain allowed access.
15676 </param>
15677 <infoflow type="write" weight="10"/>
15678 </interface>
15679 -<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="30500">
15680 +<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="30518">
15681 <summary>
15682 Do not audit attempts to send gopher_server packets.
15683 </summary>
15684 @@ -29240,7 +29324,7 @@ Domain to not audit.
15685 </param>
15686 <infoflow type="none"/>
15687 </interface>
15688 -<interface name="corenet_receive_gopher_server_packets" lineno="30519">
15689 +<interface name="corenet_receive_gopher_server_packets" lineno="30537">
15690 <summary>
15691 Receive gopher_server packets.
15692 </summary>
15693 @@ -29251,7 +29335,7 @@ Domain allowed access.
15694 </param>
15695 <infoflow type="read" weight="10"/>
15696 </interface>
15697 -<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="30538">
15698 +<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="30556">
15699 <summary>
15700 Do not audit attempts to receive gopher_server packets.
15701 </summary>
15702 @@ -29262,7 +29346,7 @@ Domain allowed access.
15703 </param>
15704 <infoflow type="none"/>
15705 </interface>
15706 -<interface name="corenet_sendrecv_gopher_server_packets" lineno="30557">
15707 +<interface name="corenet_sendrecv_gopher_server_packets" lineno="30575">
15708 <summary>
15709 Send and receive gopher_server packets.
15710 </summary>
15711 @@ -29273,7 +29357,7 @@ Domain allowed access.
15712 </param>
15713 <infoflow type="both" weight="10"/>
15714 </interface>
15715 -<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="30573">
15716 +<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="30591">
15717 <summary>
15718 Do not audit attempts to send and receive gopher_server packets.
15719 </summary>
15720 @@ -29284,7 +29368,7 @@ Domain to not audit.
15721 </param>
15722 <infoflow type="none"/>
15723 </interface>
15724 -<interface name="corenet_relabelto_gopher_server_packets" lineno="30588">
15725 +<interface name="corenet_relabelto_gopher_server_packets" lineno="30606">
15726 <summary>
15727 Relabel packets to gopher_server the packet type.
15728 </summary>
15729 @@ -29294,7 +29378,7 @@ Domain allowed access.
15730 </summary>
15731 </param>
15732 </interface>
15733 -<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="30610">
15734 +<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="30628">
15735 <summary>
15736 Send and receive TCP traffic on the gpsd port.
15737 </summary>
15738 @@ -29305,7 +29389,7 @@ Domain allowed access.
15739 </param>
15740 <infoflow type="both" weight="10"/>
15741 </interface>
15742 -<interface name="corenet_udp_send_gpsd_port" lineno="30625">
15743 +<interface name="corenet_udp_send_gpsd_port" lineno="30643">
15744 <summary>
15745 Send UDP traffic on the gpsd port.
15746 </summary>
15747 @@ -29316,7 +29400,7 @@ Domain allowed access.
15748 </param>
15749 <infoflow type="write" weight="10"/>
15750 </interface>
15751 -<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="30640">
15752 +<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="30658">
15753 <summary>
15754 Do not audit attempts to send UDP traffic on the gpsd port.
15755 </summary>
15756 @@ -29327,7 +29411,7 @@ Domain to not audit.
15757 </param>
15758 <infoflow type="none"/>
15759 </interface>
15760 -<interface name="corenet_udp_receive_gpsd_port" lineno="30655">
15761 +<interface name="corenet_udp_receive_gpsd_port" lineno="30673">
15762 <summary>
15763 Receive UDP traffic on the gpsd port.
15764 </summary>
15765 @@ -29338,7 +29422,7 @@ Domain allowed access.
15766 </param>
15767 <infoflow type="read" weight="10"/>
15768 </interface>
15769 -<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="30670">
15770 +<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="30688">
15771 <summary>
15772 Do not audit attempts to receive UDP traffic on the gpsd port.
15773 </summary>
15774 @@ -29349,7 +29433,7 @@ Domain to not audit.
15775 </param>
15776 <infoflow type="none"/>
15777 </interface>
15778 -<interface name="corenet_udp_sendrecv_gpsd_port" lineno="30685">
15779 +<interface name="corenet_udp_sendrecv_gpsd_port" lineno="30703">
15780 <summary>
15781 Send and receive UDP traffic on the gpsd port.
15782 </summary>
15783 @@ -29360,7 +29444,7 @@ Domain allowed access.
15784 </param>
15785 <infoflow type="both" weight="10"/>
15786 </interface>
15787 -<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="30701">
15788 +<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="30719">
15789 <summary>
15790 Do not audit attempts to send and receive
15791 UDP traffic on the gpsd port.
15792 @@ -29372,7 +29456,7 @@ Domain to not audit.
15793 </param>
15794 <infoflow type="none"/>
15795 </interface>
15796 -<interface name="corenet_tcp_bind_gpsd_port" lineno="30716">
15797 +<interface name="corenet_tcp_bind_gpsd_port" lineno="30734">
15798 <summary>
15799 Bind TCP sockets to the gpsd port.
15800 </summary>
15801 @@ -29383,7 +29467,7 @@ Domain allowed access.
15802 </param>
15803 <infoflow type="none"/>
15804 </interface>
15805 -<interface name="corenet_udp_bind_gpsd_port" lineno="30736">
15806 +<interface name="corenet_udp_bind_gpsd_port" lineno="30754">
15807 <summary>
15808 Bind UDP sockets to the gpsd port.
15809 </summary>
15810 @@ -29394,7 +29478,7 @@ Domain allowed access.
15811 </param>
15812 <infoflow type="none"/>
15813 </interface>
15814 -<interface name="corenet_tcp_connect_gpsd_port" lineno="30755">
15815 +<interface name="corenet_tcp_connect_gpsd_port" lineno="30773">
15816 <summary>
15817 Make a TCP connection to the gpsd port.
15818 </summary>
15819 @@ -29404,7 +29488,7 @@ Domain allowed access.
15820 </summary>
15821 </param>
15822 </interface>
15823 -<interface name="corenet_send_gpsd_client_packets" lineno="30775">
15824 +<interface name="corenet_send_gpsd_client_packets" lineno="30793">
15825 <summary>
15826 Send gpsd_client packets.
15827 </summary>
15828 @@ -29415,7 +29499,7 @@ Domain allowed access.
15829 </param>
15830 <infoflow type="write" weight="10"/>
15831 </interface>
15832 -<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="30794">
15833 +<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="30812">
15834 <summary>
15835 Do not audit attempts to send gpsd_client packets.
15836 </summary>
15837 @@ -29426,7 +29510,7 @@ Domain to not audit.
15838 </param>
15839 <infoflow type="none"/>
15840 </interface>
15841 -<interface name="corenet_receive_gpsd_client_packets" lineno="30813">
15842 +<interface name="corenet_receive_gpsd_client_packets" lineno="30831">
15843 <summary>
15844 Receive gpsd_client packets.
15845 </summary>
15846 @@ -29437,7 +29521,7 @@ Domain allowed access.
15847 </param>
15848 <infoflow type="read" weight="10"/>
15849 </interface>
15850 -<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="30832">
15851 +<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="30850">
15852 <summary>
15853 Do not audit attempts to receive gpsd_client packets.
15854 </summary>
15855 @@ -29448,7 +29532,7 @@ Domain allowed access.
15856 </param>
15857 <infoflow type="none"/>
15858 </interface>
15859 -<interface name="corenet_sendrecv_gpsd_client_packets" lineno="30851">
15860 +<interface name="corenet_sendrecv_gpsd_client_packets" lineno="30869">
15861 <summary>
15862 Send and receive gpsd_client packets.
15863 </summary>
15864 @@ -29459,7 +29543,7 @@ Domain allowed access.
15865 </param>
15866 <infoflow type="both" weight="10"/>
15867 </interface>
15868 -<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="30867">
15869 +<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="30885">
15870 <summary>
15871 Do not audit attempts to send and receive gpsd_client packets.
15872 </summary>
15873 @@ -29470,7 +29554,7 @@ Domain to not audit.
15874 </param>
15875 <infoflow type="none"/>
15876 </interface>
15877 -<interface name="corenet_relabelto_gpsd_client_packets" lineno="30882">
15878 +<interface name="corenet_relabelto_gpsd_client_packets" lineno="30900">
15879 <summary>
15880 Relabel packets to gpsd_client the packet type.
15881 </summary>
15882 @@ -29480,7 +29564,7 @@ Domain allowed access.
15883 </summary>
15884 </param>
15885 </interface>
15886 -<interface name="corenet_send_gpsd_server_packets" lineno="30902">
15887 +<interface name="corenet_send_gpsd_server_packets" lineno="30920">
15888 <summary>
15889 Send gpsd_server packets.
15890 </summary>
15891 @@ -29491,7 +29575,7 @@ Domain allowed access.
15892 </param>
15893 <infoflow type="write" weight="10"/>
15894 </interface>
15895 -<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="30921">
15896 +<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="30939">
15897 <summary>
15898 Do not audit attempts to send gpsd_server packets.
15899 </summary>
15900 @@ -29502,7 +29586,7 @@ Domain to not audit.
15901 </param>
15902 <infoflow type="none"/>
15903 </interface>
15904 -<interface name="corenet_receive_gpsd_server_packets" lineno="30940">
15905 +<interface name="corenet_receive_gpsd_server_packets" lineno="30958">
15906 <summary>
15907 Receive gpsd_server packets.
15908 </summary>
15909 @@ -29513,7 +29597,7 @@ Domain allowed access.
15910 </param>
15911 <infoflow type="read" weight="10"/>
15912 </interface>
15913 -<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="30959">
15914 +<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="30977">
15915 <summary>
15916 Do not audit attempts to receive gpsd_server packets.
15917 </summary>
15918 @@ -29524,7 +29608,7 @@ Domain allowed access.
15919 </param>
15920 <infoflow type="none"/>
15921 </interface>
15922 -<interface name="corenet_sendrecv_gpsd_server_packets" lineno="30978">
15923 +<interface name="corenet_sendrecv_gpsd_server_packets" lineno="30996">
15924 <summary>
15925 Send and receive gpsd_server packets.
15926 </summary>
15927 @@ -29535,7 +29619,7 @@ Domain allowed access.
15928 </param>
15929 <infoflow type="both" weight="10"/>
15930 </interface>
15931 -<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="30994">
15932 +<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="31012">
15933 <summary>
15934 Do not audit attempts to send and receive gpsd_server packets.
15935 </summary>
15936 @@ -29546,7 +29630,7 @@ Domain to not audit.
15937 </param>
15938 <infoflow type="none"/>
15939 </interface>
15940 -<interface name="corenet_relabelto_gpsd_server_packets" lineno="31009">
15941 +<interface name="corenet_relabelto_gpsd_server_packets" lineno="31027">
15942 <summary>
15943 Relabel packets to gpsd_server the packet type.
15944 </summary>
15945 @@ -29556,7 +29640,7 @@ Domain allowed access.
15946 </summary>
15947 </param>
15948 </interface>
15949 -<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="31031">
15950 +<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="31049">
15951 <summary>
15952 Send and receive TCP traffic on the hadoop_datanode port.
15953 </summary>
15954 @@ -29567,7 +29651,7 @@ Domain allowed access.
15955 </param>
15956 <infoflow type="both" weight="10"/>
15957 </interface>
15958 -<interface name="corenet_udp_send_hadoop_datanode_port" lineno="31046">
15959 +<interface name="corenet_udp_send_hadoop_datanode_port" lineno="31064">
15960 <summary>
15961 Send UDP traffic on the hadoop_datanode port.
15962 </summary>
15963 @@ -29578,7 +29662,7 @@ Domain allowed access.
15964 </param>
15965 <infoflow type="write" weight="10"/>
15966 </interface>
15967 -<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="31061">
15968 +<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="31079">
15969 <summary>
15970 Do not audit attempts to send UDP traffic on the hadoop_datanode port.
15971 </summary>
15972 @@ -29589,7 +29673,7 @@ Domain to not audit.
15973 </param>
15974 <infoflow type="none"/>
15975 </interface>
15976 -<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="31076">
15977 +<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="31094">
15978 <summary>
15979 Receive UDP traffic on the hadoop_datanode port.
15980 </summary>
15981 @@ -29600,7 +29684,7 @@ Domain allowed access.
15982 </param>
15983 <infoflow type="read" weight="10"/>
15984 </interface>
15985 -<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="31091">
15986 +<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="31109">
15987 <summary>
15988 Do not audit attempts to receive UDP traffic on the hadoop_datanode port.
15989 </summary>
15990 @@ -29611,7 +29695,7 @@ Domain to not audit.
15991 </param>
15992 <infoflow type="none"/>
15993 </interface>
15994 -<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="31106">
15995 +<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="31124">
15996 <summary>
15997 Send and receive UDP traffic on the hadoop_datanode port.
15998 </summary>
15999 @@ -29622,7 +29706,7 @@ Domain allowed access.
16000 </param>
16001 <infoflow type="both" weight="10"/>
16002 </interface>
16003 -<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="31122">
16004 +<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="31140">
16005 <summary>
16006 Do not audit attempts to send and receive
16007 UDP traffic on the hadoop_datanode port.
16008 @@ -29634,7 +29718,7 @@ Domain to not audit.
16009 </param>
16010 <infoflow type="none"/>
16011 </interface>
16012 -<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="31137">
16013 +<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="31155">
16014 <summary>
16015 Bind TCP sockets to the hadoop_datanode port.
16016 </summary>
16017 @@ -29645,7 +29729,7 @@ Domain allowed access.
16018 </param>
16019 <infoflow type="none"/>
16020 </interface>
16021 -<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="31157">
16022 +<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="31175">
16023 <summary>
16024 Bind UDP sockets to the hadoop_datanode port.
16025 </summary>
16026 @@ -29656,7 +29740,7 @@ Domain allowed access.
16027 </param>
16028 <infoflow type="none"/>
16029 </interface>
16030 -<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="31176">
16031 +<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="31194">
16032 <summary>
16033 Make a TCP connection to the hadoop_datanode port.
16034 </summary>
16035 @@ -29666,7 +29750,7 @@ Domain allowed access.
16036 </summary>
16037 </param>
16038 </interface>
16039 -<interface name="corenet_send_hadoop_datanode_client_packets" lineno="31196">
16040 +<interface name="corenet_send_hadoop_datanode_client_packets" lineno="31214">
16041 <summary>
16042 Send hadoop_datanode_client packets.
16043 </summary>
16044 @@ -29677,7 +29761,7 @@ Domain allowed access.
16045 </param>
16046 <infoflow type="write" weight="10"/>
16047 </interface>
16048 -<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="31215">
16049 +<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="31233">
16050 <summary>
16051 Do not audit attempts to send hadoop_datanode_client packets.
16052 </summary>
16053 @@ -29688,7 +29772,7 @@ Domain to not audit.
16054 </param>
16055 <infoflow type="none"/>
16056 </interface>
16057 -<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="31234">
16058 +<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="31252">
16059 <summary>
16060 Receive hadoop_datanode_client packets.
16061 </summary>
16062 @@ -29699,7 +29783,7 @@ Domain allowed access.
16063 </param>
16064 <infoflow type="read" weight="10"/>
16065 </interface>
16066 -<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="31253">
16067 +<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="31271">
16068 <summary>
16069 Do not audit attempts to receive hadoop_datanode_client packets.
16070 </summary>
16071 @@ -29710,7 +29794,7 @@ Domain allowed access.
16072 </param>
16073 <infoflow type="none"/>
16074 </interface>
16075 -<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="31272">
16076 +<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="31290">
16077 <summary>
16078 Send and receive hadoop_datanode_client packets.
16079 </summary>
16080 @@ -29721,7 +29805,7 @@ Domain allowed access.
16081 </param>
16082 <infoflow type="both" weight="10"/>
16083 </interface>
16084 -<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="31288">
16085 +<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="31306">
16086 <summary>
16087 Do not audit attempts to send and receive hadoop_datanode_client packets.
16088 </summary>
16089 @@ -29732,7 +29816,7 @@ Domain to not audit.
16090 </param>
16091 <infoflow type="none"/>
16092 </interface>
16093 -<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="31303">
16094 +<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="31321">
16095 <summary>
16096 Relabel packets to hadoop_datanode_client the packet type.
16097 </summary>
16098 @@ -29742,7 +29826,7 @@ Domain allowed access.
16099 </summary>
16100 </param>
16101 </interface>
16102 -<interface name="corenet_send_hadoop_datanode_server_packets" lineno="31323">
16103 +<interface name="corenet_send_hadoop_datanode_server_packets" lineno="31341">
16104 <summary>
16105 Send hadoop_datanode_server packets.
16106 </summary>
16107 @@ -29753,7 +29837,7 @@ Domain allowed access.
16108 </param>
16109 <infoflow type="write" weight="10"/>
16110 </interface>
16111 -<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="31342">
16112 +<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="31360">
16113 <summary>
16114 Do not audit attempts to send hadoop_datanode_server packets.
16115 </summary>
16116 @@ -29764,7 +29848,7 @@ Domain to not audit.
16117 </param>
16118 <infoflow type="none"/>
16119 </interface>
16120 -<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="31361">
16121 +<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="31379">
16122 <summary>
16123 Receive hadoop_datanode_server packets.
16124 </summary>
16125 @@ -29775,7 +29859,7 @@ Domain allowed access.
16126 </param>
16127 <infoflow type="read" weight="10"/>
16128 </interface>
16129 -<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="31380">
16130 +<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="31398">
16131 <summary>
16132 Do not audit attempts to receive hadoop_datanode_server packets.
16133 </summary>
16134 @@ -29786,7 +29870,7 @@ Domain allowed access.
16135 </param>
16136 <infoflow type="none"/>
16137 </interface>
16138 -<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="31399">
16139 +<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="31417">
16140 <summary>
16141 Send and receive hadoop_datanode_server packets.
16142 </summary>
16143 @@ -29797,7 +29881,7 @@ Domain allowed access.
16144 </param>
16145 <infoflow type="both" weight="10"/>
16146 </interface>
16147 -<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="31415">
16148 +<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="31433">
16149 <summary>
16150 Do not audit attempts to send and receive hadoop_datanode_server packets.
16151 </summary>
16152 @@ -29808,7 +29892,7 @@ Domain to not audit.
16153 </param>
16154 <infoflow type="none"/>
16155 </interface>
16156 -<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="31430">
16157 +<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="31448">
16158 <summary>
16159 Relabel packets to hadoop_datanode_server the packet type.
16160 </summary>
16161 @@ -29818,7 +29902,7 @@ Domain allowed access.
16162 </summary>
16163 </param>
16164 </interface>
16165 -<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="31452">
16166 +<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="31470">
16167 <summary>
16168 Send and receive TCP traffic on the hadoop_namenode port.
16169 </summary>
16170 @@ -29829,7 +29913,7 @@ Domain allowed access.
16171 </param>
16172 <infoflow type="both" weight="10"/>
16173 </interface>
16174 -<interface name="corenet_udp_send_hadoop_namenode_port" lineno="31467">
16175 +<interface name="corenet_udp_send_hadoop_namenode_port" lineno="31485">
16176 <summary>
16177 Send UDP traffic on the hadoop_namenode port.
16178 </summary>
16179 @@ -29840,7 +29924,7 @@ Domain allowed access.
16180 </param>
16181 <infoflow type="write" weight="10"/>
16182 </interface>
16183 -<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="31482">
16184 +<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="31500">
16185 <summary>
16186 Do not audit attempts to send UDP traffic on the hadoop_namenode port.
16187 </summary>
16188 @@ -29851,7 +29935,7 @@ Domain to not audit.
16189 </param>
16190 <infoflow type="none"/>
16191 </interface>
16192 -<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="31497">
16193 +<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="31515">
16194 <summary>
16195 Receive UDP traffic on the hadoop_namenode port.
16196 </summary>
16197 @@ -29862,7 +29946,7 @@ Domain allowed access.
16198 </param>
16199 <infoflow type="read" weight="10"/>
16200 </interface>
16201 -<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="31512">
16202 +<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="31530">
16203 <summary>
16204 Do not audit attempts to receive UDP traffic on the hadoop_namenode port.
16205 </summary>
16206 @@ -29873,7 +29957,7 @@ Domain to not audit.
16207 </param>
16208 <infoflow type="none"/>
16209 </interface>
16210 -<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="31527">
16211 +<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="31545">
16212 <summary>
16213 Send and receive UDP traffic on the hadoop_namenode port.
16214 </summary>
16215 @@ -29884,7 +29968,7 @@ Domain allowed access.
16216 </param>
16217 <infoflow type="both" weight="10"/>
16218 </interface>
16219 -<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="31543">
16220 +<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="31561">
16221 <summary>
16222 Do not audit attempts to send and receive
16223 UDP traffic on the hadoop_namenode port.
16224 @@ -29896,7 +29980,7 @@ Domain to not audit.
16225 </param>
16226 <infoflow type="none"/>
16227 </interface>
16228 -<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="31558">
16229 +<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="31576">
16230 <summary>
16231 Bind TCP sockets to the hadoop_namenode port.
16232 </summary>
16233 @@ -29907,7 +29991,7 @@ Domain allowed access.
16234 </param>
16235 <infoflow type="none"/>
16236 </interface>
16237 -<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="31578">
16238 +<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="31596">
16239 <summary>
16240 Bind UDP sockets to the hadoop_namenode port.
16241 </summary>
16242 @@ -29918,7 +30002,7 @@ Domain allowed access.
16243 </param>
16244 <infoflow type="none"/>
16245 </interface>
16246 -<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="31597">
16247 +<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="31615">
16248 <summary>
16249 Make a TCP connection to the hadoop_namenode port.
16250 </summary>
16251 @@ -29928,7 +30012,7 @@ Domain allowed access.
16252 </summary>
16253 </param>
16254 </interface>
16255 -<interface name="corenet_send_hadoop_namenode_client_packets" lineno="31617">
16256 +<interface name="corenet_send_hadoop_namenode_client_packets" lineno="31635">
16257 <summary>
16258 Send hadoop_namenode_client packets.
16259 </summary>
16260 @@ -29939,7 +30023,7 @@ Domain allowed access.
16261 </param>
16262 <infoflow type="write" weight="10"/>
16263 </interface>
16264 -<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="31636">
16265 +<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="31654">
16266 <summary>
16267 Do not audit attempts to send hadoop_namenode_client packets.
16268 </summary>
16269 @@ -29950,7 +30034,7 @@ Domain to not audit.
16270 </param>
16271 <infoflow type="none"/>
16272 </interface>
16273 -<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="31655">
16274 +<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="31673">
16275 <summary>
16276 Receive hadoop_namenode_client packets.
16277 </summary>
16278 @@ -29961,7 +30045,7 @@ Domain allowed access.
16279 </param>
16280 <infoflow type="read" weight="10"/>
16281 </interface>
16282 -<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="31674">
16283 +<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="31692">
16284 <summary>
16285 Do not audit attempts to receive hadoop_namenode_client packets.
16286 </summary>
16287 @@ -29972,7 +30056,7 @@ Domain allowed access.
16288 </param>
16289 <infoflow type="none"/>
16290 </interface>
16291 -<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="31693">
16292 +<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="31711">
16293 <summary>
16294 Send and receive hadoop_namenode_client packets.
16295 </summary>
16296 @@ -29983,7 +30067,7 @@ Domain allowed access.
16297 </param>
16298 <infoflow type="both" weight="10"/>
16299 </interface>
16300 -<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="31709">
16301 +<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="31727">
16302 <summary>
16303 Do not audit attempts to send and receive hadoop_namenode_client packets.
16304 </summary>
16305 @@ -29994,7 +30078,7 @@ Domain to not audit.
16306 </param>
16307 <infoflow type="none"/>
16308 </interface>
16309 -<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="31724">
16310 +<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="31742">
16311 <summary>
16312 Relabel packets to hadoop_namenode_client the packet type.
16313 </summary>
16314 @@ -30004,7 +30088,7 @@ Domain allowed access.
16315 </summary>
16316 </param>
16317 </interface>
16318 -<interface name="corenet_send_hadoop_namenode_server_packets" lineno="31744">
16319 +<interface name="corenet_send_hadoop_namenode_server_packets" lineno="31762">
16320 <summary>
16321 Send hadoop_namenode_server packets.
16322 </summary>
16323 @@ -30015,7 +30099,7 @@ Domain allowed access.
16324 </param>
16325 <infoflow type="write" weight="10"/>
16326 </interface>
16327 -<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="31763">
16328 +<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="31781">
16329 <summary>
16330 Do not audit attempts to send hadoop_namenode_server packets.
16331 </summary>
16332 @@ -30026,7 +30110,7 @@ Domain to not audit.
16333 </param>
16334 <infoflow type="none"/>
16335 </interface>
16336 -<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="31782">
16337 +<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="31800">
16338 <summary>
16339 Receive hadoop_namenode_server packets.
16340 </summary>
16341 @@ -30037,7 +30121,7 @@ Domain allowed access.
16342 </param>
16343 <infoflow type="read" weight="10"/>
16344 </interface>
16345 -<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="31801">
16346 +<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="31819">
16347 <summary>
16348 Do not audit attempts to receive hadoop_namenode_server packets.
16349 </summary>
16350 @@ -30048,7 +30132,7 @@ Domain allowed access.
16351 </param>
16352 <infoflow type="none"/>
16353 </interface>
16354 -<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="31820">
16355 +<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="31838">
16356 <summary>
16357 Send and receive hadoop_namenode_server packets.
16358 </summary>
16359 @@ -30059,7 +30143,7 @@ Domain allowed access.
16360 </param>
16361 <infoflow type="both" weight="10"/>
16362 </interface>
16363 -<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="31836">
16364 +<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="31854">
16365 <summary>
16366 Do not audit attempts to send and receive hadoop_namenode_server packets.
16367 </summary>
16368 @@ -30070,7 +30154,7 @@ Domain to not audit.
16369 </param>
16370 <infoflow type="none"/>
16371 </interface>
16372 -<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="31851">
16373 +<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="31869">
16374 <summary>
16375 Relabel packets to hadoop_namenode_server the packet type.
16376 </summary>
16377 @@ -30080,7 +30164,7 @@ Domain allowed access.
16378 </summary>
16379 </param>
16380 </interface>
16381 -<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="31873">
16382 +<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="31891">
16383 <summary>
16384 Send and receive TCP traffic on the hddtemp port.
16385 </summary>
16386 @@ -30091,7 +30175,7 @@ Domain allowed access.
16387 </param>
16388 <infoflow type="both" weight="10"/>
16389 </interface>
16390 -<interface name="corenet_udp_send_hddtemp_port" lineno="31888">
16391 +<interface name="corenet_udp_send_hddtemp_port" lineno="31906">
16392 <summary>
16393 Send UDP traffic on the hddtemp port.
16394 </summary>
16395 @@ -30102,7 +30186,7 @@ Domain allowed access.
16396 </param>
16397 <infoflow type="write" weight="10"/>
16398 </interface>
16399 -<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="31903">
16400 +<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="31921">
16401 <summary>
16402 Do not audit attempts to send UDP traffic on the hddtemp port.
16403 </summary>
16404 @@ -30113,7 +30197,7 @@ Domain to not audit.
16405 </param>
16406 <infoflow type="none"/>
16407 </interface>
16408 -<interface name="corenet_udp_receive_hddtemp_port" lineno="31918">
16409 +<interface name="corenet_udp_receive_hddtemp_port" lineno="31936">
16410 <summary>
16411 Receive UDP traffic on the hddtemp port.
16412 </summary>
16413 @@ -30124,7 +30208,7 @@ Domain allowed access.
16414 </param>
16415 <infoflow type="read" weight="10"/>
16416 </interface>
16417 -<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="31933">
16418 +<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="31951">
16419 <summary>
16420 Do not audit attempts to receive UDP traffic on the hddtemp port.
16421 </summary>
16422 @@ -30135,7 +30219,7 @@ Domain to not audit.
16423 </param>
16424 <infoflow type="none"/>
16425 </interface>
16426 -<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="31948">
16427 +<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="31966">
16428 <summary>
16429 Send and receive UDP traffic on the hddtemp port.
16430 </summary>
16431 @@ -30146,7 +30230,7 @@ Domain allowed access.
16432 </param>
16433 <infoflow type="both" weight="10"/>
16434 </interface>
16435 -<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="31964">
16436 +<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="31982">
16437 <summary>
16438 Do not audit attempts to send and receive
16439 UDP traffic on the hddtemp port.
16440 @@ -30158,7 +30242,7 @@ Domain to not audit.
16441 </param>
16442 <infoflow type="none"/>
16443 </interface>
16444 -<interface name="corenet_tcp_bind_hddtemp_port" lineno="31979">
16445 +<interface name="corenet_tcp_bind_hddtemp_port" lineno="31997">
16446 <summary>
16447 Bind TCP sockets to the hddtemp port.
16448 </summary>
16449 @@ -30169,7 +30253,7 @@ Domain allowed access.
16450 </param>
16451 <infoflow type="none"/>
16452 </interface>
16453 -<interface name="corenet_udp_bind_hddtemp_port" lineno="31999">
16454 +<interface name="corenet_udp_bind_hddtemp_port" lineno="32017">
16455 <summary>
16456 Bind UDP sockets to the hddtemp port.
16457 </summary>
16458 @@ -30180,7 +30264,7 @@ Domain allowed access.
16459 </param>
16460 <infoflow type="none"/>
16461 </interface>
16462 -<interface name="corenet_tcp_connect_hddtemp_port" lineno="32018">
16463 +<interface name="corenet_tcp_connect_hddtemp_port" lineno="32036">
16464 <summary>
16465 Make a TCP connection to the hddtemp port.
16466 </summary>
16467 @@ -30190,7 +30274,7 @@ Domain allowed access.
16468 </summary>
16469 </param>
16470 </interface>
16471 -<interface name="corenet_send_hddtemp_client_packets" lineno="32038">
16472 +<interface name="corenet_send_hddtemp_client_packets" lineno="32056">
16473 <summary>
16474 Send hddtemp_client packets.
16475 </summary>
16476 @@ -30201,7 +30285,7 @@ Domain allowed access.
16477 </param>
16478 <infoflow type="write" weight="10"/>
16479 </interface>
16480 -<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="32057">
16481 +<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="32075">
16482 <summary>
16483 Do not audit attempts to send hddtemp_client packets.
16484 </summary>
16485 @@ -30212,7 +30296,7 @@ Domain to not audit.
16486 </param>
16487 <infoflow type="none"/>
16488 </interface>
16489 -<interface name="corenet_receive_hddtemp_client_packets" lineno="32076">
16490 +<interface name="corenet_receive_hddtemp_client_packets" lineno="32094">
16491 <summary>
16492 Receive hddtemp_client packets.
16493 </summary>
16494 @@ -30223,7 +30307,7 @@ Domain allowed access.
16495 </param>
16496 <infoflow type="read" weight="10"/>
16497 </interface>
16498 -<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="32095">
16499 +<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="32113">
16500 <summary>
16501 Do not audit attempts to receive hddtemp_client packets.
16502 </summary>
16503 @@ -30234,7 +30318,7 @@ Domain allowed access.
16504 </param>
16505 <infoflow type="none"/>
16506 </interface>
16507 -<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="32114">
16508 +<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="32132">
16509 <summary>
16510 Send and receive hddtemp_client packets.
16511 </summary>
16512 @@ -30245,7 +30329,7 @@ Domain allowed access.
16513 </param>
16514 <infoflow type="both" weight="10"/>
16515 </interface>
16516 -<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="32130">
16517 +<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="32148">
16518 <summary>
16519 Do not audit attempts to send and receive hddtemp_client packets.
16520 </summary>
16521 @@ -30256,7 +30340,7 @@ Domain to not audit.
16522 </param>
16523 <infoflow type="none"/>
16524 </interface>
16525 -<interface name="corenet_relabelto_hddtemp_client_packets" lineno="32145">
16526 +<interface name="corenet_relabelto_hddtemp_client_packets" lineno="32163">
16527 <summary>
16528 Relabel packets to hddtemp_client the packet type.
16529 </summary>
16530 @@ -30266,7 +30350,7 @@ Domain allowed access.
16531 </summary>
16532 </param>
16533 </interface>
16534 -<interface name="corenet_send_hddtemp_server_packets" lineno="32165">
16535 +<interface name="corenet_send_hddtemp_server_packets" lineno="32183">
16536 <summary>
16537 Send hddtemp_server packets.
16538 </summary>
16539 @@ -30277,7 +30361,7 @@ Domain allowed access.
16540 </param>
16541 <infoflow type="write" weight="10"/>
16542 </interface>
16543 -<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="32184">
16544 +<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="32202">
16545 <summary>
16546 Do not audit attempts to send hddtemp_server packets.
16547 </summary>
16548 @@ -30288,7 +30372,7 @@ Domain to not audit.
16549 </param>
16550 <infoflow type="none"/>
16551 </interface>
16552 -<interface name="corenet_receive_hddtemp_server_packets" lineno="32203">
16553 +<interface name="corenet_receive_hddtemp_server_packets" lineno="32221">
16554 <summary>
16555 Receive hddtemp_server packets.
16556 </summary>
16557 @@ -30299,7 +30383,7 @@ Domain allowed access.
16558 </param>
16559 <infoflow type="read" weight="10"/>
16560 </interface>
16561 -<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="32222">
16562 +<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="32240">
16563 <summary>
16564 Do not audit attempts to receive hddtemp_server packets.
16565 </summary>
16566 @@ -30310,7 +30394,7 @@ Domain allowed access.
16567 </param>
16568 <infoflow type="none"/>
16569 </interface>
16570 -<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="32241">
16571 +<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="32259">
16572 <summary>
16573 Send and receive hddtemp_server packets.
16574 </summary>
16575 @@ -30321,7 +30405,7 @@ Domain allowed access.
16576 </param>
16577 <infoflow type="both" weight="10"/>
16578 </interface>
16579 -<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="32257">
16580 +<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="32275">
16581 <summary>
16582 Do not audit attempts to send and receive hddtemp_server packets.
16583 </summary>
16584 @@ -30332,7 +30416,7 @@ Domain to not audit.
16585 </param>
16586 <infoflow type="none"/>
16587 </interface>
16588 -<interface name="corenet_relabelto_hddtemp_server_packets" lineno="32272">
16589 +<interface name="corenet_relabelto_hddtemp_server_packets" lineno="32290">
16590 <summary>
16591 Relabel packets to hddtemp_server the packet type.
16592 </summary>
16593 @@ -30342,7 +30426,7 @@ Domain allowed access.
16594 </summary>
16595 </param>
16596 </interface>
16597 -<interface name="corenet_tcp_sendrecv_howl_port" lineno="32294">
16598 +<interface name="corenet_tcp_sendrecv_howl_port" lineno="32312">
16599 <summary>
16600 Send and receive TCP traffic on the howl port.
16601 </summary>
16602 @@ -30353,7 +30437,7 @@ Domain allowed access.
16603 </param>
16604 <infoflow type="both" weight="10"/>
16605 </interface>
16606 -<interface name="corenet_udp_send_howl_port" lineno="32309">
16607 +<interface name="corenet_udp_send_howl_port" lineno="32327">
16608 <summary>
16609 Send UDP traffic on the howl port.
16610 </summary>
16611 @@ -30364,7 +30448,7 @@ Domain allowed access.
16612 </param>
16613 <infoflow type="write" weight="10"/>
16614 </interface>
16615 -<interface name="corenet_dontaudit_udp_send_howl_port" lineno="32324">
16616 +<interface name="corenet_dontaudit_udp_send_howl_port" lineno="32342">
16617 <summary>
16618 Do not audit attempts to send UDP traffic on the howl port.
16619 </summary>
16620 @@ -30375,7 +30459,7 @@ Domain to not audit.
16621 </param>
16622 <infoflow type="none"/>
16623 </interface>
16624 -<interface name="corenet_udp_receive_howl_port" lineno="32339">
16625 +<interface name="corenet_udp_receive_howl_port" lineno="32357">
16626 <summary>
16627 Receive UDP traffic on the howl port.
16628 </summary>
16629 @@ -30386,7 +30470,7 @@ Domain allowed access.
16630 </param>
16631 <infoflow type="read" weight="10"/>
16632 </interface>
16633 -<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="32354">
16634 +<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="32372">
16635 <summary>
16636 Do not audit attempts to receive UDP traffic on the howl port.
16637 </summary>
16638 @@ -30397,7 +30481,7 @@ Domain to not audit.
16639 </param>
16640 <infoflow type="none"/>
16641 </interface>
16642 -<interface name="corenet_udp_sendrecv_howl_port" lineno="32369">
16643 +<interface name="corenet_udp_sendrecv_howl_port" lineno="32387">
16644 <summary>
16645 Send and receive UDP traffic on the howl port.
16646 </summary>
16647 @@ -30408,7 +30492,7 @@ Domain allowed access.
16648 </param>
16649 <infoflow type="both" weight="10"/>
16650 </interface>
16651 -<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="32385">
16652 +<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="32403">
16653 <summary>
16654 Do not audit attempts to send and receive
16655 UDP traffic on the howl port.
16656 @@ -30420,7 +30504,7 @@ Domain to not audit.
16657 </param>
16658 <infoflow type="none"/>
16659 </interface>
16660 -<interface name="corenet_tcp_bind_howl_port" lineno="32400">
16661 +<interface name="corenet_tcp_bind_howl_port" lineno="32418">
16662 <summary>
16663 Bind TCP sockets to the howl port.
16664 </summary>
16665 @@ -30431,7 +30515,7 @@ Domain allowed access.
16666 </param>
16667 <infoflow type="none"/>
16668 </interface>
16669 -<interface name="corenet_udp_bind_howl_port" lineno="32420">
16670 +<interface name="corenet_udp_bind_howl_port" lineno="32438">
16671 <summary>
16672 Bind UDP sockets to the howl port.
16673 </summary>
16674 @@ -30442,7 +30526,7 @@ Domain allowed access.
16675 </param>
16676 <infoflow type="none"/>
16677 </interface>
16678 -<interface name="corenet_tcp_connect_howl_port" lineno="32439">
16679 +<interface name="corenet_tcp_connect_howl_port" lineno="32457">
16680 <summary>
16681 Make a TCP connection to the howl port.
16682 </summary>
16683 @@ -30452,7 +30536,7 @@ Domain allowed access.
16684 </summary>
16685 </param>
16686 </interface>
16687 -<interface name="corenet_send_howl_client_packets" lineno="32459">
16688 +<interface name="corenet_send_howl_client_packets" lineno="32477">
16689 <summary>
16690 Send howl_client packets.
16691 </summary>
16692 @@ -30463,7 +30547,7 @@ Domain allowed access.
16693 </param>
16694 <infoflow type="write" weight="10"/>
16695 </interface>
16696 -<interface name="corenet_dontaudit_send_howl_client_packets" lineno="32478">
16697 +<interface name="corenet_dontaudit_send_howl_client_packets" lineno="32496">
16698 <summary>
16699 Do not audit attempts to send howl_client packets.
16700 </summary>
16701 @@ -30474,7 +30558,7 @@ Domain to not audit.
16702 </param>
16703 <infoflow type="none"/>
16704 </interface>
16705 -<interface name="corenet_receive_howl_client_packets" lineno="32497">
16706 +<interface name="corenet_receive_howl_client_packets" lineno="32515">
16707 <summary>
16708 Receive howl_client packets.
16709 </summary>
16710 @@ -30485,7 +30569,7 @@ Domain allowed access.
16711 </param>
16712 <infoflow type="read" weight="10"/>
16713 </interface>
16714 -<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="32516">
16715 +<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="32534">
16716 <summary>
16717 Do not audit attempts to receive howl_client packets.
16718 </summary>
16719 @@ -30496,7 +30580,7 @@ Domain allowed access.
16720 </param>
16721 <infoflow type="none"/>
16722 </interface>
16723 -<interface name="corenet_sendrecv_howl_client_packets" lineno="32535">
16724 +<interface name="corenet_sendrecv_howl_client_packets" lineno="32553">
16725 <summary>
16726 Send and receive howl_client packets.
16727 </summary>
16728 @@ -30507,7 +30591,7 @@ Domain allowed access.
16729 </param>
16730 <infoflow type="both" weight="10"/>
16731 </interface>
16732 -<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="32551">
16733 +<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="32569">
16734 <summary>
16735 Do not audit attempts to send and receive howl_client packets.
16736 </summary>
16737 @@ -30518,7 +30602,7 @@ Domain to not audit.
16738 </param>
16739 <infoflow type="none"/>
16740 </interface>
16741 -<interface name="corenet_relabelto_howl_client_packets" lineno="32566">
16742 +<interface name="corenet_relabelto_howl_client_packets" lineno="32584">
16743 <summary>
16744 Relabel packets to howl_client the packet type.
16745 </summary>
16746 @@ -30528,7 +30612,7 @@ Domain allowed access.
16747 </summary>
16748 </param>
16749 </interface>
16750 -<interface name="corenet_send_howl_server_packets" lineno="32586">
16751 +<interface name="corenet_send_howl_server_packets" lineno="32604">
16752 <summary>
16753 Send howl_server packets.
16754 </summary>
16755 @@ -30539,7 +30623,7 @@ Domain allowed access.
16756 </param>
16757 <infoflow type="write" weight="10"/>
16758 </interface>
16759 -<interface name="corenet_dontaudit_send_howl_server_packets" lineno="32605">
16760 +<interface name="corenet_dontaudit_send_howl_server_packets" lineno="32623">
16761 <summary>
16762 Do not audit attempts to send howl_server packets.
16763 </summary>
16764 @@ -30550,7 +30634,7 @@ Domain to not audit.
16765 </param>
16766 <infoflow type="none"/>
16767 </interface>
16768 -<interface name="corenet_receive_howl_server_packets" lineno="32624">
16769 +<interface name="corenet_receive_howl_server_packets" lineno="32642">
16770 <summary>
16771 Receive howl_server packets.
16772 </summary>
16773 @@ -30561,7 +30645,7 @@ Domain allowed access.
16774 </param>
16775 <infoflow type="read" weight="10"/>
16776 </interface>
16777 -<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="32643">
16778 +<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="32661">
16779 <summary>
16780 Do not audit attempts to receive howl_server packets.
16781 </summary>
16782 @@ -30572,7 +30656,7 @@ Domain allowed access.
16783 </param>
16784 <infoflow type="none"/>
16785 </interface>
16786 -<interface name="corenet_sendrecv_howl_server_packets" lineno="32662">
16787 +<interface name="corenet_sendrecv_howl_server_packets" lineno="32680">
16788 <summary>
16789 Send and receive howl_server packets.
16790 </summary>
16791 @@ -30583,7 +30667,7 @@ Domain allowed access.
16792 </param>
16793 <infoflow type="both" weight="10"/>
16794 </interface>
16795 -<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="32678">
16796 +<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="32696">
16797 <summary>
16798 Do not audit attempts to send and receive howl_server packets.
16799 </summary>
16800 @@ -30594,7 +30678,7 @@ Domain to not audit.
16801 </param>
16802 <infoflow type="none"/>
16803 </interface>
16804 -<interface name="corenet_relabelto_howl_server_packets" lineno="32693">
16805 +<interface name="corenet_relabelto_howl_server_packets" lineno="32711">
16806 <summary>
16807 Relabel packets to howl_server the packet type.
16808 </summary>
16809 @@ -30604,7 +30688,7 @@ Domain allowed access.
16810 </summary>
16811 </param>
16812 </interface>
16813 -<interface name="corenet_tcp_sendrecv_hplip_port" lineno="32715">
16814 +<interface name="corenet_tcp_sendrecv_hplip_port" lineno="32733">
16815 <summary>
16816 Send and receive TCP traffic on the hplip port.
16817 </summary>
16818 @@ -30615,7 +30699,7 @@ Domain allowed access.
16819 </param>
16820 <infoflow type="both" weight="10"/>
16821 </interface>
16822 -<interface name="corenet_udp_send_hplip_port" lineno="32730">
16823 +<interface name="corenet_udp_send_hplip_port" lineno="32748">
16824 <summary>
16825 Send UDP traffic on the hplip port.
16826 </summary>
16827 @@ -30626,7 +30710,7 @@ Domain allowed access.
16828 </param>
16829 <infoflow type="write" weight="10"/>
16830 </interface>
16831 -<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="32745">
16832 +<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="32763">
16833 <summary>
16834 Do not audit attempts to send UDP traffic on the hplip port.
16835 </summary>
16836 @@ -30637,7 +30721,7 @@ Domain to not audit.
16837 </param>
16838 <infoflow type="none"/>
16839 </interface>
16840 -<interface name="corenet_udp_receive_hplip_port" lineno="32760">
16841 +<interface name="corenet_udp_receive_hplip_port" lineno="32778">
16842 <summary>
16843 Receive UDP traffic on the hplip port.
16844 </summary>
16845 @@ -30648,7 +30732,7 @@ Domain allowed access.
16846 </param>
16847 <infoflow type="read" weight="10"/>
16848 </interface>
16849 -<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="32775">
16850 +<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="32793">
16851 <summary>
16852 Do not audit attempts to receive UDP traffic on the hplip port.
16853 </summary>
16854 @@ -30659,7 +30743,7 @@ Domain to not audit.
16855 </param>
16856 <infoflow type="none"/>
16857 </interface>
16858 -<interface name="corenet_udp_sendrecv_hplip_port" lineno="32790">
16859 +<interface name="corenet_udp_sendrecv_hplip_port" lineno="32808">
16860 <summary>
16861 Send and receive UDP traffic on the hplip port.
16862 </summary>
16863 @@ -30670,7 +30754,7 @@ Domain allowed access.
16864 </param>
16865 <infoflow type="both" weight="10"/>
16866 </interface>
16867 -<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="32806">
16868 +<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="32824">
16869 <summary>
16870 Do not audit attempts to send and receive
16871 UDP traffic on the hplip port.
16872 @@ -30682,7 +30766,7 @@ Domain to not audit.
16873 </param>
16874 <infoflow type="none"/>
16875 </interface>
16876 -<interface name="corenet_tcp_bind_hplip_port" lineno="32821">
16877 +<interface name="corenet_tcp_bind_hplip_port" lineno="32839">
16878 <summary>
16879 Bind TCP sockets to the hplip port.
16880 </summary>
16881 @@ -30693,7 +30777,7 @@ Domain allowed access.
16882 </param>
16883 <infoflow type="none"/>
16884 </interface>
16885 -<interface name="corenet_udp_bind_hplip_port" lineno="32841">
16886 +<interface name="corenet_udp_bind_hplip_port" lineno="32859">
16887 <summary>
16888 Bind UDP sockets to the hplip port.
16889 </summary>
16890 @@ -30704,7 +30788,7 @@ Domain allowed access.
16891 </param>
16892 <infoflow type="none"/>
16893 </interface>
16894 -<interface name="corenet_tcp_connect_hplip_port" lineno="32860">
16895 +<interface name="corenet_tcp_connect_hplip_port" lineno="32878">
16896 <summary>
16897 Make a TCP connection to the hplip port.
16898 </summary>
16899 @@ -30714,7 +30798,7 @@ Domain allowed access.
16900 </summary>
16901 </param>
16902 </interface>
16903 -<interface name="corenet_send_hplip_client_packets" lineno="32880">
16904 +<interface name="corenet_send_hplip_client_packets" lineno="32898">
16905 <summary>
16906 Send hplip_client packets.
16907 </summary>
16908 @@ -30725,7 +30809,7 @@ Domain allowed access.
16909 </param>
16910 <infoflow type="write" weight="10"/>
16911 </interface>
16912 -<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="32899">
16913 +<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="32917">
16914 <summary>
16915 Do not audit attempts to send hplip_client packets.
16916 </summary>
16917 @@ -30736,7 +30820,7 @@ Domain to not audit.
16918 </param>
16919 <infoflow type="none"/>
16920 </interface>
16921 -<interface name="corenet_receive_hplip_client_packets" lineno="32918">
16922 +<interface name="corenet_receive_hplip_client_packets" lineno="32936">
16923 <summary>
16924 Receive hplip_client packets.
16925 </summary>
16926 @@ -30747,7 +30831,7 @@ Domain allowed access.
16927 </param>
16928 <infoflow type="read" weight="10"/>
16929 </interface>
16930 -<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="32937">
16931 +<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="32955">
16932 <summary>
16933 Do not audit attempts to receive hplip_client packets.
16934 </summary>
16935 @@ -30758,7 +30842,7 @@ Domain allowed access.
16936 </param>
16937 <infoflow type="none"/>
16938 </interface>
16939 -<interface name="corenet_sendrecv_hplip_client_packets" lineno="32956">
16940 +<interface name="corenet_sendrecv_hplip_client_packets" lineno="32974">
16941 <summary>
16942 Send and receive hplip_client packets.
16943 </summary>
16944 @@ -30769,7 +30853,7 @@ Domain allowed access.
16945 </param>
16946 <infoflow type="both" weight="10"/>
16947 </interface>
16948 -<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="32972">
16949 +<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="32990">
16950 <summary>
16951 Do not audit attempts to send and receive hplip_client packets.
16952 </summary>
16953 @@ -30780,7 +30864,7 @@ Domain to not audit.
16954 </param>
16955 <infoflow type="none"/>
16956 </interface>
16957 -<interface name="corenet_relabelto_hplip_client_packets" lineno="32987">
16958 +<interface name="corenet_relabelto_hplip_client_packets" lineno="33005">
16959 <summary>
16960 Relabel packets to hplip_client the packet type.
16961 </summary>
16962 @@ -30790,7 +30874,7 @@ Domain allowed access.
16963 </summary>
16964 </param>
16965 </interface>
16966 -<interface name="corenet_send_hplip_server_packets" lineno="33007">
16967 +<interface name="corenet_send_hplip_server_packets" lineno="33025">
16968 <summary>
16969 Send hplip_server packets.
16970 </summary>
16971 @@ -30801,7 +30885,7 @@ Domain allowed access.
16972 </param>
16973 <infoflow type="write" weight="10"/>
16974 </interface>
16975 -<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="33026">
16976 +<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="33044">
16977 <summary>
16978 Do not audit attempts to send hplip_server packets.
16979 </summary>
16980 @@ -30812,7 +30896,7 @@ Domain to not audit.
16981 </param>
16982 <infoflow type="none"/>
16983 </interface>
16984 -<interface name="corenet_receive_hplip_server_packets" lineno="33045">
16985 +<interface name="corenet_receive_hplip_server_packets" lineno="33063">
16986 <summary>
16987 Receive hplip_server packets.
16988 </summary>
16989 @@ -30823,7 +30907,7 @@ Domain allowed access.
16990 </param>
16991 <infoflow type="read" weight="10"/>
16992 </interface>
16993 -<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="33064">
16994 +<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="33082">
16995 <summary>
16996 Do not audit attempts to receive hplip_server packets.
16997 </summary>
16998 @@ -30834,7 +30918,7 @@ Domain allowed access.
16999 </param>
17000 <infoflow type="none"/>
17001 </interface>
17002 -<interface name="corenet_sendrecv_hplip_server_packets" lineno="33083">
17003 +<interface name="corenet_sendrecv_hplip_server_packets" lineno="33101">
17004 <summary>
17005 Send and receive hplip_server packets.
17006 </summary>
17007 @@ -30845,7 +30929,7 @@ Domain allowed access.
17008 </param>
17009 <infoflow type="both" weight="10"/>
17010 </interface>
17011 -<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="33099">
17012 +<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="33117">
17013 <summary>
17014 Do not audit attempts to send and receive hplip_server packets.
17015 </summary>
17016 @@ -30856,7 +30940,7 @@ Domain to not audit.
17017 </param>
17018 <infoflow type="none"/>
17019 </interface>
17020 -<interface name="corenet_relabelto_hplip_server_packets" lineno="33114">
17021 +<interface name="corenet_relabelto_hplip_server_packets" lineno="33132">
17022 <summary>
17023 Relabel packets to hplip_server the packet type.
17024 </summary>
17025 @@ -30866,7 +30950,7 @@ Domain allowed access.
17026 </summary>
17027 </param>
17028 </interface>
17029 -<interface name="corenet_tcp_sendrecv_http_port" lineno="33136">
17030 +<interface name="corenet_tcp_sendrecv_http_port" lineno="33154">
17031 <summary>
17032 Send and receive TCP traffic on the http port.
17033 </summary>
17034 @@ -30877,7 +30961,7 @@ Domain allowed access.
17035 </param>
17036 <infoflow type="both" weight="10"/>
17037 </interface>
17038 -<interface name="corenet_udp_send_http_port" lineno="33151">
17039 +<interface name="corenet_udp_send_http_port" lineno="33169">
17040 <summary>
17041 Send UDP traffic on the http port.
17042 </summary>
17043 @@ -30888,7 +30972,7 @@ Domain allowed access.
17044 </param>
17045 <infoflow type="write" weight="10"/>
17046 </interface>
17047 -<interface name="corenet_dontaudit_udp_send_http_port" lineno="33166">
17048 +<interface name="corenet_dontaudit_udp_send_http_port" lineno="33184">
17049 <summary>
17050 Do not audit attempts to send UDP traffic on the http port.
17051 </summary>
17052 @@ -30899,7 +30983,7 @@ Domain to not audit.
17053 </param>
17054 <infoflow type="none"/>
17055 </interface>
17056 -<interface name="corenet_udp_receive_http_port" lineno="33181">
17057 +<interface name="corenet_udp_receive_http_port" lineno="33199">
17058 <summary>
17059 Receive UDP traffic on the http port.
17060 </summary>
17061 @@ -30910,7 +30994,7 @@ Domain allowed access.
17062 </param>
17063 <infoflow type="read" weight="10"/>
17064 </interface>
17065 -<interface name="corenet_dontaudit_udp_receive_http_port" lineno="33196">
17066 +<interface name="corenet_dontaudit_udp_receive_http_port" lineno="33214">
17067 <summary>
17068 Do not audit attempts to receive UDP traffic on the http port.
17069 </summary>
17070 @@ -30921,7 +31005,7 @@ Domain to not audit.
17071 </param>
17072 <infoflow type="none"/>
17073 </interface>
17074 -<interface name="corenet_udp_sendrecv_http_port" lineno="33211">
17075 +<interface name="corenet_udp_sendrecv_http_port" lineno="33229">
17076 <summary>
17077 Send and receive UDP traffic on the http port.
17078 </summary>
17079 @@ -30932,7 +31016,7 @@ Domain allowed access.
17080 </param>
17081 <infoflow type="both" weight="10"/>
17082 </interface>
17083 -<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="33227">
17084 +<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="33245">
17085 <summary>
17086 Do not audit attempts to send and receive
17087 UDP traffic on the http port.
17088 @@ -30944,7 +31028,7 @@ Domain to not audit.
17089 </param>
17090 <infoflow type="none"/>
17091 </interface>
17092 -<interface name="corenet_tcp_bind_http_port" lineno="33242">
17093 +<interface name="corenet_tcp_bind_http_port" lineno="33260">
17094 <summary>
17095 Bind TCP sockets to the http port.
17096 </summary>
17097 @@ -30955,7 +31039,7 @@ Domain allowed access.
17098 </param>
17099 <infoflow type="none"/>
17100 </interface>
17101 -<interface name="corenet_udp_bind_http_port" lineno="33262">
17102 +<interface name="corenet_udp_bind_http_port" lineno="33280">
17103 <summary>
17104 Bind UDP sockets to the http port.
17105 </summary>
17106 @@ -30966,7 +31050,7 @@ Domain allowed access.
17107 </param>
17108 <infoflow type="none"/>
17109 </interface>
17110 -<interface name="corenet_tcp_connect_http_port" lineno="33281">
17111 +<interface name="corenet_tcp_connect_http_port" lineno="33299">
17112 <summary>
17113 Make a TCP connection to the http port.
17114 </summary>
17115 @@ -30976,7 +31060,7 @@ Domain allowed access.
17116 </summary>
17117 </param>
17118 </interface>
17119 -<interface name="corenet_send_http_client_packets" lineno="33301">
17120 +<interface name="corenet_send_http_client_packets" lineno="33319">
17121 <summary>
17122 Send http_client packets.
17123 </summary>
17124 @@ -30987,7 +31071,7 @@ Domain allowed access.
17125 </param>
17126 <infoflow type="write" weight="10"/>
17127 </interface>
17128 -<interface name="corenet_dontaudit_send_http_client_packets" lineno="33320">
17129 +<interface name="corenet_dontaudit_send_http_client_packets" lineno="33338">
17130 <summary>
17131 Do not audit attempts to send http_client packets.
17132 </summary>
17133 @@ -30998,7 +31082,7 @@ Domain to not audit.
17134 </param>
17135 <infoflow type="none"/>
17136 </interface>
17137 -<interface name="corenet_receive_http_client_packets" lineno="33339">
17138 +<interface name="corenet_receive_http_client_packets" lineno="33357">
17139 <summary>
17140 Receive http_client packets.
17141 </summary>
17142 @@ -31009,7 +31093,7 @@ Domain allowed access.
17143 </param>
17144 <infoflow type="read" weight="10"/>
17145 </interface>
17146 -<interface name="corenet_dontaudit_receive_http_client_packets" lineno="33358">
17147 +<interface name="corenet_dontaudit_receive_http_client_packets" lineno="33376">
17148 <summary>
17149 Do not audit attempts to receive http_client packets.
17150 </summary>
17151 @@ -31020,7 +31104,7 @@ Domain allowed access.
17152 </param>
17153 <infoflow type="none"/>
17154 </interface>
17155 -<interface name="corenet_sendrecv_http_client_packets" lineno="33377">
17156 +<interface name="corenet_sendrecv_http_client_packets" lineno="33395">
17157 <summary>
17158 Send and receive http_client packets.
17159 </summary>
17160 @@ -31031,7 +31115,7 @@ Domain allowed access.
17161 </param>
17162 <infoflow type="both" weight="10"/>
17163 </interface>
17164 -<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="33393">
17165 +<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="33411">
17166 <summary>
17167 Do not audit attempts to send and receive http_client packets.
17168 </summary>
17169 @@ -31042,7 +31126,7 @@ Domain to not audit.
17170 </param>
17171 <infoflow type="none"/>
17172 </interface>
17173 -<interface name="corenet_relabelto_http_client_packets" lineno="33408">
17174 +<interface name="corenet_relabelto_http_client_packets" lineno="33426">
17175 <summary>
17176 Relabel packets to http_client the packet type.
17177 </summary>
17178 @@ -31052,7 +31136,7 @@ Domain allowed access.
17179 </summary>
17180 </param>
17181 </interface>
17182 -<interface name="corenet_send_http_server_packets" lineno="33428">
17183 +<interface name="corenet_send_http_server_packets" lineno="33446">
17184 <summary>
17185 Send http_server packets.
17186 </summary>
17187 @@ -31063,7 +31147,7 @@ Domain allowed access.
17188 </param>
17189 <infoflow type="write" weight="10"/>
17190 </interface>
17191 -<interface name="corenet_dontaudit_send_http_server_packets" lineno="33447">
17192 +<interface name="corenet_dontaudit_send_http_server_packets" lineno="33465">
17193 <summary>
17194 Do not audit attempts to send http_server packets.
17195 </summary>
17196 @@ -31074,7 +31158,7 @@ Domain to not audit.
17197 </param>
17198 <infoflow type="none"/>
17199 </interface>
17200 -<interface name="corenet_receive_http_server_packets" lineno="33466">
17201 +<interface name="corenet_receive_http_server_packets" lineno="33484">
17202 <summary>
17203 Receive http_server packets.
17204 </summary>
17205 @@ -31085,7 +31169,7 @@ Domain allowed access.
17206 </param>
17207 <infoflow type="read" weight="10"/>
17208 </interface>
17209 -<interface name="corenet_dontaudit_receive_http_server_packets" lineno="33485">
17210 +<interface name="corenet_dontaudit_receive_http_server_packets" lineno="33503">
17211 <summary>
17212 Do not audit attempts to receive http_server packets.
17213 </summary>
17214 @@ -31096,7 +31180,7 @@ Domain allowed access.
17215 </param>
17216 <infoflow type="none"/>
17217 </interface>
17218 -<interface name="corenet_sendrecv_http_server_packets" lineno="33504">
17219 +<interface name="corenet_sendrecv_http_server_packets" lineno="33522">
17220 <summary>
17221 Send and receive http_server packets.
17222 </summary>
17223 @@ -31107,7 +31191,7 @@ Domain allowed access.
17224 </param>
17225 <infoflow type="both" weight="10"/>
17226 </interface>
17227 -<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="33520">
17228 +<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="33538">
17229 <summary>
17230 Do not audit attempts to send and receive http_server packets.
17231 </summary>
17232 @@ -31118,7 +31202,7 @@ Domain to not audit.
17233 </param>
17234 <infoflow type="none"/>
17235 </interface>
17236 -<interface name="corenet_relabelto_http_server_packets" lineno="33535">
17237 +<interface name="corenet_relabelto_http_server_packets" lineno="33553">
17238 <summary>
17239 Relabel packets to http_server the packet type.
17240 </summary>
17241 @@ -31128,7 +31212,7 @@ Domain allowed access.
17242 </summary>
17243 </param>
17244 </interface>
17245 -<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="33557">
17246 +<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="33575">
17247 <summary>
17248 Send and receive TCP traffic on the http_cache port.
17249 </summary>
17250 @@ -31139,7 +31223,7 @@ Domain allowed access.
17251 </param>
17252 <infoflow type="both" weight="10"/>
17253 </interface>
17254 -<interface name="corenet_udp_send_http_cache_port" lineno="33572">
17255 +<interface name="corenet_udp_send_http_cache_port" lineno="33590">
17256 <summary>
17257 Send UDP traffic on the http_cache port.
17258 </summary>
17259 @@ -31150,7 +31234,7 @@ Domain allowed access.
17260 </param>
17261 <infoflow type="write" weight="10"/>
17262 </interface>
17263 -<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="33587">
17264 +<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="33605">
17265 <summary>
17266 Do not audit attempts to send UDP traffic on the http_cache port.
17267 </summary>
17268 @@ -31161,7 +31245,7 @@ Domain to not audit.
17269 </param>
17270 <infoflow type="none"/>
17271 </interface>
17272 -<interface name="corenet_udp_receive_http_cache_port" lineno="33602">
17273 +<interface name="corenet_udp_receive_http_cache_port" lineno="33620">
17274 <summary>
17275 Receive UDP traffic on the http_cache port.
17276 </summary>
17277 @@ -31172,7 +31256,7 @@ Domain allowed access.
17278 </param>
17279 <infoflow type="read" weight="10"/>
17280 </interface>
17281 -<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="33617">
17282 +<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="33635">
17283 <summary>
17284 Do not audit attempts to receive UDP traffic on the http_cache port.
17285 </summary>
17286 @@ -31183,7 +31267,7 @@ Domain to not audit.
17287 </param>
17288 <infoflow type="none"/>
17289 </interface>
17290 -<interface name="corenet_udp_sendrecv_http_cache_port" lineno="33632">
17291 +<interface name="corenet_udp_sendrecv_http_cache_port" lineno="33650">
17292 <summary>
17293 Send and receive UDP traffic on the http_cache port.
17294 </summary>
17295 @@ -31194,7 +31278,7 @@ Domain allowed access.
17296 </param>
17297 <infoflow type="both" weight="10"/>
17298 </interface>
17299 -<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="33648">
17300 +<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="33666">
17301 <summary>
17302 Do not audit attempts to send and receive
17303 UDP traffic on the http_cache port.
17304 @@ -31206,7 +31290,7 @@ Domain to not audit.
17305 </param>
17306 <infoflow type="none"/>
17307 </interface>
17308 -<interface name="corenet_tcp_bind_http_cache_port" lineno="33663">
17309 +<interface name="corenet_tcp_bind_http_cache_port" lineno="33681">
17310 <summary>
17311 Bind TCP sockets to the http_cache port.
17312 </summary>
17313 @@ -31217,7 +31301,7 @@ Domain allowed access.
17314 </param>
17315 <infoflow type="none"/>
17316 </interface>
17317 -<interface name="corenet_udp_bind_http_cache_port" lineno="33683">
17318 +<interface name="corenet_udp_bind_http_cache_port" lineno="33701">
17319 <summary>
17320 Bind UDP sockets to the http_cache port.
17321 </summary>
17322 @@ -31228,7 +31312,7 @@ Domain allowed access.
17323 </param>
17324 <infoflow type="none"/>
17325 </interface>
17326 -<interface name="corenet_tcp_connect_http_cache_port" lineno="33702">
17327 +<interface name="corenet_tcp_connect_http_cache_port" lineno="33720">
17328 <summary>
17329 Make a TCP connection to the http_cache port.
17330 </summary>
17331 @@ -31238,7 +31322,7 @@ Domain allowed access.
17332 </summary>
17333 </param>
17334 </interface>
17335 -<interface name="corenet_send_http_cache_client_packets" lineno="33722">
17336 +<interface name="corenet_send_http_cache_client_packets" lineno="33740">
17337 <summary>
17338 Send http_cache_client packets.
17339 </summary>
17340 @@ -31249,7 +31333,7 @@ Domain allowed access.
17341 </param>
17342 <infoflow type="write" weight="10"/>
17343 </interface>
17344 -<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="33741">
17345 +<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="33759">
17346 <summary>
17347 Do not audit attempts to send http_cache_client packets.
17348 </summary>
17349 @@ -31260,7 +31344,7 @@ Domain to not audit.
17350 </param>
17351 <infoflow type="none"/>
17352 </interface>
17353 -<interface name="corenet_receive_http_cache_client_packets" lineno="33760">
17354 +<interface name="corenet_receive_http_cache_client_packets" lineno="33778">
17355 <summary>
17356 Receive http_cache_client packets.
17357 </summary>
17358 @@ -31271,7 +31355,7 @@ Domain allowed access.
17359 </param>
17360 <infoflow type="read" weight="10"/>
17361 </interface>
17362 -<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="33779">
17363 +<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="33797">
17364 <summary>
17365 Do not audit attempts to receive http_cache_client packets.
17366 </summary>
17367 @@ -31282,7 +31366,7 @@ Domain allowed access.
17368 </param>
17369 <infoflow type="none"/>
17370 </interface>
17371 -<interface name="corenet_sendrecv_http_cache_client_packets" lineno="33798">
17372 +<interface name="corenet_sendrecv_http_cache_client_packets" lineno="33816">
17373 <summary>
17374 Send and receive http_cache_client packets.
17375 </summary>
17376 @@ -31293,7 +31377,7 @@ Domain allowed access.
17377 </param>
17378 <infoflow type="both" weight="10"/>
17379 </interface>
17380 -<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="33814">
17381 +<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="33832">
17382 <summary>
17383 Do not audit attempts to send and receive http_cache_client packets.
17384 </summary>
17385 @@ -31304,7 +31388,7 @@ Domain to not audit.
17386 </param>
17387 <infoflow type="none"/>
17388 </interface>
17389 -<interface name="corenet_relabelto_http_cache_client_packets" lineno="33829">
17390 +<interface name="corenet_relabelto_http_cache_client_packets" lineno="33847">
17391 <summary>
17392 Relabel packets to http_cache_client the packet type.
17393 </summary>
17394 @@ -31314,7 +31398,7 @@ Domain allowed access.
17395 </summary>
17396 </param>
17397 </interface>
17398 -<interface name="corenet_send_http_cache_server_packets" lineno="33849">
17399 +<interface name="corenet_send_http_cache_server_packets" lineno="33867">
17400 <summary>
17401 Send http_cache_server packets.
17402 </summary>
17403 @@ -31325,7 +31409,7 @@ Domain allowed access.
17404 </param>
17405 <infoflow type="write" weight="10"/>
17406 </interface>
17407 -<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="33868">
17408 +<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="33886">
17409 <summary>
17410 Do not audit attempts to send http_cache_server packets.
17411 </summary>
17412 @@ -31336,7 +31420,7 @@ Domain to not audit.
17413 </param>
17414 <infoflow type="none"/>
17415 </interface>
17416 -<interface name="corenet_receive_http_cache_server_packets" lineno="33887">
17417 +<interface name="corenet_receive_http_cache_server_packets" lineno="33905">
17418 <summary>
17419 Receive http_cache_server packets.
17420 </summary>
17421 @@ -31347,7 +31431,7 @@ Domain allowed access.
17422 </param>
17423 <infoflow type="read" weight="10"/>
17424 </interface>
17425 -<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="33906">
17426 +<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="33924">
17427 <summary>
17428 Do not audit attempts to receive http_cache_server packets.
17429 </summary>
17430 @@ -31358,7 +31442,7 @@ Domain allowed access.
17431 </param>
17432 <infoflow type="none"/>
17433 </interface>
17434 -<interface name="corenet_sendrecv_http_cache_server_packets" lineno="33925">
17435 +<interface name="corenet_sendrecv_http_cache_server_packets" lineno="33943">
17436 <summary>
17437 Send and receive http_cache_server packets.
17438 </summary>
17439 @@ -31369,7 +31453,7 @@ Domain allowed access.
17440 </param>
17441 <infoflow type="both" weight="10"/>
17442 </interface>
17443 -<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="33941">
17444 +<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="33959">
17445 <summary>
17446 Do not audit attempts to send and receive http_cache_server packets.
17447 </summary>
17448 @@ -31380,7 +31464,7 @@ Domain to not audit.
17449 </param>
17450 <infoflow type="none"/>
17451 </interface>
17452 -<interface name="corenet_relabelto_http_cache_server_packets" lineno="33956">
17453 +<interface name="corenet_relabelto_http_cache_server_packets" lineno="33974">
17454 <summary>
17455 Relabel packets to http_cache_server the packet type.
17456 </summary>
17457 @@ -31390,7 +31474,7 @@ Domain allowed access.
17458 </summary>
17459 </param>
17460 </interface>
17461 -<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="33978">
17462 +<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="33996">
17463 <summary>
17464 Send and receive TCP traffic on the i18n_input port.
17465 </summary>
17466 @@ -31401,7 +31485,7 @@ Domain allowed access.
17467 </param>
17468 <infoflow type="both" weight="10"/>
17469 </interface>
17470 -<interface name="corenet_udp_send_i18n_input_port" lineno="33993">
17471 +<interface name="corenet_udp_send_i18n_input_port" lineno="34011">
17472 <summary>
17473 Send UDP traffic on the i18n_input port.
17474 </summary>
17475 @@ -31412,7 +31496,7 @@ Domain allowed access.
17476 </param>
17477 <infoflow type="write" weight="10"/>
17478 </interface>
17479 -<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="34008">
17480 +<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="34026">
17481 <summary>
17482 Do not audit attempts to send UDP traffic on the i18n_input port.
17483 </summary>
17484 @@ -31423,7 +31507,7 @@ Domain to not audit.
17485 </param>
17486 <infoflow type="none"/>
17487 </interface>
17488 -<interface name="corenet_udp_receive_i18n_input_port" lineno="34023">
17489 +<interface name="corenet_udp_receive_i18n_input_port" lineno="34041">
17490 <summary>
17491 Receive UDP traffic on the i18n_input port.
17492 </summary>
17493 @@ -31434,7 +31518,7 @@ Domain allowed access.
17494 </param>
17495 <infoflow type="read" weight="10"/>
17496 </interface>
17497 -<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="34038">
17498 +<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="34056">
17499 <summary>
17500 Do not audit attempts to receive UDP traffic on the i18n_input port.
17501 </summary>
17502 @@ -31445,7 +31529,7 @@ Domain to not audit.
17503 </param>
17504 <infoflow type="none"/>
17505 </interface>
17506 -<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="34053">
17507 +<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="34071">
17508 <summary>
17509 Send and receive UDP traffic on the i18n_input port.
17510 </summary>
17511 @@ -31456,7 +31540,7 @@ Domain allowed access.
17512 </param>
17513 <infoflow type="both" weight="10"/>
17514 </interface>
17515 -<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="34069">
17516 +<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="34087">
17517 <summary>
17518 Do not audit attempts to send and receive
17519 UDP traffic on the i18n_input port.
17520 @@ -31468,7 +31552,7 @@ Domain to not audit.
17521 </param>
17522 <infoflow type="none"/>
17523 </interface>
17524 -<interface name="corenet_tcp_bind_i18n_input_port" lineno="34084">
17525 +<interface name="corenet_tcp_bind_i18n_input_port" lineno="34102">
17526 <summary>
17527 Bind TCP sockets to the i18n_input port.
17528 </summary>
17529 @@ -31479,7 +31563,7 @@ Domain allowed access.
17530 </param>
17531 <infoflow type="none"/>
17532 </interface>
17533 -<interface name="corenet_udp_bind_i18n_input_port" lineno="34104">
17534 +<interface name="corenet_udp_bind_i18n_input_port" lineno="34122">
17535 <summary>
17536 Bind UDP sockets to the i18n_input port.
17537 </summary>
17538 @@ -31490,7 +31574,7 @@ Domain allowed access.
17539 </param>
17540 <infoflow type="none"/>
17541 </interface>
17542 -<interface name="corenet_tcp_connect_i18n_input_port" lineno="34123">
17543 +<interface name="corenet_tcp_connect_i18n_input_port" lineno="34141">
17544 <summary>
17545 Make a TCP connection to the i18n_input port.
17546 </summary>
17547 @@ -31500,7 +31584,7 @@ Domain allowed access.
17548 </summary>
17549 </param>
17550 </interface>
17551 -<interface name="corenet_send_i18n_input_client_packets" lineno="34143">
17552 +<interface name="corenet_send_i18n_input_client_packets" lineno="34161">
17553 <summary>
17554 Send i18n_input_client packets.
17555 </summary>
17556 @@ -31511,7 +31595,7 @@ Domain allowed access.
17557 </param>
17558 <infoflow type="write" weight="10"/>
17559 </interface>
17560 -<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="34162">
17561 +<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="34180">
17562 <summary>
17563 Do not audit attempts to send i18n_input_client packets.
17564 </summary>
17565 @@ -31522,7 +31606,7 @@ Domain to not audit.
17566 </param>
17567 <infoflow type="none"/>
17568 </interface>
17569 -<interface name="corenet_receive_i18n_input_client_packets" lineno="34181">
17570 +<interface name="corenet_receive_i18n_input_client_packets" lineno="34199">
17571 <summary>
17572 Receive i18n_input_client packets.
17573 </summary>
17574 @@ -31533,7 +31617,7 @@ Domain allowed access.
17575 </param>
17576 <infoflow type="read" weight="10"/>
17577 </interface>
17578 -<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="34200">
17579 +<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="34218">
17580 <summary>
17581 Do not audit attempts to receive i18n_input_client packets.
17582 </summary>
17583 @@ -31544,7 +31628,7 @@ Domain allowed access.
17584 </param>
17585 <infoflow type="none"/>
17586 </interface>
17587 -<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="34219">
17588 +<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="34237">
17589 <summary>
17590 Send and receive i18n_input_client packets.
17591 </summary>
17592 @@ -31555,7 +31639,7 @@ Domain allowed access.
17593 </param>
17594 <infoflow type="both" weight="10"/>
17595 </interface>
17596 -<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="34235">
17597 +<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="34253">
17598 <summary>
17599 Do not audit attempts to send and receive i18n_input_client packets.
17600 </summary>
17601 @@ -31566,7 +31650,7 @@ Domain to not audit.
17602 </param>
17603 <infoflow type="none"/>
17604 </interface>
17605 -<interface name="corenet_relabelto_i18n_input_client_packets" lineno="34250">
17606 +<interface name="corenet_relabelto_i18n_input_client_packets" lineno="34268">
17607 <summary>
17608 Relabel packets to i18n_input_client the packet type.
17609 </summary>
17610 @@ -31576,7 +31660,7 @@ Domain allowed access.
17611 </summary>
17612 </param>
17613 </interface>
17614 -<interface name="corenet_send_i18n_input_server_packets" lineno="34270">
17615 +<interface name="corenet_send_i18n_input_server_packets" lineno="34288">
17616 <summary>
17617 Send i18n_input_server packets.
17618 </summary>
17619 @@ -31587,7 +31671,7 @@ Domain allowed access.
17620 </param>
17621 <infoflow type="write" weight="10"/>
17622 </interface>
17623 -<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="34289">
17624 +<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="34307">
17625 <summary>
17626 Do not audit attempts to send i18n_input_server packets.
17627 </summary>
17628 @@ -31598,7 +31682,7 @@ Domain to not audit.
17629 </param>
17630 <infoflow type="none"/>
17631 </interface>
17632 -<interface name="corenet_receive_i18n_input_server_packets" lineno="34308">
17633 +<interface name="corenet_receive_i18n_input_server_packets" lineno="34326">
17634 <summary>
17635 Receive i18n_input_server packets.
17636 </summary>
17637 @@ -31609,7 +31693,7 @@ Domain allowed access.
17638 </param>
17639 <infoflow type="read" weight="10"/>
17640 </interface>
17641 -<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="34327">
17642 +<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="34345">
17643 <summary>
17644 Do not audit attempts to receive i18n_input_server packets.
17645 </summary>
17646 @@ -31620,7 +31704,7 @@ Domain allowed access.
17647 </param>
17648 <infoflow type="none"/>
17649 </interface>
17650 -<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="34346">
17651 +<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="34364">
17652 <summary>
17653 Send and receive i18n_input_server packets.
17654 </summary>
17655 @@ -31631,7 +31715,7 @@ Domain allowed access.
17656 </param>
17657 <infoflow type="both" weight="10"/>
17658 </interface>
17659 -<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="34362">
17660 +<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="34380">
17661 <summary>
17662 Do not audit attempts to send and receive i18n_input_server packets.
17663 </summary>
17664 @@ -31642,7 +31726,7 @@ Domain to not audit.
17665 </param>
17666 <infoflow type="none"/>
17667 </interface>
17668 -<interface name="corenet_relabelto_i18n_input_server_packets" lineno="34377">
17669 +<interface name="corenet_relabelto_i18n_input_server_packets" lineno="34395">
17670 <summary>
17671 Relabel packets to i18n_input_server the packet type.
17672 </summary>
17673 @@ -31652,7 +31736,7 @@ Domain allowed access.
17674 </summary>
17675 </param>
17676 </interface>
17677 -<interface name="corenet_tcp_sendrecv_imaze_port" lineno="34399">
17678 +<interface name="corenet_tcp_sendrecv_imaze_port" lineno="34417">
17679 <summary>
17680 Send and receive TCP traffic on the imaze port.
17681 </summary>
17682 @@ -31663,7 +31747,7 @@ Domain allowed access.
17683 </param>
17684 <infoflow type="both" weight="10"/>
17685 </interface>
17686 -<interface name="corenet_udp_send_imaze_port" lineno="34414">
17687 +<interface name="corenet_udp_send_imaze_port" lineno="34432">
17688 <summary>
17689 Send UDP traffic on the imaze port.
17690 </summary>
17691 @@ -31674,7 +31758,7 @@ Domain allowed access.
17692 </param>
17693 <infoflow type="write" weight="10"/>
17694 </interface>
17695 -<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="34429">
17696 +<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="34447">
17697 <summary>
17698 Do not audit attempts to send UDP traffic on the imaze port.
17699 </summary>
17700 @@ -31685,7 +31769,7 @@ Domain to not audit.
17701 </param>
17702 <infoflow type="none"/>
17703 </interface>
17704 -<interface name="corenet_udp_receive_imaze_port" lineno="34444">
17705 +<interface name="corenet_udp_receive_imaze_port" lineno="34462">
17706 <summary>
17707 Receive UDP traffic on the imaze port.
17708 </summary>
17709 @@ -31696,7 +31780,7 @@ Domain allowed access.
17710 </param>
17711 <infoflow type="read" weight="10"/>
17712 </interface>
17713 -<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="34459">
17714 +<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="34477">
17715 <summary>
17716 Do not audit attempts to receive UDP traffic on the imaze port.
17717 </summary>
17718 @@ -31707,7 +31791,7 @@ Domain to not audit.
17719 </param>
17720 <infoflow type="none"/>
17721 </interface>
17722 -<interface name="corenet_udp_sendrecv_imaze_port" lineno="34474">
17723 +<interface name="corenet_udp_sendrecv_imaze_port" lineno="34492">
17724 <summary>
17725 Send and receive UDP traffic on the imaze port.
17726 </summary>
17727 @@ -31718,7 +31802,7 @@ Domain allowed access.
17728 </param>
17729 <infoflow type="both" weight="10"/>
17730 </interface>
17731 -<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="34490">
17732 +<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="34508">
17733 <summary>
17734 Do not audit attempts to send and receive
17735 UDP traffic on the imaze port.
17736 @@ -31730,7 +31814,7 @@ Domain to not audit.
17737 </param>
17738 <infoflow type="none"/>
17739 </interface>
17740 -<interface name="corenet_tcp_bind_imaze_port" lineno="34505">
17741 +<interface name="corenet_tcp_bind_imaze_port" lineno="34523">
17742 <summary>
17743 Bind TCP sockets to the imaze port.
17744 </summary>
17745 @@ -31741,7 +31825,7 @@ Domain allowed access.
17746 </param>
17747 <infoflow type="none"/>
17748 </interface>
17749 -<interface name="corenet_udp_bind_imaze_port" lineno="34525">
17750 +<interface name="corenet_udp_bind_imaze_port" lineno="34543">
17751 <summary>
17752 Bind UDP sockets to the imaze port.
17753 </summary>
17754 @@ -31752,7 +31836,7 @@ Domain allowed access.
17755 </param>
17756 <infoflow type="none"/>
17757 </interface>
17758 -<interface name="corenet_tcp_connect_imaze_port" lineno="34544">
17759 +<interface name="corenet_tcp_connect_imaze_port" lineno="34562">
17760 <summary>
17761 Make a TCP connection to the imaze port.
17762 </summary>
17763 @@ -31762,7 +31846,7 @@ Domain allowed access.
17764 </summary>
17765 </param>
17766 </interface>
17767 -<interface name="corenet_send_imaze_client_packets" lineno="34564">
17768 +<interface name="corenet_send_imaze_client_packets" lineno="34582">
17769 <summary>
17770 Send imaze_client packets.
17771 </summary>
17772 @@ -31773,7 +31857,7 @@ Domain allowed access.
17773 </param>
17774 <infoflow type="write" weight="10"/>
17775 </interface>
17776 -<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="34583">
17777 +<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="34601">
17778 <summary>
17779 Do not audit attempts to send imaze_client packets.
17780 </summary>
17781 @@ -31784,7 +31868,7 @@ Domain to not audit.
17782 </param>
17783 <infoflow type="none"/>
17784 </interface>
17785 -<interface name="corenet_receive_imaze_client_packets" lineno="34602">
17786 +<interface name="corenet_receive_imaze_client_packets" lineno="34620">
17787 <summary>
17788 Receive imaze_client packets.
17789 </summary>
17790 @@ -31795,7 +31879,7 @@ Domain allowed access.
17791 </param>
17792 <infoflow type="read" weight="10"/>
17793 </interface>
17794 -<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="34621">
17795 +<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="34639">
17796 <summary>
17797 Do not audit attempts to receive imaze_client packets.
17798 </summary>
17799 @@ -31806,7 +31890,7 @@ Domain allowed access.
17800 </param>
17801 <infoflow type="none"/>
17802 </interface>
17803 -<interface name="corenet_sendrecv_imaze_client_packets" lineno="34640">
17804 +<interface name="corenet_sendrecv_imaze_client_packets" lineno="34658">
17805 <summary>
17806 Send and receive imaze_client packets.
17807 </summary>
17808 @@ -31817,7 +31901,7 @@ Domain allowed access.
17809 </param>
17810 <infoflow type="both" weight="10"/>
17811 </interface>
17812 -<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="34656">
17813 +<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="34674">
17814 <summary>
17815 Do not audit attempts to send and receive imaze_client packets.
17816 </summary>
17817 @@ -31828,7 +31912,7 @@ Domain to not audit.
17818 </param>
17819 <infoflow type="none"/>
17820 </interface>
17821 -<interface name="corenet_relabelto_imaze_client_packets" lineno="34671">
17822 +<interface name="corenet_relabelto_imaze_client_packets" lineno="34689">
17823 <summary>
17824 Relabel packets to imaze_client the packet type.
17825 </summary>
17826 @@ -31838,7 +31922,7 @@ Domain allowed access.
17827 </summary>
17828 </param>
17829 </interface>
17830 -<interface name="corenet_send_imaze_server_packets" lineno="34691">
17831 +<interface name="corenet_send_imaze_server_packets" lineno="34709">
17832 <summary>
17833 Send imaze_server packets.
17834 </summary>
17835 @@ -31849,7 +31933,7 @@ Domain allowed access.
17836 </param>
17837 <infoflow type="write" weight="10"/>
17838 </interface>
17839 -<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="34710">
17840 +<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="34728">
17841 <summary>
17842 Do not audit attempts to send imaze_server packets.
17843 </summary>
17844 @@ -31860,7 +31944,7 @@ Domain to not audit.
17845 </param>
17846 <infoflow type="none"/>
17847 </interface>
17848 -<interface name="corenet_receive_imaze_server_packets" lineno="34729">
17849 +<interface name="corenet_receive_imaze_server_packets" lineno="34747">
17850 <summary>
17851 Receive imaze_server packets.
17852 </summary>
17853 @@ -31871,7 +31955,7 @@ Domain allowed access.
17854 </param>
17855 <infoflow type="read" weight="10"/>
17856 </interface>
17857 -<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="34748">
17858 +<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="34766">
17859 <summary>
17860 Do not audit attempts to receive imaze_server packets.
17861 </summary>
17862 @@ -31882,7 +31966,7 @@ Domain allowed access.
17863 </param>
17864 <infoflow type="none"/>
17865 </interface>
17866 -<interface name="corenet_sendrecv_imaze_server_packets" lineno="34767">
17867 +<interface name="corenet_sendrecv_imaze_server_packets" lineno="34785">
17868 <summary>
17869 Send and receive imaze_server packets.
17870 </summary>
17871 @@ -31893,7 +31977,7 @@ Domain allowed access.
17872 </param>
17873 <infoflow type="both" weight="10"/>
17874 </interface>
17875 -<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="34783">
17876 +<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="34801">
17877 <summary>
17878 Do not audit attempts to send and receive imaze_server packets.
17879 </summary>
17880 @@ -31904,7 +31988,7 @@ Domain to not audit.
17881 </param>
17882 <infoflow type="none"/>
17883 </interface>
17884 -<interface name="corenet_relabelto_imaze_server_packets" lineno="34798">
17885 +<interface name="corenet_relabelto_imaze_server_packets" lineno="34816">
17886 <summary>
17887 Relabel packets to imaze_server the packet type.
17888 </summary>
17889 @@ -31914,7 +31998,7 @@ Domain allowed access.
17890 </summary>
17891 </param>
17892 </interface>
17893 -<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="34820">
17894 +<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="34838">
17895 <summary>
17896 Send and receive TCP traffic on the inetd_child port.
17897 </summary>
17898 @@ -31925,7 +32009,7 @@ Domain allowed access.
17899 </param>
17900 <infoflow type="both" weight="10"/>
17901 </interface>
17902 -<interface name="corenet_udp_send_inetd_child_port" lineno="34835">
17903 +<interface name="corenet_udp_send_inetd_child_port" lineno="34853">
17904 <summary>
17905 Send UDP traffic on the inetd_child port.
17906 </summary>
17907 @@ -31936,7 +32020,7 @@ Domain allowed access.
17908 </param>
17909 <infoflow type="write" weight="10"/>
17910 </interface>
17911 -<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="34850">
17912 +<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="34868">
17913 <summary>
17914 Do not audit attempts to send UDP traffic on the inetd_child port.
17915 </summary>
17916 @@ -31947,7 +32031,7 @@ Domain to not audit.
17917 </param>
17918 <infoflow type="none"/>
17919 </interface>
17920 -<interface name="corenet_udp_receive_inetd_child_port" lineno="34865">
17921 +<interface name="corenet_udp_receive_inetd_child_port" lineno="34883">
17922 <summary>
17923 Receive UDP traffic on the inetd_child port.
17924 </summary>
17925 @@ -31958,7 +32042,7 @@ Domain allowed access.
17926 </param>
17927 <infoflow type="read" weight="10"/>
17928 </interface>
17929 -<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="34880">
17930 +<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="34898">
17931 <summary>
17932 Do not audit attempts to receive UDP traffic on the inetd_child port.
17933 </summary>
17934 @@ -31969,7 +32053,7 @@ Domain to not audit.
17935 </param>
17936 <infoflow type="none"/>
17937 </interface>
17938 -<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="34895">
17939 +<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="34913">
17940 <summary>
17941 Send and receive UDP traffic on the inetd_child port.
17942 </summary>
17943 @@ -31980,7 +32064,7 @@ Domain allowed access.
17944 </param>
17945 <infoflow type="both" weight="10"/>
17946 </interface>
17947 -<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="34911">
17948 +<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="34929">
17949 <summary>
17950 Do not audit attempts to send and receive
17951 UDP traffic on the inetd_child port.
17952 @@ -31992,7 +32076,7 @@ Domain to not audit.
17953 </param>
17954 <infoflow type="none"/>
17955 </interface>
17956 -<interface name="corenet_tcp_bind_inetd_child_port" lineno="34926">
17957 +<interface name="corenet_tcp_bind_inetd_child_port" lineno="34944">
17958 <summary>
17959 Bind TCP sockets to the inetd_child port.
17960 </summary>
17961 @@ -32003,7 +32087,7 @@ Domain allowed access.
17962 </param>
17963 <infoflow type="none"/>
17964 </interface>
17965 -<interface name="corenet_udp_bind_inetd_child_port" lineno="34946">
17966 +<interface name="corenet_udp_bind_inetd_child_port" lineno="34964">
17967 <summary>
17968 Bind UDP sockets to the inetd_child port.
17969 </summary>
17970 @@ -32014,7 +32098,7 @@ Domain allowed access.
17971 </param>
17972 <infoflow type="none"/>
17973 </interface>
17974 -<interface name="corenet_tcp_connect_inetd_child_port" lineno="34965">
17975 +<interface name="corenet_tcp_connect_inetd_child_port" lineno="34983">
17976 <summary>
17977 Make a TCP connection to the inetd_child port.
17978 </summary>
17979 @@ -32024,7 +32108,7 @@ Domain allowed access.
17980 </summary>
17981 </param>
17982 </interface>
17983 -<interface name="corenet_send_inetd_child_client_packets" lineno="34985">
17984 +<interface name="corenet_send_inetd_child_client_packets" lineno="35003">
17985 <summary>
17986 Send inetd_child_client packets.
17987 </summary>
17988 @@ -32035,7 +32119,7 @@ Domain allowed access.
17989 </param>
17990 <infoflow type="write" weight="10"/>
17991 </interface>
17992 -<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="35004">
17993 +<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="35022">
17994 <summary>
17995 Do not audit attempts to send inetd_child_client packets.
17996 </summary>
17997 @@ -32046,7 +32130,7 @@ Domain to not audit.
17998 </param>
17999 <infoflow type="none"/>
18000 </interface>
18001 -<interface name="corenet_receive_inetd_child_client_packets" lineno="35023">
18002 +<interface name="corenet_receive_inetd_child_client_packets" lineno="35041">
18003 <summary>
18004 Receive inetd_child_client packets.
18005 </summary>
18006 @@ -32057,7 +32141,7 @@ Domain allowed access.
18007 </param>
18008 <infoflow type="read" weight="10"/>
18009 </interface>
18010 -<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="35042">
18011 +<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="35060">
18012 <summary>
18013 Do not audit attempts to receive inetd_child_client packets.
18014 </summary>
18015 @@ -32068,7 +32152,7 @@ Domain allowed access.
18016 </param>
18017 <infoflow type="none"/>
18018 </interface>
18019 -<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="35061">
18020 +<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="35079">
18021 <summary>
18022 Send and receive inetd_child_client packets.
18023 </summary>
18024 @@ -32079,7 +32163,7 @@ Domain allowed access.
18025 </param>
18026 <infoflow type="both" weight="10"/>
18027 </interface>
18028 -<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="35077">
18029 +<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="35095">
18030 <summary>
18031 Do not audit attempts to send and receive inetd_child_client packets.
18032 </summary>
18033 @@ -32090,7 +32174,7 @@ Domain to not audit.
18034 </param>
18035 <infoflow type="none"/>
18036 </interface>
18037 -<interface name="corenet_relabelto_inetd_child_client_packets" lineno="35092">
18038 +<interface name="corenet_relabelto_inetd_child_client_packets" lineno="35110">
18039 <summary>
18040 Relabel packets to inetd_child_client the packet type.
18041 </summary>
18042 @@ -32100,7 +32184,7 @@ Domain allowed access.
18043 </summary>
18044 </param>
18045 </interface>
18046 -<interface name="corenet_send_inetd_child_server_packets" lineno="35112">
18047 +<interface name="corenet_send_inetd_child_server_packets" lineno="35130">
18048 <summary>
18049 Send inetd_child_server packets.
18050 </summary>
18051 @@ -32111,7 +32195,7 @@ Domain allowed access.
18052 </param>
18053 <infoflow type="write" weight="10"/>
18054 </interface>
18055 -<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="35131">
18056 +<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="35149">
18057 <summary>
18058 Do not audit attempts to send inetd_child_server packets.
18059 </summary>
18060 @@ -32122,7 +32206,7 @@ Domain to not audit.
18061 </param>
18062 <infoflow type="none"/>
18063 </interface>
18064 -<interface name="corenet_receive_inetd_child_server_packets" lineno="35150">
18065 +<interface name="corenet_receive_inetd_child_server_packets" lineno="35168">
18066 <summary>
18067 Receive inetd_child_server packets.
18068 </summary>
18069 @@ -32133,7 +32217,7 @@ Domain allowed access.
18070 </param>
18071 <infoflow type="read" weight="10"/>
18072 </interface>
18073 -<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="35169">
18074 +<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="35187">
18075 <summary>
18076 Do not audit attempts to receive inetd_child_server packets.
18077 </summary>
18078 @@ -32144,7 +32228,7 @@ Domain allowed access.
18079 </param>
18080 <infoflow type="none"/>
18081 </interface>
18082 -<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="35188">
18083 +<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="35206">
18084 <summary>
18085 Send and receive inetd_child_server packets.
18086 </summary>
18087 @@ -32155,7 +32239,7 @@ Domain allowed access.
18088 </param>
18089 <infoflow type="both" weight="10"/>
18090 </interface>
18091 -<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="35204">
18092 +<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="35222">
18093 <summary>
18094 Do not audit attempts to send and receive inetd_child_server packets.
18095 </summary>
18096 @@ -32166,7 +32250,7 @@ Domain to not audit.
18097 </param>
18098 <infoflow type="none"/>
18099 </interface>
18100 -<interface name="corenet_relabelto_inetd_child_server_packets" lineno="35219">
18101 +<interface name="corenet_relabelto_inetd_child_server_packets" lineno="35237">
18102 <summary>
18103 Relabel packets to inetd_child_server the packet type.
18104 </summary>
18105 @@ -32176,7 +32260,7 @@ Domain allowed access.
18106 </summary>
18107 </param>
18108 </interface>
18109 -<interface name="corenet_tcp_sendrecv_innd_port" lineno="35241">
18110 +<interface name="corenet_tcp_sendrecv_innd_port" lineno="35259">
18111 <summary>
18112 Send and receive TCP traffic on the innd port.
18113 </summary>
18114 @@ -32187,7 +32271,7 @@ Domain allowed access.
18115 </param>
18116 <infoflow type="both" weight="10"/>
18117 </interface>
18118 -<interface name="corenet_udp_send_innd_port" lineno="35256">
18119 +<interface name="corenet_udp_send_innd_port" lineno="35274">
18120 <summary>
18121 Send UDP traffic on the innd port.
18122 </summary>
18123 @@ -32198,7 +32282,7 @@ Domain allowed access.
18124 </param>
18125 <infoflow type="write" weight="10"/>
18126 </interface>
18127 -<interface name="corenet_dontaudit_udp_send_innd_port" lineno="35271">
18128 +<interface name="corenet_dontaudit_udp_send_innd_port" lineno="35289">
18129 <summary>
18130 Do not audit attempts to send UDP traffic on the innd port.
18131 </summary>
18132 @@ -32209,7 +32293,7 @@ Domain to not audit.
18133 </param>
18134 <infoflow type="none"/>
18135 </interface>
18136 -<interface name="corenet_udp_receive_innd_port" lineno="35286">
18137 +<interface name="corenet_udp_receive_innd_port" lineno="35304">
18138 <summary>
18139 Receive UDP traffic on the innd port.
18140 </summary>
18141 @@ -32220,7 +32304,7 @@ Domain allowed access.
18142 </param>
18143 <infoflow type="read" weight="10"/>
18144 </interface>
18145 -<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="35301">
18146 +<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="35319">
18147 <summary>
18148 Do not audit attempts to receive UDP traffic on the innd port.
18149 </summary>
18150 @@ -32231,7 +32315,7 @@ Domain to not audit.
18151 </param>
18152 <infoflow type="none"/>
18153 </interface>
18154 -<interface name="corenet_udp_sendrecv_innd_port" lineno="35316">
18155 +<interface name="corenet_udp_sendrecv_innd_port" lineno="35334">
18156 <summary>
18157 Send and receive UDP traffic on the innd port.
18158 </summary>
18159 @@ -32242,7 +32326,7 @@ Domain allowed access.
18160 </param>
18161 <infoflow type="both" weight="10"/>
18162 </interface>
18163 -<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="35332">
18164 +<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="35350">
18165 <summary>
18166 Do not audit attempts to send and receive
18167 UDP traffic on the innd port.
18168 @@ -32254,7 +32338,7 @@ Domain to not audit.
18169 </param>
18170 <infoflow type="none"/>
18171 </interface>
18172 -<interface name="corenet_tcp_bind_innd_port" lineno="35347">
18173 +<interface name="corenet_tcp_bind_innd_port" lineno="35365">
18174 <summary>
18175 Bind TCP sockets to the innd port.
18176 </summary>
18177 @@ -32265,7 +32349,7 @@ Domain allowed access.
18178 </param>
18179 <infoflow type="none"/>
18180 </interface>
18181 -<interface name="corenet_udp_bind_innd_port" lineno="35367">
18182 +<interface name="corenet_udp_bind_innd_port" lineno="35385">
18183 <summary>
18184 Bind UDP sockets to the innd port.
18185 </summary>
18186 @@ -32276,7 +32360,7 @@ Domain allowed access.
18187 </param>
18188 <infoflow type="none"/>
18189 </interface>
18190 -<interface name="corenet_tcp_connect_innd_port" lineno="35386">
18191 +<interface name="corenet_tcp_connect_innd_port" lineno="35404">
18192 <summary>
18193 Make a TCP connection to the innd port.
18194 </summary>
18195 @@ -32286,7 +32370,7 @@ Domain allowed access.
18196 </summary>
18197 </param>
18198 </interface>
18199 -<interface name="corenet_send_innd_client_packets" lineno="35406">
18200 +<interface name="corenet_send_innd_client_packets" lineno="35424">
18201 <summary>
18202 Send innd_client packets.
18203 </summary>
18204 @@ -32297,7 +32381,7 @@ Domain allowed access.
18205 </param>
18206 <infoflow type="write" weight="10"/>
18207 </interface>
18208 -<interface name="corenet_dontaudit_send_innd_client_packets" lineno="35425">
18209 +<interface name="corenet_dontaudit_send_innd_client_packets" lineno="35443">
18210 <summary>
18211 Do not audit attempts to send innd_client packets.
18212 </summary>
18213 @@ -32308,7 +32392,7 @@ Domain to not audit.
18214 </param>
18215 <infoflow type="none"/>
18216 </interface>
18217 -<interface name="corenet_receive_innd_client_packets" lineno="35444">
18218 +<interface name="corenet_receive_innd_client_packets" lineno="35462">
18219 <summary>
18220 Receive innd_client packets.
18221 </summary>
18222 @@ -32319,7 +32403,7 @@ Domain allowed access.
18223 </param>
18224 <infoflow type="read" weight="10"/>
18225 </interface>
18226 -<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="35463">
18227 +<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="35481">
18228 <summary>
18229 Do not audit attempts to receive innd_client packets.
18230 </summary>
18231 @@ -32330,7 +32414,7 @@ Domain allowed access.
18232 </param>
18233 <infoflow type="none"/>
18234 </interface>
18235 -<interface name="corenet_sendrecv_innd_client_packets" lineno="35482">
18236 +<interface name="corenet_sendrecv_innd_client_packets" lineno="35500">
18237 <summary>
18238 Send and receive innd_client packets.
18239 </summary>
18240 @@ -32341,7 +32425,7 @@ Domain allowed access.
18241 </param>
18242 <infoflow type="both" weight="10"/>
18243 </interface>
18244 -<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="35498">
18245 +<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="35516">
18246 <summary>
18247 Do not audit attempts to send and receive innd_client packets.
18248 </summary>
18249 @@ -32352,7 +32436,7 @@ Domain to not audit.
18250 </param>
18251 <infoflow type="none"/>
18252 </interface>
18253 -<interface name="corenet_relabelto_innd_client_packets" lineno="35513">
18254 +<interface name="corenet_relabelto_innd_client_packets" lineno="35531">
18255 <summary>
18256 Relabel packets to innd_client the packet type.
18257 </summary>
18258 @@ -32362,7 +32446,7 @@ Domain allowed access.
18259 </summary>
18260 </param>
18261 </interface>
18262 -<interface name="corenet_send_innd_server_packets" lineno="35533">
18263 +<interface name="corenet_send_innd_server_packets" lineno="35551">
18264 <summary>
18265 Send innd_server packets.
18266 </summary>
18267 @@ -32373,7 +32457,7 @@ Domain allowed access.
18268 </param>
18269 <infoflow type="write" weight="10"/>
18270 </interface>
18271 -<interface name="corenet_dontaudit_send_innd_server_packets" lineno="35552">
18272 +<interface name="corenet_dontaudit_send_innd_server_packets" lineno="35570">
18273 <summary>
18274 Do not audit attempts to send innd_server packets.
18275 </summary>
18276 @@ -32384,7 +32468,7 @@ Domain to not audit.
18277 </param>
18278 <infoflow type="none"/>
18279 </interface>
18280 -<interface name="corenet_receive_innd_server_packets" lineno="35571">
18281 +<interface name="corenet_receive_innd_server_packets" lineno="35589">
18282 <summary>
18283 Receive innd_server packets.
18284 </summary>
18285 @@ -32395,7 +32479,7 @@ Domain allowed access.
18286 </param>
18287 <infoflow type="read" weight="10"/>
18288 </interface>
18289 -<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="35590">
18290 +<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="35608">
18291 <summary>
18292 Do not audit attempts to receive innd_server packets.
18293 </summary>
18294 @@ -32406,7 +32490,7 @@ Domain allowed access.
18295 </param>
18296 <infoflow type="none"/>
18297 </interface>
18298 -<interface name="corenet_sendrecv_innd_server_packets" lineno="35609">
18299 +<interface name="corenet_sendrecv_innd_server_packets" lineno="35627">
18300 <summary>
18301 Send and receive innd_server packets.
18302 </summary>
18303 @@ -32417,7 +32501,7 @@ Domain allowed access.
18304 </param>
18305 <infoflow type="both" weight="10"/>
18306 </interface>
18307 -<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="35625">
18308 +<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="35643">
18309 <summary>
18310 Do not audit attempts to send and receive innd_server packets.
18311 </summary>
18312 @@ -32428,7 +32512,7 @@ Domain to not audit.
18313 </param>
18314 <infoflow type="none"/>
18315 </interface>
18316 -<interface name="corenet_relabelto_innd_server_packets" lineno="35640">
18317 +<interface name="corenet_relabelto_innd_server_packets" lineno="35658">
18318 <summary>
18319 Relabel packets to innd_server the packet type.
18320 </summary>
18321 @@ -32438,7 +32522,7 @@ Domain allowed access.
18322 </summary>
18323 </param>
18324 </interface>
18325 -<interface name="corenet_tcp_sendrecv_interwise_port" lineno="35662">
18326 +<interface name="corenet_tcp_sendrecv_interwise_port" lineno="35680">
18327 <summary>
18328 Send and receive TCP traffic on the interwise port.
18329 </summary>
18330 @@ -32449,7 +32533,7 @@ Domain allowed access.
18331 </param>
18332 <infoflow type="both" weight="10"/>
18333 </interface>
18334 -<interface name="corenet_udp_send_interwise_port" lineno="35677">
18335 +<interface name="corenet_udp_send_interwise_port" lineno="35695">
18336 <summary>
18337 Send UDP traffic on the interwise port.
18338 </summary>
18339 @@ -32460,7 +32544,7 @@ Domain allowed access.
18340 </param>
18341 <infoflow type="write" weight="10"/>
18342 </interface>
18343 -<interface name="corenet_dontaudit_udp_send_interwise_port" lineno="35692">
18344 +<interface name="corenet_dontaudit_udp_send_interwise_port" lineno="35710">
18345 <summary>
18346 Do not audit attempts to send UDP traffic on the interwise port.
18347 </summary>
18348 @@ -32471,7 +32555,7 @@ Domain to not audit.
18349 </param>
18350 <infoflow type="none"/>
18351 </interface>
18352 -<interface name="corenet_udp_receive_interwise_port" lineno="35707">
18353 +<interface name="corenet_udp_receive_interwise_port" lineno="35725">
18354 <summary>
18355 Receive UDP traffic on the interwise port.
18356 </summary>
18357 @@ -32482,7 +32566,7 @@ Domain allowed access.
18358 </param>
18359 <infoflow type="read" weight="10"/>
18360 </interface>
18361 -<interface name="corenet_dontaudit_udp_receive_interwise_port" lineno="35722">
18362 +<interface name="corenet_dontaudit_udp_receive_interwise_port" lineno="35740">
18363 <summary>
18364 Do not audit attempts to receive UDP traffic on the interwise port.
18365 </summary>
18366 @@ -32493,7 +32577,7 @@ Domain to not audit.
18367 </param>
18368 <infoflow type="none"/>
18369 </interface>
18370 -<interface name="corenet_udp_sendrecv_interwise_port" lineno="35737">
18371 +<interface name="corenet_udp_sendrecv_interwise_port" lineno="35755">
18372 <summary>
18373 Send and receive UDP traffic on the interwise port.
18374 </summary>
18375 @@ -32504,7 +32588,7 @@ Domain allowed access.
18376 </param>
18377 <infoflow type="both" weight="10"/>
18378 </interface>
18379 -<interface name="corenet_dontaudit_udp_sendrecv_interwise_port" lineno="35753">
18380 +<interface name="corenet_dontaudit_udp_sendrecv_interwise_port" lineno="35771">
18381 <summary>
18382 Do not audit attempts to send and receive
18383 UDP traffic on the interwise port.
18384 @@ -32516,7 +32600,7 @@ Domain to not audit.
18385 </param>
18386 <infoflow type="none"/>
18387 </interface>
18388 -<interface name="corenet_tcp_bind_interwise_port" lineno="35768">
18389 +<interface name="corenet_tcp_bind_interwise_port" lineno="35786">
18390 <summary>
18391 Bind TCP sockets to the interwise port.
18392 </summary>
18393 @@ -32527,7 +32611,7 @@ Domain allowed access.
18394 </param>
18395 <infoflow type="none"/>
18396 </interface>
18397 -<interface name="corenet_udp_bind_interwise_port" lineno="35788">
18398 +<interface name="corenet_udp_bind_interwise_port" lineno="35806">
18399 <summary>
18400 Bind UDP sockets to the interwise port.
18401 </summary>
18402 @@ -32538,7 +32622,7 @@ Domain allowed access.
18403 </param>
18404 <infoflow type="none"/>
18405 </interface>
18406 -<interface name="corenet_tcp_connect_interwise_port" lineno="35807">
18407 +<interface name="corenet_tcp_connect_interwise_port" lineno="35825">
18408 <summary>
18409 Make a TCP connection to the interwise port.
18410 </summary>
18411 @@ -32548,7 +32632,7 @@ Domain allowed access.
18412 </summary>
18413 </param>
18414 </interface>
18415 -<interface name="corenet_send_interwise_client_packets" lineno="35827">
18416 +<interface name="corenet_send_interwise_client_packets" lineno="35845">
18417 <summary>
18418 Send interwise_client packets.
18419 </summary>
18420 @@ -32559,7 +32643,7 @@ Domain allowed access.
18421 </param>
18422 <infoflow type="write" weight="10"/>
18423 </interface>
18424 -<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="35846">
18425 +<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="35864">
18426 <summary>
18427 Do not audit attempts to send interwise_client packets.
18428 </summary>
18429 @@ -32570,7 +32654,7 @@ Domain to not audit.
18430 </param>
18431 <infoflow type="none"/>
18432 </interface>
18433 -<interface name="corenet_receive_interwise_client_packets" lineno="35865">
18434 +<interface name="corenet_receive_interwise_client_packets" lineno="35883">
18435 <summary>
18436 Receive interwise_client packets.
18437 </summary>
18438 @@ -32581,7 +32665,7 @@ Domain allowed access.
18439 </param>
18440 <infoflow type="read" weight="10"/>
18441 </interface>
18442 -<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="35884">
18443 +<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="35902">
18444 <summary>
18445 Do not audit attempts to receive interwise_client packets.
18446 </summary>
18447 @@ -32592,7 +32676,7 @@ Domain allowed access.
18448 </param>
18449 <infoflow type="none"/>
18450 </interface>
18451 -<interface name="corenet_sendrecv_interwise_client_packets" lineno="35903">
18452 +<interface name="corenet_sendrecv_interwise_client_packets" lineno="35921">
18453 <summary>
18454 Send and receive interwise_client packets.
18455 </summary>
18456 @@ -32603,7 +32687,7 @@ Domain allowed access.
18457 </param>
18458 <infoflow type="both" weight="10"/>
18459 </interface>
18460 -<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="35919">
18461 +<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="35937">
18462 <summary>
18463 Do not audit attempts to send and receive interwise_client packets.
18464 </summary>
18465 @@ -32614,7 +32698,7 @@ Domain to not audit.
18466 </param>
18467 <infoflow type="none"/>
18468 </interface>
18469 -<interface name="corenet_relabelto_interwise_client_packets" lineno="35934">
18470 +<interface name="corenet_relabelto_interwise_client_packets" lineno="35952">
18471 <summary>
18472 Relabel packets to interwise_client the packet type.
18473 </summary>
18474 @@ -32624,7 +32708,7 @@ Domain allowed access.
18475 </summary>
18476 </param>
18477 </interface>
18478 -<interface name="corenet_send_interwise_server_packets" lineno="35954">
18479 +<interface name="corenet_send_interwise_server_packets" lineno="35972">
18480 <summary>
18481 Send interwise_server packets.
18482 </summary>
18483 @@ -32635,7 +32719,7 @@ Domain allowed access.
18484 </param>
18485 <infoflow type="write" weight="10"/>
18486 </interface>
18487 -<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="35973">
18488 +<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="35991">
18489 <summary>
18490 Do not audit attempts to send interwise_server packets.
18491 </summary>
18492 @@ -32646,7 +32730,7 @@ Domain to not audit.
18493 </param>
18494 <infoflow type="none"/>
18495 </interface>
18496 -<interface name="corenet_receive_interwise_server_packets" lineno="35992">
18497 +<interface name="corenet_receive_interwise_server_packets" lineno="36010">
18498 <summary>
18499 Receive interwise_server packets.
18500 </summary>
18501 @@ -32657,7 +32741,7 @@ Domain allowed access.
18502 </param>
18503 <infoflow type="read" weight="10"/>
18504 </interface>
18505 -<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="36011">
18506 +<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="36029">
18507 <summary>
18508 Do not audit attempts to receive interwise_server packets.
18509 </summary>
18510 @@ -32668,7 +32752,7 @@ Domain allowed access.
18511 </param>
18512 <infoflow type="none"/>
18513 </interface>
18514 -<interface name="corenet_sendrecv_interwise_server_packets" lineno="36030">
18515 +<interface name="corenet_sendrecv_interwise_server_packets" lineno="36048">
18516 <summary>
18517 Send and receive interwise_server packets.
18518 </summary>
18519 @@ -32679,7 +32763,7 @@ Domain allowed access.
18520 </param>
18521 <infoflow type="both" weight="10"/>
18522 </interface>
18523 -<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="36046">
18524 +<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="36064">
18525 <summary>
18526 Do not audit attempts to send and receive interwise_server packets.
18527 </summary>
18528 @@ -32690,7 +32774,7 @@ Domain to not audit.
18529 </param>
18530 <infoflow type="none"/>
18531 </interface>
18532 -<interface name="corenet_relabelto_interwise_server_packets" lineno="36061">
18533 +<interface name="corenet_relabelto_interwise_server_packets" lineno="36079">
18534 <summary>
18535 Relabel packets to interwise_server the packet type.
18536 </summary>
18537 @@ -32700,7 +32784,7 @@ Domain allowed access.
18538 </summary>
18539 </param>
18540 </interface>
18541 -<interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="36083">
18542 +<interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="36101">
18543 <summary>
18544 Send and receive TCP traffic on the ionixnetmon port.
18545 </summary>
18546 @@ -32711,7 +32795,7 @@ Domain allowed access.
18547 </param>
18548 <infoflow type="both" weight="10"/>
18549 </interface>
18550 -<interface name="corenet_udp_send_ionixnetmon_port" lineno="36098">
18551 +<interface name="corenet_udp_send_ionixnetmon_port" lineno="36116">
18552 <summary>
18553 Send UDP traffic on the ionixnetmon port.
18554 </summary>
18555 @@ -32722,7 +32806,7 @@ Domain allowed access.
18556 </param>
18557 <infoflow type="write" weight="10"/>
18558 </interface>
18559 -<interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="36113">
18560 +<interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="36131">
18561 <summary>
18562 Do not audit attempts to send UDP traffic on the ionixnetmon port.
18563 </summary>
18564 @@ -32733,7 +32817,7 @@ Domain to not audit.
18565 </param>
18566 <infoflow type="none"/>
18567 </interface>
18568 -<interface name="corenet_udp_receive_ionixnetmon_port" lineno="36128">
18569 +<interface name="corenet_udp_receive_ionixnetmon_port" lineno="36146">
18570 <summary>
18571 Receive UDP traffic on the ionixnetmon port.
18572 </summary>
18573 @@ -32744,7 +32828,7 @@ Domain allowed access.
18574 </param>
18575 <infoflow type="read" weight="10"/>
18576 </interface>
18577 -<interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="36143">
18578 +<interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="36161">
18579 <summary>
18580 Do not audit attempts to receive UDP traffic on the ionixnetmon port.
18581 </summary>
18582 @@ -32755,7 +32839,7 @@ Domain to not audit.
18583 </param>
18584 <infoflow type="none"/>
18585 </interface>
18586 -<interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="36158">
18587 +<interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="36176">
18588 <summary>
18589 Send and receive UDP traffic on the ionixnetmon port.
18590 </summary>
18591 @@ -32766,7 +32850,7 @@ Domain allowed access.
18592 </param>
18593 <infoflow type="both" weight="10"/>
18594 </interface>
18595 -<interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="36174">
18596 +<interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="36192">
18597 <summary>
18598 Do not audit attempts to send and receive
18599 UDP traffic on the ionixnetmon port.
18600 @@ -32778,7 +32862,7 @@ Domain to not audit.
18601 </param>
18602 <infoflow type="none"/>
18603 </interface>
18604 -<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="36189">
18605 +<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="36207">
18606 <summary>
18607 Bind TCP sockets to the ionixnetmon port.
18608 </summary>
18609 @@ -32789,7 +32873,7 @@ Domain allowed access.
18610 </param>
18611 <infoflow type="none"/>
18612 </interface>
18613 -<interface name="corenet_udp_bind_ionixnetmon_port" lineno="36209">
18614 +<interface name="corenet_udp_bind_ionixnetmon_port" lineno="36227">
18615 <summary>
18616 Bind UDP sockets to the ionixnetmon port.
18617 </summary>
18618 @@ -32800,7 +32884,7 @@ Domain allowed access.
18619 </param>
18620 <infoflow type="none"/>
18621 </interface>
18622 -<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="36228">
18623 +<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="36246">
18624 <summary>
18625 Make a TCP connection to the ionixnetmon port.
18626 </summary>
18627 @@ -32810,7 +32894,7 @@ Domain allowed access.
18628 </summary>
18629 </param>
18630 </interface>
18631 -<interface name="corenet_send_ionixnetmon_client_packets" lineno="36248">
18632 +<interface name="corenet_send_ionixnetmon_client_packets" lineno="36266">
18633 <summary>
18634 Send ionixnetmon_client packets.
18635 </summary>
18636 @@ -32821,7 +32905,7 @@ Domain allowed access.
18637 </param>
18638 <infoflow type="write" weight="10"/>
18639 </interface>
18640 -<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="36267">
18641 +<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="36285">
18642 <summary>
18643 Do not audit attempts to send ionixnetmon_client packets.
18644 </summary>
18645 @@ -32832,7 +32916,7 @@ Domain to not audit.
18646 </param>
18647 <infoflow type="none"/>
18648 </interface>
18649 -<interface name="corenet_receive_ionixnetmon_client_packets" lineno="36286">
18650 +<interface name="corenet_receive_ionixnetmon_client_packets" lineno="36304">
18651 <summary>
18652 Receive ionixnetmon_client packets.
18653 </summary>
18654 @@ -32843,7 +32927,7 @@ Domain allowed access.
18655 </param>
18656 <infoflow type="read" weight="10"/>
18657 </interface>
18658 -<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="36305">
18659 +<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="36323">
18660 <summary>
18661 Do not audit attempts to receive ionixnetmon_client packets.
18662 </summary>
18663 @@ -32854,7 +32938,7 @@ Domain allowed access.
18664 </param>
18665 <infoflow type="none"/>
18666 </interface>
18667 -<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="36324">
18668 +<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="36342">
18669 <summary>
18670 Send and receive ionixnetmon_client packets.
18671 </summary>
18672 @@ -32865,7 +32949,7 @@ Domain allowed access.
18673 </param>
18674 <infoflow type="both" weight="10"/>
18675 </interface>
18676 -<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="36340">
18677 +<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="36358">
18678 <summary>
18679 Do not audit attempts to send and receive ionixnetmon_client packets.
18680 </summary>
18681 @@ -32876,7 +32960,7 @@ Domain to not audit.
18682 </param>
18683 <infoflow type="none"/>
18684 </interface>
18685 -<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="36355">
18686 +<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="36373">
18687 <summary>
18688 Relabel packets to ionixnetmon_client the packet type.
18689 </summary>
18690 @@ -32886,7 +32970,7 @@ Domain allowed access.
18691 </summary>
18692 </param>
18693 </interface>
18694 -<interface name="corenet_send_ionixnetmon_server_packets" lineno="36375">
18695 +<interface name="corenet_send_ionixnetmon_server_packets" lineno="36393">
18696 <summary>
18697 Send ionixnetmon_server packets.
18698 </summary>
18699 @@ -32897,7 +32981,7 @@ Domain allowed access.
18700 </param>
18701 <infoflow type="write" weight="10"/>
18702 </interface>
18703 -<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="36394">
18704 +<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="36412">
18705 <summary>
18706 Do not audit attempts to send ionixnetmon_server packets.
18707 </summary>
18708 @@ -32908,7 +32992,7 @@ Domain to not audit.
18709 </param>
18710 <infoflow type="none"/>
18711 </interface>
18712 -<interface name="corenet_receive_ionixnetmon_server_packets" lineno="36413">
18713 +<interface name="corenet_receive_ionixnetmon_server_packets" lineno="36431">
18714 <summary>
18715 Receive ionixnetmon_server packets.
18716 </summary>
18717 @@ -32919,7 +33003,7 @@ Domain allowed access.
18718 </param>
18719 <infoflow type="read" weight="10"/>
18720 </interface>
18721 -<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="36432">
18722 +<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="36450">
18723 <summary>
18724 Do not audit attempts to receive ionixnetmon_server packets.
18725 </summary>
18726 @@ -32930,7 +33014,7 @@ Domain allowed access.
18727 </param>
18728 <infoflow type="none"/>
18729 </interface>
18730 -<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="36451">
18731 +<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="36469">
18732 <summary>
18733 Send and receive ionixnetmon_server packets.
18734 </summary>
18735 @@ -32941,7 +33025,7 @@ Domain allowed access.
18736 </param>
18737 <infoflow type="both" weight="10"/>
18738 </interface>
18739 -<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="36467">
18740 +<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="36485">
18741 <summary>
18742 Do not audit attempts to send and receive ionixnetmon_server packets.
18743 </summary>
18744 @@ -32952,7 +33036,7 @@ Domain to not audit.
18745 </param>
18746 <infoflow type="none"/>
18747 </interface>
18748 -<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="36482">
18749 +<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="36500">
18750 <summary>
18751 Relabel packets to ionixnetmon_server the packet type.
18752 </summary>
18753 @@ -32962,7 +33046,7 @@ Domain allowed access.
18754 </summary>
18755 </param>
18756 </interface>
18757 -<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="36504">
18758 +<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="36522">
18759 <summary>
18760 Send and receive TCP traffic on the ipmi port.
18761 </summary>
18762 @@ -32973,7 +33057,7 @@ Domain allowed access.
18763 </param>
18764 <infoflow type="both" weight="10"/>
18765 </interface>
18766 -<interface name="corenet_udp_send_ipmi_port" lineno="36519">
18767 +<interface name="corenet_udp_send_ipmi_port" lineno="36537">
18768 <summary>
18769 Send UDP traffic on the ipmi port.
18770 </summary>
18771 @@ -32984,7 +33068,7 @@ Domain allowed access.
18772 </param>
18773 <infoflow type="write" weight="10"/>
18774 </interface>
18775 -<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="36534">
18776 +<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="36552">
18777 <summary>
18778 Do not audit attempts to send UDP traffic on the ipmi port.
18779 </summary>
18780 @@ -32995,7 +33079,7 @@ Domain to not audit.
18781 </param>
18782 <infoflow type="none"/>
18783 </interface>
18784 -<interface name="corenet_udp_receive_ipmi_port" lineno="36549">
18785 +<interface name="corenet_udp_receive_ipmi_port" lineno="36567">
18786 <summary>
18787 Receive UDP traffic on the ipmi port.
18788 </summary>
18789 @@ -33006,7 +33090,7 @@ Domain allowed access.
18790 </param>
18791 <infoflow type="read" weight="10"/>
18792 </interface>
18793 -<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="36564">
18794 +<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="36582">
18795 <summary>
18796 Do not audit attempts to receive UDP traffic on the ipmi port.
18797 </summary>
18798 @@ -33017,7 +33101,7 @@ Domain to not audit.
18799 </param>
18800 <infoflow type="none"/>
18801 </interface>
18802 -<interface name="corenet_udp_sendrecv_ipmi_port" lineno="36579">
18803 +<interface name="corenet_udp_sendrecv_ipmi_port" lineno="36597">
18804 <summary>
18805 Send and receive UDP traffic on the ipmi port.
18806 </summary>
18807 @@ -33028,7 +33112,7 @@ Domain allowed access.
18808 </param>
18809 <infoflow type="both" weight="10"/>
18810 </interface>
18811 -<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="36595">
18812 +<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="36613">
18813 <summary>
18814 Do not audit attempts to send and receive
18815 UDP traffic on the ipmi port.
18816 @@ -33040,7 +33124,7 @@ Domain to not audit.
18817 </param>
18818 <infoflow type="none"/>
18819 </interface>
18820 -<interface name="corenet_tcp_bind_ipmi_port" lineno="36610">
18821 +<interface name="corenet_tcp_bind_ipmi_port" lineno="36628">
18822 <summary>
18823 Bind TCP sockets to the ipmi port.
18824 </summary>
18825 @@ -33051,7 +33135,7 @@ Domain allowed access.
18826 </param>
18827 <infoflow type="none"/>
18828 </interface>
18829 -<interface name="corenet_udp_bind_ipmi_port" lineno="36630">
18830 +<interface name="corenet_udp_bind_ipmi_port" lineno="36648">
18831 <summary>
18832 Bind UDP sockets to the ipmi port.
18833 </summary>
18834 @@ -33062,7 +33146,7 @@ Domain allowed access.
18835 </param>
18836 <infoflow type="none"/>
18837 </interface>
18838 -<interface name="corenet_tcp_connect_ipmi_port" lineno="36649">
18839 +<interface name="corenet_tcp_connect_ipmi_port" lineno="36667">
18840 <summary>
18841 Make a TCP connection to the ipmi port.
18842 </summary>
18843 @@ -33072,7 +33156,7 @@ Domain allowed access.
18844 </summary>
18845 </param>
18846 </interface>
18847 -<interface name="corenet_send_ipmi_client_packets" lineno="36669">
18848 +<interface name="corenet_send_ipmi_client_packets" lineno="36687">
18849 <summary>
18850 Send ipmi_client packets.
18851 </summary>
18852 @@ -33083,7 +33167,7 @@ Domain allowed access.
18853 </param>
18854 <infoflow type="write" weight="10"/>
18855 </interface>
18856 -<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="36688">
18857 +<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="36706">
18858 <summary>
18859 Do not audit attempts to send ipmi_client packets.
18860 </summary>
18861 @@ -33094,7 +33178,7 @@ Domain to not audit.
18862 </param>
18863 <infoflow type="none"/>
18864 </interface>
18865 -<interface name="corenet_receive_ipmi_client_packets" lineno="36707">
18866 +<interface name="corenet_receive_ipmi_client_packets" lineno="36725">
18867 <summary>
18868 Receive ipmi_client packets.
18869 </summary>
18870 @@ -33105,7 +33189,7 @@ Domain allowed access.
18871 </param>
18872 <infoflow type="read" weight="10"/>
18873 </interface>
18874 -<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="36726">
18875 +<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="36744">
18876 <summary>
18877 Do not audit attempts to receive ipmi_client packets.
18878 </summary>
18879 @@ -33116,7 +33200,7 @@ Domain allowed access.
18880 </param>
18881 <infoflow type="none"/>
18882 </interface>
18883 -<interface name="corenet_sendrecv_ipmi_client_packets" lineno="36745">
18884 +<interface name="corenet_sendrecv_ipmi_client_packets" lineno="36763">
18885 <summary>
18886 Send and receive ipmi_client packets.
18887 </summary>
18888 @@ -33127,7 +33211,7 @@ Domain allowed access.
18889 </param>
18890 <infoflow type="both" weight="10"/>
18891 </interface>
18892 -<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="36761">
18893 +<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="36779">
18894 <summary>
18895 Do not audit attempts to send and receive ipmi_client packets.
18896 </summary>
18897 @@ -33138,7 +33222,7 @@ Domain to not audit.
18898 </param>
18899 <infoflow type="none"/>
18900 </interface>
18901 -<interface name="corenet_relabelto_ipmi_client_packets" lineno="36776">
18902 +<interface name="corenet_relabelto_ipmi_client_packets" lineno="36794">
18903 <summary>
18904 Relabel packets to ipmi_client the packet type.
18905 </summary>
18906 @@ -33148,7 +33232,7 @@ Domain allowed access.
18907 </summary>
18908 </param>
18909 </interface>
18910 -<interface name="corenet_send_ipmi_server_packets" lineno="36796">
18911 +<interface name="corenet_send_ipmi_server_packets" lineno="36814">
18912 <summary>
18913 Send ipmi_server packets.
18914 </summary>
18915 @@ -33159,7 +33243,7 @@ Domain allowed access.
18916 </param>
18917 <infoflow type="write" weight="10"/>
18918 </interface>
18919 -<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="36815">
18920 +<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="36833">
18921 <summary>
18922 Do not audit attempts to send ipmi_server packets.
18923 </summary>
18924 @@ -33170,7 +33254,7 @@ Domain to not audit.
18925 </param>
18926 <infoflow type="none"/>
18927 </interface>
18928 -<interface name="corenet_receive_ipmi_server_packets" lineno="36834">
18929 +<interface name="corenet_receive_ipmi_server_packets" lineno="36852">
18930 <summary>
18931 Receive ipmi_server packets.
18932 </summary>
18933 @@ -33181,7 +33265,7 @@ Domain allowed access.
18934 </param>
18935 <infoflow type="read" weight="10"/>
18936 </interface>
18937 -<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="36853">
18938 +<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="36871">
18939 <summary>
18940 Do not audit attempts to receive ipmi_server packets.
18941 </summary>
18942 @@ -33192,7 +33276,7 @@ Domain allowed access.
18943 </param>
18944 <infoflow type="none"/>
18945 </interface>
18946 -<interface name="corenet_sendrecv_ipmi_server_packets" lineno="36872">
18947 +<interface name="corenet_sendrecv_ipmi_server_packets" lineno="36890">
18948 <summary>
18949 Send and receive ipmi_server packets.
18950 </summary>
18951 @@ -33203,7 +33287,7 @@ Domain allowed access.
18952 </param>
18953 <infoflow type="both" weight="10"/>
18954 </interface>
18955 -<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="36888">
18956 +<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="36906">
18957 <summary>
18958 Do not audit attempts to send and receive ipmi_server packets.
18959 </summary>
18960 @@ -33214,7 +33298,7 @@ Domain to not audit.
18961 </param>
18962 <infoflow type="none"/>
18963 </interface>
18964 -<interface name="corenet_relabelto_ipmi_server_packets" lineno="36903">
18965 +<interface name="corenet_relabelto_ipmi_server_packets" lineno="36921">
18966 <summary>
18967 Relabel packets to ipmi_server the packet type.
18968 </summary>
18969 @@ -33224,7 +33308,7 @@ Domain allowed access.
18970 </summary>
18971 </param>
18972 </interface>
18973 -<interface name="corenet_tcp_sendrecv_ipp_port" lineno="36925">
18974 +<interface name="corenet_tcp_sendrecv_ipp_port" lineno="36943">
18975 <summary>
18976 Send and receive TCP traffic on the ipp port.
18977 </summary>
18978 @@ -33235,7 +33319,7 @@ Domain allowed access.
18979 </param>
18980 <infoflow type="both" weight="10"/>
18981 </interface>
18982 -<interface name="corenet_udp_send_ipp_port" lineno="36940">
18983 +<interface name="corenet_udp_send_ipp_port" lineno="36958">
18984 <summary>
18985 Send UDP traffic on the ipp port.
18986 </summary>
18987 @@ -33246,7 +33330,7 @@ Domain allowed access.
18988 </param>
18989 <infoflow type="write" weight="10"/>
18990 </interface>
18991 -<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="36955">
18992 +<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="36973">
18993 <summary>
18994 Do not audit attempts to send UDP traffic on the ipp port.
18995 </summary>
18996 @@ -33257,7 +33341,7 @@ Domain to not audit.
18997 </param>
18998 <infoflow type="none"/>
18999 </interface>
19000 -<interface name="corenet_udp_receive_ipp_port" lineno="36970">
19001 +<interface name="corenet_udp_receive_ipp_port" lineno="36988">
19002 <summary>
19003 Receive UDP traffic on the ipp port.
19004 </summary>
19005 @@ -33268,7 +33352,7 @@ Domain allowed access.
19006 </param>
19007 <infoflow type="read" weight="10"/>
19008 </interface>
19009 -<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="36985">
19010 +<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="37003">
19011 <summary>
19012 Do not audit attempts to receive UDP traffic on the ipp port.
19013 </summary>
19014 @@ -33279,7 +33363,7 @@ Domain to not audit.
19015 </param>
19016 <infoflow type="none"/>
19017 </interface>
19018 -<interface name="corenet_udp_sendrecv_ipp_port" lineno="37000">
19019 +<interface name="corenet_udp_sendrecv_ipp_port" lineno="37018">
19020 <summary>
19021 Send and receive UDP traffic on the ipp port.
19022 </summary>
19023 @@ -33290,7 +33374,7 @@ Domain allowed access.
19024 </param>
19025 <infoflow type="both" weight="10"/>
19026 </interface>
19027 -<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="37016">
19028 +<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="37034">
19029 <summary>
19030 Do not audit attempts to send and receive
19031 UDP traffic on the ipp port.
19032 @@ -33302,7 +33386,7 @@ Domain to not audit.
19033 </param>
19034 <infoflow type="none"/>
19035 </interface>
19036 -<interface name="corenet_tcp_bind_ipp_port" lineno="37031">
19037 +<interface name="corenet_tcp_bind_ipp_port" lineno="37049">
19038 <summary>
19039 Bind TCP sockets to the ipp port.
19040 </summary>
19041 @@ -33313,7 +33397,7 @@ Domain allowed access.
19042 </param>
19043 <infoflow type="none"/>
19044 </interface>
19045 -<interface name="corenet_udp_bind_ipp_port" lineno="37051">
19046 +<interface name="corenet_udp_bind_ipp_port" lineno="37069">
19047 <summary>
19048 Bind UDP sockets to the ipp port.
19049 </summary>
19050 @@ -33324,7 +33408,7 @@ Domain allowed access.
19051 </param>
19052 <infoflow type="none"/>
19053 </interface>
19054 -<interface name="corenet_tcp_connect_ipp_port" lineno="37070">
19055 +<interface name="corenet_tcp_connect_ipp_port" lineno="37088">
19056 <summary>
19057 Make a TCP connection to the ipp port.
19058 </summary>
19059 @@ -33334,7 +33418,7 @@ Domain allowed access.
19060 </summary>
19061 </param>
19062 </interface>
19063 -<interface name="corenet_send_ipp_client_packets" lineno="37090">
19064 +<interface name="corenet_send_ipp_client_packets" lineno="37108">
19065 <summary>
19066 Send ipp_client packets.
19067 </summary>
19068 @@ -33345,7 +33429,7 @@ Domain allowed access.
19069 </param>
19070 <infoflow type="write" weight="10"/>
19071 </interface>
19072 -<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="37109">
19073 +<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="37127">
19074 <summary>
19075 Do not audit attempts to send ipp_client packets.
19076 </summary>
19077 @@ -33356,7 +33440,7 @@ Domain to not audit.
19078 </param>
19079 <infoflow type="none"/>
19080 </interface>
19081 -<interface name="corenet_receive_ipp_client_packets" lineno="37128">
19082 +<interface name="corenet_receive_ipp_client_packets" lineno="37146">
19083 <summary>
19084 Receive ipp_client packets.
19085 </summary>
19086 @@ -33367,7 +33451,7 @@ Domain allowed access.
19087 </param>
19088 <infoflow type="read" weight="10"/>
19089 </interface>
19090 -<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="37147">
19091 +<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="37165">
19092 <summary>
19093 Do not audit attempts to receive ipp_client packets.
19094 </summary>
19095 @@ -33378,7 +33462,7 @@ Domain allowed access.
19096 </param>
19097 <infoflow type="none"/>
19098 </interface>
19099 -<interface name="corenet_sendrecv_ipp_client_packets" lineno="37166">
19100 +<interface name="corenet_sendrecv_ipp_client_packets" lineno="37184">
19101 <summary>
19102 Send and receive ipp_client packets.
19103 </summary>
19104 @@ -33389,7 +33473,7 @@ Domain allowed access.
19105 </param>
19106 <infoflow type="both" weight="10"/>
19107 </interface>
19108 -<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="37182">
19109 +<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="37200">
19110 <summary>
19111 Do not audit attempts to send and receive ipp_client packets.
19112 </summary>
19113 @@ -33400,7 +33484,7 @@ Domain to not audit.
19114 </param>
19115 <infoflow type="none"/>
19116 </interface>
19117 -<interface name="corenet_relabelto_ipp_client_packets" lineno="37197">
19118 +<interface name="corenet_relabelto_ipp_client_packets" lineno="37215">
19119 <summary>
19120 Relabel packets to ipp_client the packet type.
19121 </summary>
19122 @@ -33410,7 +33494,7 @@ Domain allowed access.
19123 </summary>
19124 </param>
19125 </interface>
19126 -<interface name="corenet_send_ipp_server_packets" lineno="37217">
19127 +<interface name="corenet_send_ipp_server_packets" lineno="37235">
19128 <summary>
19129 Send ipp_server packets.
19130 </summary>
19131 @@ -33421,7 +33505,7 @@ Domain allowed access.
19132 </param>
19133 <infoflow type="write" weight="10"/>
19134 </interface>
19135 -<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="37236">
19136 +<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="37254">
19137 <summary>
19138 Do not audit attempts to send ipp_server packets.
19139 </summary>
19140 @@ -33432,7 +33516,7 @@ Domain to not audit.
19141 </param>
19142 <infoflow type="none"/>
19143 </interface>
19144 -<interface name="corenet_receive_ipp_server_packets" lineno="37255">
19145 +<interface name="corenet_receive_ipp_server_packets" lineno="37273">
19146 <summary>
19147 Receive ipp_server packets.
19148 </summary>
19149 @@ -33443,7 +33527,7 @@ Domain allowed access.
19150 </param>
19151 <infoflow type="read" weight="10"/>
19152 </interface>
19153 -<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="37274">
19154 +<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="37292">
19155 <summary>
19156 Do not audit attempts to receive ipp_server packets.
19157 </summary>
19158 @@ -33454,7 +33538,7 @@ Domain allowed access.
19159 </param>
19160 <infoflow type="none"/>
19161 </interface>
19162 -<interface name="corenet_sendrecv_ipp_server_packets" lineno="37293">
19163 +<interface name="corenet_sendrecv_ipp_server_packets" lineno="37311">
19164 <summary>
19165 Send and receive ipp_server packets.
19166 </summary>
19167 @@ -33465,7 +33549,7 @@ Domain allowed access.
19168 </param>
19169 <infoflow type="both" weight="10"/>
19170 </interface>
19171 -<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="37309">
19172 +<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="37327">
19173 <summary>
19174 Do not audit attempts to send and receive ipp_server packets.
19175 </summary>
19176 @@ -33476,7 +33560,7 @@ Domain to not audit.
19177 </param>
19178 <infoflow type="none"/>
19179 </interface>
19180 -<interface name="corenet_relabelto_ipp_server_packets" lineno="37324">
19181 +<interface name="corenet_relabelto_ipp_server_packets" lineno="37342">
19182 <summary>
19183 Relabel packets to ipp_server the packet type.
19184 </summary>
19185 @@ -33486,7 +33570,7 @@ Domain allowed access.
19186 </summary>
19187 </param>
19188 </interface>
19189 -<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="37346">
19190 +<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="37364">
19191 <summary>
19192 Send and receive TCP traffic on the ipsecnat port.
19193 </summary>
19194 @@ -33497,7 +33581,7 @@ Domain allowed access.
19195 </param>
19196 <infoflow type="both" weight="10"/>
19197 </interface>
19198 -<interface name="corenet_udp_send_ipsecnat_port" lineno="37361">
19199 +<interface name="corenet_udp_send_ipsecnat_port" lineno="37379">
19200 <summary>
19201 Send UDP traffic on the ipsecnat port.
19202 </summary>
19203 @@ -33508,7 +33592,7 @@ Domain allowed access.
19204 </param>
19205 <infoflow type="write" weight="10"/>
19206 </interface>
19207 -<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="37376">
19208 +<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="37394">
19209 <summary>
19210 Do not audit attempts to send UDP traffic on the ipsecnat port.
19211 </summary>
19212 @@ -33519,7 +33603,7 @@ Domain to not audit.
19213 </param>
19214 <infoflow type="none"/>
19215 </interface>
19216 -<interface name="corenet_udp_receive_ipsecnat_port" lineno="37391">
19217 +<interface name="corenet_udp_receive_ipsecnat_port" lineno="37409">
19218 <summary>
19219 Receive UDP traffic on the ipsecnat port.
19220 </summary>
19221 @@ -33530,7 +33614,7 @@ Domain allowed access.
19222 </param>
19223 <infoflow type="read" weight="10"/>
19224 </interface>
19225 -<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="37406">
19226 +<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="37424">
19227 <summary>
19228 Do not audit attempts to receive UDP traffic on the ipsecnat port.
19229 </summary>
19230 @@ -33541,7 +33625,7 @@ Domain to not audit.
19231 </param>
19232 <infoflow type="none"/>
19233 </interface>
19234 -<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="37421">
19235 +<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="37439">
19236 <summary>
19237 Send and receive UDP traffic on the ipsecnat port.
19238 </summary>
19239 @@ -33552,7 +33636,7 @@ Domain allowed access.
19240 </param>
19241 <infoflow type="both" weight="10"/>
19242 </interface>
19243 -<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="37437">
19244 +<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="37455">
19245 <summary>
19246 Do not audit attempts to send and receive
19247 UDP traffic on the ipsecnat port.
19248 @@ -33564,7 +33648,7 @@ Domain to not audit.
19249 </param>
19250 <infoflow type="none"/>
19251 </interface>
19252 -<interface name="corenet_tcp_bind_ipsecnat_port" lineno="37452">
19253 +<interface name="corenet_tcp_bind_ipsecnat_port" lineno="37470">
19254 <summary>
19255 Bind TCP sockets to the ipsecnat port.
19256 </summary>
19257 @@ -33575,7 +33659,7 @@ Domain allowed access.
19258 </param>
19259 <infoflow type="none"/>
19260 </interface>
19261 -<interface name="corenet_udp_bind_ipsecnat_port" lineno="37472">
19262 +<interface name="corenet_udp_bind_ipsecnat_port" lineno="37490">
19263 <summary>
19264 Bind UDP sockets to the ipsecnat port.
19265 </summary>
19266 @@ -33586,7 +33670,7 @@ Domain allowed access.
19267 </param>
19268 <infoflow type="none"/>
19269 </interface>
19270 -<interface name="corenet_tcp_connect_ipsecnat_port" lineno="37491">
19271 +<interface name="corenet_tcp_connect_ipsecnat_port" lineno="37509">
19272 <summary>
19273 Make a TCP connection to the ipsecnat port.
19274 </summary>
19275 @@ -33596,7 +33680,7 @@ Domain allowed access.
19276 </summary>
19277 </param>
19278 </interface>
19279 -<interface name="corenet_send_ipsecnat_client_packets" lineno="37511">
19280 +<interface name="corenet_send_ipsecnat_client_packets" lineno="37529">
19281 <summary>
19282 Send ipsecnat_client packets.
19283 </summary>
19284 @@ -33607,7 +33691,7 @@ Domain allowed access.
19285 </param>
19286 <infoflow type="write" weight="10"/>
19287 </interface>
19288 -<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="37530">
19289 +<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="37548">
19290 <summary>
19291 Do not audit attempts to send ipsecnat_client packets.
19292 </summary>
19293 @@ -33618,7 +33702,7 @@ Domain to not audit.
19294 </param>
19295 <infoflow type="none"/>
19296 </interface>
19297 -<interface name="corenet_receive_ipsecnat_client_packets" lineno="37549">
19298 +<interface name="corenet_receive_ipsecnat_client_packets" lineno="37567">
19299 <summary>
19300 Receive ipsecnat_client packets.
19301 </summary>
19302 @@ -33629,7 +33713,7 @@ Domain allowed access.
19303 </param>
19304 <infoflow type="read" weight="10"/>
19305 </interface>
19306 -<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="37568">
19307 +<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="37586">
19308 <summary>
19309 Do not audit attempts to receive ipsecnat_client packets.
19310 </summary>
19311 @@ -33640,7 +33724,7 @@ Domain allowed access.
19312 </param>
19313 <infoflow type="none"/>
19314 </interface>
19315 -<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="37587">
19316 +<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="37605">
19317 <summary>
19318 Send and receive ipsecnat_client packets.
19319 </summary>
19320 @@ -33651,7 +33735,7 @@ Domain allowed access.
19321 </param>
19322 <infoflow type="both" weight="10"/>
19323 </interface>
19324 -<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="37603">
19325 +<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="37621">
19326 <summary>
19327 Do not audit attempts to send and receive ipsecnat_client packets.
19328 </summary>
19329 @@ -33662,7 +33746,7 @@ Domain to not audit.
19330 </param>
19331 <infoflow type="none"/>
19332 </interface>
19333 -<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="37618">
19334 +<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="37636">
19335 <summary>
19336 Relabel packets to ipsecnat_client the packet type.
19337 </summary>
19338 @@ -33672,7 +33756,7 @@ Domain allowed access.
19339 </summary>
19340 </param>
19341 </interface>
19342 -<interface name="corenet_send_ipsecnat_server_packets" lineno="37638">
19343 +<interface name="corenet_send_ipsecnat_server_packets" lineno="37656">
19344 <summary>
19345 Send ipsecnat_server packets.
19346 </summary>
19347 @@ -33683,7 +33767,7 @@ Domain allowed access.
19348 </param>
19349 <infoflow type="write" weight="10"/>
19350 </interface>
19351 -<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="37657">
19352 +<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="37675">
19353 <summary>
19354 Do not audit attempts to send ipsecnat_server packets.
19355 </summary>
19356 @@ -33694,7 +33778,7 @@ Domain to not audit.
19357 </param>
19358 <infoflow type="none"/>
19359 </interface>
19360 -<interface name="corenet_receive_ipsecnat_server_packets" lineno="37676">
19361 +<interface name="corenet_receive_ipsecnat_server_packets" lineno="37694">
19362 <summary>
19363 Receive ipsecnat_server packets.
19364 </summary>
19365 @@ -33705,7 +33789,7 @@ Domain allowed access.
19366 </param>
19367 <infoflow type="read" weight="10"/>
19368 </interface>
19369 -<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="37695">
19370 +<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="37713">
19371 <summary>
19372 Do not audit attempts to receive ipsecnat_server packets.
19373 </summary>
19374 @@ -33716,7 +33800,7 @@ Domain allowed access.
19375 </param>
19376 <infoflow type="none"/>
19377 </interface>
19378 -<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="37714">
19379 +<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="37732">
19380 <summary>
19381 Send and receive ipsecnat_server packets.
19382 </summary>
19383 @@ -33727,7 +33811,7 @@ Domain allowed access.
19384 </param>
19385 <infoflow type="both" weight="10"/>
19386 </interface>
19387 -<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="37730">
19388 +<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="37748">
19389 <summary>
19390 Do not audit attempts to send and receive ipsecnat_server packets.
19391 </summary>
19392 @@ -33738,7 +33822,7 @@ Domain to not audit.
19393 </param>
19394 <infoflow type="none"/>
19395 </interface>
19396 -<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="37745">
19397 +<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="37763">
19398 <summary>
19399 Relabel packets to ipsecnat_server the packet type.
19400 </summary>
19401 @@ -33748,7 +33832,7 @@ Domain allowed access.
19402 </summary>
19403 </param>
19404 </interface>
19405 -<interface name="corenet_tcp_sendrecv_ircd_port" lineno="37767">
19406 +<interface name="corenet_tcp_sendrecv_ircd_port" lineno="37785">
19407 <summary>
19408 Send and receive TCP traffic on the ircd port.
19409 </summary>
19410 @@ -33759,7 +33843,7 @@ Domain allowed access.
19411 </param>
19412 <infoflow type="both" weight="10"/>
19413 </interface>
19414 -<interface name="corenet_udp_send_ircd_port" lineno="37782">
19415 +<interface name="corenet_udp_send_ircd_port" lineno="37800">
19416 <summary>
19417 Send UDP traffic on the ircd port.
19418 </summary>
19419 @@ -33770,7 +33854,7 @@ Domain allowed access.
19420 </param>
19421 <infoflow type="write" weight="10"/>
19422 </interface>
19423 -<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="37797">
19424 +<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="37815">
19425 <summary>
19426 Do not audit attempts to send UDP traffic on the ircd port.
19427 </summary>
19428 @@ -33781,7 +33865,7 @@ Domain to not audit.
19429 </param>
19430 <infoflow type="none"/>
19431 </interface>
19432 -<interface name="corenet_udp_receive_ircd_port" lineno="37812">
19433 +<interface name="corenet_udp_receive_ircd_port" lineno="37830">
19434 <summary>
19435 Receive UDP traffic on the ircd port.
19436 </summary>
19437 @@ -33792,7 +33876,7 @@ Domain allowed access.
19438 </param>
19439 <infoflow type="read" weight="10"/>
19440 </interface>
19441 -<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="37827">
19442 +<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="37845">
19443 <summary>
19444 Do not audit attempts to receive UDP traffic on the ircd port.
19445 </summary>
19446 @@ -33803,7 +33887,7 @@ Domain to not audit.
19447 </param>
19448 <infoflow type="none"/>
19449 </interface>
19450 -<interface name="corenet_udp_sendrecv_ircd_port" lineno="37842">
19451 +<interface name="corenet_udp_sendrecv_ircd_port" lineno="37860">
19452 <summary>
19453 Send and receive UDP traffic on the ircd port.
19454 </summary>
19455 @@ -33814,7 +33898,7 @@ Domain allowed access.
19456 </param>
19457 <infoflow type="both" weight="10"/>
19458 </interface>
19459 -<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="37858">
19460 +<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="37876">
19461 <summary>
19462 Do not audit attempts to send and receive
19463 UDP traffic on the ircd port.
19464 @@ -33826,7 +33910,7 @@ Domain to not audit.
19465 </param>
19466 <infoflow type="none"/>
19467 </interface>
19468 -<interface name="corenet_tcp_bind_ircd_port" lineno="37873">
19469 +<interface name="corenet_tcp_bind_ircd_port" lineno="37891">
19470 <summary>
19471 Bind TCP sockets to the ircd port.
19472 </summary>
19473 @@ -33837,7 +33921,7 @@ Domain allowed access.
19474 </param>
19475 <infoflow type="none"/>
19476 </interface>
19477 -<interface name="corenet_udp_bind_ircd_port" lineno="37893">
19478 +<interface name="corenet_udp_bind_ircd_port" lineno="37911">
19479 <summary>
19480 Bind UDP sockets to the ircd port.
19481 </summary>
19482 @@ -33848,7 +33932,7 @@ Domain allowed access.
19483 </param>
19484 <infoflow type="none"/>
19485 </interface>
19486 -<interface name="corenet_tcp_connect_ircd_port" lineno="37912">
19487 +<interface name="corenet_tcp_connect_ircd_port" lineno="37930">
19488 <summary>
19489 Make a TCP connection to the ircd port.
19490 </summary>
19491 @@ -33858,7 +33942,7 @@ Domain allowed access.
19492 </summary>
19493 </param>
19494 </interface>
19495 -<interface name="corenet_send_ircd_client_packets" lineno="37932">
19496 +<interface name="corenet_send_ircd_client_packets" lineno="37950">
19497 <summary>
19498 Send ircd_client packets.
19499 </summary>
19500 @@ -33869,7 +33953,7 @@ Domain allowed access.
19501 </param>
19502 <infoflow type="write" weight="10"/>
19503 </interface>
19504 -<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="37951">
19505 +<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="37969">
19506 <summary>
19507 Do not audit attempts to send ircd_client packets.
19508 </summary>
19509 @@ -33880,7 +33964,7 @@ Domain to not audit.
19510 </param>
19511 <infoflow type="none"/>
19512 </interface>
19513 -<interface name="corenet_receive_ircd_client_packets" lineno="37970">
19514 +<interface name="corenet_receive_ircd_client_packets" lineno="37988">
19515 <summary>
19516 Receive ircd_client packets.
19517 </summary>
19518 @@ -33891,7 +33975,7 @@ Domain allowed access.
19519 </param>
19520 <infoflow type="read" weight="10"/>
19521 </interface>
19522 -<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="37989">
19523 +<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="38007">
19524 <summary>
19525 Do not audit attempts to receive ircd_client packets.
19526 </summary>
19527 @@ -33902,7 +33986,7 @@ Domain allowed access.
19528 </param>
19529 <infoflow type="none"/>
19530 </interface>
19531 -<interface name="corenet_sendrecv_ircd_client_packets" lineno="38008">
19532 +<interface name="corenet_sendrecv_ircd_client_packets" lineno="38026">
19533 <summary>
19534 Send and receive ircd_client packets.
19535 </summary>
19536 @@ -33913,7 +33997,7 @@ Domain allowed access.
19537 </param>
19538 <infoflow type="both" weight="10"/>
19539 </interface>
19540 -<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="38024">
19541 +<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="38042">
19542 <summary>
19543 Do not audit attempts to send and receive ircd_client packets.
19544 </summary>
19545 @@ -33924,7 +34008,7 @@ Domain to not audit.
19546 </param>
19547 <infoflow type="none"/>
19548 </interface>
19549 -<interface name="corenet_relabelto_ircd_client_packets" lineno="38039">
19550 +<interface name="corenet_relabelto_ircd_client_packets" lineno="38057">
19551 <summary>
19552 Relabel packets to ircd_client the packet type.
19553 </summary>
19554 @@ -33934,7 +34018,7 @@ Domain allowed access.
19555 </summary>
19556 </param>
19557 </interface>
19558 -<interface name="corenet_send_ircd_server_packets" lineno="38059">
19559 +<interface name="corenet_send_ircd_server_packets" lineno="38077">
19560 <summary>
19561 Send ircd_server packets.
19562 </summary>
19563 @@ -33945,7 +34029,7 @@ Domain allowed access.
19564 </param>
19565 <infoflow type="write" weight="10"/>
19566 </interface>
19567 -<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="38078">
19568 +<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="38096">
19569 <summary>
19570 Do not audit attempts to send ircd_server packets.
19571 </summary>
19572 @@ -33956,7 +34040,7 @@ Domain to not audit.
19573 </param>
19574 <infoflow type="none"/>
19575 </interface>
19576 -<interface name="corenet_receive_ircd_server_packets" lineno="38097">
19577 +<interface name="corenet_receive_ircd_server_packets" lineno="38115">
19578 <summary>
19579 Receive ircd_server packets.
19580 </summary>
19581 @@ -33967,7 +34051,7 @@ Domain allowed access.
19582 </param>
19583 <infoflow type="read" weight="10"/>
19584 </interface>
19585 -<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="38116">
19586 +<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="38134">
19587 <summary>
19588 Do not audit attempts to receive ircd_server packets.
19589 </summary>
19590 @@ -33978,7 +34062,7 @@ Domain allowed access.
19591 </param>
19592 <infoflow type="none"/>
19593 </interface>
19594 -<interface name="corenet_sendrecv_ircd_server_packets" lineno="38135">
19595 +<interface name="corenet_sendrecv_ircd_server_packets" lineno="38153">
19596 <summary>
19597 Send and receive ircd_server packets.
19598 </summary>
19599 @@ -33989,7 +34073,7 @@ Domain allowed access.
19600 </param>
19601 <infoflow type="both" weight="10"/>
19602 </interface>
19603 -<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="38151">
19604 +<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="38169">
19605 <summary>
19606 Do not audit attempts to send and receive ircd_server packets.
19607 </summary>
19608 @@ -34000,7 +34084,7 @@ Domain to not audit.
19609 </param>
19610 <infoflow type="none"/>
19611 </interface>
19612 -<interface name="corenet_relabelto_ircd_server_packets" lineno="38166">
19613 +<interface name="corenet_relabelto_ircd_server_packets" lineno="38184">
19614 <summary>
19615 Relabel packets to ircd_server the packet type.
19616 </summary>
19617 @@ -34010,7 +34094,7 @@ Domain allowed access.
19618 </summary>
19619 </param>
19620 </interface>
19621 -<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="38188">
19622 +<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="38206">
19623 <summary>
19624 Send and receive TCP traffic on the isakmp port.
19625 </summary>
19626 @@ -34021,7 +34105,7 @@ Domain allowed access.
19627 </param>
19628 <infoflow type="both" weight="10"/>
19629 </interface>
19630 -<interface name="corenet_udp_send_isakmp_port" lineno="38203">
19631 +<interface name="corenet_udp_send_isakmp_port" lineno="38221">
19632 <summary>
19633 Send UDP traffic on the isakmp port.
19634 </summary>
19635 @@ -34032,7 +34116,7 @@ Domain allowed access.
19636 </param>
19637 <infoflow type="write" weight="10"/>
19638 </interface>
19639 -<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="38218">
19640 +<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="38236">
19641 <summary>
19642 Do not audit attempts to send UDP traffic on the isakmp port.
19643 </summary>
19644 @@ -34043,7 +34127,7 @@ Domain to not audit.
19645 </param>
19646 <infoflow type="none"/>
19647 </interface>
19648 -<interface name="corenet_udp_receive_isakmp_port" lineno="38233">
19649 +<interface name="corenet_udp_receive_isakmp_port" lineno="38251">
19650 <summary>
19651 Receive UDP traffic on the isakmp port.
19652 </summary>
19653 @@ -34054,7 +34138,7 @@ Domain allowed access.
19654 </param>
19655 <infoflow type="read" weight="10"/>
19656 </interface>
19657 -<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="38248">
19658 +<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="38266">
19659 <summary>
19660 Do not audit attempts to receive UDP traffic on the isakmp port.
19661 </summary>
19662 @@ -34065,7 +34149,7 @@ Domain to not audit.
19663 </param>
19664 <infoflow type="none"/>
19665 </interface>
19666 -<interface name="corenet_udp_sendrecv_isakmp_port" lineno="38263">
19667 +<interface name="corenet_udp_sendrecv_isakmp_port" lineno="38281">
19668 <summary>
19669 Send and receive UDP traffic on the isakmp port.
19670 </summary>
19671 @@ -34076,7 +34160,7 @@ Domain allowed access.
19672 </param>
19673 <infoflow type="both" weight="10"/>
19674 </interface>
19675 -<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="38279">
19676 +<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="38297">
19677 <summary>
19678 Do not audit attempts to send and receive
19679 UDP traffic on the isakmp port.
19680 @@ -34088,7 +34172,7 @@ Domain to not audit.
19681 </param>
19682 <infoflow type="none"/>
19683 </interface>
19684 -<interface name="corenet_tcp_bind_isakmp_port" lineno="38294">
19685 +<interface name="corenet_tcp_bind_isakmp_port" lineno="38312">
19686 <summary>
19687 Bind TCP sockets to the isakmp port.
19688 </summary>
19689 @@ -34099,7 +34183,7 @@ Domain allowed access.
19690 </param>
19691 <infoflow type="none"/>
19692 </interface>
19693 -<interface name="corenet_udp_bind_isakmp_port" lineno="38314">
19694 +<interface name="corenet_udp_bind_isakmp_port" lineno="38332">
19695 <summary>
19696 Bind UDP sockets to the isakmp port.
19697 </summary>
19698 @@ -34110,7 +34194,7 @@ Domain allowed access.
19699 </param>
19700 <infoflow type="none"/>
19701 </interface>
19702 -<interface name="corenet_tcp_connect_isakmp_port" lineno="38333">
19703 +<interface name="corenet_tcp_connect_isakmp_port" lineno="38351">
19704 <summary>
19705 Make a TCP connection to the isakmp port.
19706 </summary>
19707 @@ -34120,7 +34204,7 @@ Domain allowed access.
19708 </summary>
19709 </param>
19710 </interface>
19711 -<interface name="corenet_send_isakmp_client_packets" lineno="38353">
19712 +<interface name="corenet_send_isakmp_client_packets" lineno="38371">
19713 <summary>
19714 Send isakmp_client packets.
19715 </summary>
19716 @@ -34131,7 +34215,7 @@ Domain allowed access.
19717 </param>
19718 <infoflow type="write" weight="10"/>
19719 </interface>
19720 -<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="38372">
19721 +<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="38390">
19722 <summary>
19723 Do not audit attempts to send isakmp_client packets.
19724 </summary>
19725 @@ -34142,7 +34226,7 @@ Domain to not audit.
19726 </param>
19727 <infoflow type="none"/>
19728 </interface>
19729 -<interface name="corenet_receive_isakmp_client_packets" lineno="38391">
19730 +<interface name="corenet_receive_isakmp_client_packets" lineno="38409">
19731 <summary>
19732 Receive isakmp_client packets.
19733 </summary>
19734 @@ -34153,7 +34237,7 @@ Domain allowed access.
19735 </param>
19736 <infoflow type="read" weight="10"/>
19737 </interface>
19738 -<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="38410">
19739 +<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="38428">
19740 <summary>
19741 Do not audit attempts to receive isakmp_client packets.
19742 </summary>
19743 @@ -34164,7 +34248,7 @@ Domain allowed access.
19744 </param>
19745 <infoflow type="none"/>
19746 </interface>
19747 -<interface name="corenet_sendrecv_isakmp_client_packets" lineno="38429">
19748 +<interface name="corenet_sendrecv_isakmp_client_packets" lineno="38447">
19749 <summary>
19750 Send and receive isakmp_client packets.
19751 </summary>
19752 @@ -34175,7 +34259,7 @@ Domain allowed access.
19753 </param>
19754 <infoflow type="both" weight="10"/>
19755 </interface>
19756 -<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="38445">
19757 +<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="38463">
19758 <summary>
19759 Do not audit attempts to send and receive isakmp_client packets.
19760 </summary>
19761 @@ -34186,7 +34270,7 @@ Domain to not audit.
19762 </param>
19763 <infoflow type="none"/>
19764 </interface>
19765 -<interface name="corenet_relabelto_isakmp_client_packets" lineno="38460">
19766 +<interface name="corenet_relabelto_isakmp_client_packets" lineno="38478">
19767 <summary>
19768 Relabel packets to isakmp_client the packet type.
19769 </summary>
19770 @@ -34196,7 +34280,7 @@ Domain allowed access.
19771 </summary>
19772 </param>
19773 </interface>
19774 -<interface name="corenet_send_isakmp_server_packets" lineno="38480">
19775 +<interface name="corenet_send_isakmp_server_packets" lineno="38498">
19776 <summary>
19777 Send isakmp_server packets.
19778 </summary>
19779 @@ -34207,7 +34291,7 @@ Domain allowed access.
19780 </param>
19781 <infoflow type="write" weight="10"/>
19782 </interface>
19783 -<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="38499">
19784 +<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="38517">
19785 <summary>
19786 Do not audit attempts to send isakmp_server packets.
19787 </summary>
19788 @@ -34218,7 +34302,7 @@ Domain to not audit.
19789 </param>
19790 <infoflow type="none"/>
19791 </interface>
19792 -<interface name="corenet_receive_isakmp_server_packets" lineno="38518">
19793 +<interface name="corenet_receive_isakmp_server_packets" lineno="38536">
19794 <summary>
19795 Receive isakmp_server packets.
19796 </summary>
19797 @@ -34229,7 +34313,7 @@ Domain allowed access.
19798 </param>
19799 <infoflow type="read" weight="10"/>
19800 </interface>
19801 -<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="38537">
19802 +<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="38555">
19803 <summary>
19804 Do not audit attempts to receive isakmp_server packets.
19805 </summary>
19806 @@ -34240,7 +34324,7 @@ Domain allowed access.
19807 </param>
19808 <infoflow type="none"/>
19809 </interface>
19810 -<interface name="corenet_sendrecv_isakmp_server_packets" lineno="38556">
19811 +<interface name="corenet_sendrecv_isakmp_server_packets" lineno="38574">
19812 <summary>
19813 Send and receive isakmp_server packets.
19814 </summary>
19815 @@ -34251,7 +34335,7 @@ Domain allowed access.
19816 </param>
19817 <infoflow type="both" weight="10"/>
19818 </interface>
19819 -<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="38572">
19820 +<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="38590">
19821 <summary>
19822 Do not audit attempts to send and receive isakmp_server packets.
19823 </summary>
19824 @@ -34262,7 +34346,7 @@ Domain to not audit.
19825 </param>
19826 <infoflow type="none"/>
19827 </interface>
19828 -<interface name="corenet_relabelto_isakmp_server_packets" lineno="38587">
19829 +<interface name="corenet_relabelto_isakmp_server_packets" lineno="38605">
19830 <summary>
19831 Relabel packets to isakmp_server the packet type.
19832 </summary>
19833 @@ -34272,7 +34356,7 @@ Domain allowed access.
19834 </summary>
19835 </param>
19836 </interface>
19837 -<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="38609">
19838 +<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="38627">
19839 <summary>
19840 Send and receive TCP traffic on the iscsi port.
19841 </summary>
19842 @@ -34283,7 +34367,7 @@ Domain allowed access.
19843 </param>
19844 <infoflow type="both" weight="10"/>
19845 </interface>
19846 -<interface name="corenet_udp_send_iscsi_port" lineno="38624">
19847 +<interface name="corenet_udp_send_iscsi_port" lineno="38642">
19848 <summary>
19849 Send UDP traffic on the iscsi port.
19850 </summary>
19851 @@ -34294,7 +34378,7 @@ Domain allowed access.
19852 </param>
19853 <infoflow type="write" weight="10"/>
19854 </interface>
19855 -<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="38639">
19856 +<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="38657">
19857 <summary>
19858 Do not audit attempts to send UDP traffic on the iscsi port.
19859 </summary>
19860 @@ -34305,7 +34389,7 @@ Domain to not audit.
19861 </param>
19862 <infoflow type="none"/>
19863 </interface>
19864 -<interface name="corenet_udp_receive_iscsi_port" lineno="38654">
19865 +<interface name="corenet_udp_receive_iscsi_port" lineno="38672">
19866 <summary>
19867 Receive UDP traffic on the iscsi port.
19868 </summary>
19869 @@ -34316,7 +34400,7 @@ Domain allowed access.
19870 </param>
19871 <infoflow type="read" weight="10"/>
19872 </interface>
19873 -<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="38669">
19874 +<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="38687">
19875 <summary>
19876 Do not audit attempts to receive UDP traffic on the iscsi port.
19877 </summary>
19878 @@ -34327,7 +34411,7 @@ Domain to not audit.
19879 </param>
19880 <infoflow type="none"/>
19881 </interface>
19882 -<interface name="corenet_udp_sendrecv_iscsi_port" lineno="38684">
19883 +<interface name="corenet_udp_sendrecv_iscsi_port" lineno="38702">
19884 <summary>
19885 Send and receive UDP traffic on the iscsi port.
19886 </summary>
19887 @@ -34338,7 +34422,7 @@ Domain allowed access.
19888 </param>
19889 <infoflow type="both" weight="10"/>
19890 </interface>
19891 -<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="38700">
19892 +<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="38718">
19893 <summary>
19894 Do not audit attempts to send and receive
19895 UDP traffic on the iscsi port.
19896 @@ -34350,7 +34434,7 @@ Domain to not audit.
19897 </param>
19898 <infoflow type="none"/>
19899 </interface>
19900 -<interface name="corenet_tcp_bind_iscsi_port" lineno="38715">
19901 +<interface name="corenet_tcp_bind_iscsi_port" lineno="38733">
19902 <summary>
19903 Bind TCP sockets to the iscsi port.
19904 </summary>
19905 @@ -34361,7 +34445,7 @@ Domain allowed access.
19906 </param>
19907 <infoflow type="none"/>
19908 </interface>
19909 -<interface name="corenet_udp_bind_iscsi_port" lineno="38735">
19910 +<interface name="corenet_udp_bind_iscsi_port" lineno="38753">
19911 <summary>
19912 Bind UDP sockets to the iscsi port.
19913 </summary>
19914 @@ -34372,7 +34456,7 @@ Domain allowed access.
19915 </param>
19916 <infoflow type="none"/>
19917 </interface>
19918 -<interface name="corenet_tcp_connect_iscsi_port" lineno="38754">
19919 +<interface name="corenet_tcp_connect_iscsi_port" lineno="38772">
19920 <summary>
19921 Make a TCP connection to the iscsi port.
19922 </summary>
19923 @@ -34382,7 +34466,7 @@ Domain allowed access.
19924 </summary>
19925 </param>
19926 </interface>
19927 -<interface name="corenet_send_iscsi_client_packets" lineno="38774">
19928 +<interface name="corenet_send_iscsi_client_packets" lineno="38792">
19929 <summary>
19930 Send iscsi_client packets.
19931 </summary>
19932 @@ -34393,7 +34477,7 @@ Domain allowed access.
19933 </param>
19934 <infoflow type="write" weight="10"/>
19935 </interface>
19936 -<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="38793">
19937 +<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="38811">
19938 <summary>
19939 Do not audit attempts to send iscsi_client packets.
19940 </summary>
19941 @@ -34404,7 +34488,7 @@ Domain to not audit.
19942 </param>
19943 <infoflow type="none"/>
19944 </interface>
19945 -<interface name="corenet_receive_iscsi_client_packets" lineno="38812">
19946 +<interface name="corenet_receive_iscsi_client_packets" lineno="38830">
19947 <summary>
19948 Receive iscsi_client packets.
19949 </summary>
19950 @@ -34415,7 +34499,7 @@ Domain allowed access.
19951 </param>
19952 <infoflow type="read" weight="10"/>
19953 </interface>
19954 -<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="38831">
19955 +<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="38849">
19956 <summary>
19957 Do not audit attempts to receive iscsi_client packets.
19958 </summary>
19959 @@ -34426,7 +34510,7 @@ Domain allowed access.
19960 </param>
19961 <infoflow type="none"/>
19962 </interface>
19963 -<interface name="corenet_sendrecv_iscsi_client_packets" lineno="38850">
19964 +<interface name="corenet_sendrecv_iscsi_client_packets" lineno="38868">
19965 <summary>
19966 Send and receive iscsi_client packets.
19967 </summary>
19968 @@ -34437,7 +34521,7 @@ Domain allowed access.
19969 </param>
19970 <infoflow type="both" weight="10"/>
19971 </interface>
19972 -<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="38866">
19973 +<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="38884">
19974 <summary>
19975 Do not audit attempts to send and receive iscsi_client packets.
19976 </summary>
19977 @@ -34448,7 +34532,7 @@ Domain to not audit.
19978 </param>
19979 <infoflow type="none"/>
19980 </interface>
19981 -<interface name="corenet_relabelto_iscsi_client_packets" lineno="38881">
19982 +<interface name="corenet_relabelto_iscsi_client_packets" lineno="38899">
19983 <summary>
19984 Relabel packets to iscsi_client the packet type.
19985 </summary>
19986 @@ -34458,7 +34542,7 @@ Domain allowed access.
19987 </summary>
19988 </param>
19989 </interface>
19990 -<interface name="corenet_send_iscsi_server_packets" lineno="38901">
19991 +<interface name="corenet_send_iscsi_server_packets" lineno="38919">
19992 <summary>
19993 Send iscsi_server packets.
19994 </summary>
19995 @@ -34469,7 +34553,7 @@ Domain allowed access.
19996 </param>
19997 <infoflow type="write" weight="10"/>
19998 </interface>
19999 -<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="38920">
20000 +<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="38938">
20001 <summary>
20002 Do not audit attempts to send iscsi_server packets.
20003 </summary>
20004 @@ -34480,7 +34564,7 @@ Domain to not audit.
20005 </param>
20006 <infoflow type="none"/>
20007 </interface>
20008 -<interface name="corenet_receive_iscsi_server_packets" lineno="38939">
20009 +<interface name="corenet_receive_iscsi_server_packets" lineno="38957">
20010 <summary>
20011 Receive iscsi_server packets.
20012 </summary>
20013 @@ -34491,7 +34575,7 @@ Domain allowed access.
20014 </param>
20015 <infoflow type="read" weight="10"/>
20016 </interface>
20017 -<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="38958">
20018 +<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="38976">
20019 <summary>
20020 Do not audit attempts to receive iscsi_server packets.
20021 </summary>
20022 @@ -34502,7 +34586,7 @@ Domain allowed access.
20023 </param>
20024 <infoflow type="none"/>
20025 </interface>
20026 -<interface name="corenet_sendrecv_iscsi_server_packets" lineno="38977">
20027 +<interface name="corenet_sendrecv_iscsi_server_packets" lineno="38995">
20028 <summary>
20029 Send and receive iscsi_server packets.
20030 </summary>
20031 @@ -34513,7 +34597,7 @@ Domain allowed access.
20032 </param>
20033 <infoflow type="both" weight="10"/>
20034 </interface>
20035 -<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="38993">
20036 +<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="39011">
20037 <summary>
20038 Do not audit attempts to send and receive iscsi_server packets.
20039 </summary>
20040 @@ -34524,7 +34608,7 @@ Domain to not audit.
20041 </param>
20042 <infoflow type="none"/>
20043 </interface>
20044 -<interface name="corenet_relabelto_iscsi_server_packets" lineno="39008">
20045 +<interface name="corenet_relabelto_iscsi_server_packets" lineno="39026">
20046 <summary>
20047 Relabel packets to iscsi_server the packet type.
20048 </summary>
20049 @@ -34534,7 +34618,7 @@ Domain allowed access.
20050 </summary>
20051 </param>
20052 </interface>
20053 -<interface name="corenet_tcp_sendrecv_isns_port" lineno="39030">
20054 +<interface name="corenet_tcp_sendrecv_isns_port" lineno="39048">
20055 <summary>
20056 Send and receive TCP traffic on the isns port.
20057 </summary>
20058 @@ -34545,7 +34629,7 @@ Domain allowed access.
20059 </param>
20060 <infoflow type="both" weight="10"/>
20061 </interface>
20062 -<interface name="corenet_udp_send_isns_port" lineno="39045">
20063 +<interface name="corenet_udp_send_isns_port" lineno="39063">
20064 <summary>
20065 Send UDP traffic on the isns port.
20066 </summary>
20067 @@ -34556,7 +34640,7 @@ Domain allowed access.
20068 </param>
20069 <infoflow type="write" weight="10"/>
20070 </interface>
20071 -<interface name="corenet_dontaudit_udp_send_isns_port" lineno="39060">
20072 +<interface name="corenet_dontaudit_udp_send_isns_port" lineno="39078">
20073 <summary>
20074 Do not audit attempts to send UDP traffic on the isns port.
20075 </summary>
20076 @@ -34567,7 +34651,7 @@ Domain to not audit.
20077 </param>
20078 <infoflow type="none"/>
20079 </interface>
20080 -<interface name="corenet_udp_receive_isns_port" lineno="39075">
20081 +<interface name="corenet_udp_receive_isns_port" lineno="39093">
20082 <summary>
20083 Receive UDP traffic on the isns port.
20084 </summary>
20085 @@ -34578,7 +34662,7 @@ Domain allowed access.
20086 </param>
20087 <infoflow type="read" weight="10"/>
20088 </interface>
20089 -<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="39090">
20090 +<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="39108">
20091 <summary>
20092 Do not audit attempts to receive UDP traffic on the isns port.
20093 </summary>
20094 @@ -34589,7 +34673,7 @@ Domain to not audit.
20095 </param>
20096 <infoflow type="none"/>
20097 </interface>
20098 -<interface name="corenet_udp_sendrecv_isns_port" lineno="39105">
20099 +<interface name="corenet_udp_sendrecv_isns_port" lineno="39123">
20100 <summary>
20101 Send and receive UDP traffic on the isns port.
20102 </summary>
20103 @@ -34600,7 +34684,7 @@ Domain allowed access.
20104 </param>
20105 <infoflow type="both" weight="10"/>
20106 </interface>
20107 -<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="39121">
20108 +<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="39139">
20109 <summary>
20110 Do not audit attempts to send and receive
20111 UDP traffic on the isns port.
20112 @@ -34612,7 +34696,7 @@ Domain to not audit.
20113 </param>
20114 <infoflow type="none"/>
20115 </interface>
20116 -<interface name="corenet_tcp_bind_isns_port" lineno="39136">
20117 +<interface name="corenet_tcp_bind_isns_port" lineno="39154">
20118 <summary>
20119 Bind TCP sockets to the isns port.
20120 </summary>
20121 @@ -34623,7 +34707,7 @@ Domain allowed access.
20122 </param>
20123 <infoflow type="none"/>
20124 </interface>
20125 -<interface name="corenet_udp_bind_isns_port" lineno="39156">
20126 +<interface name="corenet_udp_bind_isns_port" lineno="39174">
20127 <summary>
20128 Bind UDP sockets to the isns port.
20129 </summary>
20130 @@ -34634,7 +34718,7 @@ Domain allowed access.
20131 </param>
20132 <infoflow type="none"/>
20133 </interface>
20134 -<interface name="corenet_tcp_connect_isns_port" lineno="39175">
20135 +<interface name="corenet_tcp_connect_isns_port" lineno="39193">
20136 <summary>
20137 Make a TCP connection to the isns port.
20138 </summary>
20139 @@ -34644,7 +34728,7 @@ Domain allowed access.
20140 </summary>
20141 </param>
20142 </interface>
20143 -<interface name="corenet_send_isns_client_packets" lineno="39195">
20144 +<interface name="corenet_send_isns_client_packets" lineno="39213">
20145 <summary>
20146 Send isns_client packets.
20147 </summary>
20148 @@ -34655,7 +34739,7 @@ Domain allowed access.
20149 </param>
20150 <infoflow type="write" weight="10"/>
20151 </interface>
20152 -<interface name="corenet_dontaudit_send_isns_client_packets" lineno="39214">
20153 +<interface name="corenet_dontaudit_send_isns_client_packets" lineno="39232">
20154 <summary>
20155 Do not audit attempts to send isns_client packets.
20156 </summary>
20157 @@ -34666,7 +34750,7 @@ Domain to not audit.
20158 </param>
20159 <infoflow type="none"/>
20160 </interface>
20161 -<interface name="corenet_receive_isns_client_packets" lineno="39233">
20162 +<interface name="corenet_receive_isns_client_packets" lineno="39251">
20163 <summary>
20164 Receive isns_client packets.
20165 </summary>
20166 @@ -34677,7 +34761,7 @@ Domain allowed access.
20167 </param>
20168 <infoflow type="read" weight="10"/>
20169 </interface>
20170 -<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="39252">
20171 +<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="39270">
20172 <summary>
20173 Do not audit attempts to receive isns_client packets.
20174 </summary>
20175 @@ -34688,7 +34772,7 @@ Domain allowed access.
20176 </param>
20177 <infoflow type="none"/>
20178 </interface>
20179 -<interface name="corenet_sendrecv_isns_client_packets" lineno="39271">
20180 +<interface name="corenet_sendrecv_isns_client_packets" lineno="39289">
20181 <summary>
20182 Send and receive isns_client packets.
20183 </summary>
20184 @@ -34699,7 +34783,7 @@ Domain allowed access.
20185 </param>
20186 <infoflow type="both" weight="10"/>
20187 </interface>
20188 -<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="39287">
20189 +<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="39305">
20190 <summary>
20191 Do not audit attempts to send and receive isns_client packets.
20192 </summary>
20193 @@ -34710,7 +34794,7 @@ Domain to not audit.
20194 </param>
20195 <infoflow type="none"/>
20196 </interface>
20197 -<interface name="corenet_relabelto_isns_client_packets" lineno="39302">
20198 +<interface name="corenet_relabelto_isns_client_packets" lineno="39320">
20199 <summary>
20200 Relabel packets to isns_client the packet type.
20201 </summary>
20202 @@ -34720,7 +34804,7 @@ Domain allowed access.
20203 </summary>
20204 </param>
20205 </interface>
20206 -<interface name="corenet_send_isns_server_packets" lineno="39322">
20207 +<interface name="corenet_send_isns_server_packets" lineno="39340">
20208 <summary>
20209 Send isns_server packets.
20210 </summary>
20211 @@ -34731,7 +34815,7 @@ Domain allowed access.
20212 </param>
20213 <infoflow type="write" weight="10"/>
20214 </interface>
20215 -<interface name="corenet_dontaudit_send_isns_server_packets" lineno="39341">
20216 +<interface name="corenet_dontaudit_send_isns_server_packets" lineno="39359">
20217 <summary>
20218 Do not audit attempts to send isns_server packets.
20219 </summary>
20220 @@ -34742,7 +34826,7 @@ Domain to not audit.
20221 </param>
20222 <infoflow type="none"/>
20223 </interface>
20224 -<interface name="corenet_receive_isns_server_packets" lineno="39360">
20225 +<interface name="corenet_receive_isns_server_packets" lineno="39378">
20226 <summary>
20227 Receive isns_server packets.
20228 </summary>
20229 @@ -34753,7 +34837,7 @@ Domain allowed access.
20230 </param>
20231 <infoflow type="read" weight="10"/>
20232 </interface>
20233 -<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="39379">
20234 +<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="39397">
20235 <summary>
20236 Do not audit attempts to receive isns_server packets.
20237 </summary>
20238 @@ -34764,7 +34848,7 @@ Domain allowed access.
20239 </param>
20240 <infoflow type="none"/>
20241 </interface>
20242 -<interface name="corenet_sendrecv_isns_server_packets" lineno="39398">
20243 +<interface name="corenet_sendrecv_isns_server_packets" lineno="39416">
20244 <summary>
20245 Send and receive isns_server packets.
20246 </summary>
20247 @@ -34775,7 +34859,7 @@ Domain allowed access.
20248 </param>
20249 <infoflow type="both" weight="10"/>
20250 </interface>
20251 -<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="39414">
20252 +<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="39432">
20253 <summary>
20254 Do not audit attempts to send and receive isns_server packets.
20255 </summary>
20256 @@ -34786,7 +34870,7 @@ Domain to not audit.
20257 </param>
20258 <infoflow type="none"/>
20259 </interface>
20260 -<interface name="corenet_relabelto_isns_server_packets" lineno="39429">
20261 +<interface name="corenet_relabelto_isns_server_packets" lineno="39447">
20262 <summary>
20263 Relabel packets to isns_server the packet type.
20264 </summary>
20265 @@ -34796,7 +34880,7 @@ Domain allowed access.
20266 </summary>
20267 </param>
20268 </interface>
20269 -<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="39451">
20270 +<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="39469">
20271 <summary>
20272 Send and receive TCP traffic on the jabber_client port.
20273 </summary>
20274 @@ -34807,7 +34891,7 @@ Domain allowed access.
20275 </param>
20276 <infoflow type="both" weight="10"/>
20277 </interface>
20278 -<interface name="corenet_udp_send_jabber_client_port" lineno="39466">
20279 +<interface name="corenet_udp_send_jabber_client_port" lineno="39484">
20280 <summary>
20281 Send UDP traffic on the jabber_client port.
20282 </summary>
20283 @@ -34818,7 +34902,7 @@ Domain allowed access.
20284 </param>
20285 <infoflow type="write" weight="10"/>
20286 </interface>
20287 -<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="39481">
20288 +<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="39499">
20289 <summary>
20290 Do not audit attempts to send UDP traffic on the jabber_client port.
20291 </summary>
20292 @@ -34829,7 +34913,7 @@ Domain to not audit.
20293 </param>
20294 <infoflow type="none"/>
20295 </interface>
20296 -<interface name="corenet_udp_receive_jabber_client_port" lineno="39496">
20297 +<interface name="corenet_udp_receive_jabber_client_port" lineno="39514">
20298 <summary>
20299 Receive UDP traffic on the jabber_client port.
20300 </summary>
20301 @@ -34840,7 +34924,7 @@ Domain allowed access.
20302 </param>
20303 <infoflow type="read" weight="10"/>
20304 </interface>
20305 -<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="39511">
20306 +<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="39529">
20307 <summary>
20308 Do not audit attempts to receive UDP traffic on the jabber_client port.
20309 </summary>
20310 @@ -34851,7 +34935,7 @@ Domain to not audit.
20311 </param>
20312 <infoflow type="none"/>
20313 </interface>
20314 -<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="39526">
20315 +<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="39544">
20316 <summary>
20317 Send and receive UDP traffic on the jabber_client port.
20318 </summary>
20319 @@ -34862,7 +34946,7 @@ Domain allowed access.
20320 </param>
20321 <infoflow type="both" weight="10"/>
20322 </interface>
20323 -<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="39542">
20324 +<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="39560">
20325 <summary>
20326 Do not audit attempts to send and receive
20327 UDP traffic on the jabber_client port.
20328 @@ -34874,7 +34958,7 @@ Domain to not audit.
20329 </param>
20330 <infoflow type="none"/>
20331 </interface>
20332 -<interface name="corenet_tcp_bind_jabber_client_port" lineno="39557">
20333 +<interface name="corenet_tcp_bind_jabber_client_port" lineno="39575">
20334 <summary>
20335 Bind TCP sockets to the jabber_client port.
20336 </summary>
20337 @@ -34885,7 +34969,7 @@ Domain allowed access.
20338 </param>
20339 <infoflow type="none"/>
20340 </interface>
20341 -<interface name="corenet_udp_bind_jabber_client_port" lineno="39577">
20342 +<interface name="corenet_udp_bind_jabber_client_port" lineno="39595">
20343 <summary>
20344 Bind UDP sockets to the jabber_client port.
20345 </summary>
20346 @@ -34896,7 +34980,7 @@ Domain allowed access.
20347 </param>
20348 <infoflow type="none"/>
20349 </interface>
20350 -<interface name="corenet_tcp_connect_jabber_client_port" lineno="39596">
20351 +<interface name="corenet_tcp_connect_jabber_client_port" lineno="39614">
20352 <summary>
20353 Make a TCP connection to the jabber_client port.
20354 </summary>
20355 @@ -34906,7 +34990,7 @@ Domain allowed access.
20356 </summary>
20357 </param>
20358 </interface>
20359 -<interface name="corenet_send_jabber_client_client_packets" lineno="39616">
20360 +<interface name="corenet_send_jabber_client_client_packets" lineno="39634">
20361 <summary>
20362 Send jabber_client_client packets.
20363 </summary>
20364 @@ -34917,7 +35001,7 @@ Domain allowed access.
20365 </param>
20366 <infoflow type="write" weight="10"/>
20367 </interface>
20368 -<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="39635">
20369 +<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="39653">
20370 <summary>
20371 Do not audit attempts to send jabber_client_client packets.
20372 </summary>
20373 @@ -34928,7 +35012,7 @@ Domain to not audit.
20374 </param>
20375 <infoflow type="none"/>
20376 </interface>
20377 -<interface name="corenet_receive_jabber_client_client_packets" lineno="39654">
20378 +<interface name="corenet_receive_jabber_client_client_packets" lineno="39672">
20379 <summary>
20380 Receive jabber_client_client packets.
20381 </summary>
20382 @@ -34939,7 +35023,7 @@ Domain allowed access.
20383 </param>
20384 <infoflow type="read" weight="10"/>
20385 </interface>
20386 -<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="39673">
20387 +<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="39691">
20388 <summary>
20389 Do not audit attempts to receive jabber_client_client packets.
20390 </summary>
20391 @@ -34950,7 +35034,7 @@ Domain allowed access.
20392 </param>
20393 <infoflow type="none"/>
20394 </interface>
20395 -<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="39692">
20396 +<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="39710">
20397 <summary>
20398 Send and receive jabber_client_client packets.
20399 </summary>
20400 @@ -34961,7 +35045,7 @@ Domain allowed access.
20401 </param>
20402 <infoflow type="both" weight="10"/>
20403 </interface>
20404 -<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="39708">
20405 +<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="39726">
20406 <summary>
20407 Do not audit attempts to send and receive jabber_client_client packets.
20408 </summary>
20409 @@ -34972,7 +35056,7 @@ Domain to not audit.
20410 </param>
20411 <infoflow type="none"/>
20412 </interface>
20413 -<interface name="corenet_relabelto_jabber_client_client_packets" lineno="39723">
20414 +<interface name="corenet_relabelto_jabber_client_client_packets" lineno="39741">
20415 <summary>
20416 Relabel packets to jabber_client_client the packet type.
20417 </summary>
20418 @@ -34982,7 +35066,7 @@ Domain allowed access.
20419 </summary>
20420 </param>
20421 </interface>
20422 -<interface name="corenet_send_jabber_client_server_packets" lineno="39743">
20423 +<interface name="corenet_send_jabber_client_server_packets" lineno="39761">
20424 <summary>
20425 Send jabber_client_server packets.
20426 </summary>
20427 @@ -34993,7 +35077,7 @@ Domain allowed access.
20428 </param>
20429 <infoflow type="write" weight="10"/>
20430 </interface>
20431 -<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="39762">
20432 +<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="39780">
20433 <summary>
20434 Do not audit attempts to send jabber_client_server packets.
20435 </summary>
20436 @@ -35004,7 +35088,7 @@ Domain to not audit.
20437 </param>
20438 <infoflow type="none"/>
20439 </interface>
20440 -<interface name="corenet_receive_jabber_client_server_packets" lineno="39781">
20441 +<interface name="corenet_receive_jabber_client_server_packets" lineno="39799">
20442 <summary>
20443 Receive jabber_client_server packets.
20444 </summary>
20445 @@ -35015,7 +35099,7 @@ Domain allowed access.
20446 </param>
20447 <infoflow type="read" weight="10"/>
20448 </interface>
20449 -<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="39800">
20450 +<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="39818">
20451 <summary>
20452 Do not audit attempts to receive jabber_client_server packets.
20453 </summary>
20454 @@ -35026,7 +35110,7 @@ Domain allowed access.
20455 </param>
20456 <infoflow type="none"/>
20457 </interface>
20458 -<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="39819">
20459 +<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="39837">
20460 <summary>
20461 Send and receive jabber_client_server packets.
20462 </summary>
20463 @@ -35037,7 +35121,7 @@ Domain allowed access.
20464 </param>
20465 <infoflow type="both" weight="10"/>
20466 </interface>
20467 -<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="39835">
20468 +<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="39853">
20469 <summary>
20470 Do not audit attempts to send and receive jabber_client_server packets.
20471 </summary>
20472 @@ -35048,7 +35132,7 @@ Domain to not audit.
20473 </param>
20474 <infoflow type="none"/>
20475 </interface>
20476 -<interface name="corenet_relabelto_jabber_client_server_packets" lineno="39850">
20477 +<interface name="corenet_relabelto_jabber_client_server_packets" lineno="39868">
20478 <summary>
20479 Relabel packets to jabber_client_server the packet type.
20480 </summary>
20481 @@ -35058,7 +35142,7 @@ Domain allowed access.
20482 </summary>
20483 </param>
20484 </interface>
20485 -<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="39872">
20486 +<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="39890">
20487 <summary>
20488 Send and receive TCP traffic on the jabber_interserver port.
20489 </summary>
20490 @@ -35069,7 +35153,7 @@ Domain allowed access.
20491 </param>
20492 <infoflow type="both" weight="10"/>
20493 </interface>
20494 -<interface name="corenet_udp_send_jabber_interserver_port" lineno="39887">
20495 +<interface name="corenet_udp_send_jabber_interserver_port" lineno="39905">
20496 <summary>
20497 Send UDP traffic on the jabber_interserver port.
20498 </summary>
20499 @@ -35080,7 +35164,7 @@ Domain allowed access.
20500 </param>
20501 <infoflow type="write" weight="10"/>
20502 </interface>
20503 -<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="39902">
20504 +<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="39920">
20505 <summary>
20506 Do not audit attempts to send UDP traffic on the jabber_interserver port.
20507 </summary>
20508 @@ -35091,7 +35175,7 @@ Domain to not audit.
20509 </param>
20510 <infoflow type="none"/>
20511 </interface>
20512 -<interface name="corenet_udp_receive_jabber_interserver_port" lineno="39917">
20513 +<interface name="corenet_udp_receive_jabber_interserver_port" lineno="39935">
20514 <summary>
20515 Receive UDP traffic on the jabber_interserver port.
20516 </summary>
20517 @@ -35102,7 +35186,7 @@ Domain allowed access.
20518 </param>
20519 <infoflow type="read" weight="10"/>
20520 </interface>
20521 -<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="39932">
20522 +<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="39950">
20523 <summary>
20524 Do not audit attempts to receive UDP traffic on the jabber_interserver port.
20525 </summary>
20526 @@ -35113,7 +35197,7 @@ Domain to not audit.
20527 </param>
20528 <infoflow type="none"/>
20529 </interface>
20530 -<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="39947">
20531 +<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="39965">
20532 <summary>
20533 Send and receive UDP traffic on the jabber_interserver port.
20534 </summary>
20535 @@ -35124,7 +35208,7 @@ Domain allowed access.
20536 </param>
20537 <infoflow type="both" weight="10"/>
20538 </interface>
20539 -<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="39963">
20540 +<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="39981">
20541 <summary>
20542 Do not audit attempts to send and receive
20543 UDP traffic on the jabber_interserver port.
20544 @@ -35136,7 +35220,7 @@ Domain to not audit.
20545 </param>
20546 <infoflow type="none"/>
20547 </interface>
20548 -<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="39978">
20549 +<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="39996">
20550 <summary>
20551 Bind TCP sockets to the jabber_interserver port.
20552 </summary>
20553 @@ -35147,7 +35231,7 @@ Domain allowed access.
20554 </param>
20555 <infoflow type="none"/>
20556 </interface>
20557 -<interface name="corenet_udp_bind_jabber_interserver_port" lineno="39998">
20558 +<interface name="corenet_udp_bind_jabber_interserver_port" lineno="40016">
20559 <summary>
20560 Bind UDP sockets to the jabber_interserver port.
20561 </summary>
20562 @@ -35158,7 +35242,7 @@ Domain allowed access.
20563 </param>
20564 <infoflow type="none"/>
20565 </interface>
20566 -<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="40017">
20567 +<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="40035">
20568 <summary>
20569 Make a TCP connection to the jabber_interserver port.
20570 </summary>
20571 @@ -35168,7 +35252,7 @@ Domain allowed access.
20572 </summary>
20573 </param>
20574 </interface>
20575 -<interface name="corenet_send_jabber_interserver_client_packets" lineno="40037">
20576 +<interface name="corenet_send_jabber_interserver_client_packets" lineno="40055">
20577 <summary>
20578 Send jabber_interserver_client packets.
20579 </summary>
20580 @@ -35179,7 +35263,7 @@ Domain allowed access.
20581 </param>
20582 <infoflow type="write" weight="10"/>
20583 </interface>
20584 -<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="40056">
20585 +<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="40074">
20586 <summary>
20587 Do not audit attempts to send jabber_interserver_client packets.
20588 </summary>
20589 @@ -35190,7 +35274,7 @@ Domain to not audit.
20590 </param>
20591 <infoflow type="none"/>
20592 </interface>
20593 -<interface name="corenet_receive_jabber_interserver_client_packets" lineno="40075">
20594 +<interface name="corenet_receive_jabber_interserver_client_packets" lineno="40093">
20595 <summary>
20596 Receive jabber_interserver_client packets.
20597 </summary>
20598 @@ -35201,7 +35285,7 @@ Domain allowed access.
20599 </param>
20600 <infoflow type="read" weight="10"/>
20601 </interface>
20602 -<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="40094">
20603 +<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="40112">
20604 <summary>
20605 Do not audit attempts to receive jabber_interserver_client packets.
20606 </summary>
20607 @@ -35212,7 +35296,7 @@ Domain allowed access.
20608 </param>
20609 <infoflow type="none"/>
20610 </interface>
20611 -<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="40113">
20612 +<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="40131">
20613 <summary>
20614 Send and receive jabber_interserver_client packets.
20615 </summary>
20616 @@ -35223,7 +35307,7 @@ Domain allowed access.
20617 </param>
20618 <infoflow type="both" weight="10"/>
20619 </interface>
20620 -<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="40129">
20621 +<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="40147">
20622 <summary>
20623 Do not audit attempts to send and receive jabber_interserver_client packets.
20624 </summary>
20625 @@ -35234,7 +35318,7 @@ Domain to not audit.
20626 </param>
20627 <infoflow type="none"/>
20628 </interface>
20629 -<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="40144">
20630 +<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="40162">
20631 <summary>
20632 Relabel packets to jabber_interserver_client the packet type.
20633 </summary>
20634 @@ -35244,7 +35328,7 @@ Domain allowed access.
20635 </summary>
20636 </param>
20637 </interface>
20638 -<interface name="corenet_send_jabber_interserver_server_packets" lineno="40164">
20639 +<interface name="corenet_send_jabber_interserver_server_packets" lineno="40182">
20640 <summary>
20641 Send jabber_interserver_server packets.
20642 </summary>
20643 @@ -35255,7 +35339,7 @@ Domain allowed access.
20644 </param>
20645 <infoflow type="write" weight="10"/>
20646 </interface>
20647 -<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="40183">
20648 +<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="40201">
20649 <summary>
20650 Do not audit attempts to send jabber_interserver_server packets.
20651 </summary>
20652 @@ -35266,7 +35350,7 @@ Domain to not audit.
20653 </param>
20654 <infoflow type="none"/>
20655 </interface>
20656 -<interface name="corenet_receive_jabber_interserver_server_packets" lineno="40202">
20657 +<interface name="corenet_receive_jabber_interserver_server_packets" lineno="40220">
20658 <summary>
20659 Receive jabber_interserver_server packets.
20660 </summary>
20661 @@ -35277,7 +35361,7 @@ Domain allowed access.
20662 </param>
20663 <infoflow type="read" weight="10"/>
20664 </interface>
20665 -<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="40221">
20666 +<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="40239">
20667 <summary>
20668 Do not audit attempts to receive jabber_interserver_server packets.
20669 </summary>
20670 @@ -35288,7 +35372,7 @@ Domain allowed access.
20671 </param>
20672 <infoflow type="none"/>
20673 </interface>
20674 -<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="40240">
20675 +<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="40258">
20676 <summary>
20677 Send and receive jabber_interserver_server packets.
20678 </summary>
20679 @@ -35299,7 +35383,7 @@ Domain allowed access.
20680 </param>
20681 <infoflow type="both" weight="10"/>
20682 </interface>
20683 -<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="40256">
20684 +<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="40274">
20685 <summary>
20686 Do not audit attempts to send and receive jabber_interserver_server packets.
20687 </summary>
20688 @@ -35310,7 +35394,7 @@ Domain to not audit.
20689 </param>
20690 <infoflow type="none"/>
20691 </interface>
20692 -<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="40271">
20693 +<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="40289">
20694 <summary>
20695 Relabel packets to jabber_interserver_server the packet type.
20696 </summary>
20697 @@ -35320,7 +35404,7 @@ Domain allowed access.
20698 </summary>
20699 </param>
20700 </interface>
20701 -<interface name="corenet_tcp_sendrecv_jboss_iiop_port" lineno="40293">
20702 +<interface name="corenet_tcp_sendrecv_jboss_iiop_port" lineno="40311">
20703 <summary>
20704 Send and receive TCP traffic on the jboss_iiop port.
20705 </summary>
20706 @@ -35331,7 +35415,7 @@ Domain allowed access.
20707 </param>
20708 <infoflow type="both" weight="10"/>
20709 </interface>
20710 -<interface name="corenet_udp_send_jboss_iiop_port" lineno="40308">
20711 +<interface name="corenet_udp_send_jboss_iiop_port" lineno="40326">
20712 <summary>
20713 Send UDP traffic on the jboss_iiop port.
20714 </summary>
20715 @@ -35342,7 +35426,7 @@ Domain allowed access.
20716 </param>
20717 <infoflow type="write" weight="10"/>
20718 </interface>
20719 -<interface name="corenet_dontaudit_udp_send_jboss_iiop_port" lineno="40323">
20720 +<interface name="corenet_dontaudit_udp_send_jboss_iiop_port" lineno="40341">
20721 <summary>
20722 Do not audit attempts to send UDP traffic on the jboss_iiop port.
20723 </summary>
20724 @@ -35353,7 +35437,7 @@ Domain to not audit.
20725 </param>
20726 <infoflow type="none"/>
20727 </interface>
20728 -<interface name="corenet_udp_receive_jboss_iiop_port" lineno="40338">
20729 +<interface name="corenet_udp_receive_jboss_iiop_port" lineno="40356">
20730 <summary>
20731 Receive UDP traffic on the jboss_iiop port.
20732 </summary>
20733 @@ -35364,7 +35448,7 @@ Domain allowed access.
20734 </param>
20735 <infoflow type="read" weight="10"/>
20736 </interface>
20737 -<interface name="corenet_dontaudit_udp_receive_jboss_iiop_port" lineno="40353">
20738 +<interface name="corenet_dontaudit_udp_receive_jboss_iiop_port" lineno="40371">
20739 <summary>
20740 Do not audit attempts to receive UDP traffic on the jboss_iiop port.
20741 </summary>
20742 @@ -35375,7 +35459,7 @@ Domain to not audit.
20743 </param>
20744 <infoflow type="none"/>
20745 </interface>
20746 -<interface name="corenet_udp_sendrecv_jboss_iiop_port" lineno="40368">
20747 +<interface name="corenet_udp_sendrecv_jboss_iiop_port" lineno="40386">
20748 <summary>
20749 Send and receive UDP traffic on the jboss_iiop port.
20750 </summary>
20751 @@ -35386,7 +35470,7 @@ Domain allowed access.
20752 </param>
20753 <infoflow type="both" weight="10"/>
20754 </interface>
20755 -<interface name="corenet_dontaudit_udp_sendrecv_jboss_iiop_port" lineno="40384">
20756 +<interface name="corenet_dontaudit_udp_sendrecv_jboss_iiop_port" lineno="40402">
20757 <summary>
20758 Do not audit attempts to send and receive
20759 UDP traffic on the jboss_iiop port.
20760 @@ -35398,7 +35482,7 @@ Domain to not audit.
20761 </param>
20762 <infoflow type="none"/>
20763 </interface>
20764 -<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="40399">
20765 +<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="40417">
20766 <summary>
20767 Bind TCP sockets to the jboss_iiop port.
20768 </summary>
20769 @@ -35409,7 +35493,7 @@ Domain allowed access.
20770 </param>
20771 <infoflow type="none"/>
20772 </interface>
20773 -<interface name="corenet_udp_bind_jboss_iiop_port" lineno="40419">
20774 +<interface name="corenet_udp_bind_jboss_iiop_port" lineno="40437">
20775 <summary>
20776 Bind UDP sockets to the jboss_iiop port.
20777 </summary>
20778 @@ -35420,7 +35504,7 @@ Domain allowed access.
20779 </param>
20780 <infoflow type="none"/>
20781 </interface>
20782 -<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="40438">
20783 +<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="40456">
20784 <summary>
20785 Make a TCP connection to the jboss_iiop port.
20786 </summary>
20787 @@ -35430,7 +35514,7 @@ Domain allowed access.
20788 </summary>
20789 </param>
20790 </interface>
20791 -<interface name="corenet_send_jboss_iiop_client_packets" lineno="40458">
20792 +<interface name="corenet_send_jboss_iiop_client_packets" lineno="40476">
20793 <summary>
20794 Send jboss_iiop_client packets.
20795 </summary>
20796 @@ -35441,7 +35525,7 @@ Domain allowed access.
20797 </param>
20798 <infoflow type="write" weight="10"/>
20799 </interface>
20800 -<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="40477">
20801 +<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="40495">
20802 <summary>
20803 Do not audit attempts to send jboss_iiop_client packets.
20804 </summary>
20805 @@ -35452,7 +35536,7 @@ Domain to not audit.
20806 </param>
20807 <infoflow type="none"/>
20808 </interface>
20809 -<interface name="corenet_receive_jboss_iiop_client_packets" lineno="40496">
20810 +<interface name="corenet_receive_jboss_iiop_client_packets" lineno="40514">
20811 <summary>
20812 Receive jboss_iiop_client packets.
20813 </summary>
20814 @@ -35463,7 +35547,7 @@ Domain allowed access.
20815 </param>
20816 <infoflow type="read" weight="10"/>
20817 </interface>
20818 -<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="40515">
20819 +<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="40533">
20820 <summary>
20821 Do not audit attempts to receive jboss_iiop_client packets.
20822 </summary>
20823 @@ -35474,7 +35558,7 @@ Domain allowed access.
20824 </param>
20825 <infoflow type="none"/>
20826 </interface>
20827 -<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="40534">
20828 +<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="40552">
20829 <summary>
20830 Send and receive jboss_iiop_client packets.
20831 </summary>
20832 @@ -35485,7 +35569,7 @@ Domain allowed access.
20833 </param>
20834 <infoflow type="both" weight="10"/>
20835 </interface>
20836 -<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="40550">
20837 +<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="40568">
20838 <summary>
20839 Do not audit attempts to send and receive jboss_iiop_client packets.
20840 </summary>
20841 @@ -35496,7 +35580,7 @@ Domain to not audit.
20842 </param>
20843 <infoflow type="none"/>
20844 </interface>
20845 -<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="40565">
20846 +<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="40583">
20847 <summary>
20848 Relabel packets to jboss_iiop_client the packet type.
20849 </summary>
20850 @@ -35506,7 +35590,7 @@ Domain allowed access.
20851 </summary>
20852 </param>
20853 </interface>
20854 -<interface name="corenet_send_jboss_iiop_server_packets" lineno="40585">
20855 +<interface name="corenet_send_jboss_iiop_server_packets" lineno="40603">
20856 <summary>
20857 Send jboss_iiop_server packets.
20858 </summary>
20859 @@ -35517,7 +35601,7 @@ Domain allowed access.
20860 </param>
20861 <infoflow type="write" weight="10"/>
20862 </interface>
20863 -<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="40604">
20864 +<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="40622">
20865 <summary>
20866 Do not audit attempts to send jboss_iiop_server packets.
20867 </summary>
20868 @@ -35528,7 +35612,7 @@ Domain to not audit.
20869 </param>
20870 <infoflow type="none"/>
20871 </interface>
20872 -<interface name="corenet_receive_jboss_iiop_server_packets" lineno="40623">
20873 +<interface name="corenet_receive_jboss_iiop_server_packets" lineno="40641">
20874 <summary>
20875 Receive jboss_iiop_server packets.
20876 </summary>
20877 @@ -35539,7 +35623,7 @@ Domain allowed access.
20878 </param>
20879 <infoflow type="read" weight="10"/>
20880 </interface>
20881 -<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="40642">
20882 +<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="40660">
20883 <summary>
20884 Do not audit attempts to receive jboss_iiop_server packets.
20885 </summary>
20886 @@ -35550,7 +35634,7 @@ Domain allowed access.
20887 </param>
20888 <infoflow type="none"/>
20889 </interface>
20890 -<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="40661">
20891 +<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="40679">
20892 <summary>
20893 Send and receive jboss_iiop_server packets.
20894 </summary>
20895 @@ -35561,7 +35645,7 @@ Domain allowed access.
20896 </param>
20897 <infoflow type="both" weight="10"/>
20898 </interface>
20899 -<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="40677">
20900 +<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="40695">
20901 <summary>
20902 Do not audit attempts to send and receive jboss_iiop_server packets.
20903 </summary>
20904 @@ -35572,7 +35656,7 @@ Domain to not audit.
20905 </param>
20906 <infoflow type="none"/>
20907 </interface>
20908 -<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="40692">
20909 +<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="40710">
20910 <summary>
20911 Relabel packets to jboss_iiop_server the packet type.
20912 </summary>
20913 @@ -35582,7 +35666,7 @@ Domain allowed access.
20914 </summary>
20915 </param>
20916 </interface>
20917 -<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="40714">
20918 +<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="40732">
20919 <summary>
20920 Send and receive TCP traffic on the kerberos port.
20921 </summary>
20922 @@ -35593,7 +35677,7 @@ Domain allowed access.
20923 </param>
20924 <infoflow type="both" weight="10"/>
20925 </interface>
20926 -<interface name="corenet_udp_send_kerberos_port" lineno="40729">
20927 +<interface name="corenet_udp_send_kerberos_port" lineno="40747">
20928 <summary>
20929 Send UDP traffic on the kerberos port.
20930 </summary>
20931 @@ -35604,7 +35688,7 @@ Domain allowed access.
20932 </param>
20933 <infoflow type="write" weight="10"/>
20934 </interface>
20935 -<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="40744">
20936 +<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="40762">
20937 <summary>
20938 Do not audit attempts to send UDP traffic on the kerberos port.
20939 </summary>
20940 @@ -35615,7 +35699,7 @@ Domain to not audit.
20941 </param>
20942 <infoflow type="none"/>
20943 </interface>
20944 -<interface name="corenet_udp_receive_kerberos_port" lineno="40759">
20945 +<interface name="corenet_udp_receive_kerberos_port" lineno="40777">
20946 <summary>
20947 Receive UDP traffic on the kerberos port.
20948 </summary>
20949 @@ -35626,7 +35710,7 @@ Domain allowed access.
20950 </param>
20951 <infoflow type="read" weight="10"/>
20952 </interface>
20953 -<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="40774">
20954 +<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="40792">
20955 <summary>
20956 Do not audit attempts to receive UDP traffic on the kerberos port.
20957 </summary>
20958 @@ -35637,7 +35721,7 @@ Domain to not audit.
20959 </param>
20960 <infoflow type="none"/>
20961 </interface>
20962 -<interface name="corenet_udp_sendrecv_kerberos_port" lineno="40789">
20963 +<interface name="corenet_udp_sendrecv_kerberos_port" lineno="40807">
20964 <summary>
20965 Send and receive UDP traffic on the kerberos port.
20966 </summary>
20967 @@ -35648,7 +35732,7 @@ Domain allowed access.
20968 </param>
20969 <infoflow type="both" weight="10"/>
20970 </interface>
20971 -<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="40805">
20972 +<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="40823">
20973 <summary>
20974 Do not audit attempts to send and receive
20975 UDP traffic on the kerberos port.
20976 @@ -35660,7 +35744,7 @@ Domain to not audit.
20977 </param>
20978 <infoflow type="none"/>
20979 </interface>
20980 -<interface name="corenet_tcp_bind_kerberos_port" lineno="40820">
20981 +<interface name="corenet_tcp_bind_kerberos_port" lineno="40838">
20982 <summary>
20983 Bind TCP sockets to the kerberos port.
20984 </summary>
20985 @@ -35671,7 +35755,7 @@ Domain allowed access.
20986 </param>
20987 <infoflow type="none"/>
20988 </interface>
20989 -<interface name="corenet_udp_bind_kerberos_port" lineno="40840">
20990 +<interface name="corenet_udp_bind_kerberos_port" lineno="40858">
20991 <summary>
20992 Bind UDP sockets to the kerberos port.
20993 </summary>
20994 @@ -35682,7 +35766,7 @@ Domain allowed access.
20995 </param>
20996 <infoflow type="none"/>
20997 </interface>
20998 -<interface name="corenet_tcp_connect_kerberos_port" lineno="40859">
20999 +<interface name="corenet_tcp_connect_kerberos_port" lineno="40877">
21000 <summary>
21001 Make a TCP connection to the kerberos port.
21002 </summary>
21003 @@ -35692,7 +35776,7 @@ Domain allowed access.
21004 </summary>
21005 </param>
21006 </interface>
21007 -<interface name="corenet_send_kerberos_client_packets" lineno="40879">
21008 +<interface name="corenet_send_kerberos_client_packets" lineno="40897">
21009 <summary>
21010 Send kerberos_client packets.
21011 </summary>
21012 @@ -35703,7 +35787,7 @@ Domain allowed access.
21013 </param>
21014 <infoflow type="write" weight="10"/>
21015 </interface>
21016 -<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="40898">
21017 +<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="40916">
21018 <summary>
21019 Do not audit attempts to send kerberos_client packets.
21020 </summary>
21021 @@ -35714,7 +35798,7 @@ Domain to not audit.
21022 </param>
21023 <infoflow type="none"/>
21024 </interface>
21025 -<interface name="corenet_receive_kerberos_client_packets" lineno="40917">
21026 +<interface name="corenet_receive_kerberos_client_packets" lineno="40935">
21027 <summary>
21028 Receive kerberos_client packets.
21029 </summary>
21030 @@ -35725,7 +35809,7 @@ Domain allowed access.
21031 </param>
21032 <infoflow type="read" weight="10"/>
21033 </interface>
21034 -<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="40936">
21035 +<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="40954">
21036 <summary>
21037 Do not audit attempts to receive kerberos_client packets.
21038 </summary>
21039 @@ -35736,7 +35820,7 @@ Domain allowed access.
21040 </param>
21041 <infoflow type="none"/>
21042 </interface>
21043 -<interface name="corenet_sendrecv_kerberos_client_packets" lineno="40955">
21044 +<interface name="corenet_sendrecv_kerberos_client_packets" lineno="40973">
21045 <summary>
21046 Send and receive kerberos_client packets.
21047 </summary>
21048 @@ -35747,7 +35831,7 @@ Domain allowed access.
21049 </param>
21050 <infoflow type="both" weight="10"/>
21051 </interface>
21052 -<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="40971">
21053 +<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="40989">
21054 <summary>
21055 Do not audit attempts to send and receive kerberos_client packets.
21056 </summary>
21057 @@ -35758,7 +35842,7 @@ Domain to not audit.
21058 </param>
21059 <infoflow type="none"/>
21060 </interface>
21061 -<interface name="corenet_relabelto_kerberos_client_packets" lineno="40986">
21062 +<interface name="corenet_relabelto_kerberos_client_packets" lineno="41004">
21063 <summary>
21064 Relabel packets to kerberos_client the packet type.
21065 </summary>
21066 @@ -35768,7 +35852,7 @@ Domain allowed access.
21067 </summary>
21068 </param>
21069 </interface>
21070 -<interface name="corenet_send_kerberos_server_packets" lineno="41006">
21071 +<interface name="corenet_send_kerberos_server_packets" lineno="41024">
21072 <summary>
21073 Send kerberos_server packets.
21074 </summary>
21075 @@ -35779,7 +35863,7 @@ Domain allowed access.
21076 </param>
21077 <infoflow type="write" weight="10"/>
21078 </interface>
21079 -<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="41025">
21080 +<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="41043">
21081 <summary>
21082 Do not audit attempts to send kerberos_server packets.
21083 </summary>
21084 @@ -35790,7 +35874,7 @@ Domain to not audit.
21085 </param>
21086 <infoflow type="none"/>
21087 </interface>
21088 -<interface name="corenet_receive_kerberos_server_packets" lineno="41044">
21089 +<interface name="corenet_receive_kerberos_server_packets" lineno="41062">
21090 <summary>
21091 Receive kerberos_server packets.
21092 </summary>
21093 @@ -35801,7 +35885,7 @@ Domain allowed access.
21094 </param>
21095 <infoflow type="read" weight="10"/>
21096 </interface>
21097 -<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="41063">
21098 +<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="41081">
21099 <summary>
21100 Do not audit attempts to receive kerberos_server packets.
21101 </summary>
21102 @@ -35812,7 +35896,7 @@ Domain allowed access.
21103 </param>
21104 <infoflow type="none"/>
21105 </interface>
21106 -<interface name="corenet_sendrecv_kerberos_server_packets" lineno="41082">
21107 +<interface name="corenet_sendrecv_kerberos_server_packets" lineno="41100">
21108 <summary>
21109 Send and receive kerberos_server packets.
21110 </summary>
21111 @@ -35823,7 +35907,7 @@ Domain allowed access.
21112 </param>
21113 <infoflow type="both" weight="10"/>
21114 </interface>
21115 -<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="41098">
21116 +<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="41116">
21117 <summary>
21118 Do not audit attempts to send and receive kerberos_server packets.
21119 </summary>
21120 @@ -35834,7 +35918,7 @@ Domain to not audit.
21121 </param>
21122 <infoflow type="none"/>
21123 </interface>
21124 -<interface name="corenet_relabelto_kerberos_server_packets" lineno="41113">
21125 +<interface name="corenet_relabelto_kerberos_server_packets" lineno="41131">
21126 <summary>
21127 Relabel packets to kerberos_server the packet type.
21128 </summary>
21129 @@ -35844,7 +35928,7 @@ Domain allowed access.
21130 </summary>
21131 </param>
21132 </interface>
21133 -<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="41135">
21134 +<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="41153">
21135 <summary>
21136 Send and receive TCP traffic on the kerberos_admin port.
21137 </summary>
21138 @@ -35855,7 +35939,7 @@ Domain allowed access.
21139 </param>
21140 <infoflow type="both" weight="10"/>
21141 </interface>
21142 -<interface name="corenet_udp_send_kerberos_admin_port" lineno="41150">
21143 +<interface name="corenet_udp_send_kerberos_admin_port" lineno="41168">
21144 <summary>
21145 Send UDP traffic on the kerberos_admin port.
21146 </summary>
21147 @@ -35866,7 +35950,7 @@ Domain allowed access.
21148 </param>
21149 <infoflow type="write" weight="10"/>
21150 </interface>
21151 -<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="41165">
21152 +<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="41183">
21153 <summary>
21154 Do not audit attempts to send UDP traffic on the kerberos_admin port.
21155 </summary>
21156 @@ -35877,7 +35961,7 @@ Domain to not audit.
21157 </param>
21158 <infoflow type="none"/>
21159 </interface>
21160 -<interface name="corenet_udp_receive_kerberos_admin_port" lineno="41180">
21161 +<interface name="corenet_udp_receive_kerberos_admin_port" lineno="41198">
21162 <summary>
21163 Receive UDP traffic on the kerberos_admin port.
21164 </summary>
21165 @@ -35888,7 +35972,7 @@ Domain allowed access.
21166 </param>
21167 <infoflow type="read" weight="10"/>
21168 </interface>
21169 -<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="41195">
21170 +<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="41213">
21171 <summary>
21172 Do not audit attempts to receive UDP traffic on the kerberos_admin port.
21173 </summary>
21174 @@ -35899,7 +35983,7 @@ Domain to not audit.
21175 </param>
21176 <infoflow type="none"/>
21177 </interface>
21178 -<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="41210">
21179 +<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="41228">
21180 <summary>
21181 Send and receive UDP traffic on the kerberos_admin port.
21182 </summary>
21183 @@ -35910,7 +35994,7 @@ Domain allowed access.
21184 </param>
21185 <infoflow type="both" weight="10"/>
21186 </interface>
21187 -<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="41226">
21188 +<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="41244">
21189 <summary>
21190 Do not audit attempts to send and receive
21191 UDP traffic on the kerberos_admin port.
21192 @@ -35922,7 +36006,7 @@ Domain to not audit.
21193 </param>
21194 <infoflow type="none"/>
21195 </interface>
21196 -<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="41241">
21197 +<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="41259">
21198 <summary>
21199 Bind TCP sockets to the kerberos_admin port.
21200 </summary>
21201 @@ -35933,7 +36017,7 @@ Domain allowed access.
21202 </param>
21203 <infoflow type="none"/>
21204 </interface>
21205 -<interface name="corenet_udp_bind_kerberos_admin_port" lineno="41261">
21206 +<interface name="corenet_udp_bind_kerberos_admin_port" lineno="41279">
21207 <summary>
21208 Bind UDP sockets to the kerberos_admin port.
21209 </summary>
21210 @@ -35944,7 +36028,7 @@ Domain allowed access.
21211 </param>
21212 <infoflow type="none"/>
21213 </interface>
21214 -<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="41280">
21215 +<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="41298">
21216 <summary>
21217 Make a TCP connection to the kerberos_admin port.
21218 </summary>
21219 @@ -35954,7 +36038,7 @@ Domain allowed access.
21220 </summary>
21221 </param>
21222 </interface>
21223 -<interface name="corenet_send_kerberos_admin_client_packets" lineno="41300">
21224 +<interface name="corenet_send_kerberos_admin_client_packets" lineno="41318">
21225 <summary>
21226 Send kerberos_admin_client packets.
21227 </summary>
21228 @@ -35965,7 +36049,7 @@ Domain allowed access.
21229 </param>
21230 <infoflow type="write" weight="10"/>
21231 </interface>
21232 -<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="41319">
21233 +<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="41337">
21234 <summary>
21235 Do not audit attempts to send kerberos_admin_client packets.
21236 </summary>
21237 @@ -35976,7 +36060,7 @@ Domain to not audit.
21238 </param>
21239 <infoflow type="none"/>
21240 </interface>
21241 -<interface name="corenet_receive_kerberos_admin_client_packets" lineno="41338">
21242 +<interface name="corenet_receive_kerberos_admin_client_packets" lineno="41356">
21243 <summary>
21244 Receive kerberos_admin_client packets.
21245 </summary>
21246 @@ -35987,7 +36071,7 @@ Domain allowed access.
21247 </param>
21248 <infoflow type="read" weight="10"/>
21249 </interface>
21250 -<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="41357">
21251 +<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="41375">
21252 <summary>
21253 Do not audit attempts to receive kerberos_admin_client packets.
21254 </summary>
21255 @@ -35998,7 +36082,7 @@ Domain allowed access.
21256 </param>
21257 <infoflow type="none"/>
21258 </interface>
21259 -<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="41376">
21260 +<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="41394">
21261 <summary>
21262 Send and receive kerberos_admin_client packets.
21263 </summary>
21264 @@ -36009,7 +36093,7 @@ Domain allowed access.
21265 </param>
21266 <infoflow type="both" weight="10"/>
21267 </interface>
21268 -<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="41392">
21269 +<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="41410">
21270 <summary>
21271 Do not audit attempts to send and receive kerberos_admin_client packets.
21272 </summary>
21273 @@ -36020,7 +36104,7 @@ Domain to not audit.
21274 </param>
21275 <infoflow type="none"/>
21276 </interface>
21277 -<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="41407">
21278 +<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="41425">
21279 <summary>
21280 Relabel packets to kerberos_admin_client the packet type.
21281 </summary>
21282 @@ -36030,7 +36114,7 @@ Domain allowed access.
21283 </summary>
21284 </param>
21285 </interface>
21286 -<interface name="corenet_send_kerberos_admin_server_packets" lineno="41427">
21287 +<interface name="corenet_send_kerberos_admin_server_packets" lineno="41445">
21288 <summary>
21289 Send kerberos_admin_server packets.
21290 </summary>
21291 @@ -36041,7 +36125,7 @@ Domain allowed access.
21292 </param>
21293 <infoflow type="write" weight="10"/>
21294 </interface>
21295 -<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="41446">
21296 +<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="41464">
21297 <summary>
21298 Do not audit attempts to send kerberos_admin_server packets.
21299 </summary>
21300 @@ -36052,7 +36136,7 @@ Domain to not audit.
21301 </param>
21302 <infoflow type="none"/>
21303 </interface>
21304 -<interface name="corenet_receive_kerberos_admin_server_packets" lineno="41465">
21305 +<interface name="corenet_receive_kerberos_admin_server_packets" lineno="41483">
21306 <summary>
21307 Receive kerberos_admin_server packets.
21308 </summary>
21309 @@ -36063,7 +36147,7 @@ Domain allowed access.
21310 </param>
21311 <infoflow type="read" weight="10"/>
21312 </interface>
21313 -<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="41484">
21314 +<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="41502">
21315 <summary>
21316 Do not audit attempts to receive kerberos_admin_server packets.
21317 </summary>
21318 @@ -36074,7 +36158,7 @@ Domain allowed access.
21319 </param>
21320 <infoflow type="none"/>
21321 </interface>
21322 -<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="41503">
21323 +<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="41521">
21324 <summary>
21325 Send and receive kerberos_admin_server packets.
21326 </summary>
21327 @@ -36085,7 +36169,7 @@ Domain allowed access.
21328 </param>
21329 <infoflow type="both" weight="10"/>
21330 </interface>
21331 -<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="41519">
21332 +<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="41537">
21333 <summary>
21334 Do not audit attempts to send and receive kerberos_admin_server packets.
21335 </summary>
21336 @@ -36096,7 +36180,7 @@ Domain to not audit.
21337 </param>
21338 <infoflow type="none"/>
21339 </interface>
21340 -<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="41534">
21341 +<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="41552">
21342 <summary>
21343 Relabel packets to kerberos_admin_server the packet type.
21344 </summary>
21345 @@ -36106,7 +36190,7 @@ Domain allowed access.
21346 </summary>
21347 </param>
21348 </interface>
21349 -<interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="41556">
21350 +<interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="41574">
21351 <summary>
21352 Send and receive TCP traffic on the kerberos_master port.
21353 </summary>
21354 @@ -36117,7 +36201,7 @@ Domain allowed access.
21355 </param>
21356 <infoflow type="both" weight="10"/>
21357 </interface>
21358 -<interface name="corenet_udp_send_kerberos_master_port" lineno="41571">
21359 +<interface name="corenet_udp_send_kerberos_master_port" lineno="41589">
21360 <summary>
21361 Send UDP traffic on the kerberos_master port.
21362 </summary>
21363 @@ -36128,7 +36212,7 @@ Domain allowed access.
21364 </param>
21365 <infoflow type="write" weight="10"/>
21366 </interface>
21367 -<interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="41586">
21368 +<interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="41604">
21369 <summary>
21370 Do not audit attempts to send UDP traffic on the kerberos_master port.
21371 </summary>
21372 @@ -36139,7 +36223,7 @@ Domain to not audit.
21373 </param>
21374 <infoflow type="none"/>
21375 </interface>
21376 -<interface name="corenet_udp_receive_kerberos_master_port" lineno="41601">
21377 +<interface name="corenet_udp_receive_kerberos_master_port" lineno="41619">
21378 <summary>
21379 Receive UDP traffic on the kerberos_master port.
21380 </summary>
21381 @@ -36150,7 +36234,7 @@ Domain allowed access.
21382 </param>
21383 <infoflow type="read" weight="10"/>
21384 </interface>
21385 -<interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="41616">
21386 +<interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="41634">
21387 <summary>
21388 Do not audit attempts to receive UDP traffic on the kerberos_master port.
21389 </summary>
21390 @@ -36161,7 +36245,7 @@ Domain to not audit.
21391 </param>
21392 <infoflow type="none"/>
21393 </interface>
21394 -<interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="41631">
21395 +<interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="41649">
21396 <summary>
21397 Send and receive UDP traffic on the kerberos_master port.
21398 </summary>
21399 @@ -36172,7 +36256,7 @@ Domain allowed access.
21400 </param>
21401 <infoflow type="both" weight="10"/>
21402 </interface>
21403 -<interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="41647">
21404 +<interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="41665">
21405 <summary>
21406 Do not audit attempts to send and receive
21407 UDP traffic on the kerberos_master port.
21408 @@ -36184,7 +36268,7 @@ Domain to not audit.
21409 </param>
21410 <infoflow type="none"/>
21411 </interface>
21412 -<interface name="corenet_tcp_bind_kerberos_master_port" lineno="41662">
21413 +<interface name="corenet_tcp_bind_kerberos_master_port" lineno="41680">
21414 <summary>
21415 Bind TCP sockets to the kerberos_master port.
21416 </summary>
21417 @@ -36195,7 +36279,7 @@ Domain allowed access.
21418 </param>
21419 <infoflow type="none"/>
21420 </interface>
21421 -<interface name="corenet_udp_bind_kerberos_master_port" lineno="41682">
21422 +<interface name="corenet_udp_bind_kerberos_master_port" lineno="41700">
21423 <summary>
21424 Bind UDP sockets to the kerberos_master port.
21425 </summary>
21426 @@ -36206,7 +36290,7 @@ Domain allowed access.
21427 </param>
21428 <infoflow type="none"/>
21429 </interface>
21430 -<interface name="corenet_tcp_connect_kerberos_master_port" lineno="41701">
21431 +<interface name="corenet_tcp_connect_kerberos_master_port" lineno="41719">
21432 <summary>
21433 Make a TCP connection to the kerberos_master port.
21434 </summary>
21435 @@ -36216,7 +36300,7 @@ Domain allowed access.
21436 </summary>
21437 </param>
21438 </interface>
21439 -<interface name="corenet_send_kerberos_master_client_packets" lineno="41721">
21440 +<interface name="corenet_send_kerberos_master_client_packets" lineno="41739">
21441 <summary>
21442 Send kerberos_master_client packets.
21443 </summary>
21444 @@ -36227,7 +36311,7 @@ Domain allowed access.
21445 </param>
21446 <infoflow type="write" weight="10"/>
21447 </interface>
21448 -<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="41740">
21449 +<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="41758">
21450 <summary>
21451 Do not audit attempts to send kerberos_master_client packets.
21452 </summary>
21453 @@ -36238,7 +36322,7 @@ Domain to not audit.
21454 </param>
21455 <infoflow type="none"/>
21456 </interface>
21457 -<interface name="corenet_receive_kerberos_master_client_packets" lineno="41759">
21458 +<interface name="corenet_receive_kerberos_master_client_packets" lineno="41777">
21459 <summary>
21460 Receive kerberos_master_client packets.
21461 </summary>
21462 @@ -36249,7 +36333,7 @@ Domain allowed access.
21463 </param>
21464 <infoflow type="read" weight="10"/>
21465 </interface>
21466 -<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="41778">
21467 +<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="41796">
21468 <summary>
21469 Do not audit attempts to receive kerberos_master_client packets.
21470 </summary>
21471 @@ -36260,7 +36344,7 @@ Domain allowed access.
21472 </param>
21473 <infoflow type="none"/>
21474 </interface>
21475 -<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="41797">
21476 +<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="41815">
21477 <summary>
21478 Send and receive kerberos_master_client packets.
21479 </summary>
21480 @@ -36271,7 +36355,7 @@ Domain allowed access.
21481 </param>
21482 <infoflow type="both" weight="10"/>
21483 </interface>
21484 -<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="41813">
21485 +<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="41831">
21486 <summary>
21487 Do not audit attempts to send and receive kerberos_master_client packets.
21488 </summary>
21489 @@ -36282,7 +36366,7 @@ Domain to not audit.
21490 </param>
21491 <infoflow type="none"/>
21492 </interface>
21493 -<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="41828">
21494 +<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="41846">
21495 <summary>
21496 Relabel packets to kerberos_master_client the packet type.
21497 </summary>
21498 @@ -36292,7 +36376,7 @@ Domain allowed access.
21499 </summary>
21500 </param>
21501 </interface>
21502 -<interface name="corenet_send_kerberos_master_server_packets" lineno="41848">
21503 +<interface name="corenet_send_kerberos_master_server_packets" lineno="41866">
21504 <summary>
21505 Send kerberos_master_server packets.
21506 </summary>
21507 @@ -36303,7 +36387,7 @@ Domain allowed access.
21508 </param>
21509 <infoflow type="write" weight="10"/>
21510 </interface>
21511 -<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="41867">
21512 +<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="41885">
21513 <summary>
21514 Do not audit attempts to send kerberos_master_server packets.
21515 </summary>
21516 @@ -36314,7 +36398,7 @@ Domain to not audit.
21517 </param>
21518 <infoflow type="none"/>
21519 </interface>
21520 -<interface name="corenet_receive_kerberos_master_server_packets" lineno="41886">
21521 +<interface name="corenet_receive_kerberos_master_server_packets" lineno="41904">
21522 <summary>
21523 Receive kerberos_master_server packets.
21524 </summary>
21525 @@ -36325,7 +36409,7 @@ Domain allowed access.
21526 </param>
21527 <infoflow type="read" weight="10"/>
21528 </interface>
21529 -<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="41905">
21530 +<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="41923">
21531 <summary>
21532 Do not audit attempts to receive kerberos_master_server packets.
21533 </summary>
21534 @@ -36336,7 +36420,7 @@ Domain allowed access.
21535 </param>
21536 <infoflow type="none"/>
21537 </interface>
21538 -<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="41924">
21539 +<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="41942">
21540 <summary>
21541 Send and receive kerberos_master_server packets.
21542 </summary>
21543 @@ -36347,7 +36431,7 @@ Domain allowed access.
21544 </param>
21545 <infoflow type="both" weight="10"/>
21546 </interface>
21547 -<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="41940">
21548 +<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="41958">
21549 <summary>
21550 Do not audit attempts to send and receive kerberos_master_server packets.
21551 </summary>
21552 @@ -36358,7 +36442,7 @@ Domain to not audit.
21553 </param>
21554 <infoflow type="none"/>
21555 </interface>
21556 -<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="41955">
21557 +<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="41973">
21558 <summary>
21559 Relabel packets to kerberos_master_server the packet type.
21560 </summary>
21561 @@ -36368,7 +36452,7 @@ Domain allowed access.
21562 </summary>
21563 </param>
21564 </interface>
21565 -<interface name="corenet_tcp_sendrecv_kismet_port" lineno="41977">
21566 +<interface name="corenet_tcp_sendrecv_kismet_port" lineno="41995">
21567 <summary>
21568 Send and receive TCP traffic on the kismet port.
21569 </summary>
21570 @@ -36379,7 +36463,7 @@ Domain allowed access.
21571 </param>
21572 <infoflow type="both" weight="10"/>
21573 </interface>
21574 -<interface name="corenet_udp_send_kismet_port" lineno="41992">
21575 +<interface name="corenet_udp_send_kismet_port" lineno="42010">
21576 <summary>
21577 Send UDP traffic on the kismet port.
21578 </summary>
21579 @@ -36390,7 +36474,7 @@ Domain allowed access.
21580 </param>
21581 <infoflow type="write" weight="10"/>
21582 </interface>
21583 -<interface name="corenet_dontaudit_udp_send_kismet_port" lineno="42007">
21584 +<interface name="corenet_dontaudit_udp_send_kismet_port" lineno="42025">
21585 <summary>
21586 Do not audit attempts to send UDP traffic on the kismet port.
21587 </summary>
21588 @@ -36401,7 +36485,7 @@ Domain to not audit.
21589 </param>
21590 <infoflow type="none"/>
21591 </interface>
21592 -<interface name="corenet_udp_receive_kismet_port" lineno="42022">
21593 +<interface name="corenet_udp_receive_kismet_port" lineno="42040">
21594 <summary>
21595 Receive UDP traffic on the kismet port.
21596 </summary>
21597 @@ -36412,7 +36496,7 @@ Domain allowed access.
21598 </param>
21599 <infoflow type="read" weight="10"/>
21600 </interface>
21601 -<interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="42037">
21602 +<interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="42055">
21603 <summary>
21604 Do not audit attempts to receive UDP traffic on the kismet port.
21605 </summary>
21606 @@ -36423,7 +36507,7 @@ Domain to not audit.
21607 </param>
21608 <infoflow type="none"/>
21609 </interface>
21610 -<interface name="corenet_udp_sendrecv_kismet_port" lineno="42052">
21611 +<interface name="corenet_udp_sendrecv_kismet_port" lineno="42070">
21612 <summary>
21613 Send and receive UDP traffic on the kismet port.
21614 </summary>
21615 @@ -36434,7 +36518,7 @@ Domain allowed access.
21616 </param>
21617 <infoflow type="both" weight="10"/>
21618 </interface>
21619 -<interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="42068">
21620 +<interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="42086">
21621 <summary>
21622 Do not audit attempts to send and receive
21623 UDP traffic on the kismet port.
21624 @@ -36446,7 +36530,7 @@ Domain to not audit.
21625 </param>
21626 <infoflow type="none"/>
21627 </interface>
21628 -<interface name="corenet_tcp_bind_kismet_port" lineno="42083">
21629 +<interface name="corenet_tcp_bind_kismet_port" lineno="42101">
21630 <summary>
21631 Bind TCP sockets to the kismet port.
21632 </summary>
21633 @@ -36457,7 +36541,7 @@ Domain allowed access.
21634 </param>
21635 <infoflow type="none"/>
21636 </interface>
21637 -<interface name="corenet_udp_bind_kismet_port" lineno="42103">
21638 +<interface name="corenet_udp_bind_kismet_port" lineno="42121">
21639 <summary>
21640 Bind UDP sockets to the kismet port.
21641 </summary>
21642 @@ -36468,7 +36552,7 @@ Domain allowed access.
21643 </param>
21644 <infoflow type="none"/>
21645 </interface>
21646 -<interface name="corenet_tcp_connect_kismet_port" lineno="42122">
21647 +<interface name="corenet_tcp_connect_kismet_port" lineno="42140">
21648 <summary>
21649 Make a TCP connection to the kismet port.
21650 </summary>
21651 @@ -36478,7 +36562,7 @@ Domain allowed access.
21652 </summary>
21653 </param>
21654 </interface>
21655 -<interface name="corenet_send_kismet_client_packets" lineno="42142">
21656 +<interface name="corenet_send_kismet_client_packets" lineno="42160">
21657 <summary>
21658 Send kismet_client packets.
21659 </summary>
21660 @@ -36489,7 +36573,7 @@ Domain allowed access.
21661 </param>
21662 <infoflow type="write" weight="10"/>
21663 </interface>
21664 -<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="42161">
21665 +<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="42179">
21666 <summary>
21667 Do not audit attempts to send kismet_client packets.
21668 </summary>
21669 @@ -36500,7 +36584,7 @@ Domain to not audit.
21670 </param>
21671 <infoflow type="none"/>
21672 </interface>
21673 -<interface name="corenet_receive_kismet_client_packets" lineno="42180">
21674 +<interface name="corenet_receive_kismet_client_packets" lineno="42198">
21675 <summary>
21676 Receive kismet_client packets.
21677 </summary>
21678 @@ -36511,7 +36595,7 @@ Domain allowed access.
21679 </param>
21680 <infoflow type="read" weight="10"/>
21681 </interface>
21682 -<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="42199">
21683 +<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="42217">
21684 <summary>
21685 Do not audit attempts to receive kismet_client packets.
21686 </summary>
21687 @@ -36522,7 +36606,7 @@ Domain allowed access.
21688 </param>
21689 <infoflow type="none"/>
21690 </interface>
21691 -<interface name="corenet_sendrecv_kismet_client_packets" lineno="42218">
21692 +<interface name="corenet_sendrecv_kismet_client_packets" lineno="42236">
21693 <summary>
21694 Send and receive kismet_client packets.
21695 </summary>
21696 @@ -36533,7 +36617,7 @@ Domain allowed access.
21697 </param>
21698 <infoflow type="both" weight="10"/>
21699 </interface>
21700 -<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="42234">
21701 +<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="42252">
21702 <summary>
21703 Do not audit attempts to send and receive kismet_client packets.
21704 </summary>
21705 @@ -36544,7 +36628,7 @@ Domain to not audit.
21706 </param>
21707 <infoflow type="none"/>
21708 </interface>
21709 -<interface name="corenet_relabelto_kismet_client_packets" lineno="42249">
21710 +<interface name="corenet_relabelto_kismet_client_packets" lineno="42267">
21711 <summary>
21712 Relabel packets to kismet_client the packet type.
21713 </summary>
21714 @@ -36554,7 +36638,7 @@ Domain allowed access.
21715 </summary>
21716 </param>
21717 </interface>
21718 -<interface name="corenet_send_kismet_server_packets" lineno="42269">
21719 +<interface name="corenet_send_kismet_server_packets" lineno="42287">
21720 <summary>
21721 Send kismet_server packets.
21722 </summary>
21723 @@ -36565,7 +36649,7 @@ Domain allowed access.
21724 </param>
21725 <infoflow type="write" weight="10"/>
21726 </interface>
21727 -<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="42288">
21728 +<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="42306">
21729 <summary>
21730 Do not audit attempts to send kismet_server packets.
21731 </summary>
21732 @@ -36576,7 +36660,7 @@ Domain to not audit.
21733 </param>
21734 <infoflow type="none"/>
21735 </interface>
21736 -<interface name="corenet_receive_kismet_server_packets" lineno="42307">
21737 +<interface name="corenet_receive_kismet_server_packets" lineno="42325">
21738 <summary>
21739 Receive kismet_server packets.
21740 </summary>
21741 @@ -36587,7 +36671,7 @@ Domain allowed access.
21742 </param>
21743 <infoflow type="read" weight="10"/>
21744 </interface>
21745 -<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="42326">
21746 +<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="42344">
21747 <summary>
21748 Do not audit attempts to receive kismet_server packets.
21749 </summary>
21750 @@ -36598,7 +36682,7 @@ Domain allowed access.
21751 </param>
21752 <infoflow type="none"/>
21753 </interface>
21754 -<interface name="corenet_sendrecv_kismet_server_packets" lineno="42345">
21755 +<interface name="corenet_sendrecv_kismet_server_packets" lineno="42363">
21756 <summary>
21757 Send and receive kismet_server packets.
21758 </summary>
21759 @@ -36609,7 +36693,7 @@ Domain allowed access.
21760 </param>
21761 <infoflow type="both" weight="10"/>
21762 </interface>
21763 -<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="42361">
21764 +<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="42379">
21765 <summary>
21766 Do not audit attempts to send and receive kismet_server packets.
21767 </summary>
21768 @@ -36620,7 +36704,7 @@ Domain to not audit.
21769 </param>
21770 <infoflow type="none"/>
21771 </interface>
21772 -<interface name="corenet_relabelto_kismet_server_packets" lineno="42376">
21773 +<interface name="corenet_relabelto_kismet_server_packets" lineno="42394">
21774 <summary>
21775 Relabel packets to kismet_server the packet type.
21776 </summary>
21777 @@ -36630,7 +36714,7 @@ Domain allowed access.
21778 </summary>
21779 </param>
21780 </interface>
21781 -<interface name="corenet_tcp_sendrecv_kdeconnect_port" lineno="42398">
21782 +<interface name="corenet_tcp_sendrecv_kdeconnect_port" lineno="42416">
21783 <summary>
21784 Send and receive TCP traffic on the kdeconnect port.
21785 </summary>
21786 @@ -36641,7 +36725,7 @@ Domain allowed access.
21787 </param>
21788 <infoflow type="both" weight="10"/>
21789 </interface>
21790 -<interface name="corenet_udp_send_kdeconnect_port" lineno="42413">
21791 +<interface name="corenet_udp_send_kdeconnect_port" lineno="42431">
21792 <summary>
21793 Send UDP traffic on the kdeconnect port.
21794 </summary>
21795 @@ -36652,7 +36736,7 @@ Domain allowed access.
21796 </param>
21797 <infoflow type="write" weight="10"/>
21798 </interface>
21799 -<interface name="corenet_dontaudit_udp_send_kdeconnect_port" lineno="42428">
21800 +<interface name="corenet_dontaudit_udp_send_kdeconnect_port" lineno="42446">
21801 <summary>
21802 Do not audit attempts to send UDP traffic on the kdeconnect port.
21803 </summary>
21804 @@ -36663,7 +36747,7 @@ Domain to not audit.
21805 </param>
21806 <infoflow type="none"/>
21807 </interface>
21808 -<interface name="corenet_udp_receive_kdeconnect_port" lineno="42443">
21809 +<interface name="corenet_udp_receive_kdeconnect_port" lineno="42461">
21810 <summary>
21811 Receive UDP traffic on the kdeconnect port.
21812 </summary>
21813 @@ -36674,7 +36758,7 @@ Domain allowed access.
21814 </param>
21815 <infoflow type="read" weight="10"/>
21816 </interface>
21817 -<interface name="corenet_dontaudit_udp_receive_kdeconnect_port" lineno="42458">
21818 +<interface name="corenet_dontaudit_udp_receive_kdeconnect_port" lineno="42476">
21819 <summary>
21820 Do not audit attempts to receive UDP traffic on the kdeconnect port.
21821 </summary>
21822 @@ -36685,7 +36769,7 @@ Domain to not audit.
21823 </param>
21824 <infoflow type="none"/>
21825 </interface>
21826 -<interface name="corenet_udp_sendrecv_kdeconnect_port" lineno="42473">
21827 +<interface name="corenet_udp_sendrecv_kdeconnect_port" lineno="42491">
21828 <summary>
21829 Send and receive UDP traffic on the kdeconnect port.
21830 </summary>
21831 @@ -36696,7 +36780,7 @@ Domain allowed access.
21832 </param>
21833 <infoflow type="both" weight="10"/>
21834 </interface>
21835 -<interface name="corenet_dontaudit_udp_sendrecv_kdeconnect_port" lineno="42489">
21836 +<interface name="corenet_dontaudit_udp_sendrecv_kdeconnect_port" lineno="42507">
21837 <summary>
21838 Do not audit attempts to send and receive
21839 UDP traffic on the kdeconnect port.
21840 @@ -36708,7 +36792,7 @@ Domain to not audit.
21841 </param>
21842 <infoflow type="none"/>
21843 </interface>
21844 -<interface name="corenet_tcp_bind_kdeconnect_port" lineno="42504">
21845 +<interface name="corenet_tcp_bind_kdeconnect_port" lineno="42522">
21846 <summary>
21847 Bind TCP sockets to the kdeconnect port.
21848 </summary>
21849 @@ -36719,7 +36803,7 @@ Domain allowed access.
21850 </param>
21851 <infoflow type="none"/>
21852 </interface>
21853 -<interface name="corenet_udp_bind_kdeconnect_port" lineno="42524">
21854 +<interface name="corenet_udp_bind_kdeconnect_port" lineno="42542">
21855 <summary>
21856 Bind UDP sockets to the kdeconnect port.
21857 </summary>
21858 @@ -36730,7 +36814,7 @@ Domain allowed access.
21859 </param>
21860 <infoflow type="none"/>
21861 </interface>
21862 -<interface name="corenet_tcp_connect_kdeconnect_port" lineno="42543">
21863 +<interface name="corenet_tcp_connect_kdeconnect_port" lineno="42561">
21864 <summary>
21865 Make a TCP connection to the kdeconnect port.
21866 </summary>
21867 @@ -36740,7 +36824,7 @@ Domain allowed access.
21868 </summary>
21869 </param>
21870 </interface>
21871 -<interface name="corenet_send_kdeconnect_client_packets" lineno="42563">
21872 +<interface name="corenet_send_kdeconnect_client_packets" lineno="42581">
21873 <summary>
21874 Send kdeconnect_client packets.
21875 </summary>
21876 @@ -36751,7 +36835,7 @@ Domain allowed access.
21877 </param>
21878 <infoflow type="write" weight="10"/>
21879 </interface>
21880 -<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="42582">
21881 +<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="42600">
21882 <summary>
21883 Do not audit attempts to send kdeconnect_client packets.
21884 </summary>
21885 @@ -36762,7 +36846,7 @@ Domain to not audit.
21886 </param>
21887 <infoflow type="none"/>
21888 </interface>
21889 -<interface name="corenet_receive_kdeconnect_client_packets" lineno="42601">
21890 +<interface name="corenet_receive_kdeconnect_client_packets" lineno="42619">
21891 <summary>
21892 Receive kdeconnect_client packets.
21893 </summary>
21894 @@ -36773,7 +36857,7 @@ Domain allowed access.
21895 </param>
21896 <infoflow type="read" weight="10"/>
21897 </interface>
21898 -<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="42620">
21899 +<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="42638">
21900 <summary>
21901 Do not audit attempts to receive kdeconnect_client packets.
21902 </summary>
21903 @@ -36784,7 +36868,7 @@ Domain allowed access.
21904 </param>
21905 <infoflow type="none"/>
21906 </interface>
21907 -<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="42639">
21908 +<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="42657">
21909 <summary>
21910 Send and receive kdeconnect_client packets.
21911 </summary>
21912 @@ -36795,7 +36879,7 @@ Domain allowed access.
21913 </param>
21914 <infoflow type="both" weight="10"/>
21915 </interface>
21916 -<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="42655">
21917 +<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="42673">
21918 <summary>
21919 Do not audit attempts to send and receive kdeconnect_client packets.
21920 </summary>
21921 @@ -36806,7 +36890,7 @@ Domain to not audit.
21922 </param>
21923 <infoflow type="none"/>
21924 </interface>
21925 -<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="42670">
21926 +<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="42688">
21927 <summary>
21928 Relabel packets to kdeconnect_client the packet type.
21929 </summary>
21930 @@ -36816,7 +36900,7 @@ Domain allowed access.
21931 </summary>
21932 </param>
21933 </interface>
21934 -<interface name="corenet_send_kdeconnect_server_packets" lineno="42690">
21935 +<interface name="corenet_send_kdeconnect_server_packets" lineno="42708">
21936 <summary>
21937 Send kdeconnect_server packets.
21938 </summary>
21939 @@ -36827,7 +36911,7 @@ Domain allowed access.
21940 </param>
21941 <infoflow type="write" weight="10"/>
21942 </interface>
21943 -<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="42709">
21944 +<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="42727">
21945 <summary>
21946 Do not audit attempts to send kdeconnect_server packets.
21947 </summary>
21948 @@ -36838,7 +36922,7 @@ Domain to not audit.
21949 </param>
21950 <infoflow type="none"/>
21951 </interface>
21952 -<interface name="corenet_receive_kdeconnect_server_packets" lineno="42728">
21953 +<interface name="corenet_receive_kdeconnect_server_packets" lineno="42746">
21954 <summary>
21955 Receive kdeconnect_server packets.
21956 </summary>
21957 @@ -36849,7 +36933,7 @@ Domain allowed access.
21958 </param>
21959 <infoflow type="read" weight="10"/>
21960 </interface>
21961 -<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="42747">
21962 +<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="42765">
21963 <summary>
21964 Do not audit attempts to receive kdeconnect_server packets.
21965 </summary>
21966 @@ -36860,7 +36944,7 @@ Domain allowed access.
21967 </param>
21968 <infoflow type="none"/>
21969 </interface>
21970 -<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="42766">
21971 +<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="42784">
21972 <summary>
21973 Send and receive kdeconnect_server packets.
21974 </summary>
21975 @@ -36871,7 +36955,7 @@ Domain allowed access.
21976 </param>
21977 <infoflow type="both" weight="10"/>
21978 </interface>
21979 -<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="42782">
21980 +<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="42800">
21981 <summary>
21982 Do not audit attempts to send and receive kdeconnect_server packets.
21983 </summary>
21984 @@ -36882,7 +36966,7 @@ Domain to not audit.
21985 </param>
21986 <infoflow type="none"/>
21987 </interface>
21988 -<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="42797">
21989 +<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="42815">
21990 <summary>
21991 Relabel packets to kdeconnect_server the packet type.
21992 </summary>
21993 @@ -36892,7 +36976,7 @@ Domain allowed access.
21994 </summary>
21995 </param>
21996 </interface>
21997 -<interface name="corenet_tcp_sendrecv_kprop_port" lineno="42819">
21998 +<interface name="corenet_tcp_sendrecv_kprop_port" lineno="42837">
21999 <summary>
22000 Send and receive TCP traffic on the kprop port.
22001 </summary>
22002 @@ -36903,7 +36987,7 @@ Domain allowed access.
22003 </param>
22004 <infoflow type="both" weight="10"/>
22005 </interface>
22006 -<interface name="corenet_udp_send_kprop_port" lineno="42834">
22007 +<interface name="corenet_udp_send_kprop_port" lineno="42852">
22008 <summary>
22009 Send UDP traffic on the kprop port.
22010 </summary>
22011 @@ -36914,7 +36998,7 @@ Domain allowed access.
22012 </param>
22013 <infoflow type="write" weight="10"/>
22014 </interface>
22015 -<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="42849">
22016 +<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="42867">
22017 <summary>
22018 Do not audit attempts to send UDP traffic on the kprop port.
22019 </summary>
22020 @@ -36925,7 +37009,7 @@ Domain to not audit.
22021 </param>
22022 <infoflow type="none"/>
22023 </interface>
22024 -<interface name="corenet_udp_receive_kprop_port" lineno="42864">
22025 +<interface name="corenet_udp_receive_kprop_port" lineno="42882">
22026 <summary>
22027 Receive UDP traffic on the kprop port.
22028 </summary>
22029 @@ -36936,7 +37020,7 @@ Domain allowed access.
22030 </param>
22031 <infoflow type="read" weight="10"/>
22032 </interface>
22033 -<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="42879">
22034 +<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="42897">
22035 <summary>
22036 Do not audit attempts to receive UDP traffic on the kprop port.
22037 </summary>
22038 @@ -36947,7 +37031,7 @@ Domain to not audit.
22039 </param>
22040 <infoflow type="none"/>
22041 </interface>
22042 -<interface name="corenet_udp_sendrecv_kprop_port" lineno="42894">
22043 +<interface name="corenet_udp_sendrecv_kprop_port" lineno="42912">
22044 <summary>
22045 Send and receive UDP traffic on the kprop port.
22046 </summary>
22047 @@ -36958,7 +37042,7 @@ Domain allowed access.
22048 </param>
22049 <infoflow type="both" weight="10"/>
22050 </interface>
22051 -<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="42910">
22052 +<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="42928">
22053 <summary>
22054 Do not audit attempts to send and receive
22055 UDP traffic on the kprop port.
22056 @@ -36970,7 +37054,7 @@ Domain to not audit.
22057 </param>
22058 <infoflow type="none"/>
22059 </interface>
22060 -<interface name="corenet_tcp_bind_kprop_port" lineno="42925">
22061 +<interface name="corenet_tcp_bind_kprop_port" lineno="42943">
22062 <summary>
22063 Bind TCP sockets to the kprop port.
22064 </summary>
22065 @@ -36981,7 +37065,7 @@ Domain allowed access.
22066 </param>
22067 <infoflow type="none"/>
22068 </interface>
22069 -<interface name="corenet_udp_bind_kprop_port" lineno="42945">
22070 +<interface name="corenet_udp_bind_kprop_port" lineno="42963">
22071 <summary>
22072 Bind UDP sockets to the kprop port.
22073 </summary>
22074 @@ -36992,7 +37076,7 @@ Domain allowed access.
22075 </param>
22076 <infoflow type="none"/>
22077 </interface>
22078 -<interface name="corenet_tcp_connect_kprop_port" lineno="42964">
22079 +<interface name="corenet_tcp_connect_kprop_port" lineno="42982">
22080 <summary>
22081 Make a TCP connection to the kprop port.
22082 </summary>
22083 @@ -37002,7 +37086,7 @@ Domain allowed access.
22084 </summary>
22085 </param>
22086 </interface>
22087 -<interface name="corenet_send_kprop_client_packets" lineno="42984">
22088 +<interface name="corenet_send_kprop_client_packets" lineno="43002">
22089 <summary>
22090 Send kprop_client packets.
22091 </summary>
22092 @@ -37013,7 +37097,7 @@ Domain allowed access.
22093 </param>
22094 <infoflow type="write" weight="10"/>
22095 </interface>
22096 -<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="43003">
22097 +<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="43021">
22098 <summary>
22099 Do not audit attempts to send kprop_client packets.
22100 </summary>
22101 @@ -37024,7 +37108,7 @@ Domain to not audit.
22102 </param>
22103 <infoflow type="none"/>
22104 </interface>
22105 -<interface name="corenet_receive_kprop_client_packets" lineno="43022">
22106 +<interface name="corenet_receive_kprop_client_packets" lineno="43040">
22107 <summary>
22108 Receive kprop_client packets.
22109 </summary>
22110 @@ -37035,7 +37119,7 @@ Domain allowed access.
22111 </param>
22112 <infoflow type="read" weight="10"/>
22113 </interface>
22114 -<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="43041">
22115 +<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="43059">
22116 <summary>
22117 Do not audit attempts to receive kprop_client packets.
22118 </summary>
22119 @@ -37046,7 +37130,7 @@ Domain allowed access.
22120 </param>
22121 <infoflow type="none"/>
22122 </interface>
22123 -<interface name="corenet_sendrecv_kprop_client_packets" lineno="43060">
22124 +<interface name="corenet_sendrecv_kprop_client_packets" lineno="43078">
22125 <summary>
22126 Send and receive kprop_client packets.
22127 </summary>
22128 @@ -37057,7 +37141,7 @@ Domain allowed access.
22129 </param>
22130 <infoflow type="both" weight="10"/>
22131 </interface>
22132 -<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="43076">
22133 +<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="43094">
22134 <summary>
22135 Do not audit attempts to send and receive kprop_client packets.
22136 </summary>
22137 @@ -37068,7 +37152,7 @@ Domain to not audit.
22138 </param>
22139 <infoflow type="none"/>
22140 </interface>
22141 -<interface name="corenet_relabelto_kprop_client_packets" lineno="43091">
22142 +<interface name="corenet_relabelto_kprop_client_packets" lineno="43109">
22143 <summary>
22144 Relabel packets to kprop_client the packet type.
22145 </summary>
22146 @@ -37078,7 +37162,7 @@ Domain allowed access.
22147 </summary>
22148 </param>
22149 </interface>
22150 -<interface name="corenet_send_kprop_server_packets" lineno="43111">
22151 +<interface name="corenet_send_kprop_server_packets" lineno="43129">
22152 <summary>
22153 Send kprop_server packets.
22154 </summary>
22155 @@ -37089,7 +37173,7 @@ Domain allowed access.
22156 </param>
22157 <infoflow type="write" weight="10"/>
22158 </interface>
22159 -<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="43130">
22160 +<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="43148">
22161 <summary>
22162 Do not audit attempts to send kprop_server packets.
22163 </summary>
22164 @@ -37100,7 +37184,7 @@ Domain to not audit.
22165 </param>
22166 <infoflow type="none"/>
22167 </interface>
22168 -<interface name="corenet_receive_kprop_server_packets" lineno="43149">
22169 +<interface name="corenet_receive_kprop_server_packets" lineno="43167">
22170 <summary>
22171 Receive kprop_server packets.
22172 </summary>
22173 @@ -37111,7 +37195,7 @@ Domain allowed access.
22174 </param>
22175 <infoflow type="read" weight="10"/>
22176 </interface>
22177 -<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="43168">
22178 +<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="43186">
22179 <summary>
22180 Do not audit attempts to receive kprop_server packets.
22181 </summary>
22182 @@ -37122,7 +37206,7 @@ Domain allowed access.
22183 </param>
22184 <infoflow type="none"/>
22185 </interface>
22186 -<interface name="corenet_sendrecv_kprop_server_packets" lineno="43187">
22187 +<interface name="corenet_sendrecv_kprop_server_packets" lineno="43205">
22188 <summary>
22189 Send and receive kprop_server packets.
22190 </summary>
22191 @@ -37133,7 +37217,7 @@ Domain allowed access.
22192 </param>
22193 <infoflow type="both" weight="10"/>
22194 </interface>
22195 -<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="43203">
22196 +<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="43221">
22197 <summary>
22198 Do not audit attempts to send and receive kprop_server packets.
22199 </summary>
22200 @@ -37144,7 +37228,7 @@ Domain to not audit.
22201 </param>
22202 <infoflow type="none"/>
22203 </interface>
22204 -<interface name="corenet_relabelto_kprop_server_packets" lineno="43218">
22205 +<interface name="corenet_relabelto_kprop_server_packets" lineno="43236">
22206 <summary>
22207 Relabel packets to kprop_server the packet type.
22208 </summary>
22209 @@ -37154,7 +37238,7 @@ Domain allowed access.
22210 </summary>
22211 </param>
22212 </interface>
22213 -<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="43240">
22214 +<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="43258">
22215 <summary>
22216 Send and receive TCP traffic on the ktalkd port.
22217 </summary>
22218 @@ -37165,7 +37249,7 @@ Domain allowed access.
22219 </param>
22220 <infoflow type="both" weight="10"/>
22221 </interface>
22222 -<interface name="corenet_udp_send_ktalkd_port" lineno="43255">
22223 +<interface name="corenet_udp_send_ktalkd_port" lineno="43273">
22224 <summary>
22225 Send UDP traffic on the ktalkd port.
22226 </summary>
22227 @@ -37176,7 +37260,7 @@ Domain allowed access.
22228 </param>
22229 <infoflow type="write" weight="10"/>
22230 </interface>
22231 -<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="43270">
22232 +<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="43288">
22233 <summary>
22234 Do not audit attempts to send UDP traffic on the ktalkd port.
22235 </summary>
22236 @@ -37187,7 +37271,7 @@ Domain to not audit.
22237 </param>
22238 <infoflow type="none"/>
22239 </interface>
22240 -<interface name="corenet_udp_receive_ktalkd_port" lineno="43285">
22241 +<interface name="corenet_udp_receive_ktalkd_port" lineno="43303">
22242 <summary>
22243 Receive UDP traffic on the ktalkd port.
22244 </summary>
22245 @@ -37198,7 +37282,7 @@ Domain allowed access.
22246 </param>
22247 <infoflow type="read" weight="10"/>
22248 </interface>
22249 -<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="43300">
22250 +<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="43318">
22251 <summary>
22252 Do not audit attempts to receive UDP traffic on the ktalkd port.
22253 </summary>
22254 @@ -37209,7 +37293,7 @@ Domain to not audit.
22255 </param>
22256 <infoflow type="none"/>
22257 </interface>
22258 -<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="43315">
22259 +<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="43333">
22260 <summary>
22261 Send and receive UDP traffic on the ktalkd port.
22262 </summary>
22263 @@ -37220,7 +37304,7 @@ Domain allowed access.
22264 </param>
22265 <infoflow type="both" weight="10"/>
22266 </interface>
22267 -<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="43331">
22268 +<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="43349">
22269 <summary>
22270 Do not audit attempts to send and receive
22271 UDP traffic on the ktalkd port.
22272 @@ -37232,7 +37316,7 @@ Domain to not audit.
22273 </param>
22274 <infoflow type="none"/>
22275 </interface>
22276 -<interface name="corenet_tcp_bind_ktalkd_port" lineno="43346">
22277 +<interface name="corenet_tcp_bind_ktalkd_port" lineno="43364">
22278 <summary>
22279 Bind TCP sockets to the ktalkd port.
22280 </summary>
22281 @@ -37243,7 +37327,7 @@ Domain allowed access.
22282 </param>
22283 <infoflow type="none"/>
22284 </interface>
22285 -<interface name="corenet_udp_bind_ktalkd_port" lineno="43366">
22286 +<interface name="corenet_udp_bind_ktalkd_port" lineno="43384">
22287 <summary>
22288 Bind UDP sockets to the ktalkd port.
22289 </summary>
22290 @@ -37254,7 +37338,7 @@ Domain allowed access.
22291 </param>
22292 <infoflow type="none"/>
22293 </interface>
22294 -<interface name="corenet_tcp_connect_ktalkd_port" lineno="43385">
22295 +<interface name="corenet_tcp_connect_ktalkd_port" lineno="43403">
22296 <summary>
22297 Make a TCP connection to the ktalkd port.
22298 </summary>
22299 @@ -37264,7 +37348,7 @@ Domain allowed access.
22300 </summary>
22301 </param>
22302 </interface>
22303 -<interface name="corenet_send_ktalkd_client_packets" lineno="43405">
22304 +<interface name="corenet_send_ktalkd_client_packets" lineno="43423">
22305 <summary>
22306 Send ktalkd_client packets.
22307 </summary>
22308 @@ -37275,7 +37359,7 @@ Domain allowed access.
22309 </param>
22310 <infoflow type="write" weight="10"/>
22311 </interface>
22312 -<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="43424">
22313 +<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="43442">
22314 <summary>
22315 Do not audit attempts to send ktalkd_client packets.
22316 </summary>
22317 @@ -37286,7 +37370,7 @@ Domain to not audit.
22318 </param>
22319 <infoflow type="none"/>
22320 </interface>
22321 -<interface name="corenet_receive_ktalkd_client_packets" lineno="43443">
22322 +<interface name="corenet_receive_ktalkd_client_packets" lineno="43461">
22323 <summary>
22324 Receive ktalkd_client packets.
22325 </summary>
22326 @@ -37297,7 +37381,7 @@ Domain allowed access.
22327 </param>
22328 <infoflow type="read" weight="10"/>
22329 </interface>
22330 -<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="43462">
22331 +<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="43480">
22332 <summary>
22333 Do not audit attempts to receive ktalkd_client packets.
22334 </summary>
22335 @@ -37308,7 +37392,7 @@ Domain allowed access.
22336 </param>
22337 <infoflow type="none"/>
22338 </interface>
22339 -<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="43481">
22340 +<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="43499">
22341 <summary>
22342 Send and receive ktalkd_client packets.
22343 </summary>
22344 @@ -37319,7 +37403,7 @@ Domain allowed access.
22345 </param>
22346 <infoflow type="both" weight="10"/>
22347 </interface>
22348 -<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="43497">
22349 +<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="43515">
22350 <summary>
22351 Do not audit attempts to send and receive ktalkd_client packets.
22352 </summary>
22353 @@ -37330,7 +37414,7 @@ Domain to not audit.
22354 </param>
22355 <infoflow type="none"/>
22356 </interface>
22357 -<interface name="corenet_relabelto_ktalkd_client_packets" lineno="43512">
22358 +<interface name="corenet_relabelto_ktalkd_client_packets" lineno="43530">
22359 <summary>
22360 Relabel packets to ktalkd_client the packet type.
22361 </summary>
22362 @@ -37340,7 +37424,7 @@ Domain allowed access.
22363 </summary>
22364 </param>
22365 </interface>
22366 -<interface name="corenet_send_ktalkd_server_packets" lineno="43532">
22367 +<interface name="corenet_send_ktalkd_server_packets" lineno="43550">
22368 <summary>
22369 Send ktalkd_server packets.
22370 </summary>
22371 @@ -37351,7 +37435,7 @@ Domain allowed access.
22372 </param>
22373 <infoflow type="write" weight="10"/>
22374 </interface>
22375 -<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="43551">
22376 +<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="43569">
22377 <summary>
22378 Do not audit attempts to send ktalkd_server packets.
22379 </summary>
22380 @@ -37362,7 +37446,7 @@ Domain to not audit.
22381 </param>
22382 <infoflow type="none"/>
22383 </interface>
22384 -<interface name="corenet_receive_ktalkd_server_packets" lineno="43570">
22385 +<interface name="corenet_receive_ktalkd_server_packets" lineno="43588">
22386 <summary>
22387 Receive ktalkd_server packets.
22388 </summary>
22389 @@ -37373,7 +37457,7 @@ Domain allowed access.
22390 </param>
22391 <infoflow type="read" weight="10"/>
22392 </interface>
22393 -<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="43589">
22394 +<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="43607">
22395 <summary>
22396 Do not audit attempts to receive ktalkd_server packets.
22397 </summary>
22398 @@ -37384,7 +37468,7 @@ Domain allowed access.
22399 </param>
22400 <infoflow type="none"/>
22401 </interface>
22402 -<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="43608">
22403 +<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="43626">
22404 <summary>
22405 Send and receive ktalkd_server packets.
22406 </summary>
22407 @@ -37395,7 +37479,7 @@ Domain allowed access.
22408 </param>
22409 <infoflow type="both" weight="10"/>
22410 </interface>
22411 -<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="43624">
22412 +<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="43642">
22413 <summary>
22414 Do not audit attempts to send and receive ktalkd_server packets.
22415 </summary>
22416 @@ -37406,7 +37490,7 @@ Domain to not audit.
22417 </param>
22418 <infoflow type="none"/>
22419 </interface>
22420 -<interface name="corenet_relabelto_ktalkd_server_packets" lineno="43639">
22421 +<interface name="corenet_relabelto_ktalkd_server_packets" lineno="43657">
22422 <summary>
22423 Relabel packets to ktalkd_server the packet type.
22424 </summary>
22425 @@ -37416,7 +37500,7 @@ Domain allowed access.
22426 </summary>
22427 </param>
22428 </interface>
22429 -<interface name="corenet_tcp_sendrecv_l2tp_port" lineno="43661">
22430 +<interface name="corenet_tcp_sendrecv_l2tp_port" lineno="43679">
22431 <summary>
22432 Send and receive TCP traffic on the l2tp port.
22433 </summary>
22434 @@ -37427,7 +37511,7 @@ Domain allowed access.
22435 </param>
22436 <infoflow type="both" weight="10"/>
22437 </interface>
22438 -<interface name="corenet_udp_send_l2tp_port" lineno="43676">
22439 +<interface name="corenet_udp_send_l2tp_port" lineno="43694">
22440 <summary>
22441 Send UDP traffic on the l2tp port.
22442 </summary>
22443 @@ -37438,7 +37522,7 @@ Domain allowed access.
22444 </param>
22445 <infoflow type="write" weight="10"/>
22446 </interface>
22447 -<interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="43691">
22448 +<interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="43709">
22449 <summary>
22450 Do not audit attempts to send UDP traffic on the l2tp port.
22451 </summary>
22452 @@ -37449,7 +37533,7 @@ Domain to not audit.
22453 </param>
22454 <infoflow type="none"/>
22455 </interface>
22456 -<interface name="corenet_udp_receive_l2tp_port" lineno="43706">
22457 +<interface name="corenet_udp_receive_l2tp_port" lineno="43724">
22458 <summary>
22459 Receive UDP traffic on the l2tp port.
22460 </summary>
22461 @@ -37460,7 +37544,7 @@ Domain allowed access.
22462 </param>
22463 <infoflow type="read" weight="10"/>
22464 </interface>
22465 -<interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="43721">
22466 +<interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="43739">
22467 <summary>
22468 Do not audit attempts to receive UDP traffic on the l2tp port.
22469 </summary>
22470 @@ -37471,7 +37555,7 @@ Domain to not audit.
22471 </param>
22472 <infoflow type="none"/>
22473 </interface>
22474 -<interface name="corenet_udp_sendrecv_l2tp_port" lineno="43736">
22475 +<interface name="corenet_udp_sendrecv_l2tp_port" lineno="43754">
22476 <summary>
22477 Send and receive UDP traffic on the l2tp port.
22478 </summary>
22479 @@ -37482,7 +37566,7 @@ Domain allowed access.
22480 </param>
22481 <infoflow type="both" weight="10"/>
22482 </interface>
22483 -<interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="43752">
22484 +<interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="43770">
22485 <summary>
22486 Do not audit attempts to send and receive
22487 UDP traffic on the l2tp port.
22488 @@ -37494,7 +37578,7 @@ Domain to not audit.
22489 </param>
22490 <infoflow type="none"/>
22491 </interface>
22492 -<interface name="corenet_tcp_bind_l2tp_port" lineno="43767">
22493 +<interface name="corenet_tcp_bind_l2tp_port" lineno="43785">
22494 <summary>
22495 Bind TCP sockets to the l2tp port.
22496 </summary>
22497 @@ -37505,7 +37589,7 @@ Domain allowed access.
22498 </param>
22499 <infoflow type="none"/>
22500 </interface>
22501 -<interface name="corenet_udp_bind_l2tp_port" lineno="43787">
22502 +<interface name="corenet_udp_bind_l2tp_port" lineno="43805">
22503 <summary>
22504 Bind UDP sockets to the l2tp port.
22505 </summary>
22506 @@ -37516,7 +37600,7 @@ Domain allowed access.
22507 </param>
22508 <infoflow type="none"/>
22509 </interface>
22510 -<interface name="corenet_tcp_connect_l2tp_port" lineno="43806">
22511 +<interface name="corenet_tcp_connect_l2tp_port" lineno="43824">
22512 <summary>
22513 Make a TCP connection to the l2tp port.
22514 </summary>
22515 @@ -37526,7 +37610,7 @@ Domain allowed access.
22516 </summary>
22517 </param>
22518 </interface>
22519 -<interface name="corenet_send_l2tp_client_packets" lineno="43826">
22520 +<interface name="corenet_send_l2tp_client_packets" lineno="43844">
22521 <summary>
22522 Send l2tp_client packets.
22523 </summary>
22524 @@ -37537,7 +37621,7 @@ Domain allowed access.
22525 </param>
22526 <infoflow type="write" weight="10"/>
22527 </interface>
22528 -<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="43845">
22529 +<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="43863">
22530 <summary>
22531 Do not audit attempts to send l2tp_client packets.
22532 </summary>
22533 @@ -37548,7 +37632,7 @@ Domain to not audit.
22534 </param>
22535 <infoflow type="none"/>
22536 </interface>
22537 -<interface name="corenet_receive_l2tp_client_packets" lineno="43864">
22538 +<interface name="corenet_receive_l2tp_client_packets" lineno="43882">
22539 <summary>
22540 Receive l2tp_client packets.
22541 </summary>
22542 @@ -37559,7 +37643,7 @@ Domain allowed access.
22543 </param>
22544 <infoflow type="read" weight="10"/>
22545 </interface>
22546 -<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="43883">
22547 +<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="43901">
22548 <summary>
22549 Do not audit attempts to receive l2tp_client packets.
22550 </summary>
22551 @@ -37570,7 +37654,7 @@ Domain allowed access.
22552 </param>
22553 <infoflow type="none"/>
22554 </interface>
22555 -<interface name="corenet_sendrecv_l2tp_client_packets" lineno="43902">
22556 +<interface name="corenet_sendrecv_l2tp_client_packets" lineno="43920">
22557 <summary>
22558 Send and receive l2tp_client packets.
22559 </summary>
22560 @@ -37581,7 +37665,7 @@ Domain allowed access.
22561 </param>
22562 <infoflow type="both" weight="10"/>
22563 </interface>
22564 -<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="43918">
22565 +<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="43936">
22566 <summary>
22567 Do not audit attempts to send and receive l2tp_client packets.
22568 </summary>
22569 @@ -37592,7 +37676,7 @@ Domain to not audit.
22570 </param>
22571 <infoflow type="none"/>
22572 </interface>
22573 -<interface name="corenet_relabelto_l2tp_client_packets" lineno="43933">
22574 +<interface name="corenet_relabelto_l2tp_client_packets" lineno="43951">
22575 <summary>
22576 Relabel packets to l2tp_client the packet type.
22577 </summary>
22578 @@ -37602,7 +37686,7 @@ Domain allowed access.
22579 </summary>
22580 </param>
22581 </interface>
22582 -<interface name="corenet_send_l2tp_server_packets" lineno="43953">
22583 +<interface name="corenet_send_l2tp_server_packets" lineno="43971">
22584 <summary>
22585 Send l2tp_server packets.
22586 </summary>
22587 @@ -37613,7 +37697,7 @@ Domain allowed access.
22588 </param>
22589 <infoflow type="write" weight="10"/>
22590 </interface>
22591 -<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="43972">
22592 +<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="43990">
22593 <summary>
22594 Do not audit attempts to send l2tp_server packets.
22595 </summary>
22596 @@ -37624,7 +37708,7 @@ Domain to not audit.
22597 </param>
22598 <infoflow type="none"/>
22599 </interface>
22600 -<interface name="corenet_receive_l2tp_server_packets" lineno="43991">
22601 +<interface name="corenet_receive_l2tp_server_packets" lineno="44009">
22602 <summary>
22603 Receive l2tp_server packets.
22604 </summary>
22605 @@ -37635,7 +37719,7 @@ Domain allowed access.
22606 </param>
22607 <infoflow type="read" weight="10"/>
22608 </interface>
22609 -<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="44010">
22610 +<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="44028">
22611 <summary>
22612 Do not audit attempts to receive l2tp_server packets.
22613 </summary>
22614 @@ -37646,7 +37730,7 @@ Domain allowed access.
22615 </param>
22616 <infoflow type="none"/>
22617 </interface>
22618 -<interface name="corenet_sendrecv_l2tp_server_packets" lineno="44029">
22619 +<interface name="corenet_sendrecv_l2tp_server_packets" lineno="44047">
22620 <summary>
22621 Send and receive l2tp_server packets.
22622 </summary>
22623 @@ -37657,7 +37741,7 @@ Domain allowed access.
22624 </param>
22625 <infoflow type="both" weight="10"/>
22626 </interface>
22627 -<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="44045">
22628 +<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="44063">
22629 <summary>
22630 Do not audit attempts to send and receive l2tp_server packets.
22631 </summary>
22632 @@ -37668,7 +37752,7 @@ Domain to not audit.
22633 </param>
22634 <infoflow type="none"/>
22635 </interface>
22636 -<interface name="corenet_relabelto_l2tp_server_packets" lineno="44060">
22637 +<interface name="corenet_relabelto_l2tp_server_packets" lineno="44078">
22638 <summary>
22639 Relabel packets to l2tp_server the packet type.
22640 </summary>
22641 @@ -37678,7 +37762,7 @@ Domain allowed access.
22642 </summary>
22643 </param>
22644 </interface>
22645 -<interface name="corenet_tcp_sendrecv_ldap_port" lineno="44082">
22646 +<interface name="corenet_tcp_sendrecv_ldap_port" lineno="44100">
22647 <summary>
22648 Send and receive TCP traffic on the ldap port.
22649 </summary>
22650 @@ -37689,7 +37773,7 @@ Domain allowed access.
22651 </param>
22652 <infoflow type="both" weight="10"/>
22653 </interface>
22654 -<interface name="corenet_udp_send_ldap_port" lineno="44097">
22655 +<interface name="corenet_udp_send_ldap_port" lineno="44115">
22656 <summary>
22657 Send UDP traffic on the ldap port.
22658 </summary>
22659 @@ -37700,7 +37784,7 @@ Domain allowed access.
22660 </param>
22661 <infoflow type="write" weight="10"/>
22662 </interface>
22663 -<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="44112">
22664 +<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="44130">
22665 <summary>
22666 Do not audit attempts to send UDP traffic on the ldap port.
22667 </summary>
22668 @@ -37711,7 +37795,7 @@ Domain to not audit.
22669 </param>
22670 <infoflow type="none"/>
22671 </interface>
22672 -<interface name="corenet_udp_receive_ldap_port" lineno="44127">
22673 +<interface name="corenet_udp_receive_ldap_port" lineno="44145">
22674 <summary>
22675 Receive UDP traffic on the ldap port.
22676 </summary>
22677 @@ -37722,7 +37806,7 @@ Domain allowed access.
22678 </param>
22679 <infoflow type="read" weight="10"/>
22680 </interface>
22681 -<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="44142">
22682 +<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="44160">
22683 <summary>
22684 Do not audit attempts to receive UDP traffic on the ldap port.
22685 </summary>
22686 @@ -37733,7 +37817,7 @@ Domain to not audit.
22687 </param>
22688 <infoflow type="none"/>
22689 </interface>
22690 -<interface name="corenet_udp_sendrecv_ldap_port" lineno="44157">
22691 +<interface name="corenet_udp_sendrecv_ldap_port" lineno="44175">
22692 <summary>
22693 Send and receive UDP traffic on the ldap port.
22694 </summary>
22695 @@ -37744,7 +37828,7 @@ Domain allowed access.
22696 </param>
22697 <infoflow type="both" weight="10"/>
22698 </interface>
22699 -<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="44173">
22700 +<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="44191">
22701 <summary>
22702 Do not audit attempts to send and receive
22703 UDP traffic on the ldap port.
22704 @@ -37756,7 +37840,7 @@ Domain to not audit.
22705 </param>
22706 <infoflow type="none"/>
22707 </interface>
22708 -<interface name="corenet_tcp_bind_ldap_port" lineno="44188">
22709 +<interface name="corenet_tcp_bind_ldap_port" lineno="44206">
22710 <summary>
22711 Bind TCP sockets to the ldap port.
22712 </summary>
22713 @@ -37767,7 +37851,7 @@ Domain allowed access.
22714 </param>
22715 <infoflow type="none"/>
22716 </interface>
22717 -<interface name="corenet_udp_bind_ldap_port" lineno="44208">
22718 +<interface name="corenet_udp_bind_ldap_port" lineno="44226">
22719 <summary>
22720 Bind UDP sockets to the ldap port.
22721 </summary>
22722 @@ -37778,7 +37862,7 @@ Domain allowed access.
22723 </param>
22724 <infoflow type="none"/>
22725 </interface>
22726 -<interface name="corenet_tcp_connect_ldap_port" lineno="44227">
22727 +<interface name="corenet_tcp_connect_ldap_port" lineno="44245">
22728 <summary>
22729 Make a TCP connection to the ldap port.
22730 </summary>
22731 @@ -37788,7 +37872,7 @@ Domain allowed access.
22732 </summary>
22733 </param>
22734 </interface>
22735 -<interface name="corenet_send_ldap_client_packets" lineno="44247">
22736 +<interface name="corenet_send_ldap_client_packets" lineno="44265">
22737 <summary>
22738 Send ldap_client packets.
22739 </summary>
22740 @@ -37799,7 +37883,7 @@ Domain allowed access.
22741 </param>
22742 <infoflow type="write" weight="10"/>
22743 </interface>
22744 -<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="44266">
22745 +<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="44284">
22746 <summary>
22747 Do not audit attempts to send ldap_client packets.
22748 </summary>
22749 @@ -37810,7 +37894,7 @@ Domain to not audit.
22750 </param>
22751 <infoflow type="none"/>
22752 </interface>
22753 -<interface name="corenet_receive_ldap_client_packets" lineno="44285">
22754 +<interface name="corenet_receive_ldap_client_packets" lineno="44303">
22755 <summary>
22756 Receive ldap_client packets.
22757 </summary>
22758 @@ -37821,7 +37905,7 @@ Domain allowed access.
22759 </param>
22760 <infoflow type="read" weight="10"/>
22761 </interface>
22762 -<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="44304">
22763 +<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="44322">
22764 <summary>
22765 Do not audit attempts to receive ldap_client packets.
22766 </summary>
22767 @@ -37832,7 +37916,7 @@ Domain allowed access.
22768 </param>
22769 <infoflow type="none"/>
22770 </interface>
22771 -<interface name="corenet_sendrecv_ldap_client_packets" lineno="44323">
22772 +<interface name="corenet_sendrecv_ldap_client_packets" lineno="44341">
22773 <summary>
22774 Send and receive ldap_client packets.
22775 </summary>
22776 @@ -37843,7 +37927,7 @@ Domain allowed access.
22777 </param>
22778 <infoflow type="both" weight="10"/>
22779 </interface>
22780 -<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="44339">
22781 +<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="44357">
22782 <summary>
22783 Do not audit attempts to send and receive ldap_client packets.
22784 </summary>
22785 @@ -37854,7 +37938,7 @@ Domain to not audit.
22786 </param>
22787 <infoflow type="none"/>
22788 </interface>
22789 -<interface name="corenet_relabelto_ldap_client_packets" lineno="44354">
22790 +<interface name="corenet_relabelto_ldap_client_packets" lineno="44372">
22791 <summary>
22792 Relabel packets to ldap_client the packet type.
22793 </summary>
22794 @@ -37864,7 +37948,7 @@ Domain allowed access.
22795 </summary>
22796 </param>
22797 </interface>
22798 -<interface name="corenet_send_ldap_server_packets" lineno="44374">
22799 +<interface name="corenet_send_ldap_server_packets" lineno="44392">
22800 <summary>
22801 Send ldap_server packets.
22802 </summary>
22803 @@ -37875,7 +37959,7 @@ Domain allowed access.
22804 </param>
22805 <infoflow type="write" weight="10"/>
22806 </interface>
22807 -<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="44393">
22808 +<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="44411">
22809 <summary>
22810 Do not audit attempts to send ldap_server packets.
22811 </summary>
22812 @@ -37886,7 +37970,7 @@ Domain to not audit.
22813 </param>
22814 <infoflow type="none"/>
22815 </interface>
22816 -<interface name="corenet_receive_ldap_server_packets" lineno="44412">
22817 +<interface name="corenet_receive_ldap_server_packets" lineno="44430">
22818 <summary>
22819 Receive ldap_server packets.
22820 </summary>
22821 @@ -37897,7 +37981,7 @@ Domain allowed access.
22822 </param>
22823 <infoflow type="read" weight="10"/>
22824 </interface>
22825 -<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="44431">
22826 +<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="44449">
22827 <summary>
22828 Do not audit attempts to receive ldap_server packets.
22829 </summary>
22830 @@ -37908,7 +37992,7 @@ Domain allowed access.
22831 </param>
22832 <infoflow type="none"/>
22833 </interface>
22834 -<interface name="corenet_sendrecv_ldap_server_packets" lineno="44450">
22835 +<interface name="corenet_sendrecv_ldap_server_packets" lineno="44468">
22836 <summary>
22837 Send and receive ldap_server packets.
22838 </summary>
22839 @@ -37919,7 +38003,7 @@ Domain allowed access.
22840 </param>
22841 <infoflow type="both" weight="10"/>
22842 </interface>
22843 -<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="44466">
22844 +<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="44484">
22845 <summary>
22846 Do not audit attempts to send and receive ldap_server packets.
22847 </summary>
22848 @@ -37930,7 +38014,7 @@ Domain to not audit.
22849 </param>
22850 <infoflow type="none"/>
22851 </interface>
22852 -<interface name="corenet_relabelto_ldap_server_packets" lineno="44481">
22853 +<interface name="corenet_relabelto_ldap_server_packets" lineno="44499">
22854 <summary>
22855 Relabel packets to ldap_server the packet type.
22856 </summary>
22857 @@ -37940,7 +38024,7 @@ Domain allowed access.
22858 </summary>
22859 </param>
22860 </interface>
22861 -<interface name="corenet_tcp_sendrecv_lirc_port" lineno="44503">
22862 +<interface name="corenet_tcp_sendrecv_lirc_port" lineno="44521">
22863 <summary>
22864 Send and receive TCP traffic on the lirc port.
22865 </summary>
22866 @@ -37951,7 +38035,7 @@ Domain allowed access.
22867 </param>
22868 <infoflow type="both" weight="10"/>
22869 </interface>
22870 -<interface name="corenet_udp_send_lirc_port" lineno="44518">
22871 +<interface name="corenet_udp_send_lirc_port" lineno="44536">
22872 <summary>
22873 Send UDP traffic on the lirc port.
22874 </summary>
22875 @@ -37962,7 +38046,7 @@ Domain allowed access.
22876 </param>
22877 <infoflow type="write" weight="10"/>
22878 </interface>
22879 -<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="44533">
22880 +<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="44551">
22881 <summary>
22882 Do not audit attempts to send UDP traffic on the lirc port.
22883 </summary>
22884 @@ -37973,7 +38057,7 @@ Domain to not audit.
22885 </param>
22886 <infoflow type="none"/>
22887 </interface>
22888 -<interface name="corenet_udp_receive_lirc_port" lineno="44548">
22889 +<interface name="corenet_udp_receive_lirc_port" lineno="44566">
22890 <summary>
22891 Receive UDP traffic on the lirc port.
22892 </summary>
22893 @@ -37984,7 +38068,7 @@ Domain allowed access.
22894 </param>
22895 <infoflow type="read" weight="10"/>
22896 </interface>
22897 -<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="44563">
22898 +<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="44581">
22899 <summary>
22900 Do not audit attempts to receive UDP traffic on the lirc port.
22901 </summary>
22902 @@ -37995,7 +38079,7 @@ Domain to not audit.
22903 </param>
22904 <infoflow type="none"/>
22905 </interface>
22906 -<interface name="corenet_udp_sendrecv_lirc_port" lineno="44578">
22907 +<interface name="corenet_udp_sendrecv_lirc_port" lineno="44596">
22908 <summary>
22909 Send and receive UDP traffic on the lirc port.
22910 </summary>
22911 @@ -38006,7 +38090,7 @@ Domain allowed access.
22912 </param>
22913 <infoflow type="both" weight="10"/>
22914 </interface>
22915 -<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="44594">
22916 +<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="44612">
22917 <summary>
22918 Do not audit attempts to send and receive
22919 UDP traffic on the lirc port.
22920 @@ -38018,7 +38102,7 @@ Domain to not audit.
22921 </param>
22922 <infoflow type="none"/>
22923 </interface>
22924 -<interface name="corenet_tcp_bind_lirc_port" lineno="44609">
22925 +<interface name="corenet_tcp_bind_lirc_port" lineno="44627">
22926 <summary>
22927 Bind TCP sockets to the lirc port.
22928 </summary>
22929 @@ -38029,7 +38113,7 @@ Domain allowed access.
22930 </param>
22931 <infoflow type="none"/>
22932 </interface>
22933 -<interface name="corenet_udp_bind_lirc_port" lineno="44629">
22934 +<interface name="corenet_udp_bind_lirc_port" lineno="44647">
22935 <summary>
22936 Bind UDP sockets to the lirc port.
22937 </summary>
22938 @@ -38040,7 +38124,7 @@ Domain allowed access.
22939 </param>
22940 <infoflow type="none"/>
22941 </interface>
22942 -<interface name="corenet_tcp_connect_lirc_port" lineno="44648">
22943 +<interface name="corenet_tcp_connect_lirc_port" lineno="44666">
22944 <summary>
22945 Make a TCP connection to the lirc port.
22946 </summary>
22947 @@ -38050,7 +38134,7 @@ Domain allowed access.
22948 </summary>
22949 </param>
22950 </interface>
22951 -<interface name="corenet_send_lirc_client_packets" lineno="44668">
22952 +<interface name="corenet_send_lirc_client_packets" lineno="44686">
22953 <summary>
22954 Send lirc_client packets.
22955 </summary>
22956 @@ -38061,7 +38145,7 @@ Domain allowed access.
22957 </param>
22958 <infoflow type="write" weight="10"/>
22959 </interface>
22960 -<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="44687">
22961 +<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="44705">
22962 <summary>
22963 Do not audit attempts to send lirc_client packets.
22964 </summary>
22965 @@ -38072,7 +38156,7 @@ Domain to not audit.
22966 </param>
22967 <infoflow type="none"/>
22968 </interface>
22969 -<interface name="corenet_receive_lirc_client_packets" lineno="44706">
22970 +<interface name="corenet_receive_lirc_client_packets" lineno="44724">
22971 <summary>
22972 Receive lirc_client packets.
22973 </summary>
22974 @@ -38083,7 +38167,7 @@ Domain allowed access.
22975 </param>
22976 <infoflow type="read" weight="10"/>
22977 </interface>
22978 -<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="44725">
22979 +<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="44743">
22980 <summary>
22981 Do not audit attempts to receive lirc_client packets.
22982 </summary>
22983 @@ -38094,7 +38178,7 @@ Domain allowed access.
22984 </param>
22985 <infoflow type="none"/>
22986 </interface>
22987 -<interface name="corenet_sendrecv_lirc_client_packets" lineno="44744">
22988 +<interface name="corenet_sendrecv_lirc_client_packets" lineno="44762">
22989 <summary>
22990 Send and receive lirc_client packets.
22991 </summary>
22992 @@ -38105,7 +38189,7 @@ Domain allowed access.
22993 </param>
22994 <infoflow type="both" weight="10"/>
22995 </interface>
22996 -<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="44760">
22997 +<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="44778">
22998 <summary>
22999 Do not audit attempts to send and receive lirc_client packets.
23000 </summary>
23001 @@ -38116,7 +38200,7 @@ Domain to not audit.
23002 </param>
23003 <infoflow type="none"/>
23004 </interface>
23005 -<interface name="corenet_relabelto_lirc_client_packets" lineno="44775">
23006 +<interface name="corenet_relabelto_lirc_client_packets" lineno="44793">
23007 <summary>
23008 Relabel packets to lirc_client the packet type.
23009 </summary>
23010 @@ -38126,7 +38210,7 @@ Domain allowed access.
23011 </summary>
23012 </param>
23013 </interface>
23014 -<interface name="corenet_send_lirc_server_packets" lineno="44795">
23015 +<interface name="corenet_send_lirc_server_packets" lineno="44813">
23016 <summary>
23017 Send lirc_server packets.
23018 </summary>
23019 @@ -38137,7 +38221,7 @@ Domain allowed access.
23020 </param>
23021 <infoflow type="write" weight="10"/>
23022 </interface>
23023 -<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="44814">
23024 +<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="44832">
23025 <summary>
23026 Do not audit attempts to send lirc_server packets.
23027 </summary>
23028 @@ -38148,7 +38232,7 @@ Domain to not audit.
23029 </param>
23030 <infoflow type="none"/>
23031 </interface>
23032 -<interface name="corenet_receive_lirc_server_packets" lineno="44833">
23033 +<interface name="corenet_receive_lirc_server_packets" lineno="44851">
23034 <summary>
23035 Receive lirc_server packets.
23036 </summary>
23037 @@ -38159,7 +38243,7 @@ Domain allowed access.
23038 </param>
23039 <infoflow type="read" weight="10"/>
23040 </interface>
23041 -<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="44852">
23042 +<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="44870">
23043 <summary>
23044 Do not audit attempts to receive lirc_server packets.
23045 </summary>
23046 @@ -38170,7 +38254,7 @@ Domain allowed access.
23047 </param>
23048 <infoflow type="none"/>
23049 </interface>
23050 -<interface name="corenet_sendrecv_lirc_server_packets" lineno="44871">
23051 +<interface name="corenet_sendrecv_lirc_server_packets" lineno="44889">
23052 <summary>
23053 Send and receive lirc_server packets.
23054 </summary>
23055 @@ -38181,7 +38265,7 @@ Domain allowed access.
23056 </param>
23057 <infoflow type="both" weight="10"/>
23058 </interface>
23059 -<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="44887">
23060 +<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="44905">
23061 <summary>
23062 Do not audit attempts to send and receive lirc_server packets.
23063 </summary>
23064 @@ -38192,7 +38276,7 @@ Domain to not audit.
23065 </param>
23066 <infoflow type="none"/>
23067 </interface>
23068 -<interface name="corenet_relabelto_lirc_server_packets" lineno="44902">
23069 +<interface name="corenet_relabelto_lirc_server_packets" lineno="44920">
23070 <summary>
23071 Relabel packets to lirc_server the packet type.
23072 </summary>
23073 @@ -38202,7 +38286,7 @@ Domain allowed access.
23074 </summary>
23075 </param>
23076 </interface>
23077 -<interface name="corenet_tcp_sendrecv_llmnr_port" lineno="44924">
23078 +<interface name="corenet_tcp_sendrecv_llmnr_port" lineno="44942">
23079 <summary>
23080 Send and receive TCP traffic on the llmnr port.
23081 </summary>
23082 @@ -38213,7 +38297,7 @@ Domain allowed access.
23083 </param>
23084 <infoflow type="both" weight="10"/>
23085 </interface>
23086 -<interface name="corenet_udp_send_llmnr_port" lineno="44939">
23087 +<interface name="corenet_udp_send_llmnr_port" lineno="44957">
23088 <summary>
23089 Send UDP traffic on the llmnr port.
23090 </summary>
23091 @@ -38224,7 +38308,7 @@ Domain allowed access.
23092 </param>
23093 <infoflow type="write" weight="10"/>
23094 </interface>
23095 -<interface name="corenet_dontaudit_udp_send_llmnr_port" lineno="44954">
23096 +<interface name="corenet_dontaudit_udp_send_llmnr_port" lineno="44972">
23097 <summary>
23098 Do not audit attempts to send UDP traffic on the llmnr port.
23099 </summary>
23100 @@ -38235,7 +38319,7 @@ Domain to not audit.
23101 </param>
23102 <infoflow type="none"/>
23103 </interface>
23104 -<interface name="corenet_udp_receive_llmnr_port" lineno="44969">
23105 +<interface name="corenet_udp_receive_llmnr_port" lineno="44987">
23106 <summary>
23107 Receive UDP traffic on the llmnr port.
23108 </summary>
23109 @@ -38246,7 +38330,7 @@ Domain allowed access.
23110 </param>
23111 <infoflow type="read" weight="10"/>
23112 </interface>
23113 -<interface name="corenet_dontaudit_udp_receive_llmnr_port" lineno="44984">
23114 +<interface name="corenet_dontaudit_udp_receive_llmnr_port" lineno="45002">
23115 <summary>
23116 Do not audit attempts to receive UDP traffic on the llmnr port.
23117 </summary>
23118 @@ -38257,7 +38341,7 @@ Domain to not audit.
23119 </param>
23120 <infoflow type="none"/>
23121 </interface>
23122 -<interface name="corenet_udp_sendrecv_llmnr_port" lineno="44999">
23123 +<interface name="corenet_udp_sendrecv_llmnr_port" lineno="45017">
23124 <summary>
23125 Send and receive UDP traffic on the llmnr port.
23126 </summary>
23127 @@ -38268,7 +38352,7 @@ Domain allowed access.
23128 </param>
23129 <infoflow type="both" weight="10"/>
23130 </interface>
23131 -<interface name="corenet_dontaudit_udp_sendrecv_llmnr_port" lineno="45015">
23132 +<interface name="corenet_dontaudit_udp_sendrecv_llmnr_port" lineno="45033">
23133 <summary>
23134 Do not audit attempts to send and receive
23135 UDP traffic on the llmnr port.
23136 @@ -38280,7 +38364,7 @@ Domain to not audit.
23137 </param>
23138 <infoflow type="none"/>
23139 </interface>
23140 -<interface name="corenet_tcp_bind_llmnr_port" lineno="45030">
23141 +<interface name="corenet_tcp_bind_llmnr_port" lineno="45048">
23142 <summary>
23143 Bind TCP sockets to the llmnr port.
23144 </summary>
23145 @@ -38291,7 +38375,7 @@ Domain allowed access.
23146 </param>
23147 <infoflow type="none"/>
23148 </interface>
23149 -<interface name="corenet_udp_bind_llmnr_port" lineno="45050">
23150 +<interface name="corenet_udp_bind_llmnr_port" lineno="45068">
23151 <summary>
23152 Bind UDP sockets to the llmnr port.
23153 </summary>
23154 @@ -38302,7 +38386,7 @@ Domain allowed access.
23155 </param>
23156 <infoflow type="none"/>
23157 </interface>
23158 -<interface name="corenet_tcp_connect_llmnr_port" lineno="45069">
23159 +<interface name="corenet_tcp_connect_llmnr_port" lineno="45087">
23160 <summary>
23161 Make a TCP connection to the llmnr port.
23162 </summary>
23163 @@ -38312,7 +38396,7 @@ Domain allowed access.
23164 </summary>
23165 </param>
23166 </interface>
23167 -<interface name="corenet_send_llmnr_client_packets" lineno="45089">
23168 +<interface name="corenet_send_llmnr_client_packets" lineno="45107">
23169 <summary>
23170 Send llmnr_client packets.
23171 </summary>
23172 @@ -38323,7 +38407,7 @@ Domain allowed access.
23173 </param>
23174 <infoflow type="write" weight="10"/>
23175 </interface>
23176 -<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="45108">
23177 +<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="45126">
23178 <summary>
23179 Do not audit attempts to send llmnr_client packets.
23180 </summary>
23181 @@ -38334,7 +38418,7 @@ Domain to not audit.
23182 </param>
23183 <infoflow type="none"/>
23184 </interface>
23185 -<interface name="corenet_receive_llmnr_client_packets" lineno="45127">
23186 +<interface name="corenet_receive_llmnr_client_packets" lineno="45145">
23187 <summary>
23188 Receive llmnr_client packets.
23189 </summary>
23190 @@ -38345,7 +38429,7 @@ Domain allowed access.
23191 </param>
23192 <infoflow type="read" weight="10"/>
23193 </interface>
23194 -<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="45146">
23195 +<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="45164">
23196 <summary>
23197 Do not audit attempts to receive llmnr_client packets.
23198 </summary>
23199 @@ -38356,7 +38440,7 @@ Domain allowed access.
23200 </param>
23201 <infoflow type="none"/>
23202 </interface>
23203 -<interface name="corenet_sendrecv_llmnr_client_packets" lineno="45165">
23204 +<interface name="corenet_sendrecv_llmnr_client_packets" lineno="45183">
23205 <summary>
23206 Send and receive llmnr_client packets.
23207 </summary>
23208 @@ -38367,7 +38451,7 @@ Domain allowed access.
23209 </param>
23210 <infoflow type="both" weight="10"/>
23211 </interface>
23212 -<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="45181">
23213 +<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="45199">
23214 <summary>
23215 Do not audit attempts to send and receive llmnr_client packets.
23216 </summary>
23217 @@ -38378,7 +38462,7 @@ Domain to not audit.
23218 </param>
23219 <infoflow type="none"/>
23220 </interface>
23221 -<interface name="corenet_relabelto_llmnr_client_packets" lineno="45196">
23222 +<interface name="corenet_relabelto_llmnr_client_packets" lineno="45214">
23223 <summary>
23224 Relabel packets to llmnr_client the packet type.
23225 </summary>
23226 @@ -38388,7 +38472,7 @@ Domain allowed access.
23227 </summary>
23228 </param>
23229 </interface>
23230 -<interface name="corenet_send_llmnr_server_packets" lineno="45216">
23231 +<interface name="corenet_send_llmnr_server_packets" lineno="45234">
23232 <summary>
23233 Send llmnr_server packets.
23234 </summary>
23235 @@ -38399,7 +38483,7 @@ Domain allowed access.
23236 </param>
23237 <infoflow type="write" weight="10"/>
23238 </interface>
23239 -<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="45235">
23240 +<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="45253">
23241 <summary>
23242 Do not audit attempts to send llmnr_server packets.
23243 </summary>
23244 @@ -38410,7 +38494,7 @@ Domain to not audit.
23245 </param>
23246 <infoflow type="none"/>
23247 </interface>
23248 -<interface name="corenet_receive_llmnr_server_packets" lineno="45254">
23249 +<interface name="corenet_receive_llmnr_server_packets" lineno="45272">
23250 <summary>
23251 Receive llmnr_server packets.
23252 </summary>
23253 @@ -38421,7 +38505,7 @@ Domain allowed access.
23254 </param>
23255 <infoflow type="read" weight="10"/>
23256 </interface>
23257 -<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="45273">
23258 +<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="45291">
23259 <summary>
23260 Do not audit attempts to receive llmnr_server packets.
23261 </summary>
23262 @@ -38432,7 +38516,7 @@ Domain allowed access.
23263 </param>
23264 <infoflow type="none"/>
23265 </interface>
23266 -<interface name="corenet_sendrecv_llmnr_server_packets" lineno="45292">
23267 +<interface name="corenet_sendrecv_llmnr_server_packets" lineno="45310">
23268 <summary>
23269 Send and receive llmnr_server packets.
23270 </summary>
23271 @@ -38443,7 +38527,7 @@ Domain allowed access.
23272 </param>
23273 <infoflow type="both" weight="10"/>
23274 </interface>
23275 -<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="45308">
23276 +<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="45326">
23277 <summary>
23278 Do not audit attempts to send and receive llmnr_server packets.
23279 </summary>
23280 @@ -38454,7 +38538,7 @@ Domain to not audit.
23281 </param>
23282 <infoflow type="none"/>
23283 </interface>
23284 -<interface name="corenet_relabelto_llmnr_server_packets" lineno="45323">
23285 +<interface name="corenet_relabelto_llmnr_server_packets" lineno="45341">
23286 <summary>
23287 Relabel packets to llmnr_server the packet type.
23288 </summary>
23289 @@ -38464,7 +38548,7 @@ Domain allowed access.
23290 </summary>
23291 </param>
23292 </interface>
23293 -<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="45345">
23294 +<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="45363">
23295 <summary>
23296 Send and receive TCP traffic on the lmtp port.
23297 </summary>
23298 @@ -38475,7 +38559,7 @@ Domain allowed access.
23299 </param>
23300 <infoflow type="both" weight="10"/>
23301 </interface>
23302 -<interface name="corenet_udp_send_lmtp_port" lineno="45360">
23303 +<interface name="corenet_udp_send_lmtp_port" lineno="45378">
23304 <summary>
23305 Send UDP traffic on the lmtp port.
23306 </summary>
23307 @@ -38486,7 +38570,7 @@ Domain allowed access.
23308 </param>
23309 <infoflow type="write" weight="10"/>
23310 </interface>
23311 -<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="45375">
23312 +<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="45393">
23313 <summary>
23314 Do not audit attempts to send UDP traffic on the lmtp port.
23315 </summary>
23316 @@ -38497,7 +38581,7 @@ Domain to not audit.
23317 </param>
23318 <infoflow type="none"/>
23319 </interface>
23320 -<interface name="corenet_udp_receive_lmtp_port" lineno="45390">
23321 +<interface name="corenet_udp_receive_lmtp_port" lineno="45408">
23322 <summary>
23323 Receive UDP traffic on the lmtp port.
23324 </summary>
23325 @@ -38508,7 +38592,7 @@ Domain allowed access.
23326 </param>
23327 <infoflow type="read" weight="10"/>
23328 </interface>
23329 -<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="45405">
23330 +<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="45423">
23331 <summary>
23332 Do not audit attempts to receive UDP traffic on the lmtp port.
23333 </summary>
23334 @@ -38519,7 +38603,7 @@ Domain to not audit.
23335 </param>
23336 <infoflow type="none"/>
23337 </interface>
23338 -<interface name="corenet_udp_sendrecv_lmtp_port" lineno="45420">
23339 +<interface name="corenet_udp_sendrecv_lmtp_port" lineno="45438">
23340 <summary>
23341 Send and receive UDP traffic on the lmtp port.
23342 </summary>
23343 @@ -38530,7 +38614,7 @@ Domain allowed access.
23344 </param>
23345 <infoflow type="both" weight="10"/>
23346 </interface>
23347 -<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="45436">
23348 +<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="45454">
23349 <summary>
23350 Do not audit attempts to send and receive
23351 UDP traffic on the lmtp port.
23352 @@ -38542,7 +38626,7 @@ Domain to not audit.
23353 </param>
23354 <infoflow type="none"/>
23355 </interface>
23356 -<interface name="corenet_tcp_bind_lmtp_port" lineno="45451">
23357 +<interface name="corenet_tcp_bind_lmtp_port" lineno="45469">
23358 <summary>
23359 Bind TCP sockets to the lmtp port.
23360 </summary>
23361 @@ -38553,7 +38637,7 @@ Domain allowed access.
23362 </param>
23363 <infoflow type="none"/>
23364 </interface>
23365 -<interface name="corenet_udp_bind_lmtp_port" lineno="45471">
23366 +<interface name="corenet_udp_bind_lmtp_port" lineno="45489">
23367 <summary>
23368 Bind UDP sockets to the lmtp port.
23369 </summary>
23370 @@ -38564,7 +38648,7 @@ Domain allowed access.
23371 </param>
23372 <infoflow type="none"/>
23373 </interface>
23374 -<interface name="corenet_tcp_connect_lmtp_port" lineno="45490">
23375 +<interface name="corenet_tcp_connect_lmtp_port" lineno="45508">
23376 <summary>
23377 Make a TCP connection to the lmtp port.
23378 </summary>
23379 @@ -38574,7 +38658,7 @@ Domain allowed access.
23380 </summary>
23381 </param>
23382 </interface>
23383 -<interface name="corenet_send_lmtp_client_packets" lineno="45510">
23384 +<interface name="corenet_send_lmtp_client_packets" lineno="45528">
23385 <summary>
23386 Send lmtp_client packets.
23387 </summary>
23388 @@ -38585,7 +38669,7 @@ Domain allowed access.
23389 </param>
23390 <infoflow type="write" weight="10"/>
23391 </interface>
23392 -<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="45529">
23393 +<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="45547">
23394 <summary>
23395 Do not audit attempts to send lmtp_client packets.
23396 </summary>
23397 @@ -38596,7 +38680,7 @@ Domain to not audit.
23398 </param>
23399 <infoflow type="none"/>
23400 </interface>
23401 -<interface name="corenet_receive_lmtp_client_packets" lineno="45548">
23402 +<interface name="corenet_receive_lmtp_client_packets" lineno="45566">
23403 <summary>
23404 Receive lmtp_client packets.
23405 </summary>
23406 @@ -38607,7 +38691,7 @@ Domain allowed access.
23407 </param>
23408 <infoflow type="read" weight="10"/>
23409 </interface>
23410 -<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="45567">
23411 +<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="45585">
23412 <summary>
23413 Do not audit attempts to receive lmtp_client packets.
23414 </summary>
23415 @@ -38618,7 +38702,7 @@ Domain allowed access.
23416 </param>
23417 <infoflow type="none"/>
23418 </interface>
23419 -<interface name="corenet_sendrecv_lmtp_client_packets" lineno="45586">
23420 +<interface name="corenet_sendrecv_lmtp_client_packets" lineno="45604">
23421 <summary>
23422 Send and receive lmtp_client packets.
23423 </summary>
23424 @@ -38629,7 +38713,7 @@ Domain allowed access.
23425 </param>
23426 <infoflow type="both" weight="10"/>
23427 </interface>
23428 -<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="45602">
23429 +<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="45620">
23430 <summary>
23431 Do not audit attempts to send and receive lmtp_client packets.
23432 </summary>
23433 @@ -38640,7 +38724,7 @@ Domain to not audit.
23434 </param>
23435 <infoflow type="none"/>
23436 </interface>
23437 -<interface name="corenet_relabelto_lmtp_client_packets" lineno="45617">
23438 +<interface name="corenet_relabelto_lmtp_client_packets" lineno="45635">
23439 <summary>
23440 Relabel packets to lmtp_client the packet type.
23441 </summary>
23442 @@ -38650,7 +38734,7 @@ Domain allowed access.
23443 </summary>
23444 </param>
23445 </interface>
23446 -<interface name="corenet_send_lmtp_server_packets" lineno="45637">
23447 +<interface name="corenet_send_lmtp_server_packets" lineno="45655">
23448 <summary>
23449 Send lmtp_server packets.
23450 </summary>
23451 @@ -38661,7 +38745,7 @@ Domain allowed access.
23452 </param>
23453 <infoflow type="write" weight="10"/>
23454 </interface>
23455 -<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="45656">
23456 +<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="45674">
23457 <summary>
23458 Do not audit attempts to send lmtp_server packets.
23459 </summary>
23460 @@ -38672,7 +38756,7 @@ Domain to not audit.
23461 </param>
23462 <infoflow type="none"/>
23463 </interface>
23464 -<interface name="corenet_receive_lmtp_server_packets" lineno="45675">
23465 +<interface name="corenet_receive_lmtp_server_packets" lineno="45693">
23466 <summary>
23467 Receive lmtp_server packets.
23468 </summary>
23469 @@ -38683,7 +38767,7 @@ Domain allowed access.
23470 </param>
23471 <infoflow type="read" weight="10"/>
23472 </interface>
23473 -<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="45694">
23474 +<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="45712">
23475 <summary>
23476 Do not audit attempts to receive lmtp_server packets.
23477 </summary>
23478 @@ -38694,7 +38778,7 @@ Domain allowed access.
23479 </param>
23480 <infoflow type="none"/>
23481 </interface>
23482 -<interface name="corenet_sendrecv_lmtp_server_packets" lineno="45713">
23483 +<interface name="corenet_sendrecv_lmtp_server_packets" lineno="45731">
23484 <summary>
23485 Send and receive lmtp_server packets.
23486 </summary>
23487 @@ -38705,7 +38789,7 @@ Domain allowed access.
23488 </param>
23489 <infoflow type="both" weight="10"/>
23490 </interface>
23491 -<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="45729">
23492 +<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="45747">
23493 <summary>
23494 Do not audit attempts to send and receive lmtp_server packets.
23495 </summary>
23496 @@ -38716,7 +38800,7 @@ Domain to not audit.
23497 </param>
23498 <infoflow type="none"/>
23499 </interface>
23500 -<interface name="corenet_relabelto_lmtp_server_packets" lineno="45744">
23501 +<interface name="corenet_relabelto_lmtp_server_packets" lineno="45762">
23502 <summary>
23503 Relabel packets to lmtp_server the packet type.
23504 </summary>
23505 @@ -38726,7 +38810,7 @@ Domain allowed access.
23506 </summary>
23507 </param>
23508 </interface>
23509 -<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="45766">
23510 +<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="45784">
23511 <summary>
23512 Send and receive TCP traffic on the lrrd port.
23513 </summary>
23514 @@ -38737,7 +38821,7 @@ Domain allowed access.
23515 </param>
23516 <infoflow type="both" weight="10"/>
23517 </interface>
23518 -<interface name="corenet_udp_send_lrrd_port" lineno="45781">
23519 +<interface name="corenet_udp_send_lrrd_port" lineno="45799">
23520 <summary>
23521 Send UDP traffic on the lrrd port.
23522 </summary>
23523 @@ -38748,7 +38832,7 @@ Domain allowed access.
23524 </param>
23525 <infoflow type="write" weight="10"/>
23526 </interface>
23527 -<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="45796">
23528 +<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="45814">
23529 <summary>
23530 Do not audit attempts to send UDP traffic on the lrrd port.
23531 </summary>
23532 @@ -38759,7 +38843,7 @@ Domain to not audit.
23533 </param>
23534 <infoflow type="none"/>
23535 </interface>
23536 -<interface name="corenet_udp_receive_lrrd_port" lineno="45811">
23537 +<interface name="corenet_udp_receive_lrrd_port" lineno="45829">
23538 <summary>
23539 Receive UDP traffic on the lrrd port.
23540 </summary>
23541 @@ -38770,7 +38854,7 @@ Domain allowed access.
23542 </param>
23543 <infoflow type="read" weight="10"/>
23544 </interface>
23545 -<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="45826">
23546 +<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="45844">
23547 <summary>
23548 Do not audit attempts to receive UDP traffic on the lrrd port.
23549 </summary>
23550 @@ -38781,7 +38865,7 @@ Domain to not audit.
23551 </param>
23552 <infoflow type="none"/>
23553 </interface>
23554 -<interface name="corenet_udp_sendrecv_lrrd_port" lineno="45841">
23555 +<interface name="corenet_udp_sendrecv_lrrd_port" lineno="45859">
23556 <summary>
23557 Send and receive UDP traffic on the lrrd port.
23558 </summary>
23559 @@ -38792,7 +38876,7 @@ Domain allowed access.
23560 </param>
23561 <infoflow type="both" weight="10"/>
23562 </interface>
23563 -<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="45857">
23564 +<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="45875">
23565 <summary>
23566 Do not audit attempts to send and receive
23567 UDP traffic on the lrrd port.
23568 @@ -38804,7 +38888,7 @@ Domain to not audit.
23569 </param>
23570 <infoflow type="none"/>
23571 </interface>
23572 -<interface name="corenet_tcp_bind_lrrd_port" lineno="45872">
23573 +<interface name="corenet_tcp_bind_lrrd_port" lineno="45890">
23574 <summary>
23575 Bind TCP sockets to the lrrd port.
23576 </summary>
23577 @@ -38815,7 +38899,7 @@ Domain allowed access.
23578 </param>
23579 <infoflow type="none"/>
23580 </interface>
23581 -<interface name="corenet_udp_bind_lrrd_port" lineno="45892">
23582 +<interface name="corenet_udp_bind_lrrd_port" lineno="45910">
23583 <summary>
23584 Bind UDP sockets to the lrrd port.
23585 </summary>
23586 @@ -38826,7 +38910,7 @@ Domain allowed access.
23587 </param>
23588 <infoflow type="none"/>
23589 </interface>
23590 -<interface name="corenet_tcp_connect_lrrd_port" lineno="45911">
23591 +<interface name="corenet_tcp_connect_lrrd_port" lineno="45929">
23592 <summary>
23593 Make a TCP connection to the lrrd port.
23594 </summary>
23595 @@ -38836,7 +38920,7 @@ Domain allowed access.
23596 </summary>
23597 </param>
23598 </interface>
23599 -<interface name="corenet_send_lrrd_client_packets" lineno="45931">
23600 +<interface name="corenet_send_lrrd_client_packets" lineno="45949">
23601 <summary>
23602 Send lrrd_client packets.
23603 </summary>
23604 @@ -38847,7 +38931,7 @@ Domain allowed access.
23605 </param>
23606 <infoflow type="write" weight="10"/>
23607 </interface>
23608 -<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="45950">
23609 +<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="45968">
23610 <summary>
23611 Do not audit attempts to send lrrd_client packets.
23612 </summary>
23613 @@ -38858,7 +38942,7 @@ Domain to not audit.
23614 </param>
23615 <infoflow type="none"/>
23616 </interface>
23617 -<interface name="corenet_receive_lrrd_client_packets" lineno="45969">
23618 +<interface name="corenet_receive_lrrd_client_packets" lineno="45987">
23619 <summary>
23620 Receive lrrd_client packets.
23621 </summary>
23622 @@ -38869,7 +38953,7 @@ Domain allowed access.
23623 </param>
23624 <infoflow type="read" weight="10"/>
23625 </interface>
23626 -<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="45988">
23627 +<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="46006">
23628 <summary>
23629 Do not audit attempts to receive lrrd_client packets.
23630 </summary>
23631 @@ -38880,7 +38964,7 @@ Domain allowed access.
23632 </param>
23633 <infoflow type="none"/>
23634 </interface>
23635 -<interface name="corenet_sendrecv_lrrd_client_packets" lineno="46007">
23636 +<interface name="corenet_sendrecv_lrrd_client_packets" lineno="46025">
23637 <summary>
23638 Send and receive lrrd_client packets.
23639 </summary>
23640 @@ -38891,7 +38975,7 @@ Domain allowed access.
23641 </param>
23642 <infoflow type="both" weight="10"/>
23643 </interface>
23644 -<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="46023">
23645 +<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="46041">
23646 <summary>
23647 Do not audit attempts to send and receive lrrd_client packets.
23648 </summary>
23649 @@ -38902,7 +38986,7 @@ Domain to not audit.
23650 </param>
23651 <infoflow type="none"/>
23652 </interface>
23653 -<interface name="corenet_relabelto_lrrd_client_packets" lineno="46038">
23654 +<interface name="corenet_relabelto_lrrd_client_packets" lineno="46056">
23655 <summary>
23656 Relabel packets to lrrd_client the packet type.
23657 </summary>
23658 @@ -38912,7 +38996,7 @@ Domain allowed access.
23659 </summary>
23660 </param>
23661 </interface>
23662 -<interface name="corenet_send_lrrd_server_packets" lineno="46058">
23663 +<interface name="corenet_send_lrrd_server_packets" lineno="46076">
23664 <summary>
23665 Send lrrd_server packets.
23666 </summary>
23667 @@ -38923,7 +39007,7 @@ Domain allowed access.
23668 </param>
23669 <infoflow type="write" weight="10"/>
23670 </interface>
23671 -<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="46077">
23672 +<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="46095">
23673 <summary>
23674 Do not audit attempts to send lrrd_server packets.
23675 </summary>
23676 @@ -38934,7 +39018,7 @@ Domain to not audit.
23677 </param>
23678 <infoflow type="none"/>
23679 </interface>
23680 -<interface name="corenet_receive_lrrd_server_packets" lineno="46096">
23681 +<interface name="corenet_receive_lrrd_server_packets" lineno="46114">
23682 <summary>
23683 Receive lrrd_server packets.
23684 </summary>
23685 @@ -38945,7 +39029,7 @@ Domain allowed access.
23686 </param>
23687 <infoflow type="read" weight="10"/>
23688 </interface>
23689 -<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="46115">
23690 +<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="46133">
23691 <summary>
23692 Do not audit attempts to receive lrrd_server packets.
23693 </summary>
23694 @@ -38956,7 +39040,7 @@ Domain allowed access.
23695 </param>
23696 <infoflow type="none"/>
23697 </interface>
23698 -<interface name="corenet_sendrecv_lrrd_server_packets" lineno="46134">
23699 +<interface name="corenet_sendrecv_lrrd_server_packets" lineno="46152">
23700 <summary>
23701 Send and receive lrrd_server packets.
23702 </summary>
23703 @@ -38967,7 +39051,7 @@ Domain allowed access.
23704 </param>
23705 <infoflow type="both" weight="10"/>
23706 </interface>
23707 -<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="46150">
23708 +<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="46168">
23709 <summary>
23710 Do not audit attempts to send and receive lrrd_server packets.
23711 </summary>
23712 @@ -38978,7 +39062,7 @@ Domain to not audit.
23713 </param>
23714 <infoflow type="none"/>
23715 </interface>
23716 -<interface name="corenet_relabelto_lrrd_server_packets" lineno="46165">
23717 +<interface name="corenet_relabelto_lrrd_server_packets" lineno="46183">
23718 <summary>
23719 Relabel packets to lrrd_server the packet type.
23720 </summary>
23721 @@ -38988,7 +39072,7 @@ Domain allowed access.
23722 </summary>
23723 </param>
23724 </interface>
23725 -<interface name="corenet_tcp_sendrecv_mail_port" lineno="46187">
23726 +<interface name="corenet_tcp_sendrecv_mail_port" lineno="46205">
23727 <summary>
23728 Send and receive TCP traffic on the mail port.
23729 </summary>
23730 @@ -38999,7 +39083,7 @@ Domain allowed access.
23731 </param>
23732 <infoflow type="both" weight="10"/>
23733 </interface>
23734 -<interface name="corenet_udp_send_mail_port" lineno="46202">
23735 +<interface name="corenet_udp_send_mail_port" lineno="46220">
23736 <summary>
23737 Send UDP traffic on the mail port.
23738 </summary>
23739 @@ -39010,7 +39094,7 @@ Domain allowed access.
23740 </param>
23741 <infoflow type="write" weight="10"/>
23742 </interface>
23743 -<interface name="corenet_dontaudit_udp_send_mail_port" lineno="46217">
23744 +<interface name="corenet_dontaudit_udp_send_mail_port" lineno="46235">
23745 <summary>
23746 Do not audit attempts to send UDP traffic on the mail port.
23747 </summary>
23748 @@ -39021,7 +39105,7 @@ Domain to not audit.
23749 </param>
23750 <infoflow type="none"/>
23751 </interface>
23752 -<interface name="corenet_udp_receive_mail_port" lineno="46232">
23753 +<interface name="corenet_udp_receive_mail_port" lineno="46250">
23754 <summary>
23755 Receive UDP traffic on the mail port.
23756 </summary>
23757 @@ -39032,7 +39116,7 @@ Domain allowed access.
23758 </param>
23759 <infoflow type="read" weight="10"/>
23760 </interface>
23761 -<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="46247">
23762 +<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="46265">
23763 <summary>
23764 Do not audit attempts to receive UDP traffic on the mail port.
23765 </summary>
23766 @@ -39043,7 +39127,7 @@ Domain to not audit.
23767 </param>
23768 <infoflow type="none"/>
23769 </interface>
23770 -<interface name="corenet_udp_sendrecv_mail_port" lineno="46262">
23771 +<interface name="corenet_udp_sendrecv_mail_port" lineno="46280">
23772 <summary>
23773 Send and receive UDP traffic on the mail port.
23774 </summary>
23775 @@ -39054,7 +39138,7 @@ Domain allowed access.
23776 </param>
23777 <infoflow type="both" weight="10"/>
23778 </interface>
23779 -<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="46278">
23780 +<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="46296">
23781 <summary>
23782 Do not audit attempts to send and receive
23783 UDP traffic on the mail port.
23784 @@ -39066,7 +39150,7 @@ Domain to not audit.
23785 </param>
23786 <infoflow type="none"/>
23787 </interface>
23788 -<interface name="corenet_tcp_bind_mail_port" lineno="46293">
23789 +<interface name="corenet_tcp_bind_mail_port" lineno="46311">
23790 <summary>
23791 Bind TCP sockets to the mail port.
23792 </summary>
23793 @@ -39077,7 +39161,7 @@ Domain allowed access.
23794 </param>
23795 <infoflow type="none"/>
23796 </interface>
23797 -<interface name="corenet_udp_bind_mail_port" lineno="46313">
23798 +<interface name="corenet_udp_bind_mail_port" lineno="46331">
23799 <summary>
23800 Bind UDP sockets to the mail port.
23801 </summary>
23802 @@ -39088,7 +39172,7 @@ Domain allowed access.
23803 </param>
23804 <infoflow type="none"/>
23805 </interface>
23806 -<interface name="corenet_tcp_connect_mail_port" lineno="46332">
23807 +<interface name="corenet_tcp_connect_mail_port" lineno="46350">
23808 <summary>
23809 Make a TCP connection to the mail port.
23810 </summary>
23811 @@ -39098,7 +39182,7 @@ Domain allowed access.
23812 </summary>
23813 </param>
23814 </interface>
23815 -<interface name="corenet_send_mail_client_packets" lineno="46352">
23816 +<interface name="corenet_send_mail_client_packets" lineno="46370">
23817 <summary>
23818 Send mail_client packets.
23819 </summary>
23820 @@ -39109,7 +39193,7 @@ Domain allowed access.
23821 </param>
23822 <infoflow type="write" weight="10"/>
23823 </interface>
23824 -<interface name="corenet_dontaudit_send_mail_client_packets" lineno="46371">
23825 +<interface name="corenet_dontaudit_send_mail_client_packets" lineno="46389">
23826 <summary>
23827 Do not audit attempts to send mail_client packets.
23828 </summary>
23829 @@ -39120,7 +39204,7 @@ Domain to not audit.
23830 </param>
23831 <infoflow type="none"/>
23832 </interface>
23833 -<interface name="corenet_receive_mail_client_packets" lineno="46390">
23834 +<interface name="corenet_receive_mail_client_packets" lineno="46408">
23835 <summary>
23836 Receive mail_client packets.
23837 </summary>
23838 @@ -39131,7 +39215,7 @@ Domain allowed access.
23839 </param>
23840 <infoflow type="read" weight="10"/>
23841 </interface>
23842 -<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="46409">
23843 +<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="46427">
23844 <summary>
23845 Do not audit attempts to receive mail_client packets.
23846 </summary>
23847 @@ -39142,7 +39226,7 @@ Domain allowed access.
23848 </param>
23849 <infoflow type="none"/>
23850 </interface>
23851 -<interface name="corenet_sendrecv_mail_client_packets" lineno="46428">
23852 +<interface name="corenet_sendrecv_mail_client_packets" lineno="46446">
23853 <summary>
23854 Send and receive mail_client packets.
23855 </summary>
23856 @@ -39153,7 +39237,7 @@ Domain allowed access.
23857 </param>
23858 <infoflow type="both" weight="10"/>
23859 </interface>
23860 -<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="46444">
23861 +<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="46462">
23862 <summary>
23863 Do not audit attempts to send and receive mail_client packets.
23864 </summary>
23865 @@ -39164,7 +39248,7 @@ Domain to not audit.
23866 </param>
23867 <infoflow type="none"/>
23868 </interface>
23869 -<interface name="corenet_relabelto_mail_client_packets" lineno="46459">
23870 +<interface name="corenet_relabelto_mail_client_packets" lineno="46477">
23871 <summary>
23872 Relabel packets to mail_client the packet type.
23873 </summary>
23874 @@ -39174,7 +39258,7 @@ Domain allowed access.
23875 </summary>
23876 </param>
23877 </interface>
23878 -<interface name="corenet_send_mail_server_packets" lineno="46479">
23879 +<interface name="corenet_send_mail_server_packets" lineno="46497">
23880 <summary>
23881 Send mail_server packets.
23882 </summary>
23883 @@ -39185,7 +39269,7 @@ Domain allowed access.
23884 </param>
23885 <infoflow type="write" weight="10"/>
23886 </interface>
23887 -<interface name="corenet_dontaudit_send_mail_server_packets" lineno="46498">
23888 +<interface name="corenet_dontaudit_send_mail_server_packets" lineno="46516">
23889 <summary>
23890 Do not audit attempts to send mail_server packets.
23891 </summary>
23892 @@ -39196,7 +39280,7 @@ Domain to not audit.
23893 </param>
23894 <infoflow type="none"/>
23895 </interface>
23896 -<interface name="corenet_receive_mail_server_packets" lineno="46517">
23897 +<interface name="corenet_receive_mail_server_packets" lineno="46535">
23898 <summary>
23899 Receive mail_server packets.
23900 </summary>
23901 @@ -39207,7 +39291,7 @@ Domain allowed access.
23902 </param>
23903 <infoflow type="read" weight="10"/>
23904 </interface>
23905 -<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="46536">
23906 +<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="46554">
23907 <summary>
23908 Do not audit attempts to receive mail_server packets.
23909 </summary>
23910 @@ -39218,7 +39302,7 @@ Domain allowed access.
23911 </param>
23912 <infoflow type="none"/>
23913 </interface>
23914 -<interface name="corenet_sendrecv_mail_server_packets" lineno="46555">
23915 +<interface name="corenet_sendrecv_mail_server_packets" lineno="46573">
23916 <summary>
23917 Send and receive mail_server packets.
23918 </summary>
23919 @@ -39229,7 +39313,7 @@ Domain allowed access.
23920 </param>
23921 <infoflow type="both" weight="10"/>
23922 </interface>
23923 -<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="46571">
23924 +<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="46589">
23925 <summary>
23926 Do not audit attempts to send and receive mail_server packets.
23927 </summary>
23928 @@ -39240,7 +39324,7 @@ Domain to not audit.
23929 </param>
23930 <infoflow type="none"/>
23931 </interface>
23932 -<interface name="corenet_relabelto_mail_server_packets" lineno="46586">
23933 +<interface name="corenet_relabelto_mail_server_packets" lineno="46604">
23934 <summary>
23935 Relabel packets to mail_server the packet type.
23936 </summary>
23937 @@ -39250,7 +39334,7 @@ Domain allowed access.
23938 </summary>
23939 </param>
23940 </interface>
23941 -<interface name="corenet_tcp_sendrecv_matahari_port" lineno="46608">
23942 +<interface name="corenet_tcp_sendrecv_matahari_port" lineno="46626">
23943 <summary>
23944 Send and receive TCP traffic on the matahari port.
23945 </summary>
23946 @@ -39261,7 +39345,7 @@ Domain allowed access.
23947 </param>
23948 <infoflow type="both" weight="10"/>
23949 </interface>
23950 -<interface name="corenet_udp_send_matahari_port" lineno="46623">
23951 +<interface name="corenet_udp_send_matahari_port" lineno="46641">
23952 <summary>
23953 Send UDP traffic on the matahari port.
23954 </summary>
23955 @@ -39272,7 +39356,7 @@ Domain allowed access.
23956 </param>
23957 <infoflow type="write" weight="10"/>
23958 </interface>
23959 -<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="46638">
23960 +<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="46656">
23961 <summary>
23962 Do not audit attempts to send UDP traffic on the matahari port.
23963 </summary>
23964 @@ -39283,7 +39367,7 @@ Domain to not audit.
23965 </param>
23966 <infoflow type="none"/>
23967 </interface>
23968 -<interface name="corenet_udp_receive_matahari_port" lineno="46653">
23969 +<interface name="corenet_udp_receive_matahari_port" lineno="46671">
23970 <summary>
23971 Receive UDP traffic on the matahari port.
23972 </summary>
23973 @@ -39294,7 +39378,7 @@ Domain allowed access.
23974 </param>
23975 <infoflow type="read" weight="10"/>
23976 </interface>
23977 -<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="46668">
23978 +<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="46686">
23979 <summary>
23980 Do not audit attempts to receive UDP traffic on the matahari port.
23981 </summary>
23982 @@ -39305,7 +39389,7 @@ Domain to not audit.
23983 </param>
23984 <infoflow type="none"/>
23985 </interface>
23986 -<interface name="corenet_udp_sendrecv_matahari_port" lineno="46683">
23987 +<interface name="corenet_udp_sendrecv_matahari_port" lineno="46701">
23988 <summary>
23989 Send and receive UDP traffic on the matahari port.
23990 </summary>
23991 @@ -39316,7 +39400,7 @@ Domain allowed access.
23992 </param>
23993 <infoflow type="both" weight="10"/>
23994 </interface>
23995 -<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="46699">
23996 +<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="46717">
23997 <summary>
23998 Do not audit attempts to send and receive
23999 UDP traffic on the matahari port.
24000 @@ -39328,7 +39412,7 @@ Domain to not audit.
24001 </param>
24002 <infoflow type="none"/>
24003 </interface>
24004 -<interface name="corenet_tcp_bind_matahari_port" lineno="46714">
24005 +<interface name="corenet_tcp_bind_matahari_port" lineno="46732">
24006 <summary>
24007 Bind TCP sockets to the matahari port.
24008 </summary>
24009 @@ -39339,7 +39423,7 @@ Domain allowed access.
24010 </param>
24011 <infoflow type="none"/>
24012 </interface>
24013 -<interface name="corenet_udp_bind_matahari_port" lineno="46734">
24014 +<interface name="corenet_udp_bind_matahari_port" lineno="46752">
24015 <summary>
24016 Bind UDP sockets to the matahari port.
24017 </summary>
24018 @@ -39350,7 +39434,7 @@ Domain allowed access.
24019 </param>
24020 <infoflow type="none"/>
24021 </interface>
24022 -<interface name="corenet_tcp_connect_matahari_port" lineno="46753">
24023 +<interface name="corenet_tcp_connect_matahari_port" lineno="46771">
24024 <summary>
24025 Make a TCP connection to the matahari port.
24026 </summary>
24027 @@ -39360,7 +39444,7 @@ Domain allowed access.
24028 </summary>
24029 </param>
24030 </interface>
24031 -<interface name="corenet_send_matahari_client_packets" lineno="46773">
24032 +<interface name="corenet_send_matahari_client_packets" lineno="46791">
24033 <summary>
24034 Send matahari_client packets.
24035 </summary>
24036 @@ -39371,7 +39455,7 @@ Domain allowed access.
24037 </param>
24038 <infoflow type="write" weight="10"/>
24039 </interface>
24040 -<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="46792">
24041 +<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="46810">
24042 <summary>
24043 Do not audit attempts to send matahari_client packets.
24044 </summary>
24045 @@ -39382,7 +39466,7 @@ Domain to not audit.
24046 </param>
24047 <infoflow type="none"/>
24048 </interface>
24049 -<interface name="corenet_receive_matahari_client_packets" lineno="46811">
24050 +<interface name="corenet_receive_matahari_client_packets" lineno="46829">
24051 <summary>
24052 Receive matahari_client packets.
24053 </summary>
24054 @@ -39393,7 +39477,7 @@ Domain allowed access.
24055 </param>
24056 <infoflow type="read" weight="10"/>
24057 </interface>
24058 -<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="46830">
24059 +<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="46848">
24060 <summary>
24061 Do not audit attempts to receive matahari_client packets.
24062 </summary>
24063 @@ -39404,7 +39488,7 @@ Domain allowed access.
24064 </param>
24065 <infoflow type="none"/>
24066 </interface>
24067 -<interface name="corenet_sendrecv_matahari_client_packets" lineno="46849">
24068 +<interface name="corenet_sendrecv_matahari_client_packets" lineno="46867">
24069 <summary>
24070 Send and receive matahari_client packets.
24071 </summary>
24072 @@ -39415,7 +39499,7 @@ Domain allowed access.
24073 </param>
24074 <infoflow type="both" weight="10"/>
24075 </interface>
24076 -<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="46865">
24077 +<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="46883">
24078 <summary>
24079 Do not audit attempts to send and receive matahari_client packets.
24080 </summary>
24081 @@ -39426,7 +39510,7 @@ Domain to not audit.
24082 </param>
24083 <infoflow type="none"/>
24084 </interface>
24085 -<interface name="corenet_relabelto_matahari_client_packets" lineno="46880">
24086 +<interface name="corenet_relabelto_matahari_client_packets" lineno="46898">
24087 <summary>
24088 Relabel packets to matahari_client the packet type.
24089 </summary>
24090 @@ -39436,7 +39520,7 @@ Domain allowed access.
24091 </summary>
24092 </param>
24093 </interface>
24094 -<interface name="corenet_send_matahari_server_packets" lineno="46900">
24095 +<interface name="corenet_send_matahari_server_packets" lineno="46918">
24096 <summary>
24097 Send matahari_server packets.
24098 </summary>
24099 @@ -39447,7 +39531,7 @@ Domain allowed access.
24100 </param>
24101 <infoflow type="write" weight="10"/>
24102 </interface>
24103 -<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="46919">
24104 +<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="46937">
24105 <summary>
24106 Do not audit attempts to send matahari_server packets.
24107 </summary>
24108 @@ -39458,7 +39542,7 @@ Domain to not audit.
24109 </param>
24110 <infoflow type="none"/>
24111 </interface>
24112 -<interface name="corenet_receive_matahari_server_packets" lineno="46938">
24113 +<interface name="corenet_receive_matahari_server_packets" lineno="46956">
24114 <summary>
24115 Receive matahari_server packets.
24116 </summary>
24117 @@ -39469,7 +39553,7 @@ Domain allowed access.
24118 </param>
24119 <infoflow type="read" weight="10"/>
24120 </interface>
24121 -<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="46957">
24122 +<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="46975">
24123 <summary>
24124 Do not audit attempts to receive matahari_server packets.
24125 </summary>
24126 @@ -39480,7 +39564,7 @@ Domain allowed access.
24127 </param>
24128 <infoflow type="none"/>
24129 </interface>
24130 -<interface name="corenet_sendrecv_matahari_server_packets" lineno="46976">
24131 +<interface name="corenet_sendrecv_matahari_server_packets" lineno="46994">
24132 <summary>
24133 Send and receive matahari_server packets.
24134 </summary>
24135 @@ -39491,7 +39575,7 @@ Domain allowed access.
24136 </param>
24137 <infoflow type="both" weight="10"/>
24138 </interface>
24139 -<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="46992">
24140 +<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="47010">
24141 <summary>
24142 Do not audit attempts to send and receive matahari_server packets.
24143 </summary>
24144 @@ -39502,7 +39586,7 @@ Domain to not audit.
24145 </param>
24146 <infoflow type="none"/>
24147 </interface>
24148 -<interface name="corenet_relabelto_matahari_server_packets" lineno="47007">
24149 +<interface name="corenet_relabelto_matahari_server_packets" lineno="47025">
24150 <summary>
24151 Relabel packets to matahari_server the packet type.
24152 </summary>
24153 @@ -39512,7 +39596,7 @@ Domain allowed access.
24154 </summary>
24155 </param>
24156 </interface>
24157 -<interface name="corenet_tcp_sendrecv_memcache_port" lineno="47029">
24158 +<interface name="corenet_tcp_sendrecv_memcache_port" lineno="47047">
24159 <summary>
24160 Send and receive TCP traffic on the memcache port.
24161 </summary>
24162 @@ -39523,7 +39607,7 @@ Domain allowed access.
24163 </param>
24164 <infoflow type="both" weight="10"/>
24165 </interface>
24166 -<interface name="corenet_udp_send_memcache_port" lineno="47044">
24167 +<interface name="corenet_udp_send_memcache_port" lineno="47062">
24168 <summary>
24169 Send UDP traffic on the memcache port.
24170 </summary>
24171 @@ -39534,7 +39618,7 @@ Domain allowed access.
24172 </param>
24173 <infoflow type="write" weight="10"/>
24174 </interface>
24175 -<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="47059">
24176 +<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="47077">
24177 <summary>
24178 Do not audit attempts to send UDP traffic on the memcache port.
24179 </summary>
24180 @@ -39545,7 +39629,7 @@ Domain to not audit.
24181 </param>
24182 <infoflow type="none"/>
24183 </interface>
24184 -<interface name="corenet_udp_receive_memcache_port" lineno="47074">
24185 +<interface name="corenet_udp_receive_memcache_port" lineno="47092">
24186 <summary>
24187 Receive UDP traffic on the memcache port.
24188 </summary>
24189 @@ -39556,7 +39640,7 @@ Domain allowed access.
24190 </param>
24191 <infoflow type="read" weight="10"/>
24192 </interface>
24193 -<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="47089">
24194 +<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="47107">
24195 <summary>
24196 Do not audit attempts to receive UDP traffic on the memcache port.
24197 </summary>
24198 @@ -39567,7 +39651,7 @@ Domain to not audit.
24199 </param>
24200 <infoflow type="none"/>
24201 </interface>
24202 -<interface name="corenet_udp_sendrecv_memcache_port" lineno="47104">
24203 +<interface name="corenet_udp_sendrecv_memcache_port" lineno="47122">
24204 <summary>
24205 Send and receive UDP traffic on the memcache port.
24206 </summary>
24207 @@ -39578,7 +39662,7 @@ Domain allowed access.
24208 </param>
24209 <infoflow type="both" weight="10"/>
24210 </interface>
24211 -<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="47120">
24212 +<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="47138">
24213 <summary>
24214 Do not audit attempts to send and receive
24215 UDP traffic on the memcache port.
24216 @@ -39590,7 +39674,7 @@ Domain to not audit.
24217 </param>
24218 <infoflow type="none"/>
24219 </interface>
24220 -<interface name="corenet_tcp_bind_memcache_port" lineno="47135">
24221 +<interface name="corenet_tcp_bind_memcache_port" lineno="47153">
24222 <summary>
24223 Bind TCP sockets to the memcache port.
24224 </summary>
24225 @@ -39601,7 +39685,7 @@ Domain allowed access.
24226 </param>
24227 <infoflow type="none"/>
24228 </interface>
24229 -<interface name="corenet_udp_bind_memcache_port" lineno="47155">
24230 +<interface name="corenet_udp_bind_memcache_port" lineno="47173">
24231 <summary>
24232 Bind UDP sockets to the memcache port.
24233 </summary>
24234 @@ -39612,7 +39696,7 @@ Domain allowed access.
24235 </param>
24236 <infoflow type="none"/>
24237 </interface>
24238 -<interface name="corenet_tcp_connect_memcache_port" lineno="47174">
24239 +<interface name="corenet_tcp_connect_memcache_port" lineno="47192">
24240 <summary>
24241 Make a TCP connection to the memcache port.
24242 </summary>
24243 @@ -39622,7 +39706,7 @@ Domain allowed access.
24244 </summary>
24245 </param>
24246 </interface>
24247 -<interface name="corenet_send_memcache_client_packets" lineno="47194">
24248 +<interface name="corenet_send_memcache_client_packets" lineno="47212">
24249 <summary>
24250 Send memcache_client packets.
24251 </summary>
24252 @@ -39633,7 +39717,7 @@ Domain allowed access.
24253 </param>
24254 <infoflow type="write" weight="10"/>
24255 </interface>
24256 -<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="47213">
24257 +<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="47231">
24258 <summary>
24259 Do not audit attempts to send memcache_client packets.
24260 </summary>
24261 @@ -39644,7 +39728,7 @@ Domain to not audit.
24262 </param>
24263 <infoflow type="none"/>
24264 </interface>
24265 -<interface name="corenet_receive_memcache_client_packets" lineno="47232">
24266 +<interface name="corenet_receive_memcache_client_packets" lineno="47250">
24267 <summary>
24268 Receive memcache_client packets.
24269 </summary>
24270 @@ -39655,7 +39739,7 @@ Domain allowed access.
24271 </param>
24272 <infoflow type="read" weight="10"/>
24273 </interface>
24274 -<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="47251">
24275 +<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="47269">
24276 <summary>
24277 Do not audit attempts to receive memcache_client packets.
24278 </summary>
24279 @@ -39666,7 +39750,7 @@ Domain allowed access.
24280 </param>
24281 <infoflow type="none"/>
24282 </interface>
24283 -<interface name="corenet_sendrecv_memcache_client_packets" lineno="47270">
24284 +<interface name="corenet_sendrecv_memcache_client_packets" lineno="47288">
24285 <summary>
24286 Send and receive memcache_client packets.
24287 </summary>
24288 @@ -39677,7 +39761,7 @@ Domain allowed access.
24289 </param>
24290 <infoflow type="both" weight="10"/>
24291 </interface>
24292 -<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="47286">
24293 +<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="47304">
24294 <summary>
24295 Do not audit attempts to send and receive memcache_client packets.
24296 </summary>
24297 @@ -39688,7 +39772,7 @@ Domain to not audit.
24298 </param>
24299 <infoflow type="none"/>
24300 </interface>
24301 -<interface name="corenet_relabelto_memcache_client_packets" lineno="47301">
24302 +<interface name="corenet_relabelto_memcache_client_packets" lineno="47319">
24303 <summary>
24304 Relabel packets to memcache_client the packet type.
24305 </summary>
24306 @@ -39698,7 +39782,7 @@ Domain allowed access.
24307 </summary>
24308 </param>
24309 </interface>
24310 -<interface name="corenet_send_memcache_server_packets" lineno="47321">
24311 +<interface name="corenet_send_memcache_server_packets" lineno="47339">
24312 <summary>
24313 Send memcache_server packets.
24314 </summary>
24315 @@ -39709,7 +39793,7 @@ Domain allowed access.
24316 </param>
24317 <infoflow type="write" weight="10"/>
24318 </interface>
24319 -<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="47340">
24320 +<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="47358">
24321 <summary>
24322 Do not audit attempts to send memcache_server packets.
24323 </summary>
24324 @@ -39720,7 +39804,7 @@ Domain to not audit.
24325 </param>
24326 <infoflow type="none"/>
24327 </interface>
24328 -<interface name="corenet_receive_memcache_server_packets" lineno="47359">
24329 +<interface name="corenet_receive_memcache_server_packets" lineno="47377">
24330 <summary>
24331 Receive memcache_server packets.
24332 </summary>
24333 @@ -39731,7 +39815,7 @@ Domain allowed access.
24334 </param>
24335 <infoflow type="read" weight="10"/>
24336 </interface>
24337 -<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="47378">
24338 +<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="47396">
24339 <summary>
24340 Do not audit attempts to receive memcache_server packets.
24341 </summary>
24342 @@ -39742,7 +39826,7 @@ Domain allowed access.
24343 </param>
24344 <infoflow type="none"/>
24345 </interface>
24346 -<interface name="corenet_sendrecv_memcache_server_packets" lineno="47397">
24347 +<interface name="corenet_sendrecv_memcache_server_packets" lineno="47415">
24348 <summary>
24349 Send and receive memcache_server packets.
24350 </summary>
24351 @@ -39753,7 +39837,7 @@ Domain allowed access.
24352 </param>
24353 <infoflow type="both" weight="10"/>
24354 </interface>
24355 -<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="47413">
24356 +<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="47431">
24357 <summary>
24358 Do not audit attempts to send and receive memcache_server packets.
24359 </summary>
24360 @@ -39764,7 +39848,7 @@ Domain to not audit.
24361 </param>
24362 <infoflow type="none"/>
24363 </interface>
24364 -<interface name="corenet_relabelto_memcache_server_packets" lineno="47428">
24365 +<interface name="corenet_relabelto_memcache_server_packets" lineno="47446">
24366 <summary>
24367 Relabel packets to memcache_server the packet type.
24368 </summary>
24369 @@ -39774,7 +39858,7 @@ Domain allowed access.
24370 </summary>
24371 </param>
24372 </interface>
24373 -<interface name="corenet_tcp_sendrecv_milter_port" lineno="47450">
24374 +<interface name="corenet_tcp_sendrecv_milter_port" lineno="47468">
24375 <summary>
24376 Send and receive TCP traffic on the milter port.
24377 </summary>
24378 @@ -39785,7 +39869,7 @@ Domain allowed access.
24379 </param>
24380 <infoflow type="both" weight="10"/>
24381 </interface>
24382 -<interface name="corenet_udp_send_milter_port" lineno="47465">
24383 +<interface name="corenet_udp_send_milter_port" lineno="47483">
24384 <summary>
24385 Send UDP traffic on the milter port.
24386 </summary>
24387 @@ -39796,7 +39880,7 @@ Domain allowed access.
24388 </param>
24389 <infoflow type="write" weight="10"/>
24390 </interface>
24391 -<interface name="corenet_dontaudit_udp_send_milter_port" lineno="47480">
24392 +<interface name="corenet_dontaudit_udp_send_milter_port" lineno="47498">
24393 <summary>
24394 Do not audit attempts to send UDP traffic on the milter port.
24395 </summary>
24396 @@ -39807,7 +39891,7 @@ Domain to not audit.
24397 </param>
24398 <infoflow type="none"/>
24399 </interface>
24400 -<interface name="corenet_udp_receive_milter_port" lineno="47495">
24401 +<interface name="corenet_udp_receive_milter_port" lineno="47513">
24402 <summary>
24403 Receive UDP traffic on the milter port.
24404 </summary>
24405 @@ -39818,7 +39902,7 @@ Domain allowed access.
24406 </param>
24407 <infoflow type="read" weight="10"/>
24408 </interface>
24409 -<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="47510">
24410 +<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="47528">
24411 <summary>
24412 Do not audit attempts to receive UDP traffic on the milter port.
24413 </summary>
24414 @@ -39829,7 +39913,7 @@ Domain to not audit.
24415 </param>
24416 <infoflow type="none"/>
24417 </interface>
24418 -<interface name="corenet_udp_sendrecv_milter_port" lineno="47525">
24419 +<interface name="corenet_udp_sendrecv_milter_port" lineno="47543">
24420 <summary>
24421 Send and receive UDP traffic on the milter port.
24422 </summary>
24423 @@ -39840,7 +39924,7 @@ Domain allowed access.
24424 </param>
24425 <infoflow type="both" weight="10"/>
24426 </interface>
24427 -<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="47541">
24428 +<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="47559">
24429 <summary>
24430 Do not audit attempts to send and receive
24431 UDP traffic on the milter port.
24432 @@ -39852,7 +39936,7 @@ Domain to not audit.
24433 </param>
24434 <infoflow type="none"/>
24435 </interface>
24436 -<interface name="corenet_tcp_bind_milter_port" lineno="47556">
24437 +<interface name="corenet_tcp_bind_milter_port" lineno="47574">
24438 <summary>
24439 Bind TCP sockets to the milter port.
24440 </summary>
24441 @@ -39863,7 +39947,7 @@ Domain allowed access.
24442 </param>
24443 <infoflow type="none"/>
24444 </interface>
24445 -<interface name="corenet_udp_bind_milter_port" lineno="47576">
24446 +<interface name="corenet_udp_bind_milter_port" lineno="47594">
24447 <summary>
24448 Bind UDP sockets to the milter port.
24449 </summary>
24450 @@ -39874,7 +39958,7 @@ Domain allowed access.
24451 </param>
24452 <infoflow type="none"/>
24453 </interface>
24454 -<interface name="corenet_tcp_connect_milter_port" lineno="47595">
24455 +<interface name="corenet_tcp_connect_milter_port" lineno="47613">
24456 <summary>
24457 Make a TCP connection to the milter port.
24458 </summary>
24459 @@ -39884,7 +39968,7 @@ Domain allowed access.
24460 </summary>
24461 </param>
24462 </interface>
24463 -<interface name="corenet_send_milter_client_packets" lineno="47615">
24464 +<interface name="corenet_send_milter_client_packets" lineno="47633">
24465 <summary>
24466 Send milter_client packets.
24467 </summary>
24468 @@ -39895,7 +39979,7 @@ Domain allowed access.
24469 </param>
24470 <infoflow type="write" weight="10"/>
24471 </interface>
24472 -<interface name="corenet_dontaudit_send_milter_client_packets" lineno="47634">
24473 +<interface name="corenet_dontaudit_send_milter_client_packets" lineno="47652">
24474 <summary>
24475 Do not audit attempts to send milter_client packets.
24476 </summary>
24477 @@ -39906,7 +39990,7 @@ Domain to not audit.
24478 </param>
24479 <infoflow type="none"/>
24480 </interface>
24481 -<interface name="corenet_receive_milter_client_packets" lineno="47653">
24482 +<interface name="corenet_receive_milter_client_packets" lineno="47671">
24483 <summary>
24484 Receive milter_client packets.
24485 </summary>
24486 @@ -39917,7 +40001,7 @@ Domain allowed access.
24487 </param>
24488 <infoflow type="read" weight="10"/>
24489 </interface>
24490 -<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="47672">
24491 +<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="47690">
24492 <summary>
24493 Do not audit attempts to receive milter_client packets.
24494 </summary>
24495 @@ -39928,7 +40012,7 @@ Domain allowed access.
24496 </param>
24497 <infoflow type="none"/>
24498 </interface>
24499 -<interface name="corenet_sendrecv_milter_client_packets" lineno="47691">
24500 +<interface name="corenet_sendrecv_milter_client_packets" lineno="47709">
24501 <summary>
24502 Send and receive milter_client packets.
24503 </summary>
24504 @@ -39939,7 +40023,7 @@ Domain allowed access.
24505 </param>
24506 <infoflow type="both" weight="10"/>
24507 </interface>
24508 -<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="47707">
24509 +<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="47725">
24510 <summary>
24511 Do not audit attempts to send and receive milter_client packets.
24512 </summary>
24513 @@ -39950,7 +40034,7 @@ Domain to not audit.
24514 </param>
24515 <infoflow type="none"/>
24516 </interface>
24517 -<interface name="corenet_relabelto_milter_client_packets" lineno="47722">
24518 +<interface name="corenet_relabelto_milter_client_packets" lineno="47740">
24519 <summary>
24520 Relabel packets to milter_client the packet type.
24521 </summary>
24522 @@ -39960,7 +40044,7 @@ Domain allowed access.
24523 </summary>
24524 </param>
24525 </interface>
24526 -<interface name="corenet_send_milter_server_packets" lineno="47742">
24527 +<interface name="corenet_send_milter_server_packets" lineno="47760">
24528 <summary>
24529 Send milter_server packets.
24530 </summary>
24531 @@ -39971,7 +40055,7 @@ Domain allowed access.
24532 </param>
24533 <infoflow type="write" weight="10"/>
24534 </interface>
24535 -<interface name="corenet_dontaudit_send_milter_server_packets" lineno="47761">
24536 +<interface name="corenet_dontaudit_send_milter_server_packets" lineno="47779">
24537 <summary>
24538 Do not audit attempts to send milter_server packets.
24539 </summary>
24540 @@ -39982,7 +40066,7 @@ Domain to not audit.
24541 </param>
24542 <infoflow type="none"/>
24543 </interface>
24544 -<interface name="corenet_receive_milter_server_packets" lineno="47780">
24545 +<interface name="corenet_receive_milter_server_packets" lineno="47798">
24546 <summary>
24547 Receive milter_server packets.
24548 </summary>
24549 @@ -39993,7 +40077,7 @@ Domain allowed access.
24550 </param>
24551 <infoflow type="read" weight="10"/>
24552 </interface>
24553 -<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="47799">
24554 +<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="47817">
24555 <summary>
24556 Do not audit attempts to receive milter_server packets.
24557 </summary>
24558 @@ -40004,7 +40088,7 @@ Domain allowed access.
24559 </param>
24560 <infoflow type="none"/>
24561 </interface>
24562 -<interface name="corenet_sendrecv_milter_server_packets" lineno="47818">
24563 +<interface name="corenet_sendrecv_milter_server_packets" lineno="47836">
24564 <summary>
24565 Send and receive milter_server packets.
24566 </summary>
24567 @@ -40015,7 +40099,7 @@ Domain allowed access.
24568 </param>
24569 <infoflow type="both" weight="10"/>
24570 </interface>
24571 -<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="47834">
24572 +<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="47852">
24573 <summary>
24574 Do not audit attempts to send and receive milter_server packets.
24575 </summary>
24576 @@ -40026,7 +40110,7 @@ Domain to not audit.
24577 </param>
24578 <infoflow type="none"/>
24579 </interface>
24580 -<interface name="corenet_relabelto_milter_server_packets" lineno="47849">
24581 +<interface name="corenet_relabelto_milter_server_packets" lineno="47867">
24582 <summary>
24583 Relabel packets to milter_server the packet type.
24584 </summary>
24585 @@ -40036,7 +40120,7 @@ Domain allowed access.
24586 </summary>
24587 </param>
24588 </interface>
24589 -<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="47871">
24590 +<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="47889">
24591 <summary>
24592 Send and receive TCP traffic on the mmcc port.
24593 </summary>
24594 @@ -40047,7 +40131,7 @@ Domain allowed access.
24595 </param>
24596 <infoflow type="both" weight="10"/>
24597 </interface>
24598 -<interface name="corenet_udp_send_mmcc_port" lineno="47886">
24599 +<interface name="corenet_udp_send_mmcc_port" lineno="47904">
24600 <summary>
24601 Send UDP traffic on the mmcc port.
24602 </summary>
24603 @@ -40058,7 +40142,7 @@ Domain allowed access.
24604 </param>
24605 <infoflow type="write" weight="10"/>
24606 </interface>
24607 -<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="47901">
24608 +<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="47919">
24609 <summary>
24610 Do not audit attempts to send UDP traffic on the mmcc port.
24611 </summary>
24612 @@ -40069,7 +40153,7 @@ Domain to not audit.
24613 </param>
24614 <infoflow type="none"/>
24615 </interface>
24616 -<interface name="corenet_udp_receive_mmcc_port" lineno="47916">
24617 +<interface name="corenet_udp_receive_mmcc_port" lineno="47934">
24618 <summary>
24619 Receive UDP traffic on the mmcc port.
24620 </summary>
24621 @@ -40080,7 +40164,7 @@ Domain allowed access.
24622 </param>
24623 <infoflow type="read" weight="10"/>
24624 </interface>
24625 -<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="47931">
24626 +<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="47949">
24627 <summary>
24628 Do not audit attempts to receive UDP traffic on the mmcc port.
24629 </summary>
24630 @@ -40091,7 +40175,7 @@ Domain to not audit.
24631 </param>
24632 <infoflow type="none"/>
24633 </interface>
24634 -<interface name="corenet_udp_sendrecv_mmcc_port" lineno="47946">
24635 +<interface name="corenet_udp_sendrecv_mmcc_port" lineno="47964">
24636 <summary>
24637 Send and receive UDP traffic on the mmcc port.
24638 </summary>
24639 @@ -40102,7 +40186,7 @@ Domain allowed access.
24640 </param>
24641 <infoflow type="both" weight="10"/>
24642 </interface>
24643 -<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="47962">
24644 +<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="47980">
24645 <summary>
24646 Do not audit attempts to send and receive
24647 UDP traffic on the mmcc port.
24648 @@ -40114,7 +40198,7 @@ Domain to not audit.
24649 </param>
24650 <infoflow type="none"/>
24651 </interface>
24652 -<interface name="corenet_tcp_bind_mmcc_port" lineno="47977">
24653 +<interface name="corenet_tcp_bind_mmcc_port" lineno="47995">
24654 <summary>
24655 Bind TCP sockets to the mmcc port.
24656 </summary>
24657 @@ -40125,7 +40209,7 @@ Domain allowed access.
24658 </param>
24659 <infoflow type="none"/>
24660 </interface>
24661 -<interface name="corenet_udp_bind_mmcc_port" lineno="47997">
24662 +<interface name="corenet_udp_bind_mmcc_port" lineno="48015">
24663 <summary>
24664 Bind UDP sockets to the mmcc port.
24665 </summary>
24666 @@ -40136,7 +40220,7 @@ Domain allowed access.
24667 </param>
24668 <infoflow type="none"/>
24669 </interface>
24670 -<interface name="corenet_tcp_connect_mmcc_port" lineno="48016">
24671 +<interface name="corenet_tcp_connect_mmcc_port" lineno="48034">
24672 <summary>
24673 Make a TCP connection to the mmcc port.
24674 </summary>
24675 @@ -40146,7 +40230,7 @@ Domain allowed access.
24676 </summary>
24677 </param>
24678 </interface>
24679 -<interface name="corenet_send_mmcc_client_packets" lineno="48036">
24680 +<interface name="corenet_send_mmcc_client_packets" lineno="48054">
24681 <summary>
24682 Send mmcc_client packets.
24683 </summary>
24684 @@ -40157,7 +40241,7 @@ Domain allowed access.
24685 </param>
24686 <infoflow type="write" weight="10"/>
24687 </interface>
24688 -<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="48055">
24689 +<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="48073">
24690 <summary>
24691 Do not audit attempts to send mmcc_client packets.
24692 </summary>
24693 @@ -40168,7 +40252,7 @@ Domain to not audit.
24694 </param>
24695 <infoflow type="none"/>
24696 </interface>
24697 -<interface name="corenet_receive_mmcc_client_packets" lineno="48074">
24698 +<interface name="corenet_receive_mmcc_client_packets" lineno="48092">
24699 <summary>
24700 Receive mmcc_client packets.
24701 </summary>
24702 @@ -40179,7 +40263,7 @@ Domain allowed access.
24703 </param>
24704 <infoflow type="read" weight="10"/>
24705 </interface>
24706 -<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="48093">
24707 +<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="48111">
24708 <summary>
24709 Do not audit attempts to receive mmcc_client packets.
24710 </summary>
24711 @@ -40190,7 +40274,7 @@ Domain allowed access.
24712 </param>
24713 <infoflow type="none"/>
24714 </interface>
24715 -<interface name="corenet_sendrecv_mmcc_client_packets" lineno="48112">
24716 +<interface name="corenet_sendrecv_mmcc_client_packets" lineno="48130">
24717 <summary>
24718 Send and receive mmcc_client packets.
24719 </summary>
24720 @@ -40201,7 +40285,7 @@ Domain allowed access.
24721 </param>
24722 <infoflow type="both" weight="10"/>
24723 </interface>
24724 -<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="48128">
24725 +<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="48146">
24726 <summary>
24727 Do not audit attempts to send and receive mmcc_client packets.
24728 </summary>
24729 @@ -40212,7 +40296,7 @@ Domain to not audit.
24730 </param>
24731 <infoflow type="none"/>
24732 </interface>
24733 -<interface name="corenet_relabelto_mmcc_client_packets" lineno="48143">
24734 +<interface name="corenet_relabelto_mmcc_client_packets" lineno="48161">
24735 <summary>
24736 Relabel packets to mmcc_client the packet type.
24737 </summary>
24738 @@ -40222,7 +40306,7 @@ Domain allowed access.
24739 </summary>
24740 </param>
24741 </interface>
24742 -<interface name="corenet_send_mmcc_server_packets" lineno="48163">
24743 +<interface name="corenet_send_mmcc_server_packets" lineno="48181">
24744 <summary>
24745 Send mmcc_server packets.
24746 </summary>
24747 @@ -40233,7 +40317,7 @@ Domain allowed access.
24748 </param>
24749 <infoflow type="write" weight="10"/>
24750 </interface>
24751 -<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="48182">
24752 +<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="48200">
24753 <summary>
24754 Do not audit attempts to send mmcc_server packets.
24755 </summary>
24756 @@ -40244,7 +40328,7 @@ Domain to not audit.
24757 </param>
24758 <infoflow type="none"/>
24759 </interface>
24760 -<interface name="corenet_receive_mmcc_server_packets" lineno="48201">
24761 +<interface name="corenet_receive_mmcc_server_packets" lineno="48219">
24762 <summary>
24763 Receive mmcc_server packets.
24764 </summary>
24765 @@ -40255,7 +40339,7 @@ Domain allowed access.
24766 </param>
24767 <infoflow type="read" weight="10"/>
24768 </interface>
24769 -<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="48220">
24770 +<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="48238">
24771 <summary>
24772 Do not audit attempts to receive mmcc_server packets.
24773 </summary>
24774 @@ -40266,7 +40350,7 @@ Domain allowed access.
24775 </param>
24776 <infoflow type="none"/>
24777 </interface>
24778 -<interface name="corenet_sendrecv_mmcc_server_packets" lineno="48239">
24779 +<interface name="corenet_sendrecv_mmcc_server_packets" lineno="48257">
24780 <summary>
24781 Send and receive mmcc_server packets.
24782 </summary>
24783 @@ -40277,7 +40361,7 @@ Domain allowed access.
24784 </param>
24785 <infoflow type="both" weight="10"/>
24786 </interface>
24787 -<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="48255">
24788 +<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="48273">
24789 <summary>
24790 Do not audit attempts to send and receive mmcc_server packets.
24791 </summary>
24792 @@ -40288,7 +40372,7 @@ Domain to not audit.
24793 </param>
24794 <infoflow type="none"/>
24795 </interface>
24796 -<interface name="corenet_relabelto_mmcc_server_packets" lineno="48270">
24797 +<interface name="corenet_relabelto_mmcc_server_packets" lineno="48288">
24798 <summary>
24799 Relabel packets to mmcc_server the packet type.
24800 </summary>
24801 @@ -40298,7 +40382,7 @@ Domain allowed access.
24802 </summary>
24803 </param>
24804 </interface>
24805 -<interface name="corenet_tcp_sendrecv_mon_port" lineno="48292">
24806 +<interface name="corenet_tcp_sendrecv_mon_port" lineno="48310">
24807 <summary>
24808 Send and receive TCP traffic on the mon port.
24809 </summary>
24810 @@ -40309,7 +40393,7 @@ Domain allowed access.
24811 </param>
24812 <infoflow type="both" weight="10"/>
24813 </interface>
24814 -<interface name="corenet_udp_send_mon_port" lineno="48307">
24815 +<interface name="corenet_udp_send_mon_port" lineno="48325">
24816 <summary>
24817 Send UDP traffic on the mon port.
24818 </summary>
24819 @@ -40320,7 +40404,7 @@ Domain allowed access.
24820 </param>
24821 <infoflow type="write" weight="10"/>
24822 </interface>
24823 -<interface name="corenet_dontaudit_udp_send_mon_port" lineno="48322">
24824 +<interface name="corenet_dontaudit_udp_send_mon_port" lineno="48340">
24825 <summary>
24826 Do not audit attempts to send UDP traffic on the mon port.
24827 </summary>
24828 @@ -40331,7 +40415,7 @@ Domain to not audit.
24829 </param>
24830 <infoflow type="none"/>
24831 </interface>
24832 -<interface name="corenet_udp_receive_mon_port" lineno="48337">
24833 +<interface name="corenet_udp_receive_mon_port" lineno="48355">
24834 <summary>
24835 Receive UDP traffic on the mon port.
24836 </summary>
24837 @@ -40342,7 +40426,7 @@ Domain allowed access.
24838 </param>
24839 <infoflow type="read" weight="10"/>
24840 </interface>
24841 -<interface name="corenet_dontaudit_udp_receive_mon_port" lineno="48352">
24842 +<interface name="corenet_dontaudit_udp_receive_mon_port" lineno="48370">
24843 <summary>
24844 Do not audit attempts to receive UDP traffic on the mon port.
24845 </summary>
24846 @@ -40353,7 +40437,7 @@ Domain to not audit.
24847 </param>
24848 <infoflow type="none"/>
24849 </interface>
24850 -<interface name="corenet_udp_sendrecv_mon_port" lineno="48367">
24851 +<interface name="corenet_udp_sendrecv_mon_port" lineno="48385">
24852 <summary>
24853 Send and receive UDP traffic on the mon port.
24854 </summary>
24855 @@ -40364,7 +40448,7 @@ Domain allowed access.
24856 </param>
24857 <infoflow type="both" weight="10"/>
24858 </interface>
24859 -<interface name="corenet_dontaudit_udp_sendrecv_mon_port" lineno="48383">
24860 +<interface name="corenet_dontaudit_udp_sendrecv_mon_port" lineno="48401">
24861 <summary>
24862 Do not audit attempts to send and receive
24863 UDP traffic on the mon port.
24864 @@ -40376,7 +40460,7 @@ Domain to not audit.
24865 </param>
24866 <infoflow type="none"/>
24867 </interface>
24868 -<interface name="corenet_tcp_bind_mon_port" lineno="48398">
24869 +<interface name="corenet_tcp_bind_mon_port" lineno="48416">
24870 <summary>
24871 Bind TCP sockets to the mon port.
24872 </summary>
24873 @@ -40387,7 +40471,7 @@ Domain allowed access.
24874 </param>
24875 <infoflow type="none"/>
24876 </interface>
24877 -<interface name="corenet_udp_bind_mon_port" lineno="48418">
24878 +<interface name="corenet_udp_bind_mon_port" lineno="48436">
24879 <summary>
24880 Bind UDP sockets to the mon port.
24881 </summary>
24882 @@ -40398,7 +40482,7 @@ Domain allowed access.
24883 </param>
24884 <infoflow type="none"/>
24885 </interface>
24886 -<interface name="corenet_tcp_connect_mon_port" lineno="48437">
24887 +<interface name="corenet_tcp_connect_mon_port" lineno="48455">
24888 <summary>
24889 Make a TCP connection to the mon port.
24890 </summary>
24891 @@ -40408,7 +40492,7 @@ Domain allowed access.
24892 </summary>
24893 </param>
24894 </interface>
24895 -<interface name="corenet_send_mon_client_packets" lineno="48457">
24896 +<interface name="corenet_send_mon_client_packets" lineno="48475">
24897 <summary>
24898 Send mon_client packets.
24899 </summary>
24900 @@ -40419,7 +40503,7 @@ Domain allowed access.
24901 </param>
24902 <infoflow type="write" weight="10"/>
24903 </interface>
24904 -<interface name="corenet_dontaudit_send_mon_client_packets" lineno="48476">
24905 +<interface name="corenet_dontaudit_send_mon_client_packets" lineno="48494">
24906 <summary>
24907 Do not audit attempts to send mon_client packets.
24908 </summary>
24909 @@ -40430,7 +40514,7 @@ Domain to not audit.
24910 </param>
24911 <infoflow type="none"/>
24912 </interface>
24913 -<interface name="corenet_receive_mon_client_packets" lineno="48495">
24914 +<interface name="corenet_receive_mon_client_packets" lineno="48513">
24915 <summary>
24916 Receive mon_client packets.
24917 </summary>
24918 @@ -40441,7 +40525,7 @@ Domain allowed access.
24919 </param>
24920 <infoflow type="read" weight="10"/>
24921 </interface>
24922 -<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="48514">
24923 +<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="48532">
24924 <summary>
24925 Do not audit attempts to receive mon_client packets.
24926 </summary>
24927 @@ -40452,7 +40536,7 @@ Domain allowed access.
24928 </param>
24929 <infoflow type="none"/>
24930 </interface>
24931 -<interface name="corenet_sendrecv_mon_client_packets" lineno="48533">
24932 +<interface name="corenet_sendrecv_mon_client_packets" lineno="48551">
24933 <summary>
24934 Send and receive mon_client packets.
24935 </summary>
24936 @@ -40463,7 +40547,7 @@ Domain allowed access.
24937 </param>
24938 <infoflow type="both" weight="10"/>
24939 </interface>
24940 -<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="48549">
24941 +<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="48567">
24942 <summary>
24943 Do not audit attempts to send and receive mon_client packets.
24944 </summary>
24945 @@ -40474,7 +40558,7 @@ Domain to not audit.
24946 </param>
24947 <infoflow type="none"/>
24948 </interface>
24949 -<interface name="corenet_relabelto_mon_client_packets" lineno="48564">
24950 +<interface name="corenet_relabelto_mon_client_packets" lineno="48582">
24951 <summary>
24952 Relabel packets to mon_client the packet type.
24953 </summary>
24954 @@ -40484,7 +40568,7 @@ Domain allowed access.
24955 </summary>
24956 </param>
24957 </interface>
24958 -<interface name="corenet_send_mon_server_packets" lineno="48584">
24959 +<interface name="corenet_send_mon_server_packets" lineno="48602">
24960 <summary>
24961 Send mon_server packets.
24962 </summary>
24963 @@ -40495,7 +40579,7 @@ Domain allowed access.
24964 </param>
24965 <infoflow type="write" weight="10"/>
24966 </interface>
24967 -<interface name="corenet_dontaudit_send_mon_server_packets" lineno="48603">
24968 +<interface name="corenet_dontaudit_send_mon_server_packets" lineno="48621">
24969 <summary>
24970 Do not audit attempts to send mon_server packets.
24971 </summary>
24972 @@ -40506,7 +40590,7 @@ Domain to not audit.
24973 </param>
24974 <infoflow type="none"/>
24975 </interface>
24976 -<interface name="corenet_receive_mon_server_packets" lineno="48622">
24977 +<interface name="corenet_receive_mon_server_packets" lineno="48640">
24978 <summary>
24979 Receive mon_server packets.
24980 </summary>
24981 @@ -40517,7 +40601,7 @@ Domain allowed access.
24982 </param>
24983 <infoflow type="read" weight="10"/>
24984 </interface>
24985 -<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="48641">
24986 +<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="48659">
24987 <summary>
24988 Do not audit attempts to receive mon_server packets.
24989 </summary>
24990 @@ -40528,7 +40612,7 @@ Domain allowed access.
24991 </param>
24992 <infoflow type="none"/>
24993 </interface>
24994 -<interface name="corenet_sendrecv_mon_server_packets" lineno="48660">
24995 +<interface name="corenet_sendrecv_mon_server_packets" lineno="48678">
24996 <summary>
24997 Send and receive mon_server packets.
24998 </summary>
24999 @@ -40539,7 +40623,7 @@ Domain allowed access.
25000 </param>
25001 <infoflow type="both" weight="10"/>
25002 </interface>
25003 -<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="48676">
25004 +<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="48694">
25005 <summary>
25006 Do not audit attempts to send and receive mon_server packets.
25007 </summary>
25008 @@ -40550,7 +40634,7 @@ Domain to not audit.
25009 </param>
25010 <infoflow type="none"/>
25011 </interface>
25012 -<interface name="corenet_relabelto_mon_server_packets" lineno="48691">
25013 +<interface name="corenet_relabelto_mon_server_packets" lineno="48709">
25014 <summary>
25015 Relabel packets to mon_server the packet type.
25016 </summary>
25017 @@ -40560,7 +40644,7 @@ Domain allowed access.
25018 </summary>
25019 </param>
25020 </interface>
25021 -<interface name="corenet_tcp_sendrecv_monit_port" lineno="48713">
25022 +<interface name="corenet_tcp_sendrecv_monit_port" lineno="48731">
25023 <summary>
25024 Send and receive TCP traffic on the monit port.
25025 </summary>
25026 @@ -40571,7 +40655,7 @@ Domain allowed access.
25027 </param>
25028 <infoflow type="both" weight="10"/>
25029 </interface>
25030 -<interface name="corenet_udp_send_monit_port" lineno="48728">
25031 +<interface name="corenet_udp_send_monit_port" lineno="48746">
25032 <summary>
25033 Send UDP traffic on the monit port.
25034 </summary>
25035 @@ -40582,7 +40666,7 @@ Domain allowed access.
25036 </param>
25037 <infoflow type="write" weight="10"/>
25038 </interface>
25039 -<interface name="corenet_dontaudit_udp_send_monit_port" lineno="48743">
25040 +<interface name="corenet_dontaudit_udp_send_monit_port" lineno="48761">
25041 <summary>
25042 Do not audit attempts to send UDP traffic on the monit port.
25043 </summary>
25044 @@ -40593,7 +40677,7 @@ Domain to not audit.
25045 </param>
25046 <infoflow type="none"/>
25047 </interface>
25048 -<interface name="corenet_udp_receive_monit_port" lineno="48758">
25049 +<interface name="corenet_udp_receive_monit_port" lineno="48776">
25050 <summary>
25051 Receive UDP traffic on the monit port.
25052 </summary>
25053 @@ -40604,7 +40688,7 @@ Domain allowed access.
25054 </param>
25055 <infoflow type="read" weight="10"/>
25056 </interface>
25057 -<interface name="corenet_dontaudit_udp_receive_monit_port" lineno="48773">
25058 +<interface name="corenet_dontaudit_udp_receive_monit_port" lineno="48791">
25059 <summary>
25060 Do not audit attempts to receive UDP traffic on the monit port.
25061 </summary>
25062 @@ -40615,7 +40699,7 @@ Domain to not audit.
25063 </param>
25064 <infoflow type="none"/>
25065 </interface>
25066 -<interface name="corenet_udp_sendrecv_monit_port" lineno="48788">
25067 +<interface name="corenet_udp_sendrecv_monit_port" lineno="48806">
25068 <summary>
25069 Send and receive UDP traffic on the monit port.
25070 </summary>
25071 @@ -40626,7 +40710,7 @@ Domain allowed access.
25072 </param>
25073 <infoflow type="both" weight="10"/>
25074 </interface>
25075 -<interface name="corenet_dontaudit_udp_sendrecv_monit_port" lineno="48804">
25076 +<interface name="corenet_dontaudit_udp_sendrecv_monit_port" lineno="48822">
25077 <summary>
25078 Do not audit attempts to send and receive
25079 UDP traffic on the monit port.
25080 @@ -40638,7 +40722,7 @@ Domain to not audit.
25081 </param>
25082 <infoflow type="none"/>
25083 </interface>
25084 -<interface name="corenet_tcp_bind_monit_port" lineno="48819">
25085 +<interface name="corenet_tcp_bind_monit_port" lineno="48837">
25086 <summary>
25087 Bind TCP sockets to the monit port.
25088 </summary>
25089 @@ -40649,7 +40733,7 @@ Domain allowed access.
25090 </param>
25091 <infoflow type="none"/>
25092 </interface>
25093 -<interface name="corenet_udp_bind_monit_port" lineno="48839">
25094 +<interface name="corenet_udp_bind_monit_port" lineno="48857">
25095 <summary>
25096 Bind UDP sockets to the monit port.
25097 </summary>
25098 @@ -40660,7 +40744,7 @@ Domain allowed access.
25099 </param>
25100 <infoflow type="none"/>
25101 </interface>
25102 -<interface name="corenet_tcp_connect_monit_port" lineno="48858">
25103 +<interface name="corenet_tcp_connect_monit_port" lineno="48876">
25104 <summary>
25105 Make a TCP connection to the monit port.
25106 </summary>
25107 @@ -40670,7 +40754,7 @@ Domain allowed access.
25108 </summary>
25109 </param>
25110 </interface>
25111 -<interface name="corenet_send_monit_client_packets" lineno="48878">
25112 +<interface name="corenet_send_monit_client_packets" lineno="48896">
25113 <summary>
25114 Send monit_client packets.
25115 </summary>
25116 @@ -40681,7 +40765,7 @@ Domain allowed access.
25117 </param>
25118 <infoflow type="write" weight="10"/>
25119 </interface>
25120 -<interface name="corenet_dontaudit_send_monit_client_packets" lineno="48897">
25121 +<interface name="corenet_dontaudit_send_monit_client_packets" lineno="48915">
25122 <summary>
25123 Do not audit attempts to send monit_client packets.
25124 </summary>
25125 @@ -40692,7 +40776,7 @@ Domain to not audit.
25126 </param>
25127 <infoflow type="none"/>
25128 </interface>
25129 -<interface name="corenet_receive_monit_client_packets" lineno="48916">
25130 +<interface name="corenet_receive_monit_client_packets" lineno="48934">
25131 <summary>
25132 Receive monit_client packets.
25133 </summary>
25134 @@ -40703,7 +40787,7 @@ Domain allowed access.
25135 </param>
25136 <infoflow type="read" weight="10"/>
25137 </interface>
25138 -<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="48935">
25139 +<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="48953">
25140 <summary>
25141 Do not audit attempts to receive monit_client packets.
25142 </summary>
25143 @@ -40714,7 +40798,7 @@ Domain allowed access.
25144 </param>
25145 <infoflow type="none"/>
25146 </interface>
25147 -<interface name="corenet_sendrecv_monit_client_packets" lineno="48954">
25148 +<interface name="corenet_sendrecv_monit_client_packets" lineno="48972">
25149 <summary>
25150 Send and receive monit_client packets.
25151 </summary>
25152 @@ -40725,7 +40809,7 @@ Domain allowed access.
25153 </param>
25154 <infoflow type="both" weight="10"/>
25155 </interface>
25156 -<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="48970">
25157 +<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="48988">
25158 <summary>
25159 Do not audit attempts to send and receive monit_client packets.
25160 </summary>
25161 @@ -40736,7 +40820,7 @@ Domain to not audit.
25162 </param>
25163 <infoflow type="none"/>
25164 </interface>
25165 -<interface name="corenet_relabelto_monit_client_packets" lineno="48985">
25166 +<interface name="corenet_relabelto_monit_client_packets" lineno="49003">
25167 <summary>
25168 Relabel packets to monit_client the packet type.
25169 </summary>
25170 @@ -40746,7 +40830,7 @@ Domain allowed access.
25171 </summary>
25172 </param>
25173 </interface>
25174 -<interface name="corenet_send_monit_server_packets" lineno="49005">
25175 +<interface name="corenet_send_monit_server_packets" lineno="49023">
25176 <summary>
25177 Send monit_server packets.
25178 </summary>
25179 @@ -40757,7 +40841,7 @@ Domain allowed access.
25180 </param>
25181 <infoflow type="write" weight="10"/>
25182 </interface>
25183 -<interface name="corenet_dontaudit_send_monit_server_packets" lineno="49024">
25184 +<interface name="corenet_dontaudit_send_monit_server_packets" lineno="49042">
25185 <summary>
25186 Do not audit attempts to send monit_server packets.
25187 </summary>
25188 @@ -40768,7 +40852,7 @@ Domain to not audit.
25189 </param>
25190 <infoflow type="none"/>
25191 </interface>
25192 -<interface name="corenet_receive_monit_server_packets" lineno="49043">
25193 +<interface name="corenet_receive_monit_server_packets" lineno="49061">
25194 <summary>
25195 Receive monit_server packets.
25196 </summary>
25197 @@ -40779,7 +40863,7 @@ Domain allowed access.
25198 </param>
25199 <infoflow type="read" weight="10"/>
25200 </interface>
25201 -<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="49062">
25202 +<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="49080">
25203 <summary>
25204 Do not audit attempts to receive monit_server packets.
25205 </summary>
25206 @@ -40790,7 +40874,7 @@ Domain allowed access.
25207 </param>
25208 <infoflow type="none"/>
25209 </interface>
25210 -<interface name="corenet_sendrecv_monit_server_packets" lineno="49081">
25211 +<interface name="corenet_sendrecv_monit_server_packets" lineno="49099">
25212 <summary>
25213 Send and receive monit_server packets.
25214 </summary>
25215 @@ -40801,7 +40885,7 @@ Domain allowed access.
25216 </param>
25217 <infoflow type="both" weight="10"/>
25218 </interface>
25219 -<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="49097">
25220 +<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="49115">
25221 <summary>
25222 Do not audit attempts to send and receive monit_server packets.
25223 </summary>
25224 @@ -40812,7 +40896,7 @@ Domain to not audit.
25225 </param>
25226 <infoflow type="none"/>
25227 </interface>
25228 -<interface name="corenet_relabelto_monit_server_packets" lineno="49112">
25229 +<interface name="corenet_relabelto_monit_server_packets" lineno="49130">
25230 <summary>
25231 Relabel packets to monit_server the packet type.
25232 </summary>
25233 @@ -40822,7 +40906,7 @@ Domain allowed access.
25234 </summary>
25235 </param>
25236 </interface>
25237 -<interface name="corenet_tcp_sendrecv_monopd_port" lineno="49134">
25238 +<interface name="corenet_tcp_sendrecv_monopd_port" lineno="49152">
25239 <summary>
25240 Send and receive TCP traffic on the monopd port.
25241 </summary>
25242 @@ -40833,7 +40917,7 @@ Domain allowed access.
25243 </param>
25244 <infoflow type="both" weight="10"/>
25245 </interface>
25246 -<interface name="corenet_udp_send_monopd_port" lineno="49149">
25247 +<interface name="corenet_udp_send_monopd_port" lineno="49167">
25248 <summary>
25249 Send UDP traffic on the monopd port.
25250 </summary>
25251 @@ -40844,7 +40928,7 @@ Domain allowed access.
25252 </param>
25253 <infoflow type="write" weight="10"/>
25254 </interface>
25255 -<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="49164">
25256 +<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="49182">
25257 <summary>
25258 Do not audit attempts to send UDP traffic on the monopd port.
25259 </summary>
25260 @@ -40855,7 +40939,7 @@ Domain to not audit.
25261 </param>
25262 <infoflow type="none"/>
25263 </interface>
25264 -<interface name="corenet_udp_receive_monopd_port" lineno="49179">
25265 +<interface name="corenet_udp_receive_monopd_port" lineno="49197">
25266 <summary>
25267 Receive UDP traffic on the monopd port.
25268 </summary>
25269 @@ -40866,7 +40950,7 @@ Domain allowed access.
25270 </param>
25271 <infoflow type="read" weight="10"/>
25272 </interface>
25273 -<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="49194">
25274 +<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="49212">
25275 <summary>
25276 Do not audit attempts to receive UDP traffic on the monopd port.
25277 </summary>
25278 @@ -40877,7 +40961,7 @@ Domain to not audit.
25279 </param>
25280 <infoflow type="none"/>
25281 </interface>
25282 -<interface name="corenet_udp_sendrecv_monopd_port" lineno="49209">
25283 +<interface name="corenet_udp_sendrecv_monopd_port" lineno="49227">
25284 <summary>
25285 Send and receive UDP traffic on the monopd port.
25286 </summary>
25287 @@ -40888,7 +40972,7 @@ Domain allowed access.
25288 </param>
25289 <infoflow type="both" weight="10"/>
25290 </interface>
25291 -<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="49225">
25292 +<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="49243">
25293 <summary>
25294 Do not audit attempts to send and receive
25295 UDP traffic on the monopd port.
25296 @@ -40900,7 +40984,7 @@ Domain to not audit.
25297 </param>
25298 <infoflow type="none"/>
25299 </interface>
25300 -<interface name="corenet_tcp_bind_monopd_port" lineno="49240">
25301 +<interface name="corenet_tcp_bind_monopd_port" lineno="49258">
25302 <summary>
25303 Bind TCP sockets to the monopd port.
25304 </summary>
25305 @@ -40911,7 +40995,7 @@ Domain allowed access.
25306 </param>
25307 <infoflow type="none"/>
25308 </interface>
25309 -<interface name="corenet_udp_bind_monopd_port" lineno="49260">
25310 +<interface name="corenet_udp_bind_monopd_port" lineno="49278">
25311 <summary>
25312 Bind UDP sockets to the monopd port.
25313 </summary>
25314 @@ -40922,7 +41006,7 @@ Domain allowed access.
25315 </param>
25316 <infoflow type="none"/>
25317 </interface>
25318 -<interface name="corenet_tcp_connect_monopd_port" lineno="49279">
25319 +<interface name="corenet_tcp_connect_monopd_port" lineno="49297">
25320 <summary>
25321 Make a TCP connection to the monopd port.
25322 </summary>
25323 @@ -40932,7 +41016,7 @@ Domain allowed access.
25324 </summary>
25325 </param>
25326 </interface>
25327 -<interface name="corenet_send_monopd_client_packets" lineno="49299">
25328 +<interface name="corenet_send_monopd_client_packets" lineno="49317">
25329 <summary>
25330 Send monopd_client packets.
25331 </summary>
25332 @@ -40943,7 +41027,7 @@ Domain allowed access.
25333 </param>
25334 <infoflow type="write" weight="10"/>
25335 </interface>
25336 -<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="49318">
25337 +<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="49336">
25338 <summary>
25339 Do not audit attempts to send monopd_client packets.
25340 </summary>
25341 @@ -40954,7 +41038,7 @@ Domain to not audit.
25342 </param>
25343 <infoflow type="none"/>
25344 </interface>
25345 -<interface name="corenet_receive_monopd_client_packets" lineno="49337">
25346 +<interface name="corenet_receive_monopd_client_packets" lineno="49355">
25347 <summary>
25348 Receive monopd_client packets.
25349 </summary>
25350 @@ -40965,7 +41049,7 @@ Domain allowed access.
25351 </param>
25352 <infoflow type="read" weight="10"/>
25353 </interface>
25354 -<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="49356">
25355 +<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="49374">
25356 <summary>
25357 Do not audit attempts to receive monopd_client packets.
25358 </summary>
25359 @@ -40976,7 +41060,7 @@ Domain allowed access.
25360 </param>
25361 <infoflow type="none"/>
25362 </interface>
25363 -<interface name="corenet_sendrecv_monopd_client_packets" lineno="49375">
25364 +<interface name="corenet_sendrecv_monopd_client_packets" lineno="49393">
25365 <summary>
25366 Send and receive monopd_client packets.
25367 </summary>
25368 @@ -40987,7 +41071,7 @@ Domain allowed access.
25369 </param>
25370 <infoflow type="both" weight="10"/>
25371 </interface>
25372 -<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="49391">
25373 +<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="49409">
25374 <summary>
25375 Do not audit attempts to send and receive monopd_client packets.
25376 </summary>
25377 @@ -40998,7 +41082,7 @@ Domain to not audit.
25378 </param>
25379 <infoflow type="none"/>
25380 </interface>
25381 -<interface name="corenet_relabelto_monopd_client_packets" lineno="49406">
25382 +<interface name="corenet_relabelto_monopd_client_packets" lineno="49424">
25383 <summary>
25384 Relabel packets to monopd_client the packet type.
25385 </summary>
25386 @@ -41008,7 +41092,7 @@ Domain allowed access.
25387 </summary>
25388 </param>
25389 </interface>
25390 -<interface name="corenet_send_monopd_server_packets" lineno="49426">
25391 +<interface name="corenet_send_monopd_server_packets" lineno="49444">
25392 <summary>
25393 Send monopd_server packets.
25394 </summary>
25395 @@ -41019,7 +41103,7 @@ Domain allowed access.
25396 </param>
25397 <infoflow type="write" weight="10"/>
25398 </interface>
25399 -<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="49445">
25400 +<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="49463">
25401 <summary>
25402 Do not audit attempts to send monopd_server packets.
25403 </summary>
25404 @@ -41030,7 +41114,7 @@ Domain to not audit.
25405 </param>
25406 <infoflow type="none"/>
25407 </interface>
25408 -<interface name="corenet_receive_monopd_server_packets" lineno="49464">
25409 +<interface name="corenet_receive_monopd_server_packets" lineno="49482">
25410 <summary>
25411 Receive monopd_server packets.
25412 </summary>
25413 @@ -41041,7 +41125,7 @@ Domain allowed access.
25414 </param>
25415 <infoflow type="read" weight="10"/>
25416 </interface>
25417 -<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="49483">
25418 +<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="49501">
25419 <summary>
25420 Do not audit attempts to receive monopd_server packets.
25421 </summary>
25422 @@ -41052,7 +41136,7 @@ Domain allowed access.
25423 </param>
25424 <infoflow type="none"/>
25425 </interface>
25426 -<interface name="corenet_sendrecv_monopd_server_packets" lineno="49502">
25427 +<interface name="corenet_sendrecv_monopd_server_packets" lineno="49520">
25428 <summary>
25429 Send and receive monopd_server packets.
25430 </summary>
25431 @@ -41063,7 +41147,7 @@ Domain allowed access.
25432 </param>
25433 <infoflow type="both" weight="10"/>
25434 </interface>
25435 -<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="49518">
25436 +<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="49536">
25437 <summary>
25438 Do not audit attempts to send and receive monopd_server packets.
25439 </summary>
25440 @@ -41074,7 +41158,7 @@ Domain to not audit.
25441 </param>
25442 <infoflow type="none"/>
25443 </interface>
25444 -<interface name="corenet_relabelto_monopd_server_packets" lineno="49533">
25445 +<interface name="corenet_relabelto_monopd_server_packets" lineno="49551">
25446 <summary>
25447 Relabel packets to monopd_server the packet type.
25448 </summary>
25449 @@ -41084,7 +41168,7 @@ Domain allowed access.
25450 </summary>
25451 </param>
25452 </interface>
25453 -<interface name="corenet_tcp_sendrecv_mountd_port" lineno="49555">
25454 +<interface name="corenet_tcp_sendrecv_mountd_port" lineno="49573">
25455 <summary>
25456 Send and receive TCP traffic on the mountd port.
25457 </summary>
25458 @@ -41095,7 +41179,7 @@ Domain allowed access.
25459 </param>
25460 <infoflow type="both" weight="10"/>
25461 </interface>
25462 -<interface name="corenet_udp_send_mountd_port" lineno="49570">
25463 +<interface name="corenet_udp_send_mountd_port" lineno="49588">
25464 <summary>
25465 Send UDP traffic on the mountd port.
25466 </summary>
25467 @@ -41106,7 +41190,7 @@ Domain allowed access.
25468 </param>
25469 <infoflow type="write" weight="10"/>
25470 </interface>
25471 -<interface name="corenet_dontaudit_udp_send_mountd_port" lineno="49585">
25472 +<interface name="corenet_dontaudit_udp_send_mountd_port" lineno="49603">
25473 <summary>
25474 Do not audit attempts to send UDP traffic on the mountd port.
25475 </summary>
25476 @@ -41117,7 +41201,7 @@ Domain to not audit.
25477 </param>
25478 <infoflow type="none"/>
25479 </interface>
25480 -<interface name="corenet_udp_receive_mountd_port" lineno="49600">
25481 +<interface name="corenet_udp_receive_mountd_port" lineno="49618">
25482 <summary>
25483 Receive UDP traffic on the mountd port.
25484 </summary>
25485 @@ -41128,7 +41212,7 @@ Domain allowed access.
25486 </param>
25487 <infoflow type="read" weight="10"/>
25488 </interface>
25489 -<interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="49615">
25490 +<interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="49633">
25491 <summary>
25492 Do not audit attempts to receive UDP traffic on the mountd port.
25493 </summary>
25494 @@ -41139,7 +41223,7 @@ Domain to not audit.
25495 </param>
25496 <infoflow type="none"/>
25497 </interface>
25498 -<interface name="corenet_udp_sendrecv_mountd_port" lineno="49630">
25499 +<interface name="corenet_udp_sendrecv_mountd_port" lineno="49648">
25500 <summary>
25501 Send and receive UDP traffic on the mountd port.
25502 </summary>
25503 @@ -41150,7 +41234,7 @@ Domain allowed access.
25504 </param>
25505 <infoflow type="both" weight="10"/>
25506 </interface>
25507 -<interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="49646">
25508 +<interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="49664">
25509 <summary>
25510 Do not audit attempts to send and receive
25511 UDP traffic on the mountd port.
25512 @@ -41162,7 +41246,7 @@ Domain to not audit.
25513 </param>
25514 <infoflow type="none"/>
25515 </interface>
25516 -<interface name="corenet_tcp_bind_mountd_port" lineno="49661">
25517 +<interface name="corenet_tcp_bind_mountd_port" lineno="49679">
25518 <summary>
25519 Bind TCP sockets to the mountd port.
25520 </summary>
25521 @@ -41173,7 +41257,7 @@ Domain allowed access.
25522 </param>
25523 <infoflow type="none"/>
25524 </interface>
25525 -<interface name="corenet_udp_bind_mountd_port" lineno="49681">
25526 +<interface name="corenet_udp_bind_mountd_port" lineno="49699">
25527 <summary>
25528 Bind UDP sockets to the mountd port.
25529 </summary>
25530 @@ -41184,7 +41268,7 @@ Domain allowed access.
25531 </param>
25532 <infoflow type="none"/>
25533 </interface>
25534 -<interface name="corenet_tcp_connect_mountd_port" lineno="49700">
25535 +<interface name="corenet_tcp_connect_mountd_port" lineno="49718">
25536 <summary>
25537 Make a TCP connection to the mountd port.
25538 </summary>
25539 @@ -41194,7 +41278,7 @@ Domain allowed access.
25540 </summary>
25541 </param>
25542 </interface>
25543 -<interface name="corenet_send_mountd_client_packets" lineno="49720">
25544 +<interface name="corenet_send_mountd_client_packets" lineno="49738">
25545 <summary>
25546 Send mountd_client packets.
25547 </summary>
25548 @@ -41205,7 +41289,7 @@ Domain allowed access.
25549 </param>
25550 <infoflow type="write" weight="10"/>
25551 </interface>
25552 -<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="49739">
25553 +<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="49757">
25554 <summary>
25555 Do not audit attempts to send mountd_client packets.
25556 </summary>
25557 @@ -41216,7 +41300,7 @@ Domain to not audit.
25558 </param>
25559 <infoflow type="none"/>
25560 </interface>
25561 -<interface name="corenet_receive_mountd_client_packets" lineno="49758">
25562 +<interface name="corenet_receive_mountd_client_packets" lineno="49776">
25563 <summary>
25564 Receive mountd_client packets.
25565 </summary>
25566 @@ -41227,7 +41311,7 @@ Domain allowed access.
25567 </param>
25568 <infoflow type="read" weight="10"/>
25569 </interface>
25570 -<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="49777">
25571 +<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="49795">
25572 <summary>
25573 Do not audit attempts to receive mountd_client packets.
25574 </summary>
25575 @@ -41238,7 +41322,7 @@ Domain allowed access.
25576 </param>
25577 <infoflow type="none"/>
25578 </interface>
25579 -<interface name="corenet_sendrecv_mountd_client_packets" lineno="49796">
25580 +<interface name="corenet_sendrecv_mountd_client_packets" lineno="49814">
25581 <summary>
25582 Send and receive mountd_client packets.
25583 </summary>
25584 @@ -41249,7 +41333,7 @@ Domain allowed access.
25585 </param>
25586 <infoflow type="both" weight="10"/>
25587 </interface>
25588 -<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="49812">
25589 +<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="49830">
25590 <summary>
25591 Do not audit attempts to send and receive mountd_client packets.
25592 </summary>
25593 @@ -41260,7 +41344,7 @@ Domain to not audit.
25594 </param>
25595 <infoflow type="none"/>
25596 </interface>
25597 -<interface name="corenet_relabelto_mountd_client_packets" lineno="49827">
25598 +<interface name="corenet_relabelto_mountd_client_packets" lineno="49845">
25599 <summary>
25600 Relabel packets to mountd_client the packet type.
25601 </summary>
25602 @@ -41270,7 +41354,7 @@ Domain allowed access.
25603 </summary>
25604 </param>
25605 </interface>
25606 -<interface name="corenet_send_mountd_server_packets" lineno="49847">
25607 +<interface name="corenet_send_mountd_server_packets" lineno="49865">
25608 <summary>
25609 Send mountd_server packets.
25610 </summary>
25611 @@ -41281,7 +41365,7 @@ Domain allowed access.
25612 </param>
25613 <infoflow type="write" weight="10"/>
25614 </interface>
25615 -<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="49866">
25616 +<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="49884">
25617 <summary>
25618 Do not audit attempts to send mountd_server packets.
25619 </summary>
25620 @@ -41292,7 +41376,7 @@ Domain to not audit.
25621 </param>
25622 <infoflow type="none"/>
25623 </interface>
25624 -<interface name="corenet_receive_mountd_server_packets" lineno="49885">
25625 +<interface name="corenet_receive_mountd_server_packets" lineno="49903">
25626 <summary>
25627 Receive mountd_server packets.
25628 </summary>
25629 @@ -41303,7 +41387,7 @@ Domain allowed access.
25630 </param>
25631 <infoflow type="read" weight="10"/>
25632 </interface>
25633 -<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="49904">
25634 +<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="49922">
25635 <summary>
25636 Do not audit attempts to receive mountd_server packets.
25637 </summary>
25638 @@ -41314,7 +41398,7 @@ Domain allowed access.
25639 </param>
25640 <infoflow type="none"/>
25641 </interface>
25642 -<interface name="corenet_sendrecv_mountd_server_packets" lineno="49923">
25643 +<interface name="corenet_sendrecv_mountd_server_packets" lineno="49941">
25644 <summary>
25645 Send and receive mountd_server packets.
25646 </summary>
25647 @@ -41325,7 +41409,7 @@ Domain allowed access.
25648 </param>
25649 <infoflow type="both" weight="10"/>
25650 </interface>
25651 -<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="49939">
25652 +<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="49957">
25653 <summary>
25654 Do not audit attempts to send and receive mountd_server packets.
25655 </summary>
25656 @@ -41336,7 +41420,7 @@ Domain to not audit.
25657 </param>
25658 <infoflow type="none"/>
25659 </interface>
25660 -<interface name="corenet_relabelto_mountd_server_packets" lineno="49954">
25661 +<interface name="corenet_relabelto_mountd_server_packets" lineno="49972">
25662 <summary>
25663 Relabel packets to mountd_server the packet type.
25664 </summary>
25665 @@ -41346,7 +41430,7 @@ Domain allowed access.
25666 </summary>
25667 </param>
25668 </interface>
25669 -<interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="49976">
25670 +<interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="49994">
25671 <summary>
25672 Send and receive TCP traffic on the movaz_ssc port.
25673 </summary>
25674 @@ -41357,7 +41441,7 @@ Domain allowed access.
25675 </param>
25676 <infoflow type="both" weight="10"/>
25677 </interface>
25678 -<interface name="corenet_udp_send_movaz_ssc_port" lineno="49991">
25679 +<interface name="corenet_udp_send_movaz_ssc_port" lineno="50009">
25680 <summary>
25681 Send UDP traffic on the movaz_ssc port.
25682 </summary>
25683 @@ -41368,7 +41452,7 @@ Domain allowed access.
25684 </param>
25685 <infoflow type="write" weight="10"/>
25686 </interface>
25687 -<interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="50006">
25688 +<interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="50024">
25689 <summary>
25690 Do not audit attempts to send UDP traffic on the movaz_ssc port.
25691 </summary>
25692 @@ -41379,7 +41463,7 @@ Domain to not audit.
25693 </param>
25694 <infoflow type="none"/>
25695 </interface>
25696 -<interface name="corenet_udp_receive_movaz_ssc_port" lineno="50021">
25697 +<interface name="corenet_udp_receive_movaz_ssc_port" lineno="50039">
25698 <summary>
25699 Receive UDP traffic on the movaz_ssc port.
25700 </summary>
25701 @@ -41390,7 +41474,7 @@ Domain allowed access.
25702 </param>
25703 <infoflow type="read" weight="10"/>
25704 </interface>
25705 -<interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="50036">
25706 +<interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="50054">
25707 <summary>
25708 Do not audit attempts to receive UDP traffic on the movaz_ssc port.
25709 </summary>
25710 @@ -41401,7 +41485,7 @@ Domain to not audit.
25711 </param>
25712 <infoflow type="none"/>
25713 </interface>
25714 -<interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="50051">
25715 +<interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="50069">
25716 <summary>
25717 Send and receive UDP traffic on the movaz_ssc port.
25718 </summary>
25719 @@ -41412,7 +41496,7 @@ Domain allowed access.
25720 </param>
25721 <infoflow type="both" weight="10"/>
25722 </interface>
25723 -<interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="50067">
25724 +<interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="50085">
25725 <summary>
25726 Do not audit attempts to send and receive
25727 UDP traffic on the movaz_ssc port.
25728 @@ -41424,7 +41508,7 @@ Domain to not audit.
25729 </param>
25730 <infoflow type="none"/>
25731 </interface>
25732 -<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="50082">
25733 +<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="50100">
25734 <summary>
25735 Bind TCP sockets to the movaz_ssc port.
25736 </summary>
25737 @@ -41435,7 +41519,7 @@ Domain allowed access.
25738 </param>
25739 <infoflow type="none"/>
25740 </interface>
25741 -<interface name="corenet_udp_bind_movaz_ssc_port" lineno="50102">
25742 +<interface name="corenet_udp_bind_movaz_ssc_port" lineno="50120">
25743 <summary>
25744 Bind UDP sockets to the movaz_ssc port.
25745 </summary>
25746 @@ -41446,7 +41530,7 @@ Domain allowed access.
25747 </param>
25748 <infoflow type="none"/>
25749 </interface>
25750 -<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="50121">
25751 +<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="50139">
25752 <summary>
25753 Make a TCP connection to the movaz_ssc port.
25754 </summary>
25755 @@ -41456,7 +41540,7 @@ Domain allowed access.
25756 </summary>
25757 </param>
25758 </interface>
25759 -<interface name="corenet_send_movaz_ssc_client_packets" lineno="50141">
25760 +<interface name="corenet_send_movaz_ssc_client_packets" lineno="50159">
25761 <summary>
25762 Send movaz_ssc_client packets.
25763 </summary>
25764 @@ -41467,7 +41551,7 @@ Domain allowed access.
25765 </param>
25766 <infoflow type="write" weight="10"/>
25767 </interface>
25768 -<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="50160">
25769 +<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="50178">
25770 <summary>
25771 Do not audit attempts to send movaz_ssc_client packets.
25772 </summary>
25773 @@ -41478,7 +41562,7 @@ Domain to not audit.
25774 </param>
25775 <infoflow type="none"/>
25776 </interface>
25777 -<interface name="corenet_receive_movaz_ssc_client_packets" lineno="50179">
25778 +<interface name="corenet_receive_movaz_ssc_client_packets" lineno="50197">
25779 <summary>
25780 Receive movaz_ssc_client packets.
25781 </summary>
25782 @@ -41489,7 +41573,7 @@ Domain allowed access.
25783 </param>
25784 <infoflow type="read" weight="10"/>
25785 </interface>
25786 -<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="50198">
25787 +<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="50216">
25788 <summary>
25789 Do not audit attempts to receive movaz_ssc_client packets.
25790 </summary>
25791 @@ -41500,7 +41584,7 @@ Domain allowed access.
25792 </param>
25793 <infoflow type="none"/>
25794 </interface>
25795 -<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="50217">
25796 +<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="50235">
25797 <summary>
25798 Send and receive movaz_ssc_client packets.
25799 </summary>
25800 @@ -41511,7 +41595,7 @@ Domain allowed access.
25801 </param>
25802 <infoflow type="both" weight="10"/>
25803 </interface>
25804 -<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="50233">
25805 +<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="50251">
25806 <summary>
25807 Do not audit attempts to send and receive movaz_ssc_client packets.
25808 </summary>
25809 @@ -41522,7 +41606,7 @@ Domain to not audit.
25810 </param>
25811 <infoflow type="none"/>
25812 </interface>
25813 -<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="50248">
25814 +<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="50266">
25815 <summary>
25816 Relabel packets to movaz_ssc_client the packet type.
25817 </summary>
25818 @@ -41532,7 +41616,7 @@ Domain allowed access.
25819 </summary>
25820 </param>
25821 </interface>
25822 -<interface name="corenet_send_movaz_ssc_server_packets" lineno="50268">
25823 +<interface name="corenet_send_movaz_ssc_server_packets" lineno="50286">
25824 <summary>
25825 Send movaz_ssc_server packets.
25826 </summary>
25827 @@ -41543,7 +41627,7 @@ Domain allowed access.
25828 </param>
25829 <infoflow type="write" weight="10"/>
25830 </interface>
25831 -<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="50287">
25832 +<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="50305">
25833 <summary>
25834 Do not audit attempts to send movaz_ssc_server packets.
25835 </summary>
25836 @@ -41554,7 +41638,7 @@ Domain to not audit.
25837 </param>
25838 <infoflow type="none"/>
25839 </interface>
25840 -<interface name="corenet_receive_movaz_ssc_server_packets" lineno="50306">
25841 +<interface name="corenet_receive_movaz_ssc_server_packets" lineno="50324">
25842 <summary>
25843 Receive movaz_ssc_server packets.
25844 </summary>
25845 @@ -41565,7 +41649,7 @@ Domain allowed access.
25846 </param>
25847 <infoflow type="read" weight="10"/>
25848 </interface>
25849 -<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="50325">
25850 +<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="50343">
25851 <summary>
25852 Do not audit attempts to receive movaz_ssc_server packets.
25853 </summary>
25854 @@ -41576,7 +41660,7 @@ Domain allowed access.
25855 </param>
25856 <infoflow type="none"/>
25857 </interface>
25858 -<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="50344">
25859 +<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="50362">
25860 <summary>
25861 Send and receive movaz_ssc_server packets.
25862 </summary>
25863 @@ -41587,7 +41671,7 @@ Domain allowed access.
25864 </param>
25865 <infoflow type="both" weight="10"/>
25866 </interface>
25867 -<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="50360">
25868 +<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="50378">
25869 <summary>
25870 Do not audit attempts to send and receive movaz_ssc_server packets.
25871 </summary>
25872 @@ -41598,7 +41682,7 @@ Domain to not audit.
25873 </param>
25874 <infoflow type="none"/>
25875 </interface>
25876 -<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="50375">
25877 +<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="50393">
25878 <summary>
25879 Relabel packets to movaz_ssc_server the packet type.
25880 </summary>
25881 @@ -41608,7 +41692,7 @@ Domain allowed access.
25882 </summary>
25883 </param>
25884 </interface>
25885 -<interface name="corenet_tcp_sendrecv_mpd_port" lineno="50397">
25886 +<interface name="corenet_tcp_sendrecv_mpd_port" lineno="50415">
25887 <summary>
25888 Send and receive TCP traffic on the mpd port.
25889 </summary>
25890 @@ -41619,7 +41703,7 @@ Domain allowed access.
25891 </param>
25892 <infoflow type="both" weight="10"/>
25893 </interface>
25894 -<interface name="corenet_udp_send_mpd_port" lineno="50412">
25895 +<interface name="corenet_udp_send_mpd_port" lineno="50430">
25896 <summary>
25897 Send UDP traffic on the mpd port.
25898 </summary>
25899 @@ -41630,7 +41714,7 @@ Domain allowed access.
25900 </param>
25901 <infoflow type="write" weight="10"/>
25902 </interface>
25903 -<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="50427">
25904 +<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="50445">
25905 <summary>
25906 Do not audit attempts to send UDP traffic on the mpd port.
25907 </summary>
25908 @@ -41641,7 +41725,7 @@ Domain to not audit.
25909 </param>
25910 <infoflow type="none"/>
25911 </interface>
25912 -<interface name="corenet_udp_receive_mpd_port" lineno="50442">
25913 +<interface name="corenet_udp_receive_mpd_port" lineno="50460">
25914 <summary>
25915 Receive UDP traffic on the mpd port.
25916 </summary>
25917 @@ -41652,7 +41736,7 @@ Domain allowed access.
25918 </param>
25919 <infoflow type="read" weight="10"/>
25920 </interface>
25921 -<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="50457">
25922 +<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="50475">
25923 <summary>
25924 Do not audit attempts to receive UDP traffic on the mpd port.
25925 </summary>
25926 @@ -41663,7 +41747,7 @@ Domain to not audit.
25927 </param>
25928 <infoflow type="none"/>
25929 </interface>
25930 -<interface name="corenet_udp_sendrecv_mpd_port" lineno="50472">
25931 +<interface name="corenet_udp_sendrecv_mpd_port" lineno="50490">
25932 <summary>
25933 Send and receive UDP traffic on the mpd port.
25934 </summary>
25935 @@ -41674,7 +41758,7 @@ Domain allowed access.
25936 </param>
25937 <infoflow type="both" weight="10"/>
25938 </interface>
25939 -<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="50488">
25940 +<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="50506">
25941 <summary>
25942 Do not audit attempts to send and receive
25943 UDP traffic on the mpd port.
25944 @@ -41686,7 +41770,7 @@ Domain to not audit.
25945 </param>
25946 <infoflow type="none"/>
25947 </interface>
25948 -<interface name="corenet_tcp_bind_mpd_port" lineno="50503">
25949 +<interface name="corenet_tcp_bind_mpd_port" lineno="50521">
25950 <summary>
25951 Bind TCP sockets to the mpd port.
25952 </summary>
25953 @@ -41697,7 +41781,7 @@ Domain allowed access.
25954 </param>
25955 <infoflow type="none"/>
25956 </interface>
25957 -<interface name="corenet_udp_bind_mpd_port" lineno="50523">
25958 +<interface name="corenet_udp_bind_mpd_port" lineno="50541">
25959 <summary>
25960 Bind UDP sockets to the mpd port.
25961 </summary>
25962 @@ -41708,7 +41792,7 @@ Domain allowed access.
25963 </param>
25964 <infoflow type="none"/>
25965 </interface>
25966 -<interface name="corenet_tcp_connect_mpd_port" lineno="50542">
25967 +<interface name="corenet_tcp_connect_mpd_port" lineno="50560">
25968 <summary>
25969 Make a TCP connection to the mpd port.
25970 </summary>
25971 @@ -41718,7 +41802,7 @@ Domain allowed access.
25972 </summary>
25973 </param>
25974 </interface>
25975 -<interface name="corenet_send_mpd_client_packets" lineno="50562">
25976 +<interface name="corenet_send_mpd_client_packets" lineno="50580">
25977 <summary>
25978 Send mpd_client packets.
25979 </summary>
25980 @@ -41729,7 +41813,7 @@ Domain allowed access.
25981 </param>
25982 <infoflow type="write" weight="10"/>
25983 </interface>
25984 -<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="50581">
25985 +<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="50599">
25986 <summary>
25987 Do not audit attempts to send mpd_client packets.
25988 </summary>
25989 @@ -41740,7 +41824,7 @@ Domain to not audit.
25990 </param>
25991 <infoflow type="none"/>
25992 </interface>
25993 -<interface name="corenet_receive_mpd_client_packets" lineno="50600">
25994 +<interface name="corenet_receive_mpd_client_packets" lineno="50618">
25995 <summary>
25996 Receive mpd_client packets.
25997 </summary>
25998 @@ -41751,7 +41835,7 @@ Domain allowed access.
25999 </param>
26000 <infoflow type="read" weight="10"/>
26001 </interface>
26002 -<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="50619">
26003 +<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="50637">
26004 <summary>
26005 Do not audit attempts to receive mpd_client packets.
26006 </summary>
26007 @@ -41762,7 +41846,7 @@ Domain allowed access.
26008 </param>
26009 <infoflow type="none"/>
26010 </interface>
26011 -<interface name="corenet_sendrecv_mpd_client_packets" lineno="50638">
26012 +<interface name="corenet_sendrecv_mpd_client_packets" lineno="50656">
26013 <summary>
26014 Send and receive mpd_client packets.
26015 </summary>
26016 @@ -41773,7 +41857,7 @@ Domain allowed access.
26017 </param>
26018 <infoflow type="both" weight="10"/>
26019 </interface>
26020 -<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="50654">
26021 +<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="50672">
26022 <summary>
26023 Do not audit attempts to send and receive mpd_client packets.
26024 </summary>
26025 @@ -41784,7 +41868,7 @@ Domain to not audit.
26026 </param>
26027 <infoflow type="none"/>
26028 </interface>
26029 -<interface name="corenet_relabelto_mpd_client_packets" lineno="50669">
26030 +<interface name="corenet_relabelto_mpd_client_packets" lineno="50687">
26031 <summary>
26032 Relabel packets to mpd_client the packet type.
26033 </summary>
26034 @@ -41794,7 +41878,7 @@ Domain allowed access.
26035 </summary>
26036 </param>
26037 </interface>
26038 -<interface name="corenet_send_mpd_server_packets" lineno="50689">
26039 +<interface name="corenet_send_mpd_server_packets" lineno="50707">
26040 <summary>
26041 Send mpd_server packets.
26042 </summary>
26043 @@ -41805,7 +41889,7 @@ Domain allowed access.
26044 </param>
26045 <infoflow type="write" weight="10"/>
26046 </interface>
26047 -<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="50708">
26048 +<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="50726">
26049 <summary>
26050 Do not audit attempts to send mpd_server packets.
26051 </summary>
26052 @@ -41816,7 +41900,7 @@ Domain to not audit.
26053 </param>
26054 <infoflow type="none"/>
26055 </interface>
26056 -<interface name="corenet_receive_mpd_server_packets" lineno="50727">
26057 +<interface name="corenet_receive_mpd_server_packets" lineno="50745">
26058 <summary>
26059 Receive mpd_server packets.
26060 </summary>
26061 @@ -41827,7 +41911,7 @@ Domain allowed access.
26062 </param>
26063 <infoflow type="read" weight="10"/>
26064 </interface>
26065 -<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="50746">
26066 +<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="50764">
26067 <summary>
26068 Do not audit attempts to receive mpd_server packets.
26069 </summary>
26070 @@ -41838,7 +41922,7 @@ Domain allowed access.
26071 </param>
26072 <infoflow type="none"/>
26073 </interface>
26074 -<interface name="corenet_sendrecv_mpd_server_packets" lineno="50765">
26075 +<interface name="corenet_sendrecv_mpd_server_packets" lineno="50783">
26076 <summary>
26077 Send and receive mpd_server packets.
26078 </summary>
26079 @@ -41849,7 +41933,7 @@ Domain allowed access.
26080 </param>
26081 <infoflow type="both" weight="10"/>
26082 </interface>
26083 -<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="50781">
26084 +<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="50799">
26085 <summary>
26086 Do not audit attempts to send and receive mpd_server packets.
26087 </summary>
26088 @@ -41860,7 +41944,7 @@ Domain to not audit.
26089 </param>
26090 <infoflow type="none"/>
26091 </interface>
26092 -<interface name="corenet_relabelto_mpd_server_packets" lineno="50796">
26093 +<interface name="corenet_relabelto_mpd_server_packets" lineno="50814">
26094 <summary>
26095 Relabel packets to mpd_server the packet type.
26096 </summary>
26097 @@ -41870,7 +41954,7 @@ Domain allowed access.
26098 </summary>
26099 </param>
26100 </interface>
26101 -<interface name="corenet_tcp_sendrecv_msgsrvr_port" lineno="50818">
26102 +<interface name="corenet_tcp_sendrecv_msgsrvr_port" lineno="50836">
26103 <summary>
26104 Send and receive TCP traffic on the msgsrvr port.
26105 </summary>
26106 @@ -41881,7 +41965,7 @@ Domain allowed access.
26107 </param>
26108 <infoflow type="both" weight="10"/>
26109 </interface>
26110 -<interface name="corenet_udp_send_msgsrvr_port" lineno="50833">
26111 +<interface name="corenet_udp_send_msgsrvr_port" lineno="50851">
26112 <summary>
26113 Send UDP traffic on the msgsrvr port.
26114 </summary>
26115 @@ -41892,7 +41976,7 @@ Domain allowed access.
26116 </param>
26117 <infoflow type="write" weight="10"/>
26118 </interface>
26119 -<interface name="corenet_dontaudit_udp_send_msgsrvr_port" lineno="50848">
26120 +<interface name="corenet_dontaudit_udp_send_msgsrvr_port" lineno="50866">
26121 <summary>
26122 Do not audit attempts to send UDP traffic on the msgsrvr port.
26123 </summary>
26124 @@ -41903,7 +41987,7 @@ Domain to not audit.
26125 </param>
26126 <infoflow type="none"/>
26127 </interface>
26128 -<interface name="corenet_udp_receive_msgsrvr_port" lineno="50863">
26129 +<interface name="corenet_udp_receive_msgsrvr_port" lineno="50881">
26130 <summary>
26131 Receive UDP traffic on the msgsrvr port.
26132 </summary>
26133 @@ -41914,7 +41998,7 @@ Domain allowed access.
26134 </param>
26135 <infoflow type="read" weight="10"/>
26136 </interface>
26137 -<interface name="corenet_dontaudit_udp_receive_msgsrvr_port" lineno="50878">
26138 +<interface name="corenet_dontaudit_udp_receive_msgsrvr_port" lineno="50896">
26139 <summary>
26140 Do not audit attempts to receive UDP traffic on the msgsrvr port.
26141 </summary>
26142 @@ -41925,7 +42009,7 @@ Domain to not audit.
26143 </param>
26144 <infoflow type="none"/>
26145 </interface>
26146 -<interface name="corenet_udp_sendrecv_msgsrvr_port" lineno="50893">
26147 +<interface name="corenet_udp_sendrecv_msgsrvr_port" lineno="50911">
26148 <summary>
26149 Send and receive UDP traffic on the msgsrvr port.
26150 </summary>
26151 @@ -41936,7 +42020,7 @@ Domain allowed access.
26152 </param>
26153 <infoflow type="both" weight="10"/>
26154 </interface>
26155 -<interface name="corenet_dontaudit_udp_sendrecv_msgsrvr_port" lineno="50909">
26156 +<interface name="corenet_dontaudit_udp_sendrecv_msgsrvr_port" lineno="50927">
26157 <summary>
26158 Do not audit attempts to send and receive
26159 UDP traffic on the msgsrvr port.
26160 @@ -41948,7 +42032,7 @@ Domain to not audit.
26161 </param>
26162 <infoflow type="none"/>
26163 </interface>
26164 -<interface name="corenet_tcp_bind_msgsrvr_port" lineno="50924">
26165 +<interface name="corenet_tcp_bind_msgsrvr_port" lineno="50942">
26166 <summary>
26167 Bind TCP sockets to the msgsrvr port.
26168 </summary>
26169 @@ -41959,7 +42043,7 @@ Domain allowed access.
26170 </param>
26171 <infoflow type="none"/>
26172 </interface>
26173 -<interface name="corenet_udp_bind_msgsrvr_port" lineno="50944">
26174 +<interface name="corenet_udp_bind_msgsrvr_port" lineno="50962">
26175 <summary>
26176 Bind UDP sockets to the msgsrvr port.
26177 </summary>
26178 @@ -41970,7 +42054,7 @@ Domain allowed access.
26179 </param>
26180 <infoflow type="none"/>
26181 </interface>
26182 -<interface name="corenet_tcp_connect_msgsrvr_port" lineno="50963">
26183 +<interface name="corenet_tcp_connect_msgsrvr_port" lineno="50981">
26184 <summary>
26185 Make a TCP connection to the msgsrvr port.
26186 </summary>
26187 @@ -41980,7 +42064,7 @@ Domain allowed access.
26188 </summary>
26189 </param>
26190 </interface>
26191 -<interface name="corenet_send_msgsrvr_client_packets" lineno="50983">
26192 +<interface name="corenet_send_msgsrvr_client_packets" lineno="51001">
26193 <summary>
26194 Send msgsrvr_client packets.
26195 </summary>
26196 @@ -41991,7 +42075,7 @@ Domain allowed access.
26197 </param>
26198 <infoflow type="write" weight="10"/>
26199 </interface>
26200 -<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="51002">
26201 +<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="51020">
26202 <summary>
26203 Do not audit attempts to send msgsrvr_client packets.
26204 </summary>
26205 @@ -42002,7 +42086,7 @@ Domain to not audit.
26206 </param>
26207 <infoflow type="none"/>
26208 </interface>
26209 -<interface name="corenet_receive_msgsrvr_client_packets" lineno="51021">
26210 +<interface name="corenet_receive_msgsrvr_client_packets" lineno="51039">
26211 <summary>
26212 Receive msgsrvr_client packets.
26213 </summary>
26214 @@ -42013,7 +42097,7 @@ Domain allowed access.
26215 </param>
26216 <infoflow type="read" weight="10"/>
26217 </interface>
26218 -<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="51040">
26219 +<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="51058">
26220 <summary>
26221 Do not audit attempts to receive msgsrvr_client packets.
26222 </summary>
26223 @@ -42024,7 +42108,7 @@ Domain allowed access.
26224 </param>
26225 <infoflow type="none"/>
26226 </interface>
26227 -<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="51059">
26228 +<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="51077">
26229 <summary>
26230 Send and receive msgsrvr_client packets.
26231 </summary>
26232 @@ -42035,7 +42119,7 @@ Domain allowed access.
26233 </param>
26234 <infoflow type="both" weight="10"/>
26235 </interface>
26236 -<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="51075">
26237 +<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="51093">
26238 <summary>
26239 Do not audit attempts to send and receive msgsrvr_client packets.
26240 </summary>
26241 @@ -42046,7 +42130,7 @@ Domain to not audit.
26242 </param>
26243 <infoflow type="none"/>
26244 </interface>
26245 -<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="51090">
26246 +<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="51108">
26247 <summary>
26248 Relabel packets to msgsrvr_client the packet type.
26249 </summary>
26250 @@ -42056,7 +42140,7 @@ Domain allowed access.
26251 </summary>
26252 </param>
26253 </interface>
26254 -<interface name="corenet_send_msgsrvr_server_packets" lineno="51110">
26255 +<interface name="corenet_send_msgsrvr_server_packets" lineno="51128">
26256 <summary>
26257 Send msgsrvr_server packets.
26258 </summary>
26259 @@ -42067,7 +42151,7 @@ Domain allowed access.
26260 </param>
26261 <infoflow type="write" weight="10"/>
26262 </interface>
26263 -<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="51129">
26264 +<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="51147">
26265 <summary>
26266 Do not audit attempts to send msgsrvr_server packets.
26267 </summary>
26268 @@ -42078,7 +42162,7 @@ Domain to not audit.
26269 </param>
26270 <infoflow type="none"/>
26271 </interface>
26272 -<interface name="corenet_receive_msgsrvr_server_packets" lineno="51148">
26273 +<interface name="corenet_receive_msgsrvr_server_packets" lineno="51166">
26274 <summary>
26275 Receive msgsrvr_server packets.
26276 </summary>
26277 @@ -42089,7 +42173,7 @@ Domain allowed access.
26278 </param>
26279 <infoflow type="read" weight="10"/>
26280 </interface>
26281 -<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="51167">
26282 +<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="51185">
26283 <summary>
26284 Do not audit attempts to receive msgsrvr_server packets.
26285 </summary>
26286 @@ -42100,7 +42184,7 @@ Domain allowed access.
26287 </param>
26288 <infoflow type="none"/>
26289 </interface>
26290 -<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="51186">
26291 +<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="51204">
26292 <summary>
26293 Send and receive msgsrvr_server packets.
26294 </summary>
26295 @@ -42111,7 +42195,7 @@ Domain allowed access.
26296 </param>
26297 <infoflow type="both" weight="10"/>
26298 </interface>
26299 -<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="51202">
26300 +<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="51220">
26301 <summary>
26302 Do not audit attempts to send and receive msgsrvr_server packets.
26303 </summary>
26304 @@ -42122,7 +42206,7 @@ Domain to not audit.
26305 </param>
26306 <infoflow type="none"/>
26307 </interface>
26308 -<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="51217">
26309 +<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="51235">
26310 <summary>
26311 Relabel packets to msgsrvr_server the packet type.
26312 </summary>
26313 @@ -42132,7 +42216,7 @@ Domain allowed access.
26314 </summary>
26315 </param>
26316 </interface>
26317 -<interface name="corenet_tcp_sendrecv_msnp_port" lineno="51239">
26318 +<interface name="corenet_tcp_sendrecv_msnp_port" lineno="51257">
26319 <summary>
26320 Send and receive TCP traffic on the msnp port.
26321 </summary>
26322 @@ -42143,7 +42227,7 @@ Domain allowed access.
26323 </param>
26324 <infoflow type="both" weight="10"/>
26325 </interface>
26326 -<interface name="corenet_udp_send_msnp_port" lineno="51254">
26327 +<interface name="corenet_udp_send_msnp_port" lineno="51272">
26328 <summary>
26329 Send UDP traffic on the msnp port.
26330 </summary>
26331 @@ -42154,7 +42238,7 @@ Domain allowed access.
26332 </param>
26333 <infoflow type="write" weight="10"/>
26334 </interface>
26335 -<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="51269">
26336 +<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="51287">
26337 <summary>
26338 Do not audit attempts to send UDP traffic on the msnp port.
26339 </summary>
26340 @@ -42165,7 +42249,7 @@ Domain to not audit.
26341 </param>
26342 <infoflow type="none"/>
26343 </interface>
26344 -<interface name="corenet_udp_receive_msnp_port" lineno="51284">
26345 +<interface name="corenet_udp_receive_msnp_port" lineno="51302">
26346 <summary>
26347 Receive UDP traffic on the msnp port.
26348 </summary>
26349 @@ -42176,7 +42260,7 @@ Domain allowed access.
26350 </param>
26351 <infoflow type="read" weight="10"/>
26352 </interface>
26353 -<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="51299">
26354 +<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="51317">
26355 <summary>
26356 Do not audit attempts to receive UDP traffic on the msnp port.
26357 </summary>
26358 @@ -42187,7 +42271,7 @@ Domain to not audit.
26359 </param>
26360 <infoflow type="none"/>
26361 </interface>
26362 -<interface name="corenet_udp_sendrecv_msnp_port" lineno="51314">
26363 +<interface name="corenet_udp_sendrecv_msnp_port" lineno="51332">
26364 <summary>
26365 Send and receive UDP traffic on the msnp port.
26366 </summary>
26367 @@ -42198,7 +42282,7 @@ Domain allowed access.
26368 </param>
26369 <infoflow type="both" weight="10"/>
26370 </interface>
26371 -<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="51330">
26372 +<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="51348">
26373 <summary>
26374 Do not audit attempts to send and receive
26375 UDP traffic on the msnp port.
26376 @@ -42210,7 +42294,7 @@ Domain to not audit.
26377 </param>
26378 <infoflow type="none"/>
26379 </interface>
26380 -<interface name="corenet_tcp_bind_msnp_port" lineno="51345">
26381 +<interface name="corenet_tcp_bind_msnp_port" lineno="51363">
26382 <summary>
26383 Bind TCP sockets to the msnp port.
26384 </summary>
26385 @@ -42221,7 +42305,7 @@ Domain allowed access.
26386 </param>
26387 <infoflow type="none"/>
26388 </interface>
26389 -<interface name="corenet_udp_bind_msnp_port" lineno="51365">
26390 +<interface name="corenet_udp_bind_msnp_port" lineno="51383">
26391 <summary>
26392 Bind UDP sockets to the msnp port.
26393 </summary>
26394 @@ -42232,7 +42316,7 @@ Domain allowed access.
26395 </param>
26396 <infoflow type="none"/>
26397 </interface>
26398 -<interface name="corenet_tcp_connect_msnp_port" lineno="51384">
26399 +<interface name="corenet_tcp_connect_msnp_port" lineno="51402">
26400 <summary>
26401 Make a TCP connection to the msnp port.
26402 </summary>
26403 @@ -42242,7 +42326,7 @@ Domain allowed access.
26404 </summary>
26405 </param>
26406 </interface>
26407 -<interface name="corenet_send_msnp_client_packets" lineno="51404">
26408 +<interface name="corenet_send_msnp_client_packets" lineno="51422">
26409 <summary>
26410 Send msnp_client packets.
26411 </summary>
26412 @@ -42253,7 +42337,7 @@ Domain allowed access.
26413 </param>
26414 <infoflow type="write" weight="10"/>
26415 </interface>
26416 -<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="51423">
26417 +<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="51441">
26418 <summary>
26419 Do not audit attempts to send msnp_client packets.
26420 </summary>
26421 @@ -42264,7 +42348,7 @@ Domain to not audit.
26422 </param>
26423 <infoflow type="none"/>
26424 </interface>
26425 -<interface name="corenet_receive_msnp_client_packets" lineno="51442">
26426 +<interface name="corenet_receive_msnp_client_packets" lineno="51460">
26427 <summary>
26428 Receive msnp_client packets.
26429 </summary>
26430 @@ -42275,7 +42359,7 @@ Domain allowed access.
26431 </param>
26432 <infoflow type="read" weight="10"/>
26433 </interface>
26434 -<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="51461">
26435 +<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="51479">
26436 <summary>
26437 Do not audit attempts to receive msnp_client packets.
26438 </summary>
26439 @@ -42286,7 +42370,7 @@ Domain allowed access.
26440 </param>
26441 <infoflow type="none"/>
26442 </interface>
26443 -<interface name="corenet_sendrecv_msnp_client_packets" lineno="51480">
26444 +<interface name="corenet_sendrecv_msnp_client_packets" lineno="51498">
26445 <summary>
26446 Send and receive msnp_client packets.
26447 </summary>
26448 @@ -42297,7 +42381,7 @@ Domain allowed access.
26449 </param>
26450 <infoflow type="both" weight="10"/>
26451 </interface>
26452 -<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="51496">
26453 +<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="51514">
26454 <summary>
26455 Do not audit attempts to send and receive msnp_client packets.
26456 </summary>
26457 @@ -42308,7 +42392,7 @@ Domain to not audit.
26458 </param>
26459 <infoflow type="none"/>
26460 </interface>
26461 -<interface name="corenet_relabelto_msnp_client_packets" lineno="51511">
26462 +<interface name="corenet_relabelto_msnp_client_packets" lineno="51529">
26463 <summary>
26464 Relabel packets to msnp_client the packet type.
26465 </summary>
26466 @@ -42318,7 +42402,7 @@ Domain allowed access.
26467 </summary>
26468 </param>
26469 </interface>
26470 -<interface name="corenet_send_msnp_server_packets" lineno="51531">
26471 +<interface name="corenet_send_msnp_server_packets" lineno="51549">
26472 <summary>
26473 Send msnp_server packets.
26474 </summary>
26475 @@ -42329,7 +42413,7 @@ Domain allowed access.
26476 </param>
26477 <infoflow type="write" weight="10"/>
26478 </interface>
26479 -<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="51550">
26480 +<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="51568">
26481 <summary>
26482 Do not audit attempts to send msnp_server packets.
26483 </summary>
26484 @@ -42340,7 +42424,7 @@ Domain to not audit.
26485 </param>
26486 <infoflow type="none"/>
26487 </interface>
26488 -<interface name="corenet_receive_msnp_server_packets" lineno="51569">
26489 +<interface name="corenet_receive_msnp_server_packets" lineno="51587">
26490 <summary>
26491 Receive msnp_server packets.
26492 </summary>
26493 @@ -42351,7 +42435,7 @@ Domain allowed access.
26494 </param>
26495 <infoflow type="read" weight="10"/>
26496 </interface>
26497 -<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="51588">
26498 +<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="51606">
26499 <summary>
26500 Do not audit attempts to receive msnp_server packets.
26501 </summary>
26502 @@ -42362,7 +42446,7 @@ Domain allowed access.
26503 </param>
26504 <infoflow type="none"/>
26505 </interface>
26506 -<interface name="corenet_sendrecv_msnp_server_packets" lineno="51607">
26507 +<interface name="corenet_sendrecv_msnp_server_packets" lineno="51625">
26508 <summary>
26509 Send and receive msnp_server packets.
26510 </summary>
26511 @@ -42373,7 +42457,7 @@ Domain allowed access.
26512 </param>
26513 <infoflow type="both" weight="10"/>
26514 </interface>
26515 -<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="51623">
26516 +<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="51641">
26517 <summary>
26518 Do not audit attempts to send and receive msnp_server packets.
26519 </summary>
26520 @@ -42384,7 +42468,7 @@ Domain to not audit.
26521 </param>
26522 <infoflow type="none"/>
26523 </interface>
26524 -<interface name="corenet_relabelto_msnp_server_packets" lineno="51638">
26525 +<interface name="corenet_relabelto_msnp_server_packets" lineno="51656">
26526 <summary>
26527 Relabel packets to msnp_server the packet type.
26528 </summary>
26529 @@ -42394,7 +42478,7 @@ Domain allowed access.
26530 </summary>
26531 </param>
26532 </interface>
26533 -<interface name="corenet_tcp_sendrecv_mssql_port" lineno="51660">
26534 +<interface name="corenet_tcp_sendrecv_mssql_port" lineno="51678">
26535 <summary>
26536 Send and receive TCP traffic on the mssql port.
26537 </summary>
26538 @@ -42405,7 +42489,7 @@ Domain allowed access.
26539 </param>
26540 <infoflow type="both" weight="10"/>
26541 </interface>
26542 -<interface name="corenet_udp_send_mssql_port" lineno="51675">
26543 +<interface name="corenet_udp_send_mssql_port" lineno="51693">
26544 <summary>
26545 Send UDP traffic on the mssql port.
26546 </summary>
26547 @@ -42416,7 +42500,7 @@ Domain allowed access.
26548 </param>
26549 <infoflow type="write" weight="10"/>
26550 </interface>
26551 -<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="51690">
26552 +<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="51708">
26553 <summary>
26554 Do not audit attempts to send UDP traffic on the mssql port.
26555 </summary>
26556 @@ -42427,7 +42511,7 @@ Domain to not audit.
26557 </param>
26558 <infoflow type="none"/>
26559 </interface>
26560 -<interface name="corenet_udp_receive_mssql_port" lineno="51705">
26561 +<interface name="corenet_udp_receive_mssql_port" lineno="51723">
26562 <summary>
26563 Receive UDP traffic on the mssql port.
26564 </summary>
26565 @@ -42438,7 +42522,7 @@ Domain allowed access.
26566 </param>
26567 <infoflow type="read" weight="10"/>
26568 </interface>
26569 -<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="51720">
26570 +<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="51738">
26571 <summary>
26572 Do not audit attempts to receive UDP traffic on the mssql port.
26573 </summary>
26574 @@ -42449,7 +42533,7 @@ Domain to not audit.
26575 </param>
26576 <infoflow type="none"/>
26577 </interface>
26578 -<interface name="corenet_udp_sendrecv_mssql_port" lineno="51735">
26579 +<interface name="corenet_udp_sendrecv_mssql_port" lineno="51753">
26580 <summary>
26581 Send and receive UDP traffic on the mssql port.
26582 </summary>
26583 @@ -42460,7 +42544,7 @@ Domain allowed access.
26584 </param>
26585 <infoflow type="both" weight="10"/>
26586 </interface>
26587 -<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="51751">
26588 +<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="51769">
26589 <summary>
26590 Do not audit attempts to send and receive
26591 UDP traffic on the mssql port.
26592 @@ -42472,7 +42556,7 @@ Domain to not audit.
26593 </param>
26594 <infoflow type="none"/>
26595 </interface>
26596 -<interface name="corenet_tcp_bind_mssql_port" lineno="51766">
26597 +<interface name="corenet_tcp_bind_mssql_port" lineno="51784">
26598 <summary>
26599 Bind TCP sockets to the mssql port.
26600 </summary>
26601 @@ -42483,7 +42567,7 @@ Domain allowed access.
26602 </param>
26603 <infoflow type="none"/>
26604 </interface>
26605 -<interface name="corenet_udp_bind_mssql_port" lineno="51786">
26606 +<interface name="corenet_udp_bind_mssql_port" lineno="51804">
26607 <summary>
26608 Bind UDP sockets to the mssql port.
26609 </summary>
26610 @@ -42494,7 +42578,7 @@ Domain allowed access.
26611 </param>
26612 <infoflow type="none"/>
26613 </interface>
26614 -<interface name="corenet_tcp_connect_mssql_port" lineno="51805">
26615 +<interface name="corenet_tcp_connect_mssql_port" lineno="51823">
26616 <summary>
26617 Make a TCP connection to the mssql port.
26618 </summary>
26619 @@ -42504,7 +42588,7 @@ Domain allowed access.
26620 </summary>
26621 </param>
26622 </interface>
26623 -<interface name="corenet_send_mssql_client_packets" lineno="51825">
26624 +<interface name="corenet_send_mssql_client_packets" lineno="51843">
26625 <summary>
26626 Send mssql_client packets.
26627 </summary>
26628 @@ -42515,7 +42599,7 @@ Domain allowed access.
26629 </param>
26630 <infoflow type="write" weight="10"/>
26631 </interface>
26632 -<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="51844">
26633 +<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="51862">
26634 <summary>
26635 Do not audit attempts to send mssql_client packets.
26636 </summary>
26637 @@ -42526,7 +42610,7 @@ Domain to not audit.
26638 </param>
26639 <infoflow type="none"/>
26640 </interface>
26641 -<interface name="corenet_receive_mssql_client_packets" lineno="51863">
26642 +<interface name="corenet_receive_mssql_client_packets" lineno="51881">
26643 <summary>
26644 Receive mssql_client packets.
26645 </summary>
26646 @@ -42537,7 +42621,7 @@ Domain allowed access.
26647 </param>
26648 <infoflow type="read" weight="10"/>
26649 </interface>
26650 -<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="51882">
26651 +<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="51900">
26652 <summary>
26653 Do not audit attempts to receive mssql_client packets.
26654 </summary>
26655 @@ -42548,7 +42632,7 @@ Domain allowed access.
26656 </param>
26657 <infoflow type="none"/>
26658 </interface>
26659 -<interface name="corenet_sendrecv_mssql_client_packets" lineno="51901">
26660 +<interface name="corenet_sendrecv_mssql_client_packets" lineno="51919">
26661 <summary>
26662 Send and receive mssql_client packets.
26663 </summary>
26664 @@ -42559,7 +42643,7 @@ Domain allowed access.
26665 </param>
26666 <infoflow type="both" weight="10"/>
26667 </interface>
26668 -<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="51917">
26669 +<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="51935">
26670 <summary>
26671 Do not audit attempts to send and receive mssql_client packets.
26672 </summary>
26673 @@ -42570,7 +42654,7 @@ Domain to not audit.
26674 </param>
26675 <infoflow type="none"/>
26676 </interface>
26677 -<interface name="corenet_relabelto_mssql_client_packets" lineno="51932">
26678 +<interface name="corenet_relabelto_mssql_client_packets" lineno="51950">
26679 <summary>
26680 Relabel packets to mssql_client the packet type.
26681 </summary>
26682 @@ -42580,7 +42664,7 @@ Domain allowed access.
26683 </summary>
26684 </param>
26685 </interface>
26686 -<interface name="corenet_send_mssql_server_packets" lineno="51952">
26687 +<interface name="corenet_send_mssql_server_packets" lineno="51970">
26688 <summary>
26689 Send mssql_server packets.
26690 </summary>
26691 @@ -42591,7 +42675,7 @@ Domain allowed access.
26692 </param>
26693 <infoflow type="write" weight="10"/>
26694 </interface>
26695 -<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="51971">
26696 +<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="51989">
26697 <summary>
26698 Do not audit attempts to send mssql_server packets.
26699 </summary>
26700 @@ -42602,7 +42686,7 @@ Domain to not audit.
26701 </param>
26702 <infoflow type="none"/>
26703 </interface>
26704 -<interface name="corenet_receive_mssql_server_packets" lineno="51990">
26705 +<interface name="corenet_receive_mssql_server_packets" lineno="52008">
26706 <summary>
26707 Receive mssql_server packets.
26708 </summary>
26709 @@ -42613,7 +42697,7 @@ Domain allowed access.
26710 </param>
26711 <infoflow type="read" weight="10"/>
26712 </interface>
26713 -<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="52009">
26714 +<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="52027">
26715 <summary>
26716 Do not audit attempts to receive mssql_server packets.
26717 </summary>
26718 @@ -42624,7 +42708,7 @@ Domain allowed access.
26719 </param>
26720 <infoflow type="none"/>
26721 </interface>
26722 -<interface name="corenet_sendrecv_mssql_server_packets" lineno="52028">
26723 +<interface name="corenet_sendrecv_mssql_server_packets" lineno="52046">
26724 <summary>
26725 Send and receive mssql_server packets.
26726 </summary>
26727 @@ -42635,7 +42719,7 @@ Domain allowed access.
26728 </param>
26729 <infoflow type="both" weight="10"/>
26730 </interface>
26731 -<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="52044">
26732 +<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="52062">
26733 <summary>
26734 Do not audit attempts to send and receive mssql_server packets.
26735 </summary>
26736 @@ -42646,7 +42730,7 @@ Domain to not audit.
26737 </param>
26738 <infoflow type="none"/>
26739 </interface>
26740 -<interface name="corenet_relabelto_mssql_server_packets" lineno="52059">
26741 +<interface name="corenet_relabelto_mssql_server_packets" lineno="52077">
26742 <summary>
26743 Relabel packets to mssql_server the packet type.
26744 </summary>
26745 @@ -42656,7 +42740,7 @@ Domain allowed access.
26746 </summary>
26747 </param>
26748 </interface>
26749 -<interface name="corenet_tcp_sendrecv_ms_streaming_port" lineno="52081">
26750 +<interface name="corenet_tcp_sendrecv_ms_streaming_port" lineno="52099">
26751 <summary>
26752 Send and receive TCP traffic on the ms_streaming port.
26753 </summary>
26754 @@ -42667,7 +42751,7 @@ Domain allowed access.
26755 </param>
26756 <infoflow type="both" weight="10"/>
26757 </interface>
26758 -<interface name="corenet_udp_send_ms_streaming_port" lineno="52096">
26759 +<interface name="corenet_udp_send_ms_streaming_port" lineno="52114">
26760 <summary>
26761 Send UDP traffic on the ms_streaming port.
26762 </summary>
26763 @@ -42678,7 +42762,7 @@ Domain allowed access.
26764 </param>
26765 <infoflow type="write" weight="10"/>
26766 </interface>
26767 -<interface name="corenet_dontaudit_udp_send_ms_streaming_port" lineno="52111">
26768 +<interface name="corenet_dontaudit_udp_send_ms_streaming_port" lineno="52129">
26769 <summary>
26770 Do not audit attempts to send UDP traffic on the ms_streaming port.
26771 </summary>
26772 @@ -42689,7 +42773,7 @@ Domain to not audit.
26773 </param>
26774 <infoflow type="none"/>
26775 </interface>
26776 -<interface name="corenet_udp_receive_ms_streaming_port" lineno="52126">
26777 +<interface name="corenet_udp_receive_ms_streaming_port" lineno="52144">
26778 <summary>
26779 Receive UDP traffic on the ms_streaming port.
26780 </summary>
26781 @@ -42700,7 +42784,7 @@ Domain allowed access.
26782 </param>
26783 <infoflow type="read" weight="10"/>
26784 </interface>
26785 -<interface name="corenet_dontaudit_udp_receive_ms_streaming_port" lineno="52141">
26786 +<interface name="corenet_dontaudit_udp_receive_ms_streaming_port" lineno="52159">
26787 <summary>
26788 Do not audit attempts to receive UDP traffic on the ms_streaming port.
26789 </summary>
26790 @@ -42711,7 +42795,7 @@ Domain to not audit.
26791 </param>
26792 <infoflow type="none"/>
26793 </interface>
26794 -<interface name="corenet_udp_sendrecv_ms_streaming_port" lineno="52156">
26795 +<interface name="corenet_udp_sendrecv_ms_streaming_port" lineno="52174">
26796 <summary>
26797 Send and receive UDP traffic on the ms_streaming port.
26798 </summary>
26799 @@ -42722,7 +42806,7 @@ Domain allowed access.
26800 </param>
26801 <infoflow type="both" weight="10"/>
26802 </interface>
26803 -<interface name="corenet_dontaudit_udp_sendrecv_ms_streaming_port" lineno="52172">
26804 +<interface name="corenet_dontaudit_udp_sendrecv_ms_streaming_port" lineno="52190">
26805 <summary>
26806 Do not audit attempts to send and receive
26807 UDP traffic on the ms_streaming port.
26808 @@ -42734,7 +42818,7 @@ Domain to not audit.
26809 </param>
26810 <infoflow type="none"/>
26811 </interface>
26812 -<interface name="corenet_tcp_bind_ms_streaming_port" lineno="52187">
26813 +<interface name="corenet_tcp_bind_ms_streaming_port" lineno="52205">
26814 <summary>
26815 Bind TCP sockets to the ms_streaming port.
26816 </summary>
26817 @@ -42745,7 +42829,7 @@ Domain allowed access.
26818 </param>
26819 <infoflow type="none"/>
26820 </interface>
26821 -<interface name="corenet_udp_bind_ms_streaming_port" lineno="52207">
26822 +<interface name="corenet_udp_bind_ms_streaming_port" lineno="52225">
26823 <summary>
26824 Bind UDP sockets to the ms_streaming port.
26825 </summary>
26826 @@ -42756,7 +42840,7 @@ Domain allowed access.
26827 </param>
26828 <infoflow type="none"/>
26829 </interface>
26830 -<interface name="corenet_tcp_connect_ms_streaming_port" lineno="52226">
26831 +<interface name="corenet_tcp_connect_ms_streaming_port" lineno="52244">
26832 <summary>
26833 Make a TCP connection to the ms_streaming port.
26834 </summary>
26835 @@ -42766,7 +42850,7 @@ Domain allowed access.
26836 </summary>
26837 </param>
26838 </interface>
26839 -<interface name="corenet_send_ms_streaming_client_packets" lineno="52246">
26840 +<interface name="corenet_send_ms_streaming_client_packets" lineno="52264">
26841 <summary>
26842 Send ms_streaming_client packets.
26843 </summary>
26844 @@ -42777,7 +42861,7 @@ Domain allowed access.
26845 </param>
26846 <infoflow type="write" weight="10"/>
26847 </interface>
26848 -<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="52265">
26849 +<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="52283">
26850 <summary>
26851 Do not audit attempts to send ms_streaming_client packets.
26852 </summary>
26853 @@ -42788,7 +42872,7 @@ Domain to not audit.
26854 </param>
26855 <infoflow type="none"/>
26856 </interface>
26857 -<interface name="corenet_receive_ms_streaming_client_packets" lineno="52284">
26858 +<interface name="corenet_receive_ms_streaming_client_packets" lineno="52302">
26859 <summary>
26860 Receive ms_streaming_client packets.
26861 </summary>
26862 @@ -42799,7 +42883,7 @@ Domain allowed access.
26863 </param>
26864 <infoflow type="read" weight="10"/>
26865 </interface>
26866 -<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="52303">
26867 +<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="52321">
26868 <summary>
26869 Do not audit attempts to receive ms_streaming_client packets.
26870 </summary>
26871 @@ -42810,7 +42894,7 @@ Domain allowed access.
26872 </param>
26873 <infoflow type="none"/>
26874 </interface>
26875 -<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="52322">
26876 +<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="52340">
26877 <summary>
26878 Send and receive ms_streaming_client packets.
26879 </summary>
26880 @@ -42821,7 +42905,7 @@ Domain allowed access.
26881 </param>
26882 <infoflow type="both" weight="10"/>
26883 </interface>
26884 -<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="52338">
26885 +<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="52356">
26886 <summary>
26887 Do not audit attempts to send and receive ms_streaming_client packets.
26888 </summary>
26889 @@ -42832,7 +42916,7 @@ Domain to not audit.
26890 </param>
26891 <infoflow type="none"/>
26892 </interface>
26893 -<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="52353">
26894 +<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="52371">
26895 <summary>
26896 Relabel packets to ms_streaming_client the packet type.
26897 </summary>
26898 @@ -42842,7 +42926,7 @@ Domain allowed access.
26899 </summary>
26900 </param>
26901 </interface>
26902 -<interface name="corenet_send_ms_streaming_server_packets" lineno="52373">
26903 +<interface name="corenet_send_ms_streaming_server_packets" lineno="52391">
26904 <summary>
26905 Send ms_streaming_server packets.
26906 </summary>
26907 @@ -42853,7 +42937,7 @@ Domain allowed access.
26908 </param>
26909 <infoflow type="write" weight="10"/>
26910 </interface>
26911 -<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="52392">
26912 +<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="52410">
26913 <summary>
26914 Do not audit attempts to send ms_streaming_server packets.
26915 </summary>
26916 @@ -42864,7 +42948,7 @@ Domain to not audit.
26917 </param>
26918 <infoflow type="none"/>
26919 </interface>
26920 -<interface name="corenet_receive_ms_streaming_server_packets" lineno="52411">
26921 +<interface name="corenet_receive_ms_streaming_server_packets" lineno="52429">
26922 <summary>
26923 Receive ms_streaming_server packets.
26924 </summary>
26925 @@ -42875,7 +42959,7 @@ Domain allowed access.
26926 </param>
26927 <infoflow type="read" weight="10"/>
26928 </interface>
26929 -<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="52430">
26930 +<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="52448">
26931 <summary>
26932 Do not audit attempts to receive ms_streaming_server packets.
26933 </summary>
26934 @@ -42886,7 +42970,7 @@ Domain allowed access.
26935 </param>
26936 <infoflow type="none"/>
26937 </interface>
26938 -<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="52449">
26939 +<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="52467">
26940 <summary>
26941 Send and receive ms_streaming_server packets.
26942 </summary>
26943 @@ -42897,7 +42981,7 @@ Domain allowed access.
26944 </param>
26945 <infoflow type="both" weight="10"/>
26946 </interface>
26947 -<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="52465">
26948 +<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="52483">
26949 <summary>
26950 Do not audit attempts to send and receive ms_streaming_server packets.
26951 </summary>
26952 @@ -42908,7 +42992,7 @@ Domain to not audit.
26953 </param>
26954 <infoflow type="none"/>
26955 </interface>
26956 -<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="52480">
26957 +<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="52498">
26958 <summary>
26959 Relabel packets to ms_streaming_server the packet type.
26960 </summary>
26961 @@ -42918,7 +43002,7 @@ Domain allowed access.
26962 </summary>
26963 </param>
26964 </interface>
26965 -<interface name="corenet_tcp_sendrecv_munin_port" lineno="52502">
26966 +<interface name="corenet_tcp_sendrecv_munin_port" lineno="52520">
26967 <summary>
26968 Send and receive TCP traffic on the munin port.
26969 </summary>
26970 @@ -42929,7 +43013,7 @@ Domain allowed access.
26971 </param>
26972 <infoflow type="both" weight="10"/>
26973 </interface>
26974 -<interface name="corenet_udp_send_munin_port" lineno="52517">
26975 +<interface name="corenet_udp_send_munin_port" lineno="52535">
26976 <summary>
26977 Send UDP traffic on the munin port.
26978 </summary>
26979 @@ -42940,7 +43024,7 @@ Domain allowed access.
26980 </param>
26981 <infoflow type="write" weight="10"/>
26982 </interface>
26983 -<interface name="corenet_dontaudit_udp_send_munin_port" lineno="52532">
26984 +<interface name="corenet_dontaudit_udp_send_munin_port" lineno="52550">
26985 <summary>
26986 Do not audit attempts to send UDP traffic on the munin port.
26987 </summary>
26988 @@ -42951,7 +43035,7 @@ Domain to not audit.
26989 </param>
26990 <infoflow type="none"/>
26991 </interface>
26992 -<interface name="corenet_udp_receive_munin_port" lineno="52547">
26993 +<interface name="corenet_udp_receive_munin_port" lineno="52565">
26994 <summary>
26995 Receive UDP traffic on the munin port.
26996 </summary>
26997 @@ -42962,7 +43046,7 @@ Domain allowed access.
26998 </param>
26999 <infoflow type="read" weight="10"/>
27000 </interface>
27001 -<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="52562">
27002 +<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="52580">
27003 <summary>
27004 Do not audit attempts to receive UDP traffic on the munin port.
27005 </summary>
27006 @@ -42973,7 +43057,7 @@ Domain to not audit.
27007 </param>
27008 <infoflow type="none"/>
27009 </interface>
27010 -<interface name="corenet_udp_sendrecv_munin_port" lineno="52577">
27011 +<interface name="corenet_udp_sendrecv_munin_port" lineno="52595">
27012 <summary>
27013 Send and receive UDP traffic on the munin port.
27014 </summary>
27015 @@ -42984,7 +43068,7 @@ Domain allowed access.
27016 </param>
27017 <infoflow type="both" weight="10"/>
27018 </interface>
27019 -<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="52593">
27020 +<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="52611">
27021 <summary>
27022 Do not audit attempts to send and receive
27023 UDP traffic on the munin port.
27024 @@ -42996,7 +43080,7 @@ Domain to not audit.
27025 </param>
27026 <infoflow type="none"/>
27027 </interface>
27028 -<interface name="corenet_tcp_bind_munin_port" lineno="52608">
27029 +<interface name="corenet_tcp_bind_munin_port" lineno="52626">
27030 <summary>
27031 Bind TCP sockets to the munin port.
27032 </summary>
27033 @@ -43007,7 +43091,7 @@ Domain allowed access.
27034 </param>
27035 <infoflow type="none"/>
27036 </interface>
27037 -<interface name="corenet_udp_bind_munin_port" lineno="52628">
27038 +<interface name="corenet_udp_bind_munin_port" lineno="52646">
27039 <summary>
27040 Bind UDP sockets to the munin port.
27041 </summary>
27042 @@ -43018,7 +43102,7 @@ Domain allowed access.
27043 </param>
27044 <infoflow type="none"/>
27045 </interface>
27046 -<interface name="corenet_tcp_connect_munin_port" lineno="52647">
27047 +<interface name="corenet_tcp_connect_munin_port" lineno="52665">
27048 <summary>
27049 Make a TCP connection to the munin port.
27050 </summary>
27051 @@ -43028,7 +43112,7 @@ Domain allowed access.
27052 </summary>
27053 </param>
27054 </interface>
27055 -<interface name="corenet_send_munin_client_packets" lineno="52667">
27056 +<interface name="corenet_send_munin_client_packets" lineno="52685">
27057 <summary>
27058 Send munin_client packets.
27059 </summary>
27060 @@ -43039,7 +43123,7 @@ Domain allowed access.
27061 </param>
27062 <infoflow type="write" weight="10"/>
27063 </interface>
27064 -<interface name="corenet_dontaudit_send_munin_client_packets" lineno="52686">
27065 +<interface name="corenet_dontaudit_send_munin_client_packets" lineno="52704">
27066 <summary>
27067 Do not audit attempts to send munin_client packets.
27068 </summary>
27069 @@ -43050,7 +43134,7 @@ Domain to not audit.
27070 </param>
27071 <infoflow type="none"/>
27072 </interface>
27073 -<interface name="corenet_receive_munin_client_packets" lineno="52705">
27074 +<interface name="corenet_receive_munin_client_packets" lineno="52723">
27075 <summary>
27076 Receive munin_client packets.
27077 </summary>
27078 @@ -43061,7 +43145,7 @@ Domain allowed access.
27079 </param>
27080 <infoflow type="read" weight="10"/>
27081 </interface>
27082 -<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="52724">
27083 +<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="52742">
27084 <summary>
27085 Do not audit attempts to receive munin_client packets.
27086 </summary>
27087 @@ -43072,7 +43156,7 @@ Domain allowed access.
27088 </param>
27089 <infoflow type="none"/>
27090 </interface>
27091 -<interface name="corenet_sendrecv_munin_client_packets" lineno="52743">
27092 +<interface name="corenet_sendrecv_munin_client_packets" lineno="52761">
27093 <summary>
27094 Send and receive munin_client packets.
27095 </summary>
27096 @@ -43083,7 +43167,7 @@ Domain allowed access.
27097 </param>
27098 <infoflow type="both" weight="10"/>
27099 </interface>
27100 -<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="52759">
27101 +<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="52777">
27102 <summary>
27103 Do not audit attempts to send and receive munin_client packets.
27104 </summary>
27105 @@ -43094,7 +43178,7 @@ Domain to not audit.
27106 </param>
27107 <infoflow type="none"/>
27108 </interface>
27109 -<interface name="corenet_relabelto_munin_client_packets" lineno="52774">
27110 +<interface name="corenet_relabelto_munin_client_packets" lineno="52792">
27111 <summary>
27112 Relabel packets to munin_client the packet type.
27113 </summary>
27114 @@ -43104,7 +43188,7 @@ Domain allowed access.
27115 </summary>
27116 </param>
27117 </interface>
27118 -<interface name="corenet_send_munin_server_packets" lineno="52794">
27119 +<interface name="corenet_send_munin_server_packets" lineno="52812">
27120 <summary>
27121 Send munin_server packets.
27122 </summary>
27123 @@ -43115,7 +43199,7 @@ Domain allowed access.
27124 </param>
27125 <infoflow type="write" weight="10"/>
27126 </interface>
27127 -<interface name="corenet_dontaudit_send_munin_server_packets" lineno="52813">
27128 +<interface name="corenet_dontaudit_send_munin_server_packets" lineno="52831">
27129 <summary>
27130 Do not audit attempts to send munin_server packets.
27131 </summary>
27132 @@ -43126,7 +43210,7 @@ Domain to not audit.
27133 </param>
27134 <infoflow type="none"/>
27135 </interface>
27136 -<interface name="corenet_receive_munin_server_packets" lineno="52832">
27137 +<interface name="corenet_receive_munin_server_packets" lineno="52850">
27138 <summary>
27139 Receive munin_server packets.
27140 </summary>
27141 @@ -43137,7 +43221,7 @@ Domain allowed access.
27142 </param>
27143 <infoflow type="read" weight="10"/>
27144 </interface>
27145 -<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="52851">
27146 +<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="52869">
27147 <summary>
27148 Do not audit attempts to receive munin_server packets.
27149 </summary>
27150 @@ -43148,7 +43232,7 @@ Domain allowed access.
27151 </param>
27152 <infoflow type="none"/>
27153 </interface>
27154 -<interface name="corenet_sendrecv_munin_server_packets" lineno="52870">
27155 +<interface name="corenet_sendrecv_munin_server_packets" lineno="52888">
27156 <summary>
27157 Send and receive munin_server packets.
27158 </summary>
27159 @@ -43159,7 +43243,7 @@ Domain allowed access.
27160 </param>
27161 <infoflow type="both" weight="10"/>
27162 </interface>
27163 -<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="52886">
27164 +<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="52904">
27165 <summary>
27166 Do not audit attempts to send and receive munin_server packets.
27167 </summary>
27168 @@ -43170,7 +43254,7 @@ Domain to not audit.
27169 </param>
27170 <infoflow type="none"/>
27171 </interface>
27172 -<interface name="corenet_relabelto_munin_server_packets" lineno="52901">
27173 +<interface name="corenet_relabelto_munin_server_packets" lineno="52919">
27174 <summary>
27175 Relabel packets to munin_server the packet type.
27176 </summary>
27177 @@ -43180,7 +43264,7 @@ Domain allowed access.
27178 </summary>
27179 </param>
27180 </interface>
27181 -<interface name="corenet_tcp_sendrecv_mxi_port" lineno="52923">
27182 +<interface name="corenet_tcp_sendrecv_mxi_port" lineno="52941">
27183 <summary>
27184 Send and receive TCP traffic on the mxi port.
27185 </summary>
27186 @@ -43191,7 +43275,7 @@ Domain allowed access.
27187 </param>
27188 <infoflow type="both" weight="10"/>
27189 </interface>
27190 -<interface name="corenet_udp_send_mxi_port" lineno="52938">
27191 +<interface name="corenet_udp_send_mxi_port" lineno="52956">
27192 <summary>
27193 Send UDP traffic on the mxi port.
27194 </summary>
27195 @@ -43202,7 +43286,7 @@ Domain allowed access.
27196 </param>
27197 <infoflow type="write" weight="10"/>
27198 </interface>
27199 -<interface name="corenet_dontaudit_udp_send_mxi_port" lineno="52953">
27200 +<interface name="corenet_dontaudit_udp_send_mxi_port" lineno="52971">
27201 <summary>
27202 Do not audit attempts to send UDP traffic on the mxi port.
27203 </summary>
27204 @@ -43213,7 +43297,7 @@ Domain to not audit.
27205 </param>
27206 <infoflow type="none"/>
27207 </interface>
27208 -<interface name="corenet_udp_receive_mxi_port" lineno="52968">
27209 +<interface name="corenet_udp_receive_mxi_port" lineno="52986">
27210 <summary>
27211 Receive UDP traffic on the mxi port.
27212 </summary>
27213 @@ -43224,7 +43308,7 @@ Domain allowed access.
27214 </param>
27215 <infoflow type="read" weight="10"/>
27216 </interface>
27217 -<interface name="corenet_dontaudit_udp_receive_mxi_port" lineno="52983">
27218 +<interface name="corenet_dontaudit_udp_receive_mxi_port" lineno="53001">
27219 <summary>
27220 Do not audit attempts to receive UDP traffic on the mxi port.
27221 </summary>
27222 @@ -43235,7 +43319,7 @@ Domain to not audit.
27223 </param>
27224 <infoflow type="none"/>
27225 </interface>
27226 -<interface name="corenet_udp_sendrecv_mxi_port" lineno="52998">
27227 +<interface name="corenet_udp_sendrecv_mxi_port" lineno="53016">
27228 <summary>
27229 Send and receive UDP traffic on the mxi port.
27230 </summary>
27231 @@ -43246,7 +43330,7 @@ Domain allowed access.
27232 </param>
27233 <infoflow type="both" weight="10"/>
27234 </interface>
27235 -<interface name="corenet_dontaudit_udp_sendrecv_mxi_port" lineno="53014">
27236 +<interface name="corenet_dontaudit_udp_sendrecv_mxi_port" lineno="53032">
27237 <summary>
27238 Do not audit attempts to send and receive
27239 UDP traffic on the mxi port.
27240 @@ -43258,7 +43342,7 @@ Domain to not audit.
27241 </param>
27242 <infoflow type="none"/>
27243 </interface>
27244 -<interface name="corenet_tcp_bind_mxi_port" lineno="53029">
27245 +<interface name="corenet_tcp_bind_mxi_port" lineno="53047">
27246 <summary>
27247 Bind TCP sockets to the mxi port.
27248 </summary>
27249 @@ -43269,7 +43353,7 @@ Domain allowed access.
27250 </param>
27251 <infoflow type="none"/>
27252 </interface>
27253 -<interface name="corenet_udp_bind_mxi_port" lineno="53049">
27254 +<interface name="corenet_udp_bind_mxi_port" lineno="53067">
27255 <summary>
27256 Bind UDP sockets to the mxi port.
27257 </summary>
27258 @@ -43280,7 +43364,7 @@ Domain allowed access.
27259 </param>
27260 <infoflow type="none"/>
27261 </interface>
27262 -<interface name="corenet_tcp_connect_mxi_port" lineno="53068">
27263 +<interface name="corenet_tcp_connect_mxi_port" lineno="53086">
27264 <summary>
27265 Make a TCP connection to the mxi port.
27266 </summary>
27267 @@ -43290,7 +43374,7 @@ Domain allowed access.
27268 </summary>
27269 </param>
27270 </interface>
27271 -<interface name="corenet_send_mxi_client_packets" lineno="53088">
27272 +<interface name="corenet_send_mxi_client_packets" lineno="53106">
27273 <summary>
27274 Send mxi_client packets.
27275 </summary>
27276 @@ -43301,7 +43385,7 @@ Domain allowed access.
27277 </param>
27278 <infoflow type="write" weight="10"/>
27279 </interface>
27280 -<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="53107">
27281 +<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="53125">
27282 <summary>
27283 Do not audit attempts to send mxi_client packets.
27284 </summary>
27285 @@ -43312,7 +43396,7 @@ Domain to not audit.
27286 </param>
27287 <infoflow type="none"/>
27288 </interface>
27289 -<interface name="corenet_receive_mxi_client_packets" lineno="53126">
27290 +<interface name="corenet_receive_mxi_client_packets" lineno="53144">
27291 <summary>
27292 Receive mxi_client packets.
27293 </summary>
27294 @@ -43323,7 +43407,7 @@ Domain allowed access.
27295 </param>
27296 <infoflow type="read" weight="10"/>
27297 </interface>
27298 -<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="53145">
27299 +<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="53163">
27300 <summary>
27301 Do not audit attempts to receive mxi_client packets.
27302 </summary>
27303 @@ -43334,7 +43418,7 @@ Domain allowed access.
27304 </param>
27305 <infoflow type="none"/>
27306 </interface>
27307 -<interface name="corenet_sendrecv_mxi_client_packets" lineno="53164">
27308 +<interface name="corenet_sendrecv_mxi_client_packets" lineno="53182">
27309 <summary>
27310 Send and receive mxi_client packets.
27311 </summary>
27312 @@ -43345,7 +43429,7 @@ Domain allowed access.
27313 </param>
27314 <infoflow type="both" weight="10"/>
27315 </interface>
27316 -<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="53180">
27317 +<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="53198">
27318 <summary>
27319 Do not audit attempts to send and receive mxi_client packets.
27320 </summary>
27321 @@ -43356,7 +43440,7 @@ Domain to not audit.
27322 </param>
27323 <infoflow type="none"/>
27324 </interface>
27325 -<interface name="corenet_relabelto_mxi_client_packets" lineno="53195">
27326 +<interface name="corenet_relabelto_mxi_client_packets" lineno="53213">
27327 <summary>
27328 Relabel packets to mxi_client the packet type.
27329 </summary>
27330 @@ -43366,7 +43450,7 @@ Domain allowed access.
27331 </summary>
27332 </param>
27333 </interface>
27334 -<interface name="corenet_send_mxi_server_packets" lineno="53215">
27335 +<interface name="corenet_send_mxi_server_packets" lineno="53233">
27336 <summary>
27337 Send mxi_server packets.
27338 </summary>
27339 @@ -43377,7 +43461,7 @@ Domain allowed access.
27340 </param>
27341 <infoflow type="write" weight="10"/>
27342 </interface>
27343 -<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="53234">
27344 +<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="53252">
27345 <summary>
27346 Do not audit attempts to send mxi_server packets.
27347 </summary>
27348 @@ -43388,7 +43472,7 @@ Domain to not audit.
27349 </param>
27350 <infoflow type="none"/>
27351 </interface>
27352 -<interface name="corenet_receive_mxi_server_packets" lineno="53253">
27353 +<interface name="corenet_receive_mxi_server_packets" lineno="53271">
27354 <summary>
27355 Receive mxi_server packets.
27356 </summary>
27357 @@ -43399,7 +43483,7 @@ Domain allowed access.
27358 </param>
27359 <infoflow type="read" weight="10"/>
27360 </interface>
27361 -<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="53272">
27362 +<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="53290">
27363 <summary>
27364 Do not audit attempts to receive mxi_server packets.
27365 </summary>
27366 @@ -43410,7 +43494,7 @@ Domain allowed access.
27367 </param>
27368 <infoflow type="none"/>
27369 </interface>
27370 -<interface name="corenet_sendrecv_mxi_server_packets" lineno="53291">
27371 +<interface name="corenet_sendrecv_mxi_server_packets" lineno="53309">
27372 <summary>
27373 Send and receive mxi_server packets.
27374 </summary>
27375 @@ -43421,7 +43505,7 @@ Domain allowed access.
27376 </param>
27377 <infoflow type="both" weight="10"/>
27378 </interface>
27379 -<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="53307">
27380 +<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="53325">
27381 <summary>
27382 Do not audit attempts to send and receive mxi_server packets.
27383 </summary>
27384 @@ -43432,7 +43516,7 @@ Domain to not audit.
27385 </param>
27386 <infoflow type="none"/>
27387 </interface>
27388 -<interface name="corenet_relabelto_mxi_server_packets" lineno="53322">
27389 +<interface name="corenet_relabelto_mxi_server_packets" lineno="53340">
27390 <summary>
27391 Relabel packets to mxi_server the packet type.
27392 </summary>
27393 @@ -43442,7 +43526,7 @@ Domain allowed access.
27394 </summary>
27395 </param>
27396 </interface>
27397 -<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="53344">
27398 +<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="53362">
27399 <summary>
27400 Send and receive TCP traffic on the mysqld port.
27401 </summary>
27402 @@ -43453,7 +43537,7 @@ Domain allowed access.
27403 </param>
27404 <infoflow type="both" weight="10"/>
27405 </interface>
27406 -<interface name="corenet_udp_send_mysqld_port" lineno="53359">
27407 +<interface name="corenet_udp_send_mysqld_port" lineno="53377">
27408 <summary>
27409 Send UDP traffic on the mysqld port.
27410 </summary>
27411 @@ -43464,7 +43548,7 @@ Domain allowed access.
27412 </param>
27413 <infoflow type="write" weight="10"/>
27414 </interface>
27415 -<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="53374">
27416 +<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="53392">
27417 <summary>
27418 Do not audit attempts to send UDP traffic on the mysqld port.
27419 </summary>
27420 @@ -43475,7 +43559,7 @@ Domain to not audit.
27421 </param>
27422 <infoflow type="none"/>
27423 </interface>
27424 -<interface name="corenet_udp_receive_mysqld_port" lineno="53389">
27425 +<interface name="corenet_udp_receive_mysqld_port" lineno="53407">
27426 <summary>
27427 Receive UDP traffic on the mysqld port.
27428 </summary>
27429 @@ -43486,7 +43570,7 @@ Domain allowed access.
27430 </param>
27431 <infoflow type="read" weight="10"/>
27432 </interface>
27433 -<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="53404">
27434 +<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="53422">
27435 <summary>
27436 Do not audit attempts to receive UDP traffic on the mysqld port.
27437 </summary>
27438 @@ -43497,7 +43581,7 @@ Domain to not audit.
27439 </param>
27440 <infoflow type="none"/>
27441 </interface>
27442 -<interface name="corenet_udp_sendrecv_mysqld_port" lineno="53419">
27443 +<interface name="corenet_udp_sendrecv_mysqld_port" lineno="53437">
27444 <summary>
27445 Send and receive UDP traffic on the mysqld port.
27446 </summary>
27447 @@ -43508,7 +43592,7 @@ Domain allowed access.
27448 </param>
27449 <infoflow type="both" weight="10"/>
27450 </interface>
27451 -<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="53435">
27452 +<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="53453">
27453 <summary>
27454 Do not audit attempts to send and receive
27455 UDP traffic on the mysqld port.
27456 @@ -43520,7 +43604,7 @@ Domain to not audit.
27457 </param>
27458 <infoflow type="none"/>
27459 </interface>
27460 -<interface name="corenet_tcp_bind_mysqld_port" lineno="53450">
27461 +<interface name="corenet_tcp_bind_mysqld_port" lineno="53468">
27462 <summary>
27463 Bind TCP sockets to the mysqld port.
27464 </summary>
27465 @@ -43531,7 +43615,7 @@ Domain allowed access.
27466 </param>
27467 <infoflow type="none"/>
27468 </interface>
27469 -<interface name="corenet_udp_bind_mysqld_port" lineno="53470">
27470 +<interface name="corenet_udp_bind_mysqld_port" lineno="53488">
27471 <summary>
27472 Bind UDP sockets to the mysqld port.
27473 </summary>
27474 @@ -43542,7 +43626,7 @@ Domain allowed access.
27475 </param>
27476 <infoflow type="none"/>
27477 </interface>
27478 -<interface name="corenet_tcp_connect_mysqld_port" lineno="53489">
27479 +<interface name="corenet_tcp_connect_mysqld_port" lineno="53507">
27480 <summary>
27481 Make a TCP connection to the mysqld port.
27482 </summary>
27483 @@ -43552,7 +43636,7 @@ Domain allowed access.
27484 </summary>
27485 </param>
27486 </interface>
27487 -<interface name="corenet_send_mysqld_client_packets" lineno="53509">
27488 +<interface name="corenet_send_mysqld_client_packets" lineno="53527">
27489 <summary>
27490 Send mysqld_client packets.
27491 </summary>
27492 @@ -43563,7 +43647,7 @@ Domain allowed access.
27493 </param>
27494 <infoflow type="write" weight="10"/>
27495 </interface>
27496 -<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="53528">
27497 +<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="53546">
27498 <summary>
27499 Do not audit attempts to send mysqld_client packets.
27500 </summary>
27501 @@ -43574,7 +43658,7 @@ Domain to not audit.
27502 </param>
27503 <infoflow type="none"/>
27504 </interface>
27505 -<interface name="corenet_receive_mysqld_client_packets" lineno="53547">
27506 +<interface name="corenet_receive_mysqld_client_packets" lineno="53565">
27507 <summary>
27508 Receive mysqld_client packets.
27509 </summary>
27510 @@ -43585,7 +43669,7 @@ Domain allowed access.
27511 </param>
27512 <infoflow type="read" weight="10"/>
27513 </interface>
27514 -<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="53566">
27515 +<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="53584">
27516 <summary>
27517 Do not audit attempts to receive mysqld_client packets.
27518 </summary>
27519 @@ -43596,7 +43680,7 @@ Domain allowed access.
27520 </param>
27521 <infoflow type="none"/>
27522 </interface>
27523 -<interface name="corenet_sendrecv_mysqld_client_packets" lineno="53585">
27524 +<interface name="corenet_sendrecv_mysqld_client_packets" lineno="53603">
27525 <summary>
27526 Send and receive mysqld_client packets.
27527 </summary>
27528 @@ -43607,7 +43691,7 @@ Domain allowed access.
27529 </param>
27530 <infoflow type="both" weight="10"/>
27531 </interface>
27532 -<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="53601">
27533 +<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="53619">
27534 <summary>
27535 Do not audit attempts to send and receive mysqld_client packets.
27536 </summary>
27537 @@ -43618,7 +43702,7 @@ Domain to not audit.
27538 </param>
27539 <infoflow type="none"/>
27540 </interface>
27541 -<interface name="corenet_relabelto_mysqld_client_packets" lineno="53616">
27542 +<interface name="corenet_relabelto_mysqld_client_packets" lineno="53634">
27543 <summary>
27544 Relabel packets to mysqld_client the packet type.
27545 </summary>
27546 @@ -43628,7 +43712,7 @@ Domain allowed access.
27547 </summary>
27548 </param>
27549 </interface>
27550 -<interface name="corenet_send_mysqld_server_packets" lineno="53636">
27551 +<interface name="corenet_send_mysqld_server_packets" lineno="53654">
27552 <summary>
27553 Send mysqld_server packets.
27554 </summary>
27555 @@ -43639,7 +43723,7 @@ Domain allowed access.
27556 </param>
27557 <infoflow type="write" weight="10"/>
27558 </interface>
27559 -<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="53655">
27560 +<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="53673">
27561 <summary>
27562 Do not audit attempts to send mysqld_server packets.
27563 </summary>
27564 @@ -43650,7 +43734,7 @@ Domain to not audit.
27565 </param>
27566 <infoflow type="none"/>
27567 </interface>
27568 -<interface name="corenet_receive_mysqld_server_packets" lineno="53674">
27569 +<interface name="corenet_receive_mysqld_server_packets" lineno="53692">
27570 <summary>
27571 Receive mysqld_server packets.
27572 </summary>
27573 @@ -43661,7 +43745,7 @@ Domain allowed access.
27574 </param>
27575 <infoflow type="read" weight="10"/>
27576 </interface>
27577 -<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="53693">
27578 +<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="53711">
27579 <summary>
27580 Do not audit attempts to receive mysqld_server packets.
27581 </summary>
27582 @@ -43672,7 +43756,7 @@ Domain allowed access.
27583 </param>
27584 <infoflow type="none"/>
27585 </interface>
27586 -<interface name="corenet_sendrecv_mysqld_server_packets" lineno="53712">
27587 +<interface name="corenet_sendrecv_mysqld_server_packets" lineno="53730">
27588 <summary>
27589 Send and receive mysqld_server packets.
27590 </summary>
27591 @@ -43683,7 +43767,7 @@ Domain allowed access.
27592 </param>
27593 <infoflow type="both" weight="10"/>
27594 </interface>
27595 -<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="53728">
27596 +<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="53746">
27597 <summary>
27598 Do not audit attempts to send and receive mysqld_server packets.
27599 </summary>
27600 @@ -43694,7 +43778,7 @@ Domain to not audit.
27601 </param>
27602 <infoflow type="none"/>
27603 </interface>
27604 -<interface name="corenet_relabelto_mysqld_server_packets" lineno="53743">
27605 +<interface name="corenet_relabelto_mysqld_server_packets" lineno="53761">
27606 <summary>
27607 Relabel packets to mysqld_server the packet type.
27608 </summary>
27609 @@ -43704,7 +43788,7 @@ Domain allowed access.
27610 </summary>
27611 </param>
27612 </interface>
27613 -<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="53765">
27614 +<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="53783">
27615 <summary>
27616 Send and receive TCP traffic on the mysqlmanagerd port.
27617 </summary>
27618 @@ -43715,7 +43799,7 @@ Domain allowed access.
27619 </param>
27620 <infoflow type="both" weight="10"/>
27621 </interface>
27622 -<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="53780">
27623 +<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="53798">
27624 <summary>
27625 Send UDP traffic on the mysqlmanagerd port.
27626 </summary>
27627 @@ -43726,7 +43810,7 @@ Domain allowed access.
27628 </param>
27629 <infoflow type="write" weight="10"/>
27630 </interface>
27631 -<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="53795">
27632 +<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="53813">
27633 <summary>
27634 Do not audit attempts to send UDP traffic on the mysqlmanagerd port.
27635 </summary>
27636 @@ -43737,7 +43821,7 @@ Domain to not audit.
27637 </param>
27638 <infoflow type="none"/>
27639 </interface>
27640 -<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="53810">
27641 +<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="53828">
27642 <summary>
27643 Receive UDP traffic on the mysqlmanagerd port.
27644 </summary>
27645 @@ -43748,7 +43832,7 @@ Domain allowed access.
27646 </param>
27647 <infoflow type="read" weight="10"/>
27648 </interface>
27649 -<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="53825">
27650 +<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="53843">
27651 <summary>
27652 Do not audit attempts to receive UDP traffic on the mysqlmanagerd port.
27653 </summary>
27654 @@ -43759,7 +43843,7 @@ Domain to not audit.
27655 </param>
27656 <infoflow type="none"/>
27657 </interface>
27658 -<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="53840">
27659 +<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="53858">
27660 <summary>
27661 Send and receive UDP traffic on the mysqlmanagerd port.
27662 </summary>
27663 @@ -43770,7 +43854,7 @@ Domain allowed access.
27664 </param>
27665 <infoflow type="both" weight="10"/>
27666 </interface>
27667 -<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="53856">
27668 +<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="53874">
27669 <summary>
27670 Do not audit attempts to send and receive
27671 UDP traffic on the mysqlmanagerd port.
27672 @@ -43782,7 +43866,7 @@ Domain to not audit.
27673 </param>
27674 <infoflow type="none"/>
27675 </interface>
27676 -<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="53871">
27677 +<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="53889">
27678 <summary>
27679 Bind TCP sockets to the mysqlmanagerd port.
27680 </summary>
27681 @@ -43793,7 +43877,7 @@ Domain allowed access.
27682 </param>
27683 <infoflow type="none"/>
27684 </interface>
27685 -<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="53891">
27686 +<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="53909">
27687 <summary>
27688 Bind UDP sockets to the mysqlmanagerd port.
27689 </summary>
27690 @@ -43804,7 +43888,7 @@ Domain allowed access.
27691 </param>
27692 <infoflow type="none"/>
27693 </interface>
27694 -<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="53910">
27695 +<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="53928">
27696 <summary>
27697 Make a TCP connection to the mysqlmanagerd port.
27698 </summary>
27699 @@ -43814,7 +43898,7 @@ Domain allowed access.
27700 </summary>
27701 </param>
27702 </interface>
27703 -<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="53930">
27704 +<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="53948">
27705 <summary>
27706 Send mysqlmanagerd_client packets.
27707 </summary>
27708 @@ -43825,7 +43909,7 @@ Domain allowed access.
27709 </param>
27710 <infoflow type="write" weight="10"/>
27711 </interface>
27712 -<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="53949">
27713 +<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="53967">
27714 <summary>
27715 Do not audit attempts to send mysqlmanagerd_client packets.
27716 </summary>
27717 @@ -43836,7 +43920,7 @@ Domain to not audit.
27718 </param>
27719 <infoflow type="none"/>
27720 </interface>
27721 -<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="53968">
27722 +<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="53986">
27723 <summary>
27724 Receive mysqlmanagerd_client packets.
27725 </summary>
27726 @@ -43847,7 +43931,7 @@ Domain allowed access.
27727 </param>
27728 <infoflow type="read" weight="10"/>
27729 </interface>
27730 -<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="53987">
27731 +<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="54005">
27732 <summary>
27733 Do not audit attempts to receive mysqlmanagerd_client packets.
27734 </summary>
27735 @@ -43858,7 +43942,7 @@ Domain allowed access.
27736 </param>
27737 <infoflow type="none"/>
27738 </interface>
27739 -<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="54006">
27740 +<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="54024">
27741 <summary>
27742 Send and receive mysqlmanagerd_client packets.
27743 </summary>
27744 @@ -43869,7 +43953,7 @@ Domain allowed access.
27745 </param>
27746 <infoflow type="both" weight="10"/>
27747 </interface>
27748 -<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="54022">
27749 +<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="54040">
27750 <summary>
27751 Do not audit attempts to send and receive mysqlmanagerd_client packets.
27752 </summary>
27753 @@ -43880,7 +43964,7 @@ Domain to not audit.
27754 </param>
27755 <infoflow type="none"/>
27756 </interface>
27757 -<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="54037">
27758 +<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="54055">
27759 <summary>
27760 Relabel packets to mysqlmanagerd_client the packet type.
27761 </summary>
27762 @@ -43890,7 +43974,7 @@ Domain allowed access.
27763 </summary>
27764 </param>
27765 </interface>
27766 -<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="54057">
27767 +<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="54075">
27768 <summary>
27769 Send mysqlmanagerd_server packets.
27770 </summary>
27771 @@ -43901,7 +43985,7 @@ Domain allowed access.
27772 </param>
27773 <infoflow type="write" weight="10"/>
27774 </interface>
27775 -<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="54076">
27776 +<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="54094">
27777 <summary>
27778 Do not audit attempts to send mysqlmanagerd_server packets.
27779 </summary>
27780 @@ -43912,7 +43996,7 @@ Domain to not audit.
27781 </param>
27782 <infoflow type="none"/>
27783 </interface>
27784 -<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="54095">
27785 +<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="54113">
27786 <summary>
27787 Receive mysqlmanagerd_server packets.
27788 </summary>
27789 @@ -43923,7 +44007,7 @@ Domain allowed access.
27790 </param>
27791 <infoflow type="read" weight="10"/>
27792 </interface>
27793 -<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="54114">
27794 +<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="54132">
27795 <summary>
27796 Do not audit attempts to receive mysqlmanagerd_server packets.
27797 </summary>
27798 @@ -43934,7 +44018,7 @@ Domain allowed access.
27799 </param>
27800 <infoflow type="none"/>
27801 </interface>
27802 -<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="54133">
27803 +<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="54151">
27804 <summary>
27805 Send and receive mysqlmanagerd_server packets.
27806 </summary>
27807 @@ -43945,7 +44029,7 @@ Domain allowed access.
27808 </param>
27809 <infoflow type="both" weight="10"/>
27810 </interface>
27811 -<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="54149">
27812 +<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="54167">
27813 <summary>
27814 Do not audit attempts to send and receive mysqlmanagerd_server packets.
27815 </summary>
27816 @@ -43956,7 +44040,7 @@ Domain to not audit.
27817 </param>
27818 <infoflow type="none"/>
27819 </interface>
27820 -<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="54164">
27821 +<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="54182">
27822 <summary>
27823 Relabel packets to mysqlmanagerd_server the packet type.
27824 </summary>
27825 @@ -43966,7 +44050,7 @@ Domain allowed access.
27826 </summary>
27827 </param>
27828 </interface>
27829 -<interface name="corenet_tcp_sendrecv_nessus_port" lineno="54186">
27830 +<interface name="corenet_tcp_sendrecv_nessus_port" lineno="54204">
27831 <summary>
27832 Send and receive TCP traffic on the nessus port.
27833 </summary>
27834 @@ -43977,7 +44061,7 @@ Domain allowed access.
27835 </param>
27836 <infoflow type="both" weight="10"/>
27837 </interface>
27838 -<interface name="corenet_udp_send_nessus_port" lineno="54201">
27839 +<interface name="corenet_udp_send_nessus_port" lineno="54219">
27840 <summary>
27841 Send UDP traffic on the nessus port.
27842 </summary>
27843 @@ -43988,7 +44072,7 @@ Domain allowed access.
27844 </param>
27845 <infoflow type="write" weight="10"/>
27846 </interface>
27847 -<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="54216">
27848 +<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="54234">
27849 <summary>
27850 Do not audit attempts to send UDP traffic on the nessus port.
27851 </summary>
27852 @@ -43999,7 +44083,7 @@ Domain to not audit.
27853 </param>
27854 <infoflow type="none"/>
27855 </interface>
27856 -<interface name="corenet_udp_receive_nessus_port" lineno="54231">
27857 +<interface name="corenet_udp_receive_nessus_port" lineno="54249">
27858 <summary>
27859 Receive UDP traffic on the nessus port.
27860 </summary>
27861 @@ -44010,7 +44094,7 @@ Domain allowed access.
27862 </param>
27863 <infoflow type="read" weight="10"/>
27864 </interface>
27865 -<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="54246">
27866 +<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="54264">
27867 <summary>
27868 Do not audit attempts to receive UDP traffic on the nessus port.
27869 </summary>
27870 @@ -44021,7 +44105,7 @@ Domain to not audit.
27871 </param>
27872 <infoflow type="none"/>
27873 </interface>
27874 -<interface name="corenet_udp_sendrecv_nessus_port" lineno="54261">
27875 +<interface name="corenet_udp_sendrecv_nessus_port" lineno="54279">
27876 <summary>
27877 Send and receive UDP traffic on the nessus port.
27878 </summary>
27879 @@ -44032,7 +44116,7 @@ Domain allowed access.
27880 </param>
27881 <infoflow type="both" weight="10"/>
27882 </interface>
27883 -<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="54277">
27884 +<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="54295">
27885 <summary>
27886 Do not audit attempts to send and receive
27887 UDP traffic on the nessus port.
27888 @@ -44044,7 +44128,7 @@ Domain to not audit.
27889 </param>
27890 <infoflow type="none"/>
27891 </interface>
27892 -<interface name="corenet_tcp_bind_nessus_port" lineno="54292">
27893 +<interface name="corenet_tcp_bind_nessus_port" lineno="54310">
27894 <summary>
27895 Bind TCP sockets to the nessus port.
27896 </summary>
27897 @@ -44055,7 +44139,7 @@ Domain allowed access.
27898 </param>
27899 <infoflow type="none"/>
27900 </interface>
27901 -<interface name="corenet_udp_bind_nessus_port" lineno="54312">
27902 +<interface name="corenet_udp_bind_nessus_port" lineno="54330">
27903 <summary>
27904 Bind UDP sockets to the nessus port.
27905 </summary>
27906 @@ -44066,7 +44150,7 @@ Domain allowed access.
27907 </param>
27908 <infoflow type="none"/>
27909 </interface>
27910 -<interface name="corenet_tcp_connect_nessus_port" lineno="54331">
27911 +<interface name="corenet_tcp_connect_nessus_port" lineno="54349">
27912 <summary>
27913 Make a TCP connection to the nessus port.
27914 </summary>
27915 @@ -44076,7 +44160,7 @@ Domain allowed access.
27916 </summary>
27917 </param>
27918 </interface>
27919 -<interface name="corenet_send_nessus_client_packets" lineno="54351">
27920 +<interface name="corenet_send_nessus_client_packets" lineno="54369">
27921 <summary>
27922 Send nessus_client packets.
27923 </summary>
27924 @@ -44087,7 +44171,7 @@ Domain allowed access.
27925 </param>
27926 <infoflow type="write" weight="10"/>
27927 </interface>
27928 -<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="54370">
27929 +<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="54388">
27930 <summary>
27931 Do not audit attempts to send nessus_client packets.
27932 </summary>
27933 @@ -44098,7 +44182,7 @@ Domain to not audit.
27934 </param>
27935 <infoflow type="none"/>
27936 </interface>
27937 -<interface name="corenet_receive_nessus_client_packets" lineno="54389">
27938 +<interface name="corenet_receive_nessus_client_packets" lineno="54407">
27939 <summary>
27940 Receive nessus_client packets.
27941 </summary>
27942 @@ -44109,7 +44193,7 @@ Domain allowed access.
27943 </param>
27944 <infoflow type="read" weight="10"/>
27945 </interface>
27946 -<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="54408">
27947 +<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="54426">
27948 <summary>
27949 Do not audit attempts to receive nessus_client packets.
27950 </summary>
27951 @@ -44120,7 +44204,7 @@ Domain allowed access.
27952 </param>
27953 <infoflow type="none"/>
27954 </interface>
27955 -<interface name="corenet_sendrecv_nessus_client_packets" lineno="54427">
27956 +<interface name="corenet_sendrecv_nessus_client_packets" lineno="54445">
27957 <summary>
27958 Send and receive nessus_client packets.
27959 </summary>
27960 @@ -44131,7 +44215,7 @@ Domain allowed access.
27961 </param>
27962 <infoflow type="both" weight="10"/>
27963 </interface>
27964 -<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="54443">
27965 +<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="54461">
27966 <summary>
27967 Do not audit attempts to send and receive nessus_client packets.
27968 </summary>
27969 @@ -44142,7 +44226,7 @@ Domain to not audit.
27970 </param>
27971 <infoflow type="none"/>
27972 </interface>
27973 -<interface name="corenet_relabelto_nessus_client_packets" lineno="54458">
27974 +<interface name="corenet_relabelto_nessus_client_packets" lineno="54476">
27975 <summary>
27976 Relabel packets to nessus_client the packet type.
27977 </summary>
27978 @@ -44152,7 +44236,7 @@ Domain allowed access.
27979 </summary>
27980 </param>
27981 </interface>
27982 -<interface name="corenet_send_nessus_server_packets" lineno="54478">
27983 +<interface name="corenet_send_nessus_server_packets" lineno="54496">
27984 <summary>
27985 Send nessus_server packets.
27986 </summary>
27987 @@ -44163,7 +44247,7 @@ Domain allowed access.
27988 </param>
27989 <infoflow type="write" weight="10"/>
27990 </interface>
27991 -<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="54497">
27992 +<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="54515">
27993 <summary>
27994 Do not audit attempts to send nessus_server packets.
27995 </summary>
27996 @@ -44174,7 +44258,7 @@ Domain to not audit.
27997 </param>
27998 <infoflow type="none"/>
27999 </interface>
28000 -<interface name="corenet_receive_nessus_server_packets" lineno="54516">
28001 +<interface name="corenet_receive_nessus_server_packets" lineno="54534">
28002 <summary>
28003 Receive nessus_server packets.
28004 </summary>
28005 @@ -44185,7 +44269,7 @@ Domain allowed access.
28006 </param>
28007 <infoflow type="read" weight="10"/>
28008 </interface>
28009 -<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="54535">
28010 +<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="54553">
28011 <summary>
28012 Do not audit attempts to receive nessus_server packets.
28013 </summary>
28014 @@ -44196,7 +44280,7 @@ Domain allowed access.
28015 </param>
28016 <infoflow type="none"/>
28017 </interface>
28018 -<interface name="corenet_sendrecv_nessus_server_packets" lineno="54554">
28019 +<interface name="corenet_sendrecv_nessus_server_packets" lineno="54572">
28020 <summary>
28021 Send and receive nessus_server packets.
28022 </summary>
28023 @@ -44207,7 +44291,7 @@ Domain allowed access.
28024 </param>
28025 <infoflow type="both" weight="10"/>
28026 </interface>
28027 -<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="54570">
28028 +<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="54588">
28029 <summary>
28030 Do not audit attempts to send and receive nessus_server packets.
28031 </summary>
28032 @@ -44218,7 +44302,7 @@ Domain to not audit.
28033 </param>
28034 <infoflow type="none"/>
28035 </interface>
28036 -<interface name="corenet_relabelto_nessus_server_packets" lineno="54585">
28037 +<interface name="corenet_relabelto_nessus_server_packets" lineno="54603">
28038 <summary>
28039 Relabel packets to nessus_server the packet type.
28040 </summary>
28041 @@ -44228,7 +44312,7 @@ Domain allowed access.
28042 </summary>
28043 </param>
28044 </interface>
28045 -<interface name="corenet_tcp_sendrecv_netport_port" lineno="54607">
28046 +<interface name="corenet_tcp_sendrecv_netport_port" lineno="54625">
28047 <summary>
28048 Send and receive TCP traffic on the netport port.
28049 </summary>
28050 @@ -44239,7 +44323,7 @@ Domain allowed access.
28051 </param>
28052 <infoflow type="both" weight="10"/>
28053 </interface>
28054 -<interface name="corenet_udp_send_netport_port" lineno="54622">
28055 +<interface name="corenet_udp_send_netport_port" lineno="54640">
28056 <summary>
28057 Send UDP traffic on the netport port.
28058 </summary>
28059 @@ -44250,7 +44334,7 @@ Domain allowed access.
28060 </param>
28061 <infoflow type="write" weight="10"/>
28062 </interface>
28063 -<interface name="corenet_dontaudit_udp_send_netport_port" lineno="54637">
28064 +<interface name="corenet_dontaudit_udp_send_netport_port" lineno="54655">
28065 <summary>
28066 Do not audit attempts to send UDP traffic on the netport port.
28067 </summary>
28068 @@ -44261,7 +44345,7 @@ Domain to not audit.
28069 </param>
28070 <infoflow type="none"/>
28071 </interface>
28072 -<interface name="corenet_udp_receive_netport_port" lineno="54652">
28073 +<interface name="corenet_udp_receive_netport_port" lineno="54670">
28074 <summary>
28075 Receive UDP traffic on the netport port.
28076 </summary>
28077 @@ -44272,7 +44356,7 @@ Domain allowed access.
28078 </param>
28079 <infoflow type="read" weight="10"/>
28080 </interface>
28081 -<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="54667">
28082 +<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="54685">
28083 <summary>
28084 Do not audit attempts to receive UDP traffic on the netport port.
28085 </summary>
28086 @@ -44283,7 +44367,7 @@ Domain to not audit.
28087 </param>
28088 <infoflow type="none"/>
28089 </interface>
28090 -<interface name="corenet_udp_sendrecv_netport_port" lineno="54682">
28091 +<interface name="corenet_udp_sendrecv_netport_port" lineno="54700">
28092 <summary>
28093 Send and receive UDP traffic on the netport port.
28094 </summary>
28095 @@ -44294,7 +44378,7 @@ Domain allowed access.
28096 </param>
28097 <infoflow type="both" weight="10"/>
28098 </interface>
28099 -<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="54698">
28100 +<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="54716">
28101 <summary>
28102 Do not audit attempts to send and receive
28103 UDP traffic on the netport port.
28104 @@ -44306,7 +44390,7 @@ Domain to not audit.
28105 </param>
28106 <infoflow type="none"/>
28107 </interface>
28108 -<interface name="corenet_tcp_bind_netport_port" lineno="54713">
28109 +<interface name="corenet_tcp_bind_netport_port" lineno="54731">
28110 <summary>
28111 Bind TCP sockets to the netport port.
28112 </summary>
28113 @@ -44317,7 +44401,7 @@ Domain allowed access.
28114 </param>
28115 <infoflow type="none"/>
28116 </interface>
28117 -<interface name="corenet_udp_bind_netport_port" lineno="54733">
28118 +<interface name="corenet_udp_bind_netport_port" lineno="54751">
28119 <summary>
28120 Bind UDP sockets to the netport port.
28121 </summary>
28122 @@ -44328,7 +44412,7 @@ Domain allowed access.
28123 </param>
28124 <infoflow type="none"/>
28125 </interface>
28126 -<interface name="corenet_tcp_connect_netport_port" lineno="54752">
28127 +<interface name="corenet_tcp_connect_netport_port" lineno="54770">
28128 <summary>
28129 Make a TCP connection to the netport port.
28130 </summary>
28131 @@ -44338,7 +44422,7 @@ Domain allowed access.
28132 </summary>
28133 </param>
28134 </interface>
28135 -<interface name="corenet_send_netport_client_packets" lineno="54772">
28136 +<interface name="corenet_send_netport_client_packets" lineno="54790">
28137 <summary>
28138 Send netport_client packets.
28139 </summary>
28140 @@ -44349,7 +44433,7 @@ Domain allowed access.
28141 </param>
28142 <infoflow type="write" weight="10"/>
28143 </interface>
28144 -<interface name="corenet_dontaudit_send_netport_client_packets" lineno="54791">
28145 +<interface name="corenet_dontaudit_send_netport_client_packets" lineno="54809">
28146 <summary>
28147 Do not audit attempts to send netport_client packets.
28148 </summary>
28149 @@ -44360,7 +44444,7 @@ Domain to not audit.
28150 </param>
28151 <infoflow type="none"/>
28152 </interface>
28153 -<interface name="corenet_receive_netport_client_packets" lineno="54810">
28154 +<interface name="corenet_receive_netport_client_packets" lineno="54828">
28155 <summary>
28156 Receive netport_client packets.
28157 </summary>
28158 @@ -44371,7 +44455,7 @@ Domain allowed access.
28159 </param>
28160 <infoflow type="read" weight="10"/>
28161 </interface>
28162 -<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="54829">
28163 +<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="54847">
28164 <summary>
28165 Do not audit attempts to receive netport_client packets.
28166 </summary>
28167 @@ -44382,7 +44466,7 @@ Domain allowed access.
28168 </param>
28169 <infoflow type="none"/>
28170 </interface>
28171 -<interface name="corenet_sendrecv_netport_client_packets" lineno="54848">
28172 +<interface name="corenet_sendrecv_netport_client_packets" lineno="54866">
28173 <summary>
28174 Send and receive netport_client packets.
28175 </summary>
28176 @@ -44393,7 +44477,7 @@ Domain allowed access.
28177 </param>
28178 <infoflow type="both" weight="10"/>
28179 </interface>
28180 -<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="54864">
28181 +<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="54882">
28182 <summary>
28183 Do not audit attempts to send and receive netport_client packets.
28184 </summary>
28185 @@ -44404,7 +44488,7 @@ Domain to not audit.
28186 </param>
28187 <infoflow type="none"/>
28188 </interface>
28189 -<interface name="corenet_relabelto_netport_client_packets" lineno="54879">
28190 +<interface name="corenet_relabelto_netport_client_packets" lineno="54897">
28191 <summary>
28192 Relabel packets to netport_client the packet type.
28193 </summary>
28194 @@ -44414,7 +44498,7 @@ Domain allowed access.
28195 </summary>
28196 </param>
28197 </interface>
28198 -<interface name="corenet_send_netport_server_packets" lineno="54899">
28199 +<interface name="corenet_send_netport_server_packets" lineno="54917">
28200 <summary>
28201 Send netport_server packets.
28202 </summary>
28203 @@ -44425,7 +44509,7 @@ Domain allowed access.
28204 </param>
28205 <infoflow type="write" weight="10"/>
28206 </interface>
28207 -<interface name="corenet_dontaudit_send_netport_server_packets" lineno="54918">
28208 +<interface name="corenet_dontaudit_send_netport_server_packets" lineno="54936">
28209 <summary>
28210 Do not audit attempts to send netport_server packets.
28211 </summary>
28212 @@ -44436,7 +44520,7 @@ Domain to not audit.
28213 </param>
28214 <infoflow type="none"/>
28215 </interface>
28216 -<interface name="corenet_receive_netport_server_packets" lineno="54937">
28217 +<interface name="corenet_receive_netport_server_packets" lineno="54955">
28218 <summary>
28219 Receive netport_server packets.
28220 </summary>
28221 @@ -44447,7 +44531,7 @@ Domain allowed access.
28222 </param>
28223 <infoflow type="read" weight="10"/>
28224 </interface>
28225 -<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="54956">
28226 +<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="54974">
28227 <summary>
28228 Do not audit attempts to receive netport_server packets.
28229 </summary>
28230 @@ -44458,7 +44542,7 @@ Domain allowed access.
28231 </param>
28232 <infoflow type="none"/>
28233 </interface>
28234 -<interface name="corenet_sendrecv_netport_server_packets" lineno="54975">
28235 +<interface name="corenet_sendrecv_netport_server_packets" lineno="54993">
28236 <summary>
28237 Send and receive netport_server packets.
28238 </summary>
28239 @@ -44469,7 +44553,7 @@ Domain allowed access.
28240 </param>
28241 <infoflow type="both" weight="10"/>
28242 </interface>
28243 -<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="54991">
28244 +<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="55009">
28245 <summary>
28246 Do not audit attempts to send and receive netport_server packets.
28247 </summary>
28248 @@ -44480,7 +44564,7 @@ Domain to not audit.
28249 </param>
28250 <infoflow type="none"/>
28251 </interface>
28252 -<interface name="corenet_relabelto_netport_server_packets" lineno="55006">
28253 +<interface name="corenet_relabelto_netport_server_packets" lineno="55024">
28254 <summary>
28255 Relabel packets to netport_server the packet type.
28256 </summary>
28257 @@ -44490,7 +44574,7 @@ Domain allowed access.
28258 </summary>
28259 </param>
28260 </interface>
28261 -<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="55028">
28262 +<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="55046">
28263 <summary>
28264 Send and receive TCP traffic on the netsupport port.
28265 </summary>
28266 @@ -44501,7 +44585,7 @@ Domain allowed access.
28267 </param>
28268 <infoflow type="both" weight="10"/>
28269 </interface>
28270 -<interface name="corenet_udp_send_netsupport_port" lineno="55043">
28271 +<interface name="corenet_udp_send_netsupport_port" lineno="55061">
28272 <summary>
28273 Send UDP traffic on the netsupport port.
28274 </summary>
28275 @@ -44512,7 +44596,7 @@ Domain allowed access.
28276 </param>
28277 <infoflow type="write" weight="10"/>
28278 </interface>
28279 -<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="55058">
28280 +<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="55076">
28281 <summary>
28282 Do not audit attempts to send UDP traffic on the netsupport port.
28283 </summary>
28284 @@ -44523,7 +44607,7 @@ Domain to not audit.
28285 </param>
28286 <infoflow type="none"/>
28287 </interface>
28288 -<interface name="corenet_udp_receive_netsupport_port" lineno="55073">
28289 +<interface name="corenet_udp_receive_netsupport_port" lineno="55091">
28290 <summary>
28291 Receive UDP traffic on the netsupport port.
28292 </summary>
28293 @@ -44534,7 +44618,7 @@ Domain allowed access.
28294 </param>
28295 <infoflow type="read" weight="10"/>
28296 </interface>
28297 -<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="55088">
28298 +<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="55106">
28299 <summary>
28300 Do not audit attempts to receive UDP traffic on the netsupport port.
28301 </summary>
28302 @@ -44545,7 +44629,7 @@ Domain to not audit.
28303 </param>
28304 <infoflow type="none"/>
28305 </interface>
28306 -<interface name="corenet_udp_sendrecv_netsupport_port" lineno="55103">
28307 +<interface name="corenet_udp_sendrecv_netsupport_port" lineno="55121">
28308 <summary>
28309 Send and receive UDP traffic on the netsupport port.
28310 </summary>
28311 @@ -44556,7 +44640,7 @@ Domain allowed access.
28312 </param>
28313 <infoflow type="both" weight="10"/>
28314 </interface>
28315 -<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="55119">
28316 +<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="55137">
28317 <summary>
28318 Do not audit attempts to send and receive
28319 UDP traffic on the netsupport port.
28320 @@ -44568,7 +44652,7 @@ Domain to not audit.
28321 </param>
28322 <infoflow type="none"/>
28323 </interface>
28324 -<interface name="corenet_tcp_bind_netsupport_port" lineno="55134">
28325 +<interface name="corenet_tcp_bind_netsupport_port" lineno="55152">
28326 <summary>
28327 Bind TCP sockets to the netsupport port.
28328 </summary>
28329 @@ -44579,7 +44663,7 @@ Domain allowed access.
28330 </param>
28331 <infoflow type="none"/>
28332 </interface>
28333 -<interface name="corenet_udp_bind_netsupport_port" lineno="55154">
28334 +<interface name="corenet_udp_bind_netsupport_port" lineno="55172">
28335 <summary>
28336 Bind UDP sockets to the netsupport port.
28337 </summary>
28338 @@ -44590,7 +44674,7 @@ Domain allowed access.
28339 </param>
28340 <infoflow type="none"/>
28341 </interface>
28342 -<interface name="corenet_tcp_connect_netsupport_port" lineno="55173">
28343 +<interface name="corenet_tcp_connect_netsupport_port" lineno="55191">
28344 <summary>
28345 Make a TCP connection to the netsupport port.
28346 </summary>
28347 @@ -44600,7 +44684,7 @@ Domain allowed access.
28348 </summary>
28349 </param>
28350 </interface>
28351 -<interface name="corenet_send_netsupport_client_packets" lineno="55193">
28352 +<interface name="corenet_send_netsupport_client_packets" lineno="55211">
28353 <summary>
28354 Send netsupport_client packets.
28355 </summary>
28356 @@ -44611,7 +44695,7 @@ Domain allowed access.
28357 </param>
28358 <infoflow type="write" weight="10"/>
28359 </interface>
28360 -<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="55212">
28361 +<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="55230">
28362 <summary>
28363 Do not audit attempts to send netsupport_client packets.
28364 </summary>
28365 @@ -44622,7 +44706,7 @@ Domain to not audit.
28366 </param>
28367 <infoflow type="none"/>
28368 </interface>
28369 -<interface name="corenet_receive_netsupport_client_packets" lineno="55231">
28370 +<interface name="corenet_receive_netsupport_client_packets" lineno="55249">
28371 <summary>
28372 Receive netsupport_client packets.
28373 </summary>
28374 @@ -44633,7 +44717,7 @@ Domain allowed access.
28375 </param>
28376 <infoflow type="read" weight="10"/>
28377 </interface>
28378 -<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="55250">
28379 +<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="55268">
28380 <summary>
28381 Do not audit attempts to receive netsupport_client packets.
28382 </summary>
28383 @@ -44644,7 +44728,7 @@ Domain allowed access.
28384 </param>
28385 <infoflow type="none"/>
28386 </interface>
28387 -<interface name="corenet_sendrecv_netsupport_client_packets" lineno="55269">
28388 +<interface name="corenet_sendrecv_netsupport_client_packets" lineno="55287">
28389 <summary>
28390 Send and receive netsupport_client packets.
28391 </summary>
28392 @@ -44655,7 +44739,7 @@ Domain allowed access.
28393 </param>
28394 <infoflow type="both" weight="10"/>
28395 </interface>
28396 -<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="55285">
28397 +<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="55303">
28398 <summary>
28399 Do not audit attempts to send and receive netsupport_client packets.
28400 </summary>
28401 @@ -44666,7 +44750,7 @@ Domain to not audit.
28402 </param>
28403 <infoflow type="none"/>
28404 </interface>
28405 -<interface name="corenet_relabelto_netsupport_client_packets" lineno="55300">
28406 +<interface name="corenet_relabelto_netsupport_client_packets" lineno="55318">
28407 <summary>
28408 Relabel packets to netsupport_client the packet type.
28409 </summary>
28410 @@ -44676,7 +44760,7 @@ Domain allowed access.
28411 </summary>
28412 </param>
28413 </interface>
28414 -<interface name="corenet_send_netsupport_server_packets" lineno="55320">
28415 +<interface name="corenet_send_netsupport_server_packets" lineno="55338">
28416 <summary>
28417 Send netsupport_server packets.
28418 </summary>
28419 @@ -44687,7 +44771,7 @@ Domain allowed access.
28420 </param>
28421 <infoflow type="write" weight="10"/>
28422 </interface>
28423 -<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="55339">
28424 +<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="55357">
28425 <summary>
28426 Do not audit attempts to send netsupport_server packets.
28427 </summary>
28428 @@ -44698,7 +44782,7 @@ Domain to not audit.
28429 </param>
28430 <infoflow type="none"/>
28431 </interface>
28432 -<interface name="corenet_receive_netsupport_server_packets" lineno="55358">
28433 +<interface name="corenet_receive_netsupport_server_packets" lineno="55376">
28434 <summary>
28435 Receive netsupport_server packets.
28436 </summary>
28437 @@ -44709,7 +44793,7 @@ Domain allowed access.
28438 </param>
28439 <infoflow type="read" weight="10"/>
28440 </interface>
28441 -<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="55377">
28442 +<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="55395">
28443 <summary>
28444 Do not audit attempts to receive netsupport_server packets.
28445 </summary>
28446 @@ -44720,7 +44804,7 @@ Domain allowed access.
28447 </param>
28448 <infoflow type="none"/>
28449 </interface>
28450 -<interface name="corenet_sendrecv_netsupport_server_packets" lineno="55396">
28451 +<interface name="corenet_sendrecv_netsupport_server_packets" lineno="55414">
28452 <summary>
28453 Send and receive netsupport_server packets.
28454 </summary>
28455 @@ -44731,7 +44815,7 @@ Domain allowed access.
28456 </param>
28457 <infoflow type="both" weight="10"/>
28458 </interface>
28459 -<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="55412">
28460 +<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="55430">
28461 <summary>
28462 Do not audit attempts to send and receive netsupport_server packets.
28463 </summary>
28464 @@ -44742,7 +44826,7 @@ Domain to not audit.
28465 </param>
28466 <infoflow type="none"/>
28467 </interface>
28468 -<interface name="corenet_relabelto_netsupport_server_packets" lineno="55427">
28469 +<interface name="corenet_relabelto_netsupport_server_packets" lineno="55445">
28470 <summary>
28471 Relabel packets to netsupport_server the packet type.
28472 </summary>
28473 @@ -44752,7 +44836,7 @@ Domain allowed access.
28474 </summary>
28475 </param>
28476 </interface>
28477 -<interface name="corenet_tcp_sendrecv_nfs_port" lineno="55449">
28478 +<interface name="corenet_tcp_sendrecv_nfs_port" lineno="55467">
28479 <summary>
28480 Send and receive TCP traffic on the nfs port.
28481 </summary>
28482 @@ -44763,7 +44847,7 @@ Domain allowed access.
28483 </param>
28484 <infoflow type="both" weight="10"/>
28485 </interface>
28486 -<interface name="corenet_udp_send_nfs_port" lineno="55464">
28487 +<interface name="corenet_udp_send_nfs_port" lineno="55482">
28488 <summary>
28489 Send UDP traffic on the nfs port.
28490 </summary>
28491 @@ -44774,7 +44858,7 @@ Domain allowed access.
28492 </param>
28493 <infoflow type="write" weight="10"/>
28494 </interface>
28495 -<interface name="corenet_dontaudit_udp_send_nfs_port" lineno="55479">
28496 +<interface name="corenet_dontaudit_udp_send_nfs_port" lineno="55497">
28497 <summary>
28498 Do not audit attempts to send UDP traffic on the nfs port.
28499 </summary>
28500 @@ -44785,7 +44869,7 @@ Domain to not audit.
28501 </param>
28502 <infoflow type="none"/>
28503 </interface>
28504 -<interface name="corenet_udp_receive_nfs_port" lineno="55494">
28505 +<interface name="corenet_udp_receive_nfs_port" lineno="55512">
28506 <summary>
28507 Receive UDP traffic on the nfs port.
28508 </summary>
28509 @@ -44796,7 +44880,7 @@ Domain allowed access.
28510 </param>
28511 <infoflow type="read" weight="10"/>
28512 </interface>
28513 -<interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="55509">
28514 +<interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="55527">
28515 <summary>
28516 Do not audit attempts to receive UDP traffic on the nfs port.
28517 </summary>
28518 @@ -44807,7 +44891,7 @@ Domain to not audit.
28519 </param>
28520 <infoflow type="none"/>
28521 </interface>
28522 -<interface name="corenet_udp_sendrecv_nfs_port" lineno="55524">
28523 +<interface name="corenet_udp_sendrecv_nfs_port" lineno="55542">
28524 <summary>
28525 Send and receive UDP traffic on the nfs port.
28526 </summary>
28527 @@ -44818,7 +44902,7 @@ Domain allowed access.
28528 </param>
28529 <infoflow type="both" weight="10"/>
28530 </interface>
28531 -<interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="55540">
28532 +<interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="55558">
28533 <summary>
28534 Do not audit attempts to send and receive
28535 UDP traffic on the nfs port.
28536 @@ -44830,7 +44914,7 @@ Domain to not audit.
28537 </param>
28538 <infoflow type="none"/>
28539 </interface>
28540 -<interface name="corenet_tcp_bind_nfs_port" lineno="55555">
28541 +<interface name="corenet_tcp_bind_nfs_port" lineno="55573">
28542 <summary>
28543 Bind TCP sockets to the nfs port.
28544 </summary>
28545 @@ -44841,7 +44925,7 @@ Domain allowed access.
28546 </param>
28547 <infoflow type="none"/>
28548 </interface>
28549 -<interface name="corenet_udp_bind_nfs_port" lineno="55575">
28550 +<interface name="corenet_udp_bind_nfs_port" lineno="55593">
28551 <summary>
28552 Bind UDP sockets to the nfs port.
28553 </summary>
28554 @@ -44852,7 +44936,7 @@ Domain allowed access.
28555 </param>
28556 <infoflow type="none"/>
28557 </interface>
28558 -<interface name="corenet_tcp_connect_nfs_port" lineno="55594">
28559 +<interface name="corenet_tcp_connect_nfs_port" lineno="55612">
28560 <summary>
28561 Make a TCP connection to the nfs port.
28562 </summary>
28563 @@ -44862,7 +44946,7 @@ Domain allowed access.
28564 </summary>
28565 </param>
28566 </interface>
28567 -<interface name="corenet_send_nfs_client_packets" lineno="55614">
28568 +<interface name="corenet_send_nfs_client_packets" lineno="55632">
28569 <summary>
28570 Send nfs_client packets.
28571 </summary>
28572 @@ -44873,7 +44957,7 @@ Domain allowed access.
28573 </param>
28574 <infoflow type="write" weight="10"/>
28575 </interface>
28576 -<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="55633">
28577 +<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="55651">
28578 <summary>
28579 Do not audit attempts to send nfs_client packets.
28580 </summary>
28581 @@ -44884,7 +44968,7 @@ Domain to not audit.
28582 </param>
28583 <infoflow type="none"/>
28584 </interface>
28585 -<interface name="corenet_receive_nfs_client_packets" lineno="55652">
28586 +<interface name="corenet_receive_nfs_client_packets" lineno="55670">
28587 <summary>
28588 Receive nfs_client packets.
28589 </summary>
28590 @@ -44895,7 +44979,7 @@ Domain allowed access.
28591 </param>
28592 <infoflow type="read" weight="10"/>
28593 </interface>
28594 -<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="55671">
28595 +<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="55689">
28596 <summary>
28597 Do not audit attempts to receive nfs_client packets.
28598 </summary>
28599 @@ -44906,7 +44990,7 @@ Domain allowed access.
28600 </param>
28601 <infoflow type="none"/>
28602 </interface>
28603 -<interface name="corenet_sendrecv_nfs_client_packets" lineno="55690">
28604 +<interface name="corenet_sendrecv_nfs_client_packets" lineno="55708">
28605 <summary>
28606 Send and receive nfs_client packets.
28607 </summary>
28608 @@ -44917,7 +45001,7 @@ Domain allowed access.
28609 </param>
28610 <infoflow type="both" weight="10"/>
28611 </interface>
28612 -<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="55706">
28613 +<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="55724">
28614 <summary>
28615 Do not audit attempts to send and receive nfs_client packets.
28616 </summary>
28617 @@ -44928,7 +45012,7 @@ Domain to not audit.
28618 </param>
28619 <infoflow type="none"/>
28620 </interface>
28621 -<interface name="corenet_relabelto_nfs_client_packets" lineno="55721">
28622 +<interface name="corenet_relabelto_nfs_client_packets" lineno="55739">
28623 <summary>
28624 Relabel packets to nfs_client the packet type.
28625 </summary>
28626 @@ -44938,7 +45022,7 @@ Domain allowed access.
28627 </summary>
28628 </param>
28629 </interface>
28630 -<interface name="corenet_send_nfs_server_packets" lineno="55741">
28631 +<interface name="corenet_send_nfs_server_packets" lineno="55759">
28632 <summary>
28633 Send nfs_server packets.
28634 </summary>
28635 @@ -44949,7 +45033,7 @@ Domain allowed access.
28636 </param>
28637 <infoflow type="write" weight="10"/>
28638 </interface>
28639 -<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="55760">
28640 +<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="55778">
28641 <summary>
28642 Do not audit attempts to send nfs_server packets.
28643 </summary>
28644 @@ -44960,7 +45044,7 @@ Domain to not audit.
28645 </param>
28646 <infoflow type="none"/>
28647 </interface>
28648 -<interface name="corenet_receive_nfs_server_packets" lineno="55779">
28649 +<interface name="corenet_receive_nfs_server_packets" lineno="55797">
28650 <summary>
28651 Receive nfs_server packets.
28652 </summary>
28653 @@ -44971,7 +45055,7 @@ Domain allowed access.
28654 </param>
28655 <infoflow type="read" weight="10"/>
28656 </interface>
28657 -<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="55798">
28658 +<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="55816">
28659 <summary>
28660 Do not audit attempts to receive nfs_server packets.
28661 </summary>
28662 @@ -44982,7 +45066,7 @@ Domain allowed access.
28663 </param>
28664 <infoflow type="none"/>
28665 </interface>
28666 -<interface name="corenet_sendrecv_nfs_server_packets" lineno="55817">
28667 +<interface name="corenet_sendrecv_nfs_server_packets" lineno="55835">
28668 <summary>
28669 Send and receive nfs_server packets.
28670 </summary>
28671 @@ -44993,7 +45077,7 @@ Domain allowed access.
28672 </param>
28673 <infoflow type="both" weight="10"/>
28674 </interface>
28675 -<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="55833">
28676 +<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="55851">
28677 <summary>
28678 Do not audit attempts to send and receive nfs_server packets.
28679 </summary>
28680 @@ -45004,7 +45088,7 @@ Domain to not audit.
28681 </param>
28682 <infoflow type="none"/>
28683 </interface>
28684 -<interface name="corenet_relabelto_nfs_server_packets" lineno="55848">
28685 +<interface name="corenet_relabelto_nfs_server_packets" lineno="55866">
28686 <summary>
28687 Relabel packets to nfs_server the packet type.
28688 </summary>
28689 @@ -45014,7 +45098,7 @@ Domain allowed access.
28690 </summary>
28691 </param>
28692 </interface>
28693 -<interface name="corenet_tcp_sendrecv_nfsrdma_port" lineno="55870">
28694 +<interface name="corenet_tcp_sendrecv_nfsrdma_port" lineno="55888">
28695 <summary>
28696 Send and receive TCP traffic on the nfsrdma port.
28697 </summary>
28698 @@ -45025,7 +45109,7 @@ Domain allowed access.
28699 </param>
28700 <infoflow type="both" weight="10"/>
28701 </interface>
28702 -<interface name="corenet_udp_send_nfsrdma_port" lineno="55885">
28703 +<interface name="corenet_udp_send_nfsrdma_port" lineno="55903">
28704 <summary>
28705 Send UDP traffic on the nfsrdma port.
28706 </summary>
28707 @@ -45036,7 +45120,7 @@ Domain allowed access.
28708 </param>
28709 <infoflow type="write" weight="10"/>
28710 </interface>
28711 -<interface name="corenet_dontaudit_udp_send_nfsrdma_port" lineno="55900">
28712 +<interface name="corenet_dontaudit_udp_send_nfsrdma_port" lineno="55918">
28713 <summary>
28714 Do not audit attempts to send UDP traffic on the nfsrdma port.
28715 </summary>
28716 @@ -45047,7 +45131,7 @@ Domain to not audit.
28717 </param>
28718 <infoflow type="none"/>
28719 </interface>
28720 -<interface name="corenet_udp_receive_nfsrdma_port" lineno="55915">
28721 +<interface name="corenet_udp_receive_nfsrdma_port" lineno="55933">
28722 <summary>
28723 Receive UDP traffic on the nfsrdma port.
28724 </summary>
28725 @@ -45058,7 +45142,7 @@ Domain allowed access.
28726 </param>
28727 <infoflow type="read" weight="10"/>
28728 </interface>
28729 -<interface name="corenet_dontaudit_udp_receive_nfsrdma_port" lineno="55930">
28730 +<interface name="corenet_dontaudit_udp_receive_nfsrdma_port" lineno="55948">
28731 <summary>
28732 Do not audit attempts to receive UDP traffic on the nfsrdma port.
28733 </summary>
28734 @@ -45069,7 +45153,7 @@ Domain to not audit.
28735 </param>
28736 <infoflow type="none"/>
28737 </interface>
28738 -<interface name="corenet_udp_sendrecv_nfsrdma_port" lineno="55945">
28739 +<interface name="corenet_udp_sendrecv_nfsrdma_port" lineno="55963">
28740 <summary>
28741 Send and receive UDP traffic on the nfsrdma port.
28742 </summary>
28743 @@ -45080,7 +45164,7 @@ Domain allowed access.
28744 </param>
28745 <infoflow type="both" weight="10"/>
28746 </interface>
28747 -<interface name="corenet_dontaudit_udp_sendrecv_nfsrdma_port" lineno="55961">
28748 +<interface name="corenet_dontaudit_udp_sendrecv_nfsrdma_port" lineno="55979">
28749 <summary>
28750 Do not audit attempts to send and receive
28751 UDP traffic on the nfsrdma port.
28752 @@ -45092,7 +45176,7 @@ Domain to not audit.
28753 </param>
28754 <infoflow type="none"/>
28755 </interface>
28756 -<interface name="corenet_tcp_bind_nfsrdma_port" lineno="55976">
28757 +<interface name="corenet_tcp_bind_nfsrdma_port" lineno="55994">
28758 <summary>
28759 Bind TCP sockets to the nfsrdma port.
28760 </summary>
28761 @@ -45103,7 +45187,7 @@ Domain allowed access.
28762 </param>
28763 <infoflow type="none"/>
28764 </interface>
28765 -<interface name="corenet_udp_bind_nfsrdma_port" lineno="55996">
28766 +<interface name="corenet_udp_bind_nfsrdma_port" lineno="56014">
28767 <summary>
28768 Bind UDP sockets to the nfsrdma port.
28769 </summary>
28770 @@ -45114,7 +45198,7 @@ Domain allowed access.
28771 </param>
28772 <infoflow type="none"/>
28773 </interface>
28774 -<interface name="corenet_tcp_connect_nfsrdma_port" lineno="56015">
28775 +<interface name="corenet_tcp_connect_nfsrdma_port" lineno="56033">
28776 <summary>
28777 Make a TCP connection to the nfsrdma port.
28778 </summary>
28779 @@ -45124,7 +45208,7 @@ Domain allowed access.
28780 </summary>
28781 </param>
28782 </interface>
28783 -<interface name="corenet_send_nfsrdma_client_packets" lineno="56035">
28784 +<interface name="corenet_send_nfsrdma_client_packets" lineno="56053">
28785 <summary>
28786 Send nfsrdma_client packets.
28787 </summary>
28788 @@ -45135,7 +45219,7 @@ Domain allowed access.
28789 </param>
28790 <infoflow type="write" weight="10"/>
28791 </interface>
28792 -<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="56054">
28793 +<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="56072">
28794 <summary>
28795 Do not audit attempts to send nfsrdma_client packets.
28796 </summary>
28797 @@ -45146,7 +45230,7 @@ Domain to not audit.
28798 </param>
28799 <infoflow type="none"/>
28800 </interface>
28801 -<interface name="corenet_receive_nfsrdma_client_packets" lineno="56073">
28802 +<interface name="corenet_receive_nfsrdma_client_packets" lineno="56091">
28803 <summary>
28804 Receive nfsrdma_client packets.
28805 </summary>
28806 @@ -45157,7 +45241,7 @@ Domain allowed access.
28807 </param>
28808 <infoflow type="read" weight="10"/>
28809 </interface>
28810 -<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="56092">
28811 +<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="56110">
28812 <summary>
28813 Do not audit attempts to receive nfsrdma_client packets.
28814 </summary>
28815 @@ -45168,7 +45252,7 @@ Domain allowed access.
28816 </param>
28817 <infoflow type="none"/>
28818 </interface>
28819 -<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="56111">
28820 +<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="56129">
28821 <summary>
28822 Send and receive nfsrdma_client packets.
28823 </summary>
28824 @@ -45179,7 +45263,7 @@ Domain allowed access.
28825 </param>
28826 <infoflow type="both" weight="10"/>
28827 </interface>
28828 -<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="56127">
28829 +<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="56145">
28830 <summary>
28831 Do not audit attempts to send and receive nfsrdma_client packets.
28832 </summary>
28833 @@ -45190,7 +45274,7 @@ Domain to not audit.
28834 </param>
28835 <infoflow type="none"/>
28836 </interface>
28837 -<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="56142">
28838 +<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="56160">
28839 <summary>
28840 Relabel packets to nfsrdma_client the packet type.
28841 </summary>
28842 @@ -45200,7 +45284,7 @@ Domain allowed access.
28843 </summary>
28844 </param>
28845 </interface>
28846 -<interface name="corenet_send_nfsrdma_server_packets" lineno="56162">
28847 +<interface name="corenet_send_nfsrdma_server_packets" lineno="56180">
28848 <summary>
28849 Send nfsrdma_server packets.
28850 </summary>
28851 @@ -45211,7 +45295,7 @@ Domain allowed access.
28852 </param>
28853 <infoflow type="write" weight="10"/>
28854 </interface>
28855 -<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="56181">
28856 +<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="56199">
28857 <summary>
28858 Do not audit attempts to send nfsrdma_server packets.
28859 </summary>
28860 @@ -45222,7 +45306,7 @@ Domain to not audit.
28861 </param>
28862 <infoflow type="none"/>
28863 </interface>
28864 -<interface name="corenet_receive_nfsrdma_server_packets" lineno="56200">
28865 +<interface name="corenet_receive_nfsrdma_server_packets" lineno="56218">
28866 <summary>
28867 Receive nfsrdma_server packets.
28868 </summary>
28869 @@ -45233,7 +45317,7 @@ Domain allowed access.
28870 </param>
28871 <infoflow type="read" weight="10"/>
28872 </interface>
28873 -<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="56219">
28874 +<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="56237">
28875 <summary>
28876 Do not audit attempts to receive nfsrdma_server packets.
28877 </summary>
28878 @@ -45244,7 +45328,7 @@ Domain allowed access.
28879 </param>
28880 <infoflow type="none"/>
28881 </interface>
28882 -<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="56238">
28883 +<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="56256">
28884 <summary>
28885 Send and receive nfsrdma_server packets.
28886 </summary>
28887 @@ -45255,7 +45339,7 @@ Domain allowed access.
28888 </param>
28889 <infoflow type="both" weight="10"/>
28890 </interface>
28891 -<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="56254">
28892 +<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="56272">
28893 <summary>
28894 Do not audit attempts to send and receive nfsrdma_server packets.
28895 </summary>
28896 @@ -45266,7 +45350,7 @@ Domain to not audit.
28897 </param>
28898 <infoflow type="none"/>
28899 </interface>
28900 -<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="56269">
28901 +<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="56287">
28902 <summary>
28903 Relabel packets to nfsrdma_server the packet type.
28904 </summary>
28905 @@ -45276,7 +45360,7 @@ Domain allowed access.
28906 </summary>
28907 </param>
28908 </interface>
28909 -<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="56291">
28910 +<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="56309">
28911 <summary>
28912 Send and receive TCP traffic on the nmbd port.
28913 </summary>
28914 @@ -45287,7 +45371,7 @@ Domain allowed access.
28915 </param>
28916 <infoflow type="both" weight="10"/>
28917 </interface>
28918 -<interface name="corenet_udp_send_nmbd_port" lineno="56306">
28919 +<interface name="corenet_udp_send_nmbd_port" lineno="56324">
28920 <summary>
28921 Send UDP traffic on the nmbd port.
28922 </summary>
28923 @@ -45298,7 +45382,7 @@ Domain allowed access.
28924 </param>
28925 <infoflow type="write" weight="10"/>
28926 </interface>
28927 -<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="56321">
28928 +<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="56339">
28929 <summary>
28930 Do not audit attempts to send UDP traffic on the nmbd port.
28931 </summary>
28932 @@ -45309,7 +45393,7 @@ Domain to not audit.
28933 </param>
28934 <infoflow type="none"/>
28935 </interface>
28936 -<interface name="corenet_udp_receive_nmbd_port" lineno="56336">
28937 +<interface name="corenet_udp_receive_nmbd_port" lineno="56354">
28938 <summary>
28939 Receive UDP traffic on the nmbd port.
28940 </summary>
28941 @@ -45320,7 +45404,7 @@ Domain allowed access.
28942 </param>
28943 <infoflow type="read" weight="10"/>
28944 </interface>
28945 -<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="56351">
28946 +<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="56369">
28947 <summary>
28948 Do not audit attempts to receive UDP traffic on the nmbd port.
28949 </summary>
28950 @@ -45331,7 +45415,7 @@ Domain to not audit.
28951 </param>
28952 <infoflow type="none"/>
28953 </interface>
28954 -<interface name="corenet_udp_sendrecv_nmbd_port" lineno="56366">
28955 +<interface name="corenet_udp_sendrecv_nmbd_port" lineno="56384">
28956 <summary>
28957 Send and receive UDP traffic on the nmbd port.
28958 </summary>
28959 @@ -45342,7 +45426,7 @@ Domain allowed access.
28960 </param>
28961 <infoflow type="both" weight="10"/>
28962 </interface>
28963 -<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="56382">
28964 +<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="56400">
28965 <summary>
28966 Do not audit attempts to send and receive
28967 UDP traffic on the nmbd port.
28968 @@ -45354,7 +45438,7 @@ Domain to not audit.
28969 </param>
28970 <infoflow type="none"/>
28971 </interface>
28972 -<interface name="corenet_tcp_bind_nmbd_port" lineno="56397">
28973 +<interface name="corenet_tcp_bind_nmbd_port" lineno="56415">
28974 <summary>
28975 Bind TCP sockets to the nmbd port.
28976 </summary>
28977 @@ -45365,7 +45449,7 @@ Domain allowed access.
28978 </param>
28979 <infoflow type="none"/>
28980 </interface>
28981 -<interface name="corenet_udp_bind_nmbd_port" lineno="56417">
28982 +<interface name="corenet_udp_bind_nmbd_port" lineno="56435">
28983 <summary>
28984 Bind UDP sockets to the nmbd port.
28985 </summary>
28986 @@ -45376,7 +45460,7 @@ Domain allowed access.
28987 </param>
28988 <infoflow type="none"/>
28989 </interface>
28990 -<interface name="corenet_tcp_connect_nmbd_port" lineno="56436">
28991 +<interface name="corenet_tcp_connect_nmbd_port" lineno="56454">
28992 <summary>
28993 Make a TCP connection to the nmbd port.
28994 </summary>
28995 @@ -45386,7 +45470,7 @@ Domain allowed access.
28996 </summary>
28997 </param>
28998 </interface>
28999 -<interface name="corenet_send_nmbd_client_packets" lineno="56456">
29000 +<interface name="corenet_send_nmbd_client_packets" lineno="56474">
29001 <summary>
29002 Send nmbd_client packets.
29003 </summary>
29004 @@ -45397,7 +45481,7 @@ Domain allowed access.
29005 </param>
29006 <infoflow type="write" weight="10"/>
29007 </interface>
29008 -<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="56475">
29009 +<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="56493">
29010 <summary>
29011 Do not audit attempts to send nmbd_client packets.
29012 </summary>
29013 @@ -45408,7 +45492,7 @@ Domain to not audit.
29014 </param>
29015 <infoflow type="none"/>
29016 </interface>
29017 -<interface name="corenet_receive_nmbd_client_packets" lineno="56494">
29018 +<interface name="corenet_receive_nmbd_client_packets" lineno="56512">
29019 <summary>
29020 Receive nmbd_client packets.
29021 </summary>
29022 @@ -45419,7 +45503,7 @@ Domain allowed access.
29023 </param>
29024 <infoflow type="read" weight="10"/>
29025 </interface>
29026 -<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="56513">
29027 +<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="56531">
29028 <summary>
29029 Do not audit attempts to receive nmbd_client packets.
29030 </summary>
29031 @@ -45430,7 +45514,7 @@ Domain allowed access.
29032 </param>
29033 <infoflow type="none"/>
29034 </interface>
29035 -<interface name="corenet_sendrecv_nmbd_client_packets" lineno="56532">
29036 +<interface name="corenet_sendrecv_nmbd_client_packets" lineno="56550">
29037 <summary>
29038 Send and receive nmbd_client packets.
29039 </summary>
29040 @@ -45441,7 +45525,7 @@ Domain allowed access.
29041 </param>
29042 <infoflow type="both" weight="10"/>
29043 </interface>
29044 -<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="56548">
29045 +<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="56566">
29046 <summary>
29047 Do not audit attempts to send and receive nmbd_client packets.
29048 </summary>
29049 @@ -45452,7 +45536,7 @@ Domain to not audit.
29050 </param>
29051 <infoflow type="none"/>
29052 </interface>
29053 -<interface name="corenet_relabelto_nmbd_client_packets" lineno="56563">
29054 +<interface name="corenet_relabelto_nmbd_client_packets" lineno="56581">
29055 <summary>
29056 Relabel packets to nmbd_client the packet type.
29057 </summary>
29058 @@ -45462,7 +45546,7 @@ Domain allowed access.
29059 </summary>
29060 </param>
29061 </interface>
29062 -<interface name="corenet_send_nmbd_server_packets" lineno="56583">
29063 +<interface name="corenet_send_nmbd_server_packets" lineno="56601">
29064 <summary>
29065 Send nmbd_server packets.
29066 </summary>
29067 @@ -45473,7 +45557,7 @@ Domain allowed access.
29068 </param>
29069 <infoflow type="write" weight="10"/>
29070 </interface>
29071 -<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="56602">
29072 +<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="56620">
29073 <summary>
29074 Do not audit attempts to send nmbd_server packets.
29075 </summary>
29076 @@ -45484,7 +45568,7 @@ Domain to not audit.
29077 </param>
29078 <infoflow type="none"/>
29079 </interface>
29080 -<interface name="corenet_receive_nmbd_server_packets" lineno="56621">
29081 +<interface name="corenet_receive_nmbd_server_packets" lineno="56639">
29082 <summary>
29083 Receive nmbd_server packets.
29084 </summary>
29085 @@ -45495,7 +45579,7 @@ Domain allowed access.
29086 </param>
29087 <infoflow type="read" weight="10"/>
29088 </interface>
29089 -<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="56640">
29090 +<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="56658">
29091 <summary>
29092 Do not audit attempts to receive nmbd_server packets.
29093 </summary>
29094 @@ -45506,7 +45590,7 @@ Domain allowed access.
29095 </param>
29096 <infoflow type="none"/>
29097 </interface>
29098 -<interface name="corenet_sendrecv_nmbd_server_packets" lineno="56659">
29099 +<interface name="corenet_sendrecv_nmbd_server_packets" lineno="56677">
29100 <summary>
29101 Send and receive nmbd_server packets.
29102 </summary>
29103 @@ -45517,7 +45601,7 @@ Domain allowed access.
29104 </param>
29105 <infoflow type="both" weight="10"/>
29106 </interface>
29107 -<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="56675">
29108 +<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="56693">
29109 <summary>
29110 Do not audit attempts to send and receive nmbd_server packets.
29111 </summary>
29112 @@ -45528,7 +45612,7 @@ Domain to not audit.
29113 </param>
29114 <infoflow type="none"/>
29115 </interface>
29116 -<interface name="corenet_relabelto_nmbd_server_packets" lineno="56690">
29117 +<interface name="corenet_relabelto_nmbd_server_packets" lineno="56708">
29118 <summary>
29119 Relabel packets to nmbd_server the packet type.
29120 </summary>
29121 @@ -45538,7 +45622,7 @@ Domain allowed access.
29122 </summary>
29123 </param>
29124 </interface>
29125 -<interface name="corenet_tcp_sendrecv_ntop_port" lineno="56712">
29126 +<interface name="corenet_tcp_sendrecv_ntop_port" lineno="56730">
29127 <summary>
29128 Send and receive TCP traffic on the ntop port.
29129 </summary>
29130 @@ -45549,7 +45633,7 @@ Domain allowed access.
29131 </param>
29132 <infoflow type="both" weight="10"/>
29133 </interface>
29134 -<interface name="corenet_udp_send_ntop_port" lineno="56727">
29135 +<interface name="corenet_udp_send_ntop_port" lineno="56745">
29136 <summary>
29137 Send UDP traffic on the ntop port.
29138 </summary>
29139 @@ -45560,7 +45644,7 @@ Domain allowed access.
29140 </param>
29141 <infoflow type="write" weight="10"/>
29142 </interface>
29143 -<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="56742">
29144 +<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="56760">
29145 <summary>
29146 Do not audit attempts to send UDP traffic on the ntop port.
29147 </summary>
29148 @@ -45571,7 +45655,7 @@ Domain to not audit.
29149 </param>
29150 <infoflow type="none"/>
29151 </interface>
29152 -<interface name="corenet_udp_receive_ntop_port" lineno="56757">
29153 +<interface name="corenet_udp_receive_ntop_port" lineno="56775">
29154 <summary>
29155 Receive UDP traffic on the ntop port.
29156 </summary>
29157 @@ -45582,7 +45666,7 @@ Domain allowed access.
29158 </param>
29159 <infoflow type="read" weight="10"/>
29160 </interface>
29161 -<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="56772">
29162 +<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="56790">
29163 <summary>
29164 Do not audit attempts to receive UDP traffic on the ntop port.
29165 </summary>
29166 @@ -45593,7 +45677,7 @@ Domain to not audit.
29167 </param>
29168 <infoflow type="none"/>
29169 </interface>
29170 -<interface name="corenet_udp_sendrecv_ntop_port" lineno="56787">
29171 +<interface name="corenet_udp_sendrecv_ntop_port" lineno="56805">
29172 <summary>
29173 Send and receive UDP traffic on the ntop port.
29174 </summary>
29175 @@ -45604,7 +45688,7 @@ Domain allowed access.
29176 </param>
29177 <infoflow type="both" weight="10"/>
29178 </interface>
29179 -<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="56803">
29180 +<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="56821">
29181 <summary>
29182 Do not audit attempts to send and receive
29183 UDP traffic on the ntop port.
29184 @@ -45616,7 +45700,7 @@ Domain to not audit.
29185 </param>
29186 <infoflow type="none"/>
29187 </interface>
29188 -<interface name="corenet_tcp_bind_ntop_port" lineno="56818">
29189 +<interface name="corenet_tcp_bind_ntop_port" lineno="56836">
29190 <summary>
29191 Bind TCP sockets to the ntop port.
29192 </summary>
29193 @@ -45627,7 +45711,7 @@ Domain allowed access.
29194 </param>
29195 <infoflow type="none"/>
29196 </interface>
29197 -<interface name="corenet_udp_bind_ntop_port" lineno="56838">
29198 +<interface name="corenet_udp_bind_ntop_port" lineno="56856">
29199 <summary>
29200 Bind UDP sockets to the ntop port.
29201 </summary>
29202 @@ -45638,7 +45722,7 @@ Domain allowed access.
29203 </param>
29204 <infoflow type="none"/>
29205 </interface>
29206 -<interface name="corenet_tcp_connect_ntop_port" lineno="56857">
29207 +<interface name="corenet_tcp_connect_ntop_port" lineno="56875">
29208 <summary>
29209 Make a TCP connection to the ntop port.
29210 </summary>
29211 @@ -45648,7 +45732,7 @@ Domain allowed access.
29212 </summary>
29213 </param>
29214 </interface>
29215 -<interface name="corenet_send_ntop_client_packets" lineno="56877">
29216 +<interface name="corenet_send_ntop_client_packets" lineno="56895">
29217 <summary>
29218 Send ntop_client packets.
29219 </summary>
29220 @@ -45659,7 +45743,7 @@ Domain allowed access.
29221 </param>
29222 <infoflow type="write" weight="10"/>
29223 </interface>
29224 -<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="56896">
29225 +<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="56914">
29226 <summary>
29227 Do not audit attempts to send ntop_client packets.
29228 </summary>
29229 @@ -45670,7 +45754,7 @@ Domain to not audit.
29230 </param>
29231 <infoflow type="none"/>
29232 </interface>
29233 -<interface name="corenet_receive_ntop_client_packets" lineno="56915">
29234 +<interface name="corenet_receive_ntop_client_packets" lineno="56933">
29235 <summary>
29236 Receive ntop_client packets.
29237 </summary>
29238 @@ -45681,7 +45765,7 @@ Domain allowed access.
29239 </param>
29240 <infoflow type="read" weight="10"/>
29241 </interface>
29242 -<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="56934">
29243 +<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="56952">
29244 <summary>
29245 Do not audit attempts to receive ntop_client packets.
29246 </summary>
29247 @@ -45692,7 +45776,7 @@ Domain allowed access.
29248 </param>
29249 <infoflow type="none"/>
29250 </interface>
29251 -<interface name="corenet_sendrecv_ntop_client_packets" lineno="56953">
29252 +<interface name="corenet_sendrecv_ntop_client_packets" lineno="56971">
29253 <summary>
29254 Send and receive ntop_client packets.
29255 </summary>
29256 @@ -45703,7 +45787,7 @@ Domain allowed access.
29257 </param>
29258 <infoflow type="both" weight="10"/>
29259 </interface>
29260 -<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="56969">
29261 +<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="56987">
29262 <summary>
29263 Do not audit attempts to send and receive ntop_client packets.
29264 </summary>
29265 @@ -45714,7 +45798,7 @@ Domain to not audit.
29266 </param>
29267 <infoflow type="none"/>
29268 </interface>
29269 -<interface name="corenet_relabelto_ntop_client_packets" lineno="56984">
29270 +<interface name="corenet_relabelto_ntop_client_packets" lineno="57002">
29271 <summary>
29272 Relabel packets to ntop_client the packet type.
29273 </summary>
29274 @@ -45724,7 +45808,7 @@ Domain allowed access.
29275 </summary>
29276 </param>
29277 </interface>
29278 -<interface name="corenet_send_ntop_server_packets" lineno="57004">
29279 +<interface name="corenet_send_ntop_server_packets" lineno="57022">
29280 <summary>
29281 Send ntop_server packets.
29282 </summary>
29283 @@ -45735,7 +45819,7 @@ Domain allowed access.
29284 </param>
29285 <infoflow type="write" weight="10"/>
29286 </interface>
29287 -<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="57023">
29288 +<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="57041">
29289 <summary>
29290 Do not audit attempts to send ntop_server packets.
29291 </summary>
29292 @@ -45746,7 +45830,7 @@ Domain to not audit.
29293 </param>
29294 <infoflow type="none"/>
29295 </interface>
29296 -<interface name="corenet_receive_ntop_server_packets" lineno="57042">
29297 +<interface name="corenet_receive_ntop_server_packets" lineno="57060">
29298 <summary>
29299 Receive ntop_server packets.
29300 </summary>
29301 @@ -45757,7 +45841,7 @@ Domain allowed access.
29302 </param>
29303 <infoflow type="read" weight="10"/>
29304 </interface>
29305 -<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="57061">
29306 +<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="57079">
29307 <summary>
29308 Do not audit attempts to receive ntop_server packets.
29309 </summary>
29310 @@ -45768,7 +45852,7 @@ Domain allowed access.
29311 </param>
29312 <infoflow type="none"/>
29313 </interface>
29314 -<interface name="corenet_sendrecv_ntop_server_packets" lineno="57080">
29315 +<interface name="corenet_sendrecv_ntop_server_packets" lineno="57098">
29316 <summary>
29317 Send and receive ntop_server packets.
29318 </summary>
29319 @@ -45779,7 +45863,7 @@ Domain allowed access.
29320 </param>
29321 <infoflow type="both" weight="10"/>
29322 </interface>
29323 -<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="57096">
29324 +<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="57114">
29325 <summary>
29326 Do not audit attempts to send and receive ntop_server packets.
29327 </summary>
29328 @@ -45790,7 +45874,7 @@ Domain to not audit.
29329 </param>
29330 <infoflow type="none"/>
29331 </interface>
29332 -<interface name="corenet_relabelto_ntop_server_packets" lineno="57111">
29333 +<interface name="corenet_relabelto_ntop_server_packets" lineno="57129">
29334 <summary>
29335 Relabel packets to ntop_server the packet type.
29336 </summary>
29337 @@ -45800,7 +45884,7 @@ Domain allowed access.
29338 </summary>
29339 </param>
29340 </interface>
29341 -<interface name="corenet_tcp_sendrecv_ntp_port" lineno="57133">
29342 +<interface name="corenet_tcp_sendrecv_ntp_port" lineno="57151">
29343 <summary>
29344 Send and receive TCP traffic on the ntp port.
29345 </summary>
29346 @@ -45811,7 +45895,7 @@ Domain allowed access.
29347 </param>
29348 <infoflow type="both" weight="10"/>
29349 </interface>
29350 -<interface name="corenet_udp_send_ntp_port" lineno="57148">
29351 +<interface name="corenet_udp_send_ntp_port" lineno="57166">
29352 <summary>
29353 Send UDP traffic on the ntp port.
29354 </summary>
29355 @@ -45822,7 +45906,7 @@ Domain allowed access.
29356 </param>
29357 <infoflow type="write" weight="10"/>
29358 </interface>
29359 -<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="57163">
29360 +<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="57181">
29361 <summary>
29362 Do not audit attempts to send UDP traffic on the ntp port.
29363 </summary>
29364 @@ -45833,7 +45917,7 @@ Domain to not audit.
29365 </param>
29366 <infoflow type="none"/>
29367 </interface>
29368 -<interface name="corenet_udp_receive_ntp_port" lineno="57178">
29369 +<interface name="corenet_udp_receive_ntp_port" lineno="57196">
29370 <summary>
29371 Receive UDP traffic on the ntp port.
29372 </summary>
29373 @@ -45844,7 +45928,7 @@ Domain allowed access.
29374 </param>
29375 <infoflow type="read" weight="10"/>
29376 </interface>
29377 -<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="57193">
29378 +<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="57211">
29379 <summary>
29380 Do not audit attempts to receive UDP traffic on the ntp port.
29381 </summary>
29382 @@ -45855,7 +45939,7 @@ Domain to not audit.
29383 </param>
29384 <infoflow type="none"/>
29385 </interface>
29386 -<interface name="corenet_udp_sendrecv_ntp_port" lineno="57208">
29387 +<interface name="corenet_udp_sendrecv_ntp_port" lineno="57226">
29388 <summary>
29389 Send and receive UDP traffic on the ntp port.
29390 </summary>
29391 @@ -45866,7 +45950,7 @@ Domain allowed access.
29392 </param>
29393 <infoflow type="both" weight="10"/>
29394 </interface>
29395 -<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="57224">
29396 +<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="57242">
29397 <summary>
29398 Do not audit attempts to send and receive
29399 UDP traffic on the ntp port.
29400 @@ -45878,7 +45962,7 @@ Domain to not audit.
29401 </param>
29402 <infoflow type="none"/>
29403 </interface>
29404 -<interface name="corenet_tcp_bind_ntp_port" lineno="57239">
29405 +<interface name="corenet_tcp_bind_ntp_port" lineno="57257">
29406 <summary>
29407 Bind TCP sockets to the ntp port.
29408 </summary>
29409 @@ -45889,7 +45973,7 @@ Domain allowed access.
29410 </param>
29411 <infoflow type="none"/>
29412 </interface>
29413 -<interface name="corenet_udp_bind_ntp_port" lineno="57259">
29414 +<interface name="corenet_udp_bind_ntp_port" lineno="57277">
29415 <summary>
29416 Bind UDP sockets to the ntp port.
29417 </summary>
29418 @@ -45900,7 +45984,7 @@ Domain allowed access.
29419 </param>
29420 <infoflow type="none"/>
29421 </interface>
29422 -<interface name="corenet_tcp_connect_ntp_port" lineno="57278">
29423 +<interface name="corenet_tcp_connect_ntp_port" lineno="57296">
29424 <summary>
29425 Make a TCP connection to the ntp port.
29426 </summary>
29427 @@ -45910,7 +45994,7 @@ Domain allowed access.
29428 </summary>
29429 </param>
29430 </interface>
29431 -<interface name="corenet_send_ntp_client_packets" lineno="57298">
29432 +<interface name="corenet_send_ntp_client_packets" lineno="57316">
29433 <summary>
29434 Send ntp_client packets.
29435 </summary>
29436 @@ -45921,7 +46005,7 @@ Domain allowed access.
29437 </param>
29438 <infoflow type="write" weight="10"/>
29439 </interface>
29440 -<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="57317">
29441 +<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="57335">
29442 <summary>
29443 Do not audit attempts to send ntp_client packets.
29444 </summary>
29445 @@ -45932,7 +46016,7 @@ Domain to not audit.
29446 </param>
29447 <infoflow type="none"/>
29448 </interface>
29449 -<interface name="corenet_receive_ntp_client_packets" lineno="57336">
29450 +<interface name="corenet_receive_ntp_client_packets" lineno="57354">
29451 <summary>
29452 Receive ntp_client packets.
29453 </summary>
29454 @@ -45943,7 +46027,7 @@ Domain allowed access.
29455 </param>
29456 <infoflow type="read" weight="10"/>
29457 </interface>
29458 -<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="57355">
29459 +<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="57373">
29460 <summary>
29461 Do not audit attempts to receive ntp_client packets.
29462 </summary>
29463 @@ -45954,7 +46038,7 @@ Domain allowed access.
29464 </param>
29465 <infoflow type="none"/>
29466 </interface>
29467 -<interface name="corenet_sendrecv_ntp_client_packets" lineno="57374">
29468 +<interface name="corenet_sendrecv_ntp_client_packets" lineno="57392">
29469 <summary>
29470 Send and receive ntp_client packets.
29471 </summary>
29472 @@ -45965,7 +46049,7 @@ Domain allowed access.
29473 </param>
29474 <infoflow type="both" weight="10"/>
29475 </interface>
29476 -<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="57390">
29477 +<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="57408">
29478 <summary>
29479 Do not audit attempts to send and receive ntp_client packets.
29480 </summary>
29481 @@ -45976,7 +46060,7 @@ Domain to not audit.
29482 </param>
29483 <infoflow type="none"/>
29484 </interface>
29485 -<interface name="corenet_relabelto_ntp_client_packets" lineno="57405">
29486 +<interface name="corenet_relabelto_ntp_client_packets" lineno="57423">
29487 <summary>
29488 Relabel packets to ntp_client the packet type.
29489 </summary>
29490 @@ -45986,7 +46070,7 @@ Domain allowed access.
29491 </summary>
29492 </param>
29493 </interface>
29494 -<interface name="corenet_send_ntp_server_packets" lineno="57425">
29495 +<interface name="corenet_send_ntp_server_packets" lineno="57443">
29496 <summary>
29497 Send ntp_server packets.
29498 </summary>
29499 @@ -45997,7 +46081,7 @@ Domain allowed access.
29500 </param>
29501 <infoflow type="write" weight="10"/>
29502 </interface>
29503 -<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="57444">
29504 +<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="57462">
29505 <summary>
29506 Do not audit attempts to send ntp_server packets.
29507 </summary>
29508 @@ -46008,7 +46092,7 @@ Domain to not audit.
29509 </param>
29510 <infoflow type="none"/>
29511 </interface>
29512 -<interface name="corenet_receive_ntp_server_packets" lineno="57463">
29513 +<interface name="corenet_receive_ntp_server_packets" lineno="57481">
29514 <summary>
29515 Receive ntp_server packets.
29516 </summary>
29517 @@ -46019,7 +46103,7 @@ Domain allowed access.
29518 </param>
29519 <infoflow type="read" weight="10"/>
29520 </interface>
29521 -<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="57482">
29522 +<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="57500">
29523 <summary>
29524 Do not audit attempts to receive ntp_server packets.
29525 </summary>
29526 @@ -46030,7 +46114,7 @@ Domain allowed access.
29527 </param>
29528 <infoflow type="none"/>
29529 </interface>
29530 -<interface name="corenet_sendrecv_ntp_server_packets" lineno="57501">
29531 +<interface name="corenet_sendrecv_ntp_server_packets" lineno="57519">
29532 <summary>
29533 Send and receive ntp_server packets.
29534 </summary>
29535 @@ -46041,7 +46125,7 @@ Domain allowed access.
29536 </param>
29537 <infoflow type="both" weight="10"/>
29538 </interface>
29539 -<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="57517">
29540 +<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="57535">
29541 <summary>
29542 Do not audit attempts to send and receive ntp_server packets.
29543 </summary>
29544 @@ -46052,7 +46136,7 @@ Domain to not audit.
29545 </param>
29546 <infoflow type="none"/>
29547 </interface>
29548 -<interface name="corenet_relabelto_ntp_server_packets" lineno="57532">
29549 +<interface name="corenet_relabelto_ntp_server_packets" lineno="57550">
29550 <summary>
29551 Relabel packets to ntp_server the packet type.
29552 </summary>
29553 @@ -46062,7 +46146,7 @@ Domain allowed access.
29554 </summary>
29555 </param>
29556 </interface>
29557 -<interface name="corenet_tcp_sendrecv_ntske_port" lineno="57554">
29558 +<interface name="corenet_tcp_sendrecv_ntske_port" lineno="57572">
29559 <summary>
29560 Send and receive TCP traffic on the ntske port.
29561 </summary>
29562 @@ -46073,7 +46157,7 @@ Domain allowed access.
29563 </param>
29564 <infoflow type="both" weight="10"/>
29565 </interface>
29566 -<interface name="corenet_udp_send_ntske_port" lineno="57569">
29567 +<interface name="corenet_udp_send_ntske_port" lineno="57587">
29568 <summary>
29569 Send UDP traffic on the ntske port.
29570 </summary>
29571 @@ -46084,7 +46168,7 @@ Domain allowed access.
29572 </param>
29573 <infoflow type="write" weight="10"/>
29574 </interface>
29575 -<interface name="corenet_dontaudit_udp_send_ntske_port" lineno="57584">
29576 +<interface name="corenet_dontaudit_udp_send_ntske_port" lineno="57602">
29577 <summary>
29578 Do not audit attempts to send UDP traffic on the ntske port.
29579 </summary>
29580 @@ -46095,7 +46179,7 @@ Domain to not audit.
29581 </param>
29582 <infoflow type="none"/>
29583 </interface>
29584 -<interface name="corenet_udp_receive_ntske_port" lineno="57599">
29585 +<interface name="corenet_udp_receive_ntske_port" lineno="57617">
29586 <summary>
29587 Receive UDP traffic on the ntske port.
29588 </summary>
29589 @@ -46106,7 +46190,7 @@ Domain allowed access.
29590 </param>
29591 <infoflow type="read" weight="10"/>
29592 </interface>
29593 -<interface name="corenet_dontaudit_udp_receive_ntske_port" lineno="57614">
29594 +<interface name="corenet_dontaudit_udp_receive_ntske_port" lineno="57632">
29595 <summary>
29596 Do not audit attempts to receive UDP traffic on the ntske port.
29597 </summary>
29598 @@ -46117,7 +46201,7 @@ Domain to not audit.
29599 </param>
29600 <infoflow type="none"/>
29601 </interface>
29602 -<interface name="corenet_udp_sendrecv_ntske_port" lineno="57629">
29603 +<interface name="corenet_udp_sendrecv_ntske_port" lineno="57647">
29604 <summary>
29605 Send and receive UDP traffic on the ntske port.
29606 </summary>
29607 @@ -46128,7 +46212,7 @@ Domain allowed access.
29608 </param>
29609 <infoflow type="both" weight="10"/>
29610 </interface>
29611 -<interface name="corenet_dontaudit_udp_sendrecv_ntske_port" lineno="57645">
29612 +<interface name="corenet_dontaudit_udp_sendrecv_ntske_port" lineno="57663">
29613 <summary>
29614 Do not audit attempts to send and receive
29615 UDP traffic on the ntske port.
29616 @@ -46140,7 +46224,7 @@ Domain to not audit.
29617 </param>
29618 <infoflow type="none"/>
29619 </interface>
29620 -<interface name="corenet_tcp_bind_ntske_port" lineno="57660">
29621 +<interface name="corenet_tcp_bind_ntske_port" lineno="57678">
29622 <summary>
29623 Bind TCP sockets to the ntske port.
29624 </summary>
29625 @@ -46151,7 +46235,7 @@ Domain allowed access.
29626 </param>
29627 <infoflow type="none"/>
29628 </interface>
29629 -<interface name="corenet_udp_bind_ntske_port" lineno="57680">
29630 +<interface name="corenet_udp_bind_ntske_port" lineno="57698">
29631 <summary>
29632 Bind UDP sockets to the ntske port.
29633 </summary>
29634 @@ -46162,7 +46246,7 @@ Domain allowed access.
29635 </param>
29636 <infoflow type="none"/>
29637 </interface>
29638 -<interface name="corenet_tcp_connect_ntske_port" lineno="57699">
29639 +<interface name="corenet_tcp_connect_ntske_port" lineno="57717">
29640 <summary>
29641 Make a TCP connection to the ntske port.
29642 </summary>
29643 @@ -46172,7 +46256,7 @@ Domain allowed access.
29644 </summary>
29645 </param>
29646 </interface>
29647 -<interface name="corenet_send_ntske_client_packets" lineno="57719">
29648 +<interface name="corenet_send_ntske_client_packets" lineno="57737">
29649 <summary>
29650 Send ntske_client packets.
29651 </summary>
29652 @@ -46183,7 +46267,7 @@ Domain allowed access.
29653 </param>
29654 <infoflow type="write" weight="10"/>
29655 </interface>
29656 -<interface name="corenet_dontaudit_send_ntske_client_packets" lineno="57738">
29657 +<interface name="corenet_dontaudit_send_ntske_client_packets" lineno="57756">
29658 <summary>
29659 Do not audit attempts to send ntske_client packets.
29660 </summary>
29661 @@ -46194,7 +46278,7 @@ Domain to not audit.
29662 </param>
29663 <infoflow type="none"/>
29664 </interface>
29665 -<interface name="corenet_receive_ntske_client_packets" lineno="57757">
29666 +<interface name="corenet_receive_ntske_client_packets" lineno="57775">
29667 <summary>
29668 Receive ntske_client packets.
29669 </summary>
29670 @@ -46205,7 +46289,7 @@ Domain allowed access.
29671 </param>
29672 <infoflow type="read" weight="10"/>
29673 </interface>
29674 -<interface name="corenet_dontaudit_receive_ntske_client_packets" lineno="57776">
29675 +<interface name="corenet_dontaudit_receive_ntske_client_packets" lineno="57794">
29676 <summary>
29677 Do not audit attempts to receive ntske_client packets.
29678 </summary>
29679 @@ -46216,7 +46300,7 @@ Domain allowed access.
29680 </param>
29681 <infoflow type="none"/>
29682 </interface>
29683 -<interface name="corenet_sendrecv_ntske_client_packets" lineno="57795">
29684 +<interface name="corenet_sendrecv_ntske_client_packets" lineno="57813">
29685 <summary>
29686 Send and receive ntske_client packets.
29687 </summary>
29688 @@ -46227,7 +46311,7 @@ Domain allowed access.
29689 </param>
29690 <infoflow type="both" weight="10"/>
29691 </interface>
29692 -<interface name="corenet_dontaudit_sendrecv_ntske_client_packets" lineno="57811">
29693 +<interface name="corenet_dontaudit_sendrecv_ntske_client_packets" lineno="57829">
29694 <summary>
29695 Do not audit attempts to send and receive ntske_client packets.
29696 </summary>
29697 @@ -46238,7 +46322,7 @@ Domain to not audit.
29698 </param>
29699 <infoflow type="none"/>
29700 </interface>
29701 -<interface name="corenet_relabelto_ntske_client_packets" lineno="57826">
29702 +<interface name="corenet_relabelto_ntske_client_packets" lineno="57844">
29703 <summary>
29704 Relabel packets to ntske_client the packet type.
29705 </summary>
29706 @@ -46248,7 +46332,7 @@ Domain allowed access.
29707 </summary>
29708 </param>
29709 </interface>
29710 -<interface name="corenet_send_ntske_server_packets" lineno="57846">
29711 +<interface name="corenet_send_ntske_server_packets" lineno="57864">
29712 <summary>
29713 Send ntske_server packets.
29714 </summary>
29715 @@ -46259,7 +46343,7 @@ Domain allowed access.
29716 </param>
29717 <infoflow type="write" weight="10"/>
29718 </interface>
29719 -<interface name="corenet_dontaudit_send_ntske_server_packets" lineno="57865">
29720 +<interface name="corenet_dontaudit_send_ntske_server_packets" lineno="57883">
29721 <summary>
29722 Do not audit attempts to send ntske_server packets.
29723 </summary>
29724 @@ -46270,7 +46354,7 @@ Domain to not audit.
29725 </param>
29726 <infoflow type="none"/>
29727 </interface>
29728 -<interface name="corenet_receive_ntske_server_packets" lineno="57884">
29729 +<interface name="corenet_receive_ntske_server_packets" lineno="57902">
29730 <summary>
29731 Receive ntske_server packets.
29732 </summary>
29733 @@ -46281,7 +46365,7 @@ Domain allowed access.
29734 </param>
29735 <infoflow type="read" weight="10"/>
29736 </interface>
29737 -<interface name="corenet_dontaudit_receive_ntske_server_packets" lineno="57903">
29738 +<interface name="corenet_dontaudit_receive_ntske_server_packets" lineno="57921">
29739 <summary>
29740 Do not audit attempts to receive ntske_server packets.
29741 </summary>
29742 @@ -46292,7 +46376,7 @@ Domain allowed access.
29743 </param>
29744 <infoflow type="none"/>
29745 </interface>
29746 -<interface name="corenet_sendrecv_ntske_server_packets" lineno="57922">
29747 +<interface name="corenet_sendrecv_ntske_server_packets" lineno="57940">
29748 <summary>
29749 Send and receive ntske_server packets.
29750 </summary>
29751 @@ -46303,7 +46387,7 @@ Domain allowed access.
29752 </param>
29753 <infoflow type="both" weight="10"/>
29754 </interface>
29755 -<interface name="corenet_dontaudit_sendrecv_ntske_server_packets" lineno="57938">
29756 +<interface name="corenet_dontaudit_sendrecv_ntske_server_packets" lineno="57956">
29757 <summary>
29758 Do not audit attempts to send and receive ntske_server packets.
29759 </summary>
29760 @@ -46314,7 +46398,7 @@ Domain to not audit.
29761 </param>
29762 <infoflow type="none"/>
29763 </interface>
29764 -<interface name="corenet_relabelto_ntske_server_packets" lineno="57953">
29765 +<interface name="corenet_relabelto_ntske_server_packets" lineno="57971">
29766 <summary>
29767 Relabel packets to ntske_server the packet type.
29768 </summary>
29769 @@ -46324,7 +46408,7 @@ Domain allowed access.
29770 </summary>
29771 </param>
29772 </interface>
29773 -<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="57975">
29774 +<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="57993">
29775 <summary>
29776 Send and receive TCP traffic on the oa_system port.
29777 </summary>
29778 @@ -46335,7 +46419,7 @@ Domain allowed access.
29779 </param>
29780 <infoflow type="both" weight="10"/>
29781 </interface>
29782 -<interface name="corenet_udp_send_oa_system_port" lineno="57990">
29783 +<interface name="corenet_udp_send_oa_system_port" lineno="58008">
29784 <summary>
29785 Send UDP traffic on the oa_system port.
29786 </summary>
29787 @@ -46346,7 +46430,7 @@ Domain allowed access.
29788 </param>
29789 <infoflow type="write" weight="10"/>
29790 </interface>
29791 -<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="58005">
29792 +<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="58023">
29793 <summary>
29794 Do not audit attempts to send UDP traffic on the oa_system port.
29795 </summary>
29796 @@ -46357,7 +46441,7 @@ Domain to not audit.
29797 </param>
29798 <infoflow type="none"/>
29799 </interface>
29800 -<interface name="corenet_udp_receive_oa_system_port" lineno="58020">
29801 +<interface name="corenet_udp_receive_oa_system_port" lineno="58038">
29802 <summary>
29803 Receive UDP traffic on the oa_system port.
29804 </summary>
29805 @@ -46368,7 +46452,7 @@ Domain allowed access.
29806 </param>
29807 <infoflow type="read" weight="10"/>
29808 </interface>
29809 -<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="58035">
29810 +<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="58053">
29811 <summary>
29812 Do not audit attempts to receive UDP traffic on the oa_system port.
29813 </summary>
29814 @@ -46379,7 +46463,7 @@ Domain to not audit.
29815 </param>
29816 <infoflow type="none"/>
29817 </interface>
29818 -<interface name="corenet_udp_sendrecv_oa_system_port" lineno="58050">
29819 +<interface name="corenet_udp_sendrecv_oa_system_port" lineno="58068">
29820 <summary>
29821 Send and receive UDP traffic on the oa_system port.
29822 </summary>
29823 @@ -46390,7 +46474,7 @@ Domain allowed access.
29824 </param>
29825 <infoflow type="both" weight="10"/>
29826 </interface>
29827 -<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="58066">
29828 +<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="58084">
29829 <summary>
29830 Do not audit attempts to send and receive
29831 UDP traffic on the oa_system port.
29832 @@ -46402,7 +46486,7 @@ Domain to not audit.
29833 </param>
29834 <infoflow type="none"/>
29835 </interface>
29836 -<interface name="corenet_tcp_bind_oa_system_port" lineno="58081">
29837 +<interface name="corenet_tcp_bind_oa_system_port" lineno="58099">
29838 <summary>
29839 Bind TCP sockets to the oa_system port.
29840 </summary>
29841 @@ -46413,7 +46497,7 @@ Domain allowed access.
29842 </param>
29843 <infoflow type="none"/>
29844 </interface>
29845 -<interface name="corenet_udp_bind_oa_system_port" lineno="58101">
29846 +<interface name="corenet_udp_bind_oa_system_port" lineno="58119">
29847 <summary>
29848 Bind UDP sockets to the oa_system port.
29849 </summary>
29850 @@ -46424,7 +46508,7 @@ Domain allowed access.
29851 </param>
29852 <infoflow type="none"/>
29853 </interface>
29854 -<interface name="corenet_tcp_connect_oa_system_port" lineno="58120">
29855 +<interface name="corenet_tcp_connect_oa_system_port" lineno="58138">
29856 <summary>
29857 Make a TCP connection to the oa_system port.
29858 </summary>
29859 @@ -46434,7 +46518,7 @@ Domain allowed access.
29860 </summary>
29861 </param>
29862 </interface>
29863 -<interface name="corenet_send_oa_system_client_packets" lineno="58140">
29864 +<interface name="corenet_send_oa_system_client_packets" lineno="58158">
29865 <summary>
29866 Send oa_system_client packets.
29867 </summary>
29868 @@ -46445,7 +46529,7 @@ Domain allowed access.
29869 </param>
29870 <infoflow type="write" weight="10"/>
29871 </interface>
29872 -<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="58159">
29873 +<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="58177">
29874 <summary>
29875 Do not audit attempts to send oa_system_client packets.
29876 </summary>
29877 @@ -46456,7 +46540,7 @@ Domain to not audit.
29878 </param>
29879 <infoflow type="none"/>
29880 </interface>
29881 -<interface name="corenet_receive_oa_system_client_packets" lineno="58178">
29882 +<interface name="corenet_receive_oa_system_client_packets" lineno="58196">
29883 <summary>
29884 Receive oa_system_client packets.
29885 </summary>
29886 @@ -46467,7 +46551,7 @@ Domain allowed access.
29887 </param>
29888 <infoflow type="read" weight="10"/>
29889 </interface>
29890 -<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="58197">
29891 +<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="58215">
29892 <summary>
29893 Do not audit attempts to receive oa_system_client packets.
29894 </summary>
29895 @@ -46478,7 +46562,7 @@ Domain allowed access.
29896 </param>
29897 <infoflow type="none"/>
29898 </interface>
29899 -<interface name="corenet_sendrecv_oa_system_client_packets" lineno="58216">
29900 +<interface name="corenet_sendrecv_oa_system_client_packets" lineno="58234">
29901 <summary>
29902 Send and receive oa_system_client packets.
29903 </summary>
29904 @@ -46489,7 +46573,7 @@ Domain allowed access.
29905 </param>
29906 <infoflow type="both" weight="10"/>
29907 </interface>
29908 -<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="58232">
29909 +<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="58250">
29910 <summary>
29911 Do not audit attempts to send and receive oa_system_client packets.
29912 </summary>
29913 @@ -46500,7 +46584,7 @@ Domain to not audit.
29914 </param>
29915 <infoflow type="none"/>
29916 </interface>
29917 -<interface name="corenet_relabelto_oa_system_client_packets" lineno="58247">
29918 +<interface name="corenet_relabelto_oa_system_client_packets" lineno="58265">
29919 <summary>
29920 Relabel packets to oa_system_client the packet type.
29921 </summary>
29922 @@ -46510,7 +46594,7 @@ Domain allowed access.
29923 </summary>
29924 </param>
29925 </interface>
29926 -<interface name="corenet_send_oa_system_server_packets" lineno="58267">
29927 +<interface name="corenet_send_oa_system_server_packets" lineno="58285">
29928 <summary>
29929 Send oa_system_server packets.
29930 </summary>
29931 @@ -46521,7 +46605,7 @@ Domain allowed access.
29932 </param>
29933 <infoflow type="write" weight="10"/>
29934 </interface>
29935 -<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="58286">
29936 +<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="58304">
29937 <summary>
29938 Do not audit attempts to send oa_system_server packets.
29939 </summary>
29940 @@ -46532,7 +46616,7 @@ Domain to not audit.
29941 </param>
29942 <infoflow type="none"/>
29943 </interface>
29944 -<interface name="corenet_receive_oa_system_server_packets" lineno="58305">
29945 +<interface name="corenet_receive_oa_system_server_packets" lineno="58323">
29946 <summary>
29947 Receive oa_system_server packets.
29948 </summary>
29949 @@ -46543,7 +46627,7 @@ Domain allowed access.
29950 </param>
29951 <infoflow type="read" weight="10"/>
29952 </interface>
29953 -<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="58324">
29954 +<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="58342">
29955 <summary>
29956 Do not audit attempts to receive oa_system_server packets.
29957 </summary>
29958 @@ -46554,7 +46638,7 @@ Domain allowed access.
29959 </param>
29960 <infoflow type="none"/>
29961 </interface>
29962 -<interface name="corenet_sendrecv_oa_system_server_packets" lineno="58343">
29963 +<interface name="corenet_sendrecv_oa_system_server_packets" lineno="58361">
29964 <summary>
29965 Send and receive oa_system_server packets.
29966 </summary>
29967 @@ -46565,7 +46649,7 @@ Domain allowed access.
29968 </param>
29969 <infoflow type="both" weight="10"/>
29970 </interface>
29971 -<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="58359">
29972 +<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="58377">
29973 <summary>
29974 Do not audit attempts to send and receive oa_system_server packets.
29975 </summary>
29976 @@ -46576,7 +46660,7 @@ Domain to not audit.
29977 </param>
29978 <infoflow type="none"/>
29979 </interface>
29980 -<interface name="corenet_relabelto_oa_system_server_packets" lineno="58374">
29981 +<interface name="corenet_relabelto_oa_system_server_packets" lineno="58392">
29982 <summary>
29983 Relabel packets to oa_system_server the packet type.
29984 </summary>
29985 @@ -46586,7 +46670,7 @@ Domain allowed access.
29986 </summary>
29987 </param>
29988 </interface>
29989 -<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="58396">
29990 +<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="58414">
29991 <summary>
29992 Send and receive TCP traffic on the oracledb port.
29993 </summary>
29994 @@ -46597,7 +46681,7 @@ Domain allowed access.
29995 </param>
29996 <infoflow type="both" weight="10"/>
29997 </interface>
29998 -<interface name="corenet_udp_send_oracledb_port" lineno="58411">
29999 +<interface name="corenet_udp_send_oracledb_port" lineno="58429">
30000 <summary>
30001 Send UDP traffic on the oracledb port.
30002 </summary>
30003 @@ -46608,7 +46692,7 @@ Domain allowed access.
30004 </param>
30005 <infoflow type="write" weight="10"/>
30006 </interface>
30007 -<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="58426">
30008 +<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="58444">
30009 <summary>
30010 Do not audit attempts to send UDP traffic on the oracledb port.
30011 </summary>
30012 @@ -46619,7 +46703,7 @@ Domain to not audit.
30013 </param>
30014 <infoflow type="none"/>
30015 </interface>
30016 -<interface name="corenet_udp_receive_oracledb_port" lineno="58441">
30017 +<interface name="corenet_udp_receive_oracledb_port" lineno="58459">
30018 <summary>
30019 Receive UDP traffic on the oracledb port.
30020 </summary>
30021 @@ -46630,7 +46714,7 @@ Domain allowed access.
30022 </param>
30023 <infoflow type="read" weight="10"/>
30024 </interface>
30025 -<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="58456">
30026 +<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="58474">
30027 <summary>
30028 Do not audit attempts to receive UDP traffic on the oracledb port.
30029 </summary>
30030 @@ -46641,7 +46725,7 @@ Domain to not audit.
30031 </param>
30032 <infoflow type="none"/>
30033 </interface>
30034 -<interface name="corenet_udp_sendrecv_oracledb_port" lineno="58471">
30035 +<interface name="corenet_udp_sendrecv_oracledb_port" lineno="58489">
30036 <summary>
30037 Send and receive UDP traffic on the oracledb port.
30038 </summary>
30039 @@ -46652,7 +46736,7 @@ Domain allowed access.
30040 </param>
30041 <infoflow type="both" weight="10"/>
30042 </interface>
30043 -<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="58487">
30044 +<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="58505">
30045 <summary>
30046 Do not audit attempts to send and receive
30047 UDP traffic on the oracledb port.
30048 @@ -46664,7 +46748,7 @@ Domain to not audit.
30049 </param>
30050 <infoflow type="none"/>
30051 </interface>
30052 -<interface name="corenet_tcp_bind_oracledb_port" lineno="58502">
30053 +<interface name="corenet_tcp_bind_oracledb_port" lineno="58520">
30054 <summary>
30055 Bind TCP sockets to the oracledb port.
30056 </summary>
30057 @@ -46675,7 +46759,7 @@ Domain allowed access.
30058 </param>
30059 <infoflow type="none"/>
30060 </interface>
30061 -<interface name="corenet_udp_bind_oracledb_port" lineno="58522">
30062 +<interface name="corenet_udp_bind_oracledb_port" lineno="58540">
30063 <summary>
30064 Bind UDP sockets to the oracledb port.
30065 </summary>
30066 @@ -46686,7 +46770,7 @@ Domain allowed access.
30067 </param>
30068 <infoflow type="none"/>
30069 </interface>
30070 -<interface name="corenet_tcp_connect_oracledb_port" lineno="58541">
30071 +<interface name="corenet_tcp_connect_oracledb_port" lineno="58559">
30072 <summary>
30073 Make a TCP connection to the oracledb port.
30074 </summary>
30075 @@ -46696,7 +46780,7 @@ Domain allowed access.
30076 </summary>
30077 </param>
30078 </interface>
30079 -<interface name="corenet_send_oracledb_client_packets" lineno="58561">
30080 +<interface name="corenet_send_oracledb_client_packets" lineno="58579">
30081 <summary>
30082 Send oracledb_client packets.
30083 </summary>
30084 @@ -46707,7 +46791,7 @@ Domain allowed access.
30085 </param>
30086 <infoflow type="write" weight="10"/>
30087 </interface>
30088 -<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="58580">
30089 +<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="58598">
30090 <summary>
30091 Do not audit attempts to send oracledb_client packets.
30092 </summary>
30093 @@ -46718,7 +46802,7 @@ Domain to not audit.
30094 </param>
30095 <infoflow type="none"/>
30096 </interface>
30097 -<interface name="corenet_receive_oracledb_client_packets" lineno="58599">
30098 +<interface name="corenet_receive_oracledb_client_packets" lineno="58617">
30099 <summary>
30100 Receive oracledb_client packets.
30101 </summary>
30102 @@ -46729,7 +46813,7 @@ Domain allowed access.
30103 </param>
30104 <infoflow type="read" weight="10"/>
30105 </interface>
30106 -<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="58618">
30107 +<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="58636">
30108 <summary>
30109 Do not audit attempts to receive oracledb_client packets.
30110 </summary>
30111 @@ -46740,7 +46824,7 @@ Domain allowed access.
30112 </param>
30113 <infoflow type="none"/>
30114 </interface>
30115 -<interface name="corenet_sendrecv_oracledb_client_packets" lineno="58637">
30116 +<interface name="corenet_sendrecv_oracledb_client_packets" lineno="58655">
30117 <summary>
30118 Send and receive oracledb_client packets.
30119 </summary>
30120 @@ -46751,7 +46835,7 @@ Domain allowed access.
30121 </param>
30122 <infoflow type="both" weight="10"/>
30123 </interface>
30124 -<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="58653">
30125 +<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="58671">
30126 <summary>
30127 Do not audit attempts to send and receive oracledb_client packets.
30128 </summary>
30129 @@ -46762,7 +46846,7 @@ Domain to not audit.
30130 </param>
30131 <infoflow type="none"/>
30132 </interface>
30133 -<interface name="corenet_relabelto_oracledb_client_packets" lineno="58668">
30134 +<interface name="corenet_relabelto_oracledb_client_packets" lineno="58686">
30135 <summary>
30136 Relabel packets to oracledb_client the packet type.
30137 </summary>
30138 @@ -46772,7 +46856,7 @@ Domain allowed access.
30139 </summary>
30140 </param>
30141 </interface>
30142 -<interface name="corenet_send_oracledb_server_packets" lineno="58688">
30143 +<interface name="corenet_send_oracledb_server_packets" lineno="58706">
30144 <summary>
30145 Send oracledb_server packets.
30146 </summary>
30147 @@ -46783,7 +46867,7 @@ Domain allowed access.
30148 </param>
30149 <infoflow type="write" weight="10"/>
30150 </interface>
30151 -<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="58707">
30152 +<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="58725">
30153 <summary>
30154 Do not audit attempts to send oracledb_server packets.
30155 </summary>
30156 @@ -46794,7 +46878,7 @@ Domain to not audit.
30157 </param>
30158 <infoflow type="none"/>
30159 </interface>
30160 -<interface name="corenet_receive_oracledb_server_packets" lineno="58726">
30161 +<interface name="corenet_receive_oracledb_server_packets" lineno="58744">
30162 <summary>
30163 Receive oracledb_server packets.
30164 </summary>
30165 @@ -46805,7 +46889,7 @@ Domain allowed access.
30166 </param>
30167 <infoflow type="read" weight="10"/>
30168 </interface>
30169 -<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="58745">
30170 +<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="58763">
30171 <summary>
30172 Do not audit attempts to receive oracledb_server packets.
30173 </summary>
30174 @@ -46816,7 +46900,7 @@ Domain allowed access.
30175 </param>
30176 <infoflow type="none"/>
30177 </interface>
30178 -<interface name="corenet_sendrecv_oracledb_server_packets" lineno="58764">
30179 +<interface name="corenet_sendrecv_oracledb_server_packets" lineno="58782">
30180 <summary>
30181 Send and receive oracledb_server packets.
30182 </summary>
30183 @@ -46827,7 +46911,7 @@ Domain allowed access.
30184 </param>
30185 <infoflow type="both" weight="10"/>
30186 </interface>
30187 -<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="58780">
30188 +<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="58798">
30189 <summary>
30190 Do not audit attempts to send and receive oracledb_server packets.
30191 </summary>
30192 @@ -46838,7 +46922,7 @@ Domain to not audit.
30193 </param>
30194 <infoflow type="none"/>
30195 </interface>
30196 -<interface name="corenet_relabelto_oracledb_server_packets" lineno="58795">
30197 +<interface name="corenet_relabelto_oracledb_server_packets" lineno="58813">
30198 <summary>
30199 Relabel packets to oracledb_server the packet type.
30200 </summary>
30201 @@ -46848,7 +46932,7 @@ Domain allowed access.
30202 </summary>
30203 </param>
30204 </interface>
30205 -<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="58817">
30206 +<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="58835">
30207 <summary>
30208 Send and receive TCP traffic on the ocsp port.
30209 </summary>
30210 @@ -46859,7 +46943,7 @@ Domain allowed access.
30211 </param>
30212 <infoflow type="both" weight="10"/>
30213 </interface>
30214 -<interface name="corenet_udp_send_ocsp_port" lineno="58832">
30215 +<interface name="corenet_udp_send_ocsp_port" lineno="58850">
30216 <summary>
30217 Send UDP traffic on the ocsp port.
30218 </summary>
30219 @@ -46870,7 +46954,7 @@ Domain allowed access.
30220 </param>
30221 <infoflow type="write" weight="10"/>
30222 </interface>
30223 -<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="58847">
30224 +<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="58865">
30225 <summary>
30226 Do not audit attempts to send UDP traffic on the ocsp port.
30227 </summary>
30228 @@ -46881,7 +46965,7 @@ Domain to not audit.
30229 </param>
30230 <infoflow type="none"/>
30231 </interface>
30232 -<interface name="corenet_udp_receive_ocsp_port" lineno="58862">
30233 +<interface name="corenet_udp_receive_ocsp_port" lineno="58880">
30234 <summary>
30235 Receive UDP traffic on the ocsp port.
30236 </summary>
30237 @@ -46892,7 +46976,7 @@ Domain allowed access.
30238 </param>
30239 <infoflow type="read" weight="10"/>
30240 </interface>
30241 -<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="58877">
30242 +<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="58895">
30243 <summary>
30244 Do not audit attempts to receive UDP traffic on the ocsp port.
30245 </summary>
30246 @@ -46903,7 +46987,7 @@ Domain to not audit.
30247 </param>
30248 <infoflow type="none"/>
30249 </interface>
30250 -<interface name="corenet_udp_sendrecv_ocsp_port" lineno="58892">
30251 +<interface name="corenet_udp_sendrecv_ocsp_port" lineno="58910">
30252 <summary>
30253 Send and receive UDP traffic on the ocsp port.
30254 </summary>
30255 @@ -46914,7 +46998,7 @@ Domain allowed access.
30256 </param>
30257 <infoflow type="both" weight="10"/>
30258 </interface>
30259 -<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="58908">
30260 +<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="58926">
30261 <summary>
30262 Do not audit attempts to send and receive
30263 UDP traffic on the ocsp port.
30264 @@ -46926,7 +47010,7 @@ Domain to not audit.
30265 </param>
30266 <infoflow type="none"/>
30267 </interface>
30268 -<interface name="corenet_tcp_bind_ocsp_port" lineno="58923">
30269 +<interface name="corenet_tcp_bind_ocsp_port" lineno="58941">
30270 <summary>
30271 Bind TCP sockets to the ocsp port.
30272 </summary>
30273 @@ -46937,7 +47021,7 @@ Domain allowed access.
30274 </param>
30275 <infoflow type="none"/>
30276 </interface>
30277 -<interface name="corenet_udp_bind_ocsp_port" lineno="58943">
30278 +<interface name="corenet_udp_bind_ocsp_port" lineno="58961">
30279 <summary>
30280 Bind UDP sockets to the ocsp port.
30281 </summary>
30282 @@ -46948,7 +47032,7 @@ Domain allowed access.
30283 </param>
30284 <infoflow type="none"/>
30285 </interface>
30286 -<interface name="corenet_tcp_connect_ocsp_port" lineno="58962">
30287 +<interface name="corenet_tcp_connect_ocsp_port" lineno="58980">
30288 <summary>
30289 Make a TCP connection to the ocsp port.
30290 </summary>
30291 @@ -46958,7 +47042,7 @@ Domain allowed access.
30292 </summary>
30293 </param>
30294 </interface>
30295 -<interface name="corenet_send_ocsp_client_packets" lineno="58982">
30296 +<interface name="corenet_send_ocsp_client_packets" lineno="59000">
30297 <summary>
30298 Send ocsp_client packets.
30299 </summary>
30300 @@ -46969,7 +47053,7 @@ Domain allowed access.
30301 </param>
30302 <infoflow type="write" weight="10"/>
30303 </interface>
30304 -<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="59001">
30305 +<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="59019">
30306 <summary>
30307 Do not audit attempts to send ocsp_client packets.
30308 </summary>
30309 @@ -46980,7 +47064,7 @@ Domain to not audit.
30310 </param>
30311 <infoflow type="none"/>
30312 </interface>
30313 -<interface name="corenet_receive_ocsp_client_packets" lineno="59020">
30314 +<interface name="corenet_receive_ocsp_client_packets" lineno="59038">
30315 <summary>
30316 Receive ocsp_client packets.
30317 </summary>
30318 @@ -46991,7 +47075,7 @@ Domain allowed access.
30319 </param>
30320 <infoflow type="read" weight="10"/>
30321 </interface>
30322 -<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="59039">
30323 +<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="59057">
30324 <summary>
30325 Do not audit attempts to receive ocsp_client packets.
30326 </summary>
30327 @@ -47002,7 +47086,7 @@ Domain allowed access.
30328 </param>
30329 <infoflow type="none"/>
30330 </interface>
30331 -<interface name="corenet_sendrecv_ocsp_client_packets" lineno="59058">
30332 +<interface name="corenet_sendrecv_ocsp_client_packets" lineno="59076">
30333 <summary>
30334 Send and receive ocsp_client packets.
30335 </summary>
30336 @@ -47013,7 +47097,7 @@ Domain allowed access.
30337 </param>
30338 <infoflow type="both" weight="10"/>
30339 </interface>
30340 -<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="59074">
30341 +<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="59092">
30342 <summary>
30343 Do not audit attempts to send and receive ocsp_client packets.
30344 </summary>
30345 @@ -47024,7 +47108,7 @@ Domain to not audit.
30346 </param>
30347 <infoflow type="none"/>
30348 </interface>
30349 -<interface name="corenet_relabelto_ocsp_client_packets" lineno="59089">
30350 +<interface name="corenet_relabelto_ocsp_client_packets" lineno="59107">
30351 <summary>
30352 Relabel packets to ocsp_client the packet type.
30353 </summary>
30354 @@ -47034,7 +47118,7 @@ Domain allowed access.
30355 </summary>
30356 </param>
30357 </interface>
30358 -<interface name="corenet_send_ocsp_server_packets" lineno="59109">
30359 +<interface name="corenet_send_ocsp_server_packets" lineno="59127">
30360 <summary>
30361 Send ocsp_server packets.
30362 </summary>
30363 @@ -47045,7 +47129,7 @@ Domain allowed access.
30364 </param>
30365 <infoflow type="write" weight="10"/>
30366 </interface>
30367 -<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="59128">
30368 +<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="59146">
30369 <summary>
30370 Do not audit attempts to send ocsp_server packets.
30371 </summary>
30372 @@ -47056,7 +47140,7 @@ Domain to not audit.
30373 </param>
30374 <infoflow type="none"/>
30375 </interface>
30376 -<interface name="corenet_receive_ocsp_server_packets" lineno="59147">
30377 +<interface name="corenet_receive_ocsp_server_packets" lineno="59165">
30378 <summary>
30379 Receive ocsp_server packets.
30380 </summary>
30381 @@ -47067,7 +47151,7 @@ Domain allowed access.
30382 </param>
30383 <infoflow type="read" weight="10"/>
30384 </interface>
30385 -<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="59166">
30386 +<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="59184">
30387 <summary>
30388 Do not audit attempts to receive ocsp_server packets.
30389 </summary>
30390 @@ -47078,7 +47162,7 @@ Domain allowed access.
30391 </param>
30392 <infoflow type="none"/>
30393 </interface>
30394 -<interface name="corenet_sendrecv_ocsp_server_packets" lineno="59185">
30395 +<interface name="corenet_sendrecv_ocsp_server_packets" lineno="59203">
30396 <summary>
30397 Send and receive ocsp_server packets.
30398 </summary>
30399 @@ -47089,7 +47173,7 @@ Domain allowed access.
30400 </param>
30401 <infoflow type="both" weight="10"/>
30402 </interface>
30403 -<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="59201">
30404 +<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="59219">
30405 <summary>
30406 Do not audit attempts to send and receive ocsp_server packets.
30407 </summary>
30408 @@ -47100,7 +47184,7 @@ Domain to not audit.
30409 </param>
30410 <infoflow type="none"/>
30411 </interface>
30412 -<interface name="corenet_relabelto_ocsp_server_packets" lineno="59216">
30413 +<interface name="corenet_relabelto_ocsp_server_packets" lineno="59234">
30414 <summary>
30415 Relabel packets to ocsp_server the packet type.
30416 </summary>
30417 @@ -47110,7 +47194,7 @@ Domain allowed access.
30418 </summary>
30419 </param>
30420 </interface>
30421 -<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="59238">
30422 +<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="59256">
30423 <summary>
30424 Send and receive TCP traffic on the openhpid port.
30425 </summary>
30426 @@ -47121,7 +47205,7 @@ Domain allowed access.
30427 </param>
30428 <infoflow type="both" weight="10"/>
30429 </interface>
30430 -<interface name="corenet_udp_send_openhpid_port" lineno="59253">
30431 +<interface name="corenet_udp_send_openhpid_port" lineno="59271">
30432 <summary>
30433 Send UDP traffic on the openhpid port.
30434 </summary>
30435 @@ -47132,7 +47216,7 @@ Domain allowed access.
30436 </param>
30437 <infoflow type="write" weight="10"/>
30438 </interface>
30439 -<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="59268">
30440 +<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="59286">
30441 <summary>
30442 Do not audit attempts to send UDP traffic on the openhpid port.
30443 </summary>
30444 @@ -47143,7 +47227,7 @@ Domain to not audit.
30445 </param>
30446 <infoflow type="none"/>
30447 </interface>
30448 -<interface name="corenet_udp_receive_openhpid_port" lineno="59283">
30449 +<interface name="corenet_udp_receive_openhpid_port" lineno="59301">
30450 <summary>
30451 Receive UDP traffic on the openhpid port.
30452 </summary>
30453 @@ -47154,7 +47238,7 @@ Domain allowed access.
30454 </param>
30455 <infoflow type="read" weight="10"/>
30456 </interface>
30457 -<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="59298">
30458 +<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="59316">
30459 <summary>
30460 Do not audit attempts to receive UDP traffic on the openhpid port.
30461 </summary>
30462 @@ -47165,7 +47249,7 @@ Domain to not audit.
30463 </param>
30464 <infoflow type="none"/>
30465 </interface>
30466 -<interface name="corenet_udp_sendrecv_openhpid_port" lineno="59313">
30467 +<interface name="corenet_udp_sendrecv_openhpid_port" lineno="59331">
30468 <summary>
30469 Send and receive UDP traffic on the openhpid port.
30470 </summary>
30471 @@ -47176,7 +47260,7 @@ Domain allowed access.
30472 </param>
30473 <infoflow type="both" weight="10"/>
30474 </interface>
30475 -<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="59329">
30476 +<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="59347">
30477 <summary>
30478 Do not audit attempts to send and receive
30479 UDP traffic on the openhpid port.
30480 @@ -47188,7 +47272,7 @@ Domain to not audit.
30481 </param>
30482 <infoflow type="none"/>
30483 </interface>
30484 -<interface name="corenet_tcp_bind_openhpid_port" lineno="59344">
30485 +<interface name="corenet_tcp_bind_openhpid_port" lineno="59362">
30486 <summary>
30487 Bind TCP sockets to the openhpid port.
30488 </summary>
30489 @@ -47199,7 +47283,7 @@ Domain allowed access.
30490 </param>
30491 <infoflow type="none"/>
30492 </interface>
30493 -<interface name="corenet_udp_bind_openhpid_port" lineno="59364">
30494 +<interface name="corenet_udp_bind_openhpid_port" lineno="59382">
30495 <summary>
30496 Bind UDP sockets to the openhpid port.
30497 </summary>
30498 @@ -47210,7 +47294,7 @@ Domain allowed access.
30499 </param>
30500 <infoflow type="none"/>
30501 </interface>
30502 -<interface name="corenet_tcp_connect_openhpid_port" lineno="59383">
30503 +<interface name="corenet_tcp_connect_openhpid_port" lineno="59401">
30504 <summary>
30505 Make a TCP connection to the openhpid port.
30506 </summary>
30507 @@ -47220,7 +47304,7 @@ Domain allowed access.
30508 </summary>
30509 </param>
30510 </interface>
30511 -<interface name="corenet_send_openhpid_client_packets" lineno="59403">
30512 +<interface name="corenet_send_openhpid_client_packets" lineno="59421">
30513 <summary>
30514 Send openhpid_client packets.
30515 </summary>
30516 @@ -47231,7 +47315,7 @@ Domain allowed access.
30517 </param>
30518 <infoflow type="write" weight="10"/>
30519 </interface>
30520 -<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="59422">
30521 +<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="59440">
30522 <summary>
30523 Do not audit attempts to send openhpid_client packets.
30524 </summary>
30525 @@ -47242,7 +47326,7 @@ Domain to not audit.
30526 </param>
30527 <infoflow type="none"/>
30528 </interface>
30529 -<interface name="corenet_receive_openhpid_client_packets" lineno="59441">
30530 +<interface name="corenet_receive_openhpid_client_packets" lineno="59459">
30531 <summary>
30532 Receive openhpid_client packets.
30533 </summary>
30534 @@ -47253,7 +47337,7 @@ Domain allowed access.
30535 </param>
30536 <infoflow type="read" weight="10"/>
30537 </interface>
30538 -<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="59460">
30539 +<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="59478">
30540 <summary>
30541 Do not audit attempts to receive openhpid_client packets.
30542 </summary>
30543 @@ -47264,7 +47348,7 @@ Domain allowed access.
30544 </param>
30545 <infoflow type="none"/>
30546 </interface>
30547 -<interface name="corenet_sendrecv_openhpid_client_packets" lineno="59479">
30548 +<interface name="corenet_sendrecv_openhpid_client_packets" lineno="59497">
30549 <summary>
30550 Send and receive openhpid_client packets.
30551 </summary>
30552 @@ -47275,7 +47359,7 @@ Domain allowed access.
30553 </param>
30554 <infoflow type="both" weight="10"/>
30555 </interface>
30556 -<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="59495">
30557 +<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="59513">
30558 <summary>
30559 Do not audit attempts to send and receive openhpid_client packets.
30560 </summary>
30561 @@ -47286,7 +47370,7 @@ Domain to not audit.
30562 </param>
30563 <infoflow type="none"/>
30564 </interface>
30565 -<interface name="corenet_relabelto_openhpid_client_packets" lineno="59510">
30566 +<interface name="corenet_relabelto_openhpid_client_packets" lineno="59528">
30567 <summary>
30568 Relabel packets to openhpid_client the packet type.
30569 </summary>
30570 @@ -47296,7 +47380,7 @@ Domain allowed access.
30571 </summary>
30572 </param>
30573 </interface>
30574 -<interface name="corenet_send_openhpid_server_packets" lineno="59530">
30575 +<interface name="corenet_send_openhpid_server_packets" lineno="59548">
30576 <summary>
30577 Send openhpid_server packets.
30578 </summary>
30579 @@ -47307,7 +47391,7 @@ Domain allowed access.
30580 </param>
30581 <infoflow type="write" weight="10"/>
30582 </interface>
30583 -<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="59549">
30584 +<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="59567">
30585 <summary>
30586 Do not audit attempts to send openhpid_server packets.
30587 </summary>
30588 @@ -47318,7 +47402,7 @@ Domain to not audit.
30589 </param>
30590 <infoflow type="none"/>
30591 </interface>
30592 -<interface name="corenet_receive_openhpid_server_packets" lineno="59568">
30593 +<interface name="corenet_receive_openhpid_server_packets" lineno="59586">
30594 <summary>
30595 Receive openhpid_server packets.
30596 </summary>
30597 @@ -47329,7 +47413,7 @@ Domain allowed access.
30598 </param>
30599 <infoflow type="read" weight="10"/>
30600 </interface>
30601 -<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="59587">
30602 +<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="59605">
30603 <summary>
30604 Do not audit attempts to receive openhpid_server packets.
30605 </summary>
30606 @@ -47340,7 +47424,7 @@ Domain allowed access.
30607 </param>
30608 <infoflow type="none"/>
30609 </interface>
30610 -<interface name="corenet_sendrecv_openhpid_server_packets" lineno="59606">
30611 +<interface name="corenet_sendrecv_openhpid_server_packets" lineno="59624">
30612 <summary>
30613 Send and receive openhpid_server packets.
30614 </summary>
30615 @@ -47351,7 +47435,7 @@ Domain allowed access.
30616 </param>
30617 <infoflow type="both" weight="10"/>
30618 </interface>
30619 -<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="59622">
30620 +<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="59640">
30621 <summary>
30622 Do not audit attempts to send and receive openhpid_server packets.
30623 </summary>
30624 @@ -47362,7 +47446,7 @@ Domain to not audit.
30625 </param>
30626 <infoflow type="none"/>
30627 </interface>
30628 -<interface name="corenet_relabelto_openhpid_server_packets" lineno="59637">
30629 +<interface name="corenet_relabelto_openhpid_server_packets" lineno="59655">
30630 <summary>
30631 Relabel packets to openhpid_server the packet type.
30632 </summary>
30633 @@ -47372,7 +47456,7 @@ Domain allowed access.
30634 </summary>
30635 </param>
30636 </interface>
30637 -<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="59659">
30638 +<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="59677">
30639 <summary>
30640 Send and receive TCP traffic on the openvpn port.
30641 </summary>
30642 @@ -47383,7 +47467,7 @@ Domain allowed access.
30643 </param>
30644 <infoflow type="both" weight="10"/>
30645 </interface>
30646 -<interface name="corenet_udp_send_openvpn_port" lineno="59674">
30647 +<interface name="corenet_udp_send_openvpn_port" lineno="59692">
30648 <summary>
30649 Send UDP traffic on the openvpn port.
30650 </summary>
30651 @@ -47394,7 +47478,7 @@ Domain allowed access.
30652 </param>
30653 <infoflow type="write" weight="10"/>
30654 </interface>
30655 -<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="59689">
30656 +<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="59707">
30657 <summary>
30658 Do not audit attempts to send UDP traffic on the openvpn port.
30659 </summary>
30660 @@ -47405,7 +47489,7 @@ Domain to not audit.
30661 </param>
30662 <infoflow type="none"/>
30663 </interface>
30664 -<interface name="corenet_udp_receive_openvpn_port" lineno="59704">
30665 +<interface name="corenet_udp_receive_openvpn_port" lineno="59722">
30666 <summary>
30667 Receive UDP traffic on the openvpn port.
30668 </summary>
30669 @@ -47416,7 +47500,7 @@ Domain allowed access.
30670 </param>
30671 <infoflow type="read" weight="10"/>
30672 </interface>
30673 -<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="59719">
30674 +<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="59737">
30675 <summary>
30676 Do not audit attempts to receive UDP traffic on the openvpn port.
30677 </summary>
30678 @@ -47427,7 +47511,7 @@ Domain to not audit.
30679 </param>
30680 <infoflow type="none"/>
30681 </interface>
30682 -<interface name="corenet_udp_sendrecv_openvpn_port" lineno="59734">
30683 +<interface name="corenet_udp_sendrecv_openvpn_port" lineno="59752">
30684 <summary>
30685 Send and receive UDP traffic on the openvpn port.
30686 </summary>
30687 @@ -47438,7 +47522,7 @@ Domain allowed access.
30688 </param>
30689 <infoflow type="both" weight="10"/>
30690 </interface>
30691 -<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="59750">
30692 +<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="59768">
30693 <summary>
30694 Do not audit attempts to send and receive
30695 UDP traffic on the openvpn port.
30696 @@ -47450,7 +47534,7 @@ Domain to not audit.
30697 </param>
30698 <infoflow type="none"/>
30699 </interface>
30700 -<interface name="corenet_tcp_bind_openvpn_port" lineno="59765">
30701 +<interface name="corenet_tcp_bind_openvpn_port" lineno="59783">
30702 <summary>
30703 Bind TCP sockets to the openvpn port.
30704 </summary>
30705 @@ -47461,7 +47545,7 @@ Domain allowed access.
30706 </param>
30707 <infoflow type="none"/>
30708 </interface>
30709 -<interface name="corenet_udp_bind_openvpn_port" lineno="59785">
30710 +<interface name="corenet_udp_bind_openvpn_port" lineno="59803">
30711 <summary>
30712 Bind UDP sockets to the openvpn port.
30713 </summary>
30714 @@ -47472,7 +47556,7 @@ Domain allowed access.
30715 </param>
30716 <infoflow type="none"/>
30717 </interface>
30718 -<interface name="corenet_tcp_connect_openvpn_port" lineno="59804">
30719 +<interface name="corenet_tcp_connect_openvpn_port" lineno="59822">
30720 <summary>
30721 Make a TCP connection to the openvpn port.
30722 </summary>
30723 @@ -47482,7 +47566,7 @@ Domain allowed access.
30724 </summary>
30725 </param>
30726 </interface>
30727 -<interface name="corenet_send_openvpn_client_packets" lineno="59824">
30728 +<interface name="corenet_send_openvpn_client_packets" lineno="59842">
30729 <summary>
30730 Send openvpn_client packets.
30731 </summary>
30732 @@ -47493,7 +47577,7 @@ Domain allowed access.
30733 </param>
30734 <infoflow type="write" weight="10"/>
30735 </interface>
30736 -<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="59843">
30737 +<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="59861">
30738 <summary>
30739 Do not audit attempts to send openvpn_client packets.
30740 </summary>
30741 @@ -47504,7 +47588,7 @@ Domain to not audit.
30742 </param>
30743 <infoflow type="none"/>
30744 </interface>
30745 -<interface name="corenet_receive_openvpn_client_packets" lineno="59862">
30746 +<interface name="corenet_receive_openvpn_client_packets" lineno="59880">
30747 <summary>
30748 Receive openvpn_client packets.
30749 </summary>
30750 @@ -47515,7 +47599,7 @@ Domain allowed access.
30751 </param>
30752 <infoflow type="read" weight="10"/>
30753 </interface>
30754 -<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="59881">
30755 +<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="59899">
30756 <summary>
30757 Do not audit attempts to receive openvpn_client packets.
30758 </summary>
30759 @@ -47526,7 +47610,7 @@ Domain allowed access.
30760 </param>
30761 <infoflow type="none"/>
30762 </interface>
30763 -<interface name="corenet_sendrecv_openvpn_client_packets" lineno="59900">
30764 +<interface name="corenet_sendrecv_openvpn_client_packets" lineno="59918">
30765 <summary>
30766 Send and receive openvpn_client packets.
30767 </summary>
30768 @@ -47537,7 +47621,7 @@ Domain allowed access.
30769 </param>
30770 <infoflow type="both" weight="10"/>
30771 </interface>
30772 -<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="59916">
30773 +<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="59934">
30774 <summary>
30775 Do not audit attempts to send and receive openvpn_client packets.
30776 </summary>
30777 @@ -47548,7 +47632,7 @@ Domain to not audit.
30778 </param>
30779 <infoflow type="none"/>
30780 </interface>
30781 -<interface name="corenet_relabelto_openvpn_client_packets" lineno="59931">
30782 +<interface name="corenet_relabelto_openvpn_client_packets" lineno="59949">
30783 <summary>
30784 Relabel packets to openvpn_client the packet type.
30785 </summary>
30786 @@ -47558,7 +47642,7 @@ Domain allowed access.
30787 </summary>
30788 </param>
30789 </interface>
30790 -<interface name="corenet_send_openvpn_server_packets" lineno="59951">
30791 +<interface name="corenet_send_openvpn_server_packets" lineno="59969">
30792 <summary>
30793 Send openvpn_server packets.
30794 </summary>
30795 @@ -47569,7 +47653,7 @@ Domain allowed access.
30796 </param>
30797 <infoflow type="write" weight="10"/>
30798 </interface>
30799 -<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="59970">
30800 +<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="59988">
30801 <summary>
30802 Do not audit attempts to send openvpn_server packets.
30803 </summary>
30804 @@ -47580,7 +47664,7 @@ Domain to not audit.
30805 </param>
30806 <infoflow type="none"/>
30807 </interface>
30808 -<interface name="corenet_receive_openvpn_server_packets" lineno="59989">
30809 +<interface name="corenet_receive_openvpn_server_packets" lineno="60007">
30810 <summary>
30811 Receive openvpn_server packets.
30812 </summary>
30813 @@ -47591,7 +47675,7 @@ Domain allowed access.
30814 </param>
30815 <infoflow type="read" weight="10"/>
30816 </interface>
30817 -<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="60008">
30818 +<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="60026">
30819 <summary>
30820 Do not audit attempts to receive openvpn_server packets.
30821 </summary>
30822 @@ -47602,7 +47686,7 @@ Domain allowed access.
30823 </param>
30824 <infoflow type="none"/>
30825 </interface>
30826 -<interface name="corenet_sendrecv_openvpn_server_packets" lineno="60027">
30827 +<interface name="corenet_sendrecv_openvpn_server_packets" lineno="60045">
30828 <summary>
30829 Send and receive openvpn_server packets.
30830 </summary>
30831 @@ -47613,7 +47697,7 @@ Domain allowed access.
30832 </param>
30833 <infoflow type="both" weight="10"/>
30834 </interface>
30835 -<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="60043">
30836 +<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="60061">
30837 <summary>
30838 Do not audit attempts to send and receive openvpn_server packets.
30839 </summary>
30840 @@ -47624,7 +47708,7 @@ Domain to not audit.
30841 </param>
30842 <infoflow type="none"/>
30843 </interface>
30844 -<interface name="corenet_relabelto_openvpn_server_packets" lineno="60058">
30845 +<interface name="corenet_relabelto_openvpn_server_packets" lineno="60076">
30846 <summary>
30847 Relabel packets to openvpn_server the packet type.
30848 </summary>
30849 @@ -47634,7 +47718,7 @@ Domain allowed access.
30850 </summary>
30851 </param>
30852 </interface>
30853 -<interface name="corenet_tcp_sendrecv_pdps_port" lineno="60080">
30854 +<interface name="corenet_tcp_sendrecv_pdps_port" lineno="60098">
30855 <summary>
30856 Send and receive TCP traffic on the pdps port.
30857 </summary>
30858 @@ -47645,7 +47729,7 @@ Domain allowed access.
30859 </param>
30860 <infoflow type="both" weight="10"/>
30861 </interface>
30862 -<interface name="corenet_udp_send_pdps_port" lineno="60095">
30863 +<interface name="corenet_udp_send_pdps_port" lineno="60113">
30864 <summary>
30865 Send UDP traffic on the pdps port.
30866 </summary>
30867 @@ -47656,7 +47740,7 @@ Domain allowed access.
30868 </param>
30869 <infoflow type="write" weight="10"/>
30870 </interface>
30871 -<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="60110">
30872 +<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="60128">
30873 <summary>
30874 Do not audit attempts to send UDP traffic on the pdps port.
30875 </summary>
30876 @@ -47667,7 +47751,7 @@ Domain to not audit.
30877 </param>
30878 <infoflow type="none"/>
30879 </interface>
30880 -<interface name="corenet_udp_receive_pdps_port" lineno="60125">
30881 +<interface name="corenet_udp_receive_pdps_port" lineno="60143">
30882 <summary>
30883 Receive UDP traffic on the pdps port.
30884 </summary>
30885 @@ -47678,7 +47762,7 @@ Domain allowed access.
30886 </param>
30887 <infoflow type="read" weight="10"/>
30888 </interface>
30889 -<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="60140">
30890 +<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="60158">
30891 <summary>
30892 Do not audit attempts to receive UDP traffic on the pdps port.
30893 </summary>
30894 @@ -47689,7 +47773,7 @@ Domain to not audit.
30895 </param>
30896 <infoflow type="none"/>
30897 </interface>
30898 -<interface name="corenet_udp_sendrecv_pdps_port" lineno="60155">
30899 +<interface name="corenet_udp_sendrecv_pdps_port" lineno="60173">
30900 <summary>
30901 Send and receive UDP traffic on the pdps port.
30902 </summary>
30903 @@ -47700,7 +47784,7 @@ Domain allowed access.
30904 </param>
30905 <infoflow type="both" weight="10"/>
30906 </interface>
30907 -<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="60171">
30908 +<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="60189">
30909 <summary>
30910 Do not audit attempts to send and receive
30911 UDP traffic on the pdps port.
30912 @@ -47712,7 +47796,7 @@ Domain to not audit.
30913 </param>
30914 <infoflow type="none"/>
30915 </interface>
30916 -<interface name="corenet_tcp_bind_pdps_port" lineno="60186">
30917 +<interface name="corenet_tcp_bind_pdps_port" lineno="60204">
30918 <summary>
30919 Bind TCP sockets to the pdps port.
30920 </summary>
30921 @@ -47723,7 +47807,7 @@ Domain allowed access.
30922 </param>
30923 <infoflow type="none"/>
30924 </interface>
30925 -<interface name="corenet_udp_bind_pdps_port" lineno="60206">
30926 +<interface name="corenet_udp_bind_pdps_port" lineno="60224">
30927 <summary>
30928 Bind UDP sockets to the pdps port.
30929 </summary>
30930 @@ -47734,7 +47818,7 @@ Domain allowed access.
30931 </param>
30932 <infoflow type="none"/>
30933 </interface>
30934 -<interface name="corenet_tcp_connect_pdps_port" lineno="60225">
30935 +<interface name="corenet_tcp_connect_pdps_port" lineno="60243">
30936 <summary>
30937 Make a TCP connection to the pdps port.
30938 </summary>
30939 @@ -47744,7 +47828,7 @@ Domain allowed access.
30940 </summary>
30941 </param>
30942 </interface>
30943 -<interface name="corenet_send_pdps_client_packets" lineno="60245">
30944 +<interface name="corenet_send_pdps_client_packets" lineno="60263">
30945 <summary>
30946 Send pdps_client packets.
30947 </summary>
30948 @@ -47755,7 +47839,7 @@ Domain allowed access.
30949 </param>
30950 <infoflow type="write" weight="10"/>
30951 </interface>
30952 -<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="60264">
30953 +<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="60282">
30954 <summary>
30955 Do not audit attempts to send pdps_client packets.
30956 </summary>
30957 @@ -47766,7 +47850,7 @@ Domain to not audit.
30958 </param>
30959 <infoflow type="none"/>
30960 </interface>
30961 -<interface name="corenet_receive_pdps_client_packets" lineno="60283">
30962 +<interface name="corenet_receive_pdps_client_packets" lineno="60301">
30963 <summary>
30964 Receive pdps_client packets.
30965 </summary>
30966 @@ -47777,7 +47861,7 @@ Domain allowed access.
30967 </param>
30968 <infoflow type="read" weight="10"/>
30969 </interface>
30970 -<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="60302">
30971 +<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="60320">
30972 <summary>
30973 Do not audit attempts to receive pdps_client packets.
30974 </summary>
30975 @@ -47788,7 +47872,7 @@ Domain allowed access.
30976 </param>
30977 <infoflow type="none"/>
30978 </interface>
30979 -<interface name="corenet_sendrecv_pdps_client_packets" lineno="60321">
30980 +<interface name="corenet_sendrecv_pdps_client_packets" lineno="60339">
30981 <summary>
30982 Send and receive pdps_client packets.
30983 </summary>
30984 @@ -47799,7 +47883,7 @@ Domain allowed access.
30985 </param>
30986 <infoflow type="both" weight="10"/>
30987 </interface>
30988 -<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="60337">
30989 +<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="60355">
30990 <summary>
30991 Do not audit attempts to send and receive pdps_client packets.
30992 </summary>
30993 @@ -47810,7 +47894,7 @@ Domain to not audit.
30994 </param>
30995 <infoflow type="none"/>
30996 </interface>
30997 -<interface name="corenet_relabelto_pdps_client_packets" lineno="60352">
30998 +<interface name="corenet_relabelto_pdps_client_packets" lineno="60370">
30999 <summary>
31000 Relabel packets to pdps_client the packet type.
31001 </summary>
31002 @@ -47820,7 +47904,7 @@ Domain allowed access.
31003 </summary>
31004 </param>
31005 </interface>
31006 -<interface name="corenet_send_pdps_server_packets" lineno="60372">
31007 +<interface name="corenet_send_pdps_server_packets" lineno="60390">
31008 <summary>
31009 Send pdps_server packets.
31010 </summary>
31011 @@ -47831,7 +47915,7 @@ Domain allowed access.
31012 </param>
31013 <infoflow type="write" weight="10"/>
31014 </interface>
31015 -<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="60391">
31016 +<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="60409">
31017 <summary>
31018 Do not audit attempts to send pdps_server packets.
31019 </summary>
31020 @@ -47842,7 +47926,7 @@ Domain to not audit.
31021 </param>
31022 <infoflow type="none"/>
31023 </interface>
31024 -<interface name="corenet_receive_pdps_server_packets" lineno="60410">
31025 +<interface name="corenet_receive_pdps_server_packets" lineno="60428">
31026 <summary>
31027 Receive pdps_server packets.
31028 </summary>
31029 @@ -47853,7 +47937,7 @@ Domain allowed access.
31030 </param>
31031 <infoflow type="read" weight="10"/>
31032 </interface>
31033 -<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="60429">
31034 +<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="60447">
31035 <summary>
31036 Do not audit attempts to receive pdps_server packets.
31037 </summary>
31038 @@ -47864,7 +47948,7 @@ Domain allowed access.
31039 </param>
31040 <infoflow type="none"/>
31041 </interface>
31042 -<interface name="corenet_sendrecv_pdps_server_packets" lineno="60448">
31043 +<interface name="corenet_sendrecv_pdps_server_packets" lineno="60466">
31044 <summary>
31045 Send and receive pdps_server packets.
31046 </summary>
31047 @@ -47875,7 +47959,7 @@ Domain allowed access.
31048 </param>
31049 <infoflow type="both" weight="10"/>
31050 </interface>
31051 -<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="60464">
31052 +<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="60482">
31053 <summary>
31054 Do not audit attempts to send and receive pdps_server packets.
31055 </summary>
31056 @@ -47886,7 +47970,7 @@ Domain to not audit.
31057 </param>
31058 <infoflow type="none"/>
31059 </interface>
31060 -<interface name="corenet_relabelto_pdps_server_packets" lineno="60479">
31061 +<interface name="corenet_relabelto_pdps_server_packets" lineno="60497">
31062 <summary>
31063 Relabel packets to pdps_server the packet type.
31064 </summary>
31065 @@ -47896,7 +47980,7 @@ Domain allowed access.
31066 </summary>
31067 </param>
31068 </interface>
31069 -<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="60501">
31070 +<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="60519">
31071 <summary>
31072 Send and receive TCP traffic on the pegasus_http port.
31073 </summary>
31074 @@ -47907,7 +47991,7 @@ Domain allowed access.
31075 </param>
31076 <infoflow type="both" weight="10"/>
31077 </interface>
31078 -<interface name="corenet_udp_send_pegasus_http_port" lineno="60516">
31079 +<interface name="corenet_udp_send_pegasus_http_port" lineno="60534">
31080 <summary>
31081 Send UDP traffic on the pegasus_http port.
31082 </summary>
31083 @@ -47918,7 +48002,7 @@ Domain allowed access.
31084 </param>
31085 <infoflow type="write" weight="10"/>
31086 </interface>
31087 -<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="60531">
31088 +<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="60549">
31089 <summary>
31090 Do not audit attempts to send UDP traffic on the pegasus_http port.
31091 </summary>
31092 @@ -47929,7 +48013,7 @@ Domain to not audit.
31093 </param>
31094 <infoflow type="none"/>
31095 </interface>
31096 -<interface name="corenet_udp_receive_pegasus_http_port" lineno="60546">
31097 +<interface name="corenet_udp_receive_pegasus_http_port" lineno="60564">
31098 <summary>
31099 Receive UDP traffic on the pegasus_http port.
31100 </summary>
31101 @@ -47940,7 +48024,7 @@ Domain allowed access.
31102 </param>
31103 <infoflow type="read" weight="10"/>
31104 </interface>
31105 -<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="60561">
31106 +<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="60579">
31107 <summary>
31108 Do not audit attempts to receive UDP traffic on the pegasus_http port.
31109 </summary>
31110 @@ -47951,7 +48035,7 @@ Domain to not audit.
31111 </param>
31112 <infoflow type="none"/>
31113 </interface>
31114 -<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="60576">
31115 +<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="60594">
31116 <summary>
31117 Send and receive UDP traffic on the pegasus_http port.
31118 </summary>
31119 @@ -47962,7 +48046,7 @@ Domain allowed access.
31120 </param>
31121 <infoflow type="both" weight="10"/>
31122 </interface>
31123 -<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="60592">
31124 +<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="60610">
31125 <summary>
31126 Do not audit attempts to send and receive
31127 UDP traffic on the pegasus_http port.
31128 @@ -47974,7 +48058,7 @@ Domain to not audit.
31129 </param>
31130 <infoflow type="none"/>
31131 </interface>
31132 -<interface name="corenet_tcp_bind_pegasus_http_port" lineno="60607">
31133 +<interface name="corenet_tcp_bind_pegasus_http_port" lineno="60625">
31134 <summary>
31135 Bind TCP sockets to the pegasus_http port.
31136 </summary>
31137 @@ -47985,7 +48069,7 @@ Domain allowed access.
31138 </param>
31139 <infoflow type="none"/>
31140 </interface>
31141 -<interface name="corenet_udp_bind_pegasus_http_port" lineno="60627">
31142 +<interface name="corenet_udp_bind_pegasus_http_port" lineno="60645">
31143 <summary>
31144 Bind UDP sockets to the pegasus_http port.
31145 </summary>
31146 @@ -47996,7 +48080,7 @@ Domain allowed access.
31147 </param>
31148 <infoflow type="none"/>
31149 </interface>
31150 -<interface name="corenet_tcp_connect_pegasus_http_port" lineno="60646">
31151 +<interface name="corenet_tcp_connect_pegasus_http_port" lineno="60664">
31152 <summary>
31153 Make a TCP connection to the pegasus_http port.
31154 </summary>
31155 @@ -48006,7 +48090,7 @@ Domain allowed access.
31156 </summary>
31157 </param>
31158 </interface>
31159 -<interface name="corenet_send_pegasus_http_client_packets" lineno="60666">
31160 +<interface name="corenet_send_pegasus_http_client_packets" lineno="60684">
31161 <summary>
31162 Send pegasus_http_client packets.
31163 </summary>
31164 @@ -48017,7 +48101,7 @@ Domain allowed access.
31165 </param>
31166 <infoflow type="write" weight="10"/>
31167 </interface>
31168 -<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="60685">
31169 +<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="60703">
31170 <summary>
31171 Do not audit attempts to send pegasus_http_client packets.
31172 </summary>
31173 @@ -48028,7 +48112,7 @@ Domain to not audit.
31174 </param>
31175 <infoflow type="none"/>
31176 </interface>
31177 -<interface name="corenet_receive_pegasus_http_client_packets" lineno="60704">
31178 +<interface name="corenet_receive_pegasus_http_client_packets" lineno="60722">
31179 <summary>
31180 Receive pegasus_http_client packets.
31181 </summary>
31182 @@ -48039,7 +48123,7 @@ Domain allowed access.
31183 </param>
31184 <infoflow type="read" weight="10"/>
31185 </interface>
31186 -<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="60723">
31187 +<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="60741">
31188 <summary>
31189 Do not audit attempts to receive pegasus_http_client packets.
31190 </summary>
31191 @@ -48050,7 +48134,7 @@ Domain allowed access.
31192 </param>
31193 <infoflow type="none"/>
31194 </interface>
31195 -<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="60742">
31196 +<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="60760">
31197 <summary>
31198 Send and receive pegasus_http_client packets.
31199 </summary>
31200 @@ -48061,7 +48145,7 @@ Domain allowed access.
31201 </param>
31202 <infoflow type="both" weight="10"/>
31203 </interface>
31204 -<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="60758">
31205 +<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="60776">
31206 <summary>
31207 Do not audit attempts to send and receive pegasus_http_client packets.
31208 </summary>
31209 @@ -48072,7 +48156,7 @@ Domain to not audit.
31210 </param>
31211 <infoflow type="none"/>
31212 </interface>
31213 -<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="60773">
31214 +<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="60791">
31215 <summary>
31216 Relabel packets to pegasus_http_client the packet type.
31217 </summary>
31218 @@ -48082,7 +48166,7 @@ Domain allowed access.
31219 </summary>
31220 </param>
31221 </interface>
31222 -<interface name="corenet_send_pegasus_http_server_packets" lineno="60793">
31223 +<interface name="corenet_send_pegasus_http_server_packets" lineno="60811">
31224 <summary>
31225 Send pegasus_http_server packets.
31226 </summary>
31227 @@ -48093,7 +48177,7 @@ Domain allowed access.
31228 </param>
31229 <infoflow type="write" weight="10"/>
31230 </interface>
31231 -<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="60812">
31232 +<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="60830">
31233 <summary>
31234 Do not audit attempts to send pegasus_http_server packets.
31235 </summary>
31236 @@ -48104,7 +48188,7 @@ Domain to not audit.
31237 </param>
31238 <infoflow type="none"/>
31239 </interface>
31240 -<interface name="corenet_receive_pegasus_http_server_packets" lineno="60831">
31241 +<interface name="corenet_receive_pegasus_http_server_packets" lineno="60849">
31242 <summary>
31243 Receive pegasus_http_server packets.
31244 </summary>
31245 @@ -48115,7 +48199,7 @@ Domain allowed access.
31246 </param>
31247 <infoflow type="read" weight="10"/>
31248 </interface>
31249 -<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="60850">
31250 +<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="60868">
31251 <summary>
31252 Do not audit attempts to receive pegasus_http_server packets.
31253 </summary>
31254 @@ -48126,7 +48210,7 @@ Domain allowed access.
31255 </param>
31256 <infoflow type="none"/>
31257 </interface>
31258 -<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="60869">
31259 +<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="60887">
31260 <summary>
31261 Send and receive pegasus_http_server packets.
31262 </summary>
31263 @@ -48137,7 +48221,7 @@ Domain allowed access.
31264 </param>
31265 <infoflow type="both" weight="10"/>
31266 </interface>
31267 -<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="60885">
31268 +<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="60903">
31269 <summary>
31270 Do not audit attempts to send and receive pegasus_http_server packets.
31271 </summary>
31272 @@ -48148,7 +48232,7 @@ Domain to not audit.
31273 </param>
31274 <infoflow type="none"/>
31275 </interface>
31276 -<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="60900">
31277 +<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="60918">
31278 <summary>
31279 Relabel packets to pegasus_http_server the packet type.
31280 </summary>
31281 @@ -48158,7 +48242,7 @@ Domain allowed access.
31282 </summary>
31283 </param>
31284 </interface>
31285 -<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="60922">
31286 +<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="60940">
31287 <summary>
31288 Send and receive TCP traffic on the pegasus_https port.
31289 </summary>
31290 @@ -48169,7 +48253,7 @@ Domain allowed access.
31291 </param>
31292 <infoflow type="both" weight="10"/>
31293 </interface>
31294 -<interface name="corenet_udp_send_pegasus_https_port" lineno="60937">
31295 +<interface name="corenet_udp_send_pegasus_https_port" lineno="60955">
31296 <summary>
31297 Send UDP traffic on the pegasus_https port.
31298 </summary>
31299 @@ -48180,7 +48264,7 @@ Domain allowed access.
31300 </param>
31301 <infoflow type="write" weight="10"/>
31302 </interface>
31303 -<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="60952">
31304 +<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="60970">
31305 <summary>
31306 Do not audit attempts to send UDP traffic on the pegasus_https port.
31307 </summary>
31308 @@ -48191,7 +48275,7 @@ Domain to not audit.
31309 </param>
31310 <infoflow type="none"/>
31311 </interface>
31312 -<interface name="corenet_udp_receive_pegasus_https_port" lineno="60967">
31313 +<interface name="corenet_udp_receive_pegasus_https_port" lineno="60985">
31314 <summary>
31315 Receive UDP traffic on the pegasus_https port.
31316 </summary>
31317 @@ -48202,7 +48286,7 @@ Domain allowed access.
31318 </param>
31319 <infoflow type="read" weight="10"/>
31320 </interface>
31321 -<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="60982">
31322 +<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="61000">
31323 <summary>
31324 Do not audit attempts to receive UDP traffic on the pegasus_https port.
31325 </summary>
31326 @@ -48213,7 +48297,7 @@ Domain to not audit.
31327 </param>
31328 <infoflow type="none"/>
31329 </interface>
31330 -<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="60997">
31331 +<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="61015">
31332 <summary>
31333 Send and receive UDP traffic on the pegasus_https port.
31334 </summary>
31335 @@ -48224,7 +48308,7 @@ Domain allowed access.
31336 </param>
31337 <infoflow type="both" weight="10"/>
31338 </interface>
31339 -<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="61013">
31340 +<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="61031">
31341 <summary>
31342 Do not audit attempts to send and receive
31343 UDP traffic on the pegasus_https port.
31344 @@ -48236,7 +48320,7 @@ Domain to not audit.
31345 </param>
31346 <infoflow type="none"/>
31347 </interface>
31348 -<interface name="corenet_tcp_bind_pegasus_https_port" lineno="61028">
31349 +<interface name="corenet_tcp_bind_pegasus_https_port" lineno="61046">
31350 <summary>
31351 Bind TCP sockets to the pegasus_https port.
31352 </summary>
31353 @@ -48247,7 +48331,7 @@ Domain allowed access.
31354 </param>
31355 <infoflow type="none"/>
31356 </interface>
31357 -<interface name="corenet_udp_bind_pegasus_https_port" lineno="61048">
31358 +<interface name="corenet_udp_bind_pegasus_https_port" lineno="61066">
31359 <summary>
31360 Bind UDP sockets to the pegasus_https port.
31361 </summary>
31362 @@ -48258,7 +48342,7 @@ Domain allowed access.
31363 </param>
31364 <infoflow type="none"/>
31365 </interface>
31366 -<interface name="corenet_tcp_connect_pegasus_https_port" lineno="61067">
31367 +<interface name="corenet_tcp_connect_pegasus_https_port" lineno="61085">
31368 <summary>
31369 Make a TCP connection to the pegasus_https port.
31370 </summary>
31371 @@ -48268,7 +48352,7 @@ Domain allowed access.
31372 </summary>
31373 </param>
31374 </interface>
31375 -<interface name="corenet_send_pegasus_https_client_packets" lineno="61087">
31376 +<interface name="corenet_send_pegasus_https_client_packets" lineno="61105">
31377 <summary>
31378 Send pegasus_https_client packets.
31379 </summary>
31380 @@ -48279,7 +48363,7 @@ Domain allowed access.
31381 </param>
31382 <infoflow type="write" weight="10"/>
31383 </interface>
31384 -<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="61106">
31385 +<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="61124">
31386 <summary>
31387 Do not audit attempts to send pegasus_https_client packets.
31388 </summary>
31389 @@ -48290,7 +48374,7 @@ Domain to not audit.
31390 </param>
31391 <infoflow type="none"/>
31392 </interface>
31393 -<interface name="corenet_receive_pegasus_https_client_packets" lineno="61125">
31394 +<interface name="corenet_receive_pegasus_https_client_packets" lineno="61143">
31395 <summary>
31396 Receive pegasus_https_client packets.
31397 </summary>
31398 @@ -48301,7 +48385,7 @@ Domain allowed access.
31399 </param>
31400 <infoflow type="read" weight="10"/>
31401 </interface>
31402 -<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="61144">
31403 +<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="61162">
31404 <summary>
31405 Do not audit attempts to receive pegasus_https_client packets.
31406 </summary>
31407 @@ -48312,7 +48396,7 @@ Domain allowed access.
31408 </param>
31409 <infoflow type="none"/>
31410 </interface>
31411 -<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="61163">
31412 +<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="61181">
31413 <summary>
31414 Send and receive pegasus_https_client packets.
31415 </summary>
31416 @@ -48323,7 +48407,7 @@ Domain allowed access.
31417 </param>
31418 <infoflow type="both" weight="10"/>
31419 </interface>
31420 -<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="61179">
31421 +<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="61197">
31422 <summary>
31423 Do not audit attempts to send and receive pegasus_https_client packets.
31424 </summary>
31425 @@ -48334,7 +48418,7 @@ Domain to not audit.
31426 </param>
31427 <infoflow type="none"/>
31428 </interface>
31429 -<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="61194">
31430 +<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="61212">
31431 <summary>
31432 Relabel packets to pegasus_https_client the packet type.
31433 </summary>
31434 @@ -48344,7 +48428,7 @@ Domain allowed access.
31435 </summary>
31436 </param>
31437 </interface>
31438 -<interface name="corenet_send_pegasus_https_server_packets" lineno="61214">
31439 +<interface name="corenet_send_pegasus_https_server_packets" lineno="61232">
31440 <summary>
31441 Send pegasus_https_server packets.
31442 </summary>
31443 @@ -48355,7 +48439,7 @@ Domain allowed access.
31444 </param>
31445 <infoflow type="write" weight="10"/>
31446 </interface>
31447 -<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="61233">
31448 +<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="61251">
31449 <summary>
31450 Do not audit attempts to send pegasus_https_server packets.
31451 </summary>
31452 @@ -48366,7 +48450,7 @@ Domain to not audit.
31453 </param>
31454 <infoflow type="none"/>
31455 </interface>
31456 -<interface name="corenet_receive_pegasus_https_server_packets" lineno="61252">
31457 +<interface name="corenet_receive_pegasus_https_server_packets" lineno="61270">
31458 <summary>
31459 Receive pegasus_https_server packets.
31460 </summary>
31461 @@ -48377,7 +48461,7 @@ Domain allowed access.
31462 </param>
31463 <infoflow type="read" weight="10"/>
31464 </interface>
31465 -<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="61271">
31466 +<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="61289">
31467 <summary>
31468 Do not audit attempts to receive pegasus_https_server packets.
31469 </summary>
31470 @@ -48388,7 +48472,7 @@ Domain allowed access.
31471 </param>
31472 <infoflow type="none"/>
31473 </interface>
31474 -<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="61290">
31475 +<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="61308">
31476 <summary>
31477 Send and receive pegasus_https_server packets.
31478 </summary>
31479 @@ -48399,7 +48483,7 @@ Domain allowed access.
31480 </param>
31481 <infoflow type="both" weight="10"/>
31482 </interface>
31483 -<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="61306">
31484 +<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="61324">
31485 <summary>
31486 Do not audit attempts to send and receive pegasus_https_server packets.
31487 </summary>
31488 @@ -48410,7 +48494,7 @@ Domain to not audit.
31489 </param>
31490 <infoflow type="none"/>
31491 </interface>
31492 -<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="61321">
31493 +<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="61339">
31494 <summary>
31495 Relabel packets to pegasus_https_server the packet type.
31496 </summary>
31497 @@ -48420,7 +48504,7 @@ Domain allowed access.
31498 </summary>
31499 </param>
31500 </interface>
31501 -<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="61343">
31502 +<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="61361">
31503 <summary>
31504 Send and receive TCP traffic on the pgpkeyserver port.
31505 </summary>
31506 @@ -48431,7 +48515,7 @@ Domain allowed access.
31507 </param>
31508 <infoflow type="both" weight="10"/>
31509 </interface>
31510 -<interface name="corenet_udp_send_pgpkeyserver_port" lineno="61358">
31511 +<interface name="corenet_udp_send_pgpkeyserver_port" lineno="61376">
31512 <summary>
31513 Send UDP traffic on the pgpkeyserver port.
31514 </summary>
31515 @@ -48442,7 +48526,7 @@ Domain allowed access.
31516 </param>
31517 <infoflow type="write" weight="10"/>
31518 </interface>
31519 -<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="61373">
31520 +<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="61391">
31521 <summary>
31522 Do not audit attempts to send UDP traffic on the pgpkeyserver port.
31523 </summary>
31524 @@ -48453,7 +48537,7 @@ Domain to not audit.
31525 </param>
31526 <infoflow type="none"/>
31527 </interface>
31528 -<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="61388">
31529 +<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="61406">
31530 <summary>
31531 Receive UDP traffic on the pgpkeyserver port.
31532 </summary>
31533 @@ -48464,7 +48548,7 @@ Domain allowed access.
31534 </param>
31535 <infoflow type="read" weight="10"/>
31536 </interface>
31537 -<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="61403">
31538 +<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="61421">
31539 <summary>
31540 Do not audit attempts to receive UDP traffic on the pgpkeyserver port.
31541 </summary>
31542 @@ -48475,7 +48559,7 @@ Domain to not audit.
31543 </param>
31544 <infoflow type="none"/>
31545 </interface>
31546 -<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="61418">
31547 +<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="61436">
31548 <summary>
31549 Send and receive UDP traffic on the pgpkeyserver port.
31550 </summary>
31551 @@ -48486,7 +48570,7 @@ Domain allowed access.
31552 </param>
31553 <infoflow type="both" weight="10"/>
31554 </interface>
31555 -<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="61434">
31556 +<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="61452">
31557 <summary>
31558 Do not audit attempts to send and receive
31559 UDP traffic on the pgpkeyserver port.
31560 @@ -48498,7 +48582,7 @@ Domain to not audit.
31561 </param>
31562 <infoflow type="none"/>
31563 </interface>
31564 -<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="61449">
31565 +<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="61467">
31566 <summary>
31567 Bind TCP sockets to the pgpkeyserver port.
31568 </summary>
31569 @@ -48509,7 +48593,7 @@ Domain allowed access.
31570 </param>
31571 <infoflow type="none"/>
31572 </interface>
31573 -<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="61469">
31574 +<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="61487">
31575 <summary>
31576 Bind UDP sockets to the pgpkeyserver port.
31577 </summary>
31578 @@ -48520,7 +48604,7 @@ Domain allowed access.
31579 </param>
31580 <infoflow type="none"/>
31581 </interface>
31582 -<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="61488">
31583 +<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="61506">
31584 <summary>
31585 Make a TCP connection to the pgpkeyserver port.
31586 </summary>
31587 @@ -48530,7 +48614,7 @@ Domain allowed access.
31588 </summary>
31589 </param>
31590 </interface>
31591 -<interface name="corenet_send_pgpkeyserver_client_packets" lineno="61508">
31592 +<interface name="corenet_send_pgpkeyserver_client_packets" lineno="61526">
31593 <summary>
31594 Send pgpkeyserver_client packets.
31595 </summary>
31596 @@ -48541,7 +48625,7 @@ Domain allowed access.
31597 </param>
31598 <infoflow type="write" weight="10"/>
31599 </interface>
31600 -<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="61527">
31601 +<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="61545">
31602 <summary>
31603 Do not audit attempts to send pgpkeyserver_client packets.
31604 </summary>
31605 @@ -48552,7 +48636,7 @@ Domain to not audit.
31606 </param>
31607 <infoflow type="none"/>
31608 </interface>
31609 -<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="61546">
31610 +<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="61564">
31611 <summary>
31612 Receive pgpkeyserver_client packets.
31613 </summary>
31614 @@ -48563,7 +48647,7 @@ Domain allowed access.
31615 </param>
31616 <infoflow type="read" weight="10"/>
31617 </interface>
31618 -<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="61565">
31619 +<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="61583">
31620 <summary>
31621 Do not audit attempts to receive pgpkeyserver_client packets.
31622 </summary>
31623 @@ -48574,7 +48658,7 @@ Domain allowed access.
31624 </param>
31625 <infoflow type="none"/>
31626 </interface>
31627 -<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="61584">
31628 +<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="61602">
31629 <summary>
31630 Send and receive pgpkeyserver_client packets.
31631 </summary>
31632 @@ -48585,7 +48669,7 @@ Domain allowed access.
31633 </param>
31634 <infoflow type="both" weight="10"/>
31635 </interface>
31636 -<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="61600">
31637 +<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="61618">
31638 <summary>
31639 Do not audit attempts to send and receive pgpkeyserver_client packets.
31640 </summary>
31641 @@ -48596,7 +48680,7 @@ Domain to not audit.
31642 </param>
31643 <infoflow type="none"/>
31644 </interface>
31645 -<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="61615">
31646 +<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="61633">
31647 <summary>
31648 Relabel packets to pgpkeyserver_client the packet type.
31649 </summary>
31650 @@ -48606,7 +48690,7 @@ Domain allowed access.
31651 </summary>
31652 </param>
31653 </interface>
31654 -<interface name="corenet_send_pgpkeyserver_server_packets" lineno="61635">
31655 +<interface name="corenet_send_pgpkeyserver_server_packets" lineno="61653">
31656 <summary>
31657 Send pgpkeyserver_server packets.
31658 </summary>
31659 @@ -48617,7 +48701,7 @@ Domain allowed access.
31660 </param>
31661 <infoflow type="write" weight="10"/>
31662 </interface>
31663 -<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="61654">
31664 +<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="61672">
31665 <summary>
31666 Do not audit attempts to send pgpkeyserver_server packets.
31667 </summary>
31668 @@ -48628,7 +48712,7 @@ Domain to not audit.
31669 </param>
31670 <infoflow type="none"/>
31671 </interface>
31672 -<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="61673">
31673 +<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="61691">
31674 <summary>
31675 Receive pgpkeyserver_server packets.
31676 </summary>
31677 @@ -48639,7 +48723,7 @@ Domain allowed access.
31678 </param>
31679 <infoflow type="read" weight="10"/>
31680 </interface>
31681 -<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="61692">
31682 +<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="61710">
31683 <summary>
31684 Do not audit attempts to receive pgpkeyserver_server packets.
31685 </summary>
31686 @@ -48650,7 +48734,7 @@ Domain allowed access.
31687 </param>
31688 <infoflow type="none"/>
31689 </interface>
31690 -<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="61711">
31691 +<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="61729">
31692 <summary>
31693 Send and receive pgpkeyserver_server packets.
31694 </summary>
31695 @@ -48661,7 +48745,7 @@ Domain allowed access.
31696 </param>
31697 <infoflow type="both" weight="10"/>
31698 </interface>
31699 -<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="61727">
31700 +<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="61745">
31701 <summary>
31702 Do not audit attempts to send and receive pgpkeyserver_server packets.
31703 </summary>
31704 @@ -48672,7 +48756,7 @@ Domain to not audit.
31705 </param>
31706 <infoflow type="none"/>
31707 </interface>
31708 -<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="61742">
31709 +<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="61760">
31710 <summary>
31711 Relabel packets to pgpkeyserver_server the packet type.
31712 </summary>
31713 @@ -48682,7 +48766,7 @@ Domain allowed access.
31714 </summary>
31715 </param>
31716 </interface>
31717 -<interface name="corenet_tcp_sendrecv_pingd_port" lineno="61764">
31718 +<interface name="corenet_tcp_sendrecv_pingd_port" lineno="61782">
31719 <summary>
31720 Send and receive TCP traffic on the pingd port.
31721 </summary>
31722 @@ -48693,7 +48777,7 @@ Domain allowed access.
31723 </param>
31724 <infoflow type="both" weight="10"/>
31725 </interface>
31726 -<interface name="corenet_udp_send_pingd_port" lineno="61779">
31727 +<interface name="corenet_udp_send_pingd_port" lineno="61797">
31728 <summary>
31729 Send UDP traffic on the pingd port.
31730 </summary>
31731 @@ -48704,7 +48788,7 @@ Domain allowed access.
31732 </param>
31733 <infoflow type="write" weight="10"/>
31734 </interface>
31735 -<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="61794">
31736 +<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="61812">
31737 <summary>
31738 Do not audit attempts to send UDP traffic on the pingd port.
31739 </summary>
31740 @@ -48715,7 +48799,7 @@ Domain to not audit.
31741 </param>
31742 <infoflow type="none"/>
31743 </interface>
31744 -<interface name="corenet_udp_receive_pingd_port" lineno="61809">
31745 +<interface name="corenet_udp_receive_pingd_port" lineno="61827">
31746 <summary>
31747 Receive UDP traffic on the pingd port.
31748 </summary>
31749 @@ -48726,7 +48810,7 @@ Domain allowed access.
31750 </param>
31751 <infoflow type="read" weight="10"/>
31752 </interface>
31753 -<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="61824">
31754 +<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="61842">
31755 <summary>
31756 Do not audit attempts to receive UDP traffic on the pingd port.
31757 </summary>
31758 @@ -48737,7 +48821,7 @@ Domain to not audit.
31759 </param>
31760 <infoflow type="none"/>
31761 </interface>
31762 -<interface name="corenet_udp_sendrecv_pingd_port" lineno="61839">
31763 +<interface name="corenet_udp_sendrecv_pingd_port" lineno="61857">
31764 <summary>
31765 Send and receive UDP traffic on the pingd port.
31766 </summary>
31767 @@ -48748,7 +48832,7 @@ Domain allowed access.
31768 </param>
31769 <infoflow type="both" weight="10"/>
31770 </interface>
31771 -<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="61855">
31772 +<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="61873">
31773 <summary>
31774 Do not audit attempts to send and receive
31775 UDP traffic on the pingd port.
31776 @@ -48760,7 +48844,7 @@ Domain to not audit.
31777 </param>
31778 <infoflow type="none"/>
31779 </interface>
31780 -<interface name="corenet_tcp_bind_pingd_port" lineno="61870">
31781 +<interface name="corenet_tcp_bind_pingd_port" lineno="61888">
31782 <summary>
31783 Bind TCP sockets to the pingd port.
31784 </summary>
31785 @@ -48771,7 +48855,7 @@ Domain allowed access.
31786 </param>
31787 <infoflow type="none"/>
31788 </interface>
31789 -<interface name="corenet_udp_bind_pingd_port" lineno="61890">
31790 +<interface name="corenet_udp_bind_pingd_port" lineno="61908">
31791 <summary>
31792 Bind UDP sockets to the pingd port.
31793 </summary>
31794 @@ -48782,7 +48866,7 @@ Domain allowed access.
31795 </param>
31796 <infoflow type="none"/>
31797 </interface>
31798 -<interface name="corenet_tcp_connect_pingd_port" lineno="61909">
31799 +<interface name="corenet_tcp_connect_pingd_port" lineno="61927">
31800 <summary>
31801 Make a TCP connection to the pingd port.
31802 </summary>
31803 @@ -48792,7 +48876,7 @@ Domain allowed access.
31804 </summary>
31805 </param>
31806 </interface>
31807 -<interface name="corenet_send_pingd_client_packets" lineno="61929">
31808 +<interface name="corenet_send_pingd_client_packets" lineno="61947">
31809 <summary>
31810 Send pingd_client packets.
31811 </summary>
31812 @@ -48803,7 +48887,7 @@ Domain allowed access.
31813 </param>
31814 <infoflow type="write" weight="10"/>
31815 </interface>
31816 -<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="61948">
31817 +<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="61966">
31818 <summary>
31819 Do not audit attempts to send pingd_client packets.
31820 </summary>
31821 @@ -48814,7 +48898,7 @@ Domain to not audit.
31822 </param>
31823 <infoflow type="none"/>
31824 </interface>
31825 -<interface name="corenet_receive_pingd_client_packets" lineno="61967">
31826 +<interface name="corenet_receive_pingd_client_packets" lineno="61985">
31827 <summary>
31828 Receive pingd_client packets.
31829 </summary>
31830 @@ -48825,7 +48909,7 @@ Domain allowed access.
31831 </param>
31832 <infoflow type="read" weight="10"/>
31833 </interface>
31834 -<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="61986">
31835 +<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="62004">
31836 <summary>
31837 Do not audit attempts to receive pingd_client packets.
31838 </summary>
31839 @@ -48836,7 +48920,7 @@ Domain allowed access.
31840 </param>
31841 <infoflow type="none"/>
31842 </interface>
31843 -<interface name="corenet_sendrecv_pingd_client_packets" lineno="62005">
31844 +<interface name="corenet_sendrecv_pingd_client_packets" lineno="62023">
31845 <summary>
31846 Send and receive pingd_client packets.
31847 </summary>
31848 @@ -48847,7 +48931,7 @@ Domain allowed access.
31849 </param>
31850 <infoflow type="both" weight="10"/>
31851 </interface>
31852 -<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="62021">
31853 +<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="62039">
31854 <summary>
31855 Do not audit attempts to send and receive pingd_client packets.
31856 </summary>
31857 @@ -48858,7 +48942,7 @@ Domain to not audit.
31858 </param>
31859 <infoflow type="none"/>
31860 </interface>
31861 -<interface name="corenet_relabelto_pingd_client_packets" lineno="62036">
31862 +<interface name="corenet_relabelto_pingd_client_packets" lineno="62054">
31863 <summary>
31864 Relabel packets to pingd_client the packet type.
31865 </summary>
31866 @@ -48868,7 +48952,7 @@ Domain allowed access.
31867 </summary>
31868 </param>
31869 </interface>
31870 -<interface name="corenet_send_pingd_server_packets" lineno="62056">
31871 +<interface name="corenet_send_pingd_server_packets" lineno="62074">
31872 <summary>
31873 Send pingd_server packets.
31874 </summary>
31875 @@ -48879,7 +48963,7 @@ Domain allowed access.
31876 </param>
31877 <infoflow type="write" weight="10"/>
31878 </interface>
31879 -<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="62075">
31880 +<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="62093">
31881 <summary>
31882 Do not audit attempts to send pingd_server packets.
31883 </summary>
31884 @@ -48890,7 +48974,7 @@ Domain to not audit.
31885 </param>
31886 <infoflow type="none"/>
31887 </interface>
31888 -<interface name="corenet_receive_pingd_server_packets" lineno="62094">
31889 +<interface name="corenet_receive_pingd_server_packets" lineno="62112">
31890 <summary>
31891 Receive pingd_server packets.
31892 </summary>
31893 @@ -48901,7 +48985,7 @@ Domain allowed access.
31894 </param>
31895 <infoflow type="read" weight="10"/>
31896 </interface>
31897 -<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="62113">
31898 +<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="62131">
31899 <summary>
31900 Do not audit attempts to receive pingd_server packets.
31901 </summary>
31902 @@ -48912,7 +48996,7 @@ Domain allowed access.
31903 </param>
31904 <infoflow type="none"/>
31905 </interface>
31906 -<interface name="corenet_sendrecv_pingd_server_packets" lineno="62132">
31907 +<interface name="corenet_sendrecv_pingd_server_packets" lineno="62150">
31908 <summary>
31909 Send and receive pingd_server packets.
31910 </summary>
31911 @@ -48923,7 +49007,7 @@ Domain allowed access.
31912 </param>
31913 <infoflow type="both" weight="10"/>
31914 </interface>
31915 -<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="62148">
31916 +<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="62166">
31917 <summary>
31918 Do not audit attempts to send and receive pingd_server packets.
31919 </summary>
31920 @@ -48934,7 +49018,7 @@ Domain to not audit.
31921 </param>
31922 <infoflow type="none"/>
31923 </interface>
31924 -<interface name="corenet_relabelto_pingd_server_packets" lineno="62163">
31925 +<interface name="corenet_relabelto_pingd_server_packets" lineno="62181">
31926 <summary>
31927 Relabel packets to pingd_server the packet type.
31928 </summary>
31929 @@ -48944,7 +49028,7 @@ Domain allowed access.
31930 </summary>
31931 </param>
31932 </interface>
31933 -<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="62185">
31934 +<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="62203">
31935 <summary>
31936 Send and receive TCP traffic on the pktcable_cops port.
31937 </summary>
31938 @@ -48955,7 +49039,7 @@ Domain allowed access.
31939 </param>
31940 <infoflow type="both" weight="10"/>
31941 </interface>
31942 -<interface name="corenet_udp_send_pktcable_cops_port" lineno="62200">
31943 +<interface name="corenet_udp_send_pktcable_cops_port" lineno="62218">
31944 <summary>
31945 Send UDP traffic on the pktcable_cops port.
31946 </summary>
31947 @@ -48966,7 +49050,7 @@ Domain allowed access.
31948 </param>
31949 <infoflow type="write" weight="10"/>
31950 </interface>
31951 -<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="62215">
31952 +<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="62233">
31953 <summary>
31954 Do not audit attempts to send UDP traffic on the pktcable_cops port.
31955 </summary>
31956 @@ -48977,7 +49061,7 @@ Domain to not audit.
31957 </param>
31958 <infoflow type="none"/>
31959 </interface>
31960 -<interface name="corenet_udp_receive_pktcable_cops_port" lineno="62230">
31961 +<interface name="corenet_udp_receive_pktcable_cops_port" lineno="62248">
31962 <summary>
31963 Receive UDP traffic on the pktcable_cops port.
31964 </summary>
31965 @@ -48988,7 +49072,7 @@ Domain allowed access.
31966 </param>
31967 <infoflow type="read" weight="10"/>
31968 </interface>
31969 -<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="62245">
31970 +<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="62263">
31971 <summary>
31972 Do not audit attempts to receive UDP traffic on the pktcable_cops port.
31973 </summary>
31974 @@ -48999,7 +49083,7 @@ Domain to not audit.
31975 </param>
31976 <infoflow type="none"/>
31977 </interface>
31978 -<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="62260">
31979 +<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="62278">
31980 <summary>
31981 Send and receive UDP traffic on the pktcable_cops port.
31982 </summary>
31983 @@ -49010,7 +49094,7 @@ Domain allowed access.
31984 </param>
31985 <infoflow type="both" weight="10"/>
31986 </interface>
31987 -<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="62276">
31988 +<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="62294">
31989 <summary>
31990 Do not audit attempts to send and receive
31991 UDP traffic on the pktcable_cops port.
31992 @@ -49022,7 +49106,7 @@ Domain to not audit.
31993 </param>
31994 <infoflow type="none"/>
31995 </interface>
31996 -<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="62291">
31997 +<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="62309">
31998 <summary>
31999 Bind TCP sockets to the pktcable_cops port.
32000 </summary>
32001 @@ -49033,7 +49117,7 @@ Domain allowed access.
32002 </param>
32003 <infoflow type="none"/>
32004 </interface>
32005 -<interface name="corenet_udp_bind_pktcable_cops_port" lineno="62311">
32006 +<interface name="corenet_udp_bind_pktcable_cops_port" lineno="62329">
32007 <summary>
32008 Bind UDP sockets to the pktcable_cops port.
32009 </summary>
32010 @@ -49044,7 +49128,7 @@ Domain allowed access.
32011 </param>
32012 <infoflow type="none"/>
32013 </interface>
32014 -<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="62330">
32015 +<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="62348">
32016 <summary>
32017 Make a TCP connection to the pktcable_cops port.
32018 </summary>
32019 @@ -49054,7 +49138,7 @@ Domain allowed access.
32020 </summary>
32021 </param>
32022 </interface>
32023 -<interface name="corenet_send_pktcable_cops_client_packets" lineno="62350">
32024 +<interface name="corenet_send_pktcable_cops_client_packets" lineno="62368">
32025 <summary>
32026 Send pktcable_cops_client packets.
32027 </summary>
32028 @@ -49065,7 +49149,7 @@ Domain allowed access.
32029 </param>
32030 <infoflow type="write" weight="10"/>
32031 </interface>
32032 -<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="62369">
32033 +<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="62387">
32034 <summary>
32035 Do not audit attempts to send pktcable_cops_client packets.
32036 </summary>
32037 @@ -49076,7 +49160,7 @@ Domain to not audit.
32038 </param>
32039 <infoflow type="none"/>
32040 </interface>
32041 -<interface name="corenet_receive_pktcable_cops_client_packets" lineno="62388">
32042 +<interface name="corenet_receive_pktcable_cops_client_packets" lineno="62406">
32043 <summary>
32044 Receive pktcable_cops_client packets.
32045 </summary>
32046 @@ -49087,7 +49171,7 @@ Domain allowed access.
32047 </param>
32048 <infoflow type="read" weight="10"/>
32049 </interface>
32050 -<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="62407">
32051 +<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="62425">
32052 <summary>
32053 Do not audit attempts to receive pktcable_cops_client packets.
32054 </summary>
32055 @@ -49098,7 +49182,7 @@ Domain allowed access.
32056 </param>
32057 <infoflow type="none"/>
32058 </interface>
32059 -<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="62426">
32060 +<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="62444">
32061 <summary>
32062 Send and receive pktcable_cops_client packets.
32063 </summary>
32064 @@ -49109,7 +49193,7 @@ Domain allowed access.
32065 </param>
32066 <infoflow type="both" weight="10"/>
32067 </interface>
32068 -<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="62442">
32069 +<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="62460">
32070 <summary>
32071 Do not audit attempts to send and receive pktcable_cops_client packets.
32072 </summary>
32073 @@ -49120,7 +49204,7 @@ Domain to not audit.
32074 </param>
32075 <infoflow type="none"/>
32076 </interface>
32077 -<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="62457">
32078 +<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="62475">
32079 <summary>
32080 Relabel packets to pktcable_cops_client the packet type.
32081 </summary>
32082 @@ -49130,7 +49214,7 @@ Domain allowed access.
32083 </summary>
32084 </param>
32085 </interface>
32086 -<interface name="corenet_send_pktcable_cops_server_packets" lineno="62477">
32087 +<interface name="corenet_send_pktcable_cops_server_packets" lineno="62495">
32088 <summary>
32089 Send pktcable_cops_server packets.
32090 </summary>
32091 @@ -49141,7 +49225,7 @@ Domain allowed access.
32092 </param>
32093 <infoflow type="write" weight="10"/>
32094 </interface>
32095 -<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="62496">
32096 +<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="62514">
32097 <summary>
32098 Do not audit attempts to send pktcable_cops_server packets.
32099 </summary>
32100 @@ -49152,7 +49236,7 @@ Domain to not audit.
32101 </param>
32102 <infoflow type="none"/>
32103 </interface>
32104 -<interface name="corenet_receive_pktcable_cops_server_packets" lineno="62515">
32105 +<interface name="corenet_receive_pktcable_cops_server_packets" lineno="62533">
32106 <summary>
32107 Receive pktcable_cops_server packets.
32108 </summary>
32109 @@ -49163,7 +49247,7 @@ Domain allowed access.
32110 </param>
32111 <infoflow type="read" weight="10"/>
32112 </interface>
32113 -<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="62534">
32114 +<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="62552">
32115 <summary>
32116 Do not audit attempts to receive pktcable_cops_server packets.
32117 </summary>
32118 @@ -49174,7 +49258,7 @@ Domain allowed access.
32119 </param>
32120 <infoflow type="none"/>
32121 </interface>
32122 -<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="62553">
32123 +<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="62571">
32124 <summary>
32125 Send and receive pktcable_cops_server packets.
32126 </summary>
32127 @@ -49185,7 +49269,7 @@ Domain allowed access.
32128 </param>
32129 <infoflow type="both" weight="10"/>
32130 </interface>
32131 -<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="62569">
32132 +<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="62587">
32133 <summary>
32134 Do not audit attempts to send and receive pktcable_cops_server packets.
32135 </summary>
32136 @@ -49196,7 +49280,7 @@ Domain to not audit.
32137 </param>
32138 <infoflow type="none"/>
32139 </interface>
32140 -<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="62584">
32141 +<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="62602">
32142 <summary>
32143 Relabel packets to pktcable_cops_server the packet type.
32144 </summary>
32145 @@ -49206,7 +49290,7 @@ Domain allowed access.
32146 </summary>
32147 </param>
32148 </interface>
32149 -<interface name="corenet_tcp_sendrecv_pop_port" lineno="62606">
32150 +<interface name="corenet_tcp_sendrecv_pop_port" lineno="62624">
32151 <summary>
32152 Send and receive TCP traffic on the pop port.
32153 </summary>
32154 @@ -49217,7 +49301,7 @@ Domain allowed access.
32155 </param>
32156 <infoflow type="both" weight="10"/>
32157 </interface>
32158 -<interface name="corenet_udp_send_pop_port" lineno="62621">
32159 +<interface name="corenet_udp_send_pop_port" lineno="62639">
32160 <summary>
32161 Send UDP traffic on the pop port.
32162 </summary>
32163 @@ -49228,7 +49312,7 @@ Domain allowed access.
32164 </param>
32165 <infoflow type="write" weight="10"/>
32166 </interface>
32167 -<interface name="corenet_dontaudit_udp_send_pop_port" lineno="62636">
32168 +<interface name="corenet_dontaudit_udp_send_pop_port" lineno="62654">
32169 <summary>
32170 Do not audit attempts to send UDP traffic on the pop port.
32171 </summary>
32172 @@ -49239,7 +49323,7 @@ Domain to not audit.
32173 </param>
32174 <infoflow type="none"/>
32175 </interface>
32176 -<interface name="corenet_udp_receive_pop_port" lineno="62651">
32177 +<interface name="corenet_udp_receive_pop_port" lineno="62669">
32178 <summary>
32179 Receive UDP traffic on the pop port.
32180 </summary>
32181 @@ -49250,7 +49334,7 @@ Domain allowed access.
32182 </param>
32183 <infoflow type="read" weight="10"/>
32184 </interface>
32185 -<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="62666">
32186 +<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="62684">
32187 <summary>
32188 Do not audit attempts to receive UDP traffic on the pop port.
32189 </summary>
32190 @@ -49261,7 +49345,7 @@ Domain to not audit.
32191 </param>
32192 <infoflow type="none"/>
32193 </interface>
32194 -<interface name="corenet_udp_sendrecv_pop_port" lineno="62681">
32195 +<interface name="corenet_udp_sendrecv_pop_port" lineno="62699">
32196 <summary>
32197 Send and receive UDP traffic on the pop port.
32198 </summary>
32199 @@ -49272,7 +49356,7 @@ Domain allowed access.
32200 </param>
32201 <infoflow type="both" weight="10"/>
32202 </interface>
32203 -<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="62697">
32204 +<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="62715">
32205 <summary>
32206 Do not audit attempts to send and receive
32207 UDP traffic on the pop port.
32208 @@ -49284,7 +49368,7 @@ Domain to not audit.
32209 </param>
32210 <infoflow type="none"/>
32211 </interface>
32212 -<interface name="corenet_tcp_bind_pop_port" lineno="62712">
32213 +<interface name="corenet_tcp_bind_pop_port" lineno="62730">
32214 <summary>
32215 Bind TCP sockets to the pop port.
32216 </summary>
32217 @@ -49295,7 +49379,7 @@ Domain allowed access.
32218 </param>
32219 <infoflow type="none"/>
32220 </interface>
32221 -<interface name="corenet_udp_bind_pop_port" lineno="62732">
32222 +<interface name="corenet_udp_bind_pop_port" lineno="62750">
32223 <summary>
32224 Bind UDP sockets to the pop port.
32225 </summary>
32226 @@ -49306,7 +49390,7 @@ Domain allowed access.
32227 </param>
32228 <infoflow type="none"/>
32229 </interface>
32230 -<interface name="corenet_tcp_connect_pop_port" lineno="62751">
32231 +<interface name="corenet_tcp_connect_pop_port" lineno="62769">
32232 <summary>
32233 Make a TCP connection to the pop port.
32234 </summary>
32235 @@ -49316,7 +49400,7 @@ Domain allowed access.
32236 </summary>
32237 </param>
32238 </interface>
32239 -<interface name="corenet_send_pop_client_packets" lineno="62771">
32240 +<interface name="corenet_send_pop_client_packets" lineno="62789">
32241 <summary>
32242 Send pop_client packets.
32243 </summary>
32244 @@ -49327,7 +49411,7 @@ Domain allowed access.
32245 </param>
32246 <infoflow type="write" weight="10"/>
32247 </interface>
32248 -<interface name="corenet_dontaudit_send_pop_client_packets" lineno="62790">
32249 +<interface name="corenet_dontaudit_send_pop_client_packets" lineno="62808">
32250 <summary>
32251 Do not audit attempts to send pop_client packets.
32252 </summary>
32253 @@ -49338,7 +49422,7 @@ Domain to not audit.
32254 </param>
32255 <infoflow type="none"/>
32256 </interface>
32257 -<interface name="corenet_receive_pop_client_packets" lineno="62809">
32258 +<interface name="corenet_receive_pop_client_packets" lineno="62827">
32259 <summary>
32260 Receive pop_client packets.
32261 </summary>
32262 @@ -49349,7 +49433,7 @@ Domain allowed access.
32263 </param>
32264 <infoflow type="read" weight="10"/>
32265 </interface>
32266 -<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="62828">
32267 +<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="62846">
32268 <summary>
32269 Do not audit attempts to receive pop_client packets.
32270 </summary>
32271 @@ -49360,7 +49444,7 @@ Domain allowed access.
32272 </param>
32273 <infoflow type="none"/>
32274 </interface>
32275 -<interface name="corenet_sendrecv_pop_client_packets" lineno="62847">
32276 +<interface name="corenet_sendrecv_pop_client_packets" lineno="62865">
32277 <summary>
32278 Send and receive pop_client packets.
32279 </summary>
32280 @@ -49371,7 +49455,7 @@ Domain allowed access.
32281 </param>
32282 <infoflow type="both" weight="10"/>
32283 </interface>
32284 -<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="62863">
32285 +<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="62881">
32286 <summary>
32287 Do not audit attempts to send and receive pop_client packets.
32288 </summary>
32289 @@ -49382,7 +49466,7 @@ Domain to not audit.
32290 </param>
32291 <infoflow type="none"/>
32292 </interface>
32293 -<interface name="corenet_relabelto_pop_client_packets" lineno="62878">
32294 +<interface name="corenet_relabelto_pop_client_packets" lineno="62896">
32295 <summary>
32296 Relabel packets to pop_client the packet type.
32297 </summary>
32298 @@ -49392,7 +49476,7 @@ Domain allowed access.
32299 </summary>
32300 </param>
32301 </interface>
32302 -<interface name="corenet_send_pop_server_packets" lineno="62898">
32303 +<interface name="corenet_send_pop_server_packets" lineno="62916">
32304 <summary>
32305 Send pop_server packets.
32306 </summary>
32307 @@ -49403,7 +49487,7 @@ Domain allowed access.
32308 </param>
32309 <infoflow type="write" weight="10"/>
32310 </interface>
32311 -<interface name="corenet_dontaudit_send_pop_server_packets" lineno="62917">
32312 +<interface name="corenet_dontaudit_send_pop_server_packets" lineno="62935">
32313 <summary>
32314 Do not audit attempts to send pop_server packets.
32315 </summary>
32316 @@ -49414,7 +49498,7 @@ Domain to not audit.
32317 </param>
32318 <infoflow type="none"/>
32319 </interface>
32320 -<interface name="corenet_receive_pop_server_packets" lineno="62936">
32321 +<interface name="corenet_receive_pop_server_packets" lineno="62954">
32322 <summary>
32323 Receive pop_server packets.
32324 </summary>
32325 @@ -49425,7 +49509,7 @@ Domain allowed access.
32326 </param>
32327 <infoflow type="read" weight="10"/>
32328 </interface>
32329 -<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="62955">
32330 +<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="62973">
32331 <summary>
32332 Do not audit attempts to receive pop_server packets.
32333 </summary>
32334 @@ -49436,7 +49520,7 @@ Domain allowed access.
32335 </param>
32336 <infoflow type="none"/>
32337 </interface>
32338 -<interface name="corenet_sendrecv_pop_server_packets" lineno="62974">
32339 +<interface name="corenet_sendrecv_pop_server_packets" lineno="62992">
32340 <summary>
32341 Send and receive pop_server packets.
32342 </summary>
32343 @@ -49447,7 +49531,7 @@ Domain allowed access.
32344 </param>
32345 <infoflow type="both" weight="10"/>
32346 </interface>
32347 -<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="62990">
32348 +<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="63008">
32349 <summary>
32350 Do not audit attempts to send and receive pop_server packets.
32351 </summary>
32352 @@ -49458,7 +49542,7 @@ Domain to not audit.
32353 </param>
32354 <infoflow type="none"/>
32355 </interface>
32356 -<interface name="corenet_relabelto_pop_server_packets" lineno="63005">
32357 +<interface name="corenet_relabelto_pop_server_packets" lineno="63023">
32358 <summary>
32359 Relabel packets to pop_server the packet type.
32360 </summary>
32361 @@ -49468,7 +49552,7 @@ Domain allowed access.
32362 </summary>
32363 </param>
32364 </interface>
32365 -<interface name="corenet_tcp_sendrecv_portmap_port" lineno="63027">
32366 +<interface name="corenet_tcp_sendrecv_portmap_port" lineno="63045">
32367 <summary>
32368 Send and receive TCP traffic on the portmap port.
32369 </summary>
32370 @@ -49479,7 +49563,7 @@ Domain allowed access.
32371 </param>
32372 <infoflow type="both" weight="10"/>
32373 </interface>
32374 -<interface name="corenet_udp_send_portmap_port" lineno="63042">
32375 +<interface name="corenet_udp_send_portmap_port" lineno="63060">
32376 <summary>
32377 Send UDP traffic on the portmap port.
32378 </summary>
32379 @@ -49490,7 +49574,7 @@ Domain allowed access.
32380 </param>
32381 <infoflow type="write" weight="10"/>
32382 </interface>
32383 -<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="63057">
32384 +<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="63075">
32385 <summary>
32386 Do not audit attempts to send UDP traffic on the portmap port.
32387 </summary>
32388 @@ -49501,7 +49585,7 @@ Domain to not audit.
32389 </param>
32390 <infoflow type="none"/>
32391 </interface>
32392 -<interface name="corenet_udp_receive_portmap_port" lineno="63072">
32393 +<interface name="corenet_udp_receive_portmap_port" lineno="63090">
32394 <summary>
32395 Receive UDP traffic on the portmap port.
32396 </summary>
32397 @@ -49512,7 +49596,7 @@ Domain allowed access.
32398 </param>
32399 <infoflow type="read" weight="10"/>
32400 </interface>
32401 -<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="63087">
32402 +<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="63105">
32403 <summary>
32404 Do not audit attempts to receive UDP traffic on the portmap port.
32405 </summary>
32406 @@ -49523,7 +49607,7 @@ Domain to not audit.
32407 </param>
32408 <infoflow type="none"/>
32409 </interface>
32410 -<interface name="corenet_udp_sendrecv_portmap_port" lineno="63102">
32411 +<interface name="corenet_udp_sendrecv_portmap_port" lineno="63120">
32412 <summary>
32413 Send and receive UDP traffic on the portmap port.
32414 </summary>
32415 @@ -49534,7 +49618,7 @@ Domain allowed access.
32416 </param>
32417 <infoflow type="both" weight="10"/>
32418 </interface>
32419 -<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="63118">
32420 +<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="63136">
32421 <summary>
32422 Do not audit attempts to send and receive
32423 UDP traffic on the portmap port.
32424 @@ -49546,7 +49630,7 @@ Domain to not audit.
32425 </param>
32426 <infoflow type="none"/>
32427 </interface>
32428 -<interface name="corenet_tcp_bind_portmap_port" lineno="63133">
32429 +<interface name="corenet_tcp_bind_portmap_port" lineno="63151">
32430 <summary>
32431 Bind TCP sockets to the portmap port.
32432 </summary>
32433 @@ -49557,7 +49641,7 @@ Domain allowed access.
32434 </param>
32435 <infoflow type="none"/>
32436 </interface>
32437 -<interface name="corenet_udp_bind_portmap_port" lineno="63153">
32438 +<interface name="corenet_udp_bind_portmap_port" lineno="63171">
32439 <summary>
32440 Bind UDP sockets to the portmap port.
32441 </summary>
32442 @@ -49568,7 +49652,7 @@ Domain allowed access.
32443 </param>
32444 <infoflow type="none"/>
32445 </interface>
32446 -<interface name="corenet_tcp_connect_portmap_port" lineno="63172">
32447 +<interface name="corenet_tcp_connect_portmap_port" lineno="63190">
32448 <summary>
32449 Make a TCP connection to the portmap port.
32450 </summary>
32451 @@ -49578,7 +49662,7 @@ Domain allowed access.
32452 </summary>
32453 </param>
32454 </interface>
32455 -<interface name="corenet_send_portmap_client_packets" lineno="63192">
32456 +<interface name="corenet_send_portmap_client_packets" lineno="63210">
32457 <summary>
32458 Send portmap_client packets.
32459 </summary>
32460 @@ -49589,7 +49673,7 @@ Domain allowed access.
32461 </param>
32462 <infoflow type="write" weight="10"/>
32463 </interface>
32464 -<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="63211">
32465 +<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="63229">
32466 <summary>
32467 Do not audit attempts to send portmap_client packets.
32468 </summary>
32469 @@ -49600,7 +49684,7 @@ Domain to not audit.
32470 </param>
32471 <infoflow type="none"/>
32472 </interface>
32473 -<interface name="corenet_receive_portmap_client_packets" lineno="63230">
32474 +<interface name="corenet_receive_portmap_client_packets" lineno="63248">
32475 <summary>
32476 Receive portmap_client packets.
32477 </summary>
32478 @@ -49611,7 +49695,7 @@ Domain allowed access.
32479 </param>
32480 <infoflow type="read" weight="10"/>
32481 </interface>
32482 -<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="63249">
32483 +<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="63267">
32484 <summary>
32485 Do not audit attempts to receive portmap_client packets.
32486 </summary>
32487 @@ -49622,7 +49706,7 @@ Domain allowed access.
32488 </param>
32489 <infoflow type="none"/>
32490 </interface>
32491 -<interface name="corenet_sendrecv_portmap_client_packets" lineno="63268">
32492 +<interface name="corenet_sendrecv_portmap_client_packets" lineno="63286">
32493 <summary>
32494 Send and receive portmap_client packets.
32495 </summary>
32496 @@ -49633,7 +49717,7 @@ Domain allowed access.
32497 </param>
32498 <infoflow type="both" weight="10"/>
32499 </interface>
32500 -<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="63284">
32501 +<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="63302">
32502 <summary>
32503 Do not audit attempts to send and receive portmap_client packets.
32504 </summary>
32505 @@ -49644,7 +49728,7 @@ Domain to not audit.
32506 </param>
32507 <infoflow type="none"/>
32508 </interface>
32509 -<interface name="corenet_relabelto_portmap_client_packets" lineno="63299">
32510 +<interface name="corenet_relabelto_portmap_client_packets" lineno="63317">
32511 <summary>
32512 Relabel packets to portmap_client the packet type.
32513 </summary>
32514 @@ -49654,7 +49738,7 @@ Domain allowed access.
32515 </summary>
32516 </param>
32517 </interface>
32518 -<interface name="corenet_send_portmap_server_packets" lineno="63319">
32519 +<interface name="corenet_send_portmap_server_packets" lineno="63337">
32520 <summary>
32521 Send portmap_server packets.
32522 </summary>
32523 @@ -49665,7 +49749,7 @@ Domain allowed access.
32524 </param>
32525 <infoflow type="write" weight="10"/>
32526 </interface>
32527 -<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="63338">
32528 +<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="63356">
32529 <summary>
32530 Do not audit attempts to send portmap_server packets.
32531 </summary>
32532 @@ -49676,7 +49760,7 @@ Domain to not audit.
32533 </param>
32534 <infoflow type="none"/>
32535 </interface>
32536 -<interface name="corenet_receive_portmap_server_packets" lineno="63357">
32537 +<interface name="corenet_receive_portmap_server_packets" lineno="63375">
32538 <summary>
32539 Receive portmap_server packets.
32540 </summary>
32541 @@ -49687,7 +49771,7 @@ Domain allowed access.
32542 </param>
32543 <infoflow type="read" weight="10"/>
32544 </interface>
32545 -<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="63376">
32546 +<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="63394">
32547 <summary>
32548 Do not audit attempts to receive portmap_server packets.
32549 </summary>
32550 @@ -49698,7 +49782,7 @@ Domain allowed access.
32551 </param>
32552 <infoflow type="none"/>
32553 </interface>
32554 -<interface name="corenet_sendrecv_portmap_server_packets" lineno="63395">
32555 +<interface name="corenet_sendrecv_portmap_server_packets" lineno="63413">
32556 <summary>
32557 Send and receive portmap_server packets.
32558 </summary>
32559 @@ -49709,7 +49793,7 @@ Domain allowed access.
32560 </param>
32561 <infoflow type="both" weight="10"/>
32562 </interface>
32563 -<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="63411">
32564 +<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="63429">
32565 <summary>
32566 Do not audit attempts to send and receive portmap_server packets.
32567 </summary>
32568 @@ -49720,7 +49804,7 @@ Domain to not audit.
32569 </param>
32570 <infoflow type="none"/>
32571 </interface>
32572 -<interface name="corenet_relabelto_portmap_server_packets" lineno="63426">
32573 +<interface name="corenet_relabelto_portmap_server_packets" lineno="63444">
32574 <summary>
32575 Relabel packets to portmap_server the packet type.
32576 </summary>
32577 @@ -49730,7 +49814,7 @@ Domain allowed access.
32578 </summary>
32579 </param>
32580 </interface>
32581 -<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="63448">
32582 +<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="63466">
32583 <summary>
32584 Send and receive TCP traffic on the postfix_policyd port.
32585 </summary>
32586 @@ -49741,7 +49825,7 @@ Domain allowed access.
32587 </param>
32588 <infoflow type="both" weight="10"/>
32589 </interface>
32590 -<interface name="corenet_udp_send_postfix_policyd_port" lineno="63463">
32591 +<interface name="corenet_udp_send_postfix_policyd_port" lineno="63481">
32592 <summary>
32593 Send UDP traffic on the postfix_policyd port.
32594 </summary>
32595 @@ -49752,7 +49836,7 @@ Domain allowed access.
32596 </param>
32597 <infoflow type="write" weight="10"/>
32598 </interface>
32599 -<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="63478">
32600 +<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="63496">
32601 <summary>
32602 Do not audit attempts to send UDP traffic on the postfix_policyd port.
32603 </summary>
32604 @@ -49763,7 +49847,7 @@ Domain to not audit.
32605 </param>
32606 <infoflow type="none"/>
32607 </interface>
32608 -<interface name="corenet_udp_receive_postfix_policyd_port" lineno="63493">
32609 +<interface name="corenet_udp_receive_postfix_policyd_port" lineno="63511">
32610 <summary>
32611 Receive UDP traffic on the postfix_policyd port.
32612 </summary>
32613 @@ -49774,7 +49858,7 @@ Domain allowed access.
32614 </param>
32615 <infoflow type="read" weight="10"/>
32616 </interface>
32617 -<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="63508">
32618 +<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="63526">
32619 <summary>
32620 Do not audit attempts to receive UDP traffic on the postfix_policyd port.
32621 </summary>
32622 @@ -49785,7 +49869,7 @@ Domain to not audit.
32623 </param>
32624 <infoflow type="none"/>
32625 </interface>
32626 -<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="63523">
32627 +<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="63541">
32628 <summary>
32629 Send and receive UDP traffic on the postfix_policyd port.
32630 </summary>
32631 @@ -49796,7 +49880,7 @@ Domain allowed access.
32632 </param>
32633 <infoflow type="both" weight="10"/>
32634 </interface>
32635 -<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="63539">
32636 +<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="63557">
32637 <summary>
32638 Do not audit attempts to send and receive
32639 UDP traffic on the postfix_policyd port.
32640 @@ -49808,7 +49892,7 @@ Domain to not audit.
32641 </param>
32642 <infoflow type="none"/>
32643 </interface>
32644 -<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="63554">
32645 +<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="63572">
32646 <summary>
32647 Bind TCP sockets to the postfix_policyd port.
32648 </summary>
32649 @@ -49819,7 +49903,7 @@ Domain allowed access.
32650 </param>
32651 <infoflow type="none"/>
32652 </interface>
32653 -<interface name="corenet_udp_bind_postfix_policyd_port" lineno="63574">
32654 +<interface name="corenet_udp_bind_postfix_policyd_port" lineno="63592">
32655 <summary>
32656 Bind UDP sockets to the postfix_policyd port.
32657 </summary>
32658 @@ -49830,7 +49914,7 @@ Domain allowed access.
32659 </param>
32660 <infoflow type="none"/>
32661 </interface>
32662 -<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="63593">
32663 +<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="63611">
32664 <summary>
32665 Make a TCP connection to the postfix_policyd port.
32666 </summary>
32667 @@ -49840,7 +49924,7 @@ Domain allowed access.
32668 </summary>
32669 </param>
32670 </interface>
32671 -<interface name="corenet_send_postfix_policyd_client_packets" lineno="63613">
32672 +<interface name="corenet_send_postfix_policyd_client_packets" lineno="63631">
32673 <summary>
32674 Send postfix_policyd_client packets.
32675 </summary>
32676 @@ -49851,7 +49935,7 @@ Domain allowed access.
32677 </param>
32678 <infoflow type="write" weight="10"/>
32679 </interface>
32680 -<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="63632">
32681 +<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="63650">
32682 <summary>
32683 Do not audit attempts to send postfix_policyd_client packets.
32684 </summary>
32685 @@ -49862,7 +49946,7 @@ Domain to not audit.
32686 </param>
32687 <infoflow type="none"/>
32688 </interface>
32689 -<interface name="corenet_receive_postfix_policyd_client_packets" lineno="63651">
32690 +<interface name="corenet_receive_postfix_policyd_client_packets" lineno="63669">
32691 <summary>
32692 Receive postfix_policyd_client packets.
32693 </summary>
32694 @@ -49873,7 +49957,7 @@ Domain allowed access.
32695 </param>
32696 <infoflow type="read" weight="10"/>
32697 </interface>
32698 -<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="63670">
32699 +<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="63688">
32700 <summary>
32701 Do not audit attempts to receive postfix_policyd_client packets.
32702 </summary>
32703 @@ -49884,7 +49968,7 @@ Domain allowed access.
32704 </param>
32705 <infoflow type="none"/>
32706 </interface>
32707 -<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="63689">
32708 +<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="63707">
32709 <summary>
32710 Send and receive postfix_policyd_client packets.
32711 </summary>
32712 @@ -49895,7 +49979,7 @@ Domain allowed access.
32713 </param>
32714 <infoflow type="both" weight="10"/>
32715 </interface>
32716 -<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="63705">
32717 +<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="63723">
32718 <summary>
32719 Do not audit attempts to send and receive postfix_policyd_client packets.
32720 </summary>
32721 @@ -49906,7 +49990,7 @@ Domain to not audit.
32722 </param>
32723 <infoflow type="none"/>
32724 </interface>
32725 -<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="63720">
32726 +<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="63738">
32727 <summary>
32728 Relabel packets to postfix_policyd_client the packet type.
32729 </summary>
32730 @@ -49916,7 +50000,7 @@ Domain allowed access.
32731 </summary>
32732 </param>
32733 </interface>
32734 -<interface name="corenet_send_postfix_policyd_server_packets" lineno="63740">
32735 +<interface name="corenet_send_postfix_policyd_server_packets" lineno="63758">
32736 <summary>
32737 Send postfix_policyd_server packets.
32738 </summary>
32739 @@ -49927,7 +50011,7 @@ Domain allowed access.
32740 </param>
32741 <infoflow type="write" weight="10"/>
32742 </interface>
32743 -<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="63759">
32744 +<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="63777">
32745 <summary>
32746 Do not audit attempts to send postfix_policyd_server packets.
32747 </summary>
32748 @@ -49938,7 +50022,7 @@ Domain to not audit.
32749 </param>
32750 <infoflow type="none"/>
32751 </interface>
32752 -<interface name="corenet_receive_postfix_policyd_server_packets" lineno="63778">
32753 +<interface name="corenet_receive_postfix_policyd_server_packets" lineno="63796">
32754 <summary>
32755 Receive postfix_policyd_server packets.
32756 </summary>
32757 @@ -49949,7 +50033,7 @@ Domain allowed access.
32758 </param>
32759 <infoflow type="read" weight="10"/>
32760 </interface>
32761 -<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="63797">
32762 +<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="63815">
32763 <summary>
32764 Do not audit attempts to receive postfix_policyd_server packets.
32765 </summary>
32766 @@ -49960,7 +50044,7 @@ Domain allowed access.
32767 </param>
32768 <infoflow type="none"/>
32769 </interface>
32770 -<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="63816">
32771 +<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="63834">
32772 <summary>
32773 Send and receive postfix_policyd_server packets.
32774 </summary>
32775 @@ -49971,7 +50055,7 @@ Domain allowed access.
32776 </param>
32777 <infoflow type="both" weight="10"/>
32778 </interface>
32779 -<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="63832">
32780 +<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="63850">
32781 <summary>
32782 Do not audit attempts to send and receive postfix_policyd_server packets.
32783 </summary>
32784 @@ -49982,7 +50066,7 @@ Domain to not audit.
32785 </param>
32786 <infoflow type="none"/>
32787 </interface>
32788 -<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="63847">
32789 +<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="63865">
32790 <summary>
32791 Relabel packets to postfix_policyd_server the packet type.
32792 </summary>
32793 @@ -49992,7 +50076,7 @@ Domain allowed access.
32794 </summary>
32795 </param>
32796 </interface>
32797 -<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="63869">
32798 +<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="63887">
32799 <summary>
32800 Send and receive TCP traffic on the postgresql port.
32801 </summary>
32802 @@ -50003,7 +50087,7 @@ Domain allowed access.
32803 </param>
32804 <infoflow type="both" weight="10"/>
32805 </interface>
32806 -<interface name="corenet_udp_send_postgresql_port" lineno="63884">
32807 +<interface name="corenet_udp_send_postgresql_port" lineno="63902">
32808 <summary>
32809 Send UDP traffic on the postgresql port.
32810 </summary>
32811 @@ -50014,7 +50098,7 @@ Domain allowed access.
32812 </param>
32813 <infoflow type="write" weight="10"/>
32814 </interface>
32815 -<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="63899">
32816 +<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="63917">
32817 <summary>
32818 Do not audit attempts to send UDP traffic on the postgresql port.
32819 </summary>
32820 @@ -50025,7 +50109,7 @@ Domain to not audit.
32821 </param>
32822 <infoflow type="none"/>
32823 </interface>
32824 -<interface name="corenet_udp_receive_postgresql_port" lineno="63914">
32825 +<interface name="corenet_udp_receive_postgresql_port" lineno="63932">
32826 <summary>
32827 Receive UDP traffic on the postgresql port.
32828 </summary>
32829 @@ -50036,7 +50120,7 @@ Domain allowed access.
32830 </param>
32831 <infoflow type="read" weight="10"/>
32832 </interface>
32833 -<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="63929">
32834 +<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="63947">
32835 <summary>
32836 Do not audit attempts to receive UDP traffic on the postgresql port.
32837 </summary>
32838 @@ -50047,7 +50131,7 @@ Domain to not audit.
32839 </param>
32840 <infoflow type="none"/>
32841 </interface>
32842 -<interface name="corenet_udp_sendrecv_postgresql_port" lineno="63944">
32843 +<interface name="corenet_udp_sendrecv_postgresql_port" lineno="63962">
32844 <summary>
32845 Send and receive UDP traffic on the postgresql port.
32846 </summary>
32847 @@ -50058,7 +50142,7 @@ Domain allowed access.
32848 </param>
32849 <infoflow type="both" weight="10"/>
32850 </interface>
32851 -<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="63960">
32852 +<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="63978">
32853 <summary>
32854 Do not audit attempts to send and receive
32855 UDP traffic on the postgresql port.
32856 @@ -50070,7 +50154,7 @@ Domain to not audit.
32857 </param>
32858 <infoflow type="none"/>
32859 </interface>
32860 -<interface name="corenet_tcp_bind_postgresql_port" lineno="63975">
32861 +<interface name="corenet_tcp_bind_postgresql_port" lineno="63993">
32862 <summary>
32863 Bind TCP sockets to the postgresql port.
32864 </summary>
32865 @@ -50081,7 +50165,7 @@ Domain allowed access.
32866 </param>
32867 <infoflow type="none"/>
32868 </interface>
32869 -<interface name="corenet_udp_bind_postgresql_port" lineno="63995">
32870 +<interface name="corenet_udp_bind_postgresql_port" lineno="64013">
32871 <summary>
32872 Bind UDP sockets to the postgresql port.
32873 </summary>
32874 @@ -50092,7 +50176,7 @@ Domain allowed access.
32875 </param>
32876 <infoflow type="none"/>
32877 </interface>
32878 -<interface name="corenet_tcp_connect_postgresql_port" lineno="64014">
32879 +<interface name="corenet_tcp_connect_postgresql_port" lineno="64032">
32880 <summary>
32881 Make a TCP connection to the postgresql port.
32882 </summary>
32883 @@ -50102,7 +50186,7 @@ Domain allowed access.
32884 </summary>
32885 </param>
32886 </interface>
32887 -<interface name="corenet_send_postgresql_client_packets" lineno="64034">
32888 +<interface name="corenet_send_postgresql_client_packets" lineno="64052">
32889 <summary>
32890 Send postgresql_client packets.
32891 </summary>
32892 @@ -50113,7 +50197,7 @@ Domain allowed access.
32893 </param>
32894 <infoflow type="write" weight="10"/>
32895 </interface>
32896 -<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="64053">
32897 +<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="64071">
32898 <summary>
32899 Do not audit attempts to send postgresql_client packets.
32900 </summary>
32901 @@ -50124,7 +50208,7 @@ Domain to not audit.
32902 </param>
32903 <infoflow type="none"/>
32904 </interface>
32905 -<interface name="corenet_receive_postgresql_client_packets" lineno="64072">
32906 +<interface name="corenet_receive_postgresql_client_packets" lineno="64090">
32907 <summary>
32908 Receive postgresql_client packets.
32909 </summary>
32910 @@ -50135,7 +50219,7 @@ Domain allowed access.
32911 </param>
32912 <infoflow type="read" weight="10"/>
32913 </interface>
32914 -<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="64091">
32915 +<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="64109">
32916 <summary>
32917 Do not audit attempts to receive postgresql_client packets.
32918 </summary>
32919 @@ -50146,7 +50230,7 @@ Domain allowed access.
32920 </param>
32921 <infoflow type="none"/>
32922 </interface>
32923 -<interface name="corenet_sendrecv_postgresql_client_packets" lineno="64110">
32924 +<interface name="corenet_sendrecv_postgresql_client_packets" lineno="64128">
32925 <summary>
32926 Send and receive postgresql_client packets.
32927 </summary>
32928 @@ -50157,7 +50241,7 @@ Domain allowed access.
32929 </param>
32930 <infoflow type="both" weight="10"/>
32931 </interface>
32932 -<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="64126">
32933 +<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="64144">
32934 <summary>
32935 Do not audit attempts to send and receive postgresql_client packets.
32936 </summary>
32937 @@ -50168,7 +50252,7 @@ Domain to not audit.
32938 </param>
32939 <infoflow type="none"/>
32940 </interface>
32941 -<interface name="corenet_relabelto_postgresql_client_packets" lineno="64141">
32942 +<interface name="corenet_relabelto_postgresql_client_packets" lineno="64159">
32943 <summary>
32944 Relabel packets to postgresql_client the packet type.
32945 </summary>
32946 @@ -50178,7 +50262,7 @@ Domain allowed access.
32947 </summary>
32948 </param>
32949 </interface>
32950 -<interface name="corenet_send_postgresql_server_packets" lineno="64161">
32951 +<interface name="corenet_send_postgresql_server_packets" lineno="64179">
32952 <summary>
32953 Send postgresql_server packets.
32954 </summary>
32955 @@ -50189,7 +50273,7 @@ Domain allowed access.
32956 </param>
32957 <infoflow type="write" weight="10"/>
32958 </interface>
32959 -<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="64180">
32960 +<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="64198">
32961 <summary>
32962 Do not audit attempts to send postgresql_server packets.
32963 </summary>
32964 @@ -50200,7 +50284,7 @@ Domain to not audit.
32965 </param>
32966 <infoflow type="none"/>
32967 </interface>
32968 -<interface name="corenet_receive_postgresql_server_packets" lineno="64199">
32969 +<interface name="corenet_receive_postgresql_server_packets" lineno="64217">
32970 <summary>
32971 Receive postgresql_server packets.
32972 </summary>
32973 @@ -50211,7 +50295,7 @@ Domain allowed access.
32974 </param>
32975 <infoflow type="read" weight="10"/>
32976 </interface>
32977 -<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="64218">
32978 +<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="64236">
32979 <summary>
32980 Do not audit attempts to receive postgresql_server packets.
32981 </summary>
32982 @@ -50222,7 +50306,7 @@ Domain allowed access.
32983 </param>
32984 <infoflow type="none"/>
32985 </interface>
32986 -<interface name="corenet_sendrecv_postgresql_server_packets" lineno="64237">
32987 +<interface name="corenet_sendrecv_postgresql_server_packets" lineno="64255">
32988 <summary>
32989 Send and receive postgresql_server packets.
32990 </summary>
32991 @@ -50233,7 +50317,7 @@ Domain allowed access.
32992 </param>
32993 <infoflow type="both" weight="10"/>
32994 </interface>
32995 -<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="64253">
32996 +<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="64271">
32997 <summary>
32998 Do not audit attempts to send and receive postgresql_server packets.
32999 </summary>
33000 @@ -50244,7 +50328,7 @@ Domain to not audit.
33001 </param>
33002 <infoflow type="none"/>
33003 </interface>
33004 -<interface name="corenet_relabelto_postgresql_server_packets" lineno="64268">
33005 +<interface name="corenet_relabelto_postgresql_server_packets" lineno="64286">
33006 <summary>
33007 Relabel packets to postgresql_server the packet type.
33008 </summary>
33009 @@ -50254,7 +50338,7 @@ Domain allowed access.
33010 </summary>
33011 </param>
33012 </interface>
33013 -<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="64290">
33014 +<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="64308">
33015 <summary>
33016 Send and receive TCP traffic on the postgrey port.
33017 </summary>
33018 @@ -50265,7 +50349,7 @@ Domain allowed access.
33019 </param>
33020 <infoflow type="both" weight="10"/>
33021 </interface>
33022 -<interface name="corenet_udp_send_postgrey_port" lineno="64305">
33023 +<interface name="corenet_udp_send_postgrey_port" lineno="64323">
33024 <summary>
33025 Send UDP traffic on the postgrey port.
33026 </summary>
33027 @@ -50276,7 +50360,7 @@ Domain allowed access.
33028 </param>
33029 <infoflow type="write" weight="10"/>
33030 </interface>
33031 -<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="64320">
33032 +<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="64338">
33033 <summary>
33034 Do not audit attempts to send UDP traffic on the postgrey port.
33035 </summary>
33036 @@ -50287,7 +50371,7 @@ Domain to not audit.
33037 </param>
33038 <infoflow type="none"/>
33039 </interface>
33040 -<interface name="corenet_udp_receive_postgrey_port" lineno="64335">
33041 +<interface name="corenet_udp_receive_postgrey_port" lineno="64353">
33042 <summary>
33043 Receive UDP traffic on the postgrey port.
33044 </summary>
33045 @@ -50298,7 +50382,7 @@ Domain allowed access.
33046 </param>
33047 <infoflow type="read" weight="10"/>
33048 </interface>
33049 -<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="64350">
33050 +<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="64368">
33051 <summary>
33052 Do not audit attempts to receive UDP traffic on the postgrey port.
33053 </summary>
33054 @@ -50309,7 +50393,7 @@ Domain to not audit.
33055 </param>
33056 <infoflow type="none"/>
33057 </interface>
33058 -<interface name="corenet_udp_sendrecv_postgrey_port" lineno="64365">
33059 +<interface name="corenet_udp_sendrecv_postgrey_port" lineno="64383">
33060 <summary>
33061 Send and receive UDP traffic on the postgrey port.
33062 </summary>
33063 @@ -50320,7 +50404,7 @@ Domain allowed access.
33064 </param>
33065 <infoflow type="both" weight="10"/>
33066 </interface>
33067 -<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="64381">
33068 +<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="64399">
33069 <summary>
33070 Do not audit attempts to send and receive
33071 UDP traffic on the postgrey port.
33072 @@ -50332,7 +50416,7 @@ Domain to not audit.
33073 </param>
33074 <infoflow type="none"/>
33075 </interface>
33076 -<interface name="corenet_tcp_bind_postgrey_port" lineno="64396">
33077 +<interface name="corenet_tcp_bind_postgrey_port" lineno="64414">
33078 <summary>
33079 Bind TCP sockets to the postgrey port.
33080 </summary>
33081 @@ -50343,7 +50427,7 @@ Domain allowed access.
33082 </param>
33083 <infoflow type="none"/>
33084 </interface>
33085 -<interface name="corenet_udp_bind_postgrey_port" lineno="64416">
33086 +<interface name="corenet_udp_bind_postgrey_port" lineno="64434">
33087 <summary>
33088 Bind UDP sockets to the postgrey port.
33089 </summary>
33090 @@ -50354,7 +50438,7 @@ Domain allowed access.
33091 </param>
33092 <infoflow type="none"/>
33093 </interface>
33094 -<interface name="corenet_tcp_connect_postgrey_port" lineno="64435">
33095 +<interface name="corenet_tcp_connect_postgrey_port" lineno="64453">
33096 <summary>
33097 Make a TCP connection to the postgrey port.
33098 </summary>
33099 @@ -50364,7 +50448,7 @@ Domain allowed access.
33100 </summary>
33101 </param>
33102 </interface>
33103 -<interface name="corenet_send_postgrey_client_packets" lineno="64455">
33104 +<interface name="corenet_send_postgrey_client_packets" lineno="64473">
33105 <summary>
33106 Send postgrey_client packets.
33107 </summary>
33108 @@ -50375,7 +50459,7 @@ Domain allowed access.
33109 </param>
33110 <infoflow type="write" weight="10"/>
33111 </interface>
33112 -<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="64474">
33113 +<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="64492">
33114 <summary>
33115 Do not audit attempts to send postgrey_client packets.
33116 </summary>
33117 @@ -50386,7 +50470,7 @@ Domain to not audit.
33118 </param>
33119 <infoflow type="none"/>
33120 </interface>
33121 -<interface name="corenet_receive_postgrey_client_packets" lineno="64493">
33122 +<interface name="corenet_receive_postgrey_client_packets" lineno="64511">
33123 <summary>
33124 Receive postgrey_client packets.
33125 </summary>
33126 @@ -50397,7 +50481,7 @@ Domain allowed access.
33127 </param>
33128 <infoflow type="read" weight="10"/>
33129 </interface>
33130 -<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="64512">
33131 +<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="64530">
33132 <summary>
33133 Do not audit attempts to receive postgrey_client packets.
33134 </summary>
33135 @@ -50408,7 +50492,7 @@ Domain allowed access.
33136 </param>
33137 <infoflow type="none"/>
33138 </interface>
33139 -<interface name="corenet_sendrecv_postgrey_client_packets" lineno="64531">
33140 +<interface name="corenet_sendrecv_postgrey_client_packets" lineno="64549">
33141 <summary>
33142 Send and receive postgrey_client packets.
33143 </summary>
33144 @@ -50419,7 +50503,7 @@ Domain allowed access.
33145 </param>
33146 <infoflow type="both" weight="10"/>
33147 </interface>
33148 -<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="64547">
33149 +<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="64565">
33150 <summary>
33151 Do not audit attempts to send and receive postgrey_client packets.
33152 </summary>
33153 @@ -50430,7 +50514,7 @@ Domain to not audit.
33154 </param>
33155 <infoflow type="none"/>
33156 </interface>
33157 -<interface name="corenet_relabelto_postgrey_client_packets" lineno="64562">
33158 +<interface name="corenet_relabelto_postgrey_client_packets" lineno="64580">
33159 <summary>
33160 Relabel packets to postgrey_client the packet type.
33161 </summary>
33162 @@ -50440,7 +50524,7 @@ Domain allowed access.
33163 </summary>
33164 </param>
33165 </interface>
33166 -<interface name="corenet_send_postgrey_server_packets" lineno="64582">
33167 +<interface name="corenet_send_postgrey_server_packets" lineno="64600">
33168 <summary>
33169 Send postgrey_server packets.
33170 </summary>
33171 @@ -50451,7 +50535,7 @@ Domain allowed access.
33172 </param>
33173 <infoflow type="write" weight="10"/>
33174 </interface>
33175 -<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="64601">
33176 +<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="64619">
33177 <summary>
33178 Do not audit attempts to send postgrey_server packets.
33179 </summary>
33180 @@ -50462,7 +50546,7 @@ Domain to not audit.
33181 </param>
33182 <infoflow type="none"/>
33183 </interface>
33184 -<interface name="corenet_receive_postgrey_server_packets" lineno="64620">
33185 +<interface name="corenet_receive_postgrey_server_packets" lineno="64638">
33186 <summary>
33187 Receive postgrey_server packets.
33188 </summary>
33189 @@ -50473,7 +50557,7 @@ Domain allowed access.
33190 </param>
33191 <infoflow type="read" weight="10"/>
33192 </interface>
33193 -<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="64639">
33194 +<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="64657">
33195 <summary>
33196 Do not audit attempts to receive postgrey_server packets.
33197 </summary>
33198 @@ -50484,7 +50568,7 @@ Domain allowed access.
33199 </param>
33200 <infoflow type="none"/>
33201 </interface>
33202 -<interface name="corenet_sendrecv_postgrey_server_packets" lineno="64658">
33203 +<interface name="corenet_sendrecv_postgrey_server_packets" lineno="64676">
33204 <summary>
33205 Send and receive postgrey_server packets.
33206 </summary>
33207 @@ -50495,7 +50579,7 @@ Domain allowed access.
33208 </param>
33209 <infoflow type="both" weight="10"/>
33210 </interface>
33211 -<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="64674">
33212 +<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="64692">
33213 <summary>
33214 Do not audit attempts to send and receive postgrey_server packets.
33215 </summary>
33216 @@ -50506,7 +50590,7 @@ Domain to not audit.
33217 </param>
33218 <infoflow type="none"/>
33219 </interface>
33220 -<interface name="corenet_relabelto_postgrey_server_packets" lineno="64689">
33221 +<interface name="corenet_relabelto_postgrey_server_packets" lineno="64707">
33222 <summary>
33223 Relabel packets to postgrey_server the packet type.
33224 </summary>
33225 @@ -50516,7 +50600,7 @@ Domain allowed access.
33226 </summary>
33227 </param>
33228 </interface>
33229 -<interface name="corenet_tcp_sendrecv_pptp_port" lineno="64711">
33230 +<interface name="corenet_tcp_sendrecv_pptp_port" lineno="64729">
33231 <summary>
33232 Send and receive TCP traffic on the pptp port.
33233 </summary>
33234 @@ -50527,7 +50611,7 @@ Domain allowed access.
33235 </param>
33236 <infoflow type="both" weight="10"/>
33237 </interface>
33238 -<interface name="corenet_udp_send_pptp_port" lineno="64726">
33239 +<interface name="corenet_udp_send_pptp_port" lineno="64744">
33240 <summary>
33241 Send UDP traffic on the pptp port.
33242 </summary>
33243 @@ -50538,7 +50622,7 @@ Domain allowed access.
33244 </param>
33245 <infoflow type="write" weight="10"/>
33246 </interface>
33247 -<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="64741">
33248 +<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="64759">
33249 <summary>
33250 Do not audit attempts to send UDP traffic on the pptp port.
33251 </summary>
33252 @@ -50549,7 +50633,7 @@ Domain to not audit.
33253 </param>
33254 <infoflow type="none"/>
33255 </interface>
33256 -<interface name="corenet_udp_receive_pptp_port" lineno="64756">
33257 +<interface name="corenet_udp_receive_pptp_port" lineno="64774">
33258 <summary>
33259 Receive UDP traffic on the pptp port.
33260 </summary>
33261 @@ -50560,7 +50644,7 @@ Domain allowed access.
33262 </param>
33263 <infoflow type="read" weight="10"/>
33264 </interface>
33265 -<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="64771">
33266 +<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="64789">
33267 <summary>
33268 Do not audit attempts to receive UDP traffic on the pptp port.
33269 </summary>
33270 @@ -50571,7 +50655,7 @@ Domain to not audit.
33271 </param>
33272 <infoflow type="none"/>
33273 </interface>
33274 -<interface name="corenet_udp_sendrecv_pptp_port" lineno="64786">
33275 +<interface name="corenet_udp_sendrecv_pptp_port" lineno="64804">
33276 <summary>
33277 Send and receive UDP traffic on the pptp port.
33278 </summary>
33279 @@ -50582,7 +50666,7 @@ Domain allowed access.
33280 </param>
33281 <infoflow type="both" weight="10"/>
33282 </interface>
33283 -<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="64802">
33284 +<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="64820">
33285 <summary>
33286 Do not audit attempts to send and receive
33287 UDP traffic on the pptp port.
33288 @@ -50594,7 +50678,7 @@ Domain to not audit.
33289 </param>
33290 <infoflow type="none"/>
33291 </interface>
33292 -<interface name="corenet_tcp_bind_pptp_port" lineno="64817">
33293 +<interface name="corenet_tcp_bind_pptp_port" lineno="64835">
33294 <summary>
33295 Bind TCP sockets to the pptp port.
33296 </summary>
33297 @@ -50605,7 +50689,7 @@ Domain allowed access.
33298 </param>
33299 <infoflow type="none"/>
33300 </interface>
33301 -<interface name="corenet_udp_bind_pptp_port" lineno="64837">
33302 +<interface name="corenet_udp_bind_pptp_port" lineno="64855">
33303 <summary>
33304 Bind UDP sockets to the pptp port.
33305 </summary>
33306 @@ -50616,7 +50700,7 @@ Domain allowed access.
33307 </param>
33308 <infoflow type="none"/>
33309 </interface>
33310 -<interface name="corenet_tcp_connect_pptp_port" lineno="64856">
33311 +<interface name="corenet_tcp_connect_pptp_port" lineno="64874">
33312 <summary>
33313 Make a TCP connection to the pptp port.
33314 </summary>
33315 @@ -50626,7 +50710,7 @@ Domain allowed access.
33316 </summary>
33317 </param>
33318 </interface>
33319 -<interface name="corenet_send_pptp_client_packets" lineno="64876">
33320 +<interface name="corenet_send_pptp_client_packets" lineno="64894">
33321 <summary>
33322 Send pptp_client packets.
33323 </summary>
33324 @@ -50637,7 +50721,7 @@ Domain allowed access.
33325 </param>
33326 <infoflow type="write" weight="10"/>
33327 </interface>
33328 -<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="64895">
33329 +<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="64913">
33330 <summary>
33331 Do not audit attempts to send pptp_client packets.
33332 </summary>
33333 @@ -50648,7 +50732,7 @@ Domain to not audit.
33334 </param>
33335 <infoflow type="none"/>
33336 </interface>
33337 -<interface name="corenet_receive_pptp_client_packets" lineno="64914">
33338 +<interface name="corenet_receive_pptp_client_packets" lineno="64932">
33339 <summary>
33340 Receive pptp_client packets.
33341 </summary>
33342 @@ -50659,7 +50743,7 @@ Domain allowed access.
33343 </param>
33344 <infoflow type="read" weight="10"/>
33345 </interface>
33346 -<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="64933">
33347 +<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="64951">
33348 <summary>
33349 Do not audit attempts to receive pptp_client packets.
33350 </summary>
33351 @@ -50670,7 +50754,7 @@ Domain allowed access.
33352 </param>
33353 <infoflow type="none"/>
33354 </interface>
33355 -<interface name="corenet_sendrecv_pptp_client_packets" lineno="64952">
33356 +<interface name="corenet_sendrecv_pptp_client_packets" lineno="64970">
33357 <summary>
33358 Send and receive pptp_client packets.
33359 </summary>
33360 @@ -50681,7 +50765,7 @@ Domain allowed access.
33361 </param>
33362 <infoflow type="both" weight="10"/>
33363 </interface>
33364 -<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="64968">
33365 +<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="64986">
33366 <summary>
33367 Do not audit attempts to send and receive pptp_client packets.
33368 </summary>
33369 @@ -50692,7 +50776,7 @@ Domain to not audit.
33370 </param>
33371 <infoflow type="none"/>
33372 </interface>
33373 -<interface name="corenet_relabelto_pptp_client_packets" lineno="64983">
33374 +<interface name="corenet_relabelto_pptp_client_packets" lineno="65001">
33375 <summary>
33376 Relabel packets to pptp_client the packet type.
33377 </summary>
33378 @@ -50702,7 +50786,7 @@ Domain allowed access.
33379 </summary>
33380 </param>
33381 </interface>
33382 -<interface name="corenet_send_pptp_server_packets" lineno="65003">
33383 +<interface name="corenet_send_pptp_server_packets" lineno="65021">
33384 <summary>
33385 Send pptp_server packets.
33386 </summary>
33387 @@ -50713,7 +50797,7 @@ Domain allowed access.
33388 </param>
33389 <infoflow type="write" weight="10"/>
33390 </interface>
33391 -<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="65022">
33392 +<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="65040">
33393 <summary>
33394 Do not audit attempts to send pptp_server packets.
33395 </summary>
33396 @@ -50724,7 +50808,7 @@ Domain to not audit.
33397 </param>
33398 <infoflow type="none"/>
33399 </interface>
33400 -<interface name="corenet_receive_pptp_server_packets" lineno="65041">
33401 +<interface name="corenet_receive_pptp_server_packets" lineno="65059">
33402 <summary>
33403 Receive pptp_server packets.
33404 </summary>
33405 @@ -50735,7 +50819,7 @@ Domain allowed access.
33406 </param>
33407 <infoflow type="read" weight="10"/>
33408 </interface>
33409 -<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="65060">
33410 +<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="65078">
33411 <summary>
33412 Do not audit attempts to receive pptp_server packets.
33413 </summary>
33414 @@ -50746,7 +50830,7 @@ Domain allowed access.
33415 </param>
33416 <infoflow type="none"/>
33417 </interface>
33418 -<interface name="corenet_sendrecv_pptp_server_packets" lineno="65079">
33419 +<interface name="corenet_sendrecv_pptp_server_packets" lineno="65097">
33420 <summary>
33421 Send and receive pptp_server packets.
33422 </summary>
33423 @@ -50757,7 +50841,7 @@ Domain allowed access.
33424 </param>
33425 <infoflow type="both" weight="10"/>
33426 </interface>
33427 -<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="65095">
33428 +<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="65113">
33429 <summary>
33430 Do not audit attempts to send and receive pptp_server packets.
33431 </summary>
33432 @@ -50768,7 +50852,7 @@ Domain to not audit.
33433 </param>
33434 <infoflow type="none"/>
33435 </interface>
33436 -<interface name="corenet_relabelto_pptp_server_packets" lineno="65110">
33437 +<interface name="corenet_relabelto_pptp_server_packets" lineno="65128">
33438 <summary>
33439 Relabel packets to pptp_server the packet type.
33440 </summary>
33441 @@ -50778,7 +50862,7 @@ Domain allowed access.
33442 </summary>
33443 </param>
33444 </interface>
33445 -<interface name="corenet_tcp_sendrecv_prelude_port" lineno="65132">
33446 +<interface name="corenet_tcp_sendrecv_prelude_port" lineno="65150">
33447 <summary>
33448 Send and receive TCP traffic on the prelude port.
33449 </summary>
33450 @@ -50789,7 +50873,7 @@ Domain allowed access.
33451 </param>
33452 <infoflow type="both" weight="10"/>
33453 </interface>
33454 -<interface name="corenet_udp_send_prelude_port" lineno="65147">
33455 +<interface name="corenet_udp_send_prelude_port" lineno="65165">
33456 <summary>
33457 Send UDP traffic on the prelude port.
33458 </summary>
33459 @@ -50800,7 +50884,7 @@ Domain allowed access.
33460 </param>
33461 <infoflow type="write" weight="10"/>
33462 </interface>
33463 -<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="65162">
33464 +<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="65180">
33465 <summary>
33466 Do not audit attempts to send UDP traffic on the prelude port.
33467 </summary>
33468 @@ -50811,7 +50895,7 @@ Domain to not audit.
33469 </param>
33470 <infoflow type="none"/>
33471 </interface>
33472 -<interface name="corenet_udp_receive_prelude_port" lineno="65177">
33473 +<interface name="corenet_udp_receive_prelude_port" lineno="65195">
33474 <summary>
33475 Receive UDP traffic on the prelude port.
33476 </summary>
33477 @@ -50822,7 +50906,7 @@ Domain allowed access.
33478 </param>
33479 <infoflow type="read" weight="10"/>
33480 </interface>
33481 -<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="65192">
33482 +<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="65210">
33483 <summary>
33484 Do not audit attempts to receive UDP traffic on the prelude port.
33485 </summary>
33486 @@ -50833,7 +50917,7 @@ Domain to not audit.
33487 </param>
33488 <infoflow type="none"/>
33489 </interface>
33490 -<interface name="corenet_udp_sendrecv_prelude_port" lineno="65207">
33491 +<interface name="corenet_udp_sendrecv_prelude_port" lineno="65225">
33492 <summary>
33493 Send and receive UDP traffic on the prelude port.
33494 </summary>
33495 @@ -50844,7 +50928,7 @@ Domain allowed access.
33496 </param>
33497 <infoflow type="both" weight="10"/>
33498 </interface>
33499 -<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="65223">
33500 +<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="65241">
33501 <summary>
33502 Do not audit attempts to send and receive
33503 UDP traffic on the prelude port.
33504 @@ -50856,7 +50940,7 @@ Domain to not audit.
33505 </param>
33506 <infoflow type="none"/>
33507 </interface>
33508 -<interface name="corenet_tcp_bind_prelude_port" lineno="65238">
33509 +<interface name="corenet_tcp_bind_prelude_port" lineno="65256">
33510 <summary>
33511 Bind TCP sockets to the prelude port.
33512 </summary>
33513 @@ -50867,7 +50951,7 @@ Domain allowed access.
33514 </param>
33515 <infoflow type="none"/>
33516 </interface>
33517 -<interface name="corenet_udp_bind_prelude_port" lineno="65258">
33518 +<interface name="corenet_udp_bind_prelude_port" lineno="65276">
33519 <summary>
33520 Bind UDP sockets to the prelude port.
33521 </summary>
33522 @@ -50878,7 +50962,7 @@ Domain allowed access.
33523 </param>
33524 <infoflow type="none"/>
33525 </interface>
33526 -<interface name="corenet_tcp_connect_prelude_port" lineno="65277">
33527 +<interface name="corenet_tcp_connect_prelude_port" lineno="65295">
33528 <summary>
33529 Make a TCP connection to the prelude port.
33530 </summary>
33531 @@ -50888,7 +50972,7 @@ Domain allowed access.
33532 </summary>
33533 </param>
33534 </interface>
33535 -<interface name="corenet_send_prelude_client_packets" lineno="65297">
33536 +<interface name="corenet_send_prelude_client_packets" lineno="65315">
33537 <summary>
33538 Send prelude_client packets.
33539 </summary>
33540 @@ -50899,7 +50983,7 @@ Domain allowed access.
33541 </param>
33542 <infoflow type="write" weight="10"/>
33543 </interface>
33544 -<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="65316">
33545 +<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="65334">
33546 <summary>
33547 Do not audit attempts to send prelude_client packets.
33548 </summary>
33549 @@ -50910,7 +50994,7 @@ Domain to not audit.
33550 </param>
33551 <infoflow type="none"/>
33552 </interface>
33553 -<interface name="corenet_receive_prelude_client_packets" lineno="65335">
33554 +<interface name="corenet_receive_prelude_client_packets" lineno="65353">
33555 <summary>
33556 Receive prelude_client packets.
33557 </summary>
33558 @@ -50921,7 +51005,7 @@ Domain allowed access.
33559 </param>
33560 <infoflow type="read" weight="10"/>
33561 </interface>
33562 -<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="65354">
33563 +<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="65372">
33564 <summary>
33565 Do not audit attempts to receive prelude_client packets.
33566 </summary>
33567 @@ -50932,7 +51016,7 @@ Domain allowed access.
33568 </param>
33569 <infoflow type="none"/>
33570 </interface>
33571 -<interface name="corenet_sendrecv_prelude_client_packets" lineno="65373">
33572 +<interface name="corenet_sendrecv_prelude_client_packets" lineno="65391">
33573 <summary>
33574 Send and receive prelude_client packets.
33575 </summary>
33576 @@ -50943,7 +51027,7 @@ Domain allowed access.
33577 </param>
33578 <infoflow type="both" weight="10"/>
33579 </interface>
33580 -<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="65389">
33581 +<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="65407">
33582 <summary>
33583 Do not audit attempts to send and receive prelude_client packets.
33584 </summary>
33585 @@ -50954,7 +51038,7 @@ Domain to not audit.
33586 </param>
33587 <infoflow type="none"/>
33588 </interface>
33589 -<interface name="corenet_relabelto_prelude_client_packets" lineno="65404">
33590 +<interface name="corenet_relabelto_prelude_client_packets" lineno="65422">
33591 <summary>
33592 Relabel packets to prelude_client the packet type.
33593 </summary>
33594 @@ -50964,7 +51048,7 @@ Domain allowed access.
33595 </summary>
33596 </param>
33597 </interface>
33598 -<interface name="corenet_send_prelude_server_packets" lineno="65424">
33599 +<interface name="corenet_send_prelude_server_packets" lineno="65442">
33600 <summary>
33601 Send prelude_server packets.
33602 </summary>
33603 @@ -50975,7 +51059,7 @@ Domain allowed access.
33604 </param>
33605 <infoflow type="write" weight="10"/>
33606 </interface>
33607 -<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="65443">
33608 +<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="65461">
33609 <summary>
33610 Do not audit attempts to send prelude_server packets.
33611 </summary>
33612 @@ -50986,7 +51070,7 @@ Domain to not audit.
33613 </param>
33614 <infoflow type="none"/>
33615 </interface>
33616 -<interface name="corenet_receive_prelude_server_packets" lineno="65462">
33617 +<interface name="corenet_receive_prelude_server_packets" lineno="65480">
33618 <summary>
33619 Receive prelude_server packets.
33620 </summary>
33621 @@ -50997,7 +51081,7 @@ Domain allowed access.
33622 </param>
33623 <infoflow type="read" weight="10"/>
33624 </interface>
33625 -<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="65481">
33626 +<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="65499">
33627 <summary>
33628 Do not audit attempts to receive prelude_server packets.
33629 </summary>
33630 @@ -51008,7 +51092,7 @@ Domain allowed access.
33631 </param>
33632 <infoflow type="none"/>
33633 </interface>
33634 -<interface name="corenet_sendrecv_prelude_server_packets" lineno="65500">
33635 +<interface name="corenet_sendrecv_prelude_server_packets" lineno="65518">
33636 <summary>
33637 Send and receive prelude_server packets.
33638 </summary>
33639 @@ -51019,7 +51103,7 @@ Domain allowed access.
33640 </param>
33641 <infoflow type="both" weight="10"/>
33642 </interface>
33643 -<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="65516">
33644 +<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="65534">
33645 <summary>
33646 Do not audit attempts to send and receive prelude_server packets.
33647 </summary>
33648 @@ -51030,7 +51114,7 @@ Domain to not audit.
33649 </param>
33650 <infoflow type="none"/>
33651 </interface>
33652 -<interface name="corenet_relabelto_prelude_server_packets" lineno="65531">
33653 +<interface name="corenet_relabelto_prelude_server_packets" lineno="65549">
33654 <summary>
33655 Relabel packets to prelude_server the packet type.
33656 </summary>
33657 @@ -51040,7 +51124,7 @@ Domain allowed access.
33658 </summary>
33659 </param>
33660 </interface>
33661 -<interface name="corenet_tcp_sendrecv_presence_port" lineno="65553">
33662 +<interface name="corenet_tcp_sendrecv_presence_port" lineno="65571">
33663 <summary>
33664 Send and receive TCP traffic on the presence port.
33665 </summary>
33666 @@ -51051,7 +51135,7 @@ Domain allowed access.
33667 </param>
33668 <infoflow type="both" weight="10"/>
33669 </interface>
33670 -<interface name="corenet_udp_send_presence_port" lineno="65568">
33671 +<interface name="corenet_udp_send_presence_port" lineno="65586">
33672 <summary>
33673 Send UDP traffic on the presence port.
33674 </summary>
33675 @@ -51062,7 +51146,7 @@ Domain allowed access.
33676 </param>
33677 <infoflow type="write" weight="10"/>
33678 </interface>
33679 -<interface name="corenet_dontaudit_udp_send_presence_port" lineno="65583">
33680 +<interface name="corenet_dontaudit_udp_send_presence_port" lineno="65601">
33681 <summary>
33682 Do not audit attempts to send UDP traffic on the presence port.
33683 </summary>
33684 @@ -51073,7 +51157,7 @@ Domain to not audit.
33685 </param>
33686 <infoflow type="none"/>
33687 </interface>
33688 -<interface name="corenet_udp_receive_presence_port" lineno="65598">
33689 +<interface name="corenet_udp_receive_presence_port" lineno="65616">
33690 <summary>
33691 Receive UDP traffic on the presence port.
33692 </summary>
33693 @@ -51084,7 +51168,7 @@ Domain allowed access.
33694 </param>
33695 <infoflow type="read" weight="10"/>
33696 </interface>
33697 -<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="65613">
33698 +<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="65631">
33699 <summary>
33700 Do not audit attempts to receive UDP traffic on the presence port.
33701 </summary>
33702 @@ -51095,7 +51179,7 @@ Domain to not audit.
33703 </param>
33704 <infoflow type="none"/>
33705 </interface>
33706 -<interface name="corenet_udp_sendrecv_presence_port" lineno="65628">
33707 +<interface name="corenet_udp_sendrecv_presence_port" lineno="65646">
33708 <summary>
33709 Send and receive UDP traffic on the presence port.
33710 </summary>
33711 @@ -51106,7 +51190,7 @@ Domain allowed access.
33712 </param>
33713 <infoflow type="both" weight="10"/>
33714 </interface>
33715 -<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="65644">
33716 +<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="65662">
33717 <summary>
33718 Do not audit attempts to send and receive
33719 UDP traffic on the presence port.
33720 @@ -51118,7 +51202,7 @@ Domain to not audit.
33721 </param>
33722 <infoflow type="none"/>
33723 </interface>
33724 -<interface name="corenet_tcp_bind_presence_port" lineno="65659">
33725 +<interface name="corenet_tcp_bind_presence_port" lineno="65677">
33726 <summary>
33727 Bind TCP sockets to the presence port.
33728 </summary>
33729 @@ -51129,7 +51213,7 @@ Domain allowed access.
33730 </param>
33731 <infoflow type="none"/>
33732 </interface>
33733 -<interface name="corenet_udp_bind_presence_port" lineno="65679">
33734 +<interface name="corenet_udp_bind_presence_port" lineno="65697">
33735 <summary>
33736 Bind UDP sockets to the presence port.
33737 </summary>
33738 @@ -51140,7 +51224,7 @@ Domain allowed access.
33739 </param>
33740 <infoflow type="none"/>
33741 </interface>
33742 -<interface name="corenet_tcp_connect_presence_port" lineno="65698">
33743 +<interface name="corenet_tcp_connect_presence_port" lineno="65716">
33744 <summary>
33745 Make a TCP connection to the presence port.
33746 </summary>
33747 @@ -51150,7 +51234,7 @@ Domain allowed access.
33748 </summary>
33749 </param>
33750 </interface>
33751 -<interface name="corenet_send_presence_client_packets" lineno="65718">
33752 +<interface name="corenet_send_presence_client_packets" lineno="65736">
33753 <summary>
33754 Send presence_client packets.
33755 </summary>
33756 @@ -51161,7 +51245,7 @@ Domain allowed access.
33757 </param>
33758 <infoflow type="write" weight="10"/>
33759 </interface>
33760 -<interface name="corenet_dontaudit_send_presence_client_packets" lineno="65737">
33761 +<interface name="corenet_dontaudit_send_presence_client_packets" lineno="65755">
33762 <summary>
33763 Do not audit attempts to send presence_client packets.
33764 </summary>
33765 @@ -51172,7 +51256,7 @@ Domain to not audit.
33766 </param>
33767 <infoflow type="none"/>
33768 </interface>
33769 -<interface name="corenet_receive_presence_client_packets" lineno="65756">
33770 +<interface name="corenet_receive_presence_client_packets" lineno="65774">
33771 <summary>
33772 Receive presence_client packets.
33773 </summary>
33774 @@ -51183,7 +51267,7 @@ Domain allowed access.
33775 </param>
33776 <infoflow type="read" weight="10"/>
33777 </interface>
33778 -<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="65775">
33779 +<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="65793">
33780 <summary>
33781 Do not audit attempts to receive presence_client packets.
33782 </summary>
33783 @@ -51194,7 +51278,7 @@ Domain allowed access.
33784 </param>
33785 <infoflow type="none"/>
33786 </interface>
33787 -<interface name="corenet_sendrecv_presence_client_packets" lineno="65794">
33788 +<interface name="corenet_sendrecv_presence_client_packets" lineno="65812">
33789 <summary>
33790 Send and receive presence_client packets.
33791 </summary>
33792 @@ -51205,7 +51289,7 @@ Domain allowed access.
33793 </param>
33794 <infoflow type="both" weight="10"/>
33795 </interface>
33796 -<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="65810">
33797 +<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="65828">
33798 <summary>
33799 Do not audit attempts to send and receive presence_client packets.
33800 </summary>
33801 @@ -51216,7 +51300,7 @@ Domain to not audit.
33802 </param>
33803 <infoflow type="none"/>
33804 </interface>
33805 -<interface name="corenet_relabelto_presence_client_packets" lineno="65825">
33806 +<interface name="corenet_relabelto_presence_client_packets" lineno="65843">
33807 <summary>
33808 Relabel packets to presence_client the packet type.
33809 </summary>
33810 @@ -51226,7 +51310,7 @@ Domain allowed access.
33811 </summary>
33812 </param>
33813 </interface>
33814 -<interface name="corenet_send_presence_server_packets" lineno="65845">
33815 +<interface name="corenet_send_presence_server_packets" lineno="65863">
33816 <summary>
33817 Send presence_server packets.
33818 </summary>
33819 @@ -51237,7 +51321,7 @@ Domain allowed access.
33820 </param>
33821 <infoflow type="write" weight="10"/>
33822 </interface>
33823 -<interface name="corenet_dontaudit_send_presence_server_packets" lineno="65864">
33824 +<interface name="corenet_dontaudit_send_presence_server_packets" lineno="65882">
33825 <summary>
33826 Do not audit attempts to send presence_server packets.
33827 </summary>
33828 @@ -51248,7 +51332,7 @@ Domain to not audit.
33829 </param>
33830 <infoflow type="none"/>
33831 </interface>
33832 -<interface name="corenet_receive_presence_server_packets" lineno="65883">
33833 +<interface name="corenet_receive_presence_server_packets" lineno="65901">
33834 <summary>
33835 Receive presence_server packets.
33836 </summary>
33837 @@ -51259,7 +51343,7 @@ Domain allowed access.
33838 </param>
33839 <infoflow type="read" weight="10"/>
33840 </interface>
33841 -<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="65902">
33842 +<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="65920">
33843 <summary>
33844 Do not audit attempts to receive presence_server packets.
33845 </summary>
33846 @@ -51270,7 +51354,7 @@ Domain allowed access.
33847 </param>
33848 <infoflow type="none"/>
33849 </interface>
33850 -<interface name="corenet_sendrecv_presence_server_packets" lineno="65921">
33851 +<interface name="corenet_sendrecv_presence_server_packets" lineno="65939">
33852 <summary>
33853 Send and receive presence_server packets.
33854 </summary>
33855 @@ -51281,7 +51365,7 @@ Domain allowed access.
33856 </param>
33857 <infoflow type="both" weight="10"/>
33858 </interface>
33859 -<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="65937">
33860 +<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="65955">
33861 <summary>
33862 Do not audit attempts to send and receive presence_server packets.
33863 </summary>
33864 @@ -51292,7 +51376,7 @@ Domain to not audit.
33865 </param>
33866 <infoflow type="none"/>
33867 </interface>
33868 -<interface name="corenet_relabelto_presence_server_packets" lineno="65952">
33869 +<interface name="corenet_relabelto_presence_server_packets" lineno="65970">
33870 <summary>
33871 Relabel packets to presence_server the packet type.
33872 </summary>
33873 @@ -51302,7 +51386,7 @@ Domain allowed access.
33874 </summary>
33875 </param>
33876 </interface>
33877 -<interface name="corenet_tcp_sendrecv_printer_port" lineno="65974">
33878 +<interface name="corenet_tcp_sendrecv_printer_port" lineno="65992">
33879 <summary>
33880 Send and receive TCP traffic on the printer port.
33881 </summary>
33882 @@ -51313,7 +51397,7 @@ Domain allowed access.
33883 </param>
33884 <infoflow type="both" weight="10"/>
33885 </interface>
33886 -<interface name="corenet_udp_send_printer_port" lineno="65989">
33887 +<interface name="corenet_udp_send_printer_port" lineno="66007">
33888 <summary>
33889 Send UDP traffic on the printer port.
33890 </summary>
33891 @@ -51324,7 +51408,7 @@ Domain allowed access.
33892 </param>
33893 <infoflow type="write" weight="10"/>
33894 </interface>
33895 -<interface name="corenet_dontaudit_udp_send_printer_port" lineno="66004">
33896 +<interface name="corenet_dontaudit_udp_send_printer_port" lineno="66022">
33897 <summary>
33898 Do not audit attempts to send UDP traffic on the printer port.
33899 </summary>
33900 @@ -51335,7 +51419,7 @@ Domain to not audit.
33901 </param>
33902 <infoflow type="none"/>
33903 </interface>
33904 -<interface name="corenet_udp_receive_printer_port" lineno="66019">
33905 +<interface name="corenet_udp_receive_printer_port" lineno="66037">
33906 <summary>
33907 Receive UDP traffic on the printer port.
33908 </summary>
33909 @@ -51346,7 +51430,7 @@ Domain allowed access.
33910 </param>
33911 <infoflow type="read" weight="10"/>
33912 </interface>
33913 -<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="66034">
33914 +<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="66052">
33915 <summary>
33916 Do not audit attempts to receive UDP traffic on the printer port.
33917 </summary>
33918 @@ -51357,7 +51441,7 @@ Domain to not audit.
33919 </param>
33920 <infoflow type="none"/>
33921 </interface>
33922 -<interface name="corenet_udp_sendrecv_printer_port" lineno="66049">
33923 +<interface name="corenet_udp_sendrecv_printer_port" lineno="66067">
33924 <summary>
33925 Send and receive UDP traffic on the printer port.
33926 </summary>
33927 @@ -51368,7 +51452,7 @@ Domain allowed access.
33928 </param>
33929 <infoflow type="both" weight="10"/>
33930 </interface>
33931 -<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="66065">
33932 +<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="66083">
33933 <summary>
33934 Do not audit attempts to send and receive
33935 UDP traffic on the printer port.
33936 @@ -51380,7 +51464,7 @@ Domain to not audit.
33937 </param>
33938 <infoflow type="none"/>
33939 </interface>
33940 -<interface name="corenet_tcp_bind_printer_port" lineno="66080">
33941 +<interface name="corenet_tcp_bind_printer_port" lineno="66098">
33942 <summary>
33943 Bind TCP sockets to the printer port.
33944 </summary>
33945 @@ -51391,7 +51475,7 @@ Domain allowed access.
33946 </param>
33947 <infoflow type="none"/>
33948 </interface>
33949 -<interface name="corenet_udp_bind_printer_port" lineno="66100">
33950 +<interface name="corenet_udp_bind_printer_port" lineno="66118">
33951 <summary>
33952 Bind UDP sockets to the printer port.
33953 </summary>
33954 @@ -51402,7 +51486,7 @@ Domain allowed access.
33955 </param>
33956 <infoflow type="none"/>
33957 </interface>
33958 -<interface name="corenet_tcp_connect_printer_port" lineno="66119">
33959 +<interface name="corenet_tcp_connect_printer_port" lineno="66137">
33960 <summary>
33961 Make a TCP connection to the printer port.
33962 </summary>
33963 @@ -51412,7 +51496,7 @@ Domain allowed access.
33964 </summary>
33965 </param>
33966 </interface>
33967 -<interface name="corenet_send_printer_client_packets" lineno="66139">
33968 +<interface name="corenet_send_printer_client_packets" lineno="66157">
33969 <summary>
33970 Send printer_client packets.
33971 </summary>
33972 @@ -51423,7 +51507,7 @@ Domain allowed access.
33973 </param>
33974 <infoflow type="write" weight="10"/>
33975 </interface>
33976 -<interface name="corenet_dontaudit_send_printer_client_packets" lineno="66158">
33977 +<interface name="corenet_dontaudit_send_printer_client_packets" lineno="66176">
33978 <summary>
33979 Do not audit attempts to send printer_client packets.
33980 </summary>
33981 @@ -51434,7 +51518,7 @@ Domain to not audit.
33982 </param>
33983 <infoflow type="none"/>
33984 </interface>
33985 -<interface name="corenet_receive_printer_client_packets" lineno="66177">
33986 +<interface name="corenet_receive_printer_client_packets" lineno="66195">
33987 <summary>
33988 Receive printer_client packets.
33989 </summary>
33990 @@ -51445,7 +51529,7 @@ Domain allowed access.
33991 </param>
33992 <infoflow type="read" weight="10"/>
33993 </interface>
33994 -<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="66196">
33995 +<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="66214">
33996 <summary>
33997 Do not audit attempts to receive printer_client packets.
33998 </summary>
33999 @@ -51456,7 +51540,7 @@ Domain allowed access.
34000 </param>
34001 <infoflow type="none"/>
34002 </interface>
34003 -<interface name="corenet_sendrecv_printer_client_packets" lineno="66215">
34004 +<interface name="corenet_sendrecv_printer_client_packets" lineno="66233">
34005 <summary>
34006 Send and receive printer_client packets.
34007 </summary>
34008 @@ -51467,7 +51551,7 @@ Domain allowed access.
34009 </param>
34010 <infoflow type="both" weight="10"/>
34011 </interface>
34012 -<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="66231">
34013 +<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="66249">
34014 <summary>
34015 Do not audit attempts to send and receive printer_client packets.
34016 </summary>
34017 @@ -51478,7 +51562,7 @@ Domain to not audit.
34018 </param>
34019 <infoflow type="none"/>
34020 </interface>
34021 -<interface name="corenet_relabelto_printer_client_packets" lineno="66246">
34022 +<interface name="corenet_relabelto_printer_client_packets" lineno="66264">
34023 <summary>
34024 Relabel packets to printer_client the packet type.
34025 </summary>
34026 @@ -51488,7 +51572,7 @@ Domain allowed access.
34027 </summary>
34028 </param>
34029 </interface>
34030 -<interface name="corenet_send_printer_server_packets" lineno="66266">
34031 +<interface name="corenet_send_printer_server_packets" lineno="66284">
34032 <summary>
34033 Send printer_server packets.
34034 </summary>
34035 @@ -51499,7 +51583,7 @@ Domain allowed access.
34036 </param>
34037 <infoflow type="write" weight="10"/>
34038 </interface>
34039 -<interface name="corenet_dontaudit_send_printer_server_packets" lineno="66285">
34040 +<interface name="corenet_dontaudit_send_printer_server_packets" lineno="66303">
34041 <summary>
34042 Do not audit attempts to send printer_server packets.
34043 </summary>
34044 @@ -51510,7 +51594,7 @@ Domain to not audit.
34045 </param>
34046 <infoflow type="none"/>
34047 </interface>
34048 -<interface name="corenet_receive_printer_server_packets" lineno="66304">
34049 +<interface name="corenet_receive_printer_server_packets" lineno="66322">
34050 <summary>
34051 Receive printer_server packets.
34052 </summary>
34053 @@ -51521,7 +51605,7 @@ Domain allowed access.
34054 </param>
34055 <infoflow type="read" weight="10"/>
34056 </interface>
34057 -<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="66323">
34058 +<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="66341">
34059 <summary>
34060 Do not audit attempts to receive printer_server packets.
34061 </summary>
34062 @@ -51532,7 +51616,7 @@ Domain allowed access.
34063 </param>
34064 <infoflow type="none"/>
34065 </interface>
34066 -<interface name="corenet_sendrecv_printer_server_packets" lineno="66342">
34067 +<interface name="corenet_sendrecv_printer_server_packets" lineno="66360">
34068 <summary>
34069 Send and receive printer_server packets.
34070 </summary>
34071 @@ -51543,7 +51627,7 @@ Domain allowed access.
34072 </param>
34073 <infoflow type="both" weight="10"/>
34074 </interface>
34075 -<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="66358">
34076 +<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="66376">
34077 <summary>
34078 Do not audit attempts to send and receive printer_server packets.
34079 </summary>
34080 @@ -51554,7 +51638,7 @@ Domain to not audit.
34081 </param>
34082 <infoflow type="none"/>
34083 </interface>
34084 -<interface name="corenet_relabelto_printer_server_packets" lineno="66373">
34085 +<interface name="corenet_relabelto_printer_server_packets" lineno="66391">
34086 <summary>
34087 Relabel packets to printer_server the packet type.
34088 </summary>
34089 @@ -51564,7 +51648,7 @@ Domain allowed access.
34090 </summary>
34091 </param>
34092 </interface>
34093 -<interface name="corenet_tcp_sendrecv_ptal_port" lineno="66395">
34094 +<interface name="corenet_tcp_sendrecv_ptal_port" lineno="66413">
34095 <summary>
34096 Send and receive TCP traffic on the ptal port.
34097 </summary>
34098 @@ -51575,7 +51659,7 @@ Domain allowed access.
34099 </param>
34100 <infoflow type="both" weight="10"/>
34101 </interface>
34102 -<interface name="corenet_udp_send_ptal_port" lineno="66410">
34103 +<interface name="corenet_udp_send_ptal_port" lineno="66428">
34104 <summary>
34105 Send UDP traffic on the ptal port.
34106 </summary>
34107 @@ -51586,7 +51670,7 @@ Domain allowed access.
34108 </param>
34109 <infoflow type="write" weight="10"/>
34110 </interface>
34111 -<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="66425">
34112 +<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="66443">
34113 <summary>
34114 Do not audit attempts to send UDP traffic on the ptal port.
34115 </summary>
34116 @@ -51597,7 +51681,7 @@ Domain to not audit.
34117 </param>
34118 <infoflow type="none"/>
34119 </interface>
34120 -<interface name="corenet_udp_receive_ptal_port" lineno="66440">
34121 +<interface name="corenet_udp_receive_ptal_port" lineno="66458">
34122 <summary>
34123 Receive UDP traffic on the ptal port.
34124 </summary>
34125 @@ -51608,7 +51692,7 @@ Domain allowed access.
34126 </param>
34127 <infoflow type="read" weight="10"/>
34128 </interface>
34129 -<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="66455">
34130 +<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="66473">
34131 <summary>
34132 Do not audit attempts to receive UDP traffic on the ptal port.
34133 </summary>
34134 @@ -51619,7 +51703,7 @@ Domain to not audit.
34135 </param>
34136 <infoflow type="none"/>
34137 </interface>
34138 -<interface name="corenet_udp_sendrecv_ptal_port" lineno="66470">
34139 +<interface name="corenet_udp_sendrecv_ptal_port" lineno="66488">
34140 <summary>
34141 Send and receive UDP traffic on the ptal port.
34142 </summary>
34143 @@ -51630,7 +51714,7 @@ Domain allowed access.
34144 </param>
34145 <infoflow type="both" weight="10"/>
34146 </interface>
34147 -<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="66486">
34148 +<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="66504">
34149 <summary>
34150 Do not audit attempts to send and receive
34151 UDP traffic on the ptal port.
34152 @@ -51642,7 +51726,7 @@ Domain to not audit.
34153 </param>
34154 <infoflow type="none"/>
34155 </interface>
34156 -<interface name="corenet_tcp_bind_ptal_port" lineno="66501">
34157 +<interface name="corenet_tcp_bind_ptal_port" lineno="66519">
34158 <summary>
34159 Bind TCP sockets to the ptal port.
34160 </summary>
34161 @@ -51653,7 +51737,7 @@ Domain allowed access.
34162 </param>
34163 <infoflow type="none"/>
34164 </interface>
34165 -<interface name="corenet_udp_bind_ptal_port" lineno="66521">
34166 +<interface name="corenet_udp_bind_ptal_port" lineno="66539">
34167 <summary>
34168 Bind UDP sockets to the ptal port.
34169 </summary>
34170 @@ -51664,7 +51748,7 @@ Domain allowed access.
34171 </param>
34172 <infoflow type="none"/>
34173 </interface>
34174 -<interface name="corenet_tcp_connect_ptal_port" lineno="66540">
34175 +<interface name="corenet_tcp_connect_ptal_port" lineno="66558">
34176 <summary>
34177 Make a TCP connection to the ptal port.
34178 </summary>
34179 @@ -51674,7 +51758,7 @@ Domain allowed access.
34180 </summary>
34181 </param>
34182 </interface>
34183 -<interface name="corenet_send_ptal_client_packets" lineno="66560">
34184 +<interface name="corenet_send_ptal_client_packets" lineno="66578">
34185 <summary>
34186 Send ptal_client packets.
34187 </summary>
34188 @@ -51685,7 +51769,7 @@ Domain allowed access.
34189 </param>
34190 <infoflow type="write" weight="10"/>
34191 </interface>
34192 -<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="66579">
34193 +<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="66597">
34194 <summary>
34195 Do not audit attempts to send ptal_client packets.
34196 </summary>
34197 @@ -51696,7 +51780,7 @@ Domain to not audit.
34198 </param>
34199 <infoflow type="none"/>
34200 </interface>
34201 -<interface name="corenet_receive_ptal_client_packets" lineno="66598">
34202 +<interface name="corenet_receive_ptal_client_packets" lineno="66616">
34203 <summary>
34204 Receive ptal_client packets.
34205 </summary>
34206 @@ -51707,7 +51791,7 @@ Domain allowed access.
34207 </param>
34208 <infoflow type="read" weight="10"/>
34209 </interface>
34210 -<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="66617">
34211 +<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="66635">
34212 <summary>
34213 Do not audit attempts to receive ptal_client packets.
34214 </summary>
34215 @@ -51718,7 +51802,7 @@ Domain allowed access.
34216 </param>
34217 <infoflow type="none"/>
34218 </interface>
34219 -<interface name="corenet_sendrecv_ptal_client_packets" lineno="66636">
34220 +<interface name="corenet_sendrecv_ptal_client_packets" lineno="66654">
34221 <summary>
34222 Send and receive ptal_client packets.
34223 </summary>
34224 @@ -51729,7 +51813,7 @@ Domain allowed access.
34225 </param>
34226 <infoflow type="both" weight="10"/>
34227 </interface>
34228 -<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="66652">
34229 +<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="66670">
34230 <summary>
34231 Do not audit attempts to send and receive ptal_client packets.
34232 </summary>
34233 @@ -51740,7 +51824,7 @@ Domain to not audit.
34234 </param>
34235 <infoflow type="none"/>
34236 </interface>
34237 -<interface name="corenet_relabelto_ptal_client_packets" lineno="66667">
34238 +<interface name="corenet_relabelto_ptal_client_packets" lineno="66685">
34239 <summary>
34240 Relabel packets to ptal_client the packet type.
34241 </summary>
34242 @@ -51750,7 +51834,7 @@ Domain allowed access.
34243 </summary>
34244 </param>
34245 </interface>
34246 -<interface name="corenet_send_ptal_server_packets" lineno="66687">
34247 +<interface name="corenet_send_ptal_server_packets" lineno="66705">
34248 <summary>
34249 Send ptal_server packets.
34250 </summary>
34251 @@ -51761,7 +51845,7 @@ Domain allowed access.
34252 </param>
34253 <infoflow type="write" weight="10"/>
34254 </interface>
34255 -<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="66706">
34256 +<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="66724">
34257 <summary>
34258 Do not audit attempts to send ptal_server packets.
34259 </summary>
34260 @@ -51772,7 +51856,7 @@ Domain to not audit.
34261 </param>
34262 <infoflow type="none"/>
34263 </interface>
34264 -<interface name="corenet_receive_ptal_server_packets" lineno="66725">
34265 +<interface name="corenet_receive_ptal_server_packets" lineno="66743">
34266 <summary>
34267 Receive ptal_server packets.
34268 </summary>
34269 @@ -51783,7 +51867,7 @@ Domain allowed access.
34270 </param>
34271 <infoflow type="read" weight="10"/>
34272 </interface>
34273 -<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="66744">
34274 +<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="66762">
34275 <summary>
34276 Do not audit attempts to receive ptal_server packets.
34277 </summary>
34278 @@ -51794,7 +51878,7 @@ Domain allowed access.
34279 </param>
34280 <infoflow type="none"/>
34281 </interface>
34282 -<interface name="corenet_sendrecv_ptal_server_packets" lineno="66763">
34283 +<interface name="corenet_sendrecv_ptal_server_packets" lineno="66781">
34284 <summary>
34285 Send and receive ptal_server packets.
34286 </summary>
34287 @@ -51805,7 +51889,7 @@ Domain allowed access.
34288 </param>
34289 <infoflow type="both" weight="10"/>
34290 </interface>
34291 -<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="66779">
34292 +<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="66797">
34293 <summary>
34294 Do not audit attempts to send and receive ptal_server packets.
34295 </summary>
34296 @@ -51816,7 +51900,7 @@ Domain to not audit.
34297 </param>
34298 <infoflow type="none"/>
34299 </interface>
34300 -<interface name="corenet_relabelto_ptal_server_packets" lineno="66794">
34301 +<interface name="corenet_relabelto_ptal_server_packets" lineno="66812">
34302 <summary>
34303 Relabel packets to ptal_server the packet type.
34304 </summary>
34305 @@ -51826,7 +51910,7 @@ Domain allowed access.
34306 </summary>
34307 </param>
34308 </interface>
34309 -<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="66816">
34310 +<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="66834">
34311 <summary>
34312 Send and receive TCP traffic on the pulseaudio port.
34313 </summary>
34314 @@ -51837,7 +51921,7 @@ Domain allowed access.
34315 </param>
34316 <infoflow type="both" weight="10"/>
34317 </interface>
34318 -<interface name="corenet_udp_send_pulseaudio_port" lineno="66831">
34319 +<interface name="corenet_udp_send_pulseaudio_port" lineno="66849">
34320 <summary>
34321 Send UDP traffic on the pulseaudio port.
34322 </summary>
34323 @@ -51848,7 +51932,7 @@ Domain allowed access.
34324 </param>
34325 <infoflow type="write" weight="10"/>
34326 </interface>
34327 -<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="66846">
34328 +<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="66864">
34329 <summary>
34330 Do not audit attempts to send UDP traffic on the pulseaudio port.
34331 </summary>
34332 @@ -51859,7 +51943,7 @@ Domain to not audit.
34333 </param>
34334 <infoflow type="none"/>
34335 </interface>
34336 -<interface name="corenet_udp_receive_pulseaudio_port" lineno="66861">
34337 +<interface name="corenet_udp_receive_pulseaudio_port" lineno="66879">
34338 <summary>
34339 Receive UDP traffic on the pulseaudio port.
34340 </summary>
34341 @@ -51870,7 +51954,7 @@ Domain allowed access.
34342 </param>
34343 <infoflow type="read" weight="10"/>
34344 </interface>
34345 -<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="66876">
34346 +<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="66894">
34347 <summary>
34348 Do not audit attempts to receive UDP traffic on the pulseaudio port.
34349 </summary>
34350 @@ -51881,7 +51965,7 @@ Domain to not audit.
34351 </param>
34352 <infoflow type="none"/>
34353 </interface>
34354 -<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="66891">
34355 +<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="66909">
34356 <summary>
34357 Send and receive UDP traffic on the pulseaudio port.
34358 </summary>
34359 @@ -51892,7 +51976,7 @@ Domain allowed access.
34360 </param>
34361 <infoflow type="both" weight="10"/>
34362 </interface>
34363 -<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="66907">
34364 +<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="66925">
34365 <summary>
34366 Do not audit attempts to send and receive
34367 UDP traffic on the pulseaudio port.
34368 @@ -51904,7 +51988,7 @@ Domain to not audit.
34369 </param>
34370 <infoflow type="none"/>
34371 </interface>
34372 -<interface name="corenet_tcp_bind_pulseaudio_port" lineno="66922">
34373 +<interface name="corenet_tcp_bind_pulseaudio_port" lineno="66940">
34374 <summary>
34375 Bind TCP sockets to the pulseaudio port.
34376 </summary>
34377 @@ -51915,7 +51999,7 @@ Domain allowed access.
34378 </param>
34379 <infoflow type="none"/>
34380 </interface>
34381 -<interface name="corenet_udp_bind_pulseaudio_port" lineno="66942">
34382 +<interface name="corenet_udp_bind_pulseaudio_port" lineno="66960">
34383 <summary>
34384 Bind UDP sockets to the pulseaudio port.
34385 </summary>
34386 @@ -51926,7 +52010,7 @@ Domain allowed access.
34387 </param>
34388 <infoflow type="none"/>
34389 </interface>
34390 -<interface name="corenet_tcp_connect_pulseaudio_port" lineno="66961">
34391 +<interface name="corenet_tcp_connect_pulseaudio_port" lineno="66979">
34392 <summary>
34393 Make a TCP connection to the pulseaudio port.
34394 </summary>
34395 @@ -51936,7 +52020,7 @@ Domain allowed access.
34396 </summary>
34397 </param>
34398 </interface>
34399 -<interface name="corenet_send_pulseaudio_client_packets" lineno="66981">
34400 +<interface name="corenet_send_pulseaudio_client_packets" lineno="66999">
34401 <summary>
34402 Send pulseaudio_client packets.
34403 </summary>
34404 @@ -51947,7 +52031,7 @@ Domain allowed access.
34405 </param>
34406 <infoflow type="write" weight="10"/>
34407 </interface>
34408 -<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="67000">
34409 +<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="67018">
34410 <summary>
34411 Do not audit attempts to send pulseaudio_client packets.
34412 </summary>
34413 @@ -51958,7 +52042,7 @@ Domain to not audit.
34414 </param>
34415 <infoflow type="none"/>
34416 </interface>
34417 -<interface name="corenet_receive_pulseaudio_client_packets" lineno="67019">
34418 +<interface name="corenet_receive_pulseaudio_client_packets" lineno="67037">
34419 <summary>
34420 Receive pulseaudio_client packets.
34421 </summary>
34422 @@ -51969,7 +52053,7 @@ Domain allowed access.
34423 </param>
34424 <infoflow type="read" weight="10"/>
34425 </interface>
34426 -<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="67038">
34427 +<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="67056">
34428 <summary>
34429 Do not audit attempts to receive pulseaudio_client packets.
34430 </summary>
34431 @@ -51980,7 +52064,7 @@ Domain allowed access.
34432 </param>
34433 <infoflow type="none"/>
34434 </interface>
34435 -<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="67057">
34436 +<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="67075">
34437 <summary>
34438 Send and receive pulseaudio_client packets.
34439 </summary>
34440 @@ -51991,7 +52075,7 @@ Domain allowed access.
34441 </param>
34442 <infoflow type="both" weight="10"/>
34443 </interface>
34444 -<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="67073">
34445 +<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="67091">
34446 <summary>
34447 Do not audit attempts to send and receive pulseaudio_client packets.
34448 </summary>
34449 @@ -52002,7 +52086,7 @@ Domain to not audit.
34450 </param>
34451 <infoflow type="none"/>
34452 </interface>
34453 -<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="67088">
34454 +<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="67106">
34455 <summary>
34456 Relabel packets to pulseaudio_client the packet type.
34457 </summary>
34458 @@ -52012,7 +52096,7 @@ Domain allowed access.
34459 </summary>
34460 </param>
34461 </interface>
34462 -<interface name="corenet_send_pulseaudio_server_packets" lineno="67108">
34463 +<interface name="corenet_send_pulseaudio_server_packets" lineno="67126">
34464 <summary>
34465 Send pulseaudio_server packets.
34466 </summary>
34467 @@ -52023,7 +52107,7 @@ Domain allowed access.
34468 </param>
34469 <infoflow type="write" weight="10"/>
34470 </interface>
34471 -<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="67127">
34472 +<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="67145">
34473 <summary>
34474 Do not audit attempts to send pulseaudio_server packets.
34475 </summary>
34476 @@ -52034,7 +52118,7 @@ Domain to not audit.
34477 </param>
34478 <infoflow type="none"/>
34479 </interface>
34480 -<interface name="corenet_receive_pulseaudio_server_packets" lineno="67146">
34481 +<interface name="corenet_receive_pulseaudio_server_packets" lineno="67164">
34482 <summary>
34483 Receive pulseaudio_server packets.
34484 </summary>
34485 @@ -52045,7 +52129,7 @@ Domain allowed access.
34486 </param>
34487 <infoflow type="read" weight="10"/>
34488 </interface>
34489 -<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="67165">
34490 +<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="67183">
34491 <summary>
34492 Do not audit attempts to receive pulseaudio_server packets.
34493 </summary>
34494 @@ -52056,7 +52140,7 @@ Domain allowed access.
34495 </param>
34496 <infoflow type="none"/>
34497 </interface>
34498 -<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="67184">
34499 +<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="67202">
34500 <summary>
34501 Send and receive pulseaudio_server packets.
34502 </summary>
34503 @@ -52067,7 +52151,7 @@ Domain allowed access.
34504 </param>
34505 <infoflow type="both" weight="10"/>
34506 </interface>
34507 -<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="67200">
34508 +<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="67218">
34509 <summary>
34510 Do not audit attempts to send and receive pulseaudio_server packets.
34511 </summary>
34512 @@ -52078,7 +52162,7 @@ Domain to not audit.
34513 </param>
34514 <infoflow type="none"/>
34515 </interface>
34516 -<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="67215">
34517 +<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="67233">
34518 <summary>
34519 Relabel packets to pulseaudio_server the packet type.
34520 </summary>
34521 @@ -52088,7 +52172,7 @@ Domain allowed access.
34522 </summary>
34523 </param>
34524 </interface>
34525 -<interface name="corenet_tcp_sendrecv_puppet_port" lineno="67237">
34526 +<interface name="corenet_tcp_sendrecv_puppet_port" lineno="67255">
34527 <summary>
34528 Send and receive TCP traffic on the puppet port.
34529 </summary>
34530 @@ -52099,7 +52183,7 @@ Domain allowed access.
34531 </param>
34532 <infoflow type="both" weight="10"/>
34533 </interface>
34534 -<interface name="corenet_udp_send_puppet_port" lineno="67252">
34535 +<interface name="corenet_udp_send_puppet_port" lineno="67270">
34536 <summary>
34537 Send UDP traffic on the puppet port.
34538 </summary>
34539 @@ -52110,7 +52194,7 @@ Domain allowed access.
34540 </param>
34541 <infoflow type="write" weight="10"/>
34542 </interface>
34543 -<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="67267">
34544 +<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="67285">
34545 <summary>
34546 Do not audit attempts to send UDP traffic on the puppet port.
34547 </summary>
34548 @@ -52121,7 +52205,7 @@ Domain to not audit.
34549 </param>
34550 <infoflow type="none"/>
34551 </interface>
34552 -<interface name="corenet_udp_receive_puppet_port" lineno="67282">
34553 +<interface name="corenet_udp_receive_puppet_port" lineno="67300">
34554 <summary>
34555 Receive UDP traffic on the puppet port.
34556 </summary>
34557 @@ -52132,7 +52216,7 @@ Domain allowed access.
34558 </param>
34559 <infoflow type="read" weight="10"/>
34560 </interface>
34561 -<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="67297">
34562 +<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="67315">
34563 <summary>
34564 Do not audit attempts to receive UDP traffic on the puppet port.
34565 </summary>
34566 @@ -52143,7 +52227,7 @@ Domain to not audit.
34567 </param>
34568 <infoflow type="none"/>
34569 </interface>
34570 -<interface name="corenet_udp_sendrecv_puppet_port" lineno="67312">
34571 +<interface name="corenet_udp_sendrecv_puppet_port" lineno="67330">
34572 <summary>
34573 Send and receive UDP traffic on the puppet port.
34574 </summary>
34575 @@ -52154,7 +52238,7 @@ Domain allowed access.
34576 </param>
34577 <infoflow type="both" weight="10"/>
34578 </interface>
34579 -<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="67328">
34580 +<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="67346">
34581 <summary>
34582 Do not audit attempts to send and receive
34583 UDP traffic on the puppet port.
34584 @@ -52166,7 +52250,7 @@ Domain to not audit.
34585 </param>
34586 <infoflow type="none"/>
34587 </interface>
34588 -<interface name="corenet_tcp_bind_puppet_port" lineno="67343">
34589 +<interface name="corenet_tcp_bind_puppet_port" lineno="67361">
34590 <summary>
34591 Bind TCP sockets to the puppet port.
34592 </summary>
34593 @@ -52177,7 +52261,7 @@ Domain allowed access.
34594 </param>
34595 <infoflow type="none"/>
34596 </interface>
34597 -<interface name="corenet_udp_bind_puppet_port" lineno="67363">
34598 +<interface name="corenet_udp_bind_puppet_port" lineno="67381">
34599 <summary>
34600 Bind UDP sockets to the puppet port.
34601 </summary>
34602 @@ -52188,7 +52272,7 @@ Domain allowed access.
34603 </param>
34604 <infoflow type="none"/>
34605 </interface>
34606 -<interface name="corenet_tcp_connect_puppet_port" lineno="67382">
34607 +<interface name="corenet_tcp_connect_puppet_port" lineno="67400">
34608 <summary>
34609 Make a TCP connection to the puppet port.
34610 </summary>
34611 @@ -52198,7 +52282,7 @@ Domain allowed access.
34612 </summary>
34613 </param>
34614 </interface>
34615 -<interface name="corenet_send_puppet_client_packets" lineno="67402">
34616 +<interface name="corenet_send_puppet_client_packets" lineno="67420">
34617 <summary>
34618 Send puppet_client packets.
34619 </summary>
34620 @@ -52209,7 +52293,7 @@ Domain allowed access.
34621 </param>
34622 <infoflow type="write" weight="10"/>
34623 </interface>
34624 -<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="67421">
34625 +<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="67439">
34626 <summary>
34627 Do not audit attempts to send puppet_client packets.
34628 </summary>
34629 @@ -52220,7 +52304,7 @@ Domain to not audit.
34630 </param>
34631 <infoflow type="none"/>
34632 </interface>
34633 -<interface name="corenet_receive_puppet_client_packets" lineno="67440">
34634 +<interface name="corenet_receive_puppet_client_packets" lineno="67458">
34635 <summary>
34636 Receive puppet_client packets.
34637 </summary>
34638 @@ -52231,7 +52315,7 @@ Domain allowed access.
34639 </param>
34640 <infoflow type="read" weight="10"/>
34641 </interface>
34642 -<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="67459">
34643 +<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="67477">
34644 <summary>
34645 Do not audit attempts to receive puppet_client packets.
34646 </summary>
34647 @@ -52242,7 +52326,7 @@ Domain allowed access.
34648 </param>
34649 <infoflow type="none"/>
34650 </interface>
34651 -<interface name="corenet_sendrecv_puppet_client_packets" lineno="67478">
34652 +<interface name="corenet_sendrecv_puppet_client_packets" lineno="67496">
34653 <summary>
34654 Send and receive puppet_client packets.
34655 </summary>
34656 @@ -52253,7 +52337,7 @@ Domain allowed access.
34657 </param>
34658 <infoflow type="both" weight="10"/>
34659 </interface>
34660 -<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="67494">
34661 +<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="67512">
34662 <summary>
34663 Do not audit attempts to send and receive puppet_client packets.
34664 </summary>
34665 @@ -52264,7 +52348,7 @@ Domain to not audit.
34666 </param>
34667 <infoflow type="none"/>
34668 </interface>
34669 -<interface name="corenet_relabelto_puppet_client_packets" lineno="67509">
34670 +<interface name="corenet_relabelto_puppet_client_packets" lineno="67527">
34671 <summary>
34672 Relabel packets to puppet_client the packet type.
34673 </summary>
34674 @@ -52274,7 +52358,7 @@ Domain allowed access.
34675 </summary>
34676 </param>
34677 </interface>
34678 -<interface name="corenet_send_puppet_server_packets" lineno="67529">
34679 +<interface name="corenet_send_puppet_server_packets" lineno="67547">
34680 <summary>
34681 Send puppet_server packets.
34682 </summary>
34683 @@ -52285,7 +52369,7 @@ Domain allowed access.
34684 </param>
34685 <infoflow type="write" weight="10"/>
34686 </interface>
34687 -<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="67548">
34688 +<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="67566">
34689 <summary>
34690 Do not audit attempts to send puppet_server packets.
34691 </summary>
34692 @@ -52296,7 +52380,7 @@ Domain to not audit.
34693 </param>
34694 <infoflow type="none"/>
34695 </interface>
34696 -<interface name="corenet_receive_puppet_server_packets" lineno="67567">
34697 +<interface name="corenet_receive_puppet_server_packets" lineno="67585">
34698 <summary>
34699 Receive puppet_server packets.
34700 </summary>
34701 @@ -52307,7 +52391,7 @@ Domain allowed access.
34702 </param>
34703 <infoflow type="read" weight="10"/>
34704 </interface>
34705 -<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="67586">
34706 +<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="67604">
34707 <summary>
34708 Do not audit attempts to receive puppet_server packets.
34709 </summary>
34710 @@ -52318,7 +52402,7 @@ Domain allowed access.
34711 </param>
34712 <infoflow type="none"/>
34713 </interface>
34714 -<interface name="corenet_sendrecv_puppet_server_packets" lineno="67605">
34715 +<interface name="corenet_sendrecv_puppet_server_packets" lineno="67623">
34716 <summary>
34717 Send and receive puppet_server packets.
34718 </summary>
34719 @@ -52329,7 +52413,7 @@ Domain allowed access.
34720 </param>
34721 <infoflow type="both" weight="10"/>
34722 </interface>
34723 -<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="67621">
34724 +<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="67639">
34725 <summary>
34726 Do not audit attempts to send and receive puppet_server packets.
34727 </summary>
34728 @@ -52340,7 +52424,7 @@ Domain to not audit.
34729 </param>
34730 <infoflow type="none"/>
34731 </interface>
34732 -<interface name="corenet_relabelto_puppet_server_packets" lineno="67636">
34733 +<interface name="corenet_relabelto_puppet_server_packets" lineno="67654">
34734 <summary>
34735 Relabel packets to puppet_server the packet type.
34736 </summary>
34737 @@ -52350,7 +52434,7 @@ Domain allowed access.
34738 </summary>
34739 </param>
34740 </interface>
34741 -<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="67658">
34742 +<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="67676">
34743 <summary>
34744 Send and receive TCP traffic on the puppetclient port.
34745 </summary>
34746 @@ -52361,7 +52445,7 @@ Domain allowed access.
34747 </param>
34748 <infoflow type="both" weight="10"/>
34749 </interface>
34750 -<interface name="corenet_udp_send_puppetclient_port" lineno="67673">
34751 +<interface name="corenet_udp_send_puppetclient_port" lineno="67691">
34752 <summary>
34753 Send UDP traffic on the puppetclient port.
34754 </summary>
34755 @@ -52372,7 +52456,7 @@ Domain allowed access.
34756 </param>
34757 <infoflow type="write" weight="10"/>
34758 </interface>
34759 -<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="67688">
34760 +<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="67706">
34761 <summary>
34762 Do not audit attempts to send UDP traffic on the puppetclient port.
34763 </summary>
34764 @@ -52383,7 +52467,7 @@ Domain to not audit.
34765 </param>
34766 <infoflow type="none"/>
34767 </interface>
34768 -<interface name="corenet_udp_receive_puppetclient_port" lineno="67703">
34769 +<interface name="corenet_udp_receive_puppetclient_port" lineno="67721">
34770 <summary>
34771 Receive UDP traffic on the puppetclient port.
34772 </summary>
34773 @@ -52394,7 +52478,7 @@ Domain allowed access.
34774 </param>
34775 <infoflow type="read" weight="10"/>
34776 </interface>
34777 -<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="67718">
34778 +<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="67736">
34779 <summary>
34780 Do not audit attempts to receive UDP traffic on the puppetclient port.
34781 </summary>
34782 @@ -52405,7 +52489,7 @@ Domain to not audit.
34783 </param>
34784 <infoflow type="none"/>
34785 </interface>
34786 -<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="67733">
34787 +<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="67751">
34788 <summary>
34789 Send and receive UDP traffic on the puppetclient port.
34790 </summary>
34791 @@ -52416,7 +52500,7 @@ Domain allowed access.
34792 </param>
34793 <infoflow type="both" weight="10"/>
34794 </interface>
34795 -<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="67749">
34796 +<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="67767">
34797 <summary>
34798 Do not audit attempts to send and receive
34799 UDP traffic on the puppetclient port.
34800 @@ -52428,7 +52512,7 @@ Domain to not audit.
34801 </param>
34802 <infoflow type="none"/>
34803 </interface>
34804 -<interface name="corenet_tcp_bind_puppetclient_port" lineno="67764">
34805 +<interface name="corenet_tcp_bind_puppetclient_port" lineno="67782">
34806 <summary>
34807 Bind TCP sockets to the puppetclient port.
34808 </summary>
34809 @@ -52439,7 +52523,7 @@ Domain allowed access.
34810 </param>
34811 <infoflow type="none"/>
34812 </interface>
34813 -<interface name="corenet_udp_bind_puppetclient_port" lineno="67784">
34814 +<interface name="corenet_udp_bind_puppetclient_port" lineno="67802">
34815 <summary>
34816 Bind UDP sockets to the puppetclient port.
34817 </summary>
34818 @@ -52450,7 +52534,7 @@ Domain allowed access.
34819 </param>
34820 <infoflow type="none"/>
34821 </interface>
34822 -<interface name="corenet_tcp_connect_puppetclient_port" lineno="67803">
34823 +<interface name="corenet_tcp_connect_puppetclient_port" lineno="67821">
34824 <summary>
34825 Make a TCP connection to the puppetclient port.
34826 </summary>
34827 @@ -52460,7 +52544,7 @@ Domain allowed access.
34828 </summary>
34829 </param>
34830 </interface>
34831 -<interface name="corenet_send_puppetclient_client_packets" lineno="67823">
34832 +<interface name="corenet_send_puppetclient_client_packets" lineno="67841">
34833 <summary>
34834 Send puppetclient_client packets.
34835 </summary>
34836 @@ -52471,7 +52555,7 @@ Domain allowed access.
34837 </param>
34838 <infoflow type="write" weight="10"/>
34839 </interface>
34840 -<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="67842">
34841 +<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="67860">
34842 <summary>
34843 Do not audit attempts to send puppetclient_client packets.
34844 </summary>
34845 @@ -52482,7 +52566,7 @@ Domain to not audit.
34846 </param>
34847 <infoflow type="none"/>
34848 </interface>
34849 -<interface name="corenet_receive_puppetclient_client_packets" lineno="67861">
34850 +<interface name="corenet_receive_puppetclient_client_packets" lineno="67879">
34851 <summary>
34852 Receive puppetclient_client packets.
34853 </summary>
34854 @@ -52493,7 +52577,7 @@ Domain allowed access.
34855 </param>
34856 <infoflow type="read" weight="10"/>
34857 </interface>
34858 -<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="67880">
34859 +<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="67898">
34860 <summary>
34861 Do not audit attempts to receive puppetclient_client packets.
34862 </summary>
34863 @@ -52504,7 +52588,7 @@ Domain allowed access.
34864 </param>
34865 <infoflow type="none"/>
34866 </interface>
34867 -<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="67899">
34868 +<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="67917">
34869 <summary>
34870 Send and receive puppetclient_client packets.
34871 </summary>
34872 @@ -52515,7 +52599,7 @@ Domain allowed access.
34873 </param>
34874 <infoflow type="both" weight="10"/>
34875 </interface>
34876 -<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="67915">
34877 +<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="67933">
34878 <summary>
34879 Do not audit attempts to send and receive puppetclient_client packets.
34880 </summary>
34881 @@ -52526,7 +52610,7 @@ Domain to not audit.
34882 </param>
34883 <infoflow type="none"/>
34884 </interface>
34885 -<interface name="corenet_relabelto_puppetclient_client_packets" lineno="67930">
34886 +<interface name="corenet_relabelto_puppetclient_client_packets" lineno="67948">
34887 <summary>
34888 Relabel packets to puppetclient_client the packet type.
34889 </summary>
34890 @@ -52536,7 +52620,7 @@ Domain allowed access.
34891 </summary>
34892 </param>
34893 </interface>
34894 -<interface name="corenet_send_puppetclient_server_packets" lineno="67950">
34895 +<interface name="corenet_send_puppetclient_server_packets" lineno="67968">
34896 <summary>
34897 Send puppetclient_server packets.
34898 </summary>
34899 @@ -52547,7 +52631,7 @@ Domain allowed access.
34900 </param>
34901 <infoflow type="write" weight="10"/>
34902 </interface>
34903 -<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="67969">
34904 +<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="67987">
34905 <summary>
34906 Do not audit attempts to send puppetclient_server packets.
34907 </summary>
34908 @@ -52558,7 +52642,7 @@ Domain to not audit.
34909 </param>
34910 <infoflow type="none"/>
34911 </interface>
34912 -<interface name="corenet_receive_puppetclient_server_packets" lineno="67988">
34913 +<interface name="corenet_receive_puppetclient_server_packets" lineno="68006">
34914 <summary>
34915 Receive puppetclient_server packets.
34916 </summary>
34917 @@ -52569,7 +52653,7 @@ Domain allowed access.
34918 </param>
34919 <infoflow type="read" weight="10"/>
34920 </interface>
34921 -<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="68007">
34922 +<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="68025">
34923 <summary>
34924 Do not audit attempts to receive puppetclient_server packets.
34925 </summary>
34926 @@ -52580,7 +52664,7 @@ Domain allowed access.
34927 </param>
34928 <infoflow type="none"/>
34929 </interface>
34930 -<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="68026">
34931 +<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="68044">
34932 <summary>
34933 Send and receive puppetclient_server packets.
34934 </summary>
34935 @@ -52591,7 +52675,7 @@ Domain allowed access.
34936 </param>
34937 <infoflow type="both" weight="10"/>
34938 </interface>
34939 -<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="68042">
34940 +<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="68060">
34941 <summary>
34942 Do not audit attempts to send and receive puppetclient_server packets.
34943 </summary>
34944 @@ -52602,7 +52686,7 @@ Domain to not audit.
34945 </param>
34946 <infoflow type="none"/>
34947 </interface>
34948 -<interface name="corenet_relabelto_puppetclient_server_packets" lineno="68057">
34949 +<interface name="corenet_relabelto_puppetclient_server_packets" lineno="68075">
34950 <summary>
34951 Relabel packets to puppetclient_server the packet type.
34952 </summary>
34953 @@ -52612,7 +52696,7 @@ Domain allowed access.
34954 </summary>
34955 </param>
34956 </interface>
34957 -<interface name="corenet_tcp_sendrecv_pxe_port" lineno="68079">
34958 +<interface name="corenet_tcp_sendrecv_pxe_port" lineno="68097">
34959 <summary>
34960 Send and receive TCP traffic on the pxe port.
34961 </summary>
34962 @@ -52623,7 +52707,7 @@ Domain allowed access.
34963 </param>
34964 <infoflow type="both" weight="10"/>
34965 </interface>
34966 -<interface name="corenet_udp_send_pxe_port" lineno="68094">
34967 +<interface name="corenet_udp_send_pxe_port" lineno="68112">
34968 <summary>
34969 Send UDP traffic on the pxe port.
34970 </summary>
34971 @@ -52634,7 +52718,7 @@ Domain allowed access.
34972 </param>
34973 <infoflow type="write" weight="10"/>
34974 </interface>
34975 -<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="68109">
34976 +<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="68127">
34977 <summary>
34978 Do not audit attempts to send UDP traffic on the pxe port.
34979 </summary>
34980 @@ -52645,7 +52729,7 @@ Domain to not audit.
34981 </param>
34982 <infoflow type="none"/>
34983 </interface>
34984 -<interface name="corenet_udp_receive_pxe_port" lineno="68124">
34985 +<interface name="corenet_udp_receive_pxe_port" lineno="68142">
34986 <summary>
34987 Receive UDP traffic on the pxe port.
34988 </summary>
34989 @@ -52656,7 +52740,7 @@ Domain allowed access.
34990 </param>
34991 <infoflow type="read" weight="10"/>
34992 </interface>
34993 -<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="68139">
34994 +<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="68157">
34995 <summary>
34996 Do not audit attempts to receive UDP traffic on the pxe port.
34997 </summary>
34998 @@ -52667,7 +52751,7 @@ Domain to not audit.
34999 </param>
35000 <infoflow type="none"/>
35001 </interface>
35002 -<interface name="corenet_udp_sendrecv_pxe_port" lineno="68154">
35003 +<interface name="corenet_udp_sendrecv_pxe_port" lineno="68172">
35004 <summary>
35005 Send and receive UDP traffic on the pxe port.
35006 </summary>
35007 @@ -52678,7 +52762,7 @@ Domain allowed access.
35008 </param>
35009 <infoflow type="both" weight="10"/>
35010 </interface>
35011 -<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="68170">
35012 +<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="68188">
35013 <summary>
35014 Do not audit attempts to send and receive
35015 UDP traffic on the pxe port.
35016 @@ -52690,7 +52774,7 @@ Domain to not audit.
35017 </param>
35018 <infoflow type="none"/>
35019 </interface>
35020 -<interface name="corenet_tcp_bind_pxe_port" lineno="68185">
35021 +<interface name="corenet_tcp_bind_pxe_port" lineno="68203">
35022 <summary>
35023 Bind TCP sockets to the pxe port.
35024 </summary>
35025 @@ -52701,7 +52785,7 @@ Domain allowed access.
35026 </param>
35027 <infoflow type="none"/>
35028 </interface>
35029 -<interface name="corenet_udp_bind_pxe_port" lineno="68205">
35030 +<interface name="corenet_udp_bind_pxe_port" lineno="68223">
35031 <summary>
35032 Bind UDP sockets to the pxe port.
35033 </summary>
35034 @@ -52712,7 +52796,7 @@ Domain allowed access.
35035 </param>
35036 <infoflow type="none"/>
35037 </interface>
35038 -<interface name="corenet_tcp_connect_pxe_port" lineno="68224">
35039 +<interface name="corenet_tcp_connect_pxe_port" lineno="68242">
35040 <summary>
35041 Make a TCP connection to the pxe port.
35042 </summary>
35043 @@ -52722,7 +52806,7 @@ Domain allowed access.
35044 </summary>
35045 </param>
35046 </interface>
35047 -<interface name="corenet_send_pxe_client_packets" lineno="68244">
35048 +<interface name="corenet_send_pxe_client_packets" lineno="68262">
35049 <summary>
35050 Send pxe_client packets.
35051 </summary>
35052 @@ -52733,7 +52817,7 @@ Domain allowed access.
35053 </param>
35054 <infoflow type="write" weight="10"/>
35055 </interface>
35056 -<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="68263">
35057 +<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="68281">
35058 <summary>
35059 Do not audit attempts to send pxe_client packets.
35060 </summary>
35061 @@ -52744,7 +52828,7 @@ Domain to not audit.
35062 </param>
35063 <infoflow type="none"/>
35064 </interface>
35065 -<interface name="corenet_receive_pxe_client_packets" lineno="68282">
35066 +<interface name="corenet_receive_pxe_client_packets" lineno="68300">
35067 <summary>
35068 Receive pxe_client packets.
35069 </summary>
35070 @@ -52755,7 +52839,7 @@ Domain allowed access.
35071 </param>
35072 <infoflow type="read" weight="10"/>
35073 </interface>
35074 -<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="68301">
35075 +<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="68319">
35076 <summary>
35077 Do not audit attempts to receive pxe_client packets.
35078 </summary>
35079 @@ -52766,7 +52850,7 @@ Domain allowed access.
35080 </param>
35081 <infoflow type="none"/>
35082 </interface>
35083 -<interface name="corenet_sendrecv_pxe_client_packets" lineno="68320">
35084 +<interface name="corenet_sendrecv_pxe_client_packets" lineno="68338">
35085 <summary>
35086 Send and receive pxe_client packets.
35087 </summary>
35088 @@ -52777,7 +52861,7 @@ Domain allowed access.
35089 </param>
35090 <infoflow type="both" weight="10"/>
35091 </interface>
35092 -<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="68336">
35093 +<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="68354">
35094 <summary>
35095 Do not audit attempts to send and receive pxe_client packets.
35096 </summary>
35097 @@ -52788,7 +52872,7 @@ Domain to not audit.
35098 </param>
35099 <infoflow type="none"/>
35100 </interface>
35101 -<interface name="corenet_relabelto_pxe_client_packets" lineno="68351">
35102 +<interface name="corenet_relabelto_pxe_client_packets" lineno="68369">
35103 <summary>
35104 Relabel packets to pxe_client the packet type.
35105 </summary>
35106 @@ -52798,7 +52882,7 @@ Domain allowed access.
35107 </summary>
35108 </param>
35109 </interface>
35110 -<interface name="corenet_send_pxe_server_packets" lineno="68371">
35111 +<interface name="corenet_send_pxe_server_packets" lineno="68389">
35112 <summary>
35113 Send pxe_server packets.
35114 </summary>
35115 @@ -52809,7 +52893,7 @@ Domain allowed access.
35116 </param>
35117 <infoflow type="write" weight="10"/>
35118 </interface>
35119 -<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="68390">
35120 +<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="68408">
35121 <summary>
35122 Do not audit attempts to send pxe_server packets.
35123 </summary>
35124 @@ -52820,7 +52904,7 @@ Domain to not audit.
35125 </param>
35126 <infoflow type="none"/>
35127 </interface>
35128 -<interface name="corenet_receive_pxe_server_packets" lineno="68409">
35129 +<interface name="corenet_receive_pxe_server_packets" lineno="68427">
35130 <summary>
35131 Receive pxe_server packets.
35132 </summary>
35133 @@ -52831,7 +52915,7 @@ Domain allowed access.
35134 </param>
35135 <infoflow type="read" weight="10"/>
35136 </interface>
35137 -<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="68428">
35138 +<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="68446">
35139 <summary>
35140 Do not audit attempts to receive pxe_server packets.
35141 </summary>
35142 @@ -52842,7 +52926,7 @@ Domain allowed access.
35143 </param>
35144 <infoflow type="none"/>
35145 </interface>
35146 -<interface name="corenet_sendrecv_pxe_server_packets" lineno="68447">
35147 +<interface name="corenet_sendrecv_pxe_server_packets" lineno="68465">
35148 <summary>
35149 Send and receive pxe_server packets.
35150 </summary>
35151 @@ -52853,7 +52937,7 @@ Domain allowed access.
35152 </param>
35153 <infoflow type="both" weight="10"/>
35154 </interface>
35155 -<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="68463">
35156 +<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="68481">
35157 <summary>
35158 Do not audit attempts to send and receive pxe_server packets.
35159 </summary>
35160 @@ -52864,7 +52948,7 @@ Domain to not audit.
35161 </param>
35162 <infoflow type="none"/>
35163 </interface>
35164 -<interface name="corenet_relabelto_pxe_server_packets" lineno="68478">
35165 +<interface name="corenet_relabelto_pxe_server_packets" lineno="68496">
35166 <summary>
35167 Relabel packets to pxe_server the packet type.
35168 </summary>
35169 @@ -52874,7 +52958,7 @@ Domain allowed access.
35170 </summary>
35171 </param>
35172 </interface>
35173 -<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="68500">
35174 +<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="68518">
35175 <summary>
35176 Send and receive TCP traffic on the pyzor port.
35177 </summary>
35178 @@ -52885,7 +52969,7 @@ Domain allowed access.
35179 </param>
35180 <infoflow type="both" weight="10"/>
35181 </interface>
35182 -<interface name="corenet_udp_send_pyzor_port" lineno="68515">
35183 +<interface name="corenet_udp_send_pyzor_port" lineno="68533">
35184 <summary>
35185 Send UDP traffic on the pyzor port.
35186 </summary>
35187 @@ -52896,7 +52980,7 @@ Domain allowed access.
35188 </param>
35189 <infoflow type="write" weight="10"/>
35190 </interface>
35191 -<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="68530">
35192 +<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="68548">
35193 <summary>
35194 Do not audit attempts to send UDP traffic on the pyzor port.
35195 </summary>
35196 @@ -52907,7 +52991,7 @@ Domain to not audit.
35197 </param>
35198 <infoflow type="none"/>
35199 </interface>
35200 -<interface name="corenet_udp_receive_pyzor_port" lineno="68545">
35201 +<interface name="corenet_udp_receive_pyzor_port" lineno="68563">
35202 <summary>
35203 Receive UDP traffic on the pyzor port.
35204 </summary>
35205 @@ -52918,7 +53002,7 @@ Domain allowed access.
35206 </param>
35207 <infoflow type="read" weight="10"/>
35208 </interface>
35209 -<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="68560">
35210 +<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="68578">
35211 <summary>
35212 Do not audit attempts to receive UDP traffic on the pyzor port.
35213 </summary>
35214 @@ -52929,7 +53013,7 @@ Domain to not audit.
35215 </param>
35216 <infoflow type="none"/>
35217 </interface>
35218 -<interface name="corenet_udp_sendrecv_pyzor_port" lineno="68575">
35219 +<interface name="corenet_udp_sendrecv_pyzor_port" lineno="68593">
35220 <summary>
35221 Send and receive UDP traffic on the pyzor port.
35222 </summary>
35223 @@ -52940,7 +53024,7 @@ Domain allowed access.
35224 </param>
35225 <infoflow type="both" weight="10"/>
35226 </interface>
35227 -<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="68591">
35228 +<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="68609">
35229 <summary>
35230 Do not audit attempts to send and receive
35231 UDP traffic on the pyzor port.
35232 @@ -52952,7 +53036,7 @@ Domain to not audit.
35233 </param>
35234 <infoflow type="none"/>
35235 </interface>
35236 -<interface name="corenet_tcp_bind_pyzor_port" lineno="68606">
35237 +<interface name="corenet_tcp_bind_pyzor_port" lineno="68624">
35238 <summary>
35239 Bind TCP sockets to the pyzor port.
35240 </summary>
35241 @@ -52963,7 +53047,7 @@ Domain allowed access.
35242 </param>
35243 <infoflow type="none"/>
35244 </interface>
35245 -<interface name="corenet_udp_bind_pyzor_port" lineno="68626">
35246 +<interface name="corenet_udp_bind_pyzor_port" lineno="68644">
35247 <summary>
35248 Bind UDP sockets to the pyzor port.
35249 </summary>
35250 @@ -52974,7 +53058,7 @@ Domain allowed access.
35251 </param>
35252 <infoflow type="none"/>
35253 </interface>
35254 -<interface name="corenet_tcp_connect_pyzor_port" lineno="68645">
35255 +<interface name="corenet_tcp_connect_pyzor_port" lineno="68663">
35256 <summary>
35257 Make a TCP connection to the pyzor port.
35258 </summary>
35259 @@ -52984,7 +53068,7 @@ Domain allowed access.
35260 </summary>
35261 </param>
35262 </interface>
35263 -<interface name="corenet_send_pyzor_client_packets" lineno="68665">
35264 +<interface name="corenet_send_pyzor_client_packets" lineno="68683">
35265 <summary>
35266 Send pyzor_client packets.
35267 </summary>
35268 @@ -52995,7 +53079,7 @@ Domain allowed access.
35269 </param>
35270 <infoflow type="write" weight="10"/>
35271 </interface>
35272 -<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="68684">
35273 +<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="68702">
35274 <summary>
35275 Do not audit attempts to send pyzor_client packets.
35276 </summary>
35277 @@ -53006,7 +53090,7 @@ Domain to not audit.
35278 </param>
35279 <infoflow type="none"/>
35280 </interface>
35281 -<interface name="corenet_receive_pyzor_client_packets" lineno="68703">
35282 +<interface name="corenet_receive_pyzor_client_packets" lineno="68721">
35283 <summary>
35284 Receive pyzor_client packets.
35285 </summary>
35286 @@ -53017,7 +53101,7 @@ Domain allowed access.
35287 </param>
35288 <infoflow type="read" weight="10"/>
35289 </interface>
35290 -<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="68722">
35291 +<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="68740">
35292 <summary>
35293 Do not audit attempts to receive pyzor_client packets.
35294 </summary>
35295 @@ -53028,7 +53112,7 @@ Domain allowed access.
35296 </param>
35297 <infoflow type="none"/>
35298 </interface>
35299 -<interface name="corenet_sendrecv_pyzor_client_packets" lineno="68741">
35300 +<interface name="corenet_sendrecv_pyzor_client_packets" lineno="68759">
35301 <summary>
35302 Send and receive pyzor_client packets.
35303 </summary>
35304 @@ -53039,7 +53123,7 @@ Domain allowed access.
35305 </param>
35306 <infoflow type="both" weight="10"/>
35307 </interface>
35308 -<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="68757">
35309 +<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="68775">
35310 <summary>
35311 Do not audit attempts to send and receive pyzor_client packets.
35312 </summary>
35313 @@ -53050,7 +53134,7 @@ Domain to not audit.
35314 </param>
35315 <infoflow type="none"/>
35316 </interface>
35317 -<interface name="corenet_relabelto_pyzor_client_packets" lineno="68772">
35318 +<interface name="corenet_relabelto_pyzor_client_packets" lineno="68790">
35319 <summary>
35320 Relabel packets to pyzor_client the packet type.
35321 </summary>
35322 @@ -53060,7 +53144,7 @@ Domain allowed access.
35323 </summary>
35324 </param>
35325 </interface>
35326 -<interface name="corenet_send_pyzor_server_packets" lineno="68792">
35327 +<interface name="corenet_send_pyzor_server_packets" lineno="68810">
35328 <summary>
35329 Send pyzor_server packets.
35330 </summary>
35331 @@ -53071,7 +53155,7 @@ Domain allowed access.
35332 </param>
35333 <infoflow type="write" weight="10"/>
35334 </interface>
35335 -<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="68811">
35336 +<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="68829">
35337 <summary>
35338 Do not audit attempts to send pyzor_server packets.
35339 </summary>
35340 @@ -53082,7 +53166,7 @@ Domain to not audit.
35341 </param>
35342 <infoflow type="none"/>
35343 </interface>
35344 -<interface name="corenet_receive_pyzor_server_packets" lineno="68830">
35345 +<interface name="corenet_receive_pyzor_server_packets" lineno="68848">
35346 <summary>
35347 Receive pyzor_server packets.
35348 </summary>
35349 @@ -53093,7 +53177,7 @@ Domain allowed access.
35350 </param>
35351 <infoflow type="read" weight="10"/>
35352 </interface>
35353 -<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="68849">
35354 +<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="68867">
35355 <summary>
35356 Do not audit attempts to receive pyzor_server packets.
35357 </summary>
35358 @@ -53104,7 +53188,7 @@ Domain allowed access.
35359 </param>
35360 <infoflow type="none"/>
35361 </interface>
35362 -<interface name="corenet_sendrecv_pyzor_server_packets" lineno="68868">
35363 +<interface name="corenet_sendrecv_pyzor_server_packets" lineno="68886">
35364 <summary>
35365 Send and receive pyzor_server packets.
35366 </summary>
35367 @@ -53115,7 +53199,7 @@ Domain allowed access.
35368 </param>
35369 <infoflow type="both" weight="10"/>
35370 </interface>
35371 -<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="68884">
35372 +<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="68902">
35373 <summary>
35374 Do not audit attempts to send and receive pyzor_server packets.
35375 </summary>
35376 @@ -53126,7 +53210,7 @@ Domain to not audit.
35377 </param>
35378 <infoflow type="none"/>
35379 </interface>
35380 -<interface name="corenet_relabelto_pyzor_server_packets" lineno="68899">
35381 +<interface name="corenet_relabelto_pyzor_server_packets" lineno="68917">
35382 <summary>
35383 Relabel packets to pyzor_server the packet type.
35384 </summary>
35385 @@ -53136,7 +53220,7 @@ Domain allowed access.
35386 </summary>
35387 </param>
35388 </interface>
35389 -<interface name="corenet_tcp_sendrecv_radacct_port" lineno="68921">
35390 +<interface name="corenet_tcp_sendrecv_radacct_port" lineno="68939">
35391 <summary>
35392 Send and receive TCP traffic on the radacct port.
35393 </summary>
35394 @@ -53147,7 +53231,7 @@ Domain allowed access.
35395 </param>
35396 <infoflow type="both" weight="10"/>
35397 </interface>
35398 -<interface name="corenet_udp_send_radacct_port" lineno="68936">
35399 +<interface name="corenet_udp_send_radacct_port" lineno="68954">
35400 <summary>
35401 Send UDP traffic on the radacct port.
35402 </summary>
35403 @@ -53158,7 +53242,7 @@ Domain allowed access.
35404 </param>
35405 <infoflow type="write" weight="10"/>
35406 </interface>
35407 -<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="68951">
35408 +<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="68969">
35409 <summary>
35410 Do not audit attempts to send UDP traffic on the radacct port.
35411 </summary>
35412 @@ -53169,7 +53253,7 @@ Domain to not audit.
35413 </param>
35414 <infoflow type="none"/>
35415 </interface>
35416 -<interface name="corenet_udp_receive_radacct_port" lineno="68966">
35417 +<interface name="corenet_udp_receive_radacct_port" lineno="68984">
35418 <summary>
35419 Receive UDP traffic on the radacct port.
35420 </summary>
35421 @@ -53180,7 +53264,7 @@ Domain allowed access.
35422 </param>
35423 <infoflow type="read" weight="10"/>
35424 </interface>
35425 -<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="68981">
35426 +<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="68999">
35427 <summary>
35428 Do not audit attempts to receive UDP traffic on the radacct port.
35429 </summary>
35430 @@ -53191,7 +53275,7 @@ Domain to not audit.
35431 </param>
35432 <infoflow type="none"/>
35433 </interface>
35434 -<interface name="corenet_udp_sendrecv_radacct_port" lineno="68996">
35435 +<interface name="corenet_udp_sendrecv_radacct_port" lineno="69014">
35436 <summary>
35437 Send and receive UDP traffic on the radacct port.
35438 </summary>
35439 @@ -53202,7 +53286,7 @@ Domain allowed access.
35440 </param>
35441 <infoflow type="both" weight="10"/>
35442 </interface>
35443 -<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="69012">
35444 +<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="69030">
35445 <summary>
35446 Do not audit attempts to send and receive
35447 UDP traffic on the radacct port.
35448 @@ -53214,7 +53298,7 @@ Domain to not audit.
35449 </param>
35450 <infoflow type="none"/>
35451 </interface>
35452 -<interface name="corenet_tcp_bind_radacct_port" lineno="69027">
35453 +<interface name="corenet_tcp_bind_radacct_port" lineno="69045">
35454 <summary>
35455 Bind TCP sockets to the radacct port.
35456 </summary>
35457 @@ -53225,7 +53309,7 @@ Domain allowed access.
35458 </param>
35459 <infoflow type="none"/>
35460 </interface>
35461 -<interface name="corenet_udp_bind_radacct_port" lineno="69047">
35462 +<interface name="corenet_udp_bind_radacct_port" lineno="69065">
35463 <summary>
35464 Bind UDP sockets to the radacct port.
35465 </summary>
35466 @@ -53236,7 +53320,7 @@ Domain allowed access.
35467 </param>
35468 <infoflow type="none"/>
35469 </interface>
35470 -<interface name="corenet_tcp_connect_radacct_port" lineno="69066">
35471 +<interface name="corenet_tcp_connect_radacct_port" lineno="69084">
35472 <summary>
35473 Make a TCP connection to the radacct port.
35474 </summary>
35475 @@ -53246,7 +53330,7 @@ Domain allowed access.
35476 </summary>
35477 </param>
35478 </interface>
35479 -<interface name="corenet_send_radacct_client_packets" lineno="69086">
35480 +<interface name="corenet_send_radacct_client_packets" lineno="69104">
35481 <summary>
35482 Send radacct_client packets.
35483 </summary>
35484 @@ -53257,7 +53341,7 @@ Domain allowed access.
35485 </param>
35486 <infoflow type="write" weight="10"/>
35487 </interface>
35488 -<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="69105">
35489 +<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="69123">
35490 <summary>
35491 Do not audit attempts to send radacct_client packets.
35492 </summary>
35493 @@ -53268,7 +53352,7 @@ Domain to not audit.
35494 </param>
35495 <infoflow type="none"/>
35496 </interface>
35497 -<interface name="corenet_receive_radacct_client_packets" lineno="69124">
35498 +<interface name="corenet_receive_radacct_client_packets" lineno="69142">
35499 <summary>
35500 Receive radacct_client packets.
35501 </summary>
35502 @@ -53279,7 +53363,7 @@ Domain allowed access.
35503 </param>
35504 <infoflow type="read" weight="10"/>
35505 </interface>
35506 -<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="69143">
35507 +<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="69161">
35508 <summary>
35509 Do not audit attempts to receive radacct_client packets.
35510 </summary>
35511 @@ -53290,7 +53374,7 @@ Domain allowed access.
35512 </param>
35513 <infoflow type="none"/>
35514 </interface>
35515 -<interface name="corenet_sendrecv_radacct_client_packets" lineno="69162">
35516 +<interface name="corenet_sendrecv_radacct_client_packets" lineno="69180">
35517 <summary>
35518 Send and receive radacct_client packets.
35519 </summary>
35520 @@ -53301,7 +53385,7 @@ Domain allowed access.
35521 </param>
35522 <infoflow type="both" weight="10"/>
35523 </interface>
35524 -<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="69178">
35525 +<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="69196">
35526 <summary>
35527 Do not audit attempts to send and receive radacct_client packets.
35528 </summary>
35529 @@ -53312,7 +53396,7 @@ Domain to not audit.
35530 </param>
35531 <infoflow type="none"/>
35532 </interface>
35533 -<interface name="corenet_relabelto_radacct_client_packets" lineno="69193">
35534 +<interface name="corenet_relabelto_radacct_client_packets" lineno="69211">
35535 <summary>
35536 Relabel packets to radacct_client the packet type.
35537 </summary>
35538 @@ -53322,7 +53406,7 @@ Domain allowed access.
35539 </summary>
35540 </param>
35541 </interface>
35542 -<interface name="corenet_send_radacct_server_packets" lineno="69213">
35543 +<interface name="corenet_send_radacct_server_packets" lineno="69231">
35544 <summary>
35545 Send radacct_server packets.
35546 </summary>
35547 @@ -53333,7 +53417,7 @@ Domain allowed access.
35548 </param>
35549 <infoflow type="write" weight="10"/>
35550 </interface>
35551 -<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="69232">
35552 +<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="69250">
35553 <summary>
35554 Do not audit attempts to send radacct_server packets.
35555 </summary>
35556 @@ -53344,7 +53428,7 @@ Domain to not audit.
35557 </param>
35558 <infoflow type="none"/>
35559 </interface>
35560 -<interface name="corenet_receive_radacct_server_packets" lineno="69251">
35561 +<interface name="corenet_receive_radacct_server_packets" lineno="69269">
35562 <summary>
35563 Receive radacct_server packets.
35564 </summary>
35565 @@ -53355,7 +53439,7 @@ Domain allowed access.
35566 </param>
35567 <infoflow type="read" weight="10"/>
35568 </interface>
35569 -<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="69270">
35570 +<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="69288">
35571 <summary>
35572 Do not audit attempts to receive radacct_server packets.
35573 </summary>
35574 @@ -53366,7 +53450,7 @@ Domain allowed access.
35575 </param>
35576 <infoflow type="none"/>
35577 </interface>
35578 -<interface name="corenet_sendrecv_radacct_server_packets" lineno="69289">
35579 +<interface name="corenet_sendrecv_radacct_server_packets" lineno="69307">
35580 <summary>
35581 Send and receive radacct_server packets.
35582 </summary>
35583 @@ -53377,7 +53461,7 @@ Domain allowed access.
35584 </param>
35585 <infoflow type="both" weight="10"/>
35586 </interface>
35587 -<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="69305">
35588 +<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="69323">
35589 <summary>
35590 Do not audit attempts to send and receive radacct_server packets.
35591 </summary>
35592 @@ -53388,7 +53472,7 @@ Domain to not audit.
35593 </param>
35594 <infoflow type="none"/>
35595 </interface>
35596 -<interface name="corenet_relabelto_radacct_server_packets" lineno="69320">
35597 +<interface name="corenet_relabelto_radacct_server_packets" lineno="69338">
35598 <summary>
35599 Relabel packets to radacct_server the packet type.
35600 </summary>
35601 @@ -53398,7 +53482,7 @@ Domain allowed access.
35602 </summary>
35603 </param>
35604 </interface>
35605 -<interface name="corenet_tcp_sendrecv_radius_port" lineno="69342">
35606 +<interface name="corenet_tcp_sendrecv_radius_port" lineno="69360">
35607 <summary>
35608 Send and receive TCP traffic on the radius port.
35609 </summary>
35610 @@ -53409,7 +53493,7 @@ Domain allowed access.
35611 </param>
35612 <infoflow type="both" weight="10"/>
35613 </interface>
35614 -<interface name="corenet_udp_send_radius_port" lineno="69357">
35615 +<interface name="corenet_udp_send_radius_port" lineno="69375">
35616 <summary>
35617 Send UDP traffic on the radius port.
35618 </summary>
35619 @@ -53420,7 +53504,7 @@ Domain allowed access.
35620 </param>
35621 <infoflow type="write" weight="10"/>
35622 </interface>
35623 -<interface name="corenet_dontaudit_udp_send_radius_port" lineno="69372">
35624 +<interface name="corenet_dontaudit_udp_send_radius_port" lineno="69390">
35625 <summary>
35626 Do not audit attempts to send UDP traffic on the radius port.
35627 </summary>
35628 @@ -53431,7 +53515,7 @@ Domain to not audit.
35629 </param>
35630 <infoflow type="none"/>
35631 </interface>
35632 -<interface name="corenet_udp_receive_radius_port" lineno="69387">
35633 +<interface name="corenet_udp_receive_radius_port" lineno="69405">
35634 <summary>
35635 Receive UDP traffic on the radius port.
35636 </summary>
35637 @@ -53442,7 +53526,7 @@ Domain allowed access.
35638 </param>
35639 <infoflow type="read" weight="10"/>
35640 </interface>
35641 -<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="69402">
35642 +<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="69420">
35643 <summary>
35644 Do not audit attempts to receive UDP traffic on the radius port.
35645 </summary>
35646 @@ -53453,7 +53537,7 @@ Domain to not audit.
35647 </param>
35648 <infoflow type="none"/>
35649 </interface>
35650 -<interface name="corenet_udp_sendrecv_radius_port" lineno="69417">
35651 +<interface name="corenet_udp_sendrecv_radius_port" lineno="69435">
35652 <summary>
35653 Send and receive UDP traffic on the radius port.
35654 </summary>
35655 @@ -53464,7 +53548,7 @@ Domain allowed access.
35656 </param>
35657 <infoflow type="both" weight="10"/>
35658 </interface>
35659 -<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="69433">
35660 +<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="69451">
35661 <summary>
35662 Do not audit attempts to send and receive
35663 UDP traffic on the radius port.
35664 @@ -53476,7 +53560,7 @@ Domain to not audit.
35665 </param>
35666 <infoflow type="none"/>
35667 </interface>
35668 -<interface name="corenet_tcp_bind_radius_port" lineno="69448">
35669 +<interface name="corenet_tcp_bind_radius_port" lineno="69466">
35670 <summary>
35671 Bind TCP sockets to the radius port.
35672 </summary>
35673 @@ -53487,7 +53571,7 @@ Domain allowed access.
35674 </param>
35675 <infoflow type="none"/>
35676 </interface>
35677 -<interface name="corenet_udp_bind_radius_port" lineno="69468">
35678 +<interface name="corenet_udp_bind_radius_port" lineno="69486">
35679 <summary>
35680 Bind UDP sockets to the radius port.
35681 </summary>
35682 @@ -53498,7 +53582,7 @@ Domain allowed access.
35683 </param>
35684 <infoflow type="none"/>
35685 </interface>
35686 -<interface name="corenet_tcp_connect_radius_port" lineno="69487">
35687 +<interface name="corenet_tcp_connect_radius_port" lineno="69505">
35688 <summary>
35689 Make a TCP connection to the radius port.
35690 </summary>
35691 @@ -53508,7 +53592,7 @@ Domain allowed access.
35692 </summary>
35693 </param>
35694 </interface>
35695 -<interface name="corenet_send_radius_client_packets" lineno="69507">
35696 +<interface name="corenet_send_radius_client_packets" lineno="69525">
35697 <summary>
35698 Send radius_client packets.
35699 </summary>
35700 @@ -53519,7 +53603,7 @@ Domain allowed access.
35701 </param>
35702 <infoflow type="write" weight="10"/>
35703 </interface>
35704 -<interface name="corenet_dontaudit_send_radius_client_packets" lineno="69526">
35705 +<interface name="corenet_dontaudit_send_radius_client_packets" lineno="69544">
35706 <summary>
35707 Do not audit attempts to send radius_client packets.
35708 </summary>
35709 @@ -53530,7 +53614,7 @@ Domain to not audit.
35710 </param>
35711 <infoflow type="none"/>
35712 </interface>
35713 -<interface name="corenet_receive_radius_client_packets" lineno="69545">
35714 +<interface name="corenet_receive_radius_client_packets" lineno="69563">
35715 <summary>
35716 Receive radius_client packets.
35717 </summary>
35718 @@ -53541,7 +53625,7 @@ Domain allowed access.
35719 </param>
35720 <infoflow type="read" weight="10"/>
35721 </interface>
35722 -<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="69564">
35723 +<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="69582">
35724 <summary>
35725 Do not audit attempts to receive radius_client packets.
35726 </summary>
35727 @@ -53552,7 +53636,7 @@ Domain allowed access.
35728 </param>
35729 <infoflow type="none"/>
35730 </interface>
35731 -<interface name="corenet_sendrecv_radius_client_packets" lineno="69583">
35732 +<interface name="corenet_sendrecv_radius_client_packets" lineno="69601">
35733 <summary>
35734 Send and receive radius_client packets.
35735 </summary>
35736 @@ -53563,7 +53647,7 @@ Domain allowed access.
35737 </param>
35738 <infoflow type="both" weight="10"/>
35739 </interface>
35740 -<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="69599">
35741 +<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="69617">
35742 <summary>
35743 Do not audit attempts to send and receive radius_client packets.
35744 </summary>
35745 @@ -53574,7 +53658,7 @@ Domain to not audit.
35746 </param>
35747 <infoflow type="none"/>
35748 </interface>
35749 -<interface name="corenet_relabelto_radius_client_packets" lineno="69614">
35750 +<interface name="corenet_relabelto_radius_client_packets" lineno="69632">
35751 <summary>
35752 Relabel packets to radius_client the packet type.
35753 </summary>
35754 @@ -53584,7 +53668,7 @@ Domain allowed access.
35755 </summary>
35756 </param>
35757 </interface>
35758 -<interface name="corenet_send_radius_server_packets" lineno="69634">
35759 +<interface name="corenet_send_radius_server_packets" lineno="69652">
35760 <summary>
35761 Send radius_server packets.
35762 </summary>
35763 @@ -53595,7 +53679,7 @@ Domain allowed access.
35764 </param>
35765 <infoflow type="write" weight="10"/>
35766 </interface>
35767 -<interface name="corenet_dontaudit_send_radius_server_packets" lineno="69653">
35768 +<interface name="corenet_dontaudit_send_radius_server_packets" lineno="69671">
35769 <summary>
35770 Do not audit attempts to send radius_server packets.
35771 </summary>
35772 @@ -53606,7 +53690,7 @@ Domain to not audit.
35773 </param>
35774 <infoflow type="none"/>
35775 </interface>
35776 -<interface name="corenet_receive_radius_server_packets" lineno="69672">
35777 +<interface name="corenet_receive_radius_server_packets" lineno="69690">
35778 <summary>
35779 Receive radius_server packets.
35780 </summary>
35781 @@ -53617,7 +53701,7 @@ Domain allowed access.
35782 </param>
35783 <infoflow type="read" weight="10"/>
35784 </interface>
35785 -<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="69691">
35786 +<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="69709">
35787 <summary>
35788 Do not audit attempts to receive radius_server packets.
35789 </summary>
35790 @@ -53628,7 +53712,7 @@ Domain allowed access.
35791 </param>
35792 <infoflow type="none"/>
35793 </interface>
35794 -<interface name="corenet_sendrecv_radius_server_packets" lineno="69710">
35795 +<interface name="corenet_sendrecv_radius_server_packets" lineno="69728">
35796 <summary>
35797 Send and receive radius_server packets.
35798 </summary>
35799 @@ -53639,7 +53723,7 @@ Domain allowed access.
35800 </param>
35801 <infoflow type="both" weight="10"/>
35802 </interface>
35803 -<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="69726">
35804 +<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="69744">
35805 <summary>
35806 Do not audit attempts to send and receive radius_server packets.
35807 </summary>
35808 @@ -53650,7 +53734,7 @@ Domain to not audit.
35809 </param>
35810 <infoflow type="none"/>
35811 </interface>
35812 -<interface name="corenet_relabelto_radius_server_packets" lineno="69741">
35813 +<interface name="corenet_relabelto_radius_server_packets" lineno="69759">
35814 <summary>
35815 Relabel packets to radius_server the packet type.
35816 </summary>
35817 @@ -53660,7 +53744,7 @@ Domain allowed access.
35818 </summary>
35819 </param>
35820 </interface>
35821 -<interface name="corenet_tcp_sendrecv_radsec_port" lineno="69763">
35822 +<interface name="corenet_tcp_sendrecv_radsec_port" lineno="69781">
35823 <summary>
35824 Send and receive TCP traffic on the radsec port.
35825 </summary>
35826 @@ -53671,7 +53755,7 @@ Domain allowed access.
35827 </param>
35828 <infoflow type="both" weight="10"/>
35829 </interface>
35830 -<interface name="corenet_udp_send_radsec_port" lineno="69778">
35831 +<interface name="corenet_udp_send_radsec_port" lineno="69796">
35832 <summary>
35833 Send UDP traffic on the radsec port.
35834 </summary>
35835 @@ -53682,7 +53766,7 @@ Domain allowed access.
35836 </param>
35837 <infoflow type="write" weight="10"/>
35838 </interface>
35839 -<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="69793">
35840 +<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="69811">
35841 <summary>
35842 Do not audit attempts to send UDP traffic on the radsec port.
35843 </summary>
35844 @@ -53693,7 +53777,7 @@ Domain to not audit.
35845 </param>
35846 <infoflow type="none"/>
35847 </interface>
35848 -<interface name="corenet_udp_receive_radsec_port" lineno="69808">
35849 +<interface name="corenet_udp_receive_radsec_port" lineno="69826">
35850 <summary>
35851 Receive UDP traffic on the radsec port.
35852 </summary>
35853 @@ -53704,7 +53788,7 @@ Domain allowed access.
35854 </param>
35855 <infoflow type="read" weight="10"/>
35856 </interface>
35857 -<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="69823">
35858 +<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="69841">
35859 <summary>
35860 Do not audit attempts to receive UDP traffic on the radsec port.
35861 </summary>
35862 @@ -53715,7 +53799,7 @@ Domain to not audit.
35863 </param>
35864 <infoflow type="none"/>
35865 </interface>
35866 -<interface name="corenet_udp_sendrecv_radsec_port" lineno="69838">
35867 +<interface name="corenet_udp_sendrecv_radsec_port" lineno="69856">
35868 <summary>
35869 Send and receive UDP traffic on the radsec port.
35870 </summary>
35871 @@ -53726,7 +53810,7 @@ Domain allowed access.
35872 </param>
35873 <infoflow type="both" weight="10"/>
35874 </interface>
35875 -<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="69854">
35876 +<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="69872">
35877 <summary>
35878 Do not audit attempts to send and receive
35879 UDP traffic on the radsec port.
35880 @@ -53738,7 +53822,7 @@ Domain to not audit.
35881 </param>
35882 <infoflow type="none"/>
35883 </interface>
35884 -<interface name="corenet_tcp_bind_radsec_port" lineno="69869">
35885 +<interface name="corenet_tcp_bind_radsec_port" lineno="69887">
35886 <summary>
35887 Bind TCP sockets to the radsec port.
35888 </summary>
35889 @@ -53749,7 +53833,7 @@ Domain allowed access.
35890 </param>
35891 <infoflow type="none"/>
35892 </interface>
35893 -<interface name="corenet_udp_bind_radsec_port" lineno="69889">
35894 +<interface name="corenet_udp_bind_radsec_port" lineno="69907">
35895 <summary>
35896 Bind UDP sockets to the radsec port.
35897 </summary>
35898 @@ -53760,7 +53844,7 @@ Domain allowed access.
35899 </param>
35900 <infoflow type="none"/>
35901 </interface>
35902 -<interface name="corenet_tcp_connect_radsec_port" lineno="69908">
35903 +<interface name="corenet_tcp_connect_radsec_port" lineno="69926">
35904 <summary>
35905 Make a TCP connection to the radsec port.
35906 </summary>
35907 @@ -53770,7 +53854,7 @@ Domain allowed access.
35908 </summary>
35909 </param>
35910 </interface>
35911 -<interface name="corenet_send_radsec_client_packets" lineno="69928">
35912 +<interface name="corenet_send_radsec_client_packets" lineno="69946">
35913 <summary>
35914 Send radsec_client packets.
35915 </summary>
35916 @@ -53781,7 +53865,7 @@ Domain allowed access.
35917 </param>
35918 <infoflow type="write" weight="10"/>
35919 </interface>
35920 -<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="69947">
35921 +<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="69965">
35922 <summary>
35923 Do not audit attempts to send radsec_client packets.
35924 </summary>
35925 @@ -53792,7 +53876,7 @@ Domain to not audit.
35926 </param>
35927 <infoflow type="none"/>
35928 </interface>
35929 -<interface name="corenet_receive_radsec_client_packets" lineno="69966">
35930 +<interface name="corenet_receive_radsec_client_packets" lineno="69984">
35931 <summary>
35932 Receive radsec_client packets.
35933 </summary>
35934 @@ -53803,7 +53887,7 @@ Domain allowed access.
35935 </param>
35936 <infoflow type="read" weight="10"/>
35937 </interface>
35938 -<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="69985">
35939 +<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="70003">
35940 <summary>
35941 Do not audit attempts to receive radsec_client packets.
35942 </summary>
35943 @@ -53814,7 +53898,7 @@ Domain allowed access.
35944 </param>
35945 <infoflow type="none"/>
35946 </interface>
35947 -<interface name="corenet_sendrecv_radsec_client_packets" lineno="70004">
35948 +<interface name="corenet_sendrecv_radsec_client_packets" lineno="70022">
35949 <summary>
35950 Send and receive radsec_client packets.
35951 </summary>
35952 @@ -53825,7 +53909,7 @@ Domain allowed access.
35953 </param>
35954 <infoflow type="both" weight="10"/>
35955 </interface>
35956 -<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="70020">
35957 +<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="70038">
35958 <summary>
35959 Do not audit attempts to send and receive radsec_client packets.
35960 </summary>
35961 @@ -53836,7 +53920,7 @@ Domain to not audit.
35962 </param>
35963 <infoflow type="none"/>
35964 </interface>
35965 -<interface name="corenet_relabelto_radsec_client_packets" lineno="70035">
35966 +<interface name="corenet_relabelto_radsec_client_packets" lineno="70053">
35967 <summary>
35968 Relabel packets to radsec_client the packet type.
35969 </summary>
35970 @@ -53846,7 +53930,7 @@ Domain allowed access.
35971 </summary>
35972 </param>
35973 </interface>
35974 -<interface name="corenet_send_radsec_server_packets" lineno="70055">
35975 +<interface name="corenet_send_radsec_server_packets" lineno="70073">
35976 <summary>
35977 Send radsec_server packets.
35978 </summary>
35979 @@ -53857,7 +53941,7 @@ Domain allowed access.
35980 </param>
35981 <infoflow type="write" weight="10"/>
35982 </interface>
35983 -<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="70074">
35984 +<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="70092">
35985 <summary>
35986 Do not audit attempts to send radsec_server packets.
35987 </summary>
35988 @@ -53868,7 +53952,7 @@ Domain to not audit.
35989 </param>
35990 <infoflow type="none"/>
35991 </interface>
35992 -<interface name="corenet_receive_radsec_server_packets" lineno="70093">
35993 +<interface name="corenet_receive_radsec_server_packets" lineno="70111">
35994 <summary>
35995 Receive radsec_server packets.
35996 </summary>
35997 @@ -53879,7 +53963,7 @@ Domain allowed access.
35998 </param>
35999 <infoflow type="read" weight="10"/>
36000 </interface>
36001 -<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="70112">
36002 +<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="70130">
36003 <summary>
36004 Do not audit attempts to receive radsec_server packets.
36005 </summary>
36006 @@ -53890,7 +53974,7 @@ Domain allowed access.
36007 </param>
36008 <infoflow type="none"/>
36009 </interface>
36010 -<interface name="corenet_sendrecv_radsec_server_packets" lineno="70131">
36011 +<interface name="corenet_sendrecv_radsec_server_packets" lineno="70149">
36012 <summary>
36013 Send and receive radsec_server packets.
36014 </summary>
36015 @@ -53901,7 +53985,7 @@ Domain allowed access.
36016 </param>
36017 <infoflow type="both" weight="10"/>
36018 </interface>
36019 -<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="70147">
36020 +<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="70165">
36021 <summary>
36022 Do not audit attempts to send and receive radsec_server packets.
36023 </summary>
36024 @@ -53912,7 +53996,7 @@ Domain to not audit.
36025 </param>
36026 <infoflow type="none"/>
36027 </interface>
36028 -<interface name="corenet_relabelto_radsec_server_packets" lineno="70162">
36029 +<interface name="corenet_relabelto_radsec_server_packets" lineno="70180">
36030 <summary>
36031 Relabel packets to radsec_server the packet type.
36032 </summary>
36033 @@ -53922,7 +54006,7 @@ Domain allowed access.
36034 </summary>
36035 </param>
36036 </interface>
36037 -<interface name="corenet_tcp_sendrecv_razor_port" lineno="70184">
36038 +<interface name="corenet_tcp_sendrecv_razor_port" lineno="70202">
36039 <summary>
36040 Send and receive TCP traffic on the razor port.
36041 </summary>
36042 @@ -53933,7 +54017,7 @@ Domain allowed access.
36043 </param>
36044 <infoflow type="both" weight="10"/>
36045 </interface>
36046 -<interface name="corenet_udp_send_razor_port" lineno="70199">
36047 +<interface name="corenet_udp_send_razor_port" lineno="70217">
36048 <summary>
36049 Send UDP traffic on the razor port.
36050 </summary>
36051 @@ -53944,7 +54028,7 @@ Domain allowed access.
36052 </param>
36053 <infoflow type="write" weight="10"/>
36054 </interface>
36055 -<interface name="corenet_dontaudit_udp_send_razor_port" lineno="70214">
36056 +<interface name="corenet_dontaudit_udp_send_razor_port" lineno="70232">
36057 <summary>
36058 Do not audit attempts to send UDP traffic on the razor port.
36059 </summary>
36060 @@ -53955,7 +54039,7 @@ Domain to not audit.
36061 </param>
36062 <infoflow type="none"/>
36063 </interface>
36064 -<interface name="corenet_udp_receive_razor_port" lineno="70229">
36065 +<interface name="corenet_udp_receive_razor_port" lineno="70247">
36066 <summary>
36067 Receive UDP traffic on the razor port.
36068 </summary>
36069 @@ -53966,7 +54050,7 @@ Domain allowed access.
36070 </param>
36071 <infoflow type="read" weight="10"/>
36072 </interface>
36073 -<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="70244">
36074 +<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="70262">
36075 <summary>
36076 Do not audit attempts to receive UDP traffic on the razor port.
36077 </summary>
36078 @@ -53977,7 +54061,7 @@ Domain to not audit.
36079 </param>
36080 <infoflow type="none"/>
36081 </interface>
36082 -<interface name="corenet_udp_sendrecv_razor_port" lineno="70259">
36083 +<interface name="corenet_udp_sendrecv_razor_port" lineno="70277">
36084 <summary>
36085 Send and receive UDP traffic on the razor port.
36086 </summary>
36087 @@ -53988,7 +54072,7 @@ Domain allowed access.
36088 </param>
36089 <infoflow type="both" weight="10"/>
36090 </interface>
36091 -<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="70275">
36092 +<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="70293">
36093 <summary>
36094 Do not audit attempts to send and receive
36095 UDP traffic on the razor port.
36096 @@ -54000,7 +54084,7 @@ Domain to not audit.
36097 </param>
36098 <infoflow type="none"/>
36099 </interface>
36100 -<interface name="corenet_tcp_bind_razor_port" lineno="70290">
36101 +<interface name="corenet_tcp_bind_razor_port" lineno="70308">
36102 <summary>
36103 Bind TCP sockets to the razor port.
36104 </summary>
36105 @@ -54011,7 +54095,7 @@ Domain allowed access.
36106 </param>
36107 <infoflow type="none"/>
36108 </interface>
36109 -<interface name="corenet_udp_bind_razor_port" lineno="70310">
36110 +<interface name="corenet_udp_bind_razor_port" lineno="70328">
36111 <summary>
36112 Bind UDP sockets to the razor port.
36113 </summary>
36114 @@ -54022,7 +54106,7 @@ Domain allowed access.
36115 </param>
36116 <infoflow type="none"/>
36117 </interface>
36118 -<interface name="corenet_tcp_connect_razor_port" lineno="70329">
36119 +<interface name="corenet_tcp_connect_razor_port" lineno="70347">
36120 <summary>
36121 Make a TCP connection to the razor port.
36122 </summary>
36123 @@ -54032,7 +54116,7 @@ Domain allowed access.
36124 </summary>
36125 </param>
36126 </interface>
36127 -<interface name="corenet_send_razor_client_packets" lineno="70349">
36128 +<interface name="corenet_send_razor_client_packets" lineno="70367">
36129 <summary>
36130 Send razor_client packets.
36131 </summary>
36132 @@ -54043,7 +54127,7 @@ Domain allowed access.
36133 </param>
36134 <infoflow type="write" weight="10"/>
36135 </interface>
36136 -<interface name="corenet_dontaudit_send_razor_client_packets" lineno="70368">
36137 +<interface name="corenet_dontaudit_send_razor_client_packets" lineno="70386">
36138 <summary>
36139 Do not audit attempts to send razor_client packets.
36140 </summary>
36141 @@ -54054,7 +54138,7 @@ Domain to not audit.
36142 </param>
36143 <infoflow type="none"/>
36144 </interface>
36145 -<interface name="corenet_receive_razor_client_packets" lineno="70387">
36146 +<interface name="corenet_receive_razor_client_packets" lineno="70405">
36147 <summary>
36148 Receive razor_client packets.
36149 </summary>
36150 @@ -54065,7 +54149,7 @@ Domain allowed access.
36151 </param>
36152 <infoflow type="read" weight="10"/>
36153 </interface>
36154 -<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="70406">
36155 +<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="70424">
36156 <summary>
36157 Do not audit attempts to receive razor_client packets.
36158 </summary>
36159 @@ -54076,7 +54160,7 @@ Domain allowed access.
36160 </param>
36161 <infoflow type="none"/>
36162 </interface>
36163 -<interface name="corenet_sendrecv_razor_client_packets" lineno="70425">
36164 +<interface name="corenet_sendrecv_razor_client_packets" lineno="70443">
36165 <summary>
36166 Send and receive razor_client packets.
36167 </summary>
36168 @@ -54087,7 +54171,7 @@ Domain allowed access.
36169 </param>
36170 <infoflow type="both" weight="10"/>
36171 </interface>
36172 -<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="70441">
36173 +<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="70459">
36174 <summary>
36175 Do not audit attempts to send and receive razor_client packets.
36176 </summary>
36177 @@ -54098,7 +54182,7 @@ Domain to not audit.
36178 </param>
36179 <infoflow type="none"/>
36180 </interface>
36181 -<interface name="corenet_relabelto_razor_client_packets" lineno="70456">
36182 +<interface name="corenet_relabelto_razor_client_packets" lineno="70474">
36183 <summary>
36184 Relabel packets to razor_client the packet type.
36185 </summary>
36186 @@ -54108,7 +54192,7 @@ Domain allowed access.
36187 </summary>
36188 </param>
36189 </interface>
36190 -<interface name="corenet_send_razor_server_packets" lineno="70476">
36191 +<interface name="corenet_send_razor_server_packets" lineno="70494">
36192 <summary>
36193 Send razor_server packets.
36194 </summary>
36195 @@ -54119,7 +54203,7 @@ Domain allowed access.
36196 </param>
36197 <infoflow type="write" weight="10"/>
36198 </interface>
36199 -<interface name="corenet_dontaudit_send_razor_server_packets" lineno="70495">
36200 +<interface name="corenet_dontaudit_send_razor_server_packets" lineno="70513">
36201 <summary>
36202 Do not audit attempts to send razor_server packets.
36203 </summary>
36204 @@ -54130,7 +54214,7 @@ Domain to not audit.
36205 </param>
36206 <infoflow type="none"/>
36207 </interface>
36208 -<interface name="corenet_receive_razor_server_packets" lineno="70514">
36209 +<interface name="corenet_receive_razor_server_packets" lineno="70532">
36210 <summary>
36211 Receive razor_server packets.
36212 </summary>
36213 @@ -54141,7 +54225,7 @@ Domain allowed access.
36214 </param>
36215 <infoflow type="read" weight="10"/>
36216 </interface>
36217 -<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="70533">
36218 +<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="70551">
36219 <summary>
36220 Do not audit attempts to receive razor_server packets.
36221 </summary>
36222 @@ -54152,7 +54236,7 @@ Domain allowed access.
36223 </param>
36224 <infoflow type="none"/>
36225 </interface>
36226 -<interface name="corenet_sendrecv_razor_server_packets" lineno="70552">
36227 +<interface name="corenet_sendrecv_razor_server_packets" lineno="70570">
36228 <summary>
36229 Send and receive razor_server packets.
36230 </summary>
36231 @@ -54163,7 +54247,7 @@ Domain allowed access.
36232 </param>
36233 <infoflow type="both" weight="10"/>
36234 </interface>
36235 -<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="70568">
36236 +<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="70586">
36237 <summary>
36238 Do not audit attempts to send and receive razor_server packets.
36239 </summary>
36240 @@ -54174,7 +54258,7 @@ Domain to not audit.
36241 </param>
36242 <infoflow type="none"/>
36243 </interface>
36244 -<interface name="corenet_relabelto_razor_server_packets" lineno="70583">
36245 +<interface name="corenet_relabelto_razor_server_packets" lineno="70601">
36246 <summary>
36247 Relabel packets to razor_server the packet type.
36248 </summary>
36249 @@ -54184,7 +54268,7 @@ Domain allowed access.
36250 </summary>
36251 </param>
36252 </interface>
36253 -<interface name="corenet_tcp_sendrecv_redis_port" lineno="70605">
36254 +<interface name="corenet_tcp_sendrecv_redis_port" lineno="70623">
36255 <summary>
36256 Send and receive TCP traffic on the redis port.
36257 </summary>
36258 @@ -54195,7 +54279,7 @@ Domain allowed access.
36259 </param>
36260 <infoflow type="both" weight="10"/>
36261 </interface>
36262 -<interface name="corenet_udp_send_redis_port" lineno="70620">
36263 +<interface name="corenet_udp_send_redis_port" lineno="70638">
36264 <summary>
36265 Send UDP traffic on the redis port.
36266 </summary>
36267 @@ -54206,7 +54290,7 @@ Domain allowed access.
36268 </param>
36269 <infoflow type="write" weight="10"/>
36270 </interface>
36271 -<interface name="corenet_dontaudit_udp_send_redis_port" lineno="70635">
36272 +<interface name="corenet_dontaudit_udp_send_redis_port" lineno="70653">
36273 <summary>
36274 Do not audit attempts to send UDP traffic on the redis port.
36275 </summary>
36276 @@ -54217,7 +54301,7 @@ Domain to not audit.
36277 </param>
36278 <infoflow type="none"/>
36279 </interface>
36280 -<interface name="corenet_udp_receive_redis_port" lineno="70650">
36281 +<interface name="corenet_udp_receive_redis_port" lineno="70668">
36282 <summary>
36283 Receive UDP traffic on the redis port.
36284 </summary>
36285 @@ -54228,7 +54312,7 @@ Domain allowed access.
36286 </param>
36287 <infoflow type="read" weight="10"/>
36288 </interface>
36289 -<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="70665">
36290 +<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="70683">
36291 <summary>
36292 Do not audit attempts to receive UDP traffic on the redis port.
36293 </summary>
36294 @@ -54239,7 +54323,7 @@ Domain to not audit.
36295 </param>
36296 <infoflow type="none"/>
36297 </interface>
36298 -<interface name="corenet_udp_sendrecv_redis_port" lineno="70680">
36299 +<interface name="corenet_udp_sendrecv_redis_port" lineno="70698">
36300 <summary>
36301 Send and receive UDP traffic on the redis port.
36302 </summary>
36303 @@ -54250,7 +54334,7 @@ Domain allowed access.
36304 </param>
36305 <infoflow type="both" weight="10"/>
36306 </interface>
36307 -<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="70696">
36308 +<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="70714">
36309 <summary>
36310 Do not audit attempts to send and receive
36311 UDP traffic on the redis port.
36312 @@ -54262,7 +54346,7 @@ Domain to not audit.
36313 </param>
36314 <infoflow type="none"/>
36315 </interface>
36316 -<interface name="corenet_tcp_bind_redis_port" lineno="70711">
36317 +<interface name="corenet_tcp_bind_redis_port" lineno="70729">
36318 <summary>
36319 Bind TCP sockets to the redis port.
36320 </summary>
36321 @@ -54273,7 +54357,7 @@ Domain allowed access.
36322 </param>
36323 <infoflow type="none"/>
36324 </interface>
36325 -<interface name="corenet_udp_bind_redis_port" lineno="70731">
36326 +<interface name="corenet_udp_bind_redis_port" lineno="70749">
36327 <summary>
36328 Bind UDP sockets to the redis port.
36329 </summary>
36330 @@ -54284,7 +54368,7 @@ Domain allowed access.
36331 </param>
36332 <infoflow type="none"/>
36333 </interface>
36334 -<interface name="corenet_tcp_connect_redis_port" lineno="70750">
36335 +<interface name="corenet_tcp_connect_redis_port" lineno="70768">
36336 <summary>
36337 Make a TCP connection to the redis port.
36338 </summary>
36339 @@ -54294,7 +54378,7 @@ Domain allowed access.
36340 </summary>
36341 </param>
36342 </interface>
36343 -<interface name="corenet_send_redis_client_packets" lineno="70770">
36344 +<interface name="corenet_send_redis_client_packets" lineno="70788">
36345 <summary>
36346 Send redis_client packets.
36347 </summary>
36348 @@ -54305,7 +54389,7 @@ Domain allowed access.
36349 </param>
36350 <infoflow type="write" weight="10"/>
36351 </interface>
36352 -<interface name="corenet_dontaudit_send_redis_client_packets" lineno="70789">
36353 +<interface name="corenet_dontaudit_send_redis_client_packets" lineno="70807">
36354 <summary>
36355 Do not audit attempts to send redis_client packets.
36356 </summary>
36357 @@ -54316,7 +54400,7 @@ Domain to not audit.
36358 </param>
36359 <infoflow type="none"/>
36360 </interface>
36361 -<interface name="corenet_receive_redis_client_packets" lineno="70808">
36362 +<interface name="corenet_receive_redis_client_packets" lineno="70826">
36363 <summary>
36364 Receive redis_client packets.
36365 </summary>
36366 @@ -54327,7 +54411,7 @@ Domain allowed access.
36367 </param>
36368 <infoflow type="read" weight="10"/>
36369 </interface>
36370 -<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="70827">
36371 +<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="70845">
36372 <summary>
36373 Do not audit attempts to receive redis_client packets.
36374 </summary>
36375 @@ -54338,7 +54422,7 @@ Domain allowed access.
36376 </param>
36377 <infoflow type="none"/>
36378 </interface>
36379 -<interface name="corenet_sendrecv_redis_client_packets" lineno="70846">
36380 +<interface name="corenet_sendrecv_redis_client_packets" lineno="70864">
36381 <summary>
36382 Send and receive redis_client packets.
36383 </summary>
36384 @@ -54349,7 +54433,7 @@ Domain allowed access.
36385 </param>
36386 <infoflow type="both" weight="10"/>
36387 </interface>
36388 -<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="70862">
36389 +<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="70880">
36390 <summary>
36391 Do not audit attempts to send and receive redis_client packets.
36392 </summary>
36393 @@ -54360,7 +54444,7 @@ Domain to not audit.
36394 </param>
36395 <infoflow type="none"/>
36396 </interface>
36397 -<interface name="corenet_relabelto_redis_client_packets" lineno="70877">
36398 +<interface name="corenet_relabelto_redis_client_packets" lineno="70895">
36399 <summary>
36400 Relabel packets to redis_client the packet type.
36401 </summary>
36402 @@ -54370,7 +54454,7 @@ Domain allowed access.
36403 </summary>
36404 </param>
36405 </interface>
36406 -<interface name="corenet_send_redis_server_packets" lineno="70897">
36407 +<interface name="corenet_send_redis_server_packets" lineno="70915">
36408 <summary>
36409 Send redis_server packets.
36410 </summary>
36411 @@ -54381,7 +54465,7 @@ Domain allowed access.
36412 </param>
36413 <infoflow type="write" weight="10"/>
36414 </interface>
36415 -<interface name="corenet_dontaudit_send_redis_server_packets" lineno="70916">
36416 +<interface name="corenet_dontaudit_send_redis_server_packets" lineno="70934">
36417 <summary>
36418 Do not audit attempts to send redis_server packets.
36419 </summary>
36420 @@ -54392,7 +54476,7 @@ Domain to not audit.
36421 </param>
36422 <infoflow type="none"/>
36423 </interface>
36424 -<interface name="corenet_receive_redis_server_packets" lineno="70935">
36425 +<interface name="corenet_receive_redis_server_packets" lineno="70953">
36426 <summary>
36427 Receive redis_server packets.
36428 </summary>
36429 @@ -54403,7 +54487,7 @@ Domain allowed access.
36430 </param>
36431 <infoflow type="read" weight="10"/>
36432 </interface>
36433 -<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="70954">
36434 +<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="70972">
36435 <summary>
36436 Do not audit attempts to receive redis_server packets.
36437 </summary>
36438 @@ -54414,7 +54498,7 @@ Domain allowed access.
36439 </param>
36440 <infoflow type="none"/>
36441 </interface>
36442 -<interface name="corenet_sendrecv_redis_server_packets" lineno="70973">
36443 +<interface name="corenet_sendrecv_redis_server_packets" lineno="70991">
36444 <summary>
36445 Send and receive redis_server packets.
36446 </summary>
36447 @@ -54425,7 +54509,7 @@ Domain allowed access.
36448 </param>
36449 <infoflow type="both" weight="10"/>
36450 </interface>
36451 -<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="70989">
36452 +<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="71007">
36453 <summary>
36454 Do not audit attempts to send and receive redis_server packets.
36455 </summary>
36456 @@ -54436,7 +54520,7 @@ Domain to not audit.
36457 </param>
36458 <infoflow type="none"/>
36459 </interface>
36460 -<interface name="corenet_relabelto_redis_server_packets" lineno="71004">
36461 +<interface name="corenet_relabelto_redis_server_packets" lineno="71022">
36462 <summary>
36463 Relabel packets to redis_server the packet type.
36464 </summary>
36465 @@ -54446,7 +54530,7 @@ Domain allowed access.
36466 </summary>
36467 </param>
36468 </interface>
36469 -<interface name="corenet_tcp_sendrecv_repository_port" lineno="71026">
36470 +<interface name="corenet_tcp_sendrecv_repository_port" lineno="71044">
36471 <summary>
36472 Send and receive TCP traffic on the repository port.
36473 </summary>
36474 @@ -54457,7 +54541,7 @@ Domain allowed access.
36475 </param>
36476 <infoflow type="both" weight="10"/>
36477 </interface>
36478 -<interface name="corenet_udp_send_repository_port" lineno="71041">
36479 +<interface name="corenet_udp_send_repository_port" lineno="71059">
36480 <summary>
36481 Send UDP traffic on the repository port.
36482 </summary>
36483 @@ -54468,7 +54552,7 @@ Domain allowed access.
36484 </param>
36485 <infoflow type="write" weight="10"/>
36486 </interface>
36487 -<interface name="corenet_dontaudit_udp_send_repository_port" lineno="71056">
36488 +<interface name="corenet_dontaudit_udp_send_repository_port" lineno="71074">
36489 <summary>
36490 Do not audit attempts to send UDP traffic on the repository port.
36491 </summary>
36492 @@ -54479,7 +54563,7 @@ Domain to not audit.
36493 </param>
36494 <infoflow type="none"/>
36495 </interface>
36496 -<interface name="corenet_udp_receive_repository_port" lineno="71071">
36497 +<interface name="corenet_udp_receive_repository_port" lineno="71089">
36498 <summary>
36499 Receive UDP traffic on the repository port.
36500 </summary>
36501 @@ -54490,7 +54574,7 @@ Domain allowed access.
36502 </param>
36503 <infoflow type="read" weight="10"/>
36504 </interface>
36505 -<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="71086">
36506 +<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="71104">
36507 <summary>
36508 Do not audit attempts to receive UDP traffic on the repository port.
36509 </summary>
36510 @@ -54501,7 +54585,7 @@ Domain to not audit.
36511 </param>
36512 <infoflow type="none"/>
36513 </interface>
36514 -<interface name="corenet_udp_sendrecv_repository_port" lineno="71101">
36515 +<interface name="corenet_udp_sendrecv_repository_port" lineno="71119">
36516 <summary>
36517 Send and receive UDP traffic on the repository port.
36518 </summary>
36519 @@ -54512,7 +54596,7 @@ Domain allowed access.
36520 </param>
36521 <infoflow type="both" weight="10"/>
36522 </interface>
36523 -<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="71117">
36524 +<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="71135">
36525 <summary>
36526 Do not audit attempts to send and receive
36527 UDP traffic on the repository port.
36528 @@ -54524,7 +54608,7 @@ Domain to not audit.
36529 </param>
36530 <infoflow type="none"/>
36531 </interface>
36532 -<interface name="corenet_tcp_bind_repository_port" lineno="71132">
36533 +<interface name="corenet_tcp_bind_repository_port" lineno="71150">
36534 <summary>
36535 Bind TCP sockets to the repository port.
36536 </summary>
36537 @@ -54535,7 +54619,7 @@ Domain allowed access.
36538 </param>
36539 <infoflow type="none"/>
36540 </interface>
36541 -<interface name="corenet_udp_bind_repository_port" lineno="71152">
36542 +<interface name="corenet_udp_bind_repository_port" lineno="71170">
36543 <summary>
36544 Bind UDP sockets to the repository port.
36545 </summary>
36546 @@ -54546,7 +54630,7 @@ Domain allowed access.
36547 </param>
36548 <infoflow type="none"/>
36549 </interface>
36550 -<interface name="corenet_tcp_connect_repository_port" lineno="71171">
36551 +<interface name="corenet_tcp_connect_repository_port" lineno="71189">
36552 <summary>
36553 Make a TCP connection to the repository port.
36554 </summary>
36555 @@ -54556,7 +54640,7 @@ Domain allowed access.
36556 </summary>
36557 </param>
36558 </interface>
36559 -<interface name="corenet_send_repository_client_packets" lineno="71191">
36560 +<interface name="corenet_send_repository_client_packets" lineno="71209">
36561 <summary>
36562 Send repository_client packets.
36563 </summary>
36564 @@ -54567,7 +54651,7 @@ Domain allowed access.
36565 </param>
36566 <infoflow type="write" weight="10"/>
36567 </interface>
36568 -<interface name="corenet_dontaudit_send_repository_client_packets" lineno="71210">
36569 +<interface name="corenet_dontaudit_send_repository_client_packets" lineno="71228">
36570 <summary>
36571 Do not audit attempts to send repository_client packets.
36572 </summary>
36573 @@ -54578,7 +54662,7 @@ Domain to not audit.
36574 </param>
36575 <infoflow type="none"/>
36576 </interface>
36577 -<interface name="corenet_receive_repository_client_packets" lineno="71229">
36578 +<interface name="corenet_receive_repository_client_packets" lineno="71247">
36579 <summary>
36580 Receive repository_client packets.
36581 </summary>
36582 @@ -54589,7 +54673,7 @@ Domain allowed access.
36583 </param>
36584 <infoflow type="read" weight="10"/>
36585 </interface>
36586 -<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="71248">
36587 +<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="71266">
36588 <summary>
36589 Do not audit attempts to receive repository_client packets.
36590 </summary>
36591 @@ -54600,7 +54684,7 @@ Domain allowed access.
36592 </param>
36593 <infoflow type="none"/>
36594 </interface>
36595 -<interface name="corenet_sendrecv_repository_client_packets" lineno="71267">
36596 +<interface name="corenet_sendrecv_repository_client_packets" lineno="71285">
36597 <summary>
36598 Send and receive repository_client packets.
36599 </summary>
36600 @@ -54611,7 +54695,7 @@ Domain allowed access.
36601 </param>
36602 <infoflow type="both" weight="10"/>
36603 </interface>
36604 -<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="71283">
36605 +<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="71301">
36606 <summary>
36607 Do not audit attempts to send and receive repository_client packets.
36608 </summary>
36609 @@ -54622,7 +54706,7 @@ Domain to not audit.
36610 </param>
36611 <infoflow type="none"/>
36612 </interface>
36613 -<interface name="corenet_relabelto_repository_client_packets" lineno="71298">
36614 +<interface name="corenet_relabelto_repository_client_packets" lineno="71316">
36615 <summary>
36616 Relabel packets to repository_client the packet type.
36617 </summary>
36618 @@ -54632,7 +54716,7 @@ Domain allowed access.
36619 </summary>
36620 </param>
36621 </interface>
36622 -<interface name="corenet_send_repository_server_packets" lineno="71318">
36623 +<interface name="corenet_send_repository_server_packets" lineno="71336">
36624 <summary>
36625 Send repository_server packets.
36626 </summary>
36627 @@ -54643,7 +54727,7 @@ Domain allowed access.
36628 </param>
36629 <infoflow type="write" weight="10"/>
36630 </interface>
36631 -<interface name="corenet_dontaudit_send_repository_server_packets" lineno="71337">
36632 +<interface name="corenet_dontaudit_send_repository_server_packets" lineno="71355">
36633 <summary>
36634 Do not audit attempts to send repository_server packets.
36635 </summary>
36636 @@ -54654,7 +54738,7 @@ Domain to not audit.
36637 </param>
36638 <infoflow type="none"/>
36639 </interface>
36640 -<interface name="corenet_receive_repository_server_packets" lineno="71356">
36641 +<interface name="corenet_receive_repository_server_packets" lineno="71374">
36642 <summary>
36643 Receive repository_server packets.
36644 </summary>
36645 @@ -54665,7 +54749,7 @@ Domain allowed access.
36646 </param>
36647 <infoflow type="read" weight="10"/>
36648 </interface>
36649 -<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="71375">
36650 +<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="71393">
36651 <summary>
36652 Do not audit attempts to receive repository_server packets.
36653 </summary>
36654 @@ -54676,7 +54760,7 @@ Domain allowed access.
36655 </param>
36656 <infoflow type="none"/>
36657 </interface>
36658 -<interface name="corenet_sendrecv_repository_server_packets" lineno="71394">
36659 +<interface name="corenet_sendrecv_repository_server_packets" lineno="71412">
36660 <summary>
36661 Send and receive repository_server packets.
36662 </summary>
36663 @@ -54687,7 +54771,7 @@ Domain allowed access.
36664 </param>
36665 <infoflow type="both" weight="10"/>
36666 </interface>
36667 -<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="71410">
36668 +<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="71428">
36669 <summary>
36670 Do not audit attempts to send and receive repository_server packets.
36671 </summary>
36672 @@ -54698,7 +54782,7 @@ Domain to not audit.
36673 </param>
36674 <infoflow type="none"/>
36675 </interface>
36676 -<interface name="corenet_relabelto_repository_server_packets" lineno="71425">
36677 +<interface name="corenet_relabelto_repository_server_packets" lineno="71443">
36678 <summary>
36679 Relabel packets to repository_server the packet type.
36680 </summary>
36681 @@ -54708,7 +54792,7 @@ Domain allowed access.
36682 </summary>
36683 </param>
36684 </interface>
36685 -<interface name="corenet_tcp_sendrecv_ricci_port" lineno="71447">
36686 +<interface name="corenet_tcp_sendrecv_ricci_port" lineno="71465">
36687 <summary>
36688 Send and receive TCP traffic on the ricci port.
36689 </summary>
36690 @@ -54719,7 +54803,7 @@ Domain allowed access.
36691 </param>
36692 <infoflow type="both" weight="10"/>
36693 </interface>
36694 -<interface name="corenet_udp_send_ricci_port" lineno="71462">
36695 +<interface name="corenet_udp_send_ricci_port" lineno="71480">
36696 <summary>
36697 Send UDP traffic on the ricci port.
36698 </summary>
36699 @@ -54730,7 +54814,7 @@ Domain allowed access.
36700 </param>
36701 <infoflow type="write" weight="10"/>
36702 </interface>
36703 -<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="71477">
36704 +<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="71495">
36705 <summary>
36706 Do not audit attempts to send UDP traffic on the ricci port.
36707 </summary>
36708 @@ -54741,7 +54825,7 @@ Domain to not audit.
36709 </param>
36710 <infoflow type="none"/>
36711 </interface>
36712 -<interface name="corenet_udp_receive_ricci_port" lineno="71492">
36713 +<interface name="corenet_udp_receive_ricci_port" lineno="71510">
36714 <summary>
36715 Receive UDP traffic on the ricci port.
36716 </summary>
36717 @@ -54752,7 +54836,7 @@ Domain allowed access.
36718 </param>
36719 <infoflow type="read" weight="10"/>
36720 </interface>
36721 -<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="71507">
36722 +<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="71525">
36723 <summary>
36724 Do not audit attempts to receive UDP traffic on the ricci port.
36725 </summary>
36726 @@ -54763,7 +54847,7 @@ Domain to not audit.
36727 </param>
36728 <infoflow type="none"/>
36729 </interface>
36730 -<interface name="corenet_udp_sendrecv_ricci_port" lineno="71522">
36731 +<interface name="corenet_udp_sendrecv_ricci_port" lineno="71540">
36732 <summary>
36733 Send and receive UDP traffic on the ricci port.
36734 </summary>
36735 @@ -54774,7 +54858,7 @@ Domain allowed access.
36736 </param>
36737 <infoflow type="both" weight="10"/>
36738 </interface>
36739 -<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="71538">
36740 +<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="71556">
36741 <summary>
36742 Do not audit attempts to send and receive
36743 UDP traffic on the ricci port.
36744 @@ -54786,7 +54870,7 @@ Domain to not audit.
36745 </param>
36746 <infoflow type="none"/>
36747 </interface>
36748 -<interface name="corenet_tcp_bind_ricci_port" lineno="71553">
36749 +<interface name="corenet_tcp_bind_ricci_port" lineno="71571">
36750 <summary>
36751 Bind TCP sockets to the ricci port.
36752 </summary>
36753 @@ -54797,7 +54881,7 @@ Domain allowed access.
36754 </param>
36755 <infoflow type="none"/>
36756 </interface>
36757 -<interface name="corenet_udp_bind_ricci_port" lineno="71573">
36758 +<interface name="corenet_udp_bind_ricci_port" lineno="71591">
36759 <summary>
36760 Bind UDP sockets to the ricci port.
36761 </summary>
36762 @@ -54808,7 +54892,7 @@ Domain allowed access.
36763 </param>
36764 <infoflow type="none"/>
36765 </interface>
36766 -<interface name="corenet_tcp_connect_ricci_port" lineno="71592">
36767 +<interface name="corenet_tcp_connect_ricci_port" lineno="71610">
36768 <summary>
36769 Make a TCP connection to the ricci port.
36770 </summary>
36771 @@ -54818,7 +54902,7 @@ Domain allowed access.
36772 </summary>
36773 </param>
36774 </interface>
36775 -<interface name="corenet_send_ricci_client_packets" lineno="71612">
36776 +<interface name="corenet_send_ricci_client_packets" lineno="71630">
36777 <summary>
36778 Send ricci_client packets.
36779 </summary>
36780 @@ -54829,7 +54913,7 @@ Domain allowed access.
36781 </param>
36782 <infoflow type="write" weight="10"/>
36783 </interface>
36784 -<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="71631">
36785 +<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="71649">
36786 <summary>
36787 Do not audit attempts to send ricci_client packets.
36788 </summary>
36789 @@ -54840,7 +54924,7 @@ Domain to not audit.
36790 </param>
36791 <infoflow type="none"/>
36792 </interface>
36793 -<interface name="corenet_receive_ricci_client_packets" lineno="71650">
36794 +<interface name="corenet_receive_ricci_client_packets" lineno="71668">
36795 <summary>
36796 Receive ricci_client packets.
36797 </summary>
36798 @@ -54851,7 +54935,7 @@ Domain allowed access.
36799 </param>
36800 <infoflow type="read" weight="10"/>
36801 </interface>
36802 -<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="71669">
36803 +<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="71687">
36804 <summary>
36805 Do not audit attempts to receive ricci_client packets.
36806 </summary>
36807 @@ -54862,7 +54946,7 @@ Domain allowed access.
36808 </param>
36809 <infoflow type="none"/>
36810 </interface>
36811 -<interface name="corenet_sendrecv_ricci_client_packets" lineno="71688">
36812 +<interface name="corenet_sendrecv_ricci_client_packets" lineno="71706">
36813 <summary>
36814 Send and receive ricci_client packets.
36815 </summary>
36816 @@ -54873,7 +54957,7 @@ Domain allowed access.
36817 </param>
36818 <infoflow type="both" weight="10"/>
36819 </interface>
36820 -<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="71704">
36821 +<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="71722">
36822 <summary>
36823 Do not audit attempts to send and receive ricci_client packets.
36824 </summary>
36825 @@ -54884,7 +54968,7 @@ Domain to not audit.
36826 </param>
36827 <infoflow type="none"/>
36828 </interface>
36829 -<interface name="corenet_relabelto_ricci_client_packets" lineno="71719">
36830 +<interface name="corenet_relabelto_ricci_client_packets" lineno="71737">
36831 <summary>
36832 Relabel packets to ricci_client the packet type.
36833 </summary>
36834 @@ -54894,7 +54978,7 @@ Domain allowed access.
36835 </summary>
36836 </param>
36837 </interface>
36838 -<interface name="corenet_send_ricci_server_packets" lineno="71739">
36839 +<interface name="corenet_send_ricci_server_packets" lineno="71757">
36840 <summary>
36841 Send ricci_server packets.
36842 </summary>
36843 @@ -54905,7 +54989,7 @@ Domain allowed access.
36844 </param>
36845 <infoflow type="write" weight="10"/>
36846 </interface>
36847 -<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="71758">
36848 +<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="71776">
36849 <summary>
36850 Do not audit attempts to send ricci_server packets.
36851 </summary>
36852 @@ -54916,7 +55000,7 @@ Domain to not audit.
36853 </param>
36854 <infoflow type="none"/>
36855 </interface>
36856 -<interface name="corenet_receive_ricci_server_packets" lineno="71777">
36857 +<interface name="corenet_receive_ricci_server_packets" lineno="71795">
36858 <summary>
36859 Receive ricci_server packets.
36860 </summary>
36861 @@ -54927,7 +55011,7 @@ Domain allowed access.
36862 </param>
36863 <infoflow type="read" weight="10"/>
36864 </interface>
36865 -<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="71796">
36866 +<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="71814">
36867 <summary>
36868 Do not audit attempts to receive ricci_server packets.
36869 </summary>
36870 @@ -54938,7 +55022,7 @@ Domain allowed access.
36871 </param>
36872 <infoflow type="none"/>
36873 </interface>
36874 -<interface name="corenet_sendrecv_ricci_server_packets" lineno="71815">
36875 +<interface name="corenet_sendrecv_ricci_server_packets" lineno="71833">
36876 <summary>
36877 Send and receive ricci_server packets.
36878 </summary>
36879 @@ -54949,7 +55033,7 @@ Domain allowed access.
36880 </param>
36881 <infoflow type="both" weight="10"/>
36882 </interface>
36883 -<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="71831">
36884 +<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="71849">
36885 <summary>
36886 Do not audit attempts to send and receive ricci_server packets.
36887 </summary>
36888 @@ -54960,7 +55044,7 @@ Domain to not audit.
36889 </param>
36890 <infoflow type="none"/>
36891 </interface>
36892 -<interface name="corenet_relabelto_ricci_server_packets" lineno="71846">
36893 +<interface name="corenet_relabelto_ricci_server_packets" lineno="71864">
36894 <summary>
36895 Relabel packets to ricci_server the packet type.
36896 </summary>
36897 @@ -54970,7 +55054,7 @@ Domain allowed access.
36898 </summary>
36899 </param>
36900 </interface>
36901 -<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="71868">
36902 +<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="71886">
36903 <summary>
36904 Send and receive TCP traffic on the ricci_modcluster port.
36905 </summary>
36906 @@ -54981,7 +55065,7 @@ Domain allowed access.
36907 </param>
36908 <infoflow type="both" weight="10"/>
36909 </interface>
36910 -<interface name="corenet_udp_send_ricci_modcluster_port" lineno="71883">
36911 +<interface name="corenet_udp_send_ricci_modcluster_port" lineno="71901">
36912 <summary>
36913 Send UDP traffic on the ricci_modcluster port.
36914 </summary>
36915 @@ -54992,7 +55076,7 @@ Domain allowed access.
36916 </param>
36917 <infoflow type="write" weight="10"/>
36918 </interface>
36919 -<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="71898">
36920 +<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="71916">
36921 <summary>
36922 Do not audit attempts to send UDP traffic on the ricci_modcluster port.
36923 </summary>
36924 @@ -55003,7 +55087,7 @@ Domain to not audit.
36925 </param>
36926 <infoflow type="none"/>
36927 </interface>
36928 -<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="71913">
36929 +<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="71931">
36930 <summary>
36931 Receive UDP traffic on the ricci_modcluster port.
36932 </summary>
36933 @@ -55014,7 +55098,7 @@ Domain allowed access.
36934 </param>
36935 <infoflow type="read" weight="10"/>
36936 </interface>
36937 -<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="71928">
36938 +<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="71946">
36939 <summary>
36940 Do not audit attempts to receive UDP traffic on the ricci_modcluster port.
36941 </summary>
36942 @@ -55025,7 +55109,7 @@ Domain to not audit.
36943 </param>
36944 <infoflow type="none"/>
36945 </interface>
36946 -<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="71943">
36947 +<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="71961">
36948 <summary>
36949 Send and receive UDP traffic on the ricci_modcluster port.
36950 </summary>
36951 @@ -55036,7 +55120,7 @@ Domain allowed access.
36952 </param>
36953 <infoflow type="both" weight="10"/>
36954 </interface>
36955 -<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="71959">
36956 +<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="71977">
36957 <summary>
36958 Do not audit attempts to send and receive
36959 UDP traffic on the ricci_modcluster port.
36960 @@ -55048,7 +55132,7 @@ Domain to not audit.
36961 </param>
36962 <infoflow type="none"/>
36963 </interface>
36964 -<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="71974">
36965 +<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="71992">
36966 <summary>
36967 Bind TCP sockets to the ricci_modcluster port.
36968 </summary>
36969 @@ -55059,7 +55143,7 @@ Domain allowed access.
36970 </param>
36971 <infoflow type="none"/>
36972 </interface>
36973 -<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="71994">
36974 +<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="72012">
36975 <summary>
36976 Bind UDP sockets to the ricci_modcluster port.
36977 </summary>
36978 @@ -55070,7 +55154,7 @@ Domain allowed access.
36979 </param>
36980 <infoflow type="none"/>
36981 </interface>
36982 -<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="72013">
36983 +<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="72031">
36984 <summary>
36985 Make a TCP connection to the ricci_modcluster port.
36986 </summary>
36987 @@ -55080,7 +55164,7 @@ Domain allowed access.
36988 </summary>
36989 </param>
36990 </interface>
36991 -<interface name="corenet_send_ricci_modcluster_client_packets" lineno="72033">
36992 +<interface name="corenet_send_ricci_modcluster_client_packets" lineno="72051">
36993 <summary>
36994 Send ricci_modcluster_client packets.
36995 </summary>
36996 @@ -55091,7 +55175,7 @@ Domain allowed access.
36997 </param>
36998 <infoflow type="write" weight="10"/>
36999 </interface>
37000 -<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="72052">
37001 +<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="72070">
37002 <summary>
37003 Do not audit attempts to send ricci_modcluster_client packets.
37004 </summary>
37005 @@ -55102,7 +55186,7 @@ Domain to not audit.
37006 </param>
37007 <infoflow type="none"/>
37008 </interface>
37009 -<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="72071">
37010 +<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="72089">
37011 <summary>
37012 Receive ricci_modcluster_client packets.
37013 </summary>
37014 @@ -55113,7 +55197,7 @@ Domain allowed access.
37015 </param>
37016 <infoflow type="read" weight="10"/>
37017 </interface>
37018 -<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="72090">
37019 +<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="72108">
37020 <summary>
37021 Do not audit attempts to receive ricci_modcluster_client packets.
37022 </summary>
37023 @@ -55124,7 +55208,7 @@ Domain allowed access.
37024 </param>
37025 <infoflow type="none"/>
37026 </interface>
37027 -<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="72109">
37028 +<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="72127">
37029 <summary>
37030 Send and receive ricci_modcluster_client packets.
37031 </summary>
37032 @@ -55135,7 +55219,7 @@ Domain allowed access.
37033 </param>
37034 <infoflow type="both" weight="10"/>
37035 </interface>
37036 -<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="72125">
37037 +<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="72143">
37038 <summary>
37039 Do not audit attempts to send and receive ricci_modcluster_client packets.
37040 </summary>
37041 @@ -55146,7 +55230,7 @@ Domain to not audit.
37042 </param>
37043 <infoflow type="none"/>
37044 </interface>
37045 -<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="72140">
37046 +<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="72158">
37047 <summary>
37048 Relabel packets to ricci_modcluster_client the packet type.
37049 </summary>
37050 @@ -55156,7 +55240,7 @@ Domain allowed access.
37051 </summary>
37052 </param>
37053 </interface>
37054 -<interface name="corenet_send_ricci_modcluster_server_packets" lineno="72160">
37055 +<interface name="corenet_send_ricci_modcluster_server_packets" lineno="72178">
37056 <summary>
37057 Send ricci_modcluster_server packets.
37058 </summary>
37059 @@ -55167,7 +55251,7 @@ Domain allowed access.
37060 </param>
37061 <infoflow type="write" weight="10"/>
37062 </interface>
37063 -<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="72179">
37064 +<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="72197">
37065 <summary>
37066 Do not audit attempts to send ricci_modcluster_server packets.
37067 </summary>
37068 @@ -55178,7 +55262,7 @@ Domain to not audit.
37069 </param>
37070 <infoflow type="none"/>
37071 </interface>
37072 -<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="72198">
37073 +<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="72216">
37074 <summary>
37075 Receive ricci_modcluster_server packets.
37076 </summary>
37077 @@ -55189,7 +55273,7 @@ Domain allowed access.
37078 </param>
37079 <infoflow type="read" weight="10"/>
37080 </interface>
37081 -<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="72217">
37082 +<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="72235">
37083 <summary>
37084 Do not audit attempts to receive ricci_modcluster_server packets.
37085 </summary>
37086 @@ -55200,7 +55284,7 @@ Domain allowed access.
37087 </param>
37088 <infoflow type="none"/>
37089 </interface>
37090 -<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="72236">
37091 +<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="72254">
37092 <summary>
37093 Send and receive ricci_modcluster_server packets.
37094 </summary>
37095 @@ -55211,7 +55295,7 @@ Domain allowed access.
37096 </param>
37097 <infoflow type="both" weight="10"/>
37098 </interface>
37099 -<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="72252">
37100 +<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="72270">
37101 <summary>
37102 Do not audit attempts to send and receive ricci_modcluster_server packets.
37103 </summary>
37104 @@ -55222,7 +55306,7 @@ Domain to not audit.
37105 </param>
37106 <infoflow type="none"/>
37107 </interface>
37108 -<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="72267">
37109 +<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="72285">
37110 <summary>
37111 Relabel packets to ricci_modcluster_server the packet type.
37112 </summary>
37113 @@ -55232,7 +55316,7 @@ Domain allowed access.
37114 </summary>
37115 </param>
37116 </interface>
37117 -<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="72289">
37118 +<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="72307">
37119 <summary>
37120 Send and receive TCP traffic on the rlogind port.
37121 </summary>
37122 @@ -55243,7 +55327,7 @@ Domain allowed access.
37123 </param>
37124 <infoflow type="both" weight="10"/>
37125 </interface>
37126 -<interface name="corenet_udp_send_rlogind_port" lineno="72304">
37127 +<interface name="corenet_udp_send_rlogind_port" lineno="72322">
37128 <summary>
37129 Send UDP traffic on the rlogind port.
37130 </summary>
37131 @@ -55254,7 +55338,7 @@ Domain allowed access.
37132 </param>
37133 <infoflow type="write" weight="10"/>
37134 </interface>
37135 -<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="72319">
37136 +<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="72337">
37137 <summary>
37138 Do not audit attempts to send UDP traffic on the rlogind port.
37139 </summary>
37140 @@ -55265,7 +55349,7 @@ Domain to not audit.
37141 </param>
37142 <infoflow type="none"/>
37143 </interface>
37144 -<interface name="corenet_udp_receive_rlogind_port" lineno="72334">
37145 +<interface name="corenet_udp_receive_rlogind_port" lineno="72352">
37146 <summary>
37147 Receive UDP traffic on the rlogind port.
37148 </summary>
37149 @@ -55276,7 +55360,7 @@ Domain allowed access.
37150 </param>
37151 <infoflow type="read" weight="10"/>
37152 </interface>
37153 -<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="72349">
37154 +<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="72367">
37155 <summary>
37156 Do not audit attempts to receive UDP traffic on the rlogind port.
37157 </summary>
37158 @@ -55287,7 +55371,7 @@ Domain to not audit.
37159 </param>
37160 <infoflow type="none"/>
37161 </interface>
37162 -<interface name="corenet_udp_sendrecv_rlogind_port" lineno="72364">
37163 +<interface name="corenet_udp_sendrecv_rlogind_port" lineno="72382">
37164 <summary>
37165 Send and receive UDP traffic on the rlogind port.
37166 </summary>
37167 @@ -55298,7 +55382,7 @@ Domain allowed access.
37168 </param>
37169 <infoflow type="both" weight="10"/>
37170 </interface>
37171 -<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="72380">
37172 +<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="72398">
37173 <summary>
37174 Do not audit attempts to send and receive
37175 UDP traffic on the rlogind port.
37176 @@ -55310,7 +55394,7 @@ Domain to not audit.
37177 </param>
37178 <infoflow type="none"/>
37179 </interface>
37180 -<interface name="corenet_tcp_bind_rlogind_port" lineno="72395">
37181 +<interface name="corenet_tcp_bind_rlogind_port" lineno="72413">
37182 <summary>
37183 Bind TCP sockets to the rlogind port.
37184 </summary>
37185 @@ -55321,7 +55405,7 @@ Domain allowed access.
37186 </param>
37187 <infoflow type="none"/>
37188 </interface>
37189 -<interface name="corenet_udp_bind_rlogind_port" lineno="72415">
37190 +<interface name="corenet_udp_bind_rlogind_port" lineno="72433">
37191 <summary>
37192 Bind UDP sockets to the rlogind port.
37193 </summary>
37194 @@ -55332,7 +55416,7 @@ Domain allowed access.
37195 </param>
37196 <infoflow type="none"/>
37197 </interface>
37198 -<interface name="corenet_tcp_connect_rlogind_port" lineno="72434">
37199 +<interface name="corenet_tcp_connect_rlogind_port" lineno="72452">
37200 <summary>
37201 Make a TCP connection to the rlogind port.
37202 </summary>
37203 @@ -55342,7 +55426,7 @@ Domain allowed access.
37204 </summary>
37205 </param>
37206 </interface>
37207 -<interface name="corenet_send_rlogind_client_packets" lineno="72454">
37208 +<interface name="corenet_send_rlogind_client_packets" lineno="72472">
37209 <summary>
37210 Send rlogind_client packets.
37211 </summary>
37212 @@ -55353,7 +55437,7 @@ Domain allowed access.
37213 </param>
37214 <infoflow type="write" weight="10"/>
37215 </interface>
37216 -<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="72473">
37217 +<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="72491">
37218 <summary>
37219 Do not audit attempts to send rlogind_client packets.
37220 </summary>
37221 @@ -55364,7 +55448,7 @@ Domain to not audit.
37222 </param>
37223 <infoflow type="none"/>
37224 </interface>
37225 -<interface name="corenet_receive_rlogind_client_packets" lineno="72492">
37226 +<interface name="corenet_receive_rlogind_client_packets" lineno="72510">
37227 <summary>
37228 Receive rlogind_client packets.
37229 </summary>
37230 @@ -55375,7 +55459,7 @@ Domain allowed access.
37231 </param>
37232 <infoflow type="read" weight="10"/>
37233 </interface>
37234 -<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="72511">
37235 +<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="72529">
37236 <summary>
37237 Do not audit attempts to receive rlogind_client packets.
37238 </summary>
37239 @@ -55386,7 +55470,7 @@ Domain allowed access.
37240 </param>
37241 <infoflow type="none"/>
37242 </interface>
37243 -<interface name="corenet_sendrecv_rlogind_client_packets" lineno="72530">
37244 +<interface name="corenet_sendrecv_rlogind_client_packets" lineno="72548">
37245 <summary>
37246 Send and receive rlogind_client packets.
37247 </summary>
37248 @@ -55397,7 +55481,7 @@ Domain allowed access.
37249 </param>
37250 <infoflow type="both" weight="10"/>
37251 </interface>
37252 -<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="72546">
37253 +<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="72564">
37254 <summary>
37255 Do not audit attempts to send and receive rlogind_client packets.
37256 </summary>
37257 @@ -55408,7 +55492,7 @@ Domain to not audit.
37258 </param>
37259 <infoflow type="none"/>
37260 </interface>
37261 -<interface name="corenet_relabelto_rlogind_client_packets" lineno="72561">
37262 +<interface name="corenet_relabelto_rlogind_client_packets" lineno="72579">
37263 <summary>
37264 Relabel packets to rlogind_client the packet type.
37265 </summary>
37266 @@ -55418,7 +55502,7 @@ Domain allowed access.
37267 </summary>
37268 </param>
37269 </interface>
37270 -<interface name="corenet_send_rlogind_server_packets" lineno="72581">
37271 +<interface name="corenet_send_rlogind_server_packets" lineno="72599">
37272 <summary>
37273 Send rlogind_server packets.
37274 </summary>
37275 @@ -55429,7 +55513,7 @@ Domain allowed access.
37276 </param>
37277 <infoflow type="write" weight="10"/>
37278 </interface>
37279 -<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="72600">
37280 +<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="72618">
37281 <summary>
37282 Do not audit attempts to send rlogind_server packets.
37283 </summary>
37284 @@ -55440,7 +55524,7 @@ Domain to not audit.
37285 </param>
37286 <infoflow type="none"/>
37287 </interface>
37288 -<interface name="corenet_receive_rlogind_server_packets" lineno="72619">
37289 +<interface name="corenet_receive_rlogind_server_packets" lineno="72637">
37290 <summary>
37291 Receive rlogind_server packets.
37292 </summary>
37293 @@ -55451,7 +55535,7 @@ Domain allowed access.
37294 </param>
37295 <infoflow type="read" weight="10"/>
37296 </interface>
37297 -<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="72638">
37298 +<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="72656">
37299 <summary>
37300 Do not audit attempts to receive rlogind_server packets.
37301 </summary>
37302 @@ -55462,7 +55546,7 @@ Domain allowed access.
37303 </param>
37304 <infoflow type="none"/>
37305 </interface>
37306 -<interface name="corenet_sendrecv_rlogind_server_packets" lineno="72657">
37307 +<interface name="corenet_sendrecv_rlogind_server_packets" lineno="72675">
37308 <summary>
37309 Send and receive rlogind_server packets.
37310 </summary>
37311 @@ -55473,7 +55557,7 @@ Domain allowed access.
37312 </param>
37313 <infoflow type="both" weight="10"/>
37314 </interface>
37315 -<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="72673">
37316 +<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="72691">
37317 <summary>
37318 Do not audit attempts to send and receive rlogind_server packets.
37319 </summary>
37320 @@ -55484,7 +55568,7 @@ Domain to not audit.
37321 </param>
37322 <infoflow type="none"/>
37323 </interface>
37324 -<interface name="corenet_relabelto_rlogind_server_packets" lineno="72688">
37325 +<interface name="corenet_relabelto_rlogind_server_packets" lineno="72706">
37326 <summary>
37327 Relabel packets to rlogind_server the packet type.
37328 </summary>
37329 @@ -55494,7 +55578,7 @@ Domain allowed access.
37330 </summary>
37331 </param>
37332 </interface>
37333 -<interface name="corenet_tcp_sendrecv_rndc_port" lineno="72710">
37334 +<interface name="corenet_tcp_sendrecv_rndc_port" lineno="72728">
37335 <summary>
37336 Send and receive TCP traffic on the rndc port.
37337 </summary>
37338 @@ -55505,7 +55589,7 @@ Domain allowed access.
37339 </param>
37340 <infoflow type="both" weight="10"/>
37341 </interface>
37342 -<interface name="corenet_udp_send_rndc_port" lineno="72725">
37343 +<interface name="corenet_udp_send_rndc_port" lineno="72743">
37344 <summary>
37345 Send UDP traffic on the rndc port.
37346 </summary>
37347 @@ -55516,7 +55600,7 @@ Domain allowed access.
37348 </param>
37349 <infoflow type="write" weight="10"/>
37350 </interface>
37351 -<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="72740">
37352 +<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="72758">
37353 <summary>
37354 Do not audit attempts to send UDP traffic on the rndc port.
37355 </summary>
37356 @@ -55527,7 +55611,7 @@ Domain to not audit.
37357 </param>
37358 <infoflow type="none"/>
37359 </interface>
37360 -<interface name="corenet_udp_receive_rndc_port" lineno="72755">
37361 +<interface name="corenet_udp_receive_rndc_port" lineno="72773">
37362 <summary>
37363 Receive UDP traffic on the rndc port.
37364 </summary>
37365 @@ -55538,7 +55622,7 @@ Domain allowed access.
37366 </param>
37367 <infoflow type="read" weight="10"/>
37368 </interface>
37369 -<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="72770">
37370 +<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="72788">
37371 <summary>
37372 Do not audit attempts to receive UDP traffic on the rndc port.
37373 </summary>
37374 @@ -55549,7 +55633,7 @@ Domain to not audit.
37375 </param>
37376 <infoflow type="none"/>
37377 </interface>
37378 -<interface name="corenet_udp_sendrecv_rndc_port" lineno="72785">
37379 +<interface name="corenet_udp_sendrecv_rndc_port" lineno="72803">
37380 <summary>
37381 Send and receive UDP traffic on the rndc port.
37382 </summary>
37383 @@ -55560,7 +55644,7 @@ Domain allowed access.
37384 </param>
37385 <infoflow type="both" weight="10"/>
37386 </interface>
37387 -<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="72801">
37388 +<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="72819">
37389 <summary>
37390 Do not audit attempts to send and receive
37391 UDP traffic on the rndc port.
37392 @@ -55572,7 +55656,7 @@ Domain to not audit.
37393 </param>
37394 <infoflow type="none"/>
37395 </interface>
37396 -<interface name="corenet_tcp_bind_rndc_port" lineno="72816">
37397 +<interface name="corenet_tcp_bind_rndc_port" lineno="72834">
37398 <summary>
37399 Bind TCP sockets to the rndc port.
37400 </summary>
37401 @@ -55583,7 +55667,7 @@ Domain allowed access.
37402 </param>
37403 <infoflow type="none"/>
37404 </interface>
37405 -<interface name="corenet_udp_bind_rndc_port" lineno="72836">
37406 +<interface name="corenet_udp_bind_rndc_port" lineno="72854">
37407 <summary>
37408 Bind UDP sockets to the rndc port.
37409 </summary>
37410 @@ -55594,7 +55678,7 @@ Domain allowed access.
37411 </param>
37412 <infoflow type="none"/>
37413 </interface>
37414 -<interface name="corenet_tcp_connect_rndc_port" lineno="72855">
37415 +<interface name="corenet_tcp_connect_rndc_port" lineno="72873">
37416 <summary>
37417 Make a TCP connection to the rndc port.
37418 </summary>
37419 @@ -55604,7 +55688,7 @@ Domain allowed access.
37420 </summary>
37421 </param>
37422 </interface>
37423 -<interface name="corenet_send_rndc_client_packets" lineno="72875">
37424 +<interface name="corenet_send_rndc_client_packets" lineno="72893">
37425 <summary>
37426 Send rndc_client packets.
37427 </summary>
37428 @@ -55615,7 +55699,7 @@ Domain allowed access.
37429 </param>
37430 <infoflow type="write" weight="10"/>
37431 </interface>
37432 -<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="72894">
37433 +<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="72912">
37434 <summary>
37435 Do not audit attempts to send rndc_client packets.
37436 </summary>
37437 @@ -55626,7 +55710,7 @@ Domain to not audit.
37438 </param>
37439 <infoflow type="none"/>
37440 </interface>
37441 -<interface name="corenet_receive_rndc_client_packets" lineno="72913">
37442 +<interface name="corenet_receive_rndc_client_packets" lineno="72931">
37443 <summary>
37444 Receive rndc_client packets.
37445 </summary>
37446 @@ -55637,7 +55721,7 @@ Domain allowed access.
37447 </param>
37448 <infoflow type="read" weight="10"/>
37449 </interface>
37450 -<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="72932">
37451 +<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="72950">
37452 <summary>
37453 Do not audit attempts to receive rndc_client packets.
37454 </summary>
37455 @@ -55648,7 +55732,7 @@ Domain allowed access.
37456 </param>
37457 <infoflow type="none"/>
37458 </interface>
37459 -<interface name="corenet_sendrecv_rndc_client_packets" lineno="72951">
37460 +<interface name="corenet_sendrecv_rndc_client_packets" lineno="72969">
37461 <summary>
37462 Send and receive rndc_client packets.
37463 </summary>
37464 @@ -55659,7 +55743,7 @@ Domain allowed access.
37465 </param>
37466 <infoflow type="both" weight="10"/>
37467 </interface>
37468 -<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="72967">
37469 +<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="72985">
37470 <summary>
37471 Do not audit attempts to send and receive rndc_client packets.
37472 </summary>
37473 @@ -55670,7 +55754,7 @@ Domain to not audit.
37474 </param>
37475 <infoflow type="none"/>
37476 </interface>
37477 -<interface name="corenet_relabelto_rndc_client_packets" lineno="72982">
37478 +<interface name="corenet_relabelto_rndc_client_packets" lineno="73000">
37479 <summary>
37480 Relabel packets to rndc_client the packet type.
37481 </summary>
37482 @@ -55680,7 +55764,7 @@ Domain allowed access.
37483 </summary>
37484 </param>
37485 </interface>
37486 -<interface name="corenet_send_rndc_server_packets" lineno="73002">
37487 +<interface name="corenet_send_rndc_server_packets" lineno="73020">
37488 <summary>
37489 Send rndc_server packets.
37490 </summary>
37491 @@ -55691,7 +55775,7 @@ Domain allowed access.
37492 </param>
37493 <infoflow type="write" weight="10"/>
37494 </interface>
37495 -<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="73021">
37496 +<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="73039">
37497 <summary>
37498 Do not audit attempts to send rndc_server packets.
37499 </summary>
37500 @@ -55702,7 +55786,7 @@ Domain to not audit.
37501 </param>
37502 <infoflow type="none"/>
37503 </interface>
37504 -<interface name="corenet_receive_rndc_server_packets" lineno="73040">
37505 +<interface name="corenet_receive_rndc_server_packets" lineno="73058">
37506 <summary>
37507 Receive rndc_server packets.
37508 </summary>
37509 @@ -55713,7 +55797,7 @@ Domain allowed access.
37510 </param>
37511 <infoflow type="read" weight="10"/>
37512 </interface>
37513 -<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="73059">
37514 +<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="73077">
37515 <summary>
37516 Do not audit attempts to receive rndc_server packets.
37517 </summary>
37518 @@ -55724,7 +55808,7 @@ Domain allowed access.
37519 </param>
37520 <infoflow type="none"/>
37521 </interface>
37522 -<interface name="corenet_sendrecv_rndc_server_packets" lineno="73078">
37523 +<interface name="corenet_sendrecv_rndc_server_packets" lineno="73096">
37524 <summary>
37525 Send and receive rndc_server packets.
37526 </summary>
37527 @@ -55735,7 +55819,7 @@ Domain allowed access.
37528 </param>
37529 <infoflow type="both" weight="10"/>
37530 </interface>
37531 -<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="73094">
37532 +<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="73112">
37533 <summary>
37534 Do not audit attempts to send and receive rndc_server packets.
37535 </summary>
37536 @@ -55746,7 +55830,7 @@ Domain to not audit.
37537 </param>
37538 <infoflow type="none"/>
37539 </interface>
37540 -<interface name="corenet_relabelto_rndc_server_packets" lineno="73109">
37541 +<interface name="corenet_relabelto_rndc_server_packets" lineno="73127">
37542 <summary>
37543 Relabel packets to rndc_server the packet type.
37544 </summary>
37545 @@ -55756,7 +55840,7 @@ Domain allowed access.
37546 </summary>
37547 </param>
37548 </interface>
37549 -<interface name="corenet_tcp_sendrecv_router_port" lineno="73131">
37550 +<interface name="corenet_tcp_sendrecv_router_port" lineno="73149">
37551 <summary>
37552 Send and receive TCP traffic on the router port.
37553 </summary>
37554 @@ -55767,7 +55851,7 @@ Domain allowed access.
37555 </param>
37556 <infoflow type="both" weight="10"/>
37557 </interface>
37558 -<interface name="corenet_udp_send_router_port" lineno="73146">
37559 +<interface name="corenet_udp_send_router_port" lineno="73164">
37560 <summary>
37561 Send UDP traffic on the router port.
37562 </summary>
37563 @@ -55778,7 +55862,7 @@ Domain allowed access.
37564 </param>
37565 <infoflow type="write" weight="10"/>
37566 </interface>
37567 -<interface name="corenet_dontaudit_udp_send_router_port" lineno="73161">
37568 +<interface name="corenet_dontaudit_udp_send_router_port" lineno="73179">
37569 <summary>
37570 Do not audit attempts to send UDP traffic on the router port.
37571 </summary>
37572 @@ -55789,7 +55873,7 @@ Domain to not audit.
37573 </param>
37574 <infoflow type="none"/>
37575 </interface>
37576 -<interface name="corenet_udp_receive_router_port" lineno="73176">
37577 +<interface name="corenet_udp_receive_router_port" lineno="73194">
37578 <summary>
37579 Receive UDP traffic on the router port.
37580 </summary>
37581 @@ -55800,7 +55884,7 @@ Domain allowed access.
37582 </param>
37583 <infoflow type="read" weight="10"/>
37584 </interface>
37585 -<interface name="corenet_dontaudit_udp_receive_router_port" lineno="73191">
37586 +<interface name="corenet_dontaudit_udp_receive_router_port" lineno="73209">
37587 <summary>
37588 Do not audit attempts to receive UDP traffic on the router port.
37589 </summary>
37590 @@ -55811,7 +55895,7 @@ Domain to not audit.
37591 </param>
37592 <infoflow type="none"/>
37593 </interface>
37594 -<interface name="corenet_udp_sendrecv_router_port" lineno="73206">
37595 +<interface name="corenet_udp_sendrecv_router_port" lineno="73224">
37596 <summary>
37597 Send and receive UDP traffic on the router port.
37598 </summary>
37599 @@ -55822,7 +55906,7 @@ Domain allowed access.
37600 </param>
37601 <infoflow type="both" weight="10"/>
37602 </interface>
37603 -<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="73222">
37604 +<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="73240">
37605 <summary>
37606 Do not audit attempts to send and receive
37607 UDP traffic on the router port.
37608 @@ -55834,7 +55918,7 @@ Domain to not audit.
37609 </param>
37610 <infoflow type="none"/>
37611 </interface>
37612 -<interface name="corenet_tcp_bind_router_port" lineno="73237">
37613 +<interface name="corenet_tcp_bind_router_port" lineno="73255">
37614 <summary>
37615 Bind TCP sockets to the router port.
37616 </summary>
37617 @@ -55845,7 +55929,7 @@ Domain allowed access.
37618 </param>
37619 <infoflow type="none"/>
37620 </interface>
37621 -<interface name="corenet_udp_bind_router_port" lineno="73257">
37622 +<interface name="corenet_udp_bind_router_port" lineno="73275">
37623 <summary>
37624 Bind UDP sockets to the router port.
37625 </summary>
37626 @@ -55856,7 +55940,7 @@ Domain allowed access.
37627 </param>
37628 <infoflow type="none"/>
37629 </interface>
37630 -<interface name="corenet_tcp_connect_router_port" lineno="73276">
37631 +<interface name="corenet_tcp_connect_router_port" lineno="73294">
37632 <summary>
37633 Make a TCP connection to the router port.
37634 </summary>
37635 @@ -55866,7 +55950,7 @@ Domain allowed access.
37636 </summary>
37637 </param>
37638 </interface>
37639 -<interface name="corenet_send_router_client_packets" lineno="73296">
37640 +<interface name="corenet_send_router_client_packets" lineno="73314">
37641 <summary>
37642 Send router_client packets.
37643 </summary>
37644 @@ -55877,7 +55961,7 @@ Domain allowed access.
37645 </param>
37646 <infoflow type="write" weight="10"/>
37647 </interface>
37648 -<interface name="corenet_dontaudit_send_router_client_packets" lineno="73315">
37649 +<interface name="corenet_dontaudit_send_router_client_packets" lineno="73333">
37650 <summary>
37651 Do not audit attempts to send router_client packets.
37652 </summary>
37653 @@ -55888,7 +55972,7 @@ Domain to not audit.
37654 </param>
37655 <infoflow type="none"/>
37656 </interface>
37657 -<interface name="corenet_receive_router_client_packets" lineno="73334">
37658 +<interface name="corenet_receive_router_client_packets" lineno="73352">
37659 <summary>
37660 Receive router_client packets.
37661 </summary>
37662 @@ -55899,7 +55983,7 @@ Domain allowed access.
37663 </param>
37664 <infoflow type="read" weight="10"/>
37665 </interface>
37666 -<interface name="corenet_dontaudit_receive_router_client_packets" lineno="73353">
37667 +<interface name="corenet_dontaudit_receive_router_client_packets" lineno="73371">
37668 <summary>
37669 Do not audit attempts to receive router_client packets.
37670 </summary>
37671 @@ -55910,7 +55994,7 @@ Domain allowed access.
37672 </param>
37673 <infoflow type="none"/>
37674 </interface>
37675 -<interface name="corenet_sendrecv_router_client_packets" lineno="73372">
37676 +<interface name="corenet_sendrecv_router_client_packets" lineno="73390">
37677 <summary>
37678 Send and receive router_client packets.
37679 </summary>
37680 @@ -55921,7 +56005,7 @@ Domain allowed access.
37681 </param>
37682 <infoflow type="both" weight="10"/>
37683 </interface>
37684 -<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="73388">
37685 +<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="73406">
37686 <summary>
37687 Do not audit attempts to send and receive router_client packets.
37688 </summary>
37689 @@ -55932,7 +56016,7 @@ Domain to not audit.
37690 </param>
37691 <infoflow type="none"/>
37692 </interface>
37693 -<interface name="corenet_relabelto_router_client_packets" lineno="73403">
37694 +<interface name="corenet_relabelto_router_client_packets" lineno="73421">
37695 <summary>
37696 Relabel packets to router_client the packet type.
37697 </summary>
37698 @@ -55942,7 +56026,7 @@ Domain allowed access.
37699 </summary>
37700 </param>
37701 </interface>
37702 -<interface name="corenet_send_router_server_packets" lineno="73423">
37703 +<interface name="corenet_send_router_server_packets" lineno="73441">
37704 <summary>
37705 Send router_server packets.
37706 </summary>
37707 @@ -55953,7 +56037,7 @@ Domain allowed access.
37708 </param>
37709 <infoflow type="write" weight="10"/>
37710 </interface>
37711 -<interface name="corenet_dontaudit_send_router_server_packets" lineno="73442">
37712 +<interface name="corenet_dontaudit_send_router_server_packets" lineno="73460">
37713 <summary>
37714 Do not audit attempts to send router_server packets.
37715 </summary>
37716 @@ -55964,7 +56048,7 @@ Domain to not audit.
37717 </param>
37718 <infoflow type="none"/>
37719 </interface>
37720 -<interface name="corenet_receive_router_server_packets" lineno="73461">
37721 +<interface name="corenet_receive_router_server_packets" lineno="73479">
37722 <summary>
37723 Receive router_server packets.
37724 </summary>
37725 @@ -55975,7 +56059,7 @@ Domain allowed access.
37726 </param>
37727 <infoflow type="read" weight="10"/>
37728 </interface>
37729 -<interface name="corenet_dontaudit_receive_router_server_packets" lineno="73480">
37730 +<interface name="corenet_dontaudit_receive_router_server_packets" lineno="73498">
37731 <summary>
37732 Do not audit attempts to receive router_server packets.
37733 </summary>
37734 @@ -55986,7 +56070,7 @@ Domain allowed access.
37735 </param>
37736 <infoflow type="none"/>
37737 </interface>
37738 -<interface name="corenet_sendrecv_router_server_packets" lineno="73499">
37739 +<interface name="corenet_sendrecv_router_server_packets" lineno="73517">
37740 <summary>
37741 Send and receive router_server packets.
37742 </summary>
37743 @@ -55997,7 +56081,7 @@ Domain allowed access.
37744 </param>
37745 <infoflow type="both" weight="10"/>
37746 </interface>
37747 -<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="73515">
37748 +<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="73533">
37749 <summary>
37750 Do not audit attempts to send and receive router_server packets.
37751 </summary>
37752 @@ -56008,7 +56092,7 @@ Domain to not audit.
37753 </param>
37754 <infoflow type="none"/>
37755 </interface>
37756 -<interface name="corenet_relabelto_router_server_packets" lineno="73530">
37757 +<interface name="corenet_relabelto_router_server_packets" lineno="73548">
37758 <summary>
37759 Relabel packets to router_server the packet type.
37760 </summary>
37761 @@ -56018,7 +56102,7 @@ Domain allowed access.
37762 </summary>
37763 </param>
37764 </interface>
37765 -<interface name="corenet_tcp_sendrecv_rsh_port" lineno="73552">
37766 +<interface name="corenet_tcp_sendrecv_rsh_port" lineno="73570">
37767 <summary>
37768 Send and receive TCP traffic on the rsh port.
37769 </summary>
37770 @@ -56029,7 +56113,7 @@ Domain allowed access.
37771 </param>
37772 <infoflow type="both" weight="10"/>
37773 </interface>
37774 -<interface name="corenet_udp_send_rsh_port" lineno="73567">
37775 +<interface name="corenet_udp_send_rsh_port" lineno="73585">
37776 <summary>
37777 Send UDP traffic on the rsh port.
37778 </summary>
37779 @@ -56040,7 +56124,7 @@ Domain allowed access.
37780 </param>
37781 <infoflow type="write" weight="10"/>
37782 </interface>
37783 -<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="73582">
37784 +<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="73600">
37785 <summary>
37786 Do not audit attempts to send UDP traffic on the rsh port.
37787 </summary>
37788 @@ -56051,7 +56135,7 @@ Domain to not audit.
37789 </param>
37790 <infoflow type="none"/>
37791 </interface>
37792 -<interface name="corenet_udp_receive_rsh_port" lineno="73597">
37793 +<interface name="corenet_udp_receive_rsh_port" lineno="73615">
37794 <summary>
37795 Receive UDP traffic on the rsh port.
37796 </summary>
37797 @@ -56062,7 +56146,7 @@ Domain allowed access.
37798 </param>
37799 <infoflow type="read" weight="10"/>
37800 </interface>
37801 -<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="73612">
37802 +<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="73630">
37803 <summary>
37804 Do not audit attempts to receive UDP traffic on the rsh port.
37805 </summary>
37806 @@ -56073,7 +56157,7 @@ Domain to not audit.
37807 </param>
37808 <infoflow type="none"/>
37809 </interface>
37810 -<interface name="corenet_udp_sendrecv_rsh_port" lineno="73627">
37811 +<interface name="corenet_udp_sendrecv_rsh_port" lineno="73645">
37812 <summary>
37813 Send and receive UDP traffic on the rsh port.
37814 </summary>
37815 @@ -56084,7 +56168,7 @@ Domain allowed access.
37816 </param>
37817 <infoflow type="both" weight="10"/>
37818 </interface>
37819 -<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="73643">
37820 +<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="73661">
37821 <summary>
37822 Do not audit attempts to send and receive
37823 UDP traffic on the rsh port.
37824 @@ -56096,7 +56180,7 @@ Domain to not audit.
37825 </param>
37826 <infoflow type="none"/>
37827 </interface>
37828 -<interface name="corenet_tcp_bind_rsh_port" lineno="73658">
37829 +<interface name="corenet_tcp_bind_rsh_port" lineno="73676">
37830 <summary>
37831 Bind TCP sockets to the rsh port.
37832 </summary>
37833 @@ -56107,7 +56191,7 @@ Domain allowed access.
37834 </param>
37835 <infoflow type="none"/>
37836 </interface>
37837 -<interface name="corenet_udp_bind_rsh_port" lineno="73678">
37838 +<interface name="corenet_udp_bind_rsh_port" lineno="73696">
37839 <summary>
37840 Bind UDP sockets to the rsh port.
37841 </summary>
37842 @@ -56118,7 +56202,7 @@ Domain allowed access.
37843 </param>
37844 <infoflow type="none"/>
37845 </interface>
37846 -<interface name="corenet_tcp_connect_rsh_port" lineno="73697">
37847 +<interface name="corenet_tcp_connect_rsh_port" lineno="73715">
37848 <summary>
37849 Make a TCP connection to the rsh port.
37850 </summary>
37851 @@ -56128,7 +56212,7 @@ Domain allowed access.
37852 </summary>
37853 </param>
37854 </interface>
37855 -<interface name="corenet_send_rsh_client_packets" lineno="73717">
37856 +<interface name="corenet_send_rsh_client_packets" lineno="73735">
37857 <summary>
37858 Send rsh_client packets.
37859 </summary>
37860 @@ -56139,7 +56223,7 @@ Domain allowed access.
37861 </param>
37862 <infoflow type="write" weight="10"/>
37863 </interface>
37864 -<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="73736">
37865 +<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="73754">
37866 <summary>
37867 Do not audit attempts to send rsh_client packets.
37868 </summary>
37869 @@ -56150,7 +56234,7 @@ Domain to not audit.
37870 </param>
37871 <infoflow type="none"/>
37872 </interface>
37873 -<interface name="corenet_receive_rsh_client_packets" lineno="73755">
37874 +<interface name="corenet_receive_rsh_client_packets" lineno="73773">
37875 <summary>
37876 Receive rsh_client packets.
37877 </summary>
37878 @@ -56161,7 +56245,7 @@ Domain allowed access.
37879 </param>
37880 <infoflow type="read" weight="10"/>
37881 </interface>
37882 -<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="73774">
37883 +<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="73792">
37884 <summary>
37885 Do not audit attempts to receive rsh_client packets.
37886 </summary>
37887 @@ -56172,7 +56256,7 @@ Domain allowed access.
37888 </param>
37889 <infoflow type="none"/>
37890 </interface>
37891 -<interface name="corenet_sendrecv_rsh_client_packets" lineno="73793">
37892 +<interface name="corenet_sendrecv_rsh_client_packets" lineno="73811">
37893 <summary>
37894 Send and receive rsh_client packets.
37895 </summary>
37896 @@ -56183,7 +56267,7 @@ Domain allowed access.
37897 </param>
37898 <infoflow type="both" weight="10"/>
37899 </interface>
37900 -<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="73809">
37901 +<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="73827">
37902 <summary>
37903 Do not audit attempts to send and receive rsh_client packets.
37904 </summary>
37905 @@ -56194,7 +56278,7 @@ Domain to not audit.
37906 </param>
37907 <infoflow type="none"/>
37908 </interface>
37909 -<interface name="corenet_relabelto_rsh_client_packets" lineno="73824">
37910 +<interface name="corenet_relabelto_rsh_client_packets" lineno="73842">
37911 <summary>
37912 Relabel packets to rsh_client the packet type.
37913 </summary>
37914 @@ -56204,7 +56288,7 @@ Domain allowed access.
37915 </summary>
37916 </param>
37917 </interface>
37918 -<interface name="corenet_send_rsh_server_packets" lineno="73844">
37919 +<interface name="corenet_send_rsh_server_packets" lineno="73862">
37920 <summary>
37921 Send rsh_server packets.
37922 </summary>
37923 @@ -56215,7 +56299,7 @@ Domain allowed access.
37924 </param>
37925 <infoflow type="write" weight="10"/>
37926 </interface>
37927 -<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="73863">
37928 +<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="73881">
37929 <summary>
37930 Do not audit attempts to send rsh_server packets.
37931 </summary>
37932 @@ -56226,7 +56310,7 @@ Domain to not audit.
37933 </param>
37934 <infoflow type="none"/>
37935 </interface>
37936 -<interface name="corenet_receive_rsh_server_packets" lineno="73882">
37937 +<interface name="corenet_receive_rsh_server_packets" lineno="73900">
37938 <summary>
37939 Receive rsh_server packets.
37940 </summary>
37941 @@ -56237,7 +56321,7 @@ Domain allowed access.
37942 </param>
37943 <infoflow type="read" weight="10"/>
37944 </interface>
37945 -<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="73901">
37946 +<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="73919">
37947 <summary>
37948 Do not audit attempts to receive rsh_server packets.
37949 </summary>
37950 @@ -56248,7 +56332,7 @@ Domain allowed access.
37951 </param>
37952 <infoflow type="none"/>
37953 </interface>
37954 -<interface name="corenet_sendrecv_rsh_server_packets" lineno="73920">
37955 +<interface name="corenet_sendrecv_rsh_server_packets" lineno="73938">
37956 <summary>
37957 Send and receive rsh_server packets.
37958 </summary>
37959 @@ -56259,7 +56343,7 @@ Domain allowed access.
37960 </param>
37961 <infoflow type="both" weight="10"/>
37962 </interface>
37963 -<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="73936">
37964 +<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="73954">
37965 <summary>
37966 Do not audit attempts to send and receive rsh_server packets.
37967 </summary>
37968 @@ -56270,7 +56354,7 @@ Domain to not audit.
37969 </param>
37970 <infoflow type="none"/>
37971 </interface>
37972 -<interface name="corenet_relabelto_rsh_server_packets" lineno="73951">
37973 +<interface name="corenet_relabelto_rsh_server_packets" lineno="73969">
37974 <summary>
37975 Relabel packets to rsh_server the packet type.
37976 </summary>
37977 @@ -56280,7 +56364,7 @@ Domain allowed access.
37978 </summary>
37979 </param>
37980 </interface>
37981 -<interface name="corenet_tcp_sendrecv_rsync_port" lineno="73973">
37982 +<interface name="corenet_tcp_sendrecv_rsync_port" lineno="73991">
37983 <summary>
37984 Send and receive TCP traffic on the rsync port.
37985 </summary>
37986 @@ -56291,7 +56375,7 @@ Domain allowed access.
37987 </param>
37988 <infoflow type="both" weight="10"/>
37989 </interface>
37990 -<interface name="corenet_udp_send_rsync_port" lineno="73988">
37991 +<interface name="corenet_udp_send_rsync_port" lineno="74006">
37992 <summary>
37993 Send UDP traffic on the rsync port.
37994 </summary>
37995 @@ -56302,7 +56386,7 @@ Domain allowed access.
37996 </param>
37997 <infoflow type="write" weight="10"/>
37998 </interface>
37999 -<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="74003">
38000 +<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="74021">
38001 <summary>
38002 Do not audit attempts to send UDP traffic on the rsync port.
38003 </summary>
38004 @@ -56313,7 +56397,7 @@ Domain to not audit.
38005 </param>
38006 <infoflow type="none"/>
38007 </interface>
38008 -<interface name="corenet_udp_receive_rsync_port" lineno="74018">
38009 +<interface name="corenet_udp_receive_rsync_port" lineno="74036">
38010 <summary>
38011 Receive UDP traffic on the rsync port.
38012 </summary>
38013 @@ -56324,7 +56408,7 @@ Domain allowed access.
38014 </param>
38015 <infoflow type="read" weight="10"/>
38016 </interface>
38017 -<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="74033">
38018 +<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="74051">
38019 <summary>
38020 Do not audit attempts to receive UDP traffic on the rsync port.
38021 </summary>
38022 @@ -56335,7 +56419,7 @@ Domain to not audit.
38023 </param>
38024 <infoflow type="none"/>
38025 </interface>
38026 -<interface name="corenet_udp_sendrecv_rsync_port" lineno="74048">
38027 +<interface name="corenet_udp_sendrecv_rsync_port" lineno="74066">
38028 <summary>
38029 Send and receive UDP traffic on the rsync port.
38030 </summary>
38031 @@ -56346,7 +56430,7 @@ Domain allowed access.
38032 </param>
38033 <infoflow type="both" weight="10"/>
38034 </interface>
38035 -<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="74064">
38036 +<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="74082">
38037 <summary>
38038 Do not audit attempts to send and receive
38039 UDP traffic on the rsync port.
38040 @@ -56358,7 +56442,7 @@ Domain to not audit.
38041 </param>
38042 <infoflow type="none"/>
38043 </interface>
38044 -<interface name="corenet_tcp_bind_rsync_port" lineno="74079">
38045 +<interface name="corenet_tcp_bind_rsync_port" lineno="74097">
38046 <summary>
38047 Bind TCP sockets to the rsync port.
38048 </summary>
38049 @@ -56369,7 +56453,7 @@ Domain allowed access.
38050 </param>
38051 <infoflow type="none"/>
38052 </interface>
38053 -<interface name="corenet_udp_bind_rsync_port" lineno="74099">
38054 +<interface name="corenet_udp_bind_rsync_port" lineno="74117">
38055 <summary>
38056 Bind UDP sockets to the rsync port.
38057 </summary>
38058 @@ -56380,7 +56464,7 @@ Domain allowed access.
38059 </param>
38060 <infoflow type="none"/>
38061 </interface>
38062 -<interface name="corenet_tcp_connect_rsync_port" lineno="74118">
38063 +<interface name="corenet_tcp_connect_rsync_port" lineno="74136">
38064 <summary>
38065 Make a TCP connection to the rsync port.
38066 </summary>
38067 @@ -56390,7 +56474,7 @@ Domain allowed access.
38068 </summary>
38069 </param>
38070 </interface>
38071 -<interface name="corenet_send_rsync_client_packets" lineno="74138">
38072 +<interface name="corenet_send_rsync_client_packets" lineno="74156">
38073 <summary>
38074 Send rsync_client packets.
38075 </summary>
38076 @@ -56401,7 +56485,7 @@ Domain allowed access.
38077 </param>
38078 <infoflow type="write" weight="10"/>
38079 </interface>
38080 -<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="74157">
38081 +<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="74175">
38082 <summary>
38083 Do not audit attempts to send rsync_client packets.
38084 </summary>
38085 @@ -56412,7 +56496,7 @@ Domain to not audit.
38086 </param>
38087 <infoflow type="none"/>
38088 </interface>
38089 -<interface name="corenet_receive_rsync_client_packets" lineno="74176">
38090 +<interface name="corenet_receive_rsync_client_packets" lineno="74194">
38091 <summary>
38092 Receive rsync_client packets.
38093 </summary>
38094 @@ -56423,7 +56507,7 @@ Domain allowed access.
38095 </param>
38096 <infoflow type="read" weight="10"/>
38097 </interface>
38098 -<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="74195">
38099 +<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="74213">
38100 <summary>
38101 Do not audit attempts to receive rsync_client packets.
38102 </summary>
38103 @@ -56434,7 +56518,7 @@ Domain allowed access.
38104 </param>
38105 <infoflow type="none"/>
38106 </interface>
38107 -<interface name="corenet_sendrecv_rsync_client_packets" lineno="74214">
38108 +<interface name="corenet_sendrecv_rsync_client_packets" lineno="74232">
38109 <summary>
38110 Send and receive rsync_client packets.
38111 </summary>
38112 @@ -56445,7 +56529,7 @@ Domain allowed access.
38113 </param>
38114 <infoflow type="both" weight="10"/>
38115 </interface>
38116 -<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="74230">
38117 +<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="74248">
38118 <summary>
38119 Do not audit attempts to send and receive rsync_client packets.
38120 </summary>
38121 @@ -56456,7 +56540,7 @@ Domain to not audit.
38122 </param>
38123 <infoflow type="none"/>
38124 </interface>
38125 -<interface name="corenet_relabelto_rsync_client_packets" lineno="74245">
38126 +<interface name="corenet_relabelto_rsync_client_packets" lineno="74263">
38127 <summary>
38128 Relabel packets to rsync_client the packet type.
38129 </summary>
38130 @@ -56466,7 +56550,7 @@ Domain allowed access.
38131 </summary>
38132 </param>
38133 </interface>
38134 -<interface name="corenet_send_rsync_server_packets" lineno="74265">
38135 +<interface name="corenet_send_rsync_server_packets" lineno="74283">
38136 <summary>
38137 Send rsync_server packets.
38138 </summary>
38139 @@ -56477,7 +56561,7 @@ Domain allowed access.
38140 </param>
38141 <infoflow type="write" weight="10"/>
38142 </interface>
38143 -<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="74284">
38144 +<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="74302">
38145 <summary>
38146 Do not audit attempts to send rsync_server packets.
38147 </summary>
38148 @@ -56488,7 +56572,7 @@ Domain to not audit.
38149 </param>
38150 <infoflow type="none"/>
38151 </interface>
38152 -<interface name="corenet_receive_rsync_server_packets" lineno="74303">
38153 +<interface name="corenet_receive_rsync_server_packets" lineno="74321">
38154 <summary>
38155 Receive rsync_server packets.
38156 </summary>
38157 @@ -56499,7 +56583,7 @@ Domain allowed access.
38158 </param>
38159 <infoflow type="read" weight="10"/>
38160 </interface>
38161 -<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="74322">
38162 +<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="74340">
38163 <summary>
38164 Do not audit attempts to receive rsync_server packets.
38165 </summary>
38166 @@ -56510,7 +56594,7 @@ Domain allowed access.
38167 </param>
38168 <infoflow type="none"/>
38169 </interface>
38170 -<interface name="corenet_sendrecv_rsync_server_packets" lineno="74341">
38171 +<interface name="corenet_sendrecv_rsync_server_packets" lineno="74359">
38172 <summary>
38173 Send and receive rsync_server packets.
38174 </summary>
38175 @@ -56521,7 +56605,7 @@ Domain allowed access.
38176 </param>
38177 <infoflow type="both" weight="10"/>
38178 </interface>
38179 -<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="74357">
38180 +<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="74375">
38181 <summary>
38182 Do not audit attempts to send and receive rsync_server packets.
38183 </summary>
38184 @@ -56532,7 +56616,7 @@ Domain to not audit.
38185 </param>
38186 <infoflow type="none"/>
38187 </interface>
38188 -<interface name="corenet_relabelto_rsync_server_packets" lineno="74372">
38189 +<interface name="corenet_relabelto_rsync_server_packets" lineno="74390">
38190 <summary>
38191 Relabel packets to rsync_server the packet type.
38192 </summary>
38193 @@ -56542,7 +56626,7 @@ Domain allowed access.
38194 </summary>
38195 </param>
38196 </interface>
38197 -<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="74394">
38198 +<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="74412">
38199 <summary>
38200 Send and receive TCP traffic on the rtorrent port.
38201 </summary>
38202 @@ -56553,7 +56637,7 @@ Domain allowed access.
38203 </param>
38204 <infoflow type="both" weight="10"/>
38205 </interface>
38206 -<interface name="corenet_udp_send_rtorrent_port" lineno="74409">
38207 +<interface name="corenet_udp_send_rtorrent_port" lineno="74427">
38208 <summary>
38209 Send UDP traffic on the rtorrent port.
38210 </summary>
38211 @@ -56564,7 +56648,7 @@ Domain allowed access.
38212 </param>
38213 <infoflow type="write" weight="10"/>
38214 </interface>
38215 -<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="74424">
38216 +<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="74442">
38217 <summary>
38218 Do not audit attempts to send UDP traffic on the rtorrent port.
38219 </summary>
38220 @@ -56575,7 +56659,7 @@ Domain to not audit.
38221 </param>
38222 <infoflow type="none"/>
38223 </interface>
38224 -<interface name="corenet_udp_receive_rtorrent_port" lineno="74439">
38225 +<interface name="corenet_udp_receive_rtorrent_port" lineno="74457">
38226 <summary>
38227 Receive UDP traffic on the rtorrent port.
38228 </summary>
38229 @@ -56586,7 +56670,7 @@ Domain allowed access.
38230 </param>
38231 <infoflow type="read" weight="10"/>
38232 </interface>
38233 -<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="74454">
38234 +<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="74472">
38235 <summary>
38236 Do not audit attempts to receive UDP traffic on the rtorrent port.
38237 </summary>
38238 @@ -56597,7 +56681,7 @@ Domain to not audit.
38239 </param>
38240 <infoflow type="none"/>
38241 </interface>
38242 -<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="74469">
38243 +<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="74487">
38244 <summary>
38245 Send and receive UDP traffic on the rtorrent port.
38246 </summary>
38247 @@ -56608,7 +56692,7 @@ Domain allowed access.
38248 </param>
38249 <infoflow type="both" weight="10"/>
38250 </interface>
38251 -<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="74485">
38252 +<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="74503">
38253 <summary>
38254 Do not audit attempts to send and receive
38255 UDP traffic on the rtorrent port.
38256 @@ -56620,7 +56704,7 @@ Domain to not audit.
38257 </param>
38258 <infoflow type="none"/>
38259 </interface>
38260 -<interface name="corenet_tcp_bind_rtorrent_port" lineno="74500">
38261 +<interface name="corenet_tcp_bind_rtorrent_port" lineno="74518">
38262 <summary>
38263 Bind TCP sockets to the rtorrent port.
38264 </summary>
38265 @@ -56631,7 +56715,7 @@ Domain allowed access.
38266 </param>
38267 <infoflow type="none"/>
38268 </interface>
38269 -<interface name="corenet_udp_bind_rtorrent_port" lineno="74520">
38270 +<interface name="corenet_udp_bind_rtorrent_port" lineno="74538">
38271 <summary>
38272 Bind UDP sockets to the rtorrent port.
38273 </summary>
38274 @@ -56642,7 +56726,7 @@ Domain allowed access.
38275 </param>
38276 <infoflow type="none"/>
38277 </interface>
38278 -<interface name="corenet_tcp_connect_rtorrent_port" lineno="74539">
38279 +<interface name="corenet_tcp_connect_rtorrent_port" lineno="74557">
38280 <summary>
38281 Make a TCP connection to the rtorrent port.
38282 </summary>
38283 @@ -56652,7 +56736,7 @@ Domain allowed access.
38284 </summary>
38285 </param>
38286 </interface>
38287 -<interface name="corenet_send_rtorrent_client_packets" lineno="74559">
38288 +<interface name="corenet_send_rtorrent_client_packets" lineno="74577">
38289 <summary>
38290 Send rtorrent_client packets.
38291 </summary>
38292 @@ -56663,7 +56747,7 @@ Domain allowed access.
38293 </param>
38294 <infoflow type="write" weight="10"/>
38295 </interface>
38296 -<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="74578">
38297 +<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="74596">
38298 <summary>
38299 Do not audit attempts to send rtorrent_client packets.
38300 </summary>
38301 @@ -56674,7 +56758,7 @@ Domain to not audit.
38302 </param>
38303 <infoflow type="none"/>
38304 </interface>
38305 -<interface name="corenet_receive_rtorrent_client_packets" lineno="74597">
38306 +<interface name="corenet_receive_rtorrent_client_packets" lineno="74615">
38307 <summary>
38308 Receive rtorrent_client packets.
38309 </summary>
38310 @@ -56685,7 +56769,7 @@ Domain allowed access.
38311 </param>
38312 <infoflow type="read" weight="10"/>
38313 </interface>
38314 -<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="74616">
38315 +<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="74634">
38316 <summary>
38317 Do not audit attempts to receive rtorrent_client packets.
38318 </summary>
38319 @@ -56696,7 +56780,7 @@ Domain allowed access.
38320 </param>
38321 <infoflow type="none"/>
38322 </interface>
38323 -<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="74635">
38324 +<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="74653">
38325 <summary>
38326 Send and receive rtorrent_client packets.
38327 </summary>
38328 @@ -56707,7 +56791,7 @@ Domain allowed access.
38329 </param>
38330 <infoflow type="both" weight="10"/>
38331 </interface>
38332 -<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="74651">
38333 +<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="74669">
38334 <summary>
38335 Do not audit attempts to send and receive rtorrent_client packets.
38336 </summary>
38337 @@ -56718,7 +56802,7 @@ Domain to not audit.
38338 </param>
38339 <infoflow type="none"/>
38340 </interface>
38341 -<interface name="corenet_relabelto_rtorrent_client_packets" lineno="74666">
38342 +<interface name="corenet_relabelto_rtorrent_client_packets" lineno="74684">
38343 <summary>
38344 Relabel packets to rtorrent_client the packet type.
38345 </summary>
38346 @@ -56728,7 +56812,7 @@ Domain allowed access.
38347 </summary>
38348 </param>
38349 </interface>
38350 -<interface name="corenet_send_rtorrent_server_packets" lineno="74686">
38351 +<interface name="corenet_send_rtorrent_server_packets" lineno="74704">
38352 <summary>
38353 Send rtorrent_server packets.
38354 </summary>
38355 @@ -56739,7 +56823,7 @@ Domain allowed access.
38356 </param>
38357 <infoflow type="write" weight="10"/>
38358 </interface>
38359 -<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="74705">
38360 +<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="74723">
38361 <summary>
38362 Do not audit attempts to send rtorrent_server packets.
38363 </summary>
38364 @@ -56750,7 +56834,7 @@ Domain to not audit.
38365 </param>
38366 <infoflow type="none"/>
38367 </interface>
38368 -<interface name="corenet_receive_rtorrent_server_packets" lineno="74724">
38369 +<interface name="corenet_receive_rtorrent_server_packets" lineno="74742">
38370 <summary>
38371 Receive rtorrent_server packets.
38372 </summary>
38373 @@ -56761,7 +56845,7 @@ Domain allowed access.
38374 </param>
38375 <infoflow type="read" weight="10"/>
38376 </interface>
38377 -<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="74743">
38378 +<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="74761">
38379 <summary>
38380 Do not audit attempts to receive rtorrent_server packets.
38381 </summary>
38382 @@ -56772,7 +56856,7 @@ Domain allowed access.
38383 </param>
38384 <infoflow type="none"/>
38385 </interface>
38386 -<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="74762">
38387 +<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="74780">
38388 <summary>
38389 Send and receive rtorrent_server packets.
38390 </summary>
38391 @@ -56783,7 +56867,7 @@ Domain allowed access.
38392 </param>
38393 <infoflow type="both" weight="10"/>
38394 </interface>
38395 -<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="74778">
38396 +<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="74796">
38397 <summary>
38398 Do not audit attempts to send and receive rtorrent_server packets.
38399 </summary>
38400 @@ -56794,7 +56878,7 @@ Domain to not audit.
38401 </param>
38402 <infoflow type="none"/>
38403 </interface>
38404 -<interface name="corenet_relabelto_rtorrent_server_packets" lineno="74793">
38405 +<interface name="corenet_relabelto_rtorrent_server_packets" lineno="74811">
38406 <summary>
38407 Relabel packets to rtorrent_server the packet type.
38408 </summary>
38409 @@ -56804,7 +56888,7 @@ Domain allowed access.
38410 </summary>
38411 </param>
38412 </interface>
38413 -<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="74815">
38414 +<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="74833">
38415 <summary>
38416 Send and receive TCP traffic on the rtsp port.
38417 </summary>
38418 @@ -56815,7 +56899,7 @@ Domain allowed access.
38419 </param>
38420 <infoflow type="both" weight="10"/>
38421 </interface>
38422 -<interface name="corenet_udp_send_rtsp_port" lineno="74830">
38423 +<interface name="corenet_udp_send_rtsp_port" lineno="74848">
38424 <summary>
38425 Send UDP traffic on the rtsp port.
38426 </summary>
38427 @@ -56826,7 +56910,7 @@ Domain allowed access.
38428 </param>
38429 <infoflow type="write" weight="10"/>
38430 </interface>
38431 -<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="74845">
38432 +<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="74863">
38433 <summary>
38434 Do not audit attempts to send UDP traffic on the rtsp port.
38435 </summary>
38436 @@ -56837,7 +56921,7 @@ Domain to not audit.
38437 </param>
38438 <infoflow type="none"/>
38439 </interface>
38440 -<interface name="corenet_udp_receive_rtsp_port" lineno="74860">
38441 +<interface name="corenet_udp_receive_rtsp_port" lineno="74878">
38442 <summary>
38443 Receive UDP traffic on the rtsp port.
38444 </summary>
38445 @@ -56848,7 +56932,7 @@ Domain allowed access.
38446 </param>
38447 <infoflow type="read" weight="10"/>
38448 </interface>
38449 -<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="74875">
38450 +<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="74893">
38451 <summary>
38452 Do not audit attempts to receive UDP traffic on the rtsp port.
38453 </summary>
38454 @@ -56859,7 +56943,7 @@ Domain to not audit.
38455 </param>
38456 <infoflow type="none"/>
38457 </interface>
38458 -<interface name="corenet_udp_sendrecv_rtsp_port" lineno="74890">
38459 +<interface name="corenet_udp_sendrecv_rtsp_port" lineno="74908">
38460 <summary>
38461 Send and receive UDP traffic on the rtsp port.
38462 </summary>
38463 @@ -56870,7 +56954,7 @@ Domain allowed access.
38464 </param>
38465 <infoflow type="both" weight="10"/>
38466 </interface>
38467 -<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="74906">
38468 +<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="74924">
38469 <summary>
38470 Do not audit attempts to send and receive
38471 UDP traffic on the rtsp port.
38472 @@ -56882,7 +56966,7 @@ Domain to not audit.
38473 </param>
38474 <infoflow type="none"/>
38475 </interface>
38476 -<interface name="corenet_tcp_bind_rtsp_port" lineno="74921">
38477 +<interface name="corenet_tcp_bind_rtsp_port" lineno="74939">
38478 <summary>
38479 Bind TCP sockets to the rtsp port.
38480 </summary>
38481 @@ -56893,7 +56977,7 @@ Domain allowed access.
38482 </param>
38483 <infoflow type="none"/>
38484 </interface>
38485 -<interface name="corenet_udp_bind_rtsp_port" lineno="74941">
38486 +<interface name="corenet_udp_bind_rtsp_port" lineno="74959">
38487 <summary>
38488 Bind UDP sockets to the rtsp port.
38489 </summary>
38490 @@ -56904,7 +56988,7 @@ Domain allowed access.
38491 </param>
38492 <infoflow type="none"/>
38493 </interface>
38494 -<interface name="corenet_tcp_connect_rtsp_port" lineno="74960">
38495 +<interface name="corenet_tcp_connect_rtsp_port" lineno="74978">
38496 <summary>
38497 Make a TCP connection to the rtsp port.
38498 </summary>
38499 @@ -56914,7 +56998,7 @@ Domain allowed access.
38500 </summary>
38501 </param>
38502 </interface>
38503 -<interface name="corenet_send_rtsp_client_packets" lineno="74980">
38504 +<interface name="corenet_send_rtsp_client_packets" lineno="74998">
38505 <summary>
38506 Send rtsp_client packets.
38507 </summary>
38508 @@ -56925,7 +57009,7 @@ Domain allowed access.
38509 </param>
38510 <infoflow type="write" weight="10"/>
38511 </interface>
38512 -<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="74999">
38513 +<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="75017">
38514 <summary>
38515 Do not audit attempts to send rtsp_client packets.
38516 </summary>
38517 @@ -56936,7 +57020,7 @@ Domain to not audit.
38518 </param>
38519 <infoflow type="none"/>
38520 </interface>
38521 -<interface name="corenet_receive_rtsp_client_packets" lineno="75018">
38522 +<interface name="corenet_receive_rtsp_client_packets" lineno="75036">
38523 <summary>
38524 Receive rtsp_client packets.
38525 </summary>
38526 @@ -56947,7 +57031,7 @@ Domain allowed access.
38527 </param>
38528 <infoflow type="read" weight="10"/>
38529 </interface>
38530 -<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="75037">
38531 +<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="75055">
38532 <summary>
38533 Do not audit attempts to receive rtsp_client packets.
38534 </summary>
38535 @@ -56958,7 +57042,7 @@ Domain allowed access.
38536 </param>
38537 <infoflow type="none"/>
38538 </interface>
38539 -<interface name="corenet_sendrecv_rtsp_client_packets" lineno="75056">
38540 +<interface name="corenet_sendrecv_rtsp_client_packets" lineno="75074">
38541 <summary>
38542 Send and receive rtsp_client packets.
38543 </summary>
38544 @@ -56969,7 +57053,7 @@ Domain allowed access.
38545 </param>
38546 <infoflow type="both" weight="10"/>
38547 </interface>
38548 -<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="75072">
38549 +<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="75090">
38550 <summary>
38551 Do not audit attempts to send and receive rtsp_client packets.
38552 </summary>
38553 @@ -56980,7 +57064,7 @@ Domain to not audit.
38554 </param>
38555 <infoflow type="none"/>
38556 </interface>
38557 -<interface name="corenet_relabelto_rtsp_client_packets" lineno="75087">
38558 +<interface name="corenet_relabelto_rtsp_client_packets" lineno="75105">
38559 <summary>
38560 Relabel packets to rtsp_client the packet type.
38561 </summary>
38562 @@ -56990,7 +57074,7 @@ Domain allowed access.
38563 </summary>
38564 </param>
38565 </interface>
38566 -<interface name="corenet_send_rtsp_server_packets" lineno="75107">
38567 +<interface name="corenet_send_rtsp_server_packets" lineno="75125">
38568 <summary>
38569 Send rtsp_server packets.
38570 </summary>
38571 @@ -57001,7 +57085,7 @@ Domain allowed access.
38572 </param>
38573 <infoflow type="write" weight="10"/>
38574 </interface>
38575 -<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="75126">
38576 +<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="75144">
38577 <summary>
38578 Do not audit attempts to send rtsp_server packets.
38579 </summary>
38580 @@ -57012,7 +57096,7 @@ Domain to not audit.
38581 </param>
38582 <infoflow type="none"/>
38583 </interface>
38584 -<interface name="corenet_receive_rtsp_server_packets" lineno="75145">
38585 +<interface name="corenet_receive_rtsp_server_packets" lineno="75163">
38586 <summary>
38587 Receive rtsp_server packets.
38588 </summary>
38589 @@ -57023,7 +57107,7 @@ Domain allowed access.
38590 </param>
38591 <infoflow type="read" weight="10"/>
38592 </interface>
38593 -<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="75164">
38594 +<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="75182">
38595 <summary>
38596 Do not audit attempts to receive rtsp_server packets.
38597 </summary>
38598 @@ -57034,7 +57118,7 @@ Domain allowed access.
38599 </param>
38600 <infoflow type="none"/>
38601 </interface>
38602 -<interface name="corenet_sendrecv_rtsp_server_packets" lineno="75183">
38603 +<interface name="corenet_sendrecv_rtsp_server_packets" lineno="75201">
38604 <summary>
38605 Send and receive rtsp_server packets.
38606 </summary>
38607 @@ -57045,7 +57129,7 @@ Domain allowed access.
38608 </param>
38609 <infoflow type="both" weight="10"/>
38610 </interface>
38611 -<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="75199">
38612 +<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="75217">
38613 <summary>
38614 Do not audit attempts to send and receive rtsp_server packets.
38615 </summary>
38616 @@ -57056,7 +57140,7 @@ Domain to not audit.
38617 </param>
38618 <infoflow type="none"/>
38619 </interface>
38620 -<interface name="corenet_relabelto_rtsp_server_packets" lineno="75214">
38621 +<interface name="corenet_relabelto_rtsp_server_packets" lineno="75232">
38622 <summary>
38623 Relabel packets to rtsp_server the packet type.
38624 </summary>
38625 @@ -57066,7 +57150,7 @@ Domain allowed access.
38626 </summary>
38627 </param>
38628 </interface>
38629 -<interface name="corenet_tcp_sendrecv_rwho_port" lineno="75236">
38630 +<interface name="corenet_tcp_sendrecv_rwho_port" lineno="75254">
38631 <summary>
38632 Send and receive TCP traffic on the rwho port.
38633 </summary>
38634 @@ -57077,7 +57161,7 @@ Domain allowed access.
38635 </param>
38636 <infoflow type="both" weight="10"/>
38637 </interface>
38638 -<interface name="corenet_udp_send_rwho_port" lineno="75251">
38639 +<interface name="corenet_udp_send_rwho_port" lineno="75269">
38640 <summary>
38641 Send UDP traffic on the rwho port.
38642 </summary>
38643 @@ -57088,7 +57172,7 @@ Domain allowed access.
38644 </param>
38645 <infoflow type="write" weight="10"/>
38646 </interface>
38647 -<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="75266">
38648 +<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="75284">
38649 <summary>
38650 Do not audit attempts to send UDP traffic on the rwho port.
38651 </summary>
38652 @@ -57099,7 +57183,7 @@ Domain to not audit.
38653 </param>
38654 <infoflow type="none"/>
38655 </interface>
38656 -<interface name="corenet_udp_receive_rwho_port" lineno="75281">
38657 +<interface name="corenet_udp_receive_rwho_port" lineno="75299">
38658 <summary>
38659 Receive UDP traffic on the rwho port.
38660 </summary>
38661 @@ -57110,7 +57194,7 @@ Domain allowed access.
38662 </param>
38663 <infoflow type="read" weight="10"/>
38664 </interface>
38665 -<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="75296">
38666 +<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="75314">
38667 <summary>
38668 Do not audit attempts to receive UDP traffic on the rwho port.
38669 </summary>
38670 @@ -57121,7 +57205,7 @@ Domain to not audit.
38671 </param>
38672 <infoflow type="none"/>
38673 </interface>
38674 -<interface name="corenet_udp_sendrecv_rwho_port" lineno="75311">
38675 +<interface name="corenet_udp_sendrecv_rwho_port" lineno="75329">
38676 <summary>
38677 Send and receive UDP traffic on the rwho port.
38678 </summary>
38679 @@ -57132,7 +57216,7 @@ Domain allowed access.
38680 </param>
38681 <infoflow type="both" weight="10"/>
38682 </interface>
38683 -<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="75327">
38684 +<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="75345">
38685 <summary>
38686 Do not audit attempts to send and receive
38687 UDP traffic on the rwho port.
38688 @@ -57144,7 +57228,7 @@ Domain to not audit.
38689 </param>
38690 <infoflow type="none"/>
38691 </interface>
38692 -<interface name="corenet_tcp_bind_rwho_port" lineno="75342">
38693 +<interface name="corenet_tcp_bind_rwho_port" lineno="75360">
38694 <summary>
38695 Bind TCP sockets to the rwho port.
38696 </summary>
38697 @@ -57155,7 +57239,7 @@ Domain allowed access.
38698 </param>
38699 <infoflow type="none"/>
38700 </interface>
38701 -<interface name="corenet_udp_bind_rwho_port" lineno="75362">
38702 +<interface name="corenet_udp_bind_rwho_port" lineno="75380">
38703 <summary>
38704 Bind UDP sockets to the rwho port.
38705 </summary>
38706 @@ -57166,7 +57250,7 @@ Domain allowed access.
38707 </param>
38708 <infoflow type="none"/>
38709 </interface>
38710 -<interface name="corenet_tcp_connect_rwho_port" lineno="75381">
38711 +<interface name="corenet_tcp_connect_rwho_port" lineno="75399">
38712 <summary>
38713 Make a TCP connection to the rwho port.
38714 </summary>
38715 @@ -57176,7 +57260,7 @@ Domain allowed access.
38716 </summary>
38717 </param>
38718 </interface>
38719 -<interface name="corenet_send_rwho_client_packets" lineno="75401">
38720 +<interface name="corenet_send_rwho_client_packets" lineno="75419">
38721 <summary>
38722 Send rwho_client packets.
38723 </summary>
38724 @@ -57187,7 +57271,7 @@ Domain allowed access.
38725 </param>
38726 <infoflow type="write" weight="10"/>
38727 </interface>
38728 -<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="75420">
38729 +<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="75438">
38730 <summary>
38731 Do not audit attempts to send rwho_client packets.
38732 </summary>
38733 @@ -57198,7 +57282,7 @@ Domain to not audit.
38734 </param>
38735 <infoflow type="none"/>
38736 </interface>
38737 -<interface name="corenet_receive_rwho_client_packets" lineno="75439">
38738 +<interface name="corenet_receive_rwho_client_packets" lineno="75457">
38739 <summary>
38740 Receive rwho_client packets.
38741 </summary>
38742 @@ -57209,7 +57293,7 @@ Domain allowed access.
38743 </param>
38744 <infoflow type="read" weight="10"/>
38745 </interface>
38746 -<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="75458">
38747 +<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="75476">
38748 <summary>
38749 Do not audit attempts to receive rwho_client packets.
38750 </summary>
38751 @@ -57220,7 +57304,7 @@ Domain allowed access.
38752 </param>
38753 <infoflow type="none"/>
38754 </interface>
38755 -<interface name="corenet_sendrecv_rwho_client_packets" lineno="75477">
38756 +<interface name="corenet_sendrecv_rwho_client_packets" lineno="75495">
38757 <summary>
38758 Send and receive rwho_client packets.
38759 </summary>
38760 @@ -57231,7 +57315,7 @@ Domain allowed access.
38761 </param>
38762 <infoflow type="both" weight="10"/>
38763 </interface>
38764 -<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="75493">
38765 +<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="75511">
38766 <summary>
38767 Do not audit attempts to send and receive rwho_client packets.
38768 </summary>
38769 @@ -57242,7 +57326,7 @@ Domain to not audit.
38770 </param>
38771 <infoflow type="none"/>
38772 </interface>
38773 -<interface name="corenet_relabelto_rwho_client_packets" lineno="75508">
38774 +<interface name="corenet_relabelto_rwho_client_packets" lineno="75526">
38775 <summary>
38776 Relabel packets to rwho_client the packet type.
38777 </summary>
38778 @@ -57252,7 +57336,7 @@ Domain allowed access.
38779 </summary>
38780 </param>
38781 </interface>
38782 -<interface name="corenet_send_rwho_server_packets" lineno="75528">
38783 +<interface name="corenet_send_rwho_server_packets" lineno="75546">
38784 <summary>
38785 Send rwho_server packets.
38786 </summary>
38787 @@ -57263,7 +57347,7 @@ Domain allowed access.
38788 </param>
38789 <infoflow type="write" weight="10"/>
38790 </interface>
38791 -<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="75547">
38792 +<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="75565">
38793 <summary>
38794 Do not audit attempts to send rwho_server packets.
38795 </summary>
38796 @@ -57274,7 +57358,7 @@ Domain to not audit.
38797 </param>
38798 <infoflow type="none"/>
38799 </interface>
38800 -<interface name="corenet_receive_rwho_server_packets" lineno="75566">
38801 +<interface name="corenet_receive_rwho_server_packets" lineno="75584">
38802 <summary>
38803 Receive rwho_server packets.
38804 </summary>
38805 @@ -57285,7 +57369,7 @@ Domain allowed access.
38806 </param>
38807 <infoflow type="read" weight="10"/>
38808 </interface>
38809 -<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="75585">
38810 +<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="75603">
38811 <summary>
38812 Do not audit attempts to receive rwho_server packets.
38813 </summary>
38814 @@ -57296,7 +57380,7 @@ Domain allowed access.
38815 </param>
38816 <infoflow type="none"/>
38817 </interface>
38818 -<interface name="corenet_sendrecv_rwho_server_packets" lineno="75604">
38819 +<interface name="corenet_sendrecv_rwho_server_packets" lineno="75622">
38820 <summary>
38821 Send and receive rwho_server packets.
38822 </summary>
38823 @@ -57307,7 +57391,7 @@ Domain allowed access.
38824 </param>
38825 <infoflow type="both" weight="10"/>
38826 </interface>
38827 -<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="75620">
38828 +<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="75638">
38829 <summary>
38830 Do not audit attempts to send and receive rwho_server packets.
38831 </summary>
38832 @@ -57318,7 +57402,7 @@ Domain to not audit.
38833 </param>
38834 <infoflow type="none"/>
38835 </interface>
38836 -<interface name="corenet_relabelto_rwho_server_packets" lineno="75635">
38837 +<interface name="corenet_relabelto_rwho_server_packets" lineno="75653">
38838 <summary>
38839 Relabel packets to rwho_server the packet type.
38840 </summary>
38841 @@ -57328,7 +57412,7 @@ Domain allowed access.
38842 </summary>
38843 </param>
38844 </interface>
38845 -<interface name="corenet_tcp_sendrecv_salt_port" lineno="75657">
38846 +<interface name="corenet_tcp_sendrecv_salt_port" lineno="75675">
38847 <summary>
38848 Send and receive TCP traffic on the salt port.
38849 </summary>
38850 @@ -57339,7 +57423,7 @@ Domain allowed access.
38851 </param>
38852 <infoflow type="both" weight="10"/>
38853 </interface>
38854 -<interface name="corenet_udp_send_salt_port" lineno="75672">
38855 +<interface name="corenet_udp_send_salt_port" lineno="75690">
38856 <summary>
38857 Send UDP traffic on the salt port.
38858 </summary>
38859 @@ -57350,7 +57434,7 @@ Domain allowed access.
38860 </param>
38861 <infoflow type="write" weight="10"/>
38862 </interface>
38863 -<interface name="corenet_dontaudit_udp_send_salt_port" lineno="75687">
38864 +<interface name="corenet_dontaudit_udp_send_salt_port" lineno="75705">
38865 <summary>
38866 Do not audit attempts to send UDP traffic on the salt port.
38867 </summary>
38868 @@ -57361,7 +57445,7 @@ Domain to not audit.
38869 </param>
38870 <infoflow type="none"/>
38871 </interface>
38872 -<interface name="corenet_udp_receive_salt_port" lineno="75702">
38873 +<interface name="corenet_udp_receive_salt_port" lineno="75720">
38874 <summary>
38875 Receive UDP traffic on the salt port.
38876 </summary>
38877 @@ -57372,7 +57456,7 @@ Domain allowed access.
38878 </param>
38879 <infoflow type="read" weight="10"/>
38880 </interface>
38881 -<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="75717">
38882 +<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="75735">
38883 <summary>
38884 Do not audit attempts to receive UDP traffic on the salt port.
38885 </summary>
38886 @@ -57383,7 +57467,7 @@ Domain to not audit.
38887 </param>
38888 <infoflow type="none"/>
38889 </interface>
38890 -<interface name="corenet_udp_sendrecv_salt_port" lineno="75732">
38891 +<interface name="corenet_udp_sendrecv_salt_port" lineno="75750">
38892 <summary>
38893 Send and receive UDP traffic on the salt port.
38894 </summary>
38895 @@ -57394,7 +57478,7 @@ Domain allowed access.
38896 </param>
38897 <infoflow type="both" weight="10"/>
38898 </interface>
38899 -<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="75748">
38900 +<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="75766">
38901 <summary>
38902 Do not audit attempts to send and receive
38903 UDP traffic on the salt port.
38904 @@ -57406,7 +57490,7 @@ Domain to not audit.
38905 </param>
38906 <infoflow type="none"/>
38907 </interface>
38908 -<interface name="corenet_tcp_bind_salt_port" lineno="75763">
38909 +<interface name="corenet_tcp_bind_salt_port" lineno="75781">
38910 <summary>
38911 Bind TCP sockets to the salt port.
38912 </summary>
38913 @@ -57417,7 +57501,7 @@ Domain allowed access.
38914 </param>
38915 <infoflow type="none"/>
38916 </interface>
38917 -<interface name="corenet_udp_bind_salt_port" lineno="75783">
38918 +<interface name="corenet_udp_bind_salt_port" lineno="75801">
38919 <summary>
38920 Bind UDP sockets to the salt port.
38921 </summary>
38922 @@ -57428,7 +57512,7 @@ Domain allowed access.
38923 </param>
38924 <infoflow type="none"/>
38925 </interface>
38926 -<interface name="corenet_tcp_connect_salt_port" lineno="75802">
38927 +<interface name="corenet_tcp_connect_salt_port" lineno="75820">
38928 <summary>
38929 Make a TCP connection to the salt port.
38930 </summary>
38931 @@ -57438,7 +57522,7 @@ Domain allowed access.
38932 </summary>
38933 </param>
38934 </interface>
38935 -<interface name="corenet_send_salt_client_packets" lineno="75822">
38936 +<interface name="corenet_send_salt_client_packets" lineno="75840">
38937 <summary>
38938 Send salt_client packets.
38939 </summary>
38940 @@ -57449,7 +57533,7 @@ Domain allowed access.
38941 </param>
38942 <infoflow type="write" weight="10"/>
38943 </interface>
38944 -<interface name="corenet_dontaudit_send_salt_client_packets" lineno="75841">
38945 +<interface name="corenet_dontaudit_send_salt_client_packets" lineno="75859">
38946 <summary>
38947 Do not audit attempts to send salt_client packets.
38948 </summary>
38949 @@ -57460,7 +57544,7 @@ Domain to not audit.
38950 </param>
38951 <infoflow type="none"/>
38952 </interface>
38953 -<interface name="corenet_receive_salt_client_packets" lineno="75860">
38954 +<interface name="corenet_receive_salt_client_packets" lineno="75878">
38955 <summary>
38956 Receive salt_client packets.
38957 </summary>
38958 @@ -57471,7 +57555,7 @@ Domain allowed access.
38959 </param>
38960 <infoflow type="read" weight="10"/>
38961 </interface>
38962 -<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="75879">
38963 +<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="75897">
38964 <summary>
38965 Do not audit attempts to receive salt_client packets.
38966 </summary>
38967 @@ -57482,7 +57566,7 @@ Domain allowed access.
38968 </param>
38969 <infoflow type="none"/>
38970 </interface>
38971 -<interface name="corenet_sendrecv_salt_client_packets" lineno="75898">
38972 +<interface name="corenet_sendrecv_salt_client_packets" lineno="75916">
38973 <summary>
38974 Send and receive salt_client packets.
38975 </summary>
38976 @@ -57493,7 +57577,7 @@ Domain allowed access.
38977 </param>
38978 <infoflow type="both" weight="10"/>
38979 </interface>
38980 -<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="75914">
38981 +<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="75932">
38982 <summary>
38983 Do not audit attempts to send and receive salt_client packets.
38984 </summary>
38985 @@ -57504,7 +57588,7 @@ Domain to not audit.
38986 </param>
38987 <infoflow type="none"/>
38988 </interface>
38989 -<interface name="corenet_relabelto_salt_client_packets" lineno="75929">
38990 +<interface name="corenet_relabelto_salt_client_packets" lineno="75947">
38991 <summary>
38992 Relabel packets to salt_client the packet type.
38993 </summary>
38994 @@ -57514,7 +57598,7 @@ Domain allowed access.
38995 </summary>
38996 </param>
38997 </interface>
38998 -<interface name="corenet_send_salt_server_packets" lineno="75949">
38999 +<interface name="corenet_send_salt_server_packets" lineno="75967">
39000 <summary>
39001 Send salt_server packets.
39002 </summary>
39003 @@ -57525,7 +57609,7 @@ Domain allowed access.
39004 </param>
39005 <infoflow type="write" weight="10"/>
39006 </interface>
39007 -<interface name="corenet_dontaudit_send_salt_server_packets" lineno="75968">
39008 +<interface name="corenet_dontaudit_send_salt_server_packets" lineno="75986">
39009 <summary>
39010 Do not audit attempts to send salt_server packets.
39011 </summary>
39012 @@ -57536,7 +57620,7 @@ Domain to not audit.
39013 </param>
39014 <infoflow type="none"/>
39015 </interface>
39016 -<interface name="corenet_receive_salt_server_packets" lineno="75987">
39017 +<interface name="corenet_receive_salt_server_packets" lineno="76005">
39018 <summary>
39019 Receive salt_server packets.
39020 </summary>
39021 @@ -57547,7 +57631,7 @@ Domain allowed access.
39022 </param>
39023 <infoflow type="read" weight="10"/>
39024 </interface>
39025 -<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="76006">
39026 +<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="76024">
39027 <summary>
39028 Do not audit attempts to receive salt_server packets.
39029 </summary>
39030 @@ -57558,7 +57642,7 @@ Domain allowed access.
39031 </param>
39032 <infoflow type="none"/>
39033 </interface>
39034 -<interface name="corenet_sendrecv_salt_server_packets" lineno="76025">
39035 +<interface name="corenet_sendrecv_salt_server_packets" lineno="76043">
39036 <summary>
39037 Send and receive salt_server packets.
39038 </summary>
39039 @@ -57569,7 +57653,7 @@ Domain allowed access.
39040 </param>
39041 <infoflow type="both" weight="10"/>
39042 </interface>
39043 -<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="76041">
39044 +<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="76059">
39045 <summary>
39046 Do not audit attempts to send and receive salt_server packets.
39047 </summary>
39048 @@ -57580,7 +57664,7 @@ Domain to not audit.
39049 </param>
39050 <infoflow type="none"/>
39051 </interface>
39052 -<interface name="corenet_relabelto_salt_server_packets" lineno="76056">
39053 +<interface name="corenet_relabelto_salt_server_packets" lineno="76074">
39054 <summary>
39055 Relabel packets to salt_server the packet type.
39056 </summary>
39057 @@ -57590,7 +57674,7 @@ Domain allowed access.
39058 </summary>
39059 </param>
39060 </interface>
39061 -<interface name="corenet_tcp_sendrecv_sap_port" lineno="76078">
39062 +<interface name="corenet_tcp_sendrecv_sap_port" lineno="76096">
39063 <summary>
39064 Send and receive TCP traffic on the sap port.
39065 </summary>
39066 @@ -57601,7 +57685,7 @@ Domain allowed access.
39067 </param>
39068 <infoflow type="both" weight="10"/>
39069 </interface>
39070 -<interface name="corenet_udp_send_sap_port" lineno="76093">
39071 +<interface name="corenet_udp_send_sap_port" lineno="76111">
39072 <summary>
39073 Send UDP traffic on the sap port.
39074 </summary>
39075 @@ -57612,7 +57696,7 @@ Domain allowed access.
39076 </param>
39077 <infoflow type="write" weight="10"/>
39078 </interface>
39079 -<interface name="corenet_dontaudit_udp_send_sap_port" lineno="76108">
39080 +<interface name="corenet_dontaudit_udp_send_sap_port" lineno="76126">
39081 <summary>
39082 Do not audit attempts to send UDP traffic on the sap port.
39083 </summary>
39084 @@ -57623,7 +57707,7 @@ Domain to not audit.
39085 </param>
39086 <infoflow type="none"/>
39087 </interface>
39088 -<interface name="corenet_udp_receive_sap_port" lineno="76123">
39089 +<interface name="corenet_udp_receive_sap_port" lineno="76141">
39090 <summary>
39091 Receive UDP traffic on the sap port.
39092 </summary>
39093 @@ -57634,7 +57718,7 @@ Domain allowed access.
39094 </param>
39095 <infoflow type="read" weight="10"/>
39096 </interface>
39097 -<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="76138">
39098 +<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="76156">
39099 <summary>
39100 Do not audit attempts to receive UDP traffic on the sap port.
39101 </summary>
39102 @@ -57645,7 +57729,7 @@ Domain to not audit.
39103 </param>
39104 <infoflow type="none"/>
39105 </interface>
39106 -<interface name="corenet_udp_sendrecv_sap_port" lineno="76153">
39107 +<interface name="corenet_udp_sendrecv_sap_port" lineno="76171">
39108 <summary>
39109 Send and receive UDP traffic on the sap port.
39110 </summary>
39111 @@ -57656,7 +57740,7 @@ Domain allowed access.
39112 </param>
39113 <infoflow type="both" weight="10"/>
39114 </interface>
39115 -<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="76169">
39116 +<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="76187">
39117 <summary>
39118 Do not audit attempts to send and receive
39119 UDP traffic on the sap port.
39120 @@ -57668,7 +57752,7 @@ Domain to not audit.
39121 </param>
39122 <infoflow type="none"/>
39123 </interface>
39124 -<interface name="corenet_tcp_bind_sap_port" lineno="76184">
39125 +<interface name="corenet_tcp_bind_sap_port" lineno="76202">
39126 <summary>
39127 Bind TCP sockets to the sap port.
39128 </summary>
39129 @@ -57679,7 +57763,7 @@ Domain allowed access.
39130 </param>
39131 <infoflow type="none"/>
39132 </interface>
39133 -<interface name="corenet_udp_bind_sap_port" lineno="76204">
39134 +<interface name="corenet_udp_bind_sap_port" lineno="76222">
39135 <summary>
39136 Bind UDP sockets to the sap port.
39137 </summary>
39138 @@ -57690,7 +57774,7 @@ Domain allowed access.
39139 </param>
39140 <infoflow type="none"/>
39141 </interface>
39142 -<interface name="corenet_tcp_connect_sap_port" lineno="76223">
39143 +<interface name="corenet_tcp_connect_sap_port" lineno="76241">
39144 <summary>
39145 Make a TCP connection to the sap port.
39146 </summary>
39147 @@ -57700,7 +57784,7 @@ Domain allowed access.
39148 </summary>
39149 </param>
39150 </interface>
39151 -<interface name="corenet_send_sap_client_packets" lineno="76243">
39152 +<interface name="corenet_send_sap_client_packets" lineno="76261">
39153 <summary>
39154 Send sap_client packets.
39155 </summary>
39156 @@ -57711,7 +57795,7 @@ Domain allowed access.
39157 </param>
39158 <infoflow type="write" weight="10"/>
39159 </interface>
39160 -<interface name="corenet_dontaudit_send_sap_client_packets" lineno="76262">
39161 +<interface name="corenet_dontaudit_send_sap_client_packets" lineno="76280">
39162 <summary>
39163 Do not audit attempts to send sap_client packets.
39164 </summary>
39165 @@ -57722,7 +57806,7 @@ Domain to not audit.
39166 </param>
39167 <infoflow type="none"/>
39168 </interface>
39169 -<interface name="corenet_receive_sap_client_packets" lineno="76281">
39170 +<interface name="corenet_receive_sap_client_packets" lineno="76299">
39171 <summary>
39172 Receive sap_client packets.
39173 </summary>
39174 @@ -57733,7 +57817,7 @@ Domain allowed access.
39175 </param>
39176 <infoflow type="read" weight="10"/>
39177 </interface>
39178 -<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="76300">
39179 +<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="76318">
39180 <summary>
39181 Do not audit attempts to receive sap_client packets.
39182 </summary>
39183 @@ -57744,7 +57828,7 @@ Domain allowed access.
39184 </param>
39185 <infoflow type="none"/>
39186 </interface>
39187 -<interface name="corenet_sendrecv_sap_client_packets" lineno="76319">
39188 +<interface name="corenet_sendrecv_sap_client_packets" lineno="76337">
39189 <summary>
39190 Send and receive sap_client packets.
39191 </summary>
39192 @@ -57755,7 +57839,7 @@ Domain allowed access.
39193 </param>
39194 <infoflow type="both" weight="10"/>
39195 </interface>
39196 -<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="76335">
39197 +<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="76353">
39198 <summary>
39199 Do not audit attempts to send and receive sap_client packets.
39200 </summary>
39201 @@ -57766,7 +57850,7 @@ Domain to not audit.
39202 </param>
39203 <infoflow type="none"/>
39204 </interface>
39205 -<interface name="corenet_relabelto_sap_client_packets" lineno="76350">
39206 +<interface name="corenet_relabelto_sap_client_packets" lineno="76368">
39207 <summary>
39208 Relabel packets to sap_client the packet type.
39209 </summary>
39210 @@ -57776,7 +57860,7 @@ Domain allowed access.
39211 </summary>
39212 </param>
39213 </interface>
39214 -<interface name="corenet_send_sap_server_packets" lineno="76370">
39215 +<interface name="corenet_send_sap_server_packets" lineno="76388">
39216 <summary>
39217 Send sap_server packets.
39218 </summary>
39219 @@ -57787,7 +57871,7 @@ Domain allowed access.
39220 </param>
39221 <infoflow type="write" weight="10"/>
39222 </interface>
39223 -<interface name="corenet_dontaudit_send_sap_server_packets" lineno="76389">
39224 +<interface name="corenet_dontaudit_send_sap_server_packets" lineno="76407">
39225 <summary>
39226 Do not audit attempts to send sap_server packets.
39227 </summary>
39228 @@ -57798,7 +57882,7 @@ Domain to not audit.
39229 </param>
39230 <infoflow type="none"/>
39231 </interface>
39232 -<interface name="corenet_receive_sap_server_packets" lineno="76408">
39233 +<interface name="corenet_receive_sap_server_packets" lineno="76426">
39234 <summary>
39235 Receive sap_server packets.
39236 </summary>
39237 @@ -57809,7 +57893,7 @@ Domain allowed access.
39238 </param>
39239 <infoflow type="read" weight="10"/>
39240 </interface>
39241 -<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="76427">
39242 +<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="76445">
39243 <summary>
39244 Do not audit attempts to receive sap_server packets.
39245 </summary>
39246 @@ -57820,7 +57904,7 @@ Domain allowed access.
39247 </param>
39248 <infoflow type="none"/>
39249 </interface>
39250 -<interface name="corenet_sendrecv_sap_server_packets" lineno="76446">
39251 +<interface name="corenet_sendrecv_sap_server_packets" lineno="76464">
39252 <summary>
39253 Send and receive sap_server packets.
39254 </summary>
39255 @@ -57831,7 +57915,7 @@ Domain allowed access.
39256 </param>
39257 <infoflow type="both" weight="10"/>
39258 </interface>
39259 -<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="76462">
39260 +<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="76480">
39261 <summary>
39262 Do not audit attempts to send and receive sap_server packets.
39263 </summary>
39264 @@ -57842,7 +57926,7 @@ Domain to not audit.
39265 </param>
39266 <infoflow type="none"/>
39267 </interface>
39268 -<interface name="corenet_relabelto_sap_server_packets" lineno="76477">
39269 +<interface name="corenet_relabelto_sap_server_packets" lineno="76495">
39270 <summary>
39271 Relabel packets to sap_server the packet type.
39272 </summary>
39273 @@ -57852,7 +57936,7 @@ Domain allowed access.
39274 </summary>
39275 </param>
39276 </interface>
39277 -<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="76499">
39278 +<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="76517">
39279 <summary>
39280 Send and receive TCP traffic on the servistaitsm port.
39281 </summary>
39282 @@ -57863,7 +57947,7 @@ Domain allowed access.
39283 </param>
39284 <infoflow type="both" weight="10"/>
39285 </interface>
39286 -<interface name="corenet_udp_send_servistaitsm_port" lineno="76514">
39287 +<interface name="corenet_udp_send_servistaitsm_port" lineno="76532">
39288 <summary>
39289 Send UDP traffic on the servistaitsm port.
39290 </summary>
39291 @@ -57874,7 +57958,7 @@ Domain allowed access.
39292 </param>
39293 <infoflow type="write" weight="10"/>
39294 </interface>
39295 -<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="76529">
39296 +<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="76547">
39297 <summary>
39298 Do not audit attempts to send UDP traffic on the servistaitsm port.
39299 </summary>
39300 @@ -57885,7 +57969,7 @@ Domain to not audit.
39301 </param>
39302 <infoflow type="none"/>
39303 </interface>
39304 -<interface name="corenet_udp_receive_servistaitsm_port" lineno="76544">
39305 +<interface name="corenet_udp_receive_servistaitsm_port" lineno="76562">
39306 <summary>
39307 Receive UDP traffic on the servistaitsm port.
39308 </summary>
39309 @@ -57896,7 +57980,7 @@ Domain allowed access.
39310 </param>
39311 <infoflow type="read" weight="10"/>
39312 </interface>
39313 -<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="76559">
39314 +<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="76577">
39315 <summary>
39316 Do not audit attempts to receive UDP traffic on the servistaitsm port.
39317 </summary>
39318 @@ -57907,7 +57991,7 @@ Domain to not audit.
39319 </param>
39320 <infoflow type="none"/>
39321 </interface>
39322 -<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="76574">
39323 +<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="76592">
39324 <summary>
39325 Send and receive UDP traffic on the servistaitsm port.
39326 </summary>
39327 @@ -57918,7 +58002,7 @@ Domain allowed access.
39328 </param>
39329 <infoflow type="both" weight="10"/>
39330 </interface>
39331 -<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="76590">
39332 +<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="76608">
39333 <summary>
39334 Do not audit attempts to send and receive
39335 UDP traffic on the servistaitsm port.
39336 @@ -57930,7 +58014,7 @@ Domain to not audit.
39337 </param>
39338 <infoflow type="none"/>
39339 </interface>
39340 -<interface name="corenet_tcp_bind_servistaitsm_port" lineno="76605">
39341 +<interface name="corenet_tcp_bind_servistaitsm_port" lineno="76623">
39342 <summary>
39343 Bind TCP sockets to the servistaitsm port.
39344 </summary>
39345 @@ -57941,7 +58025,7 @@ Domain allowed access.
39346 </param>
39347 <infoflow type="none"/>
39348 </interface>
39349 -<interface name="corenet_udp_bind_servistaitsm_port" lineno="76625">
39350 +<interface name="corenet_udp_bind_servistaitsm_port" lineno="76643">
39351 <summary>
39352 Bind UDP sockets to the servistaitsm port.
39353 </summary>
39354 @@ -57952,7 +58036,7 @@ Domain allowed access.
39355 </param>
39356 <infoflow type="none"/>
39357 </interface>
39358 -<interface name="corenet_tcp_connect_servistaitsm_port" lineno="76644">
39359 +<interface name="corenet_tcp_connect_servistaitsm_port" lineno="76662">
39360 <summary>
39361 Make a TCP connection to the servistaitsm port.
39362 </summary>
39363 @@ -57962,7 +58046,7 @@ Domain allowed access.
39364 </summary>
39365 </param>
39366 </interface>
39367 -<interface name="corenet_send_servistaitsm_client_packets" lineno="76664">
39368 +<interface name="corenet_send_servistaitsm_client_packets" lineno="76682">
39369 <summary>
39370 Send servistaitsm_client packets.
39371 </summary>
39372 @@ -57973,7 +58057,7 @@ Domain allowed access.
39373 </param>
39374 <infoflow type="write" weight="10"/>
39375 </interface>
39376 -<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="76683">
39377 +<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="76701">
39378 <summary>
39379 Do not audit attempts to send servistaitsm_client packets.
39380 </summary>
39381 @@ -57984,7 +58068,7 @@ Domain to not audit.
39382 </param>
39383 <infoflow type="none"/>
39384 </interface>
39385 -<interface name="corenet_receive_servistaitsm_client_packets" lineno="76702">
39386 +<interface name="corenet_receive_servistaitsm_client_packets" lineno="76720">
39387 <summary>
39388 Receive servistaitsm_client packets.
39389 </summary>
39390 @@ -57995,7 +58079,7 @@ Domain allowed access.
39391 </param>
39392 <infoflow type="read" weight="10"/>
39393 </interface>
39394 -<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="76721">
39395 +<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="76739">
39396 <summary>
39397 Do not audit attempts to receive servistaitsm_client packets.
39398 </summary>
39399 @@ -58006,7 +58090,7 @@ Domain allowed access.
39400 </param>
39401 <infoflow type="none"/>
39402 </interface>
39403 -<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="76740">
39404 +<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="76758">
39405 <summary>
39406 Send and receive servistaitsm_client packets.
39407 </summary>
39408 @@ -58017,7 +58101,7 @@ Domain allowed access.
39409 </param>
39410 <infoflow type="both" weight="10"/>
39411 </interface>
39412 -<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="76756">
39413 +<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="76774">
39414 <summary>
39415 Do not audit attempts to send and receive servistaitsm_client packets.
39416 </summary>
39417 @@ -58028,7 +58112,7 @@ Domain to not audit.
39418 </param>
39419 <infoflow type="none"/>
39420 </interface>
39421 -<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="76771">
39422 +<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="76789">
39423 <summary>
39424 Relabel packets to servistaitsm_client the packet type.
39425 </summary>
39426 @@ -58038,7 +58122,7 @@ Domain allowed access.
39427 </summary>
39428 </param>
39429 </interface>
39430 -<interface name="corenet_send_servistaitsm_server_packets" lineno="76791">
39431 +<interface name="corenet_send_servistaitsm_server_packets" lineno="76809">
39432 <summary>
39433 Send servistaitsm_server packets.
39434 </summary>
39435 @@ -58049,7 +58133,7 @@ Domain allowed access.
39436 </param>
39437 <infoflow type="write" weight="10"/>
39438 </interface>
39439 -<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="76810">
39440 +<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="76828">
39441 <summary>
39442 Do not audit attempts to send servistaitsm_server packets.
39443 </summary>
39444 @@ -58060,7 +58144,7 @@ Domain to not audit.
39445 </param>
39446 <infoflow type="none"/>
39447 </interface>
39448 -<interface name="corenet_receive_servistaitsm_server_packets" lineno="76829">
39449 +<interface name="corenet_receive_servistaitsm_server_packets" lineno="76847">
39450 <summary>
39451 Receive servistaitsm_server packets.
39452 </summary>
39453 @@ -58071,7 +58155,7 @@ Domain allowed access.
39454 </param>
39455 <infoflow type="read" weight="10"/>
39456 </interface>
39457 -<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="76848">
39458 +<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="76866">
39459 <summary>
39460 Do not audit attempts to receive servistaitsm_server packets.
39461 </summary>
39462 @@ -58082,7 +58166,7 @@ Domain allowed access.
39463 </param>
39464 <infoflow type="none"/>
39465 </interface>
39466 -<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="76867">
39467 +<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="76885">
39468 <summary>
39469 Send and receive servistaitsm_server packets.
39470 </summary>
39471 @@ -58093,7 +58177,7 @@ Domain allowed access.
39472 </param>
39473 <infoflow type="both" weight="10"/>
39474 </interface>
39475 -<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="76883">
39476 +<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="76901">
39477 <summary>
39478 Do not audit attempts to send and receive servistaitsm_server packets.
39479 </summary>
39480 @@ -58104,7 +58188,7 @@ Domain to not audit.
39481 </param>
39482 <infoflow type="none"/>
39483 </interface>
39484 -<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="76898">
39485 +<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="76916">
39486 <summary>
39487 Relabel packets to servistaitsm_server the packet type.
39488 </summary>
39489 @@ -58114,7 +58198,7 @@ Domain allowed access.
39490 </summary>
39491 </param>
39492 </interface>
39493 -<interface name="corenet_tcp_sendrecv_sieve_port" lineno="76920">
39494 +<interface name="corenet_tcp_sendrecv_sieve_port" lineno="76938">
39495 <summary>
39496 Send and receive TCP traffic on the sieve port.
39497 </summary>
39498 @@ -58125,7 +58209,7 @@ Domain allowed access.
39499 </param>
39500 <infoflow type="both" weight="10"/>
39501 </interface>
39502 -<interface name="corenet_udp_send_sieve_port" lineno="76935">
39503 +<interface name="corenet_udp_send_sieve_port" lineno="76953">
39504 <summary>
39505 Send UDP traffic on the sieve port.
39506 </summary>
39507 @@ -58136,7 +58220,7 @@ Domain allowed access.
39508 </param>
39509 <infoflow type="write" weight="10"/>
39510 </interface>
39511 -<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="76950">
39512 +<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="76968">
39513 <summary>
39514 Do not audit attempts to send UDP traffic on the sieve port.
39515 </summary>
39516 @@ -58147,7 +58231,7 @@ Domain to not audit.
39517 </param>
39518 <infoflow type="none"/>
39519 </interface>
39520 -<interface name="corenet_udp_receive_sieve_port" lineno="76965">
39521 +<interface name="corenet_udp_receive_sieve_port" lineno="76983">
39522 <summary>
39523 Receive UDP traffic on the sieve port.
39524 </summary>
39525 @@ -58158,7 +58242,7 @@ Domain allowed access.
39526 </param>
39527 <infoflow type="read" weight="10"/>
39528 </interface>
39529 -<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="76980">
39530 +<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="76998">
39531 <summary>
39532 Do not audit attempts to receive UDP traffic on the sieve port.
39533 </summary>
39534 @@ -58169,7 +58253,7 @@ Domain to not audit.
39535 </param>
39536 <infoflow type="none"/>
39537 </interface>
39538 -<interface name="corenet_udp_sendrecv_sieve_port" lineno="76995">
39539 +<interface name="corenet_udp_sendrecv_sieve_port" lineno="77013">
39540 <summary>
39541 Send and receive UDP traffic on the sieve port.
39542 </summary>
39543 @@ -58180,7 +58264,7 @@ Domain allowed access.
39544 </param>
39545 <infoflow type="both" weight="10"/>
39546 </interface>
39547 -<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="77011">
39548 +<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="77029">
39549 <summary>
39550 Do not audit attempts to send and receive
39551 UDP traffic on the sieve port.
39552 @@ -58192,7 +58276,7 @@ Domain to not audit.
39553 </param>
39554 <infoflow type="none"/>
39555 </interface>
39556 -<interface name="corenet_tcp_bind_sieve_port" lineno="77026">
39557 +<interface name="corenet_tcp_bind_sieve_port" lineno="77044">
39558 <summary>
39559 Bind TCP sockets to the sieve port.
39560 </summary>
39561 @@ -58203,7 +58287,7 @@ Domain allowed access.
39562 </param>
39563 <infoflow type="none"/>
39564 </interface>
39565 -<interface name="corenet_udp_bind_sieve_port" lineno="77046">
39566 +<interface name="corenet_udp_bind_sieve_port" lineno="77064">
39567 <summary>
39568 Bind UDP sockets to the sieve port.
39569 </summary>
39570 @@ -58214,7 +58298,7 @@ Domain allowed access.
39571 </param>
39572 <infoflow type="none"/>
39573 </interface>
39574 -<interface name="corenet_tcp_connect_sieve_port" lineno="77065">
39575 +<interface name="corenet_tcp_connect_sieve_port" lineno="77083">
39576 <summary>
39577 Make a TCP connection to the sieve port.
39578 </summary>
39579 @@ -58224,7 +58308,7 @@ Domain allowed access.
39580 </summary>
39581 </param>
39582 </interface>
39583 -<interface name="corenet_send_sieve_client_packets" lineno="77085">
39584 +<interface name="corenet_send_sieve_client_packets" lineno="77103">
39585 <summary>
39586 Send sieve_client packets.
39587 </summary>
39588 @@ -58235,7 +58319,7 @@ Domain allowed access.
39589 </param>
39590 <infoflow type="write" weight="10"/>
39591 </interface>
39592 -<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="77104">
39593 +<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="77122">
39594 <summary>
39595 Do not audit attempts to send sieve_client packets.
39596 </summary>
39597 @@ -58246,7 +58330,7 @@ Domain to not audit.
39598 </param>
39599 <infoflow type="none"/>
39600 </interface>
39601 -<interface name="corenet_receive_sieve_client_packets" lineno="77123">
39602 +<interface name="corenet_receive_sieve_client_packets" lineno="77141">
39603 <summary>
39604 Receive sieve_client packets.
39605 </summary>
39606 @@ -58257,7 +58341,7 @@ Domain allowed access.
39607 </param>
39608 <infoflow type="read" weight="10"/>
39609 </interface>
39610 -<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="77142">
39611 +<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="77160">
39612 <summary>
39613 Do not audit attempts to receive sieve_client packets.
39614 </summary>
39615 @@ -58268,7 +58352,7 @@ Domain allowed access.
39616 </param>
39617 <infoflow type="none"/>
39618 </interface>
39619 -<interface name="corenet_sendrecv_sieve_client_packets" lineno="77161">
39620 +<interface name="corenet_sendrecv_sieve_client_packets" lineno="77179">
39621 <summary>
39622 Send and receive sieve_client packets.
39623 </summary>
39624 @@ -58279,7 +58363,7 @@ Domain allowed access.
39625 </param>
39626 <infoflow type="both" weight="10"/>
39627 </interface>
39628 -<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="77177">
39629 +<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="77195">
39630 <summary>
39631 Do not audit attempts to send and receive sieve_client packets.
39632 </summary>
39633 @@ -58290,7 +58374,7 @@ Domain to not audit.
39634 </param>
39635 <infoflow type="none"/>
39636 </interface>
39637 -<interface name="corenet_relabelto_sieve_client_packets" lineno="77192">
39638 +<interface name="corenet_relabelto_sieve_client_packets" lineno="77210">
39639 <summary>
39640 Relabel packets to sieve_client the packet type.
39641 </summary>
39642 @@ -58300,7 +58384,7 @@ Domain allowed access.
39643 </summary>
39644 </param>
39645 </interface>
39646 -<interface name="corenet_send_sieve_server_packets" lineno="77212">
39647 +<interface name="corenet_send_sieve_server_packets" lineno="77230">
39648 <summary>
39649 Send sieve_server packets.
39650 </summary>
39651 @@ -58311,7 +58395,7 @@ Domain allowed access.
39652 </param>
39653 <infoflow type="write" weight="10"/>
39654 </interface>
39655 -<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="77231">
39656 +<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="77249">
39657 <summary>
39658 Do not audit attempts to send sieve_server packets.
39659 </summary>
39660 @@ -58322,7 +58406,7 @@ Domain to not audit.
39661 </param>
39662 <infoflow type="none"/>
39663 </interface>
39664 -<interface name="corenet_receive_sieve_server_packets" lineno="77250">
39665 +<interface name="corenet_receive_sieve_server_packets" lineno="77268">
39666 <summary>
39667 Receive sieve_server packets.
39668 </summary>
39669 @@ -58333,7 +58417,7 @@ Domain allowed access.
39670 </param>
39671 <infoflow type="read" weight="10"/>
39672 </interface>
39673 -<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="77269">
39674 +<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="77287">
39675 <summary>
39676 Do not audit attempts to receive sieve_server packets.
39677 </summary>
39678 @@ -58344,7 +58428,7 @@ Domain allowed access.
39679 </param>
39680 <infoflow type="none"/>
39681 </interface>
39682 -<interface name="corenet_sendrecv_sieve_server_packets" lineno="77288">
39683 +<interface name="corenet_sendrecv_sieve_server_packets" lineno="77306">
39684 <summary>
39685 Send and receive sieve_server packets.
39686 </summary>
39687 @@ -58355,7 +58439,7 @@ Domain allowed access.
39688 </param>
39689 <infoflow type="both" weight="10"/>
39690 </interface>
39691 -<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="77304">
39692 +<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="77322">
39693 <summary>
39694 Do not audit attempts to send and receive sieve_server packets.
39695 </summary>
39696 @@ -58366,7 +58450,7 @@ Domain to not audit.
39697 </param>
39698 <infoflow type="none"/>
39699 </interface>
39700 -<interface name="corenet_relabelto_sieve_server_packets" lineno="77319">
39701 +<interface name="corenet_relabelto_sieve_server_packets" lineno="77337">
39702 <summary>
39703 Relabel packets to sieve_server the packet type.
39704 </summary>
39705 @@ -58376,7 +58460,7 @@ Domain allowed access.
39706 </summary>
39707 </param>
39708 </interface>
39709 -<interface name="corenet_tcp_sendrecv_sip_port" lineno="77341">
39710 +<interface name="corenet_tcp_sendrecv_sip_port" lineno="77359">
39711 <summary>
39712 Send and receive TCP traffic on the sip port.
39713 </summary>
39714 @@ -58387,7 +58471,7 @@ Domain allowed access.
39715 </param>
39716 <infoflow type="both" weight="10"/>
39717 </interface>
39718 -<interface name="corenet_udp_send_sip_port" lineno="77356">
39719 +<interface name="corenet_udp_send_sip_port" lineno="77374">
39720 <summary>
39721 Send UDP traffic on the sip port.
39722 </summary>
39723 @@ -58398,7 +58482,7 @@ Domain allowed access.
39724 </param>
39725 <infoflow type="write" weight="10"/>
39726 </interface>
39727 -<interface name="corenet_dontaudit_udp_send_sip_port" lineno="77371">
39728 +<interface name="corenet_dontaudit_udp_send_sip_port" lineno="77389">
39729 <summary>
39730 Do not audit attempts to send UDP traffic on the sip port.
39731 </summary>
39732 @@ -58409,7 +58493,7 @@ Domain to not audit.
39733 </param>
39734 <infoflow type="none"/>
39735 </interface>
39736 -<interface name="corenet_udp_receive_sip_port" lineno="77386">
39737 +<interface name="corenet_udp_receive_sip_port" lineno="77404">
39738 <summary>
39739 Receive UDP traffic on the sip port.
39740 </summary>
39741 @@ -58420,7 +58504,7 @@ Domain allowed access.
39742 </param>
39743 <infoflow type="read" weight="10"/>
39744 </interface>
39745 -<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="77401">
39746 +<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="77419">
39747 <summary>
39748 Do not audit attempts to receive UDP traffic on the sip port.
39749 </summary>
39750 @@ -58431,7 +58515,7 @@ Domain to not audit.
39751 </param>
39752 <infoflow type="none"/>
39753 </interface>
39754 -<interface name="corenet_udp_sendrecv_sip_port" lineno="77416">
39755 +<interface name="corenet_udp_sendrecv_sip_port" lineno="77434">
39756 <summary>
39757 Send and receive UDP traffic on the sip port.
39758 </summary>
39759 @@ -58442,7 +58526,7 @@ Domain allowed access.
39760 </param>
39761 <infoflow type="both" weight="10"/>
39762 </interface>
39763 -<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="77432">
39764 +<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="77450">
39765 <summary>
39766 Do not audit attempts to send and receive
39767 UDP traffic on the sip port.
39768 @@ -58454,7 +58538,7 @@ Domain to not audit.
39769 </param>
39770 <infoflow type="none"/>
39771 </interface>
39772 -<interface name="corenet_tcp_bind_sip_port" lineno="77447">
39773 +<interface name="corenet_tcp_bind_sip_port" lineno="77465">
39774 <summary>
39775 Bind TCP sockets to the sip port.
39776 </summary>
39777 @@ -58465,7 +58549,7 @@ Domain allowed access.
39778 </param>
39779 <infoflow type="none"/>
39780 </interface>
39781 -<interface name="corenet_udp_bind_sip_port" lineno="77467">
39782 +<interface name="corenet_udp_bind_sip_port" lineno="77485">
39783 <summary>
39784 Bind UDP sockets to the sip port.
39785 </summary>
39786 @@ -58476,7 +58560,7 @@ Domain allowed access.
39787 </param>
39788 <infoflow type="none"/>
39789 </interface>
39790 -<interface name="corenet_tcp_connect_sip_port" lineno="77486">
39791 +<interface name="corenet_tcp_connect_sip_port" lineno="77504">
39792 <summary>
39793 Make a TCP connection to the sip port.
39794 </summary>
39795 @@ -58486,7 +58570,7 @@ Domain allowed access.
39796 </summary>
39797 </param>
39798 </interface>
39799 -<interface name="corenet_send_sip_client_packets" lineno="77506">
39800 +<interface name="corenet_send_sip_client_packets" lineno="77524">
39801 <summary>
39802 Send sip_client packets.
39803 </summary>
39804 @@ -58497,7 +58581,7 @@ Domain allowed access.
39805 </param>
39806 <infoflow type="write" weight="10"/>
39807 </interface>
39808 -<interface name="corenet_dontaudit_send_sip_client_packets" lineno="77525">
39809 +<interface name="corenet_dontaudit_send_sip_client_packets" lineno="77543">
39810 <summary>
39811 Do not audit attempts to send sip_client packets.
39812 </summary>
39813 @@ -58508,7 +58592,7 @@ Domain to not audit.
39814 </param>
39815 <infoflow type="none"/>
39816 </interface>
39817 -<interface name="corenet_receive_sip_client_packets" lineno="77544">
39818 +<interface name="corenet_receive_sip_client_packets" lineno="77562">
39819 <summary>
39820 Receive sip_client packets.
39821 </summary>
39822 @@ -58519,7 +58603,7 @@ Domain allowed access.
39823 </param>
39824 <infoflow type="read" weight="10"/>
39825 </interface>
39826 -<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="77563">
39827 +<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="77581">
39828 <summary>
39829 Do not audit attempts to receive sip_client packets.
39830 </summary>
39831 @@ -58530,7 +58614,7 @@ Domain allowed access.
39832 </param>
39833 <infoflow type="none"/>
39834 </interface>
39835 -<interface name="corenet_sendrecv_sip_client_packets" lineno="77582">
39836 +<interface name="corenet_sendrecv_sip_client_packets" lineno="77600">
39837 <summary>
39838 Send and receive sip_client packets.
39839 </summary>
39840 @@ -58541,7 +58625,7 @@ Domain allowed access.
39841 </param>
39842 <infoflow type="both" weight="10"/>
39843 </interface>
39844 -<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="77598">
39845 +<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="77616">
39846 <summary>
39847 Do not audit attempts to send and receive sip_client packets.
39848 </summary>
39849 @@ -58552,7 +58636,7 @@ Domain to not audit.
39850 </param>
39851 <infoflow type="none"/>
39852 </interface>
39853 -<interface name="corenet_relabelto_sip_client_packets" lineno="77613">
39854 +<interface name="corenet_relabelto_sip_client_packets" lineno="77631">
39855 <summary>
39856 Relabel packets to sip_client the packet type.
39857 </summary>
39858 @@ -58562,7 +58646,7 @@ Domain allowed access.
39859 </summary>
39860 </param>
39861 </interface>
39862 -<interface name="corenet_send_sip_server_packets" lineno="77633">
39863 +<interface name="corenet_send_sip_server_packets" lineno="77651">
39864 <summary>
39865 Send sip_server packets.
39866 </summary>
39867 @@ -58573,7 +58657,7 @@ Domain allowed access.
39868 </param>
39869 <infoflow type="write" weight="10"/>
39870 </interface>
39871 -<interface name="corenet_dontaudit_send_sip_server_packets" lineno="77652">
39872 +<interface name="corenet_dontaudit_send_sip_server_packets" lineno="77670">
39873 <summary>
39874 Do not audit attempts to send sip_server packets.
39875 </summary>
39876 @@ -58584,7 +58668,7 @@ Domain to not audit.
39877 </param>
39878 <infoflow type="none"/>
39879 </interface>
39880 -<interface name="corenet_receive_sip_server_packets" lineno="77671">
39881 +<interface name="corenet_receive_sip_server_packets" lineno="77689">
39882 <summary>
39883 Receive sip_server packets.
39884 </summary>
39885 @@ -58595,7 +58679,7 @@ Domain allowed access.
39886 </param>
39887 <infoflow type="read" weight="10"/>
39888 </interface>
39889 -<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="77690">
39890 +<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="77708">
39891 <summary>
39892 Do not audit attempts to receive sip_server packets.
39893 </summary>
39894 @@ -58606,7 +58690,7 @@ Domain allowed access.
39895 </param>
39896 <infoflow type="none"/>
39897 </interface>
39898 -<interface name="corenet_sendrecv_sip_server_packets" lineno="77709">
39899 +<interface name="corenet_sendrecv_sip_server_packets" lineno="77727">
39900 <summary>
39901 Send and receive sip_server packets.
39902 </summary>
39903 @@ -58617,7 +58701,7 @@ Domain allowed access.
39904 </param>
39905 <infoflow type="both" weight="10"/>
39906 </interface>
39907 -<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="77725">
39908 +<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="77743">
39909 <summary>
39910 Do not audit attempts to send and receive sip_server packets.
39911 </summary>
39912 @@ -58628,7 +58712,7 @@ Domain to not audit.
39913 </param>
39914 <infoflow type="none"/>
39915 </interface>
39916 -<interface name="corenet_relabelto_sip_server_packets" lineno="77740">
39917 +<interface name="corenet_relabelto_sip_server_packets" lineno="77758">
39918 <summary>
39919 Relabel packets to sip_server the packet type.
39920 </summary>
39921 @@ -58638,7 +58722,7 @@ Domain allowed access.
39922 </summary>
39923 </param>
39924 </interface>
39925 -<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="77762">
39926 +<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="77780">
39927 <summary>
39928 Send and receive TCP traffic on the sixxsconfig port.
39929 </summary>
39930 @@ -58649,7 +58733,7 @@ Domain allowed access.
39931 </param>
39932 <infoflow type="both" weight="10"/>
39933 </interface>
39934 -<interface name="corenet_udp_send_sixxsconfig_port" lineno="77777">
39935 +<interface name="corenet_udp_send_sixxsconfig_port" lineno="77795">
39936 <summary>
39937 Send UDP traffic on the sixxsconfig port.
39938 </summary>
39939 @@ -58660,7 +58744,7 @@ Domain allowed access.
39940 </param>
39941 <infoflow type="write" weight="10"/>
39942 </interface>
39943 -<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="77792">
39944 +<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="77810">
39945 <summary>
39946 Do not audit attempts to send UDP traffic on the sixxsconfig port.
39947 </summary>
39948 @@ -58671,7 +58755,7 @@ Domain to not audit.
39949 </param>
39950 <infoflow type="none"/>
39951 </interface>
39952 -<interface name="corenet_udp_receive_sixxsconfig_port" lineno="77807">
39953 +<interface name="corenet_udp_receive_sixxsconfig_port" lineno="77825">
39954 <summary>
39955 Receive UDP traffic on the sixxsconfig port.
39956 </summary>
39957 @@ -58682,7 +58766,7 @@ Domain allowed access.
39958 </param>
39959 <infoflow type="read" weight="10"/>
39960 </interface>
39961 -<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="77822">
39962 +<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="77840">
39963 <summary>
39964 Do not audit attempts to receive UDP traffic on the sixxsconfig port.
39965 </summary>
39966 @@ -58693,7 +58777,7 @@ Domain to not audit.
39967 </param>
39968 <infoflow type="none"/>
39969 </interface>
39970 -<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="77837">
39971 +<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="77855">
39972 <summary>
39973 Send and receive UDP traffic on the sixxsconfig port.
39974 </summary>
39975 @@ -58704,7 +58788,7 @@ Domain allowed access.
39976 </param>
39977 <infoflow type="both" weight="10"/>
39978 </interface>
39979 -<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="77853">
39980 +<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="77871">
39981 <summary>
39982 Do not audit attempts to send and receive
39983 UDP traffic on the sixxsconfig port.
39984 @@ -58716,7 +58800,7 @@ Domain to not audit.
39985 </param>
39986 <infoflow type="none"/>
39987 </interface>
39988 -<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="77868">
39989 +<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="77886">
39990 <summary>
39991 Bind TCP sockets to the sixxsconfig port.
39992 </summary>
39993 @@ -58727,7 +58811,7 @@ Domain allowed access.
39994 </param>
39995 <infoflow type="none"/>
39996 </interface>
39997 -<interface name="corenet_udp_bind_sixxsconfig_port" lineno="77888">
39998 +<interface name="corenet_udp_bind_sixxsconfig_port" lineno="77906">
39999 <summary>
40000 Bind UDP sockets to the sixxsconfig port.
40001 </summary>
40002 @@ -58738,7 +58822,7 @@ Domain allowed access.
40003 </param>
40004 <infoflow type="none"/>
40005 </interface>
40006 -<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="77907">
40007 +<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="77925">
40008 <summary>
40009 Make a TCP connection to the sixxsconfig port.
40010 </summary>
40011 @@ -58748,7 +58832,7 @@ Domain allowed access.
40012 </summary>
40013 </param>
40014 </interface>
40015 -<interface name="corenet_send_sixxsconfig_client_packets" lineno="77927">
40016 +<interface name="corenet_send_sixxsconfig_client_packets" lineno="77945">
40017 <summary>
40018 Send sixxsconfig_client packets.
40019 </summary>
40020 @@ -58759,7 +58843,7 @@ Domain allowed access.
40021 </param>
40022 <infoflow type="write" weight="10"/>
40023 </interface>
40024 -<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="77946">
40025 +<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="77964">
40026 <summary>
40027 Do not audit attempts to send sixxsconfig_client packets.
40028 </summary>
40029 @@ -58770,7 +58854,7 @@ Domain to not audit.
40030 </param>
40031 <infoflow type="none"/>
40032 </interface>
40033 -<interface name="corenet_receive_sixxsconfig_client_packets" lineno="77965">
40034 +<interface name="corenet_receive_sixxsconfig_client_packets" lineno="77983">
40035 <summary>
40036 Receive sixxsconfig_client packets.
40037 </summary>
40038 @@ -58781,7 +58865,7 @@ Domain allowed access.
40039 </param>
40040 <infoflow type="read" weight="10"/>
40041 </interface>
40042 -<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="77984">
40043 +<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="78002">
40044 <summary>
40045 Do not audit attempts to receive sixxsconfig_client packets.
40046 </summary>
40047 @@ -58792,7 +58876,7 @@ Domain allowed access.
40048 </param>
40049 <infoflow type="none"/>
40050 </interface>
40051 -<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="78003">
40052 +<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="78021">
40053 <summary>
40054 Send and receive sixxsconfig_client packets.
40055 </summary>
40056 @@ -58803,7 +58887,7 @@ Domain allowed access.
40057 </param>
40058 <infoflow type="both" weight="10"/>
40059 </interface>
40060 -<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="78019">
40061 +<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="78037">
40062 <summary>
40063 Do not audit attempts to send and receive sixxsconfig_client packets.
40064 </summary>
40065 @@ -58814,7 +58898,7 @@ Domain to not audit.
40066 </param>
40067 <infoflow type="none"/>
40068 </interface>
40069 -<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="78034">
40070 +<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="78052">
40071 <summary>
40072 Relabel packets to sixxsconfig_client the packet type.
40073 </summary>
40074 @@ -58824,7 +58908,7 @@ Domain allowed access.
40075 </summary>
40076 </param>
40077 </interface>
40078 -<interface name="corenet_send_sixxsconfig_server_packets" lineno="78054">
40079 +<interface name="corenet_send_sixxsconfig_server_packets" lineno="78072">
40080 <summary>
40081 Send sixxsconfig_server packets.
40082 </summary>
40083 @@ -58835,7 +58919,7 @@ Domain allowed access.
40084 </param>
40085 <infoflow type="write" weight="10"/>
40086 </interface>
40087 -<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="78073">
40088 +<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="78091">
40089 <summary>
40090 Do not audit attempts to send sixxsconfig_server packets.
40091 </summary>
40092 @@ -58846,7 +58930,7 @@ Domain to not audit.
40093 </param>
40094 <infoflow type="none"/>
40095 </interface>
40096 -<interface name="corenet_receive_sixxsconfig_server_packets" lineno="78092">
40097 +<interface name="corenet_receive_sixxsconfig_server_packets" lineno="78110">
40098 <summary>
40099 Receive sixxsconfig_server packets.
40100 </summary>
40101 @@ -58857,7 +58941,7 @@ Domain allowed access.
40102 </param>
40103 <infoflow type="read" weight="10"/>
40104 </interface>
40105 -<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="78111">
40106 +<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="78129">
40107 <summary>
40108 Do not audit attempts to receive sixxsconfig_server packets.
40109 </summary>
40110 @@ -58868,7 +58952,7 @@ Domain allowed access.
40111 </param>
40112 <infoflow type="none"/>
40113 </interface>
40114 -<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="78130">
40115 +<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="78148">
40116 <summary>
40117 Send and receive sixxsconfig_server packets.
40118 </summary>
40119 @@ -58879,7 +58963,7 @@ Domain allowed access.
40120 </param>
40121 <infoflow type="both" weight="10"/>
40122 </interface>
40123 -<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="78146">
40124 +<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="78164">
40125 <summary>
40126 Do not audit attempts to send and receive sixxsconfig_server packets.
40127 </summary>
40128 @@ -58890,7 +58974,7 @@ Domain to not audit.
40129 </param>
40130 <infoflow type="none"/>
40131 </interface>
40132 -<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="78161">
40133 +<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="78179">
40134 <summary>
40135 Relabel packets to sixxsconfig_server the packet type.
40136 </summary>
40137 @@ -58900,7 +58984,7 @@ Domain allowed access.
40138 </summary>
40139 </param>
40140 </interface>
40141 -<interface name="corenet_tcp_sendrecv_smbd_port" lineno="78183">
40142 +<interface name="corenet_tcp_sendrecv_smbd_port" lineno="78201">
40143 <summary>
40144 Send and receive TCP traffic on the smbd port.
40145 </summary>
40146 @@ -58911,7 +58995,7 @@ Domain allowed access.
40147 </param>
40148 <infoflow type="both" weight="10"/>
40149 </interface>
40150 -<interface name="corenet_udp_send_smbd_port" lineno="78198">
40151 +<interface name="corenet_udp_send_smbd_port" lineno="78216">
40152 <summary>
40153 Send UDP traffic on the smbd port.
40154 </summary>
40155 @@ -58922,7 +59006,7 @@ Domain allowed access.
40156 </param>
40157 <infoflow type="write" weight="10"/>
40158 </interface>
40159 -<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="78213">
40160 +<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="78231">
40161 <summary>
40162 Do not audit attempts to send UDP traffic on the smbd port.
40163 </summary>
40164 @@ -58933,7 +59017,7 @@ Domain to not audit.
40165 </param>
40166 <infoflow type="none"/>
40167 </interface>
40168 -<interface name="corenet_udp_receive_smbd_port" lineno="78228">
40169 +<interface name="corenet_udp_receive_smbd_port" lineno="78246">
40170 <summary>
40171 Receive UDP traffic on the smbd port.
40172 </summary>
40173 @@ -58944,7 +59028,7 @@ Domain allowed access.
40174 </param>
40175 <infoflow type="read" weight="10"/>
40176 </interface>
40177 -<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="78243">
40178 +<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="78261">
40179 <summary>
40180 Do not audit attempts to receive UDP traffic on the smbd port.
40181 </summary>
40182 @@ -58955,7 +59039,7 @@ Domain to not audit.
40183 </param>
40184 <infoflow type="none"/>
40185 </interface>
40186 -<interface name="corenet_udp_sendrecv_smbd_port" lineno="78258">
40187 +<interface name="corenet_udp_sendrecv_smbd_port" lineno="78276">
40188 <summary>
40189 Send and receive UDP traffic on the smbd port.
40190 </summary>
40191 @@ -58966,7 +59050,7 @@ Domain allowed access.
40192 </param>
40193 <infoflow type="both" weight="10"/>
40194 </interface>
40195 -<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="78274">
40196 +<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="78292">
40197 <summary>
40198 Do not audit attempts to send and receive
40199 UDP traffic on the smbd port.
40200 @@ -58978,7 +59062,7 @@ Domain to not audit.
40201 </param>
40202 <infoflow type="none"/>
40203 </interface>
40204 -<interface name="corenet_tcp_bind_smbd_port" lineno="78289">
40205 +<interface name="corenet_tcp_bind_smbd_port" lineno="78307">
40206 <summary>
40207 Bind TCP sockets to the smbd port.
40208 </summary>
40209 @@ -58989,7 +59073,7 @@ Domain allowed access.
40210 </param>
40211 <infoflow type="none"/>
40212 </interface>
40213 -<interface name="corenet_udp_bind_smbd_port" lineno="78309">
40214 +<interface name="corenet_udp_bind_smbd_port" lineno="78327">
40215 <summary>
40216 Bind UDP sockets to the smbd port.
40217 </summary>
40218 @@ -59000,7 +59084,7 @@ Domain allowed access.
40219 </param>
40220 <infoflow type="none"/>
40221 </interface>
40222 -<interface name="corenet_tcp_connect_smbd_port" lineno="78328">
40223 +<interface name="corenet_tcp_connect_smbd_port" lineno="78346">
40224 <summary>
40225 Make a TCP connection to the smbd port.
40226 </summary>
40227 @@ -59010,7 +59094,7 @@ Domain allowed access.
40228 </summary>
40229 </param>
40230 </interface>
40231 -<interface name="corenet_send_smbd_client_packets" lineno="78348">
40232 +<interface name="corenet_send_smbd_client_packets" lineno="78366">
40233 <summary>
40234 Send smbd_client packets.
40235 </summary>
40236 @@ -59021,7 +59105,7 @@ Domain allowed access.
40237 </param>
40238 <infoflow type="write" weight="10"/>
40239 </interface>
40240 -<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="78367">
40241 +<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="78385">
40242 <summary>
40243 Do not audit attempts to send smbd_client packets.
40244 </summary>
40245 @@ -59032,7 +59116,7 @@ Domain to not audit.
40246 </param>
40247 <infoflow type="none"/>
40248 </interface>
40249 -<interface name="corenet_receive_smbd_client_packets" lineno="78386">
40250 +<interface name="corenet_receive_smbd_client_packets" lineno="78404">
40251 <summary>
40252 Receive smbd_client packets.
40253 </summary>
40254 @@ -59043,7 +59127,7 @@ Domain allowed access.
40255 </param>
40256 <infoflow type="read" weight="10"/>
40257 </interface>
40258 -<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="78405">
40259 +<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="78423">
40260 <summary>
40261 Do not audit attempts to receive smbd_client packets.
40262 </summary>
40263 @@ -59054,7 +59138,7 @@ Domain allowed access.
40264 </param>
40265 <infoflow type="none"/>
40266 </interface>
40267 -<interface name="corenet_sendrecv_smbd_client_packets" lineno="78424">
40268 +<interface name="corenet_sendrecv_smbd_client_packets" lineno="78442">
40269 <summary>
40270 Send and receive smbd_client packets.
40271 </summary>
40272 @@ -59065,7 +59149,7 @@ Domain allowed access.
40273 </param>
40274 <infoflow type="both" weight="10"/>
40275 </interface>
40276 -<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="78440">
40277 +<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="78458">
40278 <summary>
40279 Do not audit attempts to send and receive smbd_client packets.
40280 </summary>
40281 @@ -59076,7 +59160,7 @@ Domain to not audit.
40282 </param>
40283 <infoflow type="none"/>
40284 </interface>
40285 -<interface name="corenet_relabelto_smbd_client_packets" lineno="78455">
40286 +<interface name="corenet_relabelto_smbd_client_packets" lineno="78473">
40287 <summary>
40288 Relabel packets to smbd_client the packet type.
40289 </summary>
40290 @@ -59086,7 +59170,7 @@ Domain allowed access.
40291 </summary>
40292 </param>
40293 </interface>
40294 -<interface name="corenet_send_smbd_server_packets" lineno="78475">
40295 +<interface name="corenet_send_smbd_server_packets" lineno="78493">
40296 <summary>
40297 Send smbd_server packets.
40298 </summary>
40299 @@ -59097,7 +59181,7 @@ Domain allowed access.
40300 </param>
40301 <infoflow type="write" weight="10"/>
40302 </interface>
40303 -<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="78494">
40304 +<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="78512">
40305 <summary>
40306 Do not audit attempts to send smbd_server packets.
40307 </summary>
40308 @@ -59108,7 +59192,7 @@ Domain to not audit.
40309 </param>
40310 <infoflow type="none"/>
40311 </interface>
40312 -<interface name="corenet_receive_smbd_server_packets" lineno="78513">
40313 +<interface name="corenet_receive_smbd_server_packets" lineno="78531">
40314 <summary>
40315 Receive smbd_server packets.
40316 </summary>
40317 @@ -59119,7 +59203,7 @@ Domain allowed access.
40318 </param>
40319 <infoflow type="read" weight="10"/>
40320 </interface>
40321 -<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="78532">
40322 +<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="78550">
40323 <summary>
40324 Do not audit attempts to receive smbd_server packets.
40325 </summary>
40326 @@ -59130,7 +59214,7 @@ Domain allowed access.
40327 </param>
40328 <infoflow type="none"/>
40329 </interface>
40330 -<interface name="corenet_sendrecv_smbd_server_packets" lineno="78551">
40331 +<interface name="corenet_sendrecv_smbd_server_packets" lineno="78569">
40332 <summary>
40333 Send and receive smbd_server packets.
40334 </summary>
40335 @@ -59141,7 +59225,7 @@ Domain allowed access.
40336 </param>
40337 <infoflow type="both" weight="10"/>
40338 </interface>
40339 -<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="78567">
40340 +<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="78585">
40341 <summary>
40342 Do not audit attempts to send and receive smbd_server packets.
40343 </summary>
40344 @@ -59152,7 +59236,7 @@ Domain to not audit.
40345 </param>
40346 <infoflow type="none"/>
40347 </interface>
40348 -<interface name="corenet_relabelto_smbd_server_packets" lineno="78582">
40349 +<interface name="corenet_relabelto_smbd_server_packets" lineno="78600">
40350 <summary>
40351 Relabel packets to smbd_server the packet type.
40352 </summary>
40353 @@ -59162,7 +59246,7 @@ Domain allowed access.
40354 </summary>
40355 </param>
40356 </interface>
40357 -<interface name="corenet_tcp_sendrecv_smtp_port" lineno="78604">
40358 +<interface name="corenet_tcp_sendrecv_smtp_port" lineno="78622">
40359 <summary>
40360 Send and receive TCP traffic on the smtp port.
40361 </summary>
40362 @@ -59173,7 +59257,7 @@ Domain allowed access.
40363 </param>
40364 <infoflow type="both" weight="10"/>
40365 </interface>
40366 -<interface name="corenet_udp_send_smtp_port" lineno="78619">
40367 +<interface name="corenet_udp_send_smtp_port" lineno="78637">
40368 <summary>
40369 Send UDP traffic on the smtp port.
40370 </summary>
40371 @@ -59184,7 +59268,7 @@ Domain allowed access.
40372 </param>
40373 <infoflow type="write" weight="10"/>
40374 </interface>
40375 -<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="78634">
40376 +<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="78652">
40377 <summary>
40378 Do not audit attempts to send UDP traffic on the smtp port.
40379 </summary>
40380 @@ -59195,7 +59279,7 @@ Domain to not audit.
40381 </param>
40382 <infoflow type="none"/>
40383 </interface>
40384 -<interface name="corenet_udp_receive_smtp_port" lineno="78649">
40385 +<interface name="corenet_udp_receive_smtp_port" lineno="78667">
40386 <summary>
40387 Receive UDP traffic on the smtp port.
40388 </summary>
40389 @@ -59206,7 +59290,7 @@ Domain allowed access.
40390 </param>
40391 <infoflow type="read" weight="10"/>
40392 </interface>
40393 -<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="78664">
40394 +<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="78682">
40395 <summary>
40396 Do not audit attempts to receive UDP traffic on the smtp port.
40397 </summary>
40398 @@ -59217,7 +59301,7 @@ Domain to not audit.
40399 </param>
40400 <infoflow type="none"/>
40401 </interface>
40402 -<interface name="corenet_udp_sendrecv_smtp_port" lineno="78679">
40403 +<interface name="corenet_udp_sendrecv_smtp_port" lineno="78697">
40404 <summary>
40405 Send and receive UDP traffic on the smtp port.
40406 </summary>
40407 @@ -59228,7 +59312,7 @@ Domain allowed access.
40408 </param>
40409 <infoflow type="both" weight="10"/>
40410 </interface>
40411 -<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="78695">
40412 +<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="78713">
40413 <summary>
40414 Do not audit attempts to send and receive
40415 UDP traffic on the smtp port.
40416 @@ -59240,7 +59324,7 @@ Domain to not audit.
40417 </param>
40418 <infoflow type="none"/>
40419 </interface>
40420 -<interface name="corenet_tcp_bind_smtp_port" lineno="78710">
40421 +<interface name="corenet_tcp_bind_smtp_port" lineno="78728">
40422 <summary>
40423 Bind TCP sockets to the smtp port.
40424 </summary>
40425 @@ -59251,7 +59335,7 @@ Domain allowed access.
40426 </param>
40427 <infoflow type="none"/>
40428 </interface>
40429 -<interface name="corenet_udp_bind_smtp_port" lineno="78730">
40430 +<interface name="corenet_udp_bind_smtp_port" lineno="78748">
40431 <summary>
40432 Bind UDP sockets to the smtp port.
40433 </summary>
40434 @@ -59262,7 +59346,7 @@ Domain allowed access.
40435 </param>
40436 <infoflow type="none"/>
40437 </interface>
40438 -<interface name="corenet_tcp_connect_smtp_port" lineno="78749">
40439 +<interface name="corenet_tcp_connect_smtp_port" lineno="78767">
40440 <summary>
40441 Make a TCP connection to the smtp port.
40442 </summary>
40443 @@ -59272,7 +59356,7 @@ Domain allowed access.
40444 </summary>
40445 </param>
40446 </interface>
40447 -<interface name="corenet_send_smtp_client_packets" lineno="78769">
40448 +<interface name="corenet_send_smtp_client_packets" lineno="78787">
40449 <summary>
40450 Send smtp_client packets.
40451 </summary>
40452 @@ -59283,7 +59367,7 @@ Domain allowed access.
40453 </param>
40454 <infoflow type="write" weight="10"/>
40455 </interface>
40456 -<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="78788">
40457 +<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="78806">
40458 <summary>
40459 Do not audit attempts to send smtp_client packets.
40460 </summary>
40461 @@ -59294,7 +59378,7 @@ Domain to not audit.
40462 </param>
40463 <infoflow type="none"/>
40464 </interface>
40465 -<interface name="corenet_receive_smtp_client_packets" lineno="78807">
40466 +<interface name="corenet_receive_smtp_client_packets" lineno="78825">
40467 <summary>
40468 Receive smtp_client packets.
40469 </summary>
40470 @@ -59305,7 +59389,7 @@ Domain allowed access.
40471 </param>
40472 <infoflow type="read" weight="10"/>
40473 </interface>
40474 -<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="78826">
40475 +<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="78844">
40476 <summary>
40477 Do not audit attempts to receive smtp_client packets.
40478 </summary>
40479 @@ -59316,7 +59400,7 @@ Domain allowed access.
40480 </param>
40481 <infoflow type="none"/>
40482 </interface>
40483 -<interface name="corenet_sendrecv_smtp_client_packets" lineno="78845">
40484 +<interface name="corenet_sendrecv_smtp_client_packets" lineno="78863">
40485 <summary>
40486 Send and receive smtp_client packets.
40487 </summary>
40488 @@ -59327,7 +59411,7 @@ Domain allowed access.
40489 </param>
40490 <infoflow type="both" weight="10"/>
40491 </interface>
40492 -<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="78861">
40493 +<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="78879">
40494 <summary>
40495 Do not audit attempts to send and receive smtp_client packets.
40496 </summary>
40497 @@ -59338,7 +59422,7 @@ Domain to not audit.
40498 </param>
40499 <infoflow type="none"/>
40500 </interface>
40501 -<interface name="corenet_relabelto_smtp_client_packets" lineno="78876">
40502 +<interface name="corenet_relabelto_smtp_client_packets" lineno="78894">
40503 <summary>
40504 Relabel packets to smtp_client the packet type.
40505 </summary>
40506 @@ -59348,7 +59432,7 @@ Domain allowed access.
40507 </summary>
40508 </param>
40509 </interface>
40510 -<interface name="corenet_send_smtp_server_packets" lineno="78896">
40511 +<interface name="corenet_send_smtp_server_packets" lineno="78914">
40512 <summary>
40513 Send smtp_server packets.
40514 </summary>
40515 @@ -59359,7 +59443,7 @@ Domain allowed access.
40516 </param>
40517 <infoflow type="write" weight="10"/>
40518 </interface>
40519 -<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="78915">
40520 +<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="78933">
40521 <summary>
40522 Do not audit attempts to send smtp_server packets.
40523 </summary>
40524 @@ -59370,7 +59454,7 @@ Domain to not audit.
40525 </param>
40526 <infoflow type="none"/>
40527 </interface>
40528 -<interface name="corenet_receive_smtp_server_packets" lineno="78934">
40529 +<interface name="corenet_receive_smtp_server_packets" lineno="78952">
40530 <summary>
40531 Receive smtp_server packets.
40532 </summary>
40533 @@ -59381,7 +59465,7 @@ Domain allowed access.
40534 </param>
40535 <infoflow type="read" weight="10"/>
40536 </interface>
40537 -<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="78953">
40538 +<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="78971">
40539 <summary>
40540 Do not audit attempts to receive smtp_server packets.
40541 </summary>
40542 @@ -59392,7 +59476,7 @@ Domain allowed access.
40543 </param>
40544 <infoflow type="none"/>
40545 </interface>
40546 -<interface name="corenet_sendrecv_smtp_server_packets" lineno="78972">
40547 +<interface name="corenet_sendrecv_smtp_server_packets" lineno="78990">
40548 <summary>
40549 Send and receive smtp_server packets.
40550 </summary>
40551 @@ -59403,7 +59487,7 @@ Domain allowed access.
40552 </param>
40553 <infoflow type="both" weight="10"/>
40554 </interface>
40555 -<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="78988">
40556 +<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="79006">
40557 <summary>
40558 Do not audit attempts to send and receive smtp_server packets.
40559 </summary>
40560 @@ -59414,7 +59498,7 @@ Domain to not audit.
40561 </param>
40562 <infoflow type="none"/>
40563 </interface>
40564 -<interface name="corenet_relabelto_smtp_server_packets" lineno="79003">
40565 +<interface name="corenet_relabelto_smtp_server_packets" lineno="79021">
40566 <summary>
40567 Relabel packets to smtp_server the packet type.
40568 </summary>
40569 @@ -59424,7 +59508,7 @@ Domain allowed access.
40570 </summary>
40571 </param>
40572 </interface>
40573 -<interface name="corenet_tcp_sendrecv_snmp_port" lineno="79025">
40574 +<interface name="corenet_tcp_sendrecv_snmp_port" lineno="79043">
40575 <summary>
40576 Send and receive TCP traffic on the snmp port.
40577 </summary>
40578 @@ -59435,7 +59519,7 @@ Domain allowed access.
40579 </param>
40580 <infoflow type="both" weight="10"/>
40581 </interface>
40582 -<interface name="corenet_udp_send_snmp_port" lineno="79040">
40583 +<interface name="corenet_udp_send_snmp_port" lineno="79058">
40584 <summary>
40585 Send UDP traffic on the snmp port.
40586 </summary>
40587 @@ -59446,7 +59530,7 @@ Domain allowed access.
40588 </param>
40589 <infoflow type="write" weight="10"/>
40590 </interface>
40591 -<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="79055">
40592 +<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="79073">
40593 <summary>
40594 Do not audit attempts to send UDP traffic on the snmp port.
40595 </summary>
40596 @@ -59457,7 +59541,7 @@ Domain to not audit.
40597 </param>
40598 <infoflow type="none"/>
40599 </interface>
40600 -<interface name="corenet_udp_receive_snmp_port" lineno="79070">
40601 +<interface name="corenet_udp_receive_snmp_port" lineno="79088">
40602 <summary>
40603 Receive UDP traffic on the snmp port.
40604 </summary>
40605 @@ -59468,7 +59552,7 @@ Domain allowed access.
40606 </param>
40607 <infoflow type="read" weight="10"/>
40608 </interface>
40609 -<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="79085">
40610 +<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="79103">
40611 <summary>
40612 Do not audit attempts to receive UDP traffic on the snmp port.
40613 </summary>
40614 @@ -59479,7 +59563,7 @@ Domain to not audit.
40615 </param>
40616 <infoflow type="none"/>
40617 </interface>
40618 -<interface name="corenet_udp_sendrecv_snmp_port" lineno="79100">
40619 +<interface name="corenet_udp_sendrecv_snmp_port" lineno="79118">
40620 <summary>
40621 Send and receive UDP traffic on the snmp port.
40622 </summary>
40623 @@ -59490,7 +59574,7 @@ Domain allowed access.
40624 </param>
40625 <infoflow type="both" weight="10"/>
40626 </interface>
40627 -<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="79116">
40628 +<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="79134">
40629 <summary>
40630 Do not audit attempts to send and receive
40631 UDP traffic on the snmp port.
40632 @@ -59502,7 +59586,7 @@ Domain to not audit.
40633 </param>
40634 <infoflow type="none"/>
40635 </interface>
40636 -<interface name="corenet_tcp_bind_snmp_port" lineno="79131">
40637 +<interface name="corenet_tcp_bind_snmp_port" lineno="79149">
40638 <summary>
40639 Bind TCP sockets to the snmp port.
40640 </summary>
40641 @@ -59513,7 +59597,7 @@ Domain allowed access.
40642 </param>
40643 <infoflow type="none"/>
40644 </interface>
40645 -<interface name="corenet_udp_bind_snmp_port" lineno="79151">
40646 +<interface name="corenet_udp_bind_snmp_port" lineno="79169">
40647 <summary>
40648 Bind UDP sockets to the snmp port.
40649 </summary>
40650 @@ -59524,7 +59608,7 @@ Domain allowed access.
40651 </param>
40652 <infoflow type="none"/>
40653 </interface>
40654 -<interface name="corenet_tcp_connect_snmp_port" lineno="79170">
40655 +<interface name="corenet_tcp_connect_snmp_port" lineno="79188">
40656 <summary>
40657 Make a TCP connection to the snmp port.
40658 </summary>
40659 @@ -59534,7 +59618,7 @@ Domain allowed access.
40660 </summary>
40661 </param>
40662 </interface>
40663 -<interface name="corenet_send_snmp_client_packets" lineno="79190">
40664 +<interface name="corenet_send_snmp_client_packets" lineno="79208">
40665 <summary>
40666 Send snmp_client packets.
40667 </summary>
40668 @@ -59545,7 +59629,7 @@ Domain allowed access.
40669 </param>
40670 <infoflow type="write" weight="10"/>
40671 </interface>
40672 -<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="79209">
40673 +<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="79227">
40674 <summary>
40675 Do not audit attempts to send snmp_client packets.
40676 </summary>
40677 @@ -59556,7 +59640,7 @@ Domain to not audit.
40678 </param>
40679 <infoflow type="none"/>
40680 </interface>
40681 -<interface name="corenet_receive_snmp_client_packets" lineno="79228">
40682 +<interface name="corenet_receive_snmp_client_packets" lineno="79246">
40683 <summary>
40684 Receive snmp_client packets.
40685 </summary>
40686 @@ -59567,7 +59651,7 @@ Domain allowed access.
40687 </param>
40688 <infoflow type="read" weight="10"/>
40689 </interface>
40690 -<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="79247">
40691 +<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="79265">
40692 <summary>
40693 Do not audit attempts to receive snmp_client packets.
40694 </summary>
40695 @@ -59578,7 +59662,7 @@ Domain allowed access.
40696 </param>
40697 <infoflow type="none"/>
40698 </interface>
40699 -<interface name="corenet_sendrecv_snmp_client_packets" lineno="79266">
40700 +<interface name="corenet_sendrecv_snmp_client_packets" lineno="79284">
40701 <summary>
40702 Send and receive snmp_client packets.
40703 </summary>
40704 @@ -59589,7 +59673,7 @@ Domain allowed access.
40705 </param>
40706 <infoflow type="both" weight="10"/>
40707 </interface>
40708 -<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="79282">
40709 +<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="79300">
40710 <summary>
40711 Do not audit attempts to send and receive snmp_client packets.
40712 </summary>
40713 @@ -59600,7 +59684,7 @@ Domain to not audit.
40714 </param>
40715 <infoflow type="none"/>
40716 </interface>
40717 -<interface name="corenet_relabelto_snmp_client_packets" lineno="79297">
40718 +<interface name="corenet_relabelto_snmp_client_packets" lineno="79315">
40719 <summary>
40720 Relabel packets to snmp_client the packet type.
40721 </summary>
40722 @@ -59610,7 +59694,7 @@ Domain allowed access.
40723 </summary>
40724 </param>
40725 </interface>
40726 -<interface name="corenet_send_snmp_server_packets" lineno="79317">
40727 +<interface name="corenet_send_snmp_server_packets" lineno="79335">
40728 <summary>
40729 Send snmp_server packets.
40730 </summary>
40731 @@ -59621,7 +59705,7 @@ Domain allowed access.
40732 </param>
40733 <infoflow type="write" weight="10"/>
40734 </interface>
40735 -<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="79336">
40736 +<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="79354">
40737 <summary>
40738 Do not audit attempts to send snmp_server packets.
40739 </summary>
40740 @@ -59632,7 +59716,7 @@ Domain to not audit.
40741 </param>
40742 <infoflow type="none"/>
40743 </interface>
40744 -<interface name="corenet_receive_snmp_server_packets" lineno="79355">
40745 +<interface name="corenet_receive_snmp_server_packets" lineno="79373">
40746 <summary>
40747 Receive snmp_server packets.
40748 </summary>
40749 @@ -59643,7 +59727,7 @@ Domain allowed access.
40750 </param>
40751 <infoflow type="read" weight="10"/>
40752 </interface>
40753 -<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="79374">
40754 +<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="79392">
40755 <summary>
40756 Do not audit attempts to receive snmp_server packets.
40757 </summary>
40758 @@ -59654,7 +59738,7 @@ Domain allowed access.
40759 </param>
40760 <infoflow type="none"/>
40761 </interface>
40762 -<interface name="corenet_sendrecv_snmp_server_packets" lineno="79393">
40763 +<interface name="corenet_sendrecv_snmp_server_packets" lineno="79411">
40764 <summary>
40765 Send and receive snmp_server packets.
40766 </summary>
40767 @@ -59665,7 +59749,7 @@ Domain allowed access.
40768 </param>
40769 <infoflow type="both" weight="10"/>
40770 </interface>
40771 -<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="79409">
40772 +<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="79427">
40773 <summary>
40774 Do not audit attempts to send and receive snmp_server packets.
40775 </summary>
40776 @@ -59676,7 +59760,7 @@ Domain to not audit.
40777 </param>
40778 <infoflow type="none"/>
40779 </interface>
40780 -<interface name="corenet_relabelto_snmp_server_packets" lineno="79424">
40781 +<interface name="corenet_relabelto_snmp_server_packets" lineno="79442">
40782 <summary>
40783 Relabel packets to snmp_server the packet type.
40784 </summary>
40785 @@ -59686,7 +59770,7 @@ Domain allowed access.
40786 </summary>
40787 </param>
40788 </interface>
40789 -<interface name="corenet_tcp_sendrecv_socks_port" lineno="79446">
40790 +<interface name="corenet_tcp_sendrecv_socks_port" lineno="79464">
40791 <summary>
40792 Send and receive TCP traffic on the socks port.
40793 </summary>
40794 @@ -59697,7 +59781,7 @@ Domain allowed access.
40795 </param>
40796 <infoflow type="both" weight="10"/>
40797 </interface>
40798 -<interface name="corenet_udp_send_socks_port" lineno="79461">
40799 +<interface name="corenet_udp_send_socks_port" lineno="79479">
40800 <summary>
40801 Send UDP traffic on the socks port.
40802 </summary>
40803 @@ -59708,7 +59792,7 @@ Domain allowed access.
40804 </param>
40805 <infoflow type="write" weight="10"/>
40806 </interface>
40807 -<interface name="corenet_dontaudit_udp_send_socks_port" lineno="79476">
40808 +<interface name="corenet_dontaudit_udp_send_socks_port" lineno="79494">
40809 <summary>
40810 Do not audit attempts to send UDP traffic on the socks port.
40811 </summary>
40812 @@ -59719,7 +59803,7 @@ Domain to not audit.
40813 </param>
40814 <infoflow type="none"/>
40815 </interface>
40816 -<interface name="corenet_udp_receive_socks_port" lineno="79491">
40817 +<interface name="corenet_udp_receive_socks_port" lineno="79509">
40818 <summary>
40819 Receive UDP traffic on the socks port.
40820 </summary>
40821 @@ -59730,7 +59814,7 @@ Domain allowed access.
40822 </param>
40823 <infoflow type="read" weight="10"/>
40824 </interface>
40825 -<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="79506">
40826 +<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="79524">
40827 <summary>
40828 Do not audit attempts to receive UDP traffic on the socks port.
40829 </summary>
40830 @@ -59741,7 +59825,7 @@ Domain to not audit.
40831 </param>
40832 <infoflow type="none"/>
40833 </interface>
40834 -<interface name="corenet_udp_sendrecv_socks_port" lineno="79521">
40835 +<interface name="corenet_udp_sendrecv_socks_port" lineno="79539">
40836 <summary>
40837 Send and receive UDP traffic on the socks port.
40838 </summary>
40839 @@ -59752,7 +59836,7 @@ Domain allowed access.
40840 </param>
40841 <infoflow type="both" weight="10"/>
40842 </interface>
40843 -<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="79537">
40844 +<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="79555">
40845 <summary>
40846 Do not audit attempts to send and receive
40847 UDP traffic on the socks port.
40848 @@ -59764,7 +59848,7 @@ Domain to not audit.
40849 </param>
40850 <infoflow type="none"/>
40851 </interface>
40852 -<interface name="corenet_tcp_bind_socks_port" lineno="79552">
40853 +<interface name="corenet_tcp_bind_socks_port" lineno="79570">
40854 <summary>
40855 Bind TCP sockets to the socks port.
40856 </summary>
40857 @@ -59775,7 +59859,7 @@ Domain allowed access.
40858 </param>
40859 <infoflow type="none"/>
40860 </interface>
40861 -<interface name="corenet_udp_bind_socks_port" lineno="79572">
40862 +<interface name="corenet_udp_bind_socks_port" lineno="79590">
40863 <summary>
40864 Bind UDP sockets to the socks port.
40865 </summary>
40866 @@ -59786,7 +59870,7 @@ Domain allowed access.
40867 </param>
40868 <infoflow type="none"/>
40869 </interface>
40870 -<interface name="corenet_tcp_connect_socks_port" lineno="79591">
40871 +<interface name="corenet_tcp_connect_socks_port" lineno="79609">
40872 <summary>
40873 Make a TCP connection to the socks port.
40874 </summary>
40875 @@ -59796,7 +59880,7 @@ Domain allowed access.
40876 </summary>
40877 </param>
40878 </interface>
40879 -<interface name="corenet_send_socks_client_packets" lineno="79611">
40880 +<interface name="corenet_send_socks_client_packets" lineno="79629">
40881 <summary>
40882 Send socks_client packets.
40883 </summary>
40884 @@ -59807,7 +59891,7 @@ Domain allowed access.
40885 </param>
40886 <infoflow type="write" weight="10"/>
40887 </interface>
40888 -<interface name="corenet_dontaudit_send_socks_client_packets" lineno="79630">
40889 +<interface name="corenet_dontaudit_send_socks_client_packets" lineno="79648">
40890 <summary>
40891 Do not audit attempts to send socks_client packets.
40892 </summary>
40893 @@ -59818,7 +59902,7 @@ Domain to not audit.
40894 </param>
40895 <infoflow type="none"/>
40896 </interface>
40897 -<interface name="corenet_receive_socks_client_packets" lineno="79649">
40898 +<interface name="corenet_receive_socks_client_packets" lineno="79667">
40899 <summary>
40900 Receive socks_client packets.
40901 </summary>
40902 @@ -59829,7 +59913,7 @@ Domain allowed access.
40903 </param>
40904 <infoflow type="read" weight="10"/>
40905 </interface>
40906 -<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="79668">
40907 +<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="79686">
40908 <summary>
40909 Do not audit attempts to receive socks_client packets.
40910 </summary>
40911 @@ -59840,7 +59924,7 @@ Domain allowed access.
40912 </param>
40913 <infoflow type="none"/>
40914 </interface>
40915 -<interface name="corenet_sendrecv_socks_client_packets" lineno="79687">
40916 +<interface name="corenet_sendrecv_socks_client_packets" lineno="79705">
40917 <summary>
40918 Send and receive socks_client packets.
40919 </summary>
40920 @@ -59851,7 +59935,7 @@ Domain allowed access.
40921 </param>
40922 <infoflow type="both" weight="10"/>
40923 </interface>
40924 -<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="79703">
40925 +<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="79721">
40926 <summary>
40927 Do not audit attempts to send and receive socks_client packets.
40928 </summary>
40929 @@ -59862,7 +59946,7 @@ Domain to not audit.
40930 </param>
40931 <infoflow type="none"/>
40932 </interface>
40933 -<interface name="corenet_relabelto_socks_client_packets" lineno="79718">
40934 +<interface name="corenet_relabelto_socks_client_packets" lineno="79736">
40935 <summary>
40936 Relabel packets to socks_client the packet type.
40937 </summary>
40938 @@ -59872,7 +59956,7 @@ Domain allowed access.
40939 </summary>
40940 </param>
40941 </interface>
40942 -<interface name="corenet_send_socks_server_packets" lineno="79738">
40943 +<interface name="corenet_send_socks_server_packets" lineno="79756">
40944 <summary>
40945 Send socks_server packets.
40946 </summary>
40947 @@ -59883,7 +59967,7 @@ Domain allowed access.
40948 </param>
40949 <infoflow type="write" weight="10"/>
40950 </interface>
40951 -<interface name="corenet_dontaudit_send_socks_server_packets" lineno="79757">
40952 +<interface name="corenet_dontaudit_send_socks_server_packets" lineno="79775">
40953 <summary>
40954 Do not audit attempts to send socks_server packets.
40955 </summary>
40956 @@ -59894,7 +59978,7 @@ Domain to not audit.
40957 </param>
40958 <infoflow type="none"/>
40959 </interface>
40960 -<interface name="corenet_receive_socks_server_packets" lineno="79776">
40961 +<interface name="corenet_receive_socks_server_packets" lineno="79794">
40962 <summary>
40963 Receive socks_server packets.
40964 </summary>
40965 @@ -59905,7 +59989,7 @@ Domain allowed access.
40966 </param>
40967 <infoflow type="read" weight="10"/>
40968 </interface>
40969 -<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="79795">
40970 +<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="79813">
40971 <summary>
40972 Do not audit attempts to receive socks_server packets.
40973 </summary>
40974 @@ -59916,7 +60000,7 @@ Domain allowed access.
40975 </param>
40976 <infoflow type="none"/>
40977 </interface>
40978 -<interface name="corenet_sendrecv_socks_server_packets" lineno="79814">
40979 +<interface name="corenet_sendrecv_socks_server_packets" lineno="79832">
40980 <summary>
40981 Send and receive socks_server packets.
40982 </summary>
40983 @@ -59927,7 +60011,7 @@ Domain allowed access.
40984 </param>
40985 <infoflow type="both" weight="10"/>
40986 </interface>
40987 -<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="79830">
40988 +<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="79848">
40989 <summary>
40990 Do not audit attempts to send and receive socks_server packets.
40991 </summary>
40992 @@ -59938,7 +60022,7 @@ Domain to not audit.
40993 </param>
40994 <infoflow type="none"/>
40995 </interface>
40996 -<interface name="corenet_relabelto_socks_server_packets" lineno="79845">
40997 +<interface name="corenet_relabelto_socks_server_packets" lineno="79863">
40998 <summary>
40999 Relabel packets to socks_server the packet type.
41000 </summary>
41001 @@ -59948,7 +60032,7 @@ Domain allowed access.
41002 </summary>
41003 </param>
41004 </interface>
41005 -<interface name="corenet_tcp_sendrecv_soundd_port" lineno="79867">
41006 +<interface name="corenet_tcp_sendrecv_soundd_port" lineno="79885">
41007 <summary>
41008 Send and receive TCP traffic on the soundd port.
41009 </summary>
41010 @@ -59959,7 +60043,7 @@ Domain allowed access.
41011 </param>
41012 <infoflow type="both" weight="10"/>
41013 </interface>
41014 -<interface name="corenet_udp_send_soundd_port" lineno="79882">
41015 +<interface name="corenet_udp_send_soundd_port" lineno="79900">
41016 <summary>
41017 Send UDP traffic on the soundd port.
41018 </summary>
41019 @@ -59970,7 +60054,7 @@ Domain allowed access.
41020 </param>
41021 <infoflow type="write" weight="10"/>
41022 </interface>
41023 -<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="79897">
41024 +<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="79915">
41025 <summary>
41026 Do not audit attempts to send UDP traffic on the soundd port.
41027 </summary>
41028 @@ -59981,7 +60065,7 @@ Domain to not audit.
41029 </param>
41030 <infoflow type="none"/>
41031 </interface>
41032 -<interface name="corenet_udp_receive_soundd_port" lineno="79912">
41033 +<interface name="corenet_udp_receive_soundd_port" lineno="79930">
41034 <summary>
41035 Receive UDP traffic on the soundd port.
41036 </summary>
41037 @@ -59992,7 +60076,7 @@ Domain allowed access.
41038 </param>
41039 <infoflow type="read" weight="10"/>
41040 </interface>
41041 -<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="79927">
41042 +<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="79945">
41043 <summary>
41044 Do not audit attempts to receive UDP traffic on the soundd port.
41045 </summary>
41046 @@ -60003,7 +60087,7 @@ Domain to not audit.
41047 </param>
41048 <infoflow type="none"/>
41049 </interface>
41050 -<interface name="corenet_udp_sendrecv_soundd_port" lineno="79942">
41051 +<interface name="corenet_udp_sendrecv_soundd_port" lineno="79960">
41052 <summary>
41053 Send and receive UDP traffic on the soundd port.
41054 </summary>
41055 @@ -60014,7 +60098,7 @@ Domain allowed access.
41056 </param>
41057 <infoflow type="both" weight="10"/>
41058 </interface>
41059 -<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="79958">
41060 +<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="79976">
41061 <summary>
41062 Do not audit attempts to send and receive
41063 UDP traffic on the soundd port.
41064 @@ -60026,7 +60110,7 @@ Domain to not audit.
41065 </param>
41066 <infoflow type="none"/>
41067 </interface>
41068 -<interface name="corenet_tcp_bind_soundd_port" lineno="79973">
41069 +<interface name="corenet_tcp_bind_soundd_port" lineno="79991">
41070 <summary>
41071 Bind TCP sockets to the soundd port.
41072 </summary>
41073 @@ -60037,7 +60121,7 @@ Domain allowed access.
41074 </param>
41075 <infoflow type="none"/>
41076 </interface>
41077 -<interface name="corenet_udp_bind_soundd_port" lineno="79993">
41078 +<interface name="corenet_udp_bind_soundd_port" lineno="80011">
41079 <summary>
41080 Bind UDP sockets to the soundd port.
41081 </summary>
41082 @@ -60048,7 +60132,7 @@ Domain allowed access.
41083 </param>
41084 <infoflow type="none"/>
41085 </interface>
41086 -<interface name="corenet_tcp_connect_soundd_port" lineno="80012">
41087 +<interface name="corenet_tcp_connect_soundd_port" lineno="80030">
41088 <summary>
41089 Make a TCP connection to the soundd port.
41090 </summary>
41091 @@ -60058,7 +60142,7 @@ Domain allowed access.
41092 </summary>
41093 </param>
41094 </interface>
41095 -<interface name="corenet_send_soundd_client_packets" lineno="80032">
41096 +<interface name="corenet_send_soundd_client_packets" lineno="80050">
41097 <summary>
41098 Send soundd_client packets.
41099 </summary>
41100 @@ -60069,7 +60153,7 @@ Domain allowed access.
41101 </param>
41102 <infoflow type="write" weight="10"/>
41103 </interface>
41104 -<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="80051">
41105 +<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="80069">
41106 <summary>
41107 Do not audit attempts to send soundd_client packets.
41108 </summary>
41109 @@ -60080,7 +60164,7 @@ Domain to not audit.
41110 </param>
41111 <infoflow type="none"/>
41112 </interface>
41113 -<interface name="corenet_receive_soundd_client_packets" lineno="80070">
41114 +<interface name="corenet_receive_soundd_client_packets" lineno="80088">
41115 <summary>
41116 Receive soundd_client packets.
41117 </summary>
41118 @@ -60091,7 +60175,7 @@ Domain allowed access.
41119 </param>
41120 <infoflow type="read" weight="10"/>
41121 </interface>
41122 -<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="80089">
41123 +<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="80107">
41124 <summary>
41125 Do not audit attempts to receive soundd_client packets.
41126 </summary>
41127 @@ -60102,7 +60186,7 @@ Domain allowed access.
41128 </param>
41129 <infoflow type="none"/>
41130 </interface>
41131 -<interface name="corenet_sendrecv_soundd_client_packets" lineno="80108">
41132 +<interface name="corenet_sendrecv_soundd_client_packets" lineno="80126">
41133 <summary>
41134 Send and receive soundd_client packets.
41135 </summary>
41136 @@ -60113,7 +60197,7 @@ Domain allowed access.
41137 </param>
41138 <infoflow type="both" weight="10"/>
41139 </interface>
41140 -<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="80124">
41141 +<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="80142">
41142 <summary>
41143 Do not audit attempts to send and receive soundd_client packets.
41144 </summary>
41145 @@ -60124,7 +60208,7 @@ Domain to not audit.
41146 </param>
41147 <infoflow type="none"/>
41148 </interface>
41149 -<interface name="corenet_relabelto_soundd_client_packets" lineno="80139">
41150 +<interface name="corenet_relabelto_soundd_client_packets" lineno="80157">
41151 <summary>
41152 Relabel packets to soundd_client the packet type.
41153 </summary>
41154 @@ -60134,7 +60218,7 @@ Domain allowed access.
41155 </summary>
41156 </param>
41157 </interface>
41158 -<interface name="corenet_send_soundd_server_packets" lineno="80159">
41159 +<interface name="corenet_send_soundd_server_packets" lineno="80177">
41160 <summary>
41161 Send soundd_server packets.
41162 </summary>
41163 @@ -60145,7 +60229,7 @@ Domain allowed access.
41164 </param>
41165 <infoflow type="write" weight="10"/>
41166 </interface>
41167 -<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="80178">
41168 +<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="80196">
41169 <summary>
41170 Do not audit attempts to send soundd_server packets.
41171 </summary>
41172 @@ -60156,7 +60240,7 @@ Domain to not audit.
41173 </param>
41174 <infoflow type="none"/>
41175 </interface>
41176 -<interface name="corenet_receive_soundd_server_packets" lineno="80197">
41177 +<interface name="corenet_receive_soundd_server_packets" lineno="80215">
41178 <summary>
41179 Receive soundd_server packets.
41180 </summary>
41181 @@ -60167,7 +60251,7 @@ Domain allowed access.
41182 </param>
41183 <infoflow type="read" weight="10"/>
41184 </interface>
41185 -<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="80216">
41186 +<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="80234">
41187 <summary>
41188 Do not audit attempts to receive soundd_server packets.
41189 </summary>
41190 @@ -60178,7 +60262,7 @@ Domain allowed access.
41191 </param>
41192 <infoflow type="none"/>
41193 </interface>
41194 -<interface name="corenet_sendrecv_soundd_server_packets" lineno="80235">
41195 +<interface name="corenet_sendrecv_soundd_server_packets" lineno="80253">
41196 <summary>
41197 Send and receive soundd_server packets.
41198 </summary>
41199 @@ -60189,7 +60273,7 @@ Domain allowed access.
41200 </param>
41201 <infoflow type="both" weight="10"/>
41202 </interface>
41203 -<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="80251">
41204 +<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="80269">
41205 <summary>
41206 Do not audit attempts to send and receive soundd_server packets.
41207 </summary>
41208 @@ -60200,7 +60284,7 @@ Domain to not audit.
41209 </param>
41210 <infoflow type="none"/>
41211 </interface>
41212 -<interface name="corenet_relabelto_soundd_server_packets" lineno="80266">
41213 +<interface name="corenet_relabelto_soundd_server_packets" lineno="80284">
41214 <summary>
41215 Relabel packets to soundd_server the packet type.
41216 </summary>
41217 @@ -60210,7 +60294,7 @@ Domain allowed access.
41218 </summary>
41219 </param>
41220 </interface>
41221 -<interface name="corenet_tcp_sendrecv_spamd_port" lineno="80288">
41222 +<interface name="corenet_tcp_sendrecv_spamd_port" lineno="80306">
41223 <summary>
41224 Send and receive TCP traffic on the spamd port.
41225 </summary>
41226 @@ -60221,7 +60305,7 @@ Domain allowed access.
41227 </param>
41228 <infoflow type="both" weight="10"/>
41229 </interface>
41230 -<interface name="corenet_udp_send_spamd_port" lineno="80303">
41231 +<interface name="corenet_udp_send_spamd_port" lineno="80321">
41232 <summary>
41233 Send UDP traffic on the spamd port.
41234 </summary>
41235 @@ -60232,7 +60316,7 @@ Domain allowed access.
41236 </param>
41237 <infoflow type="write" weight="10"/>
41238 </interface>
41239 -<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="80318">
41240 +<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="80336">
41241 <summary>
41242 Do not audit attempts to send UDP traffic on the spamd port.
41243 </summary>
41244 @@ -60243,7 +60327,7 @@ Domain to not audit.
41245 </param>
41246 <infoflow type="none"/>
41247 </interface>
41248 -<interface name="corenet_udp_receive_spamd_port" lineno="80333">
41249 +<interface name="corenet_udp_receive_spamd_port" lineno="80351">
41250 <summary>
41251 Receive UDP traffic on the spamd port.
41252 </summary>
41253 @@ -60254,7 +60338,7 @@ Domain allowed access.
41254 </param>
41255 <infoflow type="read" weight="10"/>
41256 </interface>
41257 -<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="80348">
41258 +<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="80366">
41259 <summary>
41260 Do not audit attempts to receive UDP traffic on the spamd port.
41261 </summary>
41262 @@ -60265,7 +60349,7 @@ Domain to not audit.
41263 </param>
41264 <infoflow type="none"/>
41265 </interface>
41266 -<interface name="corenet_udp_sendrecv_spamd_port" lineno="80363">
41267 +<interface name="corenet_udp_sendrecv_spamd_port" lineno="80381">
41268 <summary>
41269 Send and receive UDP traffic on the spamd port.
41270 </summary>
41271 @@ -60276,7 +60360,7 @@ Domain allowed access.
41272 </param>
41273 <infoflow type="both" weight="10"/>
41274 </interface>
41275 -<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="80379">
41276 +<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="80397">
41277 <summary>
41278 Do not audit attempts to send and receive
41279 UDP traffic on the spamd port.
41280 @@ -60288,7 +60372,7 @@ Domain to not audit.
41281 </param>
41282 <infoflow type="none"/>
41283 </interface>
41284 -<interface name="corenet_tcp_bind_spamd_port" lineno="80394">
41285 +<interface name="corenet_tcp_bind_spamd_port" lineno="80412">
41286 <summary>
41287 Bind TCP sockets to the spamd port.
41288 </summary>
41289 @@ -60299,7 +60383,7 @@ Domain allowed access.
41290 </param>
41291 <infoflow type="none"/>
41292 </interface>
41293 -<interface name="corenet_udp_bind_spamd_port" lineno="80414">
41294 +<interface name="corenet_udp_bind_spamd_port" lineno="80432">
41295 <summary>
41296 Bind UDP sockets to the spamd port.
41297 </summary>
41298 @@ -60310,7 +60394,7 @@ Domain allowed access.
41299 </param>
41300 <infoflow type="none"/>
41301 </interface>
41302 -<interface name="corenet_tcp_connect_spamd_port" lineno="80433">
41303 +<interface name="corenet_tcp_connect_spamd_port" lineno="80451">
41304 <summary>
41305 Make a TCP connection to the spamd port.
41306 </summary>
41307 @@ -60320,7 +60404,7 @@ Domain allowed access.
41308 </summary>
41309 </param>
41310 </interface>
41311 -<interface name="corenet_send_spamd_client_packets" lineno="80453">
41312 +<interface name="corenet_send_spamd_client_packets" lineno="80471">
41313 <summary>
41314 Send spamd_client packets.
41315 </summary>
41316 @@ -60331,7 +60415,7 @@ Domain allowed access.
41317 </param>
41318 <infoflow type="write" weight="10"/>
41319 </interface>
41320 -<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="80472">
41321 +<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="80490">
41322 <summary>
41323 Do not audit attempts to send spamd_client packets.
41324 </summary>
41325 @@ -60342,7 +60426,7 @@ Domain to not audit.
41326 </param>
41327 <infoflow type="none"/>
41328 </interface>
41329 -<interface name="corenet_receive_spamd_client_packets" lineno="80491">
41330 +<interface name="corenet_receive_spamd_client_packets" lineno="80509">
41331 <summary>
41332 Receive spamd_client packets.
41333 </summary>
41334 @@ -60353,7 +60437,7 @@ Domain allowed access.
41335 </param>
41336 <infoflow type="read" weight="10"/>
41337 </interface>
41338 -<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="80510">
41339 +<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="80528">
41340 <summary>
41341 Do not audit attempts to receive spamd_client packets.
41342 </summary>
41343 @@ -60364,7 +60448,7 @@ Domain allowed access.
41344 </param>
41345 <infoflow type="none"/>
41346 </interface>
41347 -<interface name="corenet_sendrecv_spamd_client_packets" lineno="80529">
41348 +<interface name="corenet_sendrecv_spamd_client_packets" lineno="80547">
41349 <summary>
41350 Send and receive spamd_client packets.
41351 </summary>
41352 @@ -60375,7 +60459,7 @@ Domain allowed access.
41353 </param>
41354 <infoflow type="both" weight="10"/>
41355 </interface>
41356 -<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="80545">
41357 +<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="80563">
41358 <summary>
41359 Do not audit attempts to send and receive spamd_client packets.
41360 </summary>
41361 @@ -60386,7 +60470,7 @@ Domain to not audit.
41362 </param>
41363 <infoflow type="none"/>
41364 </interface>
41365 -<interface name="corenet_relabelto_spamd_client_packets" lineno="80560">
41366 +<interface name="corenet_relabelto_spamd_client_packets" lineno="80578">
41367 <summary>
41368 Relabel packets to spamd_client the packet type.
41369 </summary>
41370 @@ -60396,7 +60480,7 @@ Domain allowed access.
41371 </summary>
41372 </param>
41373 </interface>
41374 -<interface name="corenet_send_spamd_server_packets" lineno="80580">
41375 +<interface name="corenet_send_spamd_server_packets" lineno="80598">
41376 <summary>
41377 Send spamd_server packets.
41378 </summary>
41379 @@ -60407,7 +60491,7 @@ Domain allowed access.
41380 </param>
41381 <infoflow type="write" weight="10"/>
41382 </interface>
41383 -<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="80599">
41384 +<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="80617">
41385 <summary>
41386 Do not audit attempts to send spamd_server packets.
41387 </summary>
41388 @@ -60418,7 +60502,7 @@ Domain to not audit.
41389 </param>
41390 <infoflow type="none"/>
41391 </interface>
41392 -<interface name="corenet_receive_spamd_server_packets" lineno="80618">
41393 +<interface name="corenet_receive_spamd_server_packets" lineno="80636">
41394 <summary>
41395 Receive spamd_server packets.
41396 </summary>
41397 @@ -60429,7 +60513,7 @@ Domain allowed access.
41398 </param>
41399 <infoflow type="read" weight="10"/>
41400 </interface>
41401 -<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="80637">
41402 +<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="80655">
41403 <summary>
41404 Do not audit attempts to receive spamd_server packets.
41405 </summary>
41406 @@ -60440,7 +60524,7 @@ Domain allowed access.
41407 </param>
41408 <infoflow type="none"/>
41409 </interface>
41410 -<interface name="corenet_sendrecv_spamd_server_packets" lineno="80656">
41411 +<interface name="corenet_sendrecv_spamd_server_packets" lineno="80674">
41412 <summary>
41413 Send and receive spamd_server packets.
41414 </summary>
41415 @@ -60451,7 +60535,7 @@ Domain allowed access.
41416 </param>
41417 <infoflow type="both" weight="10"/>
41418 </interface>
41419 -<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="80672">
41420 +<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="80690">
41421 <summary>
41422 Do not audit attempts to send and receive spamd_server packets.
41423 </summary>
41424 @@ -60462,7 +60546,7 @@ Domain to not audit.
41425 </param>
41426 <infoflow type="none"/>
41427 </interface>
41428 -<interface name="corenet_relabelto_spamd_server_packets" lineno="80687">
41429 +<interface name="corenet_relabelto_spamd_server_packets" lineno="80705">
41430 <summary>
41431 Relabel packets to spamd_server the packet type.
41432 </summary>
41433 @@ -60472,7 +60556,7 @@ Domain allowed access.
41434 </summary>
41435 </param>
41436 </interface>
41437 -<interface name="corenet_tcp_sendrecv_speech_port" lineno="80709">
41438 +<interface name="corenet_tcp_sendrecv_speech_port" lineno="80727">
41439 <summary>
41440 Send and receive TCP traffic on the speech port.
41441 </summary>
41442 @@ -60483,7 +60567,7 @@ Domain allowed access.
41443 </param>
41444 <infoflow type="both" weight="10"/>
41445 </interface>
41446 -<interface name="corenet_udp_send_speech_port" lineno="80724">
41447 +<interface name="corenet_udp_send_speech_port" lineno="80742">
41448 <summary>
41449 Send UDP traffic on the speech port.
41450 </summary>
41451 @@ -60494,7 +60578,7 @@ Domain allowed access.
41452 </param>
41453 <infoflow type="write" weight="10"/>
41454 </interface>
41455 -<interface name="corenet_dontaudit_udp_send_speech_port" lineno="80739">
41456 +<interface name="corenet_dontaudit_udp_send_speech_port" lineno="80757">
41457 <summary>
41458 Do not audit attempts to send UDP traffic on the speech port.
41459 </summary>
41460 @@ -60505,7 +60589,7 @@ Domain to not audit.
41461 </param>
41462 <infoflow type="none"/>
41463 </interface>
41464 -<interface name="corenet_udp_receive_speech_port" lineno="80754">
41465 +<interface name="corenet_udp_receive_speech_port" lineno="80772">
41466 <summary>
41467 Receive UDP traffic on the speech port.
41468 </summary>
41469 @@ -60516,7 +60600,7 @@ Domain allowed access.
41470 </param>
41471 <infoflow type="read" weight="10"/>
41472 </interface>
41473 -<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="80769">
41474 +<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="80787">
41475 <summary>
41476 Do not audit attempts to receive UDP traffic on the speech port.
41477 </summary>
41478 @@ -60527,7 +60611,7 @@ Domain to not audit.
41479 </param>
41480 <infoflow type="none"/>
41481 </interface>
41482 -<interface name="corenet_udp_sendrecv_speech_port" lineno="80784">
41483 +<interface name="corenet_udp_sendrecv_speech_port" lineno="80802">
41484 <summary>
41485 Send and receive UDP traffic on the speech port.
41486 </summary>
41487 @@ -60538,7 +60622,7 @@ Domain allowed access.
41488 </param>
41489 <infoflow type="both" weight="10"/>
41490 </interface>
41491 -<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="80800">
41492 +<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="80818">
41493 <summary>
41494 Do not audit attempts to send and receive
41495 UDP traffic on the speech port.
41496 @@ -60550,7 +60634,7 @@ Domain to not audit.
41497 </param>
41498 <infoflow type="none"/>
41499 </interface>
41500 -<interface name="corenet_tcp_bind_speech_port" lineno="80815">
41501 +<interface name="corenet_tcp_bind_speech_port" lineno="80833">
41502 <summary>
41503 Bind TCP sockets to the speech port.
41504 </summary>
41505 @@ -60561,7 +60645,7 @@ Domain allowed access.
41506 </param>
41507 <infoflow type="none"/>
41508 </interface>
41509 -<interface name="corenet_udp_bind_speech_port" lineno="80835">
41510 +<interface name="corenet_udp_bind_speech_port" lineno="80853">
41511 <summary>
41512 Bind UDP sockets to the speech port.
41513 </summary>
41514 @@ -60572,7 +60656,7 @@ Domain allowed access.
41515 </param>
41516 <infoflow type="none"/>
41517 </interface>
41518 -<interface name="corenet_tcp_connect_speech_port" lineno="80854">
41519 +<interface name="corenet_tcp_connect_speech_port" lineno="80872">
41520 <summary>
41521 Make a TCP connection to the speech port.
41522 </summary>
41523 @@ -60582,7 +60666,7 @@ Domain allowed access.
41524 </summary>
41525 </param>
41526 </interface>
41527 -<interface name="corenet_send_speech_client_packets" lineno="80874">
41528 +<interface name="corenet_send_speech_client_packets" lineno="80892">
41529 <summary>
41530 Send speech_client packets.
41531 </summary>
41532 @@ -60593,7 +60677,7 @@ Domain allowed access.
41533 </param>
41534 <infoflow type="write" weight="10"/>
41535 </interface>
41536 -<interface name="corenet_dontaudit_send_speech_client_packets" lineno="80893">
41537 +<interface name="corenet_dontaudit_send_speech_client_packets" lineno="80911">
41538 <summary>
41539 Do not audit attempts to send speech_client packets.
41540 </summary>
41541 @@ -60604,7 +60688,7 @@ Domain to not audit.
41542 </param>
41543 <infoflow type="none"/>
41544 </interface>
41545 -<interface name="corenet_receive_speech_client_packets" lineno="80912">
41546 +<interface name="corenet_receive_speech_client_packets" lineno="80930">
41547 <summary>
41548 Receive speech_client packets.
41549 </summary>
41550 @@ -60615,7 +60699,7 @@ Domain allowed access.
41551 </param>
41552 <infoflow type="read" weight="10"/>
41553 </interface>
41554 -<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="80931">
41555 +<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="80949">
41556 <summary>
41557 Do not audit attempts to receive speech_client packets.
41558 </summary>
41559 @@ -60626,7 +60710,7 @@ Domain allowed access.
41560 </param>
41561 <infoflow type="none"/>
41562 </interface>
41563 -<interface name="corenet_sendrecv_speech_client_packets" lineno="80950">
41564 +<interface name="corenet_sendrecv_speech_client_packets" lineno="80968">
41565 <summary>
41566 Send and receive speech_client packets.
41567 </summary>
41568 @@ -60637,7 +60721,7 @@ Domain allowed access.
41569 </param>
41570 <infoflow type="both" weight="10"/>
41571 </interface>
41572 -<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="80966">
41573 +<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="80984">
41574 <summary>
41575 Do not audit attempts to send and receive speech_client packets.
41576 </summary>
41577 @@ -60648,7 +60732,7 @@ Domain to not audit.
41578 </param>
41579 <infoflow type="none"/>
41580 </interface>
41581 -<interface name="corenet_relabelto_speech_client_packets" lineno="80981">
41582 +<interface name="corenet_relabelto_speech_client_packets" lineno="80999">
41583 <summary>
41584 Relabel packets to speech_client the packet type.
41585 </summary>
41586 @@ -60658,7 +60742,7 @@ Domain allowed access.
41587 </summary>
41588 </param>
41589 </interface>
41590 -<interface name="corenet_send_speech_server_packets" lineno="81001">
41591 +<interface name="corenet_send_speech_server_packets" lineno="81019">
41592 <summary>
41593 Send speech_server packets.
41594 </summary>
41595 @@ -60669,7 +60753,7 @@ Domain allowed access.
41596 </param>
41597 <infoflow type="write" weight="10"/>
41598 </interface>
41599 -<interface name="corenet_dontaudit_send_speech_server_packets" lineno="81020">
41600 +<interface name="corenet_dontaudit_send_speech_server_packets" lineno="81038">
41601 <summary>
41602 Do not audit attempts to send speech_server packets.
41603 </summary>
41604 @@ -60680,7 +60764,7 @@ Domain to not audit.
41605 </param>
41606 <infoflow type="none"/>
41607 </interface>
41608 -<interface name="corenet_receive_speech_server_packets" lineno="81039">
41609 +<interface name="corenet_receive_speech_server_packets" lineno="81057">
41610 <summary>
41611 Receive speech_server packets.
41612 </summary>
41613 @@ -60691,7 +60775,7 @@ Domain allowed access.
41614 </param>
41615 <infoflow type="read" weight="10"/>
41616 </interface>
41617 -<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="81058">
41618 +<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="81076">
41619 <summary>
41620 Do not audit attempts to receive speech_server packets.
41621 </summary>
41622 @@ -60702,7 +60786,7 @@ Domain allowed access.
41623 </param>
41624 <infoflow type="none"/>
41625 </interface>
41626 -<interface name="corenet_sendrecv_speech_server_packets" lineno="81077">
41627 +<interface name="corenet_sendrecv_speech_server_packets" lineno="81095">
41628 <summary>
41629 Send and receive speech_server packets.
41630 </summary>
41631 @@ -60713,7 +60797,7 @@ Domain allowed access.
41632 </param>
41633 <infoflow type="both" weight="10"/>
41634 </interface>
41635 -<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="81093">
41636 +<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="81111">
41637 <summary>
41638 Do not audit attempts to send and receive speech_server packets.
41639 </summary>
41640 @@ -60724,7 +60808,7 @@ Domain to not audit.
41641 </param>
41642 <infoflow type="none"/>
41643 </interface>
41644 -<interface name="corenet_relabelto_speech_server_packets" lineno="81108">
41645 +<interface name="corenet_relabelto_speech_server_packets" lineno="81126">
41646 <summary>
41647 Relabel packets to speech_server the packet type.
41648 </summary>
41649 @@ -60734,7 +60818,7 @@ Domain allowed access.
41650 </summary>
41651 </param>
41652 </interface>
41653 -<interface name="corenet_tcp_sendrecv_squid_port" lineno="81130">
41654 +<interface name="corenet_tcp_sendrecv_squid_port" lineno="81148">
41655 <summary>
41656 Send and receive TCP traffic on the squid port.
41657 </summary>
41658 @@ -60745,7 +60829,7 @@ Domain allowed access.
41659 </param>
41660 <infoflow type="both" weight="10"/>
41661 </interface>
41662 -<interface name="corenet_udp_send_squid_port" lineno="81145">
41663 +<interface name="corenet_udp_send_squid_port" lineno="81163">
41664 <summary>
41665 Send UDP traffic on the squid port.
41666 </summary>
41667 @@ -60756,7 +60840,7 @@ Domain allowed access.
41668 </param>
41669 <infoflow type="write" weight="10"/>
41670 </interface>
41671 -<interface name="corenet_dontaudit_udp_send_squid_port" lineno="81160">
41672 +<interface name="corenet_dontaudit_udp_send_squid_port" lineno="81178">
41673 <summary>
41674 Do not audit attempts to send UDP traffic on the squid port.
41675 </summary>
41676 @@ -60767,7 +60851,7 @@ Domain to not audit.
41677 </param>
41678 <infoflow type="none"/>
41679 </interface>
41680 -<interface name="corenet_udp_receive_squid_port" lineno="81175">
41681 +<interface name="corenet_udp_receive_squid_port" lineno="81193">
41682 <summary>
41683 Receive UDP traffic on the squid port.
41684 </summary>
41685 @@ -60778,7 +60862,7 @@ Domain allowed access.
41686 </param>
41687 <infoflow type="read" weight="10"/>
41688 </interface>
41689 -<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="81190">
41690 +<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="81208">
41691 <summary>
41692 Do not audit attempts to receive UDP traffic on the squid port.
41693 </summary>
41694 @@ -60789,7 +60873,7 @@ Domain to not audit.
41695 </param>
41696 <infoflow type="none"/>
41697 </interface>
41698 -<interface name="corenet_udp_sendrecv_squid_port" lineno="81205">
41699 +<interface name="corenet_udp_sendrecv_squid_port" lineno="81223">
41700 <summary>
41701 Send and receive UDP traffic on the squid port.
41702 </summary>
41703 @@ -60800,7 +60884,7 @@ Domain allowed access.
41704 </param>
41705 <infoflow type="both" weight="10"/>
41706 </interface>
41707 -<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="81221">
41708 +<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="81239">
41709 <summary>
41710 Do not audit attempts to send and receive
41711 UDP traffic on the squid port.
41712 @@ -60812,7 +60896,7 @@ Domain to not audit.
41713 </param>
41714 <infoflow type="none"/>
41715 </interface>
41716 -<interface name="corenet_tcp_bind_squid_port" lineno="81236">
41717 +<interface name="corenet_tcp_bind_squid_port" lineno="81254">
41718 <summary>
41719 Bind TCP sockets to the squid port.
41720 </summary>
41721 @@ -60823,7 +60907,7 @@ Domain allowed access.
41722 </param>
41723 <infoflow type="none"/>
41724 </interface>
41725 -<interface name="corenet_udp_bind_squid_port" lineno="81256">
41726 +<interface name="corenet_udp_bind_squid_port" lineno="81274">
41727 <summary>
41728 Bind UDP sockets to the squid port.
41729 </summary>
41730 @@ -60834,7 +60918,7 @@ Domain allowed access.
41731 </param>
41732 <infoflow type="none"/>
41733 </interface>
41734 -<interface name="corenet_tcp_connect_squid_port" lineno="81275">
41735 +<interface name="corenet_tcp_connect_squid_port" lineno="81293">
41736 <summary>
41737 Make a TCP connection to the squid port.
41738 </summary>
41739 @@ -60844,7 +60928,7 @@ Domain allowed access.
41740 </summary>
41741 </param>
41742 </interface>
41743 -<interface name="corenet_send_squid_client_packets" lineno="81295">
41744 +<interface name="corenet_send_squid_client_packets" lineno="81313">
41745 <summary>
41746 Send squid_client packets.
41747 </summary>
41748 @@ -60855,7 +60939,7 @@ Domain allowed access.
41749 </param>
41750 <infoflow type="write" weight="10"/>
41751 </interface>
41752 -<interface name="corenet_dontaudit_send_squid_client_packets" lineno="81314">
41753 +<interface name="corenet_dontaudit_send_squid_client_packets" lineno="81332">
41754 <summary>
41755 Do not audit attempts to send squid_client packets.
41756 </summary>
41757 @@ -60866,7 +60950,7 @@ Domain to not audit.
41758 </param>
41759 <infoflow type="none"/>
41760 </interface>
41761 -<interface name="corenet_receive_squid_client_packets" lineno="81333">
41762 +<interface name="corenet_receive_squid_client_packets" lineno="81351">
41763 <summary>
41764 Receive squid_client packets.
41765 </summary>
41766 @@ -60877,7 +60961,7 @@ Domain allowed access.
41767 </param>
41768 <infoflow type="read" weight="10"/>
41769 </interface>
41770 -<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="81352">
41771 +<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="81370">
41772 <summary>
41773 Do not audit attempts to receive squid_client packets.
41774 </summary>
41775 @@ -60888,7 +60972,7 @@ Domain allowed access.
41776 </param>
41777 <infoflow type="none"/>
41778 </interface>
41779 -<interface name="corenet_sendrecv_squid_client_packets" lineno="81371">
41780 +<interface name="corenet_sendrecv_squid_client_packets" lineno="81389">
41781 <summary>
41782 Send and receive squid_client packets.
41783 </summary>
41784 @@ -60899,7 +60983,7 @@ Domain allowed access.
41785 </param>
41786 <infoflow type="both" weight="10"/>
41787 </interface>
41788 -<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="81387">
41789 +<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="81405">
41790 <summary>
41791 Do not audit attempts to send and receive squid_client packets.
41792 </summary>
41793 @@ -60910,7 +60994,7 @@ Domain to not audit.
41794 </param>
41795 <infoflow type="none"/>
41796 </interface>
41797 -<interface name="corenet_relabelto_squid_client_packets" lineno="81402">
41798 +<interface name="corenet_relabelto_squid_client_packets" lineno="81420">
41799 <summary>
41800 Relabel packets to squid_client the packet type.
41801 </summary>
41802 @@ -60920,7 +61004,7 @@ Domain allowed access.
41803 </summary>
41804 </param>
41805 </interface>
41806 -<interface name="corenet_send_squid_server_packets" lineno="81422">
41807 +<interface name="corenet_send_squid_server_packets" lineno="81440">
41808 <summary>
41809 Send squid_server packets.
41810 </summary>
41811 @@ -60931,7 +61015,7 @@ Domain allowed access.
41812 </param>
41813 <infoflow type="write" weight="10"/>
41814 </interface>
41815 -<interface name="corenet_dontaudit_send_squid_server_packets" lineno="81441">
41816 +<interface name="corenet_dontaudit_send_squid_server_packets" lineno="81459">
41817 <summary>
41818 Do not audit attempts to send squid_server packets.
41819 </summary>
41820 @@ -60942,7 +61026,7 @@ Domain to not audit.
41821 </param>
41822 <infoflow type="none"/>
41823 </interface>
41824 -<interface name="corenet_receive_squid_server_packets" lineno="81460">
41825 +<interface name="corenet_receive_squid_server_packets" lineno="81478">
41826 <summary>
41827 Receive squid_server packets.
41828 </summary>
41829 @@ -60953,7 +61037,7 @@ Domain allowed access.
41830 </param>
41831 <infoflow type="read" weight="10"/>
41832 </interface>
41833 -<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="81479">
41834 +<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="81497">
41835 <summary>
41836 Do not audit attempts to receive squid_server packets.
41837 </summary>
41838 @@ -60964,7 +61048,7 @@ Domain allowed access.
41839 </param>
41840 <infoflow type="none"/>
41841 </interface>
41842 -<interface name="corenet_sendrecv_squid_server_packets" lineno="81498">
41843 +<interface name="corenet_sendrecv_squid_server_packets" lineno="81516">
41844 <summary>
41845 Send and receive squid_server packets.
41846 </summary>
41847 @@ -60975,7 +61059,7 @@ Domain allowed access.
41848 </param>
41849 <infoflow type="both" weight="10"/>
41850 </interface>
41851 -<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="81514">
41852 +<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="81532">
41853 <summary>
41854 Do not audit attempts to send and receive squid_server packets.
41855 </summary>
41856 @@ -60986,7 +61070,7 @@ Domain to not audit.
41857 </param>
41858 <infoflow type="none"/>
41859 </interface>
41860 -<interface name="corenet_relabelto_squid_server_packets" lineno="81529">
41861 +<interface name="corenet_relabelto_squid_server_packets" lineno="81547">
41862 <summary>
41863 Relabel packets to squid_server the packet type.
41864 </summary>
41865 @@ -60996,7 +61080,7 @@ Domain allowed access.
41866 </summary>
41867 </param>
41868 </interface>
41869 -<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="81551">
41870 +<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="81569">
41871 <summary>
41872 Send and receive TCP traffic on the ssdp port.
41873 </summary>
41874 @@ -61007,7 +61091,7 @@ Domain allowed access.
41875 </param>
41876 <infoflow type="both" weight="10"/>
41877 </interface>
41878 -<interface name="corenet_udp_send_ssdp_port" lineno="81566">
41879 +<interface name="corenet_udp_send_ssdp_port" lineno="81584">
41880 <summary>
41881 Send UDP traffic on the ssdp port.
41882 </summary>
41883 @@ -61018,7 +61102,7 @@ Domain allowed access.
41884 </param>
41885 <infoflow type="write" weight="10"/>
41886 </interface>
41887 -<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="81581">
41888 +<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="81599">
41889 <summary>
41890 Do not audit attempts to send UDP traffic on the ssdp port.
41891 </summary>
41892 @@ -61029,7 +61113,7 @@ Domain to not audit.
41893 </param>
41894 <infoflow type="none"/>
41895 </interface>
41896 -<interface name="corenet_udp_receive_ssdp_port" lineno="81596">
41897 +<interface name="corenet_udp_receive_ssdp_port" lineno="81614">
41898 <summary>
41899 Receive UDP traffic on the ssdp port.
41900 </summary>
41901 @@ -61040,7 +61124,7 @@ Domain allowed access.
41902 </param>
41903 <infoflow type="read" weight="10"/>
41904 </interface>
41905 -<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="81611">
41906 +<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="81629">
41907 <summary>
41908 Do not audit attempts to receive UDP traffic on the ssdp port.
41909 </summary>
41910 @@ -61051,7 +61135,7 @@ Domain to not audit.
41911 </param>
41912 <infoflow type="none"/>
41913 </interface>
41914 -<interface name="corenet_udp_sendrecv_ssdp_port" lineno="81626">
41915 +<interface name="corenet_udp_sendrecv_ssdp_port" lineno="81644">
41916 <summary>
41917 Send and receive UDP traffic on the ssdp port.
41918 </summary>
41919 @@ -61062,7 +61146,7 @@ Domain allowed access.
41920 </param>
41921 <infoflow type="both" weight="10"/>
41922 </interface>
41923 -<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="81642">
41924 +<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="81660">
41925 <summary>
41926 Do not audit attempts to send and receive
41927 UDP traffic on the ssdp port.
41928 @@ -61074,7 +61158,7 @@ Domain to not audit.
41929 </param>
41930 <infoflow type="none"/>
41931 </interface>
41932 -<interface name="corenet_tcp_bind_ssdp_port" lineno="81657">
41933 +<interface name="corenet_tcp_bind_ssdp_port" lineno="81675">
41934 <summary>
41935 Bind TCP sockets to the ssdp port.
41936 </summary>
41937 @@ -61085,7 +61169,7 @@ Domain allowed access.
41938 </param>
41939 <infoflow type="none"/>
41940 </interface>
41941 -<interface name="corenet_udp_bind_ssdp_port" lineno="81677">
41942 +<interface name="corenet_udp_bind_ssdp_port" lineno="81695">
41943 <summary>
41944 Bind UDP sockets to the ssdp port.
41945 </summary>
41946 @@ -61096,7 +61180,7 @@ Domain allowed access.
41947 </param>
41948 <infoflow type="none"/>
41949 </interface>
41950 -<interface name="corenet_tcp_connect_ssdp_port" lineno="81696">
41951 +<interface name="corenet_tcp_connect_ssdp_port" lineno="81714">
41952 <summary>
41953 Make a TCP connection to the ssdp port.
41954 </summary>
41955 @@ -61106,7 +61190,7 @@ Domain allowed access.
41956 </summary>
41957 </param>
41958 </interface>
41959 -<interface name="corenet_send_ssdp_client_packets" lineno="81716">
41960 +<interface name="corenet_send_ssdp_client_packets" lineno="81734">
41961 <summary>
41962 Send ssdp_client packets.
41963 </summary>
41964 @@ -61117,7 +61201,7 @@ Domain allowed access.
41965 </param>
41966 <infoflow type="write" weight="10"/>
41967 </interface>
41968 -<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="81735">
41969 +<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="81753">
41970 <summary>
41971 Do not audit attempts to send ssdp_client packets.
41972 </summary>
41973 @@ -61128,7 +61212,7 @@ Domain to not audit.
41974 </param>
41975 <infoflow type="none"/>
41976 </interface>
41977 -<interface name="corenet_receive_ssdp_client_packets" lineno="81754">
41978 +<interface name="corenet_receive_ssdp_client_packets" lineno="81772">
41979 <summary>
41980 Receive ssdp_client packets.
41981 </summary>
41982 @@ -61139,7 +61223,7 @@ Domain allowed access.
41983 </param>
41984 <infoflow type="read" weight="10"/>
41985 </interface>
41986 -<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="81773">
41987 +<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="81791">
41988 <summary>
41989 Do not audit attempts to receive ssdp_client packets.
41990 </summary>
41991 @@ -61150,7 +61234,7 @@ Domain allowed access.
41992 </param>
41993 <infoflow type="none"/>
41994 </interface>
41995 -<interface name="corenet_sendrecv_ssdp_client_packets" lineno="81792">
41996 +<interface name="corenet_sendrecv_ssdp_client_packets" lineno="81810">
41997 <summary>
41998 Send and receive ssdp_client packets.
41999 </summary>
42000 @@ -61161,7 +61245,7 @@ Domain allowed access.
42001 </param>
42002 <infoflow type="both" weight="10"/>
42003 </interface>
42004 -<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="81808">
42005 +<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="81826">
42006 <summary>
42007 Do not audit attempts to send and receive ssdp_client packets.
42008 </summary>
42009 @@ -61172,7 +61256,7 @@ Domain to not audit.
42010 </param>
42011 <infoflow type="none"/>
42012 </interface>
42013 -<interface name="corenet_relabelto_ssdp_client_packets" lineno="81823">
42014 +<interface name="corenet_relabelto_ssdp_client_packets" lineno="81841">
42015 <summary>
42016 Relabel packets to ssdp_client the packet type.
42017 </summary>
42018 @@ -61182,7 +61266,7 @@ Domain allowed access.
42019 </summary>
42020 </param>
42021 </interface>
42022 -<interface name="corenet_send_ssdp_server_packets" lineno="81843">
42023 +<interface name="corenet_send_ssdp_server_packets" lineno="81861">
42024 <summary>
42025 Send ssdp_server packets.
42026 </summary>
42027 @@ -61193,7 +61277,7 @@ Domain allowed access.
42028 </param>
42029 <infoflow type="write" weight="10"/>
42030 </interface>
42031 -<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="81862">
42032 +<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="81880">
42033 <summary>
42034 Do not audit attempts to send ssdp_server packets.
42035 </summary>
42036 @@ -61204,7 +61288,7 @@ Domain to not audit.
42037 </param>
42038 <infoflow type="none"/>
42039 </interface>
42040 -<interface name="corenet_receive_ssdp_server_packets" lineno="81881">
42041 +<interface name="corenet_receive_ssdp_server_packets" lineno="81899">
42042 <summary>
42043 Receive ssdp_server packets.
42044 </summary>
42045 @@ -61215,7 +61299,7 @@ Domain allowed access.
42046 </param>
42047 <infoflow type="read" weight="10"/>
42048 </interface>
42049 -<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="81900">
42050 +<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="81918">
42051 <summary>
42052 Do not audit attempts to receive ssdp_server packets.
42053 </summary>
42054 @@ -61226,7 +61310,7 @@ Domain allowed access.
42055 </param>
42056 <infoflow type="none"/>
42057 </interface>
42058 -<interface name="corenet_sendrecv_ssdp_server_packets" lineno="81919">
42059 +<interface name="corenet_sendrecv_ssdp_server_packets" lineno="81937">
42060 <summary>
42061 Send and receive ssdp_server packets.
42062 </summary>
42063 @@ -61237,7 +61321,7 @@ Domain allowed access.
42064 </param>
42065 <infoflow type="both" weight="10"/>
42066 </interface>
42067 -<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="81935">
42068 +<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="81953">
42069 <summary>
42070 Do not audit attempts to send and receive ssdp_server packets.
42071 </summary>
42072 @@ -61248,7 +61332,7 @@ Domain to not audit.
42073 </param>
42074 <infoflow type="none"/>
42075 </interface>
42076 -<interface name="corenet_relabelto_ssdp_server_packets" lineno="81950">
42077 +<interface name="corenet_relabelto_ssdp_server_packets" lineno="81968">
42078 <summary>
42079 Relabel packets to ssdp_server the packet type.
42080 </summary>
42081 @@ -61258,7 +61342,7 @@ Domain allowed access.
42082 </summary>
42083 </param>
42084 </interface>
42085 -<interface name="corenet_tcp_sendrecv_ssh_port" lineno="81972">
42086 +<interface name="corenet_tcp_sendrecv_ssh_port" lineno="81990">
42087 <summary>
42088 Send and receive TCP traffic on the ssh port.
42089 </summary>
42090 @@ -61269,7 +61353,7 @@ Domain allowed access.
42091 </param>
42092 <infoflow type="both" weight="10"/>
42093 </interface>
42094 -<interface name="corenet_udp_send_ssh_port" lineno="81987">
42095 +<interface name="corenet_udp_send_ssh_port" lineno="82005">
42096 <summary>
42097 Send UDP traffic on the ssh port.
42098 </summary>
42099 @@ -61280,7 +61364,7 @@ Domain allowed access.
42100 </param>
42101 <infoflow type="write" weight="10"/>
42102 </interface>
42103 -<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="82002">
42104 +<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="82020">
42105 <summary>
42106 Do not audit attempts to send UDP traffic on the ssh port.
42107 </summary>
42108 @@ -61291,7 +61375,7 @@ Domain to not audit.
42109 </param>
42110 <infoflow type="none"/>
42111 </interface>
42112 -<interface name="corenet_udp_receive_ssh_port" lineno="82017">
42113 +<interface name="corenet_udp_receive_ssh_port" lineno="82035">
42114 <summary>
42115 Receive UDP traffic on the ssh port.
42116 </summary>
42117 @@ -61302,7 +61386,7 @@ Domain allowed access.
42118 </param>
42119 <infoflow type="read" weight="10"/>
42120 </interface>
42121 -<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="82032">
42122 +<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="82050">
42123 <summary>
42124 Do not audit attempts to receive UDP traffic on the ssh port.
42125 </summary>
42126 @@ -61313,7 +61397,7 @@ Domain to not audit.
42127 </param>
42128 <infoflow type="none"/>
42129 </interface>
42130 -<interface name="corenet_udp_sendrecv_ssh_port" lineno="82047">
42131 +<interface name="corenet_udp_sendrecv_ssh_port" lineno="82065">
42132 <summary>
42133 Send and receive UDP traffic on the ssh port.
42134 </summary>
42135 @@ -61324,7 +61408,7 @@ Domain allowed access.
42136 </param>
42137 <infoflow type="both" weight="10"/>
42138 </interface>
42139 -<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="82063">
42140 +<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="82081">
42141 <summary>
42142 Do not audit attempts to send and receive
42143 UDP traffic on the ssh port.
42144 @@ -61336,7 +61420,7 @@ Domain to not audit.
42145 </param>
42146 <infoflow type="none"/>
42147 </interface>
42148 -<interface name="corenet_tcp_bind_ssh_port" lineno="82078">
42149 +<interface name="corenet_tcp_bind_ssh_port" lineno="82096">
42150 <summary>
42151 Bind TCP sockets to the ssh port.
42152 </summary>
42153 @@ -61347,7 +61431,7 @@ Domain allowed access.
42154 </param>
42155 <infoflow type="none"/>
42156 </interface>
42157 -<interface name="corenet_udp_bind_ssh_port" lineno="82098">
42158 +<interface name="corenet_udp_bind_ssh_port" lineno="82116">
42159 <summary>
42160 Bind UDP sockets to the ssh port.
42161 </summary>
42162 @@ -61358,7 +61442,7 @@ Domain allowed access.
42163 </param>
42164 <infoflow type="none"/>
42165 </interface>
42166 -<interface name="corenet_tcp_connect_ssh_port" lineno="82117">
42167 +<interface name="corenet_tcp_connect_ssh_port" lineno="82135">
42168 <summary>
42169 Make a TCP connection to the ssh port.
42170 </summary>
42171 @@ -61368,7 +61452,7 @@ Domain allowed access.
42172 </summary>
42173 </param>
42174 </interface>
42175 -<interface name="corenet_send_ssh_client_packets" lineno="82137">
42176 +<interface name="corenet_send_ssh_client_packets" lineno="82155">
42177 <summary>
42178 Send ssh_client packets.
42179 </summary>
42180 @@ -61379,7 +61463,7 @@ Domain allowed access.
42181 </param>
42182 <infoflow type="write" weight="10"/>
42183 </interface>
42184 -<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="82156">
42185 +<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="82174">
42186 <summary>
42187 Do not audit attempts to send ssh_client packets.
42188 </summary>
42189 @@ -61390,7 +61474,7 @@ Domain to not audit.
42190 </param>
42191 <infoflow type="none"/>
42192 </interface>
42193 -<interface name="corenet_receive_ssh_client_packets" lineno="82175">
42194 +<interface name="corenet_receive_ssh_client_packets" lineno="82193">
42195 <summary>
42196 Receive ssh_client packets.
42197 </summary>
42198 @@ -61401,7 +61485,7 @@ Domain allowed access.
42199 </param>
42200 <infoflow type="read" weight="10"/>
42201 </interface>
42202 -<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="82194">
42203 +<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="82212">
42204 <summary>
42205 Do not audit attempts to receive ssh_client packets.
42206 </summary>
42207 @@ -61412,7 +61496,7 @@ Domain allowed access.
42208 </param>
42209 <infoflow type="none"/>
42210 </interface>
42211 -<interface name="corenet_sendrecv_ssh_client_packets" lineno="82213">
42212 +<interface name="corenet_sendrecv_ssh_client_packets" lineno="82231">
42213 <summary>
42214 Send and receive ssh_client packets.
42215 </summary>
42216 @@ -61423,7 +61507,7 @@ Domain allowed access.
42217 </param>
42218 <infoflow type="both" weight="10"/>
42219 </interface>
42220 -<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="82229">
42221 +<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="82247">
42222 <summary>
42223 Do not audit attempts to send and receive ssh_client packets.
42224 </summary>
42225 @@ -61434,7 +61518,7 @@ Domain to not audit.
42226 </param>
42227 <infoflow type="none"/>
42228 </interface>
42229 -<interface name="corenet_relabelto_ssh_client_packets" lineno="82244">
42230 +<interface name="corenet_relabelto_ssh_client_packets" lineno="82262">
42231 <summary>
42232 Relabel packets to ssh_client the packet type.
42233 </summary>
42234 @@ -61444,7 +61528,7 @@ Domain allowed access.
42235 </summary>
42236 </param>
42237 </interface>
42238 -<interface name="corenet_send_ssh_server_packets" lineno="82264">
42239 +<interface name="corenet_send_ssh_server_packets" lineno="82282">
42240 <summary>
42241 Send ssh_server packets.
42242 </summary>
42243 @@ -61455,7 +61539,7 @@ Domain allowed access.
42244 </param>
42245 <infoflow type="write" weight="10"/>
42246 </interface>
42247 -<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="82283">
42248 +<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="82301">
42249 <summary>
42250 Do not audit attempts to send ssh_server packets.
42251 </summary>
42252 @@ -61466,7 +61550,7 @@ Domain to not audit.
42253 </param>
42254 <infoflow type="none"/>
42255 </interface>
42256 -<interface name="corenet_receive_ssh_server_packets" lineno="82302">
42257 +<interface name="corenet_receive_ssh_server_packets" lineno="82320">
42258 <summary>
42259 Receive ssh_server packets.
42260 </summary>
42261 @@ -61477,7 +61561,7 @@ Domain allowed access.
42262 </param>
42263 <infoflow type="read" weight="10"/>
42264 </interface>
42265 -<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="82321">
42266 +<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="82339">
42267 <summary>
42268 Do not audit attempts to receive ssh_server packets.
42269 </summary>
42270 @@ -61488,7 +61572,7 @@ Domain allowed access.
42271 </param>
42272 <infoflow type="none"/>
42273 </interface>
42274 -<interface name="corenet_sendrecv_ssh_server_packets" lineno="82340">
42275 +<interface name="corenet_sendrecv_ssh_server_packets" lineno="82358">
42276 <summary>
42277 Send and receive ssh_server packets.
42278 </summary>
42279 @@ -61499,7 +61583,7 @@ Domain allowed access.
42280 </param>
42281 <infoflow type="both" weight="10"/>
42282 </interface>
42283 -<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="82356">
42284 +<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="82374">
42285 <summary>
42286 Do not audit attempts to send and receive ssh_server packets.
42287 </summary>
42288 @@ -61510,7 +61594,7 @@ Domain to not audit.
42289 </param>
42290 <infoflow type="none"/>
42291 </interface>
42292 -<interface name="corenet_relabelto_ssh_server_packets" lineno="82371">
42293 +<interface name="corenet_relabelto_ssh_server_packets" lineno="82389">
42294 <summary>
42295 Relabel packets to ssh_server the packet type.
42296 </summary>
42297 @@ -61520,7 +61604,7 @@ Domain allowed access.
42298 </summary>
42299 </param>
42300 </interface>
42301 -<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="82393">
42302 +<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="82411">
42303 <summary>
42304 Send and receive TCP traffic on the stunnel port.
42305 </summary>
42306 @@ -61531,7 +61615,7 @@ Domain allowed access.
42307 </param>
42308 <infoflow type="both" weight="10"/>
42309 </interface>
42310 -<interface name="corenet_udp_send_stunnel_port" lineno="82408">
42311 +<interface name="corenet_udp_send_stunnel_port" lineno="82426">
42312 <summary>
42313 Send UDP traffic on the stunnel port.
42314 </summary>
42315 @@ -61542,7 +61626,7 @@ Domain allowed access.
42316 </param>
42317 <infoflow type="write" weight="10"/>
42318 </interface>
42319 -<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="82423">
42320 +<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="82441">
42321 <summary>
42322 Do not audit attempts to send UDP traffic on the stunnel port.
42323 </summary>
42324 @@ -61553,7 +61637,7 @@ Domain to not audit.
42325 </param>
42326 <infoflow type="none"/>
42327 </interface>
42328 -<interface name="corenet_udp_receive_stunnel_port" lineno="82438">
42329 +<interface name="corenet_udp_receive_stunnel_port" lineno="82456">
42330 <summary>
42331 Receive UDP traffic on the stunnel port.
42332 </summary>
42333 @@ -61564,7 +61648,7 @@ Domain allowed access.
42334 </param>
42335 <infoflow type="read" weight="10"/>
42336 </interface>
42337 -<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="82453">
42338 +<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="82471">
42339 <summary>
42340 Do not audit attempts to receive UDP traffic on the stunnel port.
42341 </summary>
42342 @@ -61575,7 +61659,7 @@ Domain to not audit.
42343 </param>
42344 <infoflow type="none"/>
42345 </interface>
42346 -<interface name="corenet_udp_sendrecv_stunnel_port" lineno="82468">
42347 +<interface name="corenet_udp_sendrecv_stunnel_port" lineno="82486">
42348 <summary>
42349 Send and receive UDP traffic on the stunnel port.
42350 </summary>
42351 @@ -61586,7 +61670,7 @@ Domain allowed access.
42352 </param>
42353 <infoflow type="both" weight="10"/>
42354 </interface>
42355 -<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="82484">
42356 +<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="82502">
42357 <summary>
42358 Do not audit attempts to send and receive
42359 UDP traffic on the stunnel port.
42360 @@ -61598,7 +61682,7 @@ Domain to not audit.
42361 </param>
42362 <infoflow type="none"/>
42363 </interface>
42364 -<interface name="corenet_tcp_bind_stunnel_port" lineno="82499">
42365 +<interface name="corenet_tcp_bind_stunnel_port" lineno="82517">
42366 <summary>
42367 Bind TCP sockets to the stunnel port.
42368 </summary>
42369 @@ -61609,7 +61693,7 @@ Domain allowed access.
42370 </param>
42371 <infoflow type="none"/>
42372 </interface>
42373 -<interface name="corenet_udp_bind_stunnel_port" lineno="82519">
42374 +<interface name="corenet_udp_bind_stunnel_port" lineno="82537">
42375 <summary>
42376 Bind UDP sockets to the stunnel port.
42377 </summary>
42378 @@ -61620,7 +61704,7 @@ Domain allowed access.
42379 </param>
42380 <infoflow type="none"/>
42381 </interface>
42382 -<interface name="corenet_tcp_connect_stunnel_port" lineno="82538">
42383 +<interface name="corenet_tcp_connect_stunnel_port" lineno="82556">
42384 <summary>
42385 Make a TCP connection to the stunnel port.
42386 </summary>
42387 @@ -61630,7 +61714,7 @@ Domain allowed access.
42388 </summary>
42389 </param>
42390 </interface>
42391 -<interface name="corenet_send_stunnel_client_packets" lineno="82558">
42392 +<interface name="corenet_send_stunnel_client_packets" lineno="82576">
42393 <summary>
42394 Send stunnel_client packets.
42395 </summary>
42396 @@ -61641,7 +61725,7 @@ Domain allowed access.
42397 </param>
42398 <infoflow type="write" weight="10"/>
42399 </interface>
42400 -<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="82577">
42401 +<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="82595">
42402 <summary>
42403 Do not audit attempts to send stunnel_client packets.
42404 </summary>
42405 @@ -61652,7 +61736,7 @@ Domain to not audit.
42406 </param>
42407 <infoflow type="none"/>
42408 </interface>
42409 -<interface name="corenet_receive_stunnel_client_packets" lineno="82596">
42410 +<interface name="corenet_receive_stunnel_client_packets" lineno="82614">
42411 <summary>
42412 Receive stunnel_client packets.
42413 </summary>
42414 @@ -61663,7 +61747,7 @@ Domain allowed access.
42415 </param>
42416 <infoflow type="read" weight="10"/>
42417 </interface>
42418 -<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="82615">
42419 +<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="82633">
42420 <summary>
42421 Do not audit attempts to receive stunnel_client packets.
42422 </summary>
42423 @@ -61674,7 +61758,7 @@ Domain allowed access.
42424 </param>
42425 <infoflow type="none"/>
42426 </interface>
42427 -<interface name="corenet_sendrecv_stunnel_client_packets" lineno="82634">
42428 +<interface name="corenet_sendrecv_stunnel_client_packets" lineno="82652">
42429 <summary>
42430 Send and receive stunnel_client packets.
42431 </summary>
42432 @@ -61685,7 +61769,7 @@ Domain allowed access.
42433 </param>
42434 <infoflow type="both" weight="10"/>
42435 </interface>
42436 -<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="82650">
42437 +<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="82668">
42438 <summary>
42439 Do not audit attempts to send and receive stunnel_client packets.
42440 </summary>
42441 @@ -61696,7 +61780,7 @@ Domain to not audit.
42442 </param>
42443 <infoflow type="none"/>
42444 </interface>
42445 -<interface name="corenet_relabelto_stunnel_client_packets" lineno="82665">
42446 +<interface name="corenet_relabelto_stunnel_client_packets" lineno="82683">
42447 <summary>
42448 Relabel packets to stunnel_client the packet type.
42449 </summary>
42450 @@ -61706,7 +61790,7 @@ Domain allowed access.
42451 </summary>
42452 </param>
42453 </interface>
42454 -<interface name="corenet_send_stunnel_server_packets" lineno="82685">
42455 +<interface name="corenet_send_stunnel_server_packets" lineno="82703">
42456 <summary>
42457 Send stunnel_server packets.
42458 </summary>
42459 @@ -61717,7 +61801,7 @@ Domain allowed access.
42460 </param>
42461 <infoflow type="write" weight="10"/>
42462 </interface>
42463 -<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="82704">
42464 +<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="82722">
42465 <summary>
42466 Do not audit attempts to send stunnel_server packets.
42467 </summary>
42468 @@ -61728,7 +61812,7 @@ Domain to not audit.
42469 </param>
42470 <infoflow type="none"/>
42471 </interface>
42472 -<interface name="corenet_receive_stunnel_server_packets" lineno="82723">
42473 +<interface name="corenet_receive_stunnel_server_packets" lineno="82741">
42474 <summary>
42475 Receive stunnel_server packets.
42476 </summary>
42477 @@ -61739,7 +61823,7 @@ Domain allowed access.
42478 </param>
42479 <infoflow type="read" weight="10"/>
42480 </interface>
42481 -<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="82742">
42482 +<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="82760">
42483 <summary>
42484 Do not audit attempts to receive stunnel_server packets.
42485 </summary>
42486 @@ -61750,7 +61834,7 @@ Domain allowed access.
42487 </param>
42488 <infoflow type="none"/>
42489 </interface>
42490 -<interface name="corenet_sendrecv_stunnel_server_packets" lineno="82761">
42491 +<interface name="corenet_sendrecv_stunnel_server_packets" lineno="82779">
42492 <summary>
42493 Send and receive stunnel_server packets.
42494 </summary>
42495 @@ -61761,7 +61845,7 @@ Domain allowed access.
42496 </param>
42497 <infoflow type="both" weight="10"/>
42498 </interface>
42499 -<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="82777">
42500 +<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="82795">
42501 <summary>
42502 Do not audit attempts to send and receive stunnel_server packets.
42503 </summary>
42504 @@ -61772,7 +61856,7 @@ Domain to not audit.
42505 </param>
42506 <infoflow type="none"/>
42507 </interface>
42508 -<interface name="corenet_relabelto_stunnel_server_packets" lineno="82792">
42509 +<interface name="corenet_relabelto_stunnel_server_packets" lineno="82810">
42510 <summary>
42511 Relabel packets to stunnel_server the packet type.
42512 </summary>
42513 @@ -61782,7 +61866,7 @@ Domain allowed access.
42514 </summary>
42515 </param>
42516 </interface>
42517 -<interface name="corenet_tcp_sendrecv_svn_port" lineno="82814">
42518 +<interface name="corenet_tcp_sendrecv_svn_port" lineno="82832">
42519 <summary>
42520 Send and receive TCP traffic on the svn port.
42521 </summary>
42522 @@ -61793,7 +61877,7 @@ Domain allowed access.
42523 </param>
42524 <infoflow type="both" weight="10"/>
42525 </interface>
42526 -<interface name="corenet_udp_send_svn_port" lineno="82829">
42527 +<interface name="corenet_udp_send_svn_port" lineno="82847">
42528 <summary>
42529 Send UDP traffic on the svn port.
42530 </summary>
42531 @@ -61804,7 +61888,7 @@ Domain allowed access.
42532 </param>
42533 <infoflow type="write" weight="10"/>
42534 </interface>
42535 -<interface name="corenet_dontaudit_udp_send_svn_port" lineno="82844">
42536 +<interface name="corenet_dontaudit_udp_send_svn_port" lineno="82862">
42537 <summary>
42538 Do not audit attempts to send UDP traffic on the svn port.
42539 </summary>
42540 @@ -61815,7 +61899,7 @@ Domain to not audit.
42541 </param>
42542 <infoflow type="none"/>
42543 </interface>
42544 -<interface name="corenet_udp_receive_svn_port" lineno="82859">
42545 +<interface name="corenet_udp_receive_svn_port" lineno="82877">
42546 <summary>
42547 Receive UDP traffic on the svn port.
42548 </summary>
42549 @@ -61826,7 +61910,7 @@ Domain allowed access.
42550 </param>
42551 <infoflow type="read" weight="10"/>
42552 </interface>
42553 -<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="82874">
42554 +<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="82892">
42555 <summary>
42556 Do not audit attempts to receive UDP traffic on the svn port.
42557 </summary>
42558 @@ -61837,7 +61921,7 @@ Domain to not audit.
42559 </param>
42560 <infoflow type="none"/>
42561 </interface>
42562 -<interface name="corenet_udp_sendrecv_svn_port" lineno="82889">
42563 +<interface name="corenet_udp_sendrecv_svn_port" lineno="82907">
42564 <summary>
42565 Send and receive UDP traffic on the svn port.
42566 </summary>
42567 @@ -61848,7 +61932,7 @@ Domain allowed access.
42568 </param>
42569 <infoflow type="both" weight="10"/>
42570 </interface>
42571 -<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="82905">
42572 +<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="82923">
42573 <summary>
42574 Do not audit attempts to send and receive
42575 UDP traffic on the svn port.
42576 @@ -61860,7 +61944,7 @@ Domain to not audit.
42577 </param>
42578 <infoflow type="none"/>
42579 </interface>
42580 -<interface name="corenet_tcp_bind_svn_port" lineno="82920">
42581 +<interface name="corenet_tcp_bind_svn_port" lineno="82938">
42582 <summary>
42583 Bind TCP sockets to the svn port.
42584 </summary>
42585 @@ -61871,7 +61955,7 @@ Domain allowed access.
42586 </param>
42587 <infoflow type="none"/>
42588 </interface>
42589 -<interface name="corenet_udp_bind_svn_port" lineno="82940">
42590 +<interface name="corenet_udp_bind_svn_port" lineno="82958">
42591 <summary>
42592 Bind UDP sockets to the svn port.
42593 </summary>
42594 @@ -61882,7 +61966,7 @@ Domain allowed access.
42595 </param>
42596 <infoflow type="none"/>
42597 </interface>
42598 -<interface name="corenet_tcp_connect_svn_port" lineno="82959">
42599 +<interface name="corenet_tcp_connect_svn_port" lineno="82977">
42600 <summary>
42601 Make a TCP connection to the svn port.
42602 </summary>
42603 @@ -61892,7 +61976,7 @@ Domain allowed access.
42604 </summary>
42605 </param>
42606 </interface>
42607 -<interface name="corenet_send_svn_client_packets" lineno="82979">
42608 +<interface name="corenet_send_svn_client_packets" lineno="82997">
42609 <summary>
42610 Send svn_client packets.
42611 </summary>
42612 @@ -61903,7 +61987,7 @@ Domain allowed access.
42613 </param>
42614 <infoflow type="write" weight="10"/>
42615 </interface>
42616 -<interface name="corenet_dontaudit_send_svn_client_packets" lineno="82998">
42617 +<interface name="corenet_dontaudit_send_svn_client_packets" lineno="83016">
42618 <summary>
42619 Do not audit attempts to send svn_client packets.
42620 </summary>
42621 @@ -61914,7 +61998,7 @@ Domain to not audit.
42622 </param>
42623 <infoflow type="none"/>
42624 </interface>
42625 -<interface name="corenet_receive_svn_client_packets" lineno="83017">
42626 +<interface name="corenet_receive_svn_client_packets" lineno="83035">
42627 <summary>
42628 Receive svn_client packets.
42629 </summary>
42630 @@ -61925,7 +62009,7 @@ Domain allowed access.
42631 </param>
42632 <infoflow type="read" weight="10"/>
42633 </interface>
42634 -<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="83036">
42635 +<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="83054">
42636 <summary>
42637 Do not audit attempts to receive svn_client packets.
42638 </summary>
42639 @@ -61936,7 +62020,7 @@ Domain allowed access.
42640 </param>
42641 <infoflow type="none"/>
42642 </interface>
42643 -<interface name="corenet_sendrecv_svn_client_packets" lineno="83055">
42644 +<interface name="corenet_sendrecv_svn_client_packets" lineno="83073">
42645 <summary>
42646 Send and receive svn_client packets.
42647 </summary>
42648 @@ -61947,7 +62031,7 @@ Domain allowed access.
42649 </param>
42650 <infoflow type="both" weight="10"/>
42651 </interface>
42652 -<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="83071">
42653 +<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="83089">
42654 <summary>
42655 Do not audit attempts to send and receive svn_client packets.
42656 </summary>
42657 @@ -61958,7 +62042,7 @@ Domain to not audit.
42658 </param>
42659 <infoflow type="none"/>
42660 </interface>
42661 -<interface name="corenet_relabelto_svn_client_packets" lineno="83086">
42662 +<interface name="corenet_relabelto_svn_client_packets" lineno="83104">
42663 <summary>
42664 Relabel packets to svn_client the packet type.
42665 </summary>
42666 @@ -61968,7 +62052,7 @@ Domain allowed access.
42667 </summary>
42668 </param>
42669 </interface>
42670 -<interface name="corenet_send_svn_server_packets" lineno="83106">
42671 +<interface name="corenet_send_svn_server_packets" lineno="83124">
42672 <summary>
42673 Send svn_server packets.
42674 </summary>
42675 @@ -61979,7 +62063,7 @@ Domain allowed access.
42676 </param>
42677 <infoflow type="write" weight="10"/>
42678 </interface>
42679 -<interface name="corenet_dontaudit_send_svn_server_packets" lineno="83125">
42680 +<interface name="corenet_dontaudit_send_svn_server_packets" lineno="83143">
42681 <summary>
42682 Do not audit attempts to send svn_server packets.
42683 </summary>
42684 @@ -61990,7 +62074,7 @@ Domain to not audit.
42685 </param>
42686 <infoflow type="none"/>
42687 </interface>
42688 -<interface name="corenet_receive_svn_server_packets" lineno="83144">
42689 +<interface name="corenet_receive_svn_server_packets" lineno="83162">
42690 <summary>
42691 Receive svn_server packets.
42692 </summary>
42693 @@ -62001,7 +62085,7 @@ Domain allowed access.
42694 </param>
42695 <infoflow type="read" weight="10"/>
42696 </interface>
42697 -<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="83163">
42698 +<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="83181">
42699 <summary>
42700 Do not audit attempts to receive svn_server packets.
42701 </summary>
42702 @@ -62012,7 +62096,7 @@ Domain allowed access.
42703 </param>
42704 <infoflow type="none"/>
42705 </interface>
42706 -<interface name="corenet_sendrecv_svn_server_packets" lineno="83182">
42707 +<interface name="corenet_sendrecv_svn_server_packets" lineno="83200">
42708 <summary>
42709 Send and receive svn_server packets.
42710 </summary>
42711 @@ -62023,7 +62107,7 @@ Domain allowed access.
42712 </param>
42713 <infoflow type="both" weight="10"/>
42714 </interface>
42715 -<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="83198">
42716 +<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="83216">
42717 <summary>
42718 Do not audit attempts to send and receive svn_server packets.
42719 </summary>
42720 @@ -62034,7 +62118,7 @@ Domain to not audit.
42721 </param>
42722 <infoflow type="none"/>
42723 </interface>
42724 -<interface name="corenet_relabelto_svn_server_packets" lineno="83213">
42725 +<interface name="corenet_relabelto_svn_server_packets" lineno="83231">
42726 <summary>
42727 Relabel packets to svn_server the packet type.
42728 </summary>
42729 @@ -62044,7 +62128,7 @@ Domain allowed access.
42730 </summary>
42731 </param>
42732 </interface>
42733 -<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="83235">
42734 +<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="83253">
42735 <summary>
42736 Send and receive TCP traffic on the svrloc port.
42737 </summary>
42738 @@ -62055,7 +62139,7 @@ Domain allowed access.
42739 </param>
42740 <infoflow type="both" weight="10"/>
42741 </interface>
42742 -<interface name="corenet_udp_send_svrloc_port" lineno="83250">
42743 +<interface name="corenet_udp_send_svrloc_port" lineno="83268">
42744 <summary>
42745 Send UDP traffic on the svrloc port.
42746 </summary>
42747 @@ -62066,7 +62150,7 @@ Domain allowed access.
42748 </param>
42749 <infoflow type="write" weight="10"/>
42750 </interface>
42751 -<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="83265">
42752 +<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="83283">
42753 <summary>
42754 Do not audit attempts to send UDP traffic on the svrloc port.
42755 </summary>
42756 @@ -62077,7 +62161,7 @@ Domain to not audit.
42757 </param>
42758 <infoflow type="none"/>
42759 </interface>
42760 -<interface name="corenet_udp_receive_svrloc_port" lineno="83280">
42761 +<interface name="corenet_udp_receive_svrloc_port" lineno="83298">
42762 <summary>
42763 Receive UDP traffic on the svrloc port.
42764 </summary>
42765 @@ -62088,7 +62172,7 @@ Domain allowed access.
42766 </param>
42767 <infoflow type="read" weight="10"/>
42768 </interface>
42769 -<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="83295">
42770 +<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="83313">
42771 <summary>
42772 Do not audit attempts to receive UDP traffic on the svrloc port.
42773 </summary>
42774 @@ -62099,7 +62183,7 @@ Domain to not audit.
42775 </param>
42776 <infoflow type="none"/>
42777 </interface>
42778 -<interface name="corenet_udp_sendrecv_svrloc_port" lineno="83310">
42779 +<interface name="corenet_udp_sendrecv_svrloc_port" lineno="83328">
42780 <summary>
42781 Send and receive UDP traffic on the svrloc port.
42782 </summary>
42783 @@ -62110,7 +62194,7 @@ Domain allowed access.
42784 </param>
42785 <infoflow type="both" weight="10"/>
42786 </interface>
42787 -<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="83326">
42788 +<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="83344">
42789 <summary>
42790 Do not audit attempts to send and receive
42791 UDP traffic on the svrloc port.
42792 @@ -62122,7 +62206,7 @@ Domain to not audit.
42793 </param>
42794 <infoflow type="none"/>
42795 </interface>
42796 -<interface name="corenet_tcp_bind_svrloc_port" lineno="83341">
42797 +<interface name="corenet_tcp_bind_svrloc_port" lineno="83359">
42798 <summary>
42799 Bind TCP sockets to the svrloc port.
42800 </summary>
42801 @@ -62133,7 +62217,7 @@ Domain allowed access.
42802 </param>
42803 <infoflow type="none"/>
42804 </interface>
42805 -<interface name="corenet_udp_bind_svrloc_port" lineno="83361">
42806 +<interface name="corenet_udp_bind_svrloc_port" lineno="83379">
42807 <summary>
42808 Bind UDP sockets to the svrloc port.
42809 </summary>
42810 @@ -62144,7 +62228,7 @@ Domain allowed access.
42811 </param>
42812 <infoflow type="none"/>
42813 </interface>
42814 -<interface name="corenet_tcp_connect_svrloc_port" lineno="83380">
42815 +<interface name="corenet_tcp_connect_svrloc_port" lineno="83398">
42816 <summary>
42817 Make a TCP connection to the svrloc port.
42818 </summary>
42819 @@ -62154,7 +62238,7 @@ Domain allowed access.
42820 </summary>
42821 </param>
42822 </interface>
42823 -<interface name="corenet_send_svrloc_client_packets" lineno="83400">
42824 +<interface name="corenet_send_svrloc_client_packets" lineno="83418">
42825 <summary>
42826 Send svrloc_client packets.
42827 </summary>
42828 @@ -62165,7 +62249,7 @@ Domain allowed access.
42829 </param>
42830 <infoflow type="write" weight="10"/>
42831 </interface>
42832 -<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="83419">
42833 +<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="83437">
42834 <summary>
42835 Do not audit attempts to send svrloc_client packets.
42836 </summary>
42837 @@ -62176,7 +62260,7 @@ Domain to not audit.
42838 </param>
42839 <infoflow type="none"/>
42840 </interface>
42841 -<interface name="corenet_receive_svrloc_client_packets" lineno="83438">
42842 +<interface name="corenet_receive_svrloc_client_packets" lineno="83456">
42843 <summary>
42844 Receive svrloc_client packets.
42845 </summary>
42846 @@ -62187,7 +62271,7 @@ Domain allowed access.
42847 </param>
42848 <infoflow type="read" weight="10"/>
42849 </interface>
42850 -<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="83457">
42851 +<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="83475">
42852 <summary>
42853 Do not audit attempts to receive svrloc_client packets.
42854 </summary>
42855 @@ -62198,7 +62282,7 @@ Domain allowed access.
42856 </param>
42857 <infoflow type="none"/>
42858 </interface>
42859 -<interface name="corenet_sendrecv_svrloc_client_packets" lineno="83476">
42860 +<interface name="corenet_sendrecv_svrloc_client_packets" lineno="83494">
42861 <summary>
42862 Send and receive svrloc_client packets.
42863 </summary>
42864 @@ -62209,7 +62293,7 @@ Domain allowed access.
42865 </param>
42866 <infoflow type="both" weight="10"/>
42867 </interface>
42868 -<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="83492">
42869 +<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="83510">
42870 <summary>
42871 Do not audit attempts to send and receive svrloc_client packets.
42872 </summary>
42873 @@ -62220,7 +62304,7 @@ Domain to not audit.
42874 </param>
42875 <infoflow type="none"/>
42876 </interface>
42877 -<interface name="corenet_relabelto_svrloc_client_packets" lineno="83507">
42878 +<interface name="corenet_relabelto_svrloc_client_packets" lineno="83525">
42879 <summary>
42880 Relabel packets to svrloc_client the packet type.
42881 </summary>
42882 @@ -62230,7 +62314,7 @@ Domain allowed access.
42883 </summary>
42884 </param>
42885 </interface>
42886 -<interface name="corenet_send_svrloc_server_packets" lineno="83527">
42887 +<interface name="corenet_send_svrloc_server_packets" lineno="83545">
42888 <summary>
42889 Send svrloc_server packets.
42890 </summary>
42891 @@ -62241,7 +62325,7 @@ Domain allowed access.
42892 </param>
42893 <infoflow type="write" weight="10"/>
42894 </interface>
42895 -<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="83546">
42896 +<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="83564">
42897 <summary>
42898 Do not audit attempts to send svrloc_server packets.
42899 </summary>
42900 @@ -62252,7 +62336,7 @@ Domain to not audit.
42901 </param>
42902 <infoflow type="none"/>
42903 </interface>
42904 -<interface name="corenet_receive_svrloc_server_packets" lineno="83565">
42905 +<interface name="corenet_receive_svrloc_server_packets" lineno="83583">
42906 <summary>
42907 Receive svrloc_server packets.
42908 </summary>
42909 @@ -62263,7 +62347,7 @@ Domain allowed access.
42910 </param>
42911 <infoflow type="read" weight="10"/>
42912 </interface>
42913 -<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="83584">
42914 +<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="83602">
42915 <summary>
42916 Do not audit attempts to receive svrloc_server packets.
42917 </summary>
42918 @@ -62274,7 +62358,7 @@ Domain allowed access.
42919 </param>
42920 <infoflow type="none"/>
42921 </interface>
42922 -<interface name="corenet_sendrecv_svrloc_server_packets" lineno="83603">
42923 +<interface name="corenet_sendrecv_svrloc_server_packets" lineno="83621">
42924 <summary>
42925 Send and receive svrloc_server packets.
42926 </summary>
42927 @@ -62285,7 +62369,7 @@ Domain allowed access.
42928 </param>
42929 <infoflow type="both" weight="10"/>
42930 </interface>
42931 -<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="83619">
42932 +<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="83637">
42933 <summary>
42934 Do not audit attempts to send and receive svrloc_server packets.
42935 </summary>
42936 @@ -62296,7 +62380,7 @@ Domain to not audit.
42937 </param>
42938 <infoflow type="none"/>
42939 </interface>
42940 -<interface name="corenet_relabelto_svrloc_server_packets" lineno="83634">
42941 +<interface name="corenet_relabelto_svrloc_server_packets" lineno="83652">
42942 <summary>
42943 Relabel packets to svrloc_server the packet type.
42944 </summary>
42945 @@ -62306,7 +62390,7 @@ Domain allowed access.
42946 </summary>
42947 </param>
42948 </interface>
42949 -<interface name="corenet_tcp_sendrecv_swat_port" lineno="83656">
42950 +<interface name="corenet_tcp_sendrecv_swat_port" lineno="83674">
42951 <summary>
42952 Send and receive TCP traffic on the swat port.
42953 </summary>
42954 @@ -62317,7 +62401,7 @@ Domain allowed access.
42955 </param>
42956 <infoflow type="both" weight="10"/>
42957 </interface>
42958 -<interface name="corenet_udp_send_swat_port" lineno="83671">
42959 +<interface name="corenet_udp_send_swat_port" lineno="83689">
42960 <summary>
42961 Send UDP traffic on the swat port.
42962 </summary>
42963 @@ -62328,7 +62412,7 @@ Domain allowed access.
42964 </param>
42965 <infoflow type="write" weight="10"/>
42966 </interface>
42967 -<interface name="corenet_dontaudit_udp_send_swat_port" lineno="83686">
42968 +<interface name="corenet_dontaudit_udp_send_swat_port" lineno="83704">
42969 <summary>
42970 Do not audit attempts to send UDP traffic on the swat port.
42971 </summary>
42972 @@ -62339,7 +62423,7 @@ Domain to not audit.
42973 </param>
42974 <infoflow type="none"/>
42975 </interface>
42976 -<interface name="corenet_udp_receive_swat_port" lineno="83701">
42977 +<interface name="corenet_udp_receive_swat_port" lineno="83719">
42978 <summary>
42979 Receive UDP traffic on the swat port.
42980 </summary>
42981 @@ -62350,7 +62434,7 @@ Domain allowed access.
42982 </param>
42983 <infoflow type="read" weight="10"/>
42984 </interface>
42985 -<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="83716">
42986 +<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="83734">
42987 <summary>
42988 Do not audit attempts to receive UDP traffic on the swat port.
42989 </summary>
42990 @@ -62361,7 +62445,7 @@ Domain to not audit.
42991 </param>
42992 <infoflow type="none"/>
42993 </interface>
42994 -<interface name="corenet_udp_sendrecv_swat_port" lineno="83731">
42995 +<interface name="corenet_udp_sendrecv_swat_port" lineno="83749">
42996 <summary>
42997 Send and receive UDP traffic on the swat port.
42998 </summary>
42999 @@ -62372,7 +62456,7 @@ Domain allowed access.
43000 </param>
43001 <infoflow type="both" weight="10"/>
43002 </interface>
43003 -<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="83747">
43004 +<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="83765">
43005 <summary>
43006 Do not audit attempts to send and receive
43007 UDP traffic on the swat port.
43008 @@ -62384,7 +62468,7 @@ Domain to not audit.
43009 </param>
43010 <infoflow type="none"/>
43011 </interface>
43012 -<interface name="corenet_tcp_bind_swat_port" lineno="83762">
43013 +<interface name="corenet_tcp_bind_swat_port" lineno="83780">
43014 <summary>
43015 Bind TCP sockets to the swat port.
43016 </summary>
43017 @@ -62395,7 +62479,7 @@ Domain allowed access.
43018 </param>
43019 <infoflow type="none"/>
43020 </interface>
43021 -<interface name="corenet_udp_bind_swat_port" lineno="83782">
43022 +<interface name="corenet_udp_bind_swat_port" lineno="83800">
43023 <summary>
43024 Bind UDP sockets to the swat port.
43025 </summary>
43026 @@ -62406,7 +62490,7 @@ Domain allowed access.
43027 </param>
43028 <infoflow type="none"/>
43029 </interface>
43030 -<interface name="corenet_tcp_connect_swat_port" lineno="83801">
43031 +<interface name="corenet_tcp_connect_swat_port" lineno="83819">
43032 <summary>
43033 Make a TCP connection to the swat port.
43034 </summary>
43035 @@ -62416,7 +62500,7 @@ Domain allowed access.
43036 </summary>
43037 </param>
43038 </interface>
43039 -<interface name="corenet_send_swat_client_packets" lineno="83821">
43040 +<interface name="corenet_send_swat_client_packets" lineno="83839">
43041 <summary>
43042 Send swat_client packets.
43043 </summary>
43044 @@ -62427,7 +62511,7 @@ Domain allowed access.
43045 </param>
43046 <infoflow type="write" weight="10"/>
43047 </interface>
43048 -<interface name="corenet_dontaudit_send_swat_client_packets" lineno="83840">
43049 +<interface name="corenet_dontaudit_send_swat_client_packets" lineno="83858">
43050 <summary>
43051 Do not audit attempts to send swat_client packets.
43052 </summary>
43053 @@ -62438,7 +62522,7 @@ Domain to not audit.
43054 </param>
43055 <infoflow type="none"/>
43056 </interface>
43057 -<interface name="corenet_receive_swat_client_packets" lineno="83859">
43058 +<interface name="corenet_receive_swat_client_packets" lineno="83877">
43059 <summary>
43060 Receive swat_client packets.
43061 </summary>
43062 @@ -62449,7 +62533,7 @@ Domain allowed access.
43063 </param>
43064 <infoflow type="read" weight="10"/>
43065 </interface>
43066 -<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="83878">
43067 +<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="83896">
43068 <summary>
43069 Do not audit attempts to receive swat_client packets.
43070 </summary>
43071 @@ -62460,7 +62544,7 @@ Domain allowed access.
43072 </param>
43073 <infoflow type="none"/>
43074 </interface>
43075 -<interface name="corenet_sendrecv_swat_client_packets" lineno="83897">
43076 +<interface name="corenet_sendrecv_swat_client_packets" lineno="83915">
43077 <summary>
43078 Send and receive swat_client packets.
43079 </summary>
43080 @@ -62471,7 +62555,7 @@ Domain allowed access.
43081 </param>
43082 <infoflow type="both" weight="10"/>
43083 </interface>
43084 -<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="83913">
43085 +<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="83931">
43086 <summary>
43087 Do not audit attempts to send and receive swat_client packets.
43088 </summary>
43089 @@ -62482,7 +62566,7 @@ Domain to not audit.
43090 </param>
43091 <infoflow type="none"/>
43092 </interface>
43093 -<interface name="corenet_relabelto_swat_client_packets" lineno="83928">
43094 +<interface name="corenet_relabelto_swat_client_packets" lineno="83946">
43095 <summary>
43096 Relabel packets to swat_client the packet type.
43097 </summary>
43098 @@ -62492,7 +62576,7 @@ Domain allowed access.
43099 </summary>
43100 </param>
43101 </interface>
43102 -<interface name="corenet_send_swat_server_packets" lineno="83948">
43103 +<interface name="corenet_send_swat_server_packets" lineno="83966">
43104 <summary>
43105 Send swat_server packets.
43106 </summary>
43107 @@ -62503,7 +62587,7 @@ Domain allowed access.
43108 </param>
43109 <infoflow type="write" weight="10"/>
43110 </interface>
43111 -<interface name="corenet_dontaudit_send_swat_server_packets" lineno="83967">
43112 +<interface name="corenet_dontaudit_send_swat_server_packets" lineno="83985">
43113 <summary>
43114 Do not audit attempts to send swat_server packets.
43115 </summary>
43116 @@ -62514,7 +62598,7 @@ Domain to not audit.
43117 </param>
43118 <infoflow type="none"/>
43119 </interface>
43120 -<interface name="corenet_receive_swat_server_packets" lineno="83986">
43121 +<interface name="corenet_receive_swat_server_packets" lineno="84004">
43122 <summary>
43123 Receive swat_server packets.
43124 </summary>
43125 @@ -62525,7 +62609,7 @@ Domain allowed access.
43126 </param>
43127 <infoflow type="read" weight="10"/>
43128 </interface>
43129 -<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="84005">
43130 +<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="84023">
43131 <summary>
43132 Do not audit attempts to receive swat_server packets.
43133 </summary>
43134 @@ -62536,7 +62620,7 @@ Domain allowed access.
43135 </param>
43136 <infoflow type="none"/>
43137 </interface>
43138 -<interface name="corenet_sendrecv_swat_server_packets" lineno="84024">
43139 +<interface name="corenet_sendrecv_swat_server_packets" lineno="84042">
43140 <summary>
43141 Send and receive swat_server packets.
43142 </summary>
43143 @@ -62547,7 +62631,7 @@ Domain allowed access.
43144 </param>
43145 <infoflow type="both" weight="10"/>
43146 </interface>
43147 -<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="84040">
43148 +<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="84058">
43149 <summary>
43150 Do not audit attempts to send and receive swat_server packets.
43151 </summary>
43152 @@ -62558,7 +62642,7 @@ Domain to not audit.
43153 </param>
43154 <infoflow type="none"/>
43155 </interface>
43156 -<interface name="corenet_relabelto_swat_server_packets" lineno="84055">
43157 +<interface name="corenet_relabelto_swat_server_packets" lineno="84073">
43158 <summary>
43159 Relabel packets to swat_server the packet type.
43160 </summary>
43161 @@ -62568,7 +62652,7 @@ Domain allowed access.
43162 </summary>
43163 </param>
43164 </interface>
43165 -<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="84077">
43166 +<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="84095">
43167 <summary>
43168 Send and receive TCP traffic on the syncthing port.
43169 </summary>
43170 @@ -62579,7 +62663,7 @@ Domain allowed access.
43171 </param>
43172 <infoflow type="both" weight="10"/>
43173 </interface>
43174 -<interface name="corenet_udp_send_syncthing_port" lineno="84092">
43175 +<interface name="corenet_udp_send_syncthing_port" lineno="84110">
43176 <summary>
43177 Send UDP traffic on the syncthing port.
43178 </summary>
43179 @@ -62590,7 +62674,7 @@ Domain allowed access.
43180 </param>
43181 <infoflow type="write" weight="10"/>
43182 </interface>
43183 -<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="84107">
43184 +<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="84125">
43185 <summary>
43186 Do not audit attempts to send UDP traffic on the syncthing port.
43187 </summary>
43188 @@ -62601,7 +62685,7 @@ Domain to not audit.
43189 </param>
43190 <infoflow type="none"/>
43191 </interface>
43192 -<interface name="corenet_udp_receive_syncthing_port" lineno="84122">
43193 +<interface name="corenet_udp_receive_syncthing_port" lineno="84140">
43194 <summary>
43195 Receive UDP traffic on the syncthing port.
43196 </summary>
43197 @@ -62612,7 +62696,7 @@ Domain allowed access.
43198 </param>
43199 <infoflow type="read" weight="10"/>
43200 </interface>
43201 -<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="84137">
43202 +<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="84155">
43203 <summary>
43204 Do not audit attempts to receive UDP traffic on the syncthing port.
43205 </summary>
43206 @@ -62623,7 +62707,7 @@ Domain to not audit.
43207 </param>
43208 <infoflow type="none"/>
43209 </interface>
43210 -<interface name="corenet_udp_sendrecv_syncthing_port" lineno="84152">
43211 +<interface name="corenet_udp_sendrecv_syncthing_port" lineno="84170">
43212 <summary>
43213 Send and receive UDP traffic on the syncthing port.
43214 </summary>
43215 @@ -62634,7 +62718,7 @@ Domain allowed access.
43216 </param>
43217 <infoflow type="both" weight="10"/>
43218 </interface>
43219 -<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="84168">
43220 +<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="84186">
43221 <summary>
43222 Do not audit attempts to send and receive
43223 UDP traffic on the syncthing port.
43224 @@ -62646,7 +62730,7 @@ Domain to not audit.
43225 </param>
43226 <infoflow type="none"/>
43227 </interface>
43228 -<interface name="corenet_tcp_bind_syncthing_port" lineno="84183">
43229 +<interface name="corenet_tcp_bind_syncthing_port" lineno="84201">
43230 <summary>
43231 Bind TCP sockets to the syncthing port.
43232 </summary>
43233 @@ -62657,7 +62741,7 @@ Domain allowed access.
43234 </param>
43235 <infoflow type="none"/>
43236 </interface>
43237 -<interface name="corenet_udp_bind_syncthing_port" lineno="84203">
43238 +<interface name="corenet_udp_bind_syncthing_port" lineno="84221">
43239 <summary>
43240 Bind UDP sockets to the syncthing port.
43241 </summary>
43242 @@ -62668,7 +62752,7 @@ Domain allowed access.
43243 </param>
43244 <infoflow type="none"/>
43245 </interface>
43246 -<interface name="corenet_tcp_connect_syncthing_port" lineno="84222">
43247 +<interface name="corenet_tcp_connect_syncthing_port" lineno="84240">
43248 <summary>
43249 Make a TCP connection to the syncthing port.
43250 </summary>
43251 @@ -62678,7 +62762,7 @@ Domain allowed access.
43252 </summary>
43253 </param>
43254 </interface>
43255 -<interface name="corenet_send_syncthing_client_packets" lineno="84242">
43256 +<interface name="corenet_send_syncthing_client_packets" lineno="84260">
43257 <summary>
43258 Send syncthing_client packets.
43259 </summary>
43260 @@ -62689,7 +62773,7 @@ Domain allowed access.
43261 </param>
43262 <infoflow type="write" weight="10"/>
43263 </interface>
43264 -<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="84261">
43265 +<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="84279">
43266 <summary>
43267 Do not audit attempts to send syncthing_client packets.
43268 </summary>
43269 @@ -62700,7 +62784,7 @@ Domain to not audit.
43270 </param>
43271 <infoflow type="none"/>
43272 </interface>
43273 -<interface name="corenet_receive_syncthing_client_packets" lineno="84280">
43274 +<interface name="corenet_receive_syncthing_client_packets" lineno="84298">
43275 <summary>
43276 Receive syncthing_client packets.
43277 </summary>
43278 @@ -62711,7 +62795,7 @@ Domain allowed access.
43279 </param>
43280 <infoflow type="read" weight="10"/>
43281 </interface>
43282 -<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="84299">
43283 +<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="84317">
43284 <summary>
43285 Do not audit attempts to receive syncthing_client packets.
43286 </summary>
43287 @@ -62722,7 +62806,7 @@ Domain allowed access.
43288 </param>
43289 <infoflow type="none"/>
43290 </interface>
43291 -<interface name="corenet_sendrecv_syncthing_client_packets" lineno="84318">
43292 +<interface name="corenet_sendrecv_syncthing_client_packets" lineno="84336">
43293 <summary>
43294 Send and receive syncthing_client packets.
43295 </summary>
43296 @@ -62733,7 +62817,7 @@ Domain allowed access.
43297 </param>
43298 <infoflow type="both" weight="10"/>
43299 </interface>
43300 -<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="84334">
43301 +<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="84352">
43302 <summary>
43303 Do not audit attempts to send and receive syncthing_client packets.
43304 </summary>
43305 @@ -62744,7 +62828,7 @@ Domain to not audit.
43306 </param>
43307 <infoflow type="none"/>
43308 </interface>
43309 -<interface name="corenet_relabelto_syncthing_client_packets" lineno="84349">
43310 +<interface name="corenet_relabelto_syncthing_client_packets" lineno="84367">
43311 <summary>
43312 Relabel packets to syncthing_client the packet type.
43313 </summary>
43314 @@ -62754,7 +62838,7 @@ Domain allowed access.
43315 </summary>
43316 </param>
43317 </interface>
43318 -<interface name="corenet_send_syncthing_server_packets" lineno="84369">
43319 +<interface name="corenet_send_syncthing_server_packets" lineno="84387">
43320 <summary>
43321 Send syncthing_server packets.
43322 </summary>
43323 @@ -62765,7 +62849,7 @@ Domain allowed access.
43324 </param>
43325 <infoflow type="write" weight="10"/>
43326 </interface>
43327 -<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="84388">
43328 +<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="84406">
43329 <summary>
43330 Do not audit attempts to send syncthing_server packets.
43331 </summary>
43332 @@ -62776,7 +62860,7 @@ Domain to not audit.
43333 </param>
43334 <infoflow type="none"/>
43335 </interface>
43336 -<interface name="corenet_receive_syncthing_server_packets" lineno="84407">
43337 +<interface name="corenet_receive_syncthing_server_packets" lineno="84425">
43338 <summary>
43339 Receive syncthing_server packets.
43340 </summary>
43341 @@ -62787,7 +62871,7 @@ Domain allowed access.
43342 </param>
43343 <infoflow type="read" weight="10"/>
43344 </interface>
43345 -<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="84426">
43346 +<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="84444">
43347 <summary>
43348 Do not audit attempts to receive syncthing_server packets.
43349 </summary>
43350 @@ -62798,7 +62882,7 @@ Domain allowed access.
43351 </param>
43352 <infoflow type="none"/>
43353 </interface>
43354 -<interface name="corenet_sendrecv_syncthing_server_packets" lineno="84445">
43355 +<interface name="corenet_sendrecv_syncthing_server_packets" lineno="84463">
43356 <summary>
43357 Send and receive syncthing_server packets.
43358 </summary>
43359 @@ -62809,7 +62893,7 @@ Domain allowed access.
43360 </param>
43361 <infoflow type="both" weight="10"/>
43362 </interface>
43363 -<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="84461">
43364 +<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="84479">
43365 <summary>
43366 Do not audit attempts to send and receive syncthing_server packets.
43367 </summary>
43368 @@ -62820,7 +62904,7 @@ Domain to not audit.
43369 </param>
43370 <infoflow type="none"/>
43371 </interface>
43372 -<interface name="corenet_relabelto_syncthing_server_packets" lineno="84476">
43373 +<interface name="corenet_relabelto_syncthing_server_packets" lineno="84494">
43374 <summary>
43375 Relabel packets to syncthing_server the packet type.
43376 </summary>
43377 @@ -62830,7 +62914,7 @@ Domain allowed access.
43378 </summary>
43379 </param>
43380 </interface>
43381 -<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="84498">
43382 +<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="84516">
43383 <summary>
43384 Send and receive TCP traffic on the syncthing_admin port.
43385 </summary>
43386 @@ -62841,7 +62925,7 @@ Domain allowed access.
43387 </param>
43388 <infoflow type="both" weight="10"/>
43389 </interface>
43390 -<interface name="corenet_udp_send_syncthing_admin_port" lineno="84513">
43391 +<interface name="corenet_udp_send_syncthing_admin_port" lineno="84531">
43392 <summary>
43393 Send UDP traffic on the syncthing_admin port.
43394 </summary>
43395 @@ -62852,7 +62936,7 @@ Domain allowed access.
43396 </param>
43397 <infoflow type="write" weight="10"/>
43398 </interface>
43399 -<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="84528">
43400 +<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="84546">
43401 <summary>
43402 Do not audit attempts to send UDP traffic on the syncthing_admin port.
43403 </summary>
43404 @@ -62863,7 +62947,7 @@ Domain to not audit.
43405 </param>
43406 <infoflow type="none"/>
43407 </interface>
43408 -<interface name="corenet_udp_receive_syncthing_admin_port" lineno="84543">
43409 +<interface name="corenet_udp_receive_syncthing_admin_port" lineno="84561">
43410 <summary>
43411 Receive UDP traffic on the syncthing_admin port.
43412 </summary>
43413 @@ -62874,7 +62958,7 @@ Domain allowed access.
43414 </param>
43415 <infoflow type="read" weight="10"/>
43416 </interface>
43417 -<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="84558">
43418 +<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="84576">
43419 <summary>
43420 Do not audit attempts to receive UDP traffic on the syncthing_admin port.
43421 </summary>
43422 @@ -62885,7 +62969,7 @@ Domain to not audit.
43423 </param>
43424 <infoflow type="none"/>
43425 </interface>
43426 -<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="84573">
43427 +<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="84591">
43428 <summary>
43429 Send and receive UDP traffic on the syncthing_admin port.
43430 </summary>
43431 @@ -62896,7 +62980,7 @@ Domain allowed access.
43432 </param>
43433 <infoflow type="both" weight="10"/>
43434 </interface>
43435 -<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="84589">
43436 +<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="84607">
43437 <summary>
43438 Do not audit attempts to send and receive
43439 UDP traffic on the syncthing_admin port.
43440 @@ -62908,7 +62992,7 @@ Domain to not audit.
43441 </param>
43442 <infoflow type="none"/>
43443 </interface>
43444 -<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="84604">
43445 +<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="84622">
43446 <summary>
43447 Bind TCP sockets to the syncthing_admin port.
43448 </summary>
43449 @@ -62919,7 +63003,7 @@ Domain allowed access.
43450 </param>
43451 <infoflow type="none"/>
43452 </interface>
43453 -<interface name="corenet_udp_bind_syncthing_admin_port" lineno="84624">
43454 +<interface name="corenet_udp_bind_syncthing_admin_port" lineno="84642">
43455 <summary>
43456 Bind UDP sockets to the syncthing_admin port.
43457 </summary>
43458 @@ -62930,7 +63014,7 @@ Domain allowed access.
43459 </param>
43460 <infoflow type="none"/>
43461 </interface>
43462 -<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="84643">
43463 +<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="84661">
43464 <summary>
43465 Make a TCP connection to the syncthing_admin port.
43466 </summary>
43467 @@ -62940,7 +63024,7 @@ Domain allowed access.
43468 </summary>
43469 </param>
43470 </interface>
43471 -<interface name="corenet_send_syncthing_admin_client_packets" lineno="84663">
43472 +<interface name="corenet_send_syncthing_admin_client_packets" lineno="84681">
43473 <summary>
43474 Send syncthing_admin_client packets.
43475 </summary>
43476 @@ -62951,7 +63035,7 @@ Domain allowed access.
43477 </param>
43478 <infoflow type="write" weight="10"/>
43479 </interface>
43480 -<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="84682">
43481 +<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="84700">
43482 <summary>
43483 Do not audit attempts to send syncthing_admin_client packets.
43484 </summary>
43485 @@ -62962,7 +63046,7 @@ Domain to not audit.
43486 </param>
43487 <infoflow type="none"/>
43488 </interface>
43489 -<interface name="corenet_receive_syncthing_admin_client_packets" lineno="84701">
43490 +<interface name="corenet_receive_syncthing_admin_client_packets" lineno="84719">
43491 <summary>
43492 Receive syncthing_admin_client packets.
43493 </summary>
43494 @@ -62973,7 +63057,7 @@ Domain allowed access.
43495 </param>
43496 <infoflow type="read" weight="10"/>
43497 </interface>
43498 -<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="84720">
43499 +<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="84738">
43500 <summary>
43501 Do not audit attempts to receive syncthing_admin_client packets.
43502 </summary>
43503 @@ -62984,7 +63068,7 @@ Domain allowed access.
43504 </param>
43505 <infoflow type="none"/>
43506 </interface>
43507 -<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="84739">
43508 +<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="84757">
43509 <summary>
43510 Send and receive syncthing_admin_client packets.
43511 </summary>
43512 @@ -62995,7 +63079,7 @@ Domain allowed access.
43513 </param>
43514 <infoflow type="both" weight="10"/>
43515 </interface>
43516 -<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="84755">
43517 +<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="84773">
43518 <summary>
43519 Do not audit attempts to send and receive syncthing_admin_client packets.
43520 </summary>
43521 @@ -63006,7 +63090,7 @@ Domain to not audit.
43522 </param>
43523 <infoflow type="none"/>
43524 </interface>
43525 -<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="84770">
43526 +<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="84788">
43527 <summary>
43528 Relabel packets to syncthing_admin_client the packet type.
43529 </summary>
43530 @@ -63016,7 +63100,7 @@ Domain allowed access.
43531 </summary>
43532 </param>
43533 </interface>
43534 -<interface name="corenet_send_syncthing_admin_server_packets" lineno="84790">
43535 +<interface name="corenet_send_syncthing_admin_server_packets" lineno="84808">
43536 <summary>
43537 Send syncthing_admin_server packets.
43538 </summary>
43539 @@ -63027,7 +63111,7 @@ Domain allowed access.
43540 </param>
43541 <infoflow type="write" weight="10"/>
43542 </interface>
43543 -<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="84809">
43544 +<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="84827">
43545 <summary>
43546 Do not audit attempts to send syncthing_admin_server packets.
43547 </summary>
43548 @@ -63038,7 +63122,7 @@ Domain to not audit.
43549 </param>
43550 <infoflow type="none"/>
43551 </interface>
43552 -<interface name="corenet_receive_syncthing_admin_server_packets" lineno="84828">
43553 +<interface name="corenet_receive_syncthing_admin_server_packets" lineno="84846">
43554 <summary>
43555 Receive syncthing_admin_server packets.
43556 </summary>
43557 @@ -63049,7 +63133,7 @@ Domain allowed access.
43558 </param>
43559 <infoflow type="read" weight="10"/>
43560 </interface>
43561 -<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="84847">
43562 +<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="84865">
43563 <summary>
43564 Do not audit attempts to receive syncthing_admin_server packets.
43565 </summary>
43566 @@ -63060,7 +63144,7 @@ Domain allowed access.
43567 </param>
43568 <infoflow type="none"/>
43569 </interface>
43570 -<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="84866">
43571 +<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="84884">
43572 <summary>
43573 Send and receive syncthing_admin_server packets.
43574 </summary>
43575 @@ -63071,7 +63155,7 @@ Domain allowed access.
43576 </param>
43577 <infoflow type="both" weight="10"/>
43578 </interface>
43579 -<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="84882">
43580 +<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="84900">
43581 <summary>
43582 Do not audit attempts to send and receive syncthing_admin_server packets.
43583 </summary>
43584 @@ -63082,7 +63166,7 @@ Domain to not audit.
43585 </param>
43586 <infoflow type="none"/>
43587 </interface>
43588 -<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="84897">
43589 +<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="84915">
43590 <summary>
43591 Relabel packets to syncthing_admin_server the packet type.
43592 </summary>
43593 @@ -63092,7 +63176,7 @@ Domain allowed access.
43594 </summary>
43595 </param>
43596 </interface>
43597 -<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="84919">
43598 +<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="84937">
43599 <summary>
43600 Send and receive TCP traffic on the syncthing_discovery port.
43601 </summary>
43602 @@ -63103,7 +63187,7 @@ Domain allowed access.
43603 </param>
43604 <infoflow type="both" weight="10"/>
43605 </interface>
43606 -<interface name="corenet_udp_send_syncthing_discovery_port" lineno="84934">
43607 +<interface name="corenet_udp_send_syncthing_discovery_port" lineno="84952">
43608 <summary>
43609 Send UDP traffic on the syncthing_discovery port.
43610 </summary>
43611 @@ -63114,7 +63198,7 @@ Domain allowed access.
43612 </param>
43613 <infoflow type="write" weight="10"/>
43614 </interface>
43615 -<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="84949">
43616 +<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="84967">
43617 <summary>
43618 Do not audit attempts to send UDP traffic on the syncthing_discovery port.
43619 </summary>
43620 @@ -63125,7 +63209,7 @@ Domain to not audit.
43621 </param>
43622 <infoflow type="none"/>
43623 </interface>
43624 -<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="84964">
43625 +<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="84982">
43626 <summary>
43627 Receive UDP traffic on the syncthing_discovery port.
43628 </summary>
43629 @@ -63136,7 +63220,7 @@ Domain allowed access.
43630 </param>
43631 <infoflow type="read" weight="10"/>
43632 </interface>
43633 -<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="84979">
43634 +<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="84997">
43635 <summary>
43636 Do not audit attempts to receive UDP traffic on the syncthing_discovery port.
43637 </summary>
43638 @@ -63147,7 +63231,7 @@ Domain to not audit.
43639 </param>
43640 <infoflow type="none"/>
43641 </interface>
43642 -<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="84994">
43643 +<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="85012">
43644 <summary>
43645 Send and receive UDP traffic on the syncthing_discovery port.
43646 </summary>
43647 @@ -63158,7 +63242,7 @@ Domain allowed access.
43648 </param>
43649 <infoflow type="both" weight="10"/>
43650 </interface>
43651 -<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="85010">
43652 +<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="85028">
43653 <summary>
43654 Do not audit attempts to send and receive
43655 UDP traffic on the syncthing_discovery port.
43656 @@ -63170,7 +63254,7 @@ Domain to not audit.
43657 </param>
43658 <infoflow type="none"/>
43659 </interface>
43660 -<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="85025">
43661 +<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="85043">
43662 <summary>
43663 Bind TCP sockets to the syncthing_discovery port.
43664 </summary>
43665 @@ -63181,7 +63265,7 @@ Domain allowed access.
43666 </param>
43667 <infoflow type="none"/>
43668 </interface>
43669 -<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="85045">
43670 +<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="85063">
43671 <summary>
43672 Bind UDP sockets to the syncthing_discovery port.
43673 </summary>
43674 @@ -63192,7 +63276,7 @@ Domain allowed access.
43675 </param>
43676 <infoflow type="none"/>
43677 </interface>
43678 -<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="85064">
43679 +<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="85082">
43680 <summary>
43681 Make a TCP connection to the syncthing_discovery port.
43682 </summary>
43683 @@ -63202,7 +63286,7 @@ Domain allowed access.
43684 </summary>
43685 </param>
43686 </interface>
43687 -<interface name="corenet_send_syncthing_discovery_client_packets" lineno="85084">
43688 +<interface name="corenet_send_syncthing_discovery_client_packets" lineno="85102">
43689 <summary>
43690 Send syncthing_discovery_client packets.
43691 </summary>
43692 @@ -63213,7 +63297,7 @@ Domain allowed access.
43693 </param>
43694 <infoflow type="write" weight="10"/>
43695 </interface>
43696 -<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="85103">
43697 +<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="85121">
43698 <summary>
43699 Do not audit attempts to send syncthing_discovery_client packets.
43700 </summary>
43701 @@ -63224,7 +63308,7 @@ Domain to not audit.
43702 </param>
43703 <infoflow type="none"/>
43704 </interface>
43705 -<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="85122">
43706 +<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="85140">
43707 <summary>
43708 Receive syncthing_discovery_client packets.
43709 </summary>
43710 @@ -63235,7 +63319,7 @@ Domain allowed access.
43711 </param>
43712 <infoflow type="read" weight="10"/>
43713 </interface>
43714 -<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="85141">
43715 +<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="85159">
43716 <summary>
43717 Do not audit attempts to receive syncthing_discovery_client packets.
43718 </summary>
43719 @@ -63246,7 +63330,7 @@ Domain allowed access.
43720 </param>
43721 <infoflow type="none"/>
43722 </interface>
43723 -<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="85160">
43724 +<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="85178">
43725 <summary>
43726 Send and receive syncthing_discovery_client packets.
43727 </summary>
43728 @@ -63257,7 +63341,7 @@ Domain allowed access.
43729 </param>
43730 <infoflow type="both" weight="10"/>
43731 </interface>
43732 -<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="85176">
43733 +<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="85194">
43734 <summary>
43735 Do not audit attempts to send and receive syncthing_discovery_client packets.
43736 </summary>
43737 @@ -63268,7 +63352,7 @@ Domain to not audit.
43738 </param>
43739 <infoflow type="none"/>
43740 </interface>
43741 -<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="85191">
43742 +<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="85209">
43743 <summary>
43744 Relabel packets to syncthing_discovery_client the packet type.
43745 </summary>
43746 @@ -63278,7 +63362,7 @@ Domain allowed access.
43747 </summary>
43748 </param>
43749 </interface>
43750 -<interface name="corenet_send_syncthing_discovery_server_packets" lineno="85211">
43751 +<interface name="corenet_send_syncthing_discovery_server_packets" lineno="85229">
43752 <summary>
43753 Send syncthing_discovery_server packets.
43754 </summary>
43755 @@ -63289,7 +63373,7 @@ Domain allowed access.
43756 </param>
43757 <infoflow type="write" weight="10"/>
43758 </interface>
43759 -<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="85230">
43760 +<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="85248">
43761 <summary>
43762 Do not audit attempts to send syncthing_discovery_server packets.
43763 </summary>
43764 @@ -63300,7 +63384,7 @@ Domain to not audit.
43765 </param>
43766 <infoflow type="none"/>
43767 </interface>
43768 -<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="85249">
43769 +<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="85267">
43770 <summary>
43771 Receive syncthing_discovery_server packets.
43772 </summary>
43773 @@ -63311,7 +63395,7 @@ Domain allowed access.
43774 </param>
43775 <infoflow type="read" weight="10"/>
43776 </interface>
43777 -<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="85268">
43778 +<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="85286">
43779 <summary>
43780 Do not audit attempts to receive syncthing_discovery_server packets.
43781 </summary>
43782 @@ -63322,7 +63406,7 @@ Domain allowed access.
43783 </param>
43784 <infoflow type="none"/>
43785 </interface>
43786 -<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="85287">
43787 +<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="85305">
43788 <summary>
43789 Send and receive syncthing_discovery_server packets.
43790 </summary>
43791 @@ -63333,7 +63417,7 @@ Domain allowed access.
43792 </param>
43793 <infoflow type="both" weight="10"/>
43794 </interface>
43795 -<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="85303">
43796 +<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="85321">
43797 <summary>
43798 Do not audit attempts to send and receive syncthing_discovery_server packets.
43799 </summary>
43800 @@ -63344,7 +63428,7 @@ Domain to not audit.
43801 </param>
43802 <infoflow type="none"/>
43803 </interface>
43804 -<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="85318">
43805 +<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="85336">
43806 <summary>
43807 Relabel packets to syncthing_discovery_server the packet type.
43808 </summary>
43809 @@ -63354,7 +63438,7 @@ Domain allowed access.
43810 </summary>
43811 </param>
43812 </interface>
43813 -<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="85340">
43814 +<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="85358">
43815 <summary>
43816 Send and receive TCP traffic on the sype_transport port.
43817 </summary>
43818 @@ -63365,7 +63449,7 @@ Domain allowed access.
43819 </param>
43820 <infoflow type="both" weight="10"/>
43821 </interface>
43822 -<interface name="corenet_udp_send_sype_transport_port" lineno="85355">
43823 +<interface name="corenet_udp_send_sype_transport_port" lineno="85373">
43824 <summary>
43825 Send UDP traffic on the sype_transport port.
43826 </summary>
43827 @@ -63376,7 +63460,7 @@ Domain allowed access.
43828 </param>
43829 <infoflow type="write" weight="10"/>
43830 </interface>
43831 -<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="85370">
43832 +<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="85388">
43833 <summary>
43834 Do not audit attempts to send UDP traffic on the sype_transport port.
43835 </summary>
43836 @@ -63387,7 +63471,7 @@ Domain to not audit.
43837 </param>
43838 <infoflow type="none"/>
43839 </interface>
43840 -<interface name="corenet_udp_receive_sype_transport_port" lineno="85385">
43841 +<interface name="corenet_udp_receive_sype_transport_port" lineno="85403">
43842 <summary>
43843 Receive UDP traffic on the sype_transport port.
43844 </summary>
43845 @@ -63398,7 +63482,7 @@ Domain allowed access.
43846 </param>
43847 <infoflow type="read" weight="10"/>
43848 </interface>
43849 -<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="85400">
43850 +<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="85418">
43851 <summary>
43852 Do not audit attempts to receive UDP traffic on the sype_transport port.
43853 </summary>
43854 @@ -63409,7 +63493,7 @@ Domain to not audit.
43855 </param>
43856 <infoflow type="none"/>
43857 </interface>
43858 -<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="85415">
43859 +<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="85433">
43860 <summary>
43861 Send and receive UDP traffic on the sype_transport port.
43862 </summary>
43863 @@ -63420,7 +63504,7 @@ Domain allowed access.
43864 </param>
43865 <infoflow type="both" weight="10"/>
43866 </interface>
43867 -<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="85431">
43868 +<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="85449">
43869 <summary>
43870 Do not audit attempts to send and receive
43871 UDP traffic on the sype_transport port.
43872 @@ -63432,7 +63516,7 @@ Domain to not audit.
43873 </param>
43874 <infoflow type="none"/>
43875 </interface>
43876 -<interface name="corenet_tcp_bind_sype_transport_port" lineno="85446">
43877 +<interface name="corenet_tcp_bind_sype_transport_port" lineno="85464">
43878 <summary>
43879 Bind TCP sockets to the sype_transport port.
43880 </summary>
43881 @@ -63443,7 +63527,7 @@ Domain allowed access.
43882 </param>
43883 <infoflow type="none"/>
43884 </interface>
43885 -<interface name="corenet_udp_bind_sype_transport_port" lineno="85466">
43886 +<interface name="corenet_udp_bind_sype_transport_port" lineno="85484">
43887 <summary>
43888 Bind UDP sockets to the sype_transport port.
43889 </summary>
43890 @@ -63454,7 +63538,7 @@ Domain allowed access.
43891 </param>
43892 <infoflow type="none"/>
43893 </interface>
43894 -<interface name="corenet_tcp_connect_sype_transport_port" lineno="85485">
43895 +<interface name="corenet_tcp_connect_sype_transport_port" lineno="85503">
43896 <summary>
43897 Make a TCP connection to the sype_transport port.
43898 </summary>
43899 @@ -63464,7 +63548,7 @@ Domain allowed access.
43900 </summary>
43901 </param>
43902 </interface>
43903 -<interface name="corenet_send_sype_transport_client_packets" lineno="85505">
43904 +<interface name="corenet_send_sype_transport_client_packets" lineno="85523">
43905 <summary>
43906 Send sype_transport_client packets.
43907 </summary>
43908 @@ -63475,7 +63559,7 @@ Domain allowed access.
43909 </param>
43910 <infoflow type="write" weight="10"/>
43911 </interface>
43912 -<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="85524">
43913 +<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="85542">
43914 <summary>
43915 Do not audit attempts to send sype_transport_client packets.
43916 </summary>
43917 @@ -63486,7 +63570,7 @@ Domain to not audit.
43918 </param>
43919 <infoflow type="none"/>
43920 </interface>
43921 -<interface name="corenet_receive_sype_transport_client_packets" lineno="85543">
43922 +<interface name="corenet_receive_sype_transport_client_packets" lineno="85561">
43923 <summary>
43924 Receive sype_transport_client packets.
43925 </summary>
43926 @@ -63497,7 +63581,7 @@ Domain allowed access.
43927 </param>
43928 <infoflow type="read" weight="10"/>
43929 </interface>
43930 -<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="85562">
43931 +<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="85580">
43932 <summary>
43933 Do not audit attempts to receive sype_transport_client packets.
43934 </summary>
43935 @@ -63508,7 +63592,7 @@ Domain allowed access.
43936 </param>
43937 <infoflow type="none"/>
43938 </interface>
43939 -<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="85581">
43940 +<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="85599">
43941 <summary>
43942 Send and receive sype_transport_client packets.
43943 </summary>
43944 @@ -63519,7 +63603,7 @@ Domain allowed access.
43945 </param>
43946 <infoflow type="both" weight="10"/>
43947 </interface>
43948 -<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="85597">
43949 +<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="85615">
43950 <summary>
43951 Do not audit attempts to send and receive sype_transport_client packets.
43952 </summary>
43953 @@ -63530,7 +63614,7 @@ Domain to not audit.
43954 </param>
43955 <infoflow type="none"/>
43956 </interface>
43957 -<interface name="corenet_relabelto_sype_transport_client_packets" lineno="85612">
43958 +<interface name="corenet_relabelto_sype_transport_client_packets" lineno="85630">
43959 <summary>
43960 Relabel packets to sype_transport_client the packet type.
43961 </summary>
43962 @@ -63540,7 +63624,7 @@ Domain allowed access.
43963 </summary>
43964 </param>
43965 </interface>
43966 -<interface name="corenet_send_sype_transport_server_packets" lineno="85632">
43967 +<interface name="corenet_send_sype_transport_server_packets" lineno="85650">
43968 <summary>
43969 Send sype_transport_server packets.
43970 </summary>
43971 @@ -63551,7 +63635,7 @@ Domain allowed access.
43972 </param>
43973 <infoflow type="write" weight="10"/>
43974 </interface>
43975 -<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="85651">
43976 +<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="85669">
43977 <summary>
43978 Do not audit attempts to send sype_transport_server packets.
43979 </summary>
43980 @@ -63562,7 +63646,7 @@ Domain to not audit.
43981 </param>
43982 <infoflow type="none"/>
43983 </interface>
43984 -<interface name="corenet_receive_sype_transport_server_packets" lineno="85670">
43985 +<interface name="corenet_receive_sype_transport_server_packets" lineno="85688">
43986 <summary>
43987 Receive sype_transport_server packets.
43988 </summary>
43989 @@ -63573,7 +63657,7 @@ Domain allowed access.
43990 </param>
43991 <infoflow type="read" weight="10"/>
43992 </interface>
43993 -<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="85689">
43994 +<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="85707">
43995 <summary>
43996 Do not audit attempts to receive sype_transport_server packets.
43997 </summary>
43998 @@ -63584,7 +63668,7 @@ Domain allowed access.
43999 </param>
44000 <infoflow type="none"/>
44001 </interface>
44002 -<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="85708">
44003 +<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="85726">
44004 <summary>
44005 Send and receive sype_transport_server packets.
44006 </summary>
44007 @@ -63595,7 +63679,7 @@ Domain allowed access.
44008 </param>
44009 <infoflow type="both" weight="10"/>
44010 </interface>
44011 -<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="85724">
44012 +<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="85742">
44013 <summary>
44014 Do not audit attempts to send and receive sype_transport_server packets.
44015 </summary>
44016 @@ -63606,7 +63690,7 @@ Domain to not audit.
44017 </param>
44018 <infoflow type="none"/>
44019 </interface>
44020 -<interface name="corenet_relabelto_sype_transport_server_packets" lineno="85739">
44021 +<interface name="corenet_relabelto_sype_transport_server_packets" lineno="85757">
44022 <summary>
44023 Relabel packets to sype_transport_server the packet type.
44024 </summary>
44025 @@ -63616,7 +63700,7 @@ Domain allowed access.
44026 </summary>
44027 </param>
44028 </interface>
44029 -<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="85761">
44030 +<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="85779">
44031 <summary>
44032 Send and receive TCP traffic on the syslogd port.
44033 </summary>
44034 @@ -63627,7 +63711,7 @@ Domain allowed access.
44035 </param>
44036 <infoflow type="both" weight="10"/>
44037 </interface>
44038 -<interface name="corenet_udp_send_syslogd_port" lineno="85776">
44039 +<interface name="corenet_udp_send_syslogd_port" lineno="85794">
44040 <summary>
44041 Send UDP traffic on the syslogd port.
44042 </summary>
44043 @@ -63638,7 +63722,7 @@ Domain allowed access.
44044 </param>
44045 <infoflow type="write" weight="10"/>
44046 </interface>
44047 -<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="85791">
44048 +<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="85809">
44049 <summary>
44050 Do not audit attempts to send UDP traffic on the syslogd port.
44051 </summary>
44052 @@ -63649,7 +63733,7 @@ Domain to not audit.
44053 </param>
44054 <infoflow type="none"/>
44055 </interface>
44056 -<interface name="corenet_udp_receive_syslogd_port" lineno="85806">
44057 +<interface name="corenet_udp_receive_syslogd_port" lineno="85824">
44058 <summary>
44059 Receive UDP traffic on the syslogd port.
44060 </summary>
44061 @@ -63660,7 +63744,7 @@ Domain allowed access.
44062 </param>
44063 <infoflow type="read" weight="10"/>
44064 </interface>
44065 -<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="85821">
44066 +<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="85839">
44067 <summary>
44068 Do not audit attempts to receive UDP traffic on the syslogd port.
44069 </summary>
44070 @@ -63671,7 +63755,7 @@ Domain to not audit.
44071 </param>
44072 <infoflow type="none"/>
44073 </interface>
44074 -<interface name="corenet_udp_sendrecv_syslogd_port" lineno="85836">
44075 +<interface name="corenet_udp_sendrecv_syslogd_port" lineno="85854">
44076 <summary>
44077 Send and receive UDP traffic on the syslogd port.
44078 </summary>
44079 @@ -63682,7 +63766,7 @@ Domain allowed access.
44080 </param>
44081 <infoflow type="both" weight="10"/>
44082 </interface>
44083 -<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="85852">
44084 +<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="85870">
44085 <summary>
44086 Do not audit attempts to send and receive
44087 UDP traffic on the syslogd port.
44088 @@ -63694,7 +63778,7 @@ Domain to not audit.
44089 </param>
44090 <infoflow type="none"/>
44091 </interface>
44092 -<interface name="corenet_tcp_bind_syslogd_port" lineno="85867">
44093 +<interface name="corenet_tcp_bind_syslogd_port" lineno="85885">
44094 <summary>
44095 Bind TCP sockets to the syslogd port.
44096 </summary>
44097 @@ -63705,7 +63789,7 @@ Domain allowed access.
44098 </param>
44099 <infoflow type="none"/>
44100 </interface>
44101 -<interface name="corenet_udp_bind_syslogd_port" lineno="85887">
44102 +<interface name="corenet_udp_bind_syslogd_port" lineno="85905">
44103 <summary>
44104 Bind UDP sockets to the syslogd port.
44105 </summary>
44106 @@ -63716,7 +63800,7 @@ Domain allowed access.
44107 </param>
44108 <infoflow type="none"/>
44109 </interface>
44110 -<interface name="corenet_tcp_connect_syslogd_port" lineno="85906">
44111 +<interface name="corenet_tcp_connect_syslogd_port" lineno="85924">
44112 <summary>
44113 Make a TCP connection to the syslogd port.
44114 </summary>
44115 @@ -63726,7 +63810,7 @@ Domain allowed access.
44116 </summary>
44117 </param>
44118 </interface>
44119 -<interface name="corenet_send_syslogd_client_packets" lineno="85926">
44120 +<interface name="corenet_send_syslogd_client_packets" lineno="85944">
44121 <summary>
44122 Send syslogd_client packets.
44123 </summary>
44124 @@ -63737,7 +63821,7 @@ Domain allowed access.
44125 </param>
44126 <infoflow type="write" weight="10"/>
44127 </interface>
44128 -<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="85945">
44129 +<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="85963">
44130 <summary>
44131 Do not audit attempts to send syslogd_client packets.
44132 </summary>
44133 @@ -63748,7 +63832,7 @@ Domain to not audit.
44134 </param>
44135 <infoflow type="none"/>
44136 </interface>
44137 -<interface name="corenet_receive_syslogd_client_packets" lineno="85964">
44138 +<interface name="corenet_receive_syslogd_client_packets" lineno="85982">
44139 <summary>
44140 Receive syslogd_client packets.
44141 </summary>
44142 @@ -63759,7 +63843,7 @@ Domain allowed access.
44143 </param>
44144 <infoflow type="read" weight="10"/>
44145 </interface>
44146 -<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="85983">
44147 +<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="86001">
44148 <summary>
44149 Do not audit attempts to receive syslogd_client packets.
44150 </summary>
44151 @@ -63770,7 +63854,7 @@ Domain allowed access.
44152 </param>
44153 <infoflow type="none"/>
44154 </interface>
44155 -<interface name="corenet_sendrecv_syslogd_client_packets" lineno="86002">
44156 +<interface name="corenet_sendrecv_syslogd_client_packets" lineno="86020">
44157 <summary>
44158 Send and receive syslogd_client packets.
44159 </summary>
44160 @@ -63781,7 +63865,7 @@ Domain allowed access.
44161 </param>
44162 <infoflow type="both" weight="10"/>
44163 </interface>
44164 -<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="86018">
44165 +<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="86036">
44166 <summary>
44167 Do not audit attempts to send and receive syslogd_client packets.
44168 </summary>
44169 @@ -63792,7 +63876,7 @@ Domain to not audit.
44170 </param>
44171 <infoflow type="none"/>
44172 </interface>
44173 -<interface name="corenet_relabelto_syslogd_client_packets" lineno="86033">
44174 +<interface name="corenet_relabelto_syslogd_client_packets" lineno="86051">
44175 <summary>
44176 Relabel packets to syslogd_client the packet type.
44177 </summary>
44178 @@ -63802,7 +63886,7 @@ Domain allowed access.
44179 </summary>
44180 </param>
44181 </interface>
44182 -<interface name="corenet_send_syslogd_server_packets" lineno="86053">
44183 +<interface name="corenet_send_syslogd_server_packets" lineno="86071">
44184 <summary>
44185 Send syslogd_server packets.
44186 </summary>
44187 @@ -63813,7 +63897,7 @@ Domain allowed access.
44188 </param>
44189 <infoflow type="write" weight="10"/>
44190 </interface>
44191 -<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="86072">
44192 +<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="86090">
44193 <summary>
44194 Do not audit attempts to send syslogd_server packets.
44195 </summary>
44196 @@ -63824,7 +63908,7 @@ Domain to not audit.
44197 </param>
44198 <infoflow type="none"/>
44199 </interface>
44200 -<interface name="corenet_receive_syslogd_server_packets" lineno="86091">
44201 +<interface name="corenet_receive_syslogd_server_packets" lineno="86109">
44202 <summary>
44203 Receive syslogd_server packets.
44204 </summary>
44205 @@ -63835,7 +63919,7 @@ Domain allowed access.
44206 </param>
44207 <infoflow type="read" weight="10"/>
44208 </interface>
44209 -<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="86110">
44210 +<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="86128">
44211 <summary>
44212 Do not audit attempts to receive syslogd_server packets.
44213 </summary>
44214 @@ -63846,7 +63930,7 @@ Domain allowed access.
44215 </param>
44216 <infoflow type="none"/>
44217 </interface>
44218 -<interface name="corenet_sendrecv_syslogd_server_packets" lineno="86129">
44219 +<interface name="corenet_sendrecv_syslogd_server_packets" lineno="86147">
44220 <summary>
44221 Send and receive syslogd_server packets.
44222 </summary>
44223 @@ -63857,7 +63941,7 @@ Domain allowed access.
44224 </param>
44225 <infoflow type="both" weight="10"/>
44226 </interface>
44227 -<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="86145">
44228 +<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="86163">
44229 <summary>
44230 Do not audit attempts to send and receive syslogd_server packets.
44231 </summary>
44232 @@ -63868,7 +63952,7 @@ Domain to not audit.
44233 </param>
44234 <infoflow type="none"/>
44235 </interface>
44236 -<interface name="corenet_relabelto_syslogd_server_packets" lineno="86160">
44237 +<interface name="corenet_relabelto_syslogd_server_packets" lineno="86178">
44238 <summary>
44239 Relabel packets to syslogd_server the packet type.
44240 </summary>
44241 @@ -63878,7 +63962,7 @@ Domain allowed access.
44242 </summary>
44243 </param>
44244 </interface>
44245 -<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="86182">
44246 +<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="86200">
44247 <summary>
44248 Send and receive TCP traffic on the syslog_tls port.
44249 </summary>
44250 @@ -63889,7 +63973,7 @@ Domain allowed access.
44251 </param>
44252 <infoflow type="both" weight="10"/>
44253 </interface>
44254 -<interface name="corenet_udp_send_syslog_tls_port" lineno="86197">
44255 +<interface name="corenet_udp_send_syslog_tls_port" lineno="86215">
44256 <summary>
44257 Send UDP traffic on the syslog_tls port.
44258 </summary>
44259 @@ -63900,7 +63984,7 @@ Domain allowed access.
44260 </param>
44261 <infoflow type="write" weight="10"/>
44262 </interface>
44263 -<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="86212">
44264 +<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="86230">
44265 <summary>
44266 Do not audit attempts to send UDP traffic on the syslog_tls port.
44267 </summary>
44268 @@ -63911,7 +63995,7 @@ Domain to not audit.
44269 </param>
44270 <infoflow type="none"/>
44271 </interface>
44272 -<interface name="corenet_udp_receive_syslog_tls_port" lineno="86227">
44273 +<interface name="corenet_udp_receive_syslog_tls_port" lineno="86245">
44274 <summary>
44275 Receive UDP traffic on the syslog_tls port.
44276 </summary>
44277 @@ -63922,7 +64006,7 @@ Domain allowed access.
44278 </param>
44279 <infoflow type="read" weight="10"/>
44280 </interface>
44281 -<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="86242">
44282 +<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="86260">
44283 <summary>
44284 Do not audit attempts to receive UDP traffic on the syslog_tls port.
44285 </summary>
44286 @@ -63933,7 +64017,7 @@ Domain to not audit.
44287 </param>
44288 <infoflow type="none"/>
44289 </interface>
44290 -<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="86257">
44291 +<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="86275">
44292 <summary>
44293 Send and receive UDP traffic on the syslog_tls port.
44294 </summary>
44295 @@ -63944,7 +64028,7 @@ Domain allowed access.
44296 </param>
44297 <infoflow type="both" weight="10"/>
44298 </interface>
44299 -<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="86273">
44300 +<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="86291">
44301 <summary>
44302 Do not audit attempts to send and receive
44303 UDP traffic on the syslog_tls port.
44304 @@ -63956,7 +64040,7 @@ Domain to not audit.
44305 </param>
44306 <infoflow type="none"/>
44307 </interface>
44308 -<interface name="corenet_tcp_bind_syslog_tls_port" lineno="86288">
44309 +<interface name="corenet_tcp_bind_syslog_tls_port" lineno="86306">
44310 <summary>
44311 Bind TCP sockets to the syslog_tls port.
44312 </summary>
44313 @@ -63967,7 +64051,7 @@ Domain allowed access.
44314 </param>
44315 <infoflow type="none"/>
44316 </interface>
44317 -<interface name="corenet_udp_bind_syslog_tls_port" lineno="86308">
44318 +<interface name="corenet_udp_bind_syslog_tls_port" lineno="86326">
44319 <summary>
44320 Bind UDP sockets to the syslog_tls port.
44321 </summary>
44322 @@ -63978,7 +64062,7 @@ Domain allowed access.
44323 </param>
44324 <infoflow type="none"/>
44325 </interface>
44326 -<interface name="corenet_tcp_connect_syslog_tls_port" lineno="86327">
44327 +<interface name="corenet_tcp_connect_syslog_tls_port" lineno="86345">
44328 <summary>
44329 Make a TCP connection to the syslog_tls port.
44330 </summary>
44331 @@ -63988,7 +64072,7 @@ Domain allowed access.
44332 </summary>
44333 </param>
44334 </interface>
44335 -<interface name="corenet_send_syslog_tls_client_packets" lineno="86347">
44336 +<interface name="corenet_send_syslog_tls_client_packets" lineno="86365">
44337 <summary>
44338 Send syslog_tls_client packets.
44339 </summary>
44340 @@ -63999,7 +64083,7 @@ Domain allowed access.
44341 </param>
44342 <infoflow type="write" weight="10"/>
44343 </interface>
44344 -<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="86366">
44345 +<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="86384">
44346 <summary>
44347 Do not audit attempts to send syslog_tls_client packets.
44348 </summary>
44349 @@ -64010,7 +64094,7 @@ Domain to not audit.
44350 </param>
44351 <infoflow type="none"/>
44352 </interface>
44353 -<interface name="corenet_receive_syslog_tls_client_packets" lineno="86385">
44354 +<interface name="corenet_receive_syslog_tls_client_packets" lineno="86403">
44355 <summary>
44356 Receive syslog_tls_client packets.
44357 </summary>
44358 @@ -64021,7 +64105,7 @@ Domain allowed access.
44359 </param>
44360 <infoflow type="read" weight="10"/>
44361 </interface>
44362 -<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="86404">
44363 +<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="86422">
44364 <summary>
44365 Do not audit attempts to receive syslog_tls_client packets.
44366 </summary>
44367 @@ -64032,7 +64116,7 @@ Domain allowed access.
44368 </param>
44369 <infoflow type="none"/>
44370 </interface>
44371 -<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="86423">
44372 +<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="86441">
44373 <summary>
44374 Send and receive syslog_tls_client packets.
44375 </summary>
44376 @@ -64043,7 +64127,7 @@ Domain allowed access.
44377 </param>
44378 <infoflow type="both" weight="10"/>
44379 </interface>
44380 -<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="86439">
44381 +<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="86457">
44382 <summary>
44383 Do not audit attempts to send and receive syslog_tls_client packets.
44384 </summary>
44385 @@ -64054,7 +64138,7 @@ Domain to not audit.
44386 </param>
44387 <infoflow type="none"/>
44388 </interface>
44389 -<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="86454">
44390 +<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="86472">
44391 <summary>
44392 Relabel packets to syslog_tls_client the packet type.
44393 </summary>
44394 @@ -64064,7 +64148,7 @@ Domain allowed access.
44395 </summary>
44396 </param>
44397 </interface>
44398 -<interface name="corenet_send_syslog_tls_server_packets" lineno="86474">
44399 +<interface name="corenet_send_syslog_tls_server_packets" lineno="86492">
44400 <summary>
44401 Send syslog_tls_server packets.
44402 </summary>
44403 @@ -64075,7 +64159,7 @@ Domain allowed access.
44404 </param>
44405 <infoflow type="write" weight="10"/>
44406 </interface>
44407 -<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="86493">
44408 +<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="86511">
44409 <summary>
44410 Do not audit attempts to send syslog_tls_server packets.
44411 </summary>
44412 @@ -64086,7 +64170,7 @@ Domain to not audit.
44413 </param>
44414 <infoflow type="none"/>
44415 </interface>
44416 -<interface name="corenet_receive_syslog_tls_server_packets" lineno="86512">
44417 +<interface name="corenet_receive_syslog_tls_server_packets" lineno="86530">
44418 <summary>
44419 Receive syslog_tls_server packets.
44420 </summary>
44421 @@ -64097,7 +64181,7 @@ Domain allowed access.
44422 </param>
44423 <infoflow type="read" weight="10"/>
44424 </interface>
44425 -<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="86531">
44426 +<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="86549">
44427 <summary>
44428 Do not audit attempts to receive syslog_tls_server packets.
44429 </summary>
44430 @@ -64108,7 +64192,7 @@ Domain allowed access.
44431 </param>
44432 <infoflow type="none"/>
44433 </interface>
44434 -<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="86550">
44435 +<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="86568">
44436 <summary>
44437 Send and receive syslog_tls_server packets.
44438 </summary>
44439 @@ -64119,7 +64203,7 @@ Domain allowed access.
44440 </param>
44441 <infoflow type="both" weight="10"/>
44442 </interface>
44443 -<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="86566">
44444 +<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="86584">
44445 <summary>
44446 Do not audit attempts to send and receive syslog_tls_server packets.
44447 </summary>
44448 @@ -64130,7 +64214,7 @@ Domain to not audit.
44449 </param>
44450 <infoflow type="none"/>
44451 </interface>
44452 -<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="86581">
44453 +<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="86599">
44454 <summary>
44455 Relabel packets to syslog_tls_server the packet type.
44456 </summary>
44457 @@ -64140,7 +64224,7 @@ Domain allowed access.
44458 </summary>
44459 </param>
44460 </interface>
44461 -<interface name="corenet_tcp_sendrecv_tcs_port" lineno="86603">
44462 +<interface name="corenet_tcp_sendrecv_tcs_port" lineno="86621">
44463 <summary>
44464 Send and receive TCP traffic on the tcs port.
44465 </summary>
44466 @@ -64151,7 +64235,7 @@ Domain allowed access.
44467 </param>
44468 <infoflow type="both" weight="10"/>
44469 </interface>
44470 -<interface name="corenet_udp_send_tcs_port" lineno="86618">
44471 +<interface name="corenet_udp_send_tcs_port" lineno="86636">
44472 <summary>
44473 Send UDP traffic on the tcs port.
44474 </summary>
44475 @@ -64162,7 +64246,7 @@ Domain allowed access.
44476 </param>
44477 <infoflow type="write" weight="10"/>
44478 </interface>
44479 -<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="86633">
44480 +<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="86651">
44481 <summary>
44482 Do not audit attempts to send UDP traffic on the tcs port.
44483 </summary>
44484 @@ -64173,7 +64257,7 @@ Domain to not audit.
44485 </param>
44486 <infoflow type="none"/>
44487 </interface>
44488 -<interface name="corenet_udp_receive_tcs_port" lineno="86648">
44489 +<interface name="corenet_udp_receive_tcs_port" lineno="86666">
44490 <summary>
44491 Receive UDP traffic on the tcs port.
44492 </summary>
44493 @@ -64184,7 +64268,7 @@ Domain allowed access.
44494 </param>
44495 <infoflow type="read" weight="10"/>
44496 </interface>
44497 -<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="86663">
44498 +<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="86681">
44499 <summary>
44500 Do not audit attempts to receive UDP traffic on the tcs port.
44501 </summary>
44502 @@ -64195,7 +64279,7 @@ Domain to not audit.
44503 </param>
44504 <infoflow type="none"/>
44505 </interface>
44506 -<interface name="corenet_udp_sendrecv_tcs_port" lineno="86678">
44507 +<interface name="corenet_udp_sendrecv_tcs_port" lineno="86696">
44508 <summary>
44509 Send and receive UDP traffic on the tcs port.
44510 </summary>
44511 @@ -64206,7 +64290,7 @@ Domain allowed access.
44512 </param>
44513 <infoflow type="both" weight="10"/>
44514 </interface>
44515 -<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="86694">
44516 +<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="86712">
44517 <summary>
44518 Do not audit attempts to send and receive
44519 UDP traffic on the tcs port.
44520 @@ -64218,7 +64302,7 @@ Domain to not audit.
44521 </param>
44522 <infoflow type="none"/>
44523 </interface>
44524 -<interface name="corenet_tcp_bind_tcs_port" lineno="86709">
44525 +<interface name="corenet_tcp_bind_tcs_port" lineno="86727">
44526 <summary>
44527 Bind TCP sockets to the tcs port.
44528 </summary>
44529 @@ -64229,7 +64313,7 @@ Domain allowed access.
44530 </param>
44531 <infoflow type="none"/>
44532 </interface>
44533 -<interface name="corenet_udp_bind_tcs_port" lineno="86729">
44534 +<interface name="corenet_udp_bind_tcs_port" lineno="86747">
44535 <summary>
44536 Bind UDP sockets to the tcs port.
44537 </summary>
44538 @@ -64240,7 +64324,7 @@ Domain allowed access.
44539 </param>
44540 <infoflow type="none"/>
44541 </interface>
44542 -<interface name="corenet_tcp_connect_tcs_port" lineno="86748">
44543 +<interface name="corenet_tcp_connect_tcs_port" lineno="86766">
44544 <summary>
44545 Make a TCP connection to the tcs port.
44546 </summary>
44547 @@ -64250,7 +64334,7 @@ Domain allowed access.
44548 </summary>
44549 </param>
44550 </interface>
44551 -<interface name="corenet_send_tcs_client_packets" lineno="86768">
44552 +<interface name="corenet_send_tcs_client_packets" lineno="86786">
44553 <summary>
44554 Send tcs_client packets.
44555 </summary>
44556 @@ -64261,7 +64345,7 @@ Domain allowed access.
44557 </param>
44558 <infoflow type="write" weight="10"/>
44559 </interface>
44560 -<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="86787">
44561 +<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="86805">
44562 <summary>
44563 Do not audit attempts to send tcs_client packets.
44564 </summary>
44565 @@ -64272,7 +64356,7 @@ Domain to not audit.
44566 </param>
44567 <infoflow type="none"/>
44568 </interface>
44569 -<interface name="corenet_receive_tcs_client_packets" lineno="86806">
44570 +<interface name="corenet_receive_tcs_client_packets" lineno="86824">
44571 <summary>
44572 Receive tcs_client packets.
44573 </summary>
44574 @@ -64283,7 +64367,7 @@ Domain allowed access.
44575 </param>
44576 <infoflow type="read" weight="10"/>
44577 </interface>
44578 -<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="86825">
44579 +<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="86843">
44580 <summary>
44581 Do not audit attempts to receive tcs_client packets.
44582 </summary>
44583 @@ -64294,7 +64378,7 @@ Domain allowed access.
44584 </param>
44585 <infoflow type="none"/>
44586 </interface>
44587 -<interface name="corenet_sendrecv_tcs_client_packets" lineno="86844">
44588 +<interface name="corenet_sendrecv_tcs_client_packets" lineno="86862">
44589 <summary>
44590 Send and receive tcs_client packets.
44591 </summary>
44592 @@ -64305,7 +64389,7 @@ Domain allowed access.
44593 </param>
44594 <infoflow type="both" weight="10"/>
44595 </interface>
44596 -<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="86860">
44597 +<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="86878">
44598 <summary>
44599 Do not audit attempts to send and receive tcs_client packets.
44600 </summary>
44601 @@ -64316,7 +64400,7 @@ Domain to not audit.
44602 </param>
44603 <infoflow type="none"/>
44604 </interface>
44605 -<interface name="corenet_relabelto_tcs_client_packets" lineno="86875">
44606 +<interface name="corenet_relabelto_tcs_client_packets" lineno="86893">
44607 <summary>
44608 Relabel packets to tcs_client the packet type.
44609 </summary>
44610 @@ -64326,7 +64410,7 @@ Domain allowed access.
44611 </summary>
44612 </param>
44613 </interface>
44614 -<interface name="corenet_send_tcs_server_packets" lineno="86895">
44615 +<interface name="corenet_send_tcs_server_packets" lineno="86913">
44616 <summary>
44617 Send tcs_server packets.
44618 </summary>
44619 @@ -64337,7 +64421,7 @@ Domain allowed access.
44620 </param>
44621 <infoflow type="write" weight="10"/>
44622 </interface>
44623 -<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="86914">
44624 +<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="86932">
44625 <summary>
44626 Do not audit attempts to send tcs_server packets.
44627 </summary>
44628 @@ -64348,7 +64432,7 @@ Domain to not audit.
44629 </param>
44630 <infoflow type="none"/>
44631 </interface>
44632 -<interface name="corenet_receive_tcs_server_packets" lineno="86933">
44633 +<interface name="corenet_receive_tcs_server_packets" lineno="86951">
44634 <summary>
44635 Receive tcs_server packets.
44636 </summary>
44637 @@ -64359,7 +64443,7 @@ Domain allowed access.
44638 </param>
44639 <infoflow type="read" weight="10"/>
44640 </interface>
44641 -<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="86952">
44642 +<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="86970">
44643 <summary>
44644 Do not audit attempts to receive tcs_server packets.
44645 </summary>
44646 @@ -64370,7 +64454,7 @@ Domain allowed access.
44647 </param>
44648 <infoflow type="none"/>
44649 </interface>
44650 -<interface name="corenet_sendrecv_tcs_server_packets" lineno="86971">
44651 +<interface name="corenet_sendrecv_tcs_server_packets" lineno="86989">
44652 <summary>
44653 Send and receive tcs_server packets.
44654 </summary>
44655 @@ -64381,7 +64465,7 @@ Domain allowed access.
44656 </param>
44657 <infoflow type="both" weight="10"/>
44658 </interface>
44659 -<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="86987">
44660 +<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="87005">
44661 <summary>
44662 Do not audit attempts to send and receive tcs_server packets.
44663 </summary>
44664 @@ -64392,7 +64476,7 @@ Domain to not audit.
44665 </param>
44666 <infoflow type="none"/>
44667 </interface>
44668 -<interface name="corenet_relabelto_tcs_server_packets" lineno="87002">
44669 +<interface name="corenet_relabelto_tcs_server_packets" lineno="87020">
44670 <summary>
44671 Relabel packets to tcs_server the packet type.
44672 </summary>
44673 @@ -64402,7 +64486,7 @@ Domain allowed access.
44674 </summary>
44675 </param>
44676 </interface>
44677 -<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="87024">
44678 +<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="87042">
44679 <summary>
44680 Send and receive TCP traffic on the telnetd port.
44681 </summary>
44682 @@ -64413,7 +64497,7 @@ Domain allowed access.
44683 </param>
44684 <infoflow type="both" weight="10"/>
44685 </interface>
44686 -<interface name="corenet_udp_send_telnetd_port" lineno="87039">
44687 +<interface name="corenet_udp_send_telnetd_port" lineno="87057">
44688 <summary>
44689 Send UDP traffic on the telnetd port.
44690 </summary>
44691 @@ -64424,7 +64508,7 @@ Domain allowed access.
44692 </param>
44693 <infoflow type="write" weight="10"/>
44694 </interface>
44695 -<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="87054">
44696 +<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="87072">
44697 <summary>
44698 Do not audit attempts to send UDP traffic on the telnetd port.
44699 </summary>
44700 @@ -64435,7 +64519,7 @@ Domain to not audit.
44701 </param>
44702 <infoflow type="none"/>
44703 </interface>
44704 -<interface name="corenet_udp_receive_telnetd_port" lineno="87069">
44705 +<interface name="corenet_udp_receive_telnetd_port" lineno="87087">
44706 <summary>
44707 Receive UDP traffic on the telnetd port.
44708 </summary>
44709 @@ -64446,7 +64530,7 @@ Domain allowed access.
44710 </param>
44711 <infoflow type="read" weight="10"/>
44712 </interface>
44713 -<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="87084">
44714 +<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="87102">
44715 <summary>
44716 Do not audit attempts to receive UDP traffic on the telnetd port.
44717 </summary>
44718 @@ -64457,7 +64541,7 @@ Domain to not audit.
44719 </param>
44720 <infoflow type="none"/>
44721 </interface>
44722 -<interface name="corenet_udp_sendrecv_telnetd_port" lineno="87099">
44723 +<interface name="corenet_udp_sendrecv_telnetd_port" lineno="87117">
44724 <summary>
44725 Send and receive UDP traffic on the telnetd port.
44726 </summary>
44727 @@ -64468,7 +64552,7 @@ Domain allowed access.
44728 </param>
44729 <infoflow type="both" weight="10"/>
44730 </interface>
44731 -<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="87115">
44732 +<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="87133">
44733 <summary>
44734 Do not audit attempts to send and receive
44735 UDP traffic on the telnetd port.
44736 @@ -64480,7 +64564,7 @@ Domain to not audit.
44737 </param>
44738 <infoflow type="none"/>
44739 </interface>
44740 -<interface name="corenet_tcp_bind_telnetd_port" lineno="87130">
44741 +<interface name="corenet_tcp_bind_telnetd_port" lineno="87148">
44742 <summary>
44743 Bind TCP sockets to the telnetd port.
44744 </summary>
44745 @@ -64491,7 +64575,7 @@ Domain allowed access.
44746 </param>
44747 <infoflow type="none"/>
44748 </interface>
44749 -<interface name="corenet_udp_bind_telnetd_port" lineno="87150">
44750 +<interface name="corenet_udp_bind_telnetd_port" lineno="87168">
44751 <summary>
44752 Bind UDP sockets to the telnetd port.
44753 </summary>
44754 @@ -64502,7 +64586,7 @@ Domain allowed access.
44755 </param>
44756 <infoflow type="none"/>
44757 </interface>
44758 -<interface name="corenet_tcp_connect_telnetd_port" lineno="87169">
44759 +<interface name="corenet_tcp_connect_telnetd_port" lineno="87187">
44760 <summary>
44761 Make a TCP connection to the telnetd port.
44762 </summary>
44763 @@ -64512,7 +64596,7 @@ Domain allowed access.
44764 </summary>
44765 </param>
44766 </interface>
44767 -<interface name="corenet_send_telnetd_client_packets" lineno="87189">
44768 +<interface name="corenet_send_telnetd_client_packets" lineno="87207">
44769 <summary>
44770 Send telnetd_client packets.
44771 </summary>
44772 @@ -64523,7 +64607,7 @@ Domain allowed access.
44773 </param>
44774 <infoflow type="write" weight="10"/>
44775 </interface>
44776 -<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="87208">
44777 +<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="87226">
44778 <summary>
44779 Do not audit attempts to send telnetd_client packets.
44780 </summary>
44781 @@ -64534,7 +64618,7 @@ Domain to not audit.
44782 </param>
44783 <infoflow type="none"/>
44784 </interface>
44785 -<interface name="corenet_receive_telnetd_client_packets" lineno="87227">
44786 +<interface name="corenet_receive_telnetd_client_packets" lineno="87245">
44787 <summary>
44788 Receive telnetd_client packets.
44789 </summary>
44790 @@ -64545,7 +64629,7 @@ Domain allowed access.
44791 </param>
44792 <infoflow type="read" weight="10"/>
44793 </interface>
44794 -<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="87246">
44795 +<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="87264">
44796 <summary>
44797 Do not audit attempts to receive telnetd_client packets.
44798 </summary>
44799 @@ -64556,7 +64640,7 @@ Domain allowed access.
44800 </param>
44801 <infoflow type="none"/>
44802 </interface>
44803 -<interface name="corenet_sendrecv_telnetd_client_packets" lineno="87265">
44804 +<interface name="corenet_sendrecv_telnetd_client_packets" lineno="87283">
44805 <summary>
44806 Send and receive telnetd_client packets.
44807 </summary>
44808 @@ -64567,7 +64651,7 @@ Domain allowed access.
44809 </param>
44810 <infoflow type="both" weight="10"/>
44811 </interface>
44812 -<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="87281">
44813 +<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="87299">
44814 <summary>
44815 Do not audit attempts to send and receive telnetd_client packets.
44816 </summary>
44817 @@ -64578,7 +64662,7 @@ Domain to not audit.
44818 </param>
44819 <infoflow type="none"/>
44820 </interface>
44821 -<interface name="corenet_relabelto_telnetd_client_packets" lineno="87296">
44822 +<interface name="corenet_relabelto_telnetd_client_packets" lineno="87314">
44823 <summary>
44824 Relabel packets to telnetd_client the packet type.
44825 </summary>
44826 @@ -64588,7 +64672,7 @@ Domain allowed access.
44827 </summary>
44828 </param>
44829 </interface>
44830 -<interface name="corenet_send_telnetd_server_packets" lineno="87316">
44831 +<interface name="corenet_send_telnetd_server_packets" lineno="87334">
44832 <summary>
44833 Send telnetd_server packets.
44834 </summary>
44835 @@ -64599,7 +64683,7 @@ Domain allowed access.
44836 </param>
44837 <infoflow type="write" weight="10"/>
44838 </interface>
44839 -<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="87335">
44840 +<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="87353">
44841 <summary>
44842 Do not audit attempts to send telnetd_server packets.
44843 </summary>
44844 @@ -64610,7 +64694,7 @@ Domain to not audit.
44845 </param>
44846 <infoflow type="none"/>
44847 </interface>
44848 -<interface name="corenet_receive_telnetd_server_packets" lineno="87354">
44849 +<interface name="corenet_receive_telnetd_server_packets" lineno="87372">
44850 <summary>
44851 Receive telnetd_server packets.
44852 </summary>
44853 @@ -64621,7 +64705,7 @@ Domain allowed access.
44854 </param>
44855 <infoflow type="read" weight="10"/>
44856 </interface>
44857 -<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="87373">
44858 +<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="87391">
44859 <summary>
44860 Do not audit attempts to receive telnetd_server packets.
44861 </summary>
44862 @@ -64632,7 +64716,7 @@ Domain allowed access.
44863 </param>
44864 <infoflow type="none"/>
44865 </interface>
44866 -<interface name="corenet_sendrecv_telnetd_server_packets" lineno="87392">
44867 +<interface name="corenet_sendrecv_telnetd_server_packets" lineno="87410">
44868 <summary>
44869 Send and receive telnetd_server packets.
44870 </summary>
44871 @@ -64643,7 +64727,7 @@ Domain allowed access.
44872 </param>
44873 <infoflow type="both" weight="10"/>
44874 </interface>
44875 -<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="87408">
44876 +<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="87426">
44877 <summary>
44878 Do not audit attempts to send and receive telnetd_server packets.
44879 </summary>
44880 @@ -64654,7 +64738,7 @@ Domain to not audit.
44881 </param>
44882 <infoflow type="none"/>
44883 </interface>
44884 -<interface name="corenet_relabelto_telnetd_server_packets" lineno="87423">
44885 +<interface name="corenet_relabelto_telnetd_server_packets" lineno="87441">
44886 <summary>
44887 Relabel packets to telnetd_server the packet type.
44888 </summary>
44889 @@ -64664,7 +64748,7 @@ Domain allowed access.
44890 </summary>
44891 </param>
44892 </interface>
44893 -<interface name="corenet_tcp_sendrecv_tftp_port" lineno="87445">
44894 +<interface name="corenet_tcp_sendrecv_tftp_port" lineno="87463">
44895 <summary>
44896 Send and receive TCP traffic on the tftp port.
44897 </summary>
44898 @@ -64675,7 +64759,7 @@ Domain allowed access.
44899 </param>
44900 <infoflow type="both" weight="10"/>
44901 </interface>
44902 -<interface name="corenet_udp_send_tftp_port" lineno="87460">
44903 +<interface name="corenet_udp_send_tftp_port" lineno="87478">
44904 <summary>
44905 Send UDP traffic on the tftp port.
44906 </summary>
44907 @@ -64686,7 +64770,7 @@ Domain allowed access.
44908 </param>
44909 <infoflow type="write" weight="10"/>
44910 </interface>
44911 -<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="87475">
44912 +<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="87493">
44913 <summary>
44914 Do not audit attempts to send UDP traffic on the tftp port.
44915 </summary>
44916 @@ -64697,7 +64781,7 @@ Domain to not audit.
44917 </param>
44918 <infoflow type="none"/>
44919 </interface>
44920 -<interface name="corenet_udp_receive_tftp_port" lineno="87490">
44921 +<interface name="corenet_udp_receive_tftp_port" lineno="87508">
44922 <summary>
44923 Receive UDP traffic on the tftp port.
44924 </summary>
44925 @@ -64708,7 +64792,7 @@ Domain allowed access.
44926 </param>
44927 <infoflow type="read" weight="10"/>
44928 </interface>
44929 -<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="87505">
44930 +<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="87523">
44931 <summary>
44932 Do not audit attempts to receive UDP traffic on the tftp port.
44933 </summary>
44934 @@ -64719,7 +64803,7 @@ Domain to not audit.
44935 </param>
44936 <infoflow type="none"/>
44937 </interface>
44938 -<interface name="corenet_udp_sendrecv_tftp_port" lineno="87520">
44939 +<interface name="corenet_udp_sendrecv_tftp_port" lineno="87538">
44940 <summary>
44941 Send and receive UDP traffic on the tftp port.
44942 </summary>
44943 @@ -64730,7 +64814,7 @@ Domain allowed access.
44944 </param>
44945 <infoflow type="both" weight="10"/>
44946 </interface>
44947 -<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="87536">
44948 +<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="87554">
44949 <summary>
44950 Do not audit attempts to send and receive
44951 UDP traffic on the tftp port.
44952 @@ -64742,7 +64826,7 @@ Domain to not audit.
44953 </param>
44954 <infoflow type="none"/>
44955 </interface>
44956 -<interface name="corenet_tcp_bind_tftp_port" lineno="87551">
44957 +<interface name="corenet_tcp_bind_tftp_port" lineno="87569">
44958 <summary>
44959 Bind TCP sockets to the tftp port.
44960 </summary>
44961 @@ -64753,7 +64837,7 @@ Domain allowed access.
44962 </param>
44963 <infoflow type="none"/>
44964 </interface>
44965 -<interface name="corenet_udp_bind_tftp_port" lineno="87571">
44966 +<interface name="corenet_udp_bind_tftp_port" lineno="87589">
44967 <summary>
44968 Bind UDP sockets to the tftp port.
44969 </summary>
44970 @@ -64764,7 +64848,7 @@ Domain allowed access.
44971 </param>
44972 <infoflow type="none"/>
44973 </interface>
44974 -<interface name="corenet_tcp_connect_tftp_port" lineno="87590">
44975 +<interface name="corenet_tcp_connect_tftp_port" lineno="87608">
44976 <summary>
44977 Make a TCP connection to the tftp port.
44978 </summary>
44979 @@ -64774,7 +64858,7 @@ Domain allowed access.
44980 </summary>
44981 </param>
44982 </interface>
44983 -<interface name="corenet_send_tftp_client_packets" lineno="87610">
44984 +<interface name="corenet_send_tftp_client_packets" lineno="87628">
44985 <summary>
44986 Send tftp_client packets.
44987 </summary>
44988 @@ -64785,7 +64869,7 @@ Domain allowed access.
44989 </param>
44990 <infoflow type="write" weight="10"/>
44991 </interface>
44992 -<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="87629">
44993 +<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="87647">
44994 <summary>
44995 Do not audit attempts to send tftp_client packets.
44996 </summary>
44997 @@ -64796,7 +64880,7 @@ Domain to not audit.
44998 </param>
44999 <infoflow type="none"/>
45000 </interface>
45001 -<interface name="corenet_receive_tftp_client_packets" lineno="87648">
45002 +<interface name="corenet_receive_tftp_client_packets" lineno="87666">
45003 <summary>
45004 Receive tftp_client packets.
45005 </summary>
45006 @@ -64807,7 +64891,7 @@ Domain allowed access.
45007 </param>
45008 <infoflow type="read" weight="10"/>
45009 </interface>
45010 -<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="87667">
45011 +<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="87685">
45012 <summary>
45013 Do not audit attempts to receive tftp_client packets.
45014 </summary>
45015 @@ -64818,7 +64902,7 @@ Domain allowed access.
45016 </param>
45017 <infoflow type="none"/>
45018 </interface>
45019 -<interface name="corenet_sendrecv_tftp_client_packets" lineno="87686">
45020 +<interface name="corenet_sendrecv_tftp_client_packets" lineno="87704">
45021 <summary>
45022 Send and receive tftp_client packets.
45023 </summary>
45024 @@ -64829,7 +64913,7 @@ Domain allowed access.
45025 </param>
45026 <infoflow type="both" weight="10"/>
45027 </interface>
45028 -<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="87702">
45029 +<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="87720">
45030 <summary>
45031 Do not audit attempts to send and receive tftp_client packets.
45032 </summary>
45033 @@ -64840,7 +64924,7 @@ Domain to not audit.
45034 </param>
45035 <infoflow type="none"/>
45036 </interface>
45037 -<interface name="corenet_relabelto_tftp_client_packets" lineno="87717">
45038 +<interface name="corenet_relabelto_tftp_client_packets" lineno="87735">
45039 <summary>
45040 Relabel packets to tftp_client the packet type.
45041 </summary>
45042 @@ -64850,7 +64934,7 @@ Domain allowed access.
45043 </summary>
45044 </param>
45045 </interface>
45046 -<interface name="corenet_send_tftp_server_packets" lineno="87737">
45047 +<interface name="corenet_send_tftp_server_packets" lineno="87755">
45048 <summary>
45049 Send tftp_server packets.
45050 </summary>
45051 @@ -64861,7 +64945,7 @@ Domain allowed access.
45052 </param>
45053 <infoflow type="write" weight="10"/>
45054 </interface>
45055 -<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="87756">
45056 +<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="87774">
45057 <summary>
45058 Do not audit attempts to send tftp_server packets.
45059 </summary>
45060 @@ -64872,7 +64956,7 @@ Domain to not audit.
45061 </param>
45062 <infoflow type="none"/>
45063 </interface>
45064 -<interface name="corenet_receive_tftp_server_packets" lineno="87775">
45065 +<interface name="corenet_receive_tftp_server_packets" lineno="87793">
45066 <summary>
45067 Receive tftp_server packets.
45068 </summary>
45069 @@ -64883,7 +64967,7 @@ Domain allowed access.
45070 </param>
45071 <infoflow type="read" weight="10"/>
45072 </interface>
45073 -<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="87794">
45074 +<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="87812">
45075 <summary>
45076 Do not audit attempts to receive tftp_server packets.
45077 </summary>
45078 @@ -64894,7 +64978,7 @@ Domain allowed access.
45079 </param>
45080 <infoflow type="none"/>
45081 </interface>
45082 -<interface name="corenet_sendrecv_tftp_server_packets" lineno="87813">
45083 +<interface name="corenet_sendrecv_tftp_server_packets" lineno="87831">
45084 <summary>
45085 Send and receive tftp_server packets.
45086 </summary>
45087 @@ -64905,7 +64989,7 @@ Domain allowed access.
45088 </param>
45089 <infoflow type="both" weight="10"/>
45090 </interface>
45091 -<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="87829">
45092 +<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="87847">
45093 <summary>
45094 Do not audit attempts to send and receive tftp_server packets.
45095 </summary>
45096 @@ -64916,7 +65000,7 @@ Domain to not audit.
45097 </param>
45098 <infoflow type="none"/>
45099 </interface>
45100 -<interface name="corenet_relabelto_tftp_server_packets" lineno="87844">
45101 +<interface name="corenet_relabelto_tftp_server_packets" lineno="87862">
45102 <summary>
45103 Relabel packets to tftp_server the packet type.
45104 </summary>
45105 @@ -64926,7 +65010,7 @@ Domain allowed access.
45106 </summary>
45107 </param>
45108 </interface>
45109 -<interface name="corenet_tcp_sendrecv_tor_port" lineno="87866">
45110 +<interface name="corenet_tcp_sendrecv_tor_port" lineno="87884">
45111 <summary>
45112 Send and receive TCP traffic on the tor port.
45113 </summary>
45114 @@ -64937,7 +65021,7 @@ Domain allowed access.
45115 </param>
45116 <infoflow type="both" weight="10"/>
45117 </interface>
45118 -<interface name="corenet_udp_send_tor_port" lineno="87881">
45119 +<interface name="corenet_udp_send_tor_port" lineno="87899">
45120 <summary>
45121 Send UDP traffic on the tor port.
45122 </summary>
45123 @@ -64948,7 +65032,7 @@ Domain allowed access.
45124 </param>
45125 <infoflow type="write" weight="10"/>
45126 </interface>
45127 -<interface name="corenet_dontaudit_udp_send_tor_port" lineno="87896">
45128 +<interface name="corenet_dontaudit_udp_send_tor_port" lineno="87914">
45129 <summary>
45130 Do not audit attempts to send UDP traffic on the tor port.
45131 </summary>
45132 @@ -64959,7 +65043,7 @@ Domain to not audit.
45133 </param>
45134 <infoflow type="none"/>
45135 </interface>
45136 -<interface name="corenet_udp_receive_tor_port" lineno="87911">
45137 +<interface name="corenet_udp_receive_tor_port" lineno="87929">
45138 <summary>
45139 Receive UDP traffic on the tor port.
45140 </summary>
45141 @@ -64970,7 +65054,7 @@ Domain allowed access.
45142 </param>
45143 <infoflow type="read" weight="10"/>
45144 </interface>
45145 -<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="87926">
45146 +<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="87944">
45147 <summary>
45148 Do not audit attempts to receive UDP traffic on the tor port.
45149 </summary>
45150 @@ -64981,7 +65065,7 @@ Domain to not audit.
45151 </param>
45152 <infoflow type="none"/>
45153 </interface>
45154 -<interface name="corenet_udp_sendrecv_tor_port" lineno="87941">
45155 +<interface name="corenet_udp_sendrecv_tor_port" lineno="87959">
45156 <summary>
45157 Send and receive UDP traffic on the tor port.
45158 </summary>
45159 @@ -64992,7 +65076,7 @@ Domain allowed access.
45160 </param>
45161 <infoflow type="both" weight="10"/>
45162 </interface>
45163 -<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="87957">
45164 +<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="87975">
45165 <summary>
45166 Do not audit attempts to send and receive
45167 UDP traffic on the tor port.
45168 @@ -65004,7 +65088,7 @@ Domain to not audit.
45169 </param>
45170 <infoflow type="none"/>
45171 </interface>
45172 -<interface name="corenet_tcp_bind_tor_port" lineno="87972">
45173 +<interface name="corenet_tcp_bind_tor_port" lineno="87990">
45174 <summary>
45175 Bind TCP sockets to the tor port.
45176 </summary>
45177 @@ -65015,7 +65099,7 @@ Domain allowed access.
45178 </param>
45179 <infoflow type="none"/>
45180 </interface>
45181 -<interface name="corenet_udp_bind_tor_port" lineno="87992">
45182 +<interface name="corenet_udp_bind_tor_port" lineno="88010">
45183 <summary>
45184 Bind UDP sockets to the tor port.
45185 </summary>
45186 @@ -65026,7 +65110,7 @@ Domain allowed access.
45187 </param>
45188 <infoflow type="none"/>
45189 </interface>
45190 -<interface name="corenet_tcp_connect_tor_port" lineno="88011">
45191 +<interface name="corenet_tcp_connect_tor_port" lineno="88029">
45192 <summary>
45193 Make a TCP connection to the tor port.
45194 </summary>
45195 @@ -65036,7 +65120,7 @@ Domain allowed access.
45196 </summary>
45197 </param>
45198 </interface>
45199 -<interface name="corenet_send_tor_client_packets" lineno="88031">
45200 +<interface name="corenet_send_tor_client_packets" lineno="88049">
45201 <summary>
45202 Send tor_client packets.
45203 </summary>
45204 @@ -65047,7 +65131,7 @@ Domain allowed access.
45205 </param>
45206 <infoflow type="write" weight="10"/>
45207 </interface>
45208 -<interface name="corenet_dontaudit_send_tor_client_packets" lineno="88050">
45209 +<interface name="corenet_dontaudit_send_tor_client_packets" lineno="88068">
45210 <summary>
45211 Do not audit attempts to send tor_client packets.
45212 </summary>
45213 @@ -65058,7 +65142,7 @@ Domain to not audit.
45214 </param>
45215 <infoflow type="none"/>
45216 </interface>
45217 -<interface name="corenet_receive_tor_client_packets" lineno="88069">
45218 +<interface name="corenet_receive_tor_client_packets" lineno="88087">
45219 <summary>
45220 Receive tor_client packets.
45221 </summary>
45222 @@ -65069,7 +65153,7 @@ Domain allowed access.
45223 </param>
45224 <infoflow type="read" weight="10"/>
45225 </interface>
45226 -<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="88088">
45227 +<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="88106">
45228 <summary>
45229 Do not audit attempts to receive tor_client packets.
45230 </summary>
45231 @@ -65080,7 +65164,7 @@ Domain allowed access.
45232 </param>
45233 <infoflow type="none"/>
45234 </interface>
45235 -<interface name="corenet_sendrecv_tor_client_packets" lineno="88107">
45236 +<interface name="corenet_sendrecv_tor_client_packets" lineno="88125">
45237 <summary>
45238 Send and receive tor_client packets.
45239 </summary>
45240 @@ -65091,7 +65175,7 @@ Domain allowed access.
45241 </param>
45242 <infoflow type="both" weight="10"/>
45243 </interface>
45244 -<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="88123">
45245 +<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="88141">
45246 <summary>
45247 Do not audit attempts to send and receive tor_client packets.
45248 </summary>
45249 @@ -65102,7 +65186,7 @@ Domain to not audit.
45250 </param>
45251 <infoflow type="none"/>
45252 </interface>
45253 -<interface name="corenet_relabelto_tor_client_packets" lineno="88138">
45254 +<interface name="corenet_relabelto_tor_client_packets" lineno="88156">
45255 <summary>
45256 Relabel packets to tor_client the packet type.
45257 </summary>
45258 @@ -65112,7 +65196,7 @@ Domain allowed access.
45259 </summary>
45260 </param>
45261 </interface>
45262 -<interface name="corenet_send_tor_server_packets" lineno="88158">
45263 +<interface name="corenet_send_tor_server_packets" lineno="88176">
45264 <summary>
45265 Send tor_server packets.
45266 </summary>
45267 @@ -65123,7 +65207,7 @@ Domain allowed access.
45268 </param>
45269 <infoflow type="write" weight="10"/>
45270 </interface>
45271 -<interface name="corenet_dontaudit_send_tor_server_packets" lineno="88177">
45272 +<interface name="corenet_dontaudit_send_tor_server_packets" lineno="88195">
45273 <summary>
45274 Do not audit attempts to send tor_server packets.
45275 </summary>
45276 @@ -65134,7 +65218,7 @@ Domain to not audit.
45277 </param>
45278 <infoflow type="none"/>
45279 </interface>
45280 -<interface name="corenet_receive_tor_server_packets" lineno="88196">
45281 +<interface name="corenet_receive_tor_server_packets" lineno="88214">
45282 <summary>
45283 Receive tor_server packets.
45284 </summary>
45285 @@ -65145,7 +65229,7 @@ Domain allowed access.
45286 </param>
45287 <infoflow type="read" weight="10"/>
45288 </interface>
45289 -<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="88215">
45290 +<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="88233">
45291 <summary>
45292 Do not audit attempts to receive tor_server packets.
45293 </summary>
45294 @@ -65156,7 +65240,7 @@ Domain allowed access.
45295 </param>
45296 <infoflow type="none"/>
45297 </interface>
45298 -<interface name="corenet_sendrecv_tor_server_packets" lineno="88234">
45299 +<interface name="corenet_sendrecv_tor_server_packets" lineno="88252">
45300 <summary>
45301 Send and receive tor_server packets.
45302 </summary>
45303 @@ -65167,7 +65251,7 @@ Domain allowed access.
45304 </param>
45305 <infoflow type="both" weight="10"/>
45306 </interface>
45307 -<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="88250">
45308 +<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="88268">
45309 <summary>
45310 Do not audit attempts to send and receive tor_server packets.
45311 </summary>
45312 @@ -65178,7 +65262,7 @@ Domain to not audit.
45313 </param>
45314 <infoflow type="none"/>
45315 </interface>
45316 -<interface name="corenet_relabelto_tor_server_packets" lineno="88265">
45317 +<interface name="corenet_relabelto_tor_server_packets" lineno="88283">
45318 <summary>
45319 Relabel packets to tor_server the packet type.
45320 </summary>
45321 @@ -65188,7 +65272,7 @@ Domain allowed access.
45322 </summary>
45323 </param>
45324 </interface>
45325 -<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="88287">
45326 +<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="88305">
45327 <summary>
45328 Send and receive TCP traffic on the traceroute port.
45329 </summary>
45330 @@ -65199,7 +65283,7 @@ Domain allowed access.
45331 </param>
45332 <infoflow type="both" weight="10"/>
45333 </interface>
45334 -<interface name="corenet_udp_send_traceroute_port" lineno="88302">
45335 +<interface name="corenet_udp_send_traceroute_port" lineno="88320">
45336 <summary>
45337 Send UDP traffic on the traceroute port.
45338 </summary>
45339 @@ -65210,7 +65294,7 @@ Domain allowed access.
45340 </param>
45341 <infoflow type="write" weight="10"/>
45342 </interface>
45343 -<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="88317">
45344 +<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="88335">
45345 <summary>
45346 Do not audit attempts to send UDP traffic on the traceroute port.
45347 </summary>
45348 @@ -65221,7 +65305,7 @@ Domain to not audit.
45349 </param>
45350 <infoflow type="none"/>
45351 </interface>
45352 -<interface name="corenet_udp_receive_traceroute_port" lineno="88332">
45353 +<interface name="corenet_udp_receive_traceroute_port" lineno="88350">
45354 <summary>
45355 Receive UDP traffic on the traceroute port.
45356 </summary>
45357 @@ -65232,7 +65316,7 @@ Domain allowed access.
45358 </param>
45359 <infoflow type="read" weight="10"/>
45360 </interface>
45361 -<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="88347">
45362 +<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="88365">
45363 <summary>
45364 Do not audit attempts to receive UDP traffic on the traceroute port.
45365 </summary>
45366 @@ -65243,7 +65327,7 @@ Domain to not audit.
45367 </param>
45368 <infoflow type="none"/>
45369 </interface>
45370 -<interface name="corenet_udp_sendrecv_traceroute_port" lineno="88362">
45371 +<interface name="corenet_udp_sendrecv_traceroute_port" lineno="88380">
45372 <summary>
45373 Send and receive UDP traffic on the traceroute port.
45374 </summary>
45375 @@ -65254,7 +65338,7 @@ Domain allowed access.
45376 </param>
45377 <infoflow type="both" weight="10"/>
45378 </interface>
45379 -<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="88378">
45380 +<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="88396">
45381 <summary>
45382 Do not audit attempts to send and receive
45383 UDP traffic on the traceroute port.
45384 @@ -65266,7 +65350,7 @@ Domain to not audit.
45385 </param>
45386 <infoflow type="none"/>
45387 </interface>
45388 -<interface name="corenet_tcp_bind_traceroute_port" lineno="88393">
45389 +<interface name="corenet_tcp_bind_traceroute_port" lineno="88411">
45390 <summary>
45391 Bind TCP sockets to the traceroute port.
45392 </summary>
45393 @@ -65277,7 +65361,7 @@ Domain allowed access.
45394 </param>
45395 <infoflow type="none"/>
45396 </interface>
45397 -<interface name="corenet_udp_bind_traceroute_port" lineno="88413">
45398 +<interface name="corenet_udp_bind_traceroute_port" lineno="88431">
45399 <summary>
45400 Bind UDP sockets to the traceroute port.
45401 </summary>
45402 @@ -65288,7 +65372,7 @@ Domain allowed access.
45403 </param>
45404 <infoflow type="none"/>
45405 </interface>
45406 -<interface name="corenet_tcp_connect_traceroute_port" lineno="88432">
45407 +<interface name="corenet_tcp_connect_traceroute_port" lineno="88450">
45408 <summary>
45409 Make a TCP connection to the traceroute port.
45410 </summary>
45411 @@ -65298,7 +65382,7 @@ Domain allowed access.
45412 </summary>
45413 </param>
45414 </interface>
45415 -<interface name="corenet_send_traceroute_client_packets" lineno="88452">
45416 +<interface name="corenet_send_traceroute_client_packets" lineno="88470">
45417 <summary>
45418 Send traceroute_client packets.
45419 </summary>
45420 @@ -65309,7 +65393,7 @@ Domain allowed access.
45421 </param>
45422 <infoflow type="write" weight="10"/>
45423 </interface>
45424 -<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="88471">
45425 +<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="88489">
45426 <summary>
45427 Do not audit attempts to send traceroute_client packets.
45428 </summary>
45429 @@ -65320,7 +65404,7 @@ Domain to not audit.
45430 </param>
45431 <infoflow type="none"/>
45432 </interface>
45433 -<interface name="corenet_receive_traceroute_client_packets" lineno="88490">
45434 +<interface name="corenet_receive_traceroute_client_packets" lineno="88508">
45435 <summary>
45436 Receive traceroute_client packets.
45437 </summary>
45438 @@ -65331,7 +65415,7 @@ Domain allowed access.
45439 </param>
45440 <infoflow type="read" weight="10"/>
45441 </interface>
45442 -<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="88509">
45443 +<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="88527">
45444 <summary>
45445 Do not audit attempts to receive traceroute_client packets.
45446 </summary>
45447 @@ -65342,7 +65426,7 @@ Domain allowed access.
45448 </param>
45449 <infoflow type="none"/>
45450 </interface>
45451 -<interface name="corenet_sendrecv_traceroute_client_packets" lineno="88528">
45452 +<interface name="corenet_sendrecv_traceroute_client_packets" lineno="88546">
45453 <summary>
45454 Send and receive traceroute_client packets.
45455 </summary>
45456 @@ -65353,7 +65437,7 @@ Domain allowed access.
45457 </param>
45458 <infoflow type="both" weight="10"/>
45459 </interface>
45460 -<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="88544">
45461 +<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="88562">
45462 <summary>
45463 Do not audit attempts to send and receive traceroute_client packets.
45464 </summary>
45465 @@ -65364,7 +65448,7 @@ Domain to not audit.
45466 </param>
45467 <infoflow type="none"/>
45468 </interface>
45469 -<interface name="corenet_relabelto_traceroute_client_packets" lineno="88559">
45470 +<interface name="corenet_relabelto_traceroute_client_packets" lineno="88577">
45471 <summary>
45472 Relabel packets to traceroute_client the packet type.
45473 </summary>
45474 @@ -65374,7 +65458,7 @@ Domain allowed access.
45475 </summary>
45476 </param>
45477 </interface>
45478 -<interface name="corenet_send_traceroute_server_packets" lineno="88579">
45479 +<interface name="corenet_send_traceroute_server_packets" lineno="88597">
45480 <summary>
45481 Send traceroute_server packets.
45482 </summary>
45483 @@ -65385,7 +65469,7 @@ Domain allowed access.
45484 </param>
45485 <infoflow type="write" weight="10"/>
45486 </interface>
45487 -<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="88598">
45488 +<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="88616">
45489 <summary>
45490 Do not audit attempts to send traceroute_server packets.
45491 </summary>
45492 @@ -65396,7 +65480,7 @@ Domain to not audit.
45493 </param>
45494 <infoflow type="none"/>
45495 </interface>
45496 -<interface name="corenet_receive_traceroute_server_packets" lineno="88617">
45497 +<interface name="corenet_receive_traceroute_server_packets" lineno="88635">
45498 <summary>
45499 Receive traceroute_server packets.
45500 </summary>
45501 @@ -65407,7 +65491,7 @@ Domain allowed access.
45502 </param>
45503 <infoflow type="read" weight="10"/>
45504 </interface>
45505 -<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="88636">
45506 +<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="88654">
45507 <summary>
45508 Do not audit attempts to receive traceroute_server packets.
45509 </summary>
45510 @@ -65418,7 +65502,7 @@ Domain allowed access.
45511 </param>
45512 <infoflow type="none"/>
45513 </interface>
45514 -<interface name="corenet_sendrecv_traceroute_server_packets" lineno="88655">
45515 +<interface name="corenet_sendrecv_traceroute_server_packets" lineno="88673">
45516 <summary>
45517 Send and receive traceroute_server packets.
45518 </summary>
45519 @@ -65429,7 +65513,7 @@ Domain allowed access.
45520 </param>
45521 <infoflow type="both" weight="10"/>
45522 </interface>
45523 -<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="88671">
45524 +<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="88689">
45525 <summary>
45526 Do not audit attempts to send and receive traceroute_server packets.
45527 </summary>
45528 @@ -65440,7 +65524,7 @@ Domain to not audit.
45529 </param>
45530 <infoflow type="none"/>
45531 </interface>
45532 -<interface name="corenet_relabelto_traceroute_server_packets" lineno="88686">
45533 +<interface name="corenet_relabelto_traceroute_server_packets" lineno="88704">
45534 <summary>
45535 Relabel packets to traceroute_server the packet type.
45536 </summary>
45537 @@ -65450,7 +65534,7 @@ Domain allowed access.
45538 </summary>
45539 </param>
45540 </interface>
45541 -<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="88708">
45542 +<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="88726">
45543 <summary>
45544 Send and receive TCP traffic on the transproxy port.
45545 </summary>
45546 @@ -65461,7 +65545,7 @@ Domain allowed access.
45547 </param>
45548 <infoflow type="both" weight="10"/>
45549 </interface>
45550 -<interface name="corenet_udp_send_transproxy_port" lineno="88723">
45551 +<interface name="corenet_udp_send_transproxy_port" lineno="88741">
45552 <summary>
45553 Send UDP traffic on the transproxy port.
45554 </summary>
45555 @@ -65472,7 +65556,7 @@ Domain allowed access.
45556 </param>
45557 <infoflow type="write" weight="10"/>
45558 </interface>
45559 -<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="88738">
45560 +<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="88756">
45561 <summary>
45562 Do not audit attempts to send UDP traffic on the transproxy port.
45563 </summary>
45564 @@ -65483,7 +65567,7 @@ Domain to not audit.
45565 </param>
45566 <infoflow type="none"/>
45567 </interface>
45568 -<interface name="corenet_udp_receive_transproxy_port" lineno="88753">
45569 +<interface name="corenet_udp_receive_transproxy_port" lineno="88771">
45570 <summary>
45571 Receive UDP traffic on the transproxy port.
45572 </summary>
45573 @@ -65494,7 +65578,7 @@ Domain allowed access.
45574 </param>
45575 <infoflow type="read" weight="10"/>
45576 </interface>
45577 -<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="88768">
45578 +<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="88786">
45579 <summary>
45580 Do not audit attempts to receive UDP traffic on the transproxy port.
45581 </summary>
45582 @@ -65505,7 +65589,7 @@ Domain to not audit.
45583 </param>
45584 <infoflow type="none"/>
45585 </interface>
45586 -<interface name="corenet_udp_sendrecv_transproxy_port" lineno="88783">
45587 +<interface name="corenet_udp_sendrecv_transproxy_port" lineno="88801">
45588 <summary>
45589 Send and receive UDP traffic on the transproxy port.
45590 </summary>
45591 @@ -65516,7 +65600,7 @@ Domain allowed access.
45592 </param>
45593 <infoflow type="both" weight="10"/>
45594 </interface>
45595 -<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="88799">
45596 +<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="88817">
45597 <summary>
45598 Do not audit attempts to send and receive
45599 UDP traffic on the transproxy port.
45600 @@ -65528,7 +65612,7 @@ Domain to not audit.
45601 </param>
45602 <infoflow type="none"/>
45603 </interface>
45604 -<interface name="corenet_tcp_bind_transproxy_port" lineno="88814">
45605 +<interface name="corenet_tcp_bind_transproxy_port" lineno="88832">
45606 <summary>
45607 Bind TCP sockets to the transproxy port.
45608 </summary>
45609 @@ -65539,7 +65623,7 @@ Domain allowed access.
45610 </param>
45611 <infoflow type="none"/>
45612 </interface>
45613 -<interface name="corenet_udp_bind_transproxy_port" lineno="88834">
45614 +<interface name="corenet_udp_bind_transproxy_port" lineno="88852">
45615 <summary>
45616 Bind UDP sockets to the transproxy port.
45617 </summary>
45618 @@ -65550,7 +65634,7 @@ Domain allowed access.
45619 </param>
45620 <infoflow type="none"/>
45621 </interface>
45622 -<interface name="corenet_tcp_connect_transproxy_port" lineno="88853">
45623 +<interface name="corenet_tcp_connect_transproxy_port" lineno="88871">
45624 <summary>
45625 Make a TCP connection to the transproxy port.
45626 </summary>
45627 @@ -65560,7 +65644,7 @@ Domain allowed access.
45628 </summary>
45629 </param>
45630 </interface>
45631 -<interface name="corenet_send_transproxy_client_packets" lineno="88873">
45632 +<interface name="corenet_send_transproxy_client_packets" lineno="88891">
45633 <summary>
45634 Send transproxy_client packets.
45635 </summary>
45636 @@ -65571,7 +65655,7 @@ Domain allowed access.
45637 </param>
45638 <infoflow type="write" weight="10"/>
45639 </interface>
45640 -<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="88892">
45641 +<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="88910">
45642 <summary>
45643 Do not audit attempts to send transproxy_client packets.
45644 </summary>
45645 @@ -65582,7 +65666,7 @@ Domain to not audit.
45646 </param>
45647 <infoflow type="none"/>
45648 </interface>
45649 -<interface name="corenet_receive_transproxy_client_packets" lineno="88911">
45650 +<interface name="corenet_receive_transproxy_client_packets" lineno="88929">
45651 <summary>
45652 Receive transproxy_client packets.
45653 </summary>
45654 @@ -65593,7 +65677,7 @@ Domain allowed access.
45655 </param>
45656 <infoflow type="read" weight="10"/>
45657 </interface>
45658 -<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="88930">
45659 +<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="88948">
45660 <summary>
45661 Do not audit attempts to receive transproxy_client packets.
45662 </summary>
45663 @@ -65604,7 +65688,7 @@ Domain allowed access.
45664 </param>
45665 <infoflow type="none"/>
45666 </interface>
45667 -<interface name="corenet_sendrecv_transproxy_client_packets" lineno="88949">
45668 +<interface name="corenet_sendrecv_transproxy_client_packets" lineno="88967">
45669 <summary>
45670 Send and receive transproxy_client packets.
45671 </summary>
45672 @@ -65615,7 +65699,7 @@ Domain allowed access.
45673 </param>
45674 <infoflow type="both" weight="10"/>
45675 </interface>
45676 -<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="88965">
45677 +<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="88983">
45678 <summary>
45679 Do not audit attempts to send and receive transproxy_client packets.
45680 </summary>
45681 @@ -65626,7 +65710,7 @@ Domain to not audit.
45682 </param>
45683 <infoflow type="none"/>
45684 </interface>
45685 -<interface name="corenet_relabelto_transproxy_client_packets" lineno="88980">
45686 +<interface name="corenet_relabelto_transproxy_client_packets" lineno="88998">
45687 <summary>
45688 Relabel packets to transproxy_client the packet type.
45689 </summary>
45690 @@ -65636,7 +65720,7 @@ Domain allowed access.
45691 </summary>
45692 </param>
45693 </interface>
45694 -<interface name="corenet_send_transproxy_server_packets" lineno="89000">
45695 +<interface name="corenet_send_transproxy_server_packets" lineno="89018">
45696 <summary>
45697 Send transproxy_server packets.
45698 </summary>
45699 @@ -65647,7 +65731,7 @@ Domain allowed access.
45700 </param>
45701 <infoflow type="write" weight="10"/>
45702 </interface>
45703 -<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="89019">
45704 +<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="89037">
45705 <summary>
45706 Do not audit attempts to send transproxy_server packets.
45707 </summary>
45708 @@ -65658,7 +65742,7 @@ Domain to not audit.
45709 </param>
45710 <infoflow type="none"/>
45711 </interface>
45712 -<interface name="corenet_receive_transproxy_server_packets" lineno="89038">
45713 +<interface name="corenet_receive_transproxy_server_packets" lineno="89056">
45714 <summary>
45715 Receive transproxy_server packets.
45716 </summary>
45717 @@ -65669,7 +65753,7 @@ Domain allowed access.
45718 </param>
45719 <infoflow type="read" weight="10"/>
45720 </interface>
45721 -<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="89057">
45722 +<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="89075">
45723 <summary>
45724 Do not audit attempts to receive transproxy_server packets.
45725 </summary>
45726 @@ -65680,7 +65764,7 @@ Domain allowed access.
45727 </param>
45728 <infoflow type="none"/>
45729 </interface>
45730 -<interface name="corenet_sendrecv_transproxy_server_packets" lineno="89076">
45731 +<interface name="corenet_sendrecv_transproxy_server_packets" lineno="89094">
45732 <summary>
45733 Send and receive transproxy_server packets.
45734 </summary>
45735 @@ -65691,7 +65775,7 @@ Domain allowed access.
45736 </param>
45737 <infoflow type="both" weight="10"/>
45738 </interface>
45739 -<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="89092">
45740 +<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="89110">
45741 <summary>
45742 Do not audit attempts to send and receive transproxy_server packets.
45743 </summary>
45744 @@ -65702,7 +65786,7 @@ Domain to not audit.
45745 </param>
45746 <infoflow type="none"/>
45747 </interface>
45748 -<interface name="corenet_relabelto_transproxy_server_packets" lineno="89107">
45749 +<interface name="corenet_relabelto_transproxy_server_packets" lineno="89125">
45750 <summary>
45751 Relabel packets to transproxy_server the packet type.
45752 </summary>
45753 @@ -65712,7 +65796,7 @@ Domain allowed access.
45754 </summary>
45755 </param>
45756 </interface>
45757 -<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="89129">
45758 +<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="89147">
45759 <summary>
45760 Send and receive TCP traffic on the trisoap port.
45761 </summary>
45762 @@ -65723,7 +65807,7 @@ Domain allowed access.
45763 </param>
45764 <infoflow type="both" weight="10"/>
45765 </interface>
45766 -<interface name="corenet_udp_send_trisoap_port" lineno="89144">
45767 +<interface name="corenet_udp_send_trisoap_port" lineno="89162">
45768 <summary>
45769 Send UDP traffic on the trisoap port.
45770 </summary>
45771 @@ -65734,7 +65818,7 @@ Domain allowed access.
45772 </param>
45773 <infoflow type="write" weight="10"/>
45774 </interface>
45775 -<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="89159">
45776 +<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="89177">
45777 <summary>
45778 Do not audit attempts to send UDP traffic on the trisoap port.
45779 </summary>
45780 @@ -65745,7 +65829,7 @@ Domain to not audit.
45781 </param>
45782 <infoflow type="none"/>
45783 </interface>
45784 -<interface name="corenet_udp_receive_trisoap_port" lineno="89174">
45785 +<interface name="corenet_udp_receive_trisoap_port" lineno="89192">
45786 <summary>
45787 Receive UDP traffic on the trisoap port.
45788 </summary>
45789 @@ -65756,7 +65840,7 @@ Domain allowed access.
45790 </param>
45791 <infoflow type="read" weight="10"/>
45792 </interface>
45793 -<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="89189">
45794 +<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="89207">
45795 <summary>
45796 Do not audit attempts to receive UDP traffic on the trisoap port.
45797 </summary>
45798 @@ -65767,7 +65851,7 @@ Domain to not audit.
45799 </param>
45800 <infoflow type="none"/>
45801 </interface>
45802 -<interface name="corenet_udp_sendrecv_trisoap_port" lineno="89204">
45803 +<interface name="corenet_udp_sendrecv_trisoap_port" lineno="89222">
45804 <summary>
45805 Send and receive UDP traffic on the trisoap port.
45806 </summary>
45807 @@ -65778,7 +65862,7 @@ Domain allowed access.
45808 </param>
45809 <infoflow type="both" weight="10"/>
45810 </interface>
45811 -<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="89220">
45812 +<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="89238">
45813 <summary>
45814 Do not audit attempts to send and receive
45815 UDP traffic on the trisoap port.
45816 @@ -65790,7 +65874,7 @@ Domain to not audit.
45817 </param>
45818 <infoflow type="none"/>
45819 </interface>
45820 -<interface name="corenet_tcp_bind_trisoap_port" lineno="89235">
45821 +<interface name="corenet_tcp_bind_trisoap_port" lineno="89253">
45822 <summary>
45823 Bind TCP sockets to the trisoap port.
45824 </summary>
45825 @@ -65801,7 +65885,7 @@ Domain allowed access.
45826 </param>
45827 <infoflow type="none"/>
45828 </interface>
45829 -<interface name="corenet_udp_bind_trisoap_port" lineno="89255">
45830 +<interface name="corenet_udp_bind_trisoap_port" lineno="89273">
45831 <summary>
45832 Bind UDP sockets to the trisoap port.
45833 </summary>
45834 @@ -65812,7 +65896,7 @@ Domain allowed access.
45835 </param>
45836 <infoflow type="none"/>
45837 </interface>
45838 -<interface name="corenet_tcp_connect_trisoap_port" lineno="89274">
45839 +<interface name="corenet_tcp_connect_trisoap_port" lineno="89292">
45840 <summary>
45841 Make a TCP connection to the trisoap port.
45842 </summary>
45843 @@ -65822,7 +65906,7 @@ Domain allowed access.
45844 </summary>
45845 </param>
45846 </interface>
45847 -<interface name="corenet_send_trisoap_client_packets" lineno="89294">
45848 +<interface name="corenet_send_trisoap_client_packets" lineno="89312">
45849 <summary>
45850 Send trisoap_client packets.
45851 </summary>
45852 @@ -65833,7 +65917,7 @@ Domain allowed access.
45853 </param>
45854 <infoflow type="write" weight="10"/>
45855 </interface>
45856 -<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="89313">
45857 +<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="89331">
45858 <summary>
45859 Do not audit attempts to send trisoap_client packets.
45860 </summary>
45861 @@ -65844,7 +65928,7 @@ Domain to not audit.
45862 </param>
45863 <infoflow type="none"/>
45864 </interface>
45865 -<interface name="corenet_receive_trisoap_client_packets" lineno="89332">
45866 +<interface name="corenet_receive_trisoap_client_packets" lineno="89350">
45867 <summary>
45868 Receive trisoap_client packets.
45869 </summary>
45870 @@ -65855,7 +65939,7 @@ Domain allowed access.
45871 </param>
45872 <infoflow type="read" weight="10"/>
45873 </interface>
45874 -<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="89351">
45875 +<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="89369">
45876 <summary>
45877 Do not audit attempts to receive trisoap_client packets.
45878 </summary>
45879 @@ -65866,7 +65950,7 @@ Domain allowed access.
45880 </param>
45881 <infoflow type="none"/>
45882 </interface>
45883 -<interface name="corenet_sendrecv_trisoap_client_packets" lineno="89370">
45884 +<interface name="corenet_sendrecv_trisoap_client_packets" lineno="89388">
45885 <summary>
45886 Send and receive trisoap_client packets.
45887 </summary>
45888 @@ -65877,7 +65961,7 @@ Domain allowed access.
45889 </param>
45890 <infoflow type="both" weight="10"/>
45891 </interface>
45892 -<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="89386">
45893 +<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="89404">
45894 <summary>
45895 Do not audit attempts to send and receive trisoap_client packets.
45896 </summary>
45897 @@ -65888,7 +65972,7 @@ Domain to not audit.
45898 </param>
45899 <infoflow type="none"/>
45900 </interface>
45901 -<interface name="corenet_relabelto_trisoap_client_packets" lineno="89401">
45902 +<interface name="corenet_relabelto_trisoap_client_packets" lineno="89419">
45903 <summary>
45904 Relabel packets to trisoap_client the packet type.
45905 </summary>
45906 @@ -65898,7 +65982,7 @@ Domain allowed access.
45907 </summary>
45908 </param>
45909 </interface>
45910 -<interface name="corenet_send_trisoap_server_packets" lineno="89421">
45911 +<interface name="corenet_send_trisoap_server_packets" lineno="89439">
45912 <summary>
45913 Send trisoap_server packets.
45914 </summary>
45915 @@ -65909,7 +65993,7 @@ Domain allowed access.
45916 </param>
45917 <infoflow type="write" weight="10"/>
45918 </interface>
45919 -<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="89440">
45920 +<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="89458">
45921 <summary>
45922 Do not audit attempts to send trisoap_server packets.
45923 </summary>
45924 @@ -65920,7 +66004,7 @@ Domain to not audit.
45925 </param>
45926 <infoflow type="none"/>
45927 </interface>
45928 -<interface name="corenet_receive_trisoap_server_packets" lineno="89459">
45929 +<interface name="corenet_receive_trisoap_server_packets" lineno="89477">
45930 <summary>
45931 Receive trisoap_server packets.
45932 </summary>
45933 @@ -65931,7 +66015,7 @@ Domain allowed access.
45934 </param>
45935 <infoflow type="read" weight="10"/>
45936 </interface>
45937 -<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="89478">
45938 +<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="89496">
45939 <summary>
45940 Do not audit attempts to receive trisoap_server packets.
45941 </summary>
45942 @@ -65942,7 +66026,7 @@ Domain allowed access.
45943 </param>
45944 <infoflow type="none"/>
45945 </interface>
45946 -<interface name="corenet_sendrecv_trisoap_server_packets" lineno="89497">
45947 +<interface name="corenet_sendrecv_trisoap_server_packets" lineno="89515">
45948 <summary>
45949 Send and receive trisoap_server packets.
45950 </summary>
45951 @@ -65953,7 +66037,7 @@ Domain allowed access.
45952 </param>
45953 <infoflow type="both" weight="10"/>
45954 </interface>
45955 -<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="89513">
45956 +<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="89531">
45957 <summary>
45958 Do not audit attempts to send and receive trisoap_server packets.
45959 </summary>
45960 @@ -65964,7 +66048,7 @@ Domain to not audit.
45961 </param>
45962 <infoflow type="none"/>
45963 </interface>
45964 -<interface name="corenet_relabelto_trisoap_server_packets" lineno="89528">
45965 +<interface name="corenet_relabelto_trisoap_server_packets" lineno="89546">
45966 <summary>
45967 Relabel packets to trisoap_server the packet type.
45968 </summary>
45969 @@ -65974,7 +66058,7 @@ Domain allowed access.
45970 </summary>
45971 </param>
45972 </interface>
45973 -<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="89550">
45974 +<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="89568">
45975 <summary>
45976 Send and receive TCP traffic on the trivnet1 port.
45977 </summary>
45978 @@ -65985,7 +66069,7 @@ Domain allowed access.
45979 </param>
45980 <infoflow type="both" weight="10"/>
45981 </interface>
45982 -<interface name="corenet_udp_send_trivnet1_port" lineno="89565">
45983 +<interface name="corenet_udp_send_trivnet1_port" lineno="89583">
45984 <summary>
45985 Send UDP traffic on the trivnet1 port.
45986 </summary>
45987 @@ -65996,7 +66080,7 @@ Domain allowed access.
45988 </param>
45989 <infoflow type="write" weight="10"/>
45990 </interface>
45991 -<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="89580">
45992 +<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="89598">
45993 <summary>
45994 Do not audit attempts to send UDP traffic on the trivnet1 port.
45995 </summary>
45996 @@ -66007,7 +66091,7 @@ Domain to not audit.
45997 </param>
45998 <infoflow type="none"/>
45999 </interface>
46000 -<interface name="corenet_udp_receive_trivnet1_port" lineno="89595">
46001 +<interface name="corenet_udp_receive_trivnet1_port" lineno="89613">
46002 <summary>
46003 Receive UDP traffic on the trivnet1 port.
46004 </summary>
46005 @@ -66018,7 +66102,7 @@ Domain allowed access.
46006 </param>
46007 <infoflow type="read" weight="10"/>
46008 </interface>
46009 -<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="89610">
46010 +<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="89628">
46011 <summary>
46012 Do not audit attempts to receive UDP traffic on the trivnet1 port.
46013 </summary>
46014 @@ -66029,7 +66113,7 @@ Domain to not audit.
46015 </param>
46016 <infoflow type="none"/>
46017 </interface>
46018 -<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="89625">
46019 +<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="89643">
46020 <summary>
46021 Send and receive UDP traffic on the trivnet1 port.
46022 </summary>
46023 @@ -66040,7 +66124,7 @@ Domain allowed access.
46024 </param>
46025 <infoflow type="both" weight="10"/>
46026 </interface>
46027 -<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="89641">
46028 +<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="89659">
46029 <summary>
46030 Do not audit attempts to send and receive
46031 UDP traffic on the trivnet1 port.
46032 @@ -66052,7 +66136,7 @@ Domain to not audit.
46033 </param>
46034 <infoflow type="none"/>
46035 </interface>
46036 -<interface name="corenet_tcp_bind_trivnet1_port" lineno="89656">
46037 +<interface name="corenet_tcp_bind_trivnet1_port" lineno="89674">
46038 <summary>
46039 Bind TCP sockets to the trivnet1 port.
46040 </summary>
46041 @@ -66063,7 +66147,7 @@ Domain allowed access.
46042 </param>
46043 <infoflow type="none"/>
46044 </interface>
46045 -<interface name="corenet_udp_bind_trivnet1_port" lineno="89676">
46046 +<interface name="corenet_udp_bind_trivnet1_port" lineno="89694">
46047 <summary>
46048 Bind UDP sockets to the trivnet1 port.
46049 </summary>
46050 @@ -66074,7 +66158,7 @@ Domain allowed access.
46051 </param>
46052 <infoflow type="none"/>
46053 </interface>
46054 -<interface name="corenet_tcp_connect_trivnet1_port" lineno="89695">
46055 +<interface name="corenet_tcp_connect_trivnet1_port" lineno="89713">
46056 <summary>
46057 Make a TCP connection to the trivnet1 port.
46058 </summary>
46059 @@ -66084,7 +66168,7 @@ Domain allowed access.
46060 </summary>
46061 </param>
46062 </interface>
46063 -<interface name="corenet_send_trivnet1_client_packets" lineno="89715">
46064 +<interface name="corenet_send_trivnet1_client_packets" lineno="89733">
46065 <summary>
46066 Send trivnet1_client packets.
46067 </summary>
46068 @@ -66095,7 +66179,7 @@ Domain allowed access.
46069 </param>
46070 <infoflow type="write" weight="10"/>
46071 </interface>
46072 -<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="89734">
46073 +<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="89752">
46074 <summary>
46075 Do not audit attempts to send trivnet1_client packets.
46076 </summary>
46077 @@ -66106,7 +66190,7 @@ Domain to not audit.
46078 </param>
46079 <infoflow type="none"/>
46080 </interface>
46081 -<interface name="corenet_receive_trivnet1_client_packets" lineno="89753">
46082 +<interface name="corenet_receive_trivnet1_client_packets" lineno="89771">
46083 <summary>
46084 Receive trivnet1_client packets.
46085 </summary>
46086 @@ -66117,7 +66201,7 @@ Domain allowed access.
46087 </param>
46088 <infoflow type="read" weight="10"/>
46089 </interface>
46090 -<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="89772">
46091 +<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="89790">
46092 <summary>
46093 Do not audit attempts to receive trivnet1_client packets.
46094 </summary>
46095 @@ -66128,7 +66212,7 @@ Domain allowed access.
46096 </param>
46097 <infoflow type="none"/>
46098 </interface>
46099 -<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="89791">
46100 +<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="89809">
46101 <summary>
46102 Send and receive trivnet1_client packets.
46103 </summary>
46104 @@ -66139,7 +66223,7 @@ Domain allowed access.
46105 </param>
46106 <infoflow type="both" weight="10"/>
46107 </interface>
46108 -<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="89807">
46109 +<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="89825">
46110 <summary>
46111 Do not audit attempts to send and receive trivnet1_client packets.
46112 </summary>
46113 @@ -66150,7 +66234,7 @@ Domain to not audit.
46114 </param>
46115 <infoflow type="none"/>
46116 </interface>
46117 -<interface name="corenet_relabelto_trivnet1_client_packets" lineno="89822">
46118 +<interface name="corenet_relabelto_trivnet1_client_packets" lineno="89840">
46119 <summary>
46120 Relabel packets to trivnet1_client the packet type.
46121 </summary>
46122 @@ -66160,7 +66244,7 @@ Domain allowed access.
46123 </summary>
46124 </param>
46125 </interface>
46126 -<interface name="corenet_send_trivnet1_server_packets" lineno="89842">
46127 +<interface name="corenet_send_trivnet1_server_packets" lineno="89860">
46128 <summary>
46129 Send trivnet1_server packets.
46130 </summary>
46131 @@ -66171,7 +66255,7 @@ Domain allowed access.
46132 </param>
46133 <infoflow type="write" weight="10"/>
46134 </interface>
46135 -<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="89861">
46136 +<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="89879">
46137 <summary>
46138 Do not audit attempts to send trivnet1_server packets.
46139 </summary>
46140 @@ -66182,7 +66266,7 @@ Domain to not audit.
46141 </param>
46142 <infoflow type="none"/>
46143 </interface>
46144 -<interface name="corenet_receive_trivnet1_server_packets" lineno="89880">
46145 +<interface name="corenet_receive_trivnet1_server_packets" lineno="89898">
46146 <summary>
46147 Receive trivnet1_server packets.
46148 </summary>
46149 @@ -66193,7 +66277,7 @@ Domain allowed access.
46150 </param>
46151 <infoflow type="read" weight="10"/>
46152 </interface>
46153 -<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="89899">
46154 +<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="89917">
46155 <summary>
46156 Do not audit attempts to receive trivnet1_server packets.
46157 </summary>
46158 @@ -66204,7 +66288,7 @@ Domain allowed access.
46159 </param>
46160 <infoflow type="none"/>
46161 </interface>
46162 -<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="89918">
46163 +<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="89936">
46164 <summary>
46165 Send and receive trivnet1_server packets.
46166 </summary>
46167 @@ -66215,7 +66299,7 @@ Domain allowed access.
46168 </param>
46169 <infoflow type="both" weight="10"/>
46170 </interface>
46171 -<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="89934">
46172 +<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="89952">
46173 <summary>
46174 Do not audit attempts to send and receive trivnet1_server packets.
46175 </summary>
46176 @@ -66226,7 +66310,7 @@ Domain to not audit.
46177 </param>
46178 <infoflow type="none"/>
46179 </interface>
46180 -<interface name="corenet_relabelto_trivnet1_server_packets" lineno="89949">
46181 +<interface name="corenet_relabelto_trivnet1_server_packets" lineno="89967">
46182 <summary>
46183 Relabel packets to trivnet1_server the packet type.
46184 </summary>
46185 @@ -66236,7 +66320,7 @@ Domain allowed access.
46186 </summary>
46187 </param>
46188 </interface>
46189 -<interface name="corenet_tcp_sendrecv_ups_port" lineno="89971">
46190 +<interface name="corenet_tcp_sendrecv_ups_port" lineno="89989">
46191 <summary>
46192 Send and receive TCP traffic on the ups port.
46193 </summary>
46194 @@ -66247,7 +66331,7 @@ Domain allowed access.
46195 </param>
46196 <infoflow type="both" weight="10"/>
46197 </interface>
46198 -<interface name="corenet_udp_send_ups_port" lineno="89986">
46199 +<interface name="corenet_udp_send_ups_port" lineno="90004">
46200 <summary>
46201 Send UDP traffic on the ups port.
46202 </summary>
46203 @@ -66258,7 +66342,7 @@ Domain allowed access.
46204 </param>
46205 <infoflow type="write" weight="10"/>
46206 </interface>
46207 -<interface name="corenet_dontaudit_udp_send_ups_port" lineno="90001">
46208 +<interface name="corenet_dontaudit_udp_send_ups_port" lineno="90019">
46209 <summary>
46210 Do not audit attempts to send UDP traffic on the ups port.
46211 </summary>
46212 @@ -66269,7 +66353,7 @@ Domain to not audit.
46213 </param>
46214 <infoflow type="none"/>
46215 </interface>
46216 -<interface name="corenet_udp_receive_ups_port" lineno="90016">
46217 +<interface name="corenet_udp_receive_ups_port" lineno="90034">
46218 <summary>
46219 Receive UDP traffic on the ups port.
46220 </summary>
46221 @@ -66280,7 +66364,7 @@ Domain allowed access.
46222 </param>
46223 <infoflow type="read" weight="10"/>
46224 </interface>
46225 -<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="90031">
46226 +<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="90049">
46227 <summary>
46228 Do not audit attempts to receive UDP traffic on the ups port.
46229 </summary>
46230 @@ -66291,7 +66375,7 @@ Domain to not audit.
46231 </param>
46232 <infoflow type="none"/>
46233 </interface>
46234 -<interface name="corenet_udp_sendrecv_ups_port" lineno="90046">
46235 +<interface name="corenet_udp_sendrecv_ups_port" lineno="90064">
46236 <summary>
46237 Send and receive UDP traffic on the ups port.
46238 </summary>
46239 @@ -66302,7 +66386,7 @@ Domain allowed access.
46240 </param>
46241 <infoflow type="both" weight="10"/>
46242 </interface>
46243 -<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="90062">
46244 +<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="90080">
46245 <summary>
46246 Do not audit attempts to send and receive
46247 UDP traffic on the ups port.
46248 @@ -66314,7 +66398,7 @@ Domain to not audit.
46249 </param>
46250 <infoflow type="none"/>
46251 </interface>
46252 -<interface name="corenet_tcp_bind_ups_port" lineno="90077">
46253 +<interface name="corenet_tcp_bind_ups_port" lineno="90095">
46254 <summary>
46255 Bind TCP sockets to the ups port.
46256 </summary>
46257 @@ -66325,7 +66409,7 @@ Domain allowed access.
46258 </param>
46259 <infoflow type="none"/>
46260 </interface>
46261 -<interface name="corenet_udp_bind_ups_port" lineno="90097">
46262 +<interface name="corenet_udp_bind_ups_port" lineno="90115">
46263 <summary>
46264 Bind UDP sockets to the ups port.
46265 </summary>
46266 @@ -66336,7 +66420,7 @@ Domain allowed access.
46267 </param>
46268 <infoflow type="none"/>
46269 </interface>
46270 -<interface name="corenet_tcp_connect_ups_port" lineno="90116">
46271 +<interface name="corenet_tcp_connect_ups_port" lineno="90134">
46272 <summary>
46273 Make a TCP connection to the ups port.
46274 </summary>
46275 @@ -66346,7 +66430,7 @@ Domain allowed access.
46276 </summary>
46277 </param>
46278 </interface>
46279 -<interface name="corenet_send_ups_client_packets" lineno="90136">
46280 +<interface name="corenet_send_ups_client_packets" lineno="90154">
46281 <summary>
46282 Send ups_client packets.
46283 </summary>
46284 @@ -66357,7 +66441,7 @@ Domain allowed access.
46285 </param>
46286 <infoflow type="write" weight="10"/>
46287 </interface>
46288 -<interface name="corenet_dontaudit_send_ups_client_packets" lineno="90155">
46289 +<interface name="corenet_dontaudit_send_ups_client_packets" lineno="90173">
46290 <summary>
46291 Do not audit attempts to send ups_client packets.
46292 </summary>
46293 @@ -66368,7 +66452,7 @@ Domain to not audit.
46294 </param>
46295 <infoflow type="none"/>
46296 </interface>
46297 -<interface name="corenet_receive_ups_client_packets" lineno="90174">
46298 +<interface name="corenet_receive_ups_client_packets" lineno="90192">
46299 <summary>
46300 Receive ups_client packets.
46301 </summary>
46302 @@ -66379,7 +66463,7 @@ Domain allowed access.
46303 </param>
46304 <infoflow type="read" weight="10"/>
46305 </interface>
46306 -<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="90193">
46307 +<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="90211">
46308 <summary>
46309 Do not audit attempts to receive ups_client packets.
46310 </summary>
46311 @@ -66390,7 +66474,7 @@ Domain allowed access.
46312 </param>
46313 <infoflow type="none"/>
46314 </interface>
46315 -<interface name="corenet_sendrecv_ups_client_packets" lineno="90212">
46316 +<interface name="corenet_sendrecv_ups_client_packets" lineno="90230">
46317 <summary>
46318 Send and receive ups_client packets.
46319 </summary>
46320 @@ -66401,7 +66485,7 @@ Domain allowed access.
46321 </param>
46322 <infoflow type="both" weight="10"/>
46323 </interface>
46324 -<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="90228">
46325 +<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="90246">
46326 <summary>
46327 Do not audit attempts to send and receive ups_client packets.
46328 </summary>
46329 @@ -66412,7 +66496,7 @@ Domain to not audit.
46330 </param>
46331 <infoflow type="none"/>
46332 </interface>
46333 -<interface name="corenet_relabelto_ups_client_packets" lineno="90243">
46334 +<interface name="corenet_relabelto_ups_client_packets" lineno="90261">
46335 <summary>
46336 Relabel packets to ups_client the packet type.
46337 </summary>
46338 @@ -66422,7 +66506,7 @@ Domain allowed access.
46339 </summary>
46340 </param>
46341 </interface>
46342 -<interface name="corenet_send_ups_server_packets" lineno="90263">
46343 +<interface name="corenet_send_ups_server_packets" lineno="90281">
46344 <summary>
46345 Send ups_server packets.
46346 </summary>
46347 @@ -66433,7 +66517,7 @@ Domain allowed access.
46348 </param>
46349 <infoflow type="write" weight="10"/>
46350 </interface>
46351 -<interface name="corenet_dontaudit_send_ups_server_packets" lineno="90282">
46352 +<interface name="corenet_dontaudit_send_ups_server_packets" lineno="90300">
46353 <summary>
46354 Do not audit attempts to send ups_server packets.
46355 </summary>
46356 @@ -66444,7 +66528,7 @@ Domain to not audit.
46357 </param>
46358 <infoflow type="none"/>
46359 </interface>
46360 -<interface name="corenet_receive_ups_server_packets" lineno="90301">
46361 +<interface name="corenet_receive_ups_server_packets" lineno="90319">
46362 <summary>
46363 Receive ups_server packets.
46364 </summary>
46365 @@ -66455,7 +66539,7 @@ Domain allowed access.
46366 </param>
46367 <infoflow type="read" weight="10"/>
46368 </interface>
46369 -<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="90320">
46370 +<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="90338">
46371 <summary>
46372 Do not audit attempts to receive ups_server packets.
46373 </summary>
46374 @@ -66466,7 +66550,7 @@ Domain allowed access.
46375 </param>
46376 <infoflow type="none"/>
46377 </interface>
46378 -<interface name="corenet_sendrecv_ups_server_packets" lineno="90339">
46379 +<interface name="corenet_sendrecv_ups_server_packets" lineno="90357">
46380 <summary>
46381 Send and receive ups_server packets.
46382 </summary>
46383 @@ -66477,7 +66561,7 @@ Domain allowed access.
46384 </param>
46385 <infoflow type="both" weight="10"/>
46386 </interface>
46387 -<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="90355">
46388 +<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="90373">
46389 <summary>
46390 Do not audit attempts to send and receive ups_server packets.
46391 </summary>
46392 @@ -66488,7 +66572,7 @@ Domain to not audit.
46393 </param>
46394 <infoflow type="none"/>
46395 </interface>
46396 -<interface name="corenet_relabelto_ups_server_packets" lineno="90370">
46397 +<interface name="corenet_relabelto_ups_server_packets" lineno="90388">
46398 <summary>
46399 Relabel packets to ups_server the packet type.
46400 </summary>
46401 @@ -66498,7 +66582,7 @@ Domain allowed access.
46402 </summary>
46403 </param>
46404 </interface>
46405 -<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="90392">
46406 +<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="90410">
46407 <summary>
46408 Send and receive TCP traffic on the utcpserver port.
46409 </summary>
46410 @@ -66509,7 +66593,7 @@ Domain allowed access.
46411 </param>
46412 <infoflow type="both" weight="10"/>
46413 </interface>
46414 -<interface name="corenet_udp_send_utcpserver_port" lineno="90407">
46415 +<interface name="corenet_udp_send_utcpserver_port" lineno="90425">
46416 <summary>
46417 Send UDP traffic on the utcpserver port.
46418 </summary>
46419 @@ -66520,7 +66604,7 @@ Domain allowed access.
46420 </param>
46421 <infoflow type="write" weight="10"/>
46422 </interface>
46423 -<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="90422">
46424 +<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="90440">
46425 <summary>
46426 Do not audit attempts to send UDP traffic on the utcpserver port.
46427 </summary>
46428 @@ -66531,7 +66615,7 @@ Domain to not audit.
46429 </param>
46430 <infoflow type="none"/>
46431 </interface>
46432 -<interface name="corenet_udp_receive_utcpserver_port" lineno="90437">
46433 +<interface name="corenet_udp_receive_utcpserver_port" lineno="90455">
46434 <summary>
46435 Receive UDP traffic on the utcpserver port.
46436 </summary>
46437 @@ -66542,7 +66626,7 @@ Domain allowed access.
46438 </param>
46439 <infoflow type="read" weight="10"/>
46440 </interface>
46441 -<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="90452">
46442 +<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="90470">
46443 <summary>
46444 Do not audit attempts to receive UDP traffic on the utcpserver port.
46445 </summary>
46446 @@ -66553,7 +66637,7 @@ Domain to not audit.
46447 </param>
46448 <infoflow type="none"/>
46449 </interface>
46450 -<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="90467">
46451 +<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="90485">
46452 <summary>
46453 Send and receive UDP traffic on the utcpserver port.
46454 </summary>
46455 @@ -66564,7 +66648,7 @@ Domain allowed access.
46456 </param>
46457 <infoflow type="both" weight="10"/>
46458 </interface>
46459 -<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="90483">
46460 +<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="90501">
46461 <summary>
46462 Do not audit attempts to send and receive
46463 UDP traffic on the utcpserver port.
46464 @@ -66576,7 +66660,7 @@ Domain to not audit.
46465 </param>
46466 <infoflow type="none"/>
46467 </interface>
46468 -<interface name="corenet_tcp_bind_utcpserver_port" lineno="90498">
46469 +<interface name="corenet_tcp_bind_utcpserver_port" lineno="90516">
46470 <summary>
46471 Bind TCP sockets to the utcpserver port.
46472 </summary>
46473 @@ -66587,7 +66671,7 @@ Domain allowed access.
46474 </param>
46475 <infoflow type="none"/>
46476 </interface>
46477 -<interface name="corenet_udp_bind_utcpserver_port" lineno="90518">
46478 +<interface name="corenet_udp_bind_utcpserver_port" lineno="90536">
46479 <summary>
46480 Bind UDP sockets to the utcpserver port.
46481 </summary>
46482 @@ -66598,7 +66682,7 @@ Domain allowed access.
46483 </param>
46484 <infoflow type="none"/>
46485 </interface>
46486 -<interface name="corenet_tcp_connect_utcpserver_port" lineno="90537">
46487 +<interface name="corenet_tcp_connect_utcpserver_port" lineno="90555">
46488 <summary>
46489 Make a TCP connection to the utcpserver port.
46490 </summary>
46491 @@ -66608,7 +66692,7 @@ Domain allowed access.
46492 </summary>
46493 </param>
46494 </interface>
46495 -<interface name="corenet_send_utcpserver_client_packets" lineno="90557">
46496 +<interface name="corenet_send_utcpserver_client_packets" lineno="90575">
46497 <summary>
46498 Send utcpserver_client packets.
46499 </summary>
46500 @@ -66619,7 +66703,7 @@ Domain allowed access.
46501 </param>
46502 <infoflow type="write" weight="10"/>
46503 </interface>
46504 -<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="90576">
46505 +<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="90594">
46506 <summary>
46507 Do not audit attempts to send utcpserver_client packets.
46508 </summary>
46509 @@ -66630,7 +66714,7 @@ Domain to not audit.
46510 </param>
46511 <infoflow type="none"/>
46512 </interface>
46513 -<interface name="corenet_receive_utcpserver_client_packets" lineno="90595">
46514 +<interface name="corenet_receive_utcpserver_client_packets" lineno="90613">
46515 <summary>
46516 Receive utcpserver_client packets.
46517 </summary>
46518 @@ -66641,7 +66725,7 @@ Domain allowed access.
46519 </param>
46520 <infoflow type="read" weight="10"/>
46521 </interface>
46522 -<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="90614">
46523 +<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="90632">
46524 <summary>
46525 Do not audit attempts to receive utcpserver_client packets.
46526 </summary>
46527 @@ -66652,7 +66736,7 @@ Domain allowed access.
46528 </param>
46529 <infoflow type="none"/>
46530 </interface>
46531 -<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="90633">
46532 +<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="90651">
46533 <summary>
46534 Send and receive utcpserver_client packets.
46535 </summary>
46536 @@ -66663,7 +66747,7 @@ Domain allowed access.
46537 </param>
46538 <infoflow type="both" weight="10"/>
46539 </interface>
46540 -<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="90649">
46541 +<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="90667">
46542 <summary>
46543 Do not audit attempts to send and receive utcpserver_client packets.
46544 </summary>
46545 @@ -66674,7 +66758,7 @@ Domain to not audit.
46546 </param>
46547 <infoflow type="none"/>
46548 </interface>
46549 -<interface name="corenet_relabelto_utcpserver_client_packets" lineno="90664">
46550 +<interface name="corenet_relabelto_utcpserver_client_packets" lineno="90682">
46551 <summary>
46552 Relabel packets to utcpserver_client the packet type.
46553 </summary>
46554 @@ -66684,7 +66768,7 @@ Domain allowed access.
46555 </summary>
46556 </param>
46557 </interface>
46558 -<interface name="corenet_send_utcpserver_server_packets" lineno="90684">
46559 +<interface name="corenet_send_utcpserver_server_packets" lineno="90702">
46560 <summary>
46561 Send utcpserver_server packets.
46562 </summary>
46563 @@ -66695,7 +66779,7 @@ Domain allowed access.
46564 </param>
46565 <infoflow type="write" weight="10"/>
46566 </interface>
46567 -<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="90703">
46568 +<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="90721">
46569 <summary>
46570 Do not audit attempts to send utcpserver_server packets.
46571 </summary>
46572 @@ -66706,7 +66790,7 @@ Domain to not audit.
46573 </param>
46574 <infoflow type="none"/>
46575 </interface>
46576 -<interface name="corenet_receive_utcpserver_server_packets" lineno="90722">
46577 +<interface name="corenet_receive_utcpserver_server_packets" lineno="90740">
46578 <summary>
46579 Receive utcpserver_server packets.
46580 </summary>
46581 @@ -66717,7 +66801,7 @@ Domain allowed access.
46582 </param>
46583 <infoflow type="read" weight="10"/>
46584 </interface>
46585 -<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="90741">
46586 +<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="90759">
46587 <summary>
46588 Do not audit attempts to receive utcpserver_server packets.
46589 </summary>
46590 @@ -66728,7 +66812,7 @@ Domain allowed access.
46591 </param>
46592 <infoflow type="none"/>
46593 </interface>
46594 -<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="90760">
46595 +<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="90778">
46596 <summary>
46597 Send and receive utcpserver_server packets.
46598 </summary>
46599 @@ -66739,7 +66823,7 @@ Domain allowed access.
46600 </param>
46601 <infoflow type="both" weight="10"/>
46602 </interface>
46603 -<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="90776">
46604 +<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="90794">
46605 <summary>
46606 Do not audit attempts to send and receive utcpserver_server packets.
46607 </summary>
46608 @@ -66750,7 +66834,7 @@ Domain to not audit.
46609 </param>
46610 <infoflow type="none"/>
46611 </interface>
46612 -<interface name="corenet_relabelto_utcpserver_server_packets" lineno="90791">
46613 +<interface name="corenet_relabelto_utcpserver_server_packets" lineno="90809">
46614 <summary>
46615 Relabel packets to utcpserver_server the packet type.
46616 </summary>
46617 @@ -66760,7 +66844,7 @@ Domain allowed access.
46618 </summary>
46619 </param>
46620 </interface>
46621 -<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="90813">
46622 +<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="90831">
46623 <summary>
46624 Send and receive TCP traffic on the uucpd port.
46625 </summary>
46626 @@ -66771,7 +66855,7 @@ Domain allowed access.
46627 </param>
46628 <infoflow type="both" weight="10"/>
46629 </interface>
46630 -<interface name="corenet_udp_send_uucpd_port" lineno="90828">
46631 +<interface name="corenet_udp_send_uucpd_port" lineno="90846">
46632 <summary>
46633 Send UDP traffic on the uucpd port.
46634 </summary>
46635 @@ -66782,7 +66866,7 @@ Domain allowed access.
46636 </param>
46637 <infoflow type="write" weight="10"/>
46638 </interface>
46639 -<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="90843">
46640 +<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="90861">
46641 <summary>
46642 Do not audit attempts to send UDP traffic on the uucpd port.
46643 </summary>
46644 @@ -66793,7 +66877,7 @@ Domain to not audit.
46645 </param>
46646 <infoflow type="none"/>
46647 </interface>
46648 -<interface name="corenet_udp_receive_uucpd_port" lineno="90858">
46649 +<interface name="corenet_udp_receive_uucpd_port" lineno="90876">
46650 <summary>
46651 Receive UDP traffic on the uucpd port.
46652 </summary>
46653 @@ -66804,7 +66888,7 @@ Domain allowed access.
46654 </param>
46655 <infoflow type="read" weight="10"/>
46656 </interface>
46657 -<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="90873">
46658 +<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="90891">
46659 <summary>
46660 Do not audit attempts to receive UDP traffic on the uucpd port.
46661 </summary>
46662 @@ -66815,7 +66899,7 @@ Domain to not audit.
46663 </param>
46664 <infoflow type="none"/>
46665 </interface>
46666 -<interface name="corenet_udp_sendrecv_uucpd_port" lineno="90888">
46667 +<interface name="corenet_udp_sendrecv_uucpd_port" lineno="90906">
46668 <summary>
46669 Send and receive UDP traffic on the uucpd port.
46670 </summary>
46671 @@ -66826,7 +66910,7 @@ Domain allowed access.
46672 </param>
46673 <infoflow type="both" weight="10"/>
46674 </interface>
46675 -<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="90904">
46676 +<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="90922">
46677 <summary>
46678 Do not audit attempts to send and receive
46679 UDP traffic on the uucpd port.
46680 @@ -66838,7 +66922,7 @@ Domain to not audit.
46681 </param>
46682 <infoflow type="none"/>
46683 </interface>
46684 -<interface name="corenet_tcp_bind_uucpd_port" lineno="90919">
46685 +<interface name="corenet_tcp_bind_uucpd_port" lineno="90937">
46686 <summary>
46687 Bind TCP sockets to the uucpd port.
46688 </summary>
46689 @@ -66849,7 +66933,7 @@ Domain allowed access.
46690 </param>
46691 <infoflow type="none"/>
46692 </interface>
46693 -<interface name="corenet_udp_bind_uucpd_port" lineno="90939">
46694 +<interface name="corenet_udp_bind_uucpd_port" lineno="90957">
46695 <summary>
46696 Bind UDP sockets to the uucpd port.
46697 </summary>
46698 @@ -66860,7 +66944,7 @@ Domain allowed access.
46699 </param>
46700 <infoflow type="none"/>
46701 </interface>
46702 -<interface name="corenet_tcp_connect_uucpd_port" lineno="90958">
46703 +<interface name="corenet_tcp_connect_uucpd_port" lineno="90976">
46704 <summary>
46705 Make a TCP connection to the uucpd port.
46706 </summary>
46707 @@ -66870,7 +66954,7 @@ Domain allowed access.
46708 </summary>
46709 </param>
46710 </interface>
46711 -<interface name="corenet_send_uucpd_client_packets" lineno="90978">
46712 +<interface name="corenet_send_uucpd_client_packets" lineno="90996">
46713 <summary>
46714 Send uucpd_client packets.
46715 </summary>
46716 @@ -66881,7 +66965,7 @@ Domain allowed access.
46717 </param>
46718 <infoflow type="write" weight="10"/>
46719 </interface>
46720 -<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="90997">
46721 +<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="91015">
46722 <summary>
46723 Do not audit attempts to send uucpd_client packets.
46724 </summary>
46725 @@ -66892,7 +66976,7 @@ Domain to not audit.
46726 </param>
46727 <infoflow type="none"/>
46728 </interface>
46729 -<interface name="corenet_receive_uucpd_client_packets" lineno="91016">
46730 +<interface name="corenet_receive_uucpd_client_packets" lineno="91034">
46731 <summary>
46732 Receive uucpd_client packets.
46733 </summary>
46734 @@ -66903,7 +66987,7 @@ Domain allowed access.
46735 </param>
46736 <infoflow type="read" weight="10"/>
46737 </interface>
46738 -<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="91035">
46739 +<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="91053">
46740 <summary>
46741 Do not audit attempts to receive uucpd_client packets.
46742 </summary>
46743 @@ -66914,7 +66998,7 @@ Domain allowed access.
46744 </param>
46745 <infoflow type="none"/>
46746 </interface>
46747 -<interface name="corenet_sendrecv_uucpd_client_packets" lineno="91054">
46748 +<interface name="corenet_sendrecv_uucpd_client_packets" lineno="91072">
46749 <summary>
46750 Send and receive uucpd_client packets.
46751 </summary>
46752 @@ -66925,7 +67009,7 @@ Domain allowed access.
46753 </param>
46754 <infoflow type="both" weight="10"/>
46755 </interface>
46756 -<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="91070">
46757 +<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="91088">
46758 <summary>
46759 Do not audit attempts to send and receive uucpd_client packets.
46760 </summary>
46761 @@ -66936,7 +67020,7 @@ Domain to not audit.
46762 </param>
46763 <infoflow type="none"/>
46764 </interface>
46765 -<interface name="corenet_relabelto_uucpd_client_packets" lineno="91085">
46766 +<interface name="corenet_relabelto_uucpd_client_packets" lineno="91103">
46767 <summary>
46768 Relabel packets to uucpd_client the packet type.
46769 </summary>
46770 @@ -66946,7 +67030,7 @@ Domain allowed access.
46771 </summary>
46772 </param>
46773 </interface>
46774 -<interface name="corenet_send_uucpd_server_packets" lineno="91105">
46775 +<interface name="corenet_send_uucpd_server_packets" lineno="91123">
46776 <summary>
46777 Send uucpd_server packets.
46778 </summary>
46779 @@ -66957,7 +67041,7 @@ Domain allowed access.
46780 </param>
46781 <infoflow type="write" weight="10"/>
46782 </interface>
46783 -<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="91124">
46784 +<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="91142">
46785 <summary>
46786 Do not audit attempts to send uucpd_server packets.
46787 </summary>
46788 @@ -66968,7 +67052,7 @@ Domain to not audit.
46789 </param>
46790 <infoflow type="none"/>
46791 </interface>
46792 -<interface name="corenet_receive_uucpd_server_packets" lineno="91143">
46793 +<interface name="corenet_receive_uucpd_server_packets" lineno="91161">
46794 <summary>
46795 Receive uucpd_server packets.
46796 </summary>
46797 @@ -66979,7 +67063,7 @@ Domain allowed access.
46798 </param>
46799 <infoflow type="read" weight="10"/>
46800 </interface>
46801 -<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="91162">
46802 +<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="91180">
46803 <summary>
46804 Do not audit attempts to receive uucpd_server packets.
46805 </summary>
46806 @@ -66990,7 +67074,7 @@ Domain allowed access.
46807 </param>
46808 <infoflow type="none"/>
46809 </interface>
46810 -<interface name="corenet_sendrecv_uucpd_server_packets" lineno="91181">
46811 +<interface name="corenet_sendrecv_uucpd_server_packets" lineno="91199">
46812 <summary>
46813 Send and receive uucpd_server packets.
46814 </summary>
46815 @@ -67001,7 +67085,7 @@ Domain allowed access.
46816 </param>
46817 <infoflow type="both" weight="10"/>
46818 </interface>
46819 -<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="91197">
46820 +<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="91215">
46821 <summary>
46822 Do not audit attempts to send and receive uucpd_server packets.
46823 </summary>
46824 @@ -67012,7 +67096,7 @@ Domain to not audit.
46825 </param>
46826 <infoflow type="none"/>
46827 </interface>
46828 -<interface name="corenet_relabelto_uucpd_server_packets" lineno="91212">
46829 +<interface name="corenet_relabelto_uucpd_server_packets" lineno="91230">
46830 <summary>
46831 Relabel packets to uucpd_server the packet type.
46832 </summary>
46833 @@ -67022,7 +67106,7 @@ Domain allowed access.
46834 </summary>
46835 </param>
46836 </interface>
46837 -<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="91234">
46838 +<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="91252">
46839 <summary>
46840 Send and receive TCP traffic on the varnishd port.
46841 </summary>
46842 @@ -67033,7 +67117,7 @@ Domain allowed access.
46843 </param>
46844 <infoflow type="both" weight="10"/>
46845 </interface>
46846 -<interface name="corenet_udp_send_varnishd_port" lineno="91249">
46847 +<interface name="corenet_udp_send_varnishd_port" lineno="91267">
46848 <summary>
46849 Send UDP traffic on the varnishd port.
46850 </summary>
46851 @@ -67044,7 +67128,7 @@ Domain allowed access.
46852 </param>
46853 <infoflow type="write" weight="10"/>
46854 </interface>
46855 -<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="91264">
46856 +<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="91282">
46857 <summary>
46858 Do not audit attempts to send UDP traffic on the varnishd port.
46859 </summary>
46860 @@ -67055,7 +67139,7 @@ Domain to not audit.
46861 </param>
46862 <infoflow type="none"/>
46863 </interface>
46864 -<interface name="corenet_udp_receive_varnishd_port" lineno="91279">
46865 +<interface name="corenet_udp_receive_varnishd_port" lineno="91297">
46866 <summary>
46867 Receive UDP traffic on the varnishd port.
46868 </summary>
46869 @@ -67066,7 +67150,7 @@ Domain allowed access.
46870 </param>
46871 <infoflow type="read" weight="10"/>
46872 </interface>
46873 -<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="91294">
46874 +<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="91312">
46875 <summary>
46876 Do not audit attempts to receive UDP traffic on the varnishd port.
46877 </summary>
46878 @@ -67077,7 +67161,7 @@ Domain to not audit.
46879 </param>
46880 <infoflow type="none"/>
46881 </interface>
46882 -<interface name="corenet_udp_sendrecv_varnishd_port" lineno="91309">
46883 +<interface name="corenet_udp_sendrecv_varnishd_port" lineno="91327">
46884 <summary>
46885 Send and receive UDP traffic on the varnishd port.
46886 </summary>
46887 @@ -67088,7 +67172,7 @@ Domain allowed access.
46888 </param>
46889 <infoflow type="both" weight="10"/>
46890 </interface>
46891 -<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="91325">
46892 +<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="91343">
46893 <summary>
46894 Do not audit attempts to send and receive
46895 UDP traffic on the varnishd port.
46896 @@ -67100,7 +67184,7 @@ Domain to not audit.
46897 </param>
46898 <infoflow type="none"/>
46899 </interface>
46900 -<interface name="corenet_tcp_bind_varnishd_port" lineno="91340">
46901 +<interface name="corenet_tcp_bind_varnishd_port" lineno="91358">
46902 <summary>
46903 Bind TCP sockets to the varnishd port.
46904 </summary>
46905 @@ -67111,7 +67195,7 @@ Domain allowed access.
46906 </param>
46907 <infoflow type="none"/>
46908 </interface>
46909 -<interface name="corenet_udp_bind_varnishd_port" lineno="91360">
46910 +<interface name="corenet_udp_bind_varnishd_port" lineno="91378">
46911 <summary>
46912 Bind UDP sockets to the varnishd port.
46913 </summary>
46914 @@ -67122,7 +67206,7 @@ Domain allowed access.
46915 </param>
46916 <infoflow type="none"/>
46917 </interface>
46918 -<interface name="corenet_tcp_connect_varnishd_port" lineno="91379">
46919 +<interface name="corenet_tcp_connect_varnishd_port" lineno="91397">
46920 <summary>
46921 Make a TCP connection to the varnishd port.
46922 </summary>
46923 @@ -67132,7 +67216,7 @@ Domain allowed access.
46924 </summary>
46925 </param>
46926 </interface>
46927 -<interface name="corenet_send_varnishd_client_packets" lineno="91399">
46928 +<interface name="corenet_send_varnishd_client_packets" lineno="91417">
46929 <summary>
46930 Send varnishd_client packets.
46931 </summary>
46932 @@ -67143,7 +67227,7 @@ Domain allowed access.
46933 </param>
46934 <infoflow type="write" weight="10"/>
46935 </interface>
46936 -<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="91418">
46937 +<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="91436">
46938 <summary>
46939 Do not audit attempts to send varnishd_client packets.
46940 </summary>
46941 @@ -67154,7 +67238,7 @@ Domain to not audit.
46942 </param>
46943 <infoflow type="none"/>
46944 </interface>
46945 -<interface name="corenet_receive_varnishd_client_packets" lineno="91437">
46946 +<interface name="corenet_receive_varnishd_client_packets" lineno="91455">
46947 <summary>
46948 Receive varnishd_client packets.
46949 </summary>
46950 @@ -67165,7 +67249,7 @@ Domain allowed access.
46951 </param>
46952 <infoflow type="read" weight="10"/>
46953 </interface>
46954 -<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="91456">
46955 +<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="91474">
46956 <summary>
46957 Do not audit attempts to receive varnishd_client packets.
46958 </summary>
46959 @@ -67176,7 +67260,7 @@ Domain allowed access.
46960 </param>
46961 <infoflow type="none"/>
46962 </interface>
46963 -<interface name="corenet_sendrecv_varnishd_client_packets" lineno="91475">
46964 +<interface name="corenet_sendrecv_varnishd_client_packets" lineno="91493">
46965 <summary>
46966 Send and receive varnishd_client packets.
46967 </summary>
46968 @@ -67187,7 +67271,7 @@ Domain allowed access.
46969 </param>
46970 <infoflow type="both" weight="10"/>
46971 </interface>
46972 -<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="91491">
46973 +<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="91509">
46974 <summary>
46975 Do not audit attempts to send and receive varnishd_client packets.
46976 </summary>
46977 @@ -67198,7 +67282,7 @@ Domain to not audit.
46978 </param>
46979 <infoflow type="none"/>
46980 </interface>
46981 -<interface name="corenet_relabelto_varnishd_client_packets" lineno="91506">
46982 +<interface name="corenet_relabelto_varnishd_client_packets" lineno="91524">
46983 <summary>
46984 Relabel packets to varnishd_client the packet type.
46985 </summary>
46986 @@ -67208,7 +67292,7 @@ Domain allowed access.
46987 </summary>
46988 </param>
46989 </interface>
46990 -<interface name="corenet_send_varnishd_server_packets" lineno="91526">
46991 +<interface name="corenet_send_varnishd_server_packets" lineno="91544">
46992 <summary>
46993 Send varnishd_server packets.
46994 </summary>
46995 @@ -67219,7 +67303,7 @@ Domain allowed access.
46996 </param>
46997 <infoflow type="write" weight="10"/>
46998 </interface>
46999 -<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="91545">
47000 +<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="91563">
47001 <summary>
47002 Do not audit attempts to send varnishd_server packets.
47003 </summary>
47004 @@ -67230,7 +67314,7 @@ Domain to not audit.
47005 </param>
47006 <infoflow type="none"/>
47007 </interface>
47008 -<interface name="corenet_receive_varnishd_server_packets" lineno="91564">
47009 +<interface name="corenet_receive_varnishd_server_packets" lineno="91582">
47010 <summary>
47011 Receive varnishd_server packets.
47012 </summary>
47013 @@ -67241,7 +67325,7 @@ Domain allowed access.
47014 </param>
47015 <infoflow type="read" weight="10"/>
47016 </interface>
47017 -<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="91583">
47018 +<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="91601">
47019 <summary>
47020 Do not audit attempts to receive varnishd_server packets.
47021 </summary>
47022 @@ -67252,7 +67336,7 @@ Domain allowed access.
47023 </param>
47024 <infoflow type="none"/>
47025 </interface>
47026 -<interface name="corenet_sendrecv_varnishd_server_packets" lineno="91602">
47027 +<interface name="corenet_sendrecv_varnishd_server_packets" lineno="91620">
47028 <summary>
47029 Send and receive varnishd_server packets.
47030 </summary>
47031 @@ -67263,7 +67347,7 @@ Domain allowed access.
47032 </param>
47033 <infoflow type="both" weight="10"/>
47034 </interface>
47035 -<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="91618">
47036 +<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="91636">
47037 <summary>
47038 Do not audit attempts to send and receive varnishd_server packets.
47039 </summary>
47040 @@ -67274,7 +67358,7 @@ Domain to not audit.
47041 </param>
47042 <infoflow type="none"/>
47043 </interface>
47044 -<interface name="corenet_relabelto_varnishd_server_packets" lineno="91633">
47045 +<interface name="corenet_relabelto_varnishd_server_packets" lineno="91651">
47046 <summary>
47047 Relabel packets to varnishd_server the packet type.
47048 </summary>
47049 @@ -67284,7 +67368,7 @@ Domain allowed access.
47050 </summary>
47051 </param>
47052 </interface>
47053 -<interface name="corenet_tcp_sendrecv_virt_port" lineno="91655">
47054 +<interface name="corenet_tcp_sendrecv_virt_port" lineno="91673">
47055 <summary>
47056 Send and receive TCP traffic on the virt port.
47057 </summary>
47058 @@ -67295,7 +67379,7 @@ Domain allowed access.
47059 </param>
47060 <infoflow type="both" weight="10"/>
47061 </interface>
47062 -<interface name="corenet_udp_send_virt_port" lineno="91670">
47063 +<interface name="corenet_udp_send_virt_port" lineno="91688">
47064 <summary>
47065 Send UDP traffic on the virt port.
47066 </summary>
47067 @@ -67306,7 +67390,7 @@ Domain allowed access.
47068 </param>
47069 <infoflow type="write" weight="10"/>
47070 </interface>
47071 -<interface name="corenet_dontaudit_udp_send_virt_port" lineno="91685">
47072 +<interface name="corenet_dontaudit_udp_send_virt_port" lineno="91703">
47073 <summary>
47074 Do not audit attempts to send UDP traffic on the virt port.
47075 </summary>
47076 @@ -67317,7 +67401,7 @@ Domain to not audit.
47077 </param>
47078 <infoflow type="none"/>
47079 </interface>
47080 -<interface name="corenet_udp_receive_virt_port" lineno="91700">
47081 +<interface name="corenet_udp_receive_virt_port" lineno="91718">
47082 <summary>
47083 Receive UDP traffic on the virt port.
47084 </summary>
47085 @@ -67328,7 +67412,7 @@ Domain allowed access.
47086 </param>
47087 <infoflow type="read" weight="10"/>
47088 </interface>
47089 -<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="91715">
47090 +<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="91733">
47091 <summary>
47092 Do not audit attempts to receive UDP traffic on the virt port.
47093 </summary>
47094 @@ -67339,7 +67423,7 @@ Domain to not audit.
47095 </param>
47096 <infoflow type="none"/>
47097 </interface>
47098 -<interface name="corenet_udp_sendrecv_virt_port" lineno="91730">
47099 +<interface name="corenet_udp_sendrecv_virt_port" lineno="91748">
47100 <summary>
47101 Send and receive UDP traffic on the virt port.
47102 </summary>
47103 @@ -67350,7 +67434,7 @@ Domain allowed access.
47104 </param>
47105 <infoflow type="both" weight="10"/>
47106 </interface>
47107 -<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="91746">
47108 +<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="91764">
47109 <summary>
47110 Do not audit attempts to send and receive
47111 UDP traffic on the virt port.
47112 @@ -67362,7 +67446,7 @@ Domain to not audit.
47113 </param>
47114 <infoflow type="none"/>
47115 </interface>
47116 -<interface name="corenet_tcp_bind_virt_port" lineno="91761">
47117 +<interface name="corenet_tcp_bind_virt_port" lineno="91779">
47118 <summary>
47119 Bind TCP sockets to the virt port.
47120 </summary>
47121 @@ -67373,7 +67457,7 @@ Domain allowed access.
47122 </param>
47123 <infoflow type="none"/>
47124 </interface>
47125 -<interface name="corenet_udp_bind_virt_port" lineno="91781">
47126 +<interface name="corenet_udp_bind_virt_port" lineno="91799">
47127 <summary>
47128 Bind UDP sockets to the virt port.
47129 </summary>
47130 @@ -67384,7 +67468,7 @@ Domain allowed access.
47131 </param>
47132 <infoflow type="none"/>
47133 </interface>
47134 -<interface name="corenet_tcp_connect_virt_port" lineno="91800">
47135 +<interface name="corenet_tcp_connect_virt_port" lineno="91818">
47136 <summary>
47137 Make a TCP connection to the virt port.
47138 </summary>
47139 @@ -67394,7 +67478,7 @@ Domain allowed access.
47140 </summary>
47141 </param>
47142 </interface>
47143 -<interface name="corenet_send_virt_client_packets" lineno="91820">
47144 +<interface name="corenet_send_virt_client_packets" lineno="91838">
47145 <summary>
47146 Send virt_client packets.
47147 </summary>
47148 @@ -67405,7 +67489,7 @@ Domain allowed access.
47149 </param>
47150 <infoflow type="write" weight="10"/>
47151 </interface>
47152 -<interface name="corenet_dontaudit_send_virt_client_packets" lineno="91839">
47153 +<interface name="corenet_dontaudit_send_virt_client_packets" lineno="91857">
47154 <summary>
47155 Do not audit attempts to send virt_client packets.
47156 </summary>
47157 @@ -67416,7 +67500,7 @@ Domain to not audit.
47158 </param>
47159 <infoflow type="none"/>
47160 </interface>
47161 -<interface name="corenet_receive_virt_client_packets" lineno="91858">
47162 +<interface name="corenet_receive_virt_client_packets" lineno="91876">
47163 <summary>
47164 Receive virt_client packets.
47165 </summary>
47166 @@ -67427,7 +67511,7 @@ Domain allowed access.
47167 </param>
47168 <infoflow type="read" weight="10"/>
47169 </interface>
47170 -<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="91877">
47171 +<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="91895">
47172 <summary>
47173 Do not audit attempts to receive virt_client packets.
47174 </summary>
47175 @@ -67438,7 +67522,7 @@ Domain allowed access.
47176 </param>
47177 <infoflow type="none"/>
47178 </interface>
47179 -<interface name="corenet_sendrecv_virt_client_packets" lineno="91896">
47180 +<interface name="corenet_sendrecv_virt_client_packets" lineno="91914">
47181 <summary>
47182 Send and receive virt_client packets.
47183 </summary>
47184 @@ -67449,7 +67533,7 @@ Domain allowed access.
47185 </param>
47186 <infoflow type="both" weight="10"/>
47187 </interface>
47188 -<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="91912">
47189 +<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="91930">
47190 <summary>
47191 Do not audit attempts to send and receive virt_client packets.
47192 </summary>
47193 @@ -67460,7 +67544,7 @@ Domain to not audit.
47194 </param>
47195 <infoflow type="none"/>
47196 </interface>
47197 -<interface name="corenet_relabelto_virt_client_packets" lineno="91927">
47198 +<interface name="corenet_relabelto_virt_client_packets" lineno="91945">
47199 <summary>
47200 Relabel packets to virt_client the packet type.
47201 </summary>
47202 @@ -67470,7 +67554,7 @@ Domain allowed access.
47203 </summary>
47204 </param>
47205 </interface>
47206 -<interface name="corenet_send_virt_server_packets" lineno="91947">
47207 +<interface name="corenet_send_virt_server_packets" lineno="91965">
47208 <summary>
47209 Send virt_server packets.
47210 </summary>
47211 @@ -67481,7 +67565,7 @@ Domain allowed access.
47212 </param>
47213 <infoflow type="write" weight="10"/>
47214 </interface>
47215 -<interface name="corenet_dontaudit_send_virt_server_packets" lineno="91966">
47216 +<interface name="corenet_dontaudit_send_virt_server_packets" lineno="91984">
47217 <summary>
47218 Do not audit attempts to send virt_server packets.
47219 </summary>
47220 @@ -67492,7 +67576,7 @@ Domain to not audit.
47221 </param>
47222 <infoflow type="none"/>
47223 </interface>
47224 -<interface name="corenet_receive_virt_server_packets" lineno="91985">
47225 +<interface name="corenet_receive_virt_server_packets" lineno="92003">
47226 <summary>
47227 Receive virt_server packets.
47228 </summary>
47229 @@ -67503,7 +67587,7 @@ Domain allowed access.
47230 </param>
47231 <infoflow type="read" weight="10"/>
47232 </interface>
47233 -<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="92004">
47234 +<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="92022">
47235 <summary>
47236 Do not audit attempts to receive virt_server packets.
47237 </summary>
47238 @@ -67514,7 +67598,7 @@ Domain allowed access.
47239 </param>
47240 <infoflow type="none"/>
47241 </interface>
47242 -<interface name="corenet_sendrecv_virt_server_packets" lineno="92023">
47243 +<interface name="corenet_sendrecv_virt_server_packets" lineno="92041">
47244 <summary>
47245 Send and receive virt_server packets.
47246 </summary>
47247 @@ -67525,7 +67609,7 @@ Domain allowed access.
47248 </param>
47249 <infoflow type="both" weight="10"/>
47250 </interface>
47251 -<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="92039">
47252 +<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="92057">
47253 <summary>
47254 Do not audit attempts to send and receive virt_server packets.
47255 </summary>
47256 @@ -67536,7 +67620,7 @@ Domain to not audit.
47257 </param>
47258 <infoflow type="none"/>
47259 </interface>
47260 -<interface name="corenet_relabelto_virt_server_packets" lineno="92054">
47261 +<interface name="corenet_relabelto_virt_server_packets" lineno="92072">
47262 <summary>
47263 Relabel packets to virt_server the packet type.
47264 </summary>
47265 @@ -67546,7 +67630,7 @@ Domain allowed access.
47266 </summary>
47267 </param>
47268 </interface>
47269 -<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="92076">
47270 +<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="92094">
47271 <summary>
47272 Send and receive TCP traffic on the virtual_places port.
47273 </summary>
47274 @@ -67557,7 +67641,7 @@ Domain allowed access.
47275 </param>
47276 <infoflow type="both" weight="10"/>
47277 </interface>
47278 -<interface name="corenet_udp_send_virtual_places_port" lineno="92091">
47279 +<interface name="corenet_udp_send_virtual_places_port" lineno="92109">
47280 <summary>
47281 Send UDP traffic on the virtual_places port.
47282 </summary>
47283 @@ -67568,7 +67652,7 @@ Domain allowed access.
47284 </param>
47285 <infoflow type="write" weight="10"/>
47286 </interface>
47287 -<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="92106">
47288 +<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="92124">
47289 <summary>
47290 Do not audit attempts to send UDP traffic on the virtual_places port.
47291 </summary>
47292 @@ -67579,7 +67663,7 @@ Domain to not audit.
47293 </param>
47294 <infoflow type="none"/>
47295 </interface>
47296 -<interface name="corenet_udp_receive_virtual_places_port" lineno="92121">
47297 +<interface name="corenet_udp_receive_virtual_places_port" lineno="92139">
47298 <summary>
47299 Receive UDP traffic on the virtual_places port.
47300 </summary>
47301 @@ -67590,7 +67674,7 @@ Domain allowed access.
47302 </param>
47303 <infoflow type="read" weight="10"/>
47304 </interface>
47305 -<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="92136">
47306 +<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="92154">
47307 <summary>
47308 Do not audit attempts to receive UDP traffic on the virtual_places port.
47309 </summary>
47310 @@ -67601,7 +67685,7 @@ Domain to not audit.
47311 </param>
47312 <infoflow type="none"/>
47313 </interface>
47314 -<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="92151">
47315 +<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="92169">
47316 <summary>
47317 Send and receive UDP traffic on the virtual_places port.
47318 </summary>
47319 @@ -67612,7 +67696,7 @@ Domain allowed access.
47320 </param>
47321 <infoflow type="both" weight="10"/>
47322 </interface>
47323 -<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="92167">
47324 +<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="92185">
47325 <summary>
47326 Do not audit attempts to send and receive
47327 UDP traffic on the virtual_places port.
47328 @@ -67624,7 +67708,7 @@ Domain to not audit.
47329 </param>
47330 <infoflow type="none"/>
47331 </interface>
47332 -<interface name="corenet_tcp_bind_virtual_places_port" lineno="92182">
47333 +<interface name="corenet_tcp_bind_virtual_places_port" lineno="92200">
47334 <summary>
47335 Bind TCP sockets to the virtual_places port.
47336 </summary>
47337 @@ -67635,7 +67719,7 @@ Domain allowed access.
47338 </param>
47339 <infoflow type="none"/>
47340 </interface>
47341 -<interface name="corenet_udp_bind_virtual_places_port" lineno="92202">
47342 +<interface name="corenet_udp_bind_virtual_places_port" lineno="92220">
47343 <summary>
47344 Bind UDP sockets to the virtual_places port.
47345 </summary>
47346 @@ -67646,7 +67730,7 @@ Domain allowed access.
47347 </param>
47348 <infoflow type="none"/>
47349 </interface>
47350 -<interface name="corenet_tcp_connect_virtual_places_port" lineno="92221">
47351 +<interface name="corenet_tcp_connect_virtual_places_port" lineno="92239">
47352 <summary>
47353 Make a TCP connection to the virtual_places port.
47354 </summary>
47355 @@ -67656,7 +67740,7 @@ Domain allowed access.
47356 </summary>
47357 </param>
47358 </interface>
47359 -<interface name="corenet_send_virtual_places_client_packets" lineno="92241">
47360 +<interface name="corenet_send_virtual_places_client_packets" lineno="92259">
47361 <summary>
47362 Send virtual_places_client packets.
47363 </summary>
47364 @@ -67667,7 +67751,7 @@ Domain allowed access.
47365 </param>
47366 <infoflow type="write" weight="10"/>
47367 </interface>
47368 -<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="92260">
47369 +<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="92278">
47370 <summary>
47371 Do not audit attempts to send virtual_places_client packets.
47372 </summary>
47373 @@ -67678,7 +67762,7 @@ Domain to not audit.
47374 </param>
47375 <infoflow type="none"/>
47376 </interface>
47377 -<interface name="corenet_receive_virtual_places_client_packets" lineno="92279">
47378 +<interface name="corenet_receive_virtual_places_client_packets" lineno="92297">
47379 <summary>
47380 Receive virtual_places_client packets.
47381 </summary>
47382 @@ -67689,7 +67773,7 @@ Domain allowed access.
47383 </param>
47384 <infoflow type="read" weight="10"/>
47385 </interface>
47386 -<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="92298">
47387 +<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="92316">
47388 <summary>
47389 Do not audit attempts to receive virtual_places_client packets.
47390 </summary>
47391 @@ -67700,7 +67784,7 @@ Domain allowed access.
47392 </param>
47393 <infoflow type="none"/>
47394 </interface>
47395 -<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="92317">
47396 +<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="92335">
47397 <summary>
47398 Send and receive virtual_places_client packets.
47399 </summary>
47400 @@ -67711,7 +67795,7 @@ Domain allowed access.
47401 </param>
47402 <infoflow type="both" weight="10"/>
47403 </interface>
47404 -<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="92333">
47405 +<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="92351">
47406 <summary>
47407 Do not audit attempts to send and receive virtual_places_client packets.
47408 </summary>
47409 @@ -67722,7 +67806,7 @@ Domain to not audit.
47410 </param>
47411 <infoflow type="none"/>
47412 </interface>
47413 -<interface name="corenet_relabelto_virtual_places_client_packets" lineno="92348">
47414 +<interface name="corenet_relabelto_virtual_places_client_packets" lineno="92366">
47415 <summary>
47416 Relabel packets to virtual_places_client the packet type.
47417 </summary>
47418 @@ -67732,7 +67816,7 @@ Domain allowed access.
47419 </summary>
47420 </param>
47421 </interface>
47422 -<interface name="corenet_send_virtual_places_server_packets" lineno="92368">
47423 +<interface name="corenet_send_virtual_places_server_packets" lineno="92386">
47424 <summary>
47425 Send virtual_places_server packets.
47426 </summary>
47427 @@ -67743,7 +67827,7 @@ Domain allowed access.
47428 </param>
47429 <infoflow type="write" weight="10"/>
47430 </interface>
47431 -<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="92387">
47432 +<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="92405">
47433 <summary>
47434 Do not audit attempts to send virtual_places_server packets.
47435 </summary>
47436 @@ -67754,7 +67838,7 @@ Domain to not audit.
47437 </param>
47438 <infoflow type="none"/>
47439 </interface>
47440 -<interface name="corenet_receive_virtual_places_server_packets" lineno="92406">
47441 +<interface name="corenet_receive_virtual_places_server_packets" lineno="92424">
47442 <summary>
47443 Receive virtual_places_server packets.
47444 </summary>
47445 @@ -67765,7 +67849,7 @@ Domain allowed access.
47446 </param>
47447 <infoflow type="read" weight="10"/>
47448 </interface>
47449 -<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="92425">
47450 +<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="92443">
47451 <summary>
47452 Do not audit attempts to receive virtual_places_server packets.
47453 </summary>
47454 @@ -67776,7 +67860,7 @@ Domain allowed access.
47455 </param>
47456 <infoflow type="none"/>
47457 </interface>
47458 -<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="92444">
47459 +<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="92462">
47460 <summary>
47461 Send and receive virtual_places_server packets.
47462 </summary>
47463 @@ -67787,7 +67871,7 @@ Domain allowed access.
47464 </param>
47465 <infoflow type="both" weight="10"/>
47466 </interface>
47467 -<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="92460">
47468 +<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="92478">
47469 <summary>
47470 Do not audit attempts to send and receive virtual_places_server packets.
47471 </summary>
47472 @@ -67798,7 +67882,7 @@ Domain to not audit.
47473 </param>
47474 <infoflow type="none"/>
47475 </interface>
47476 -<interface name="corenet_relabelto_virtual_places_server_packets" lineno="92475">
47477 +<interface name="corenet_relabelto_virtual_places_server_packets" lineno="92493">
47478 <summary>
47479 Relabel packets to virtual_places_server the packet type.
47480 </summary>
47481 @@ -67808,7 +67892,7 @@ Domain allowed access.
47482 </summary>
47483 </param>
47484 </interface>
47485 -<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="92497">
47486 +<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="92515">
47487 <summary>
47488 Send and receive TCP traffic on the virt_migration port.
47489 </summary>
47490 @@ -67819,7 +67903,7 @@ Domain allowed access.
47491 </param>
47492 <infoflow type="both" weight="10"/>
47493 </interface>
47494 -<interface name="corenet_udp_send_virt_migration_port" lineno="92512">
47495 +<interface name="corenet_udp_send_virt_migration_port" lineno="92530">
47496 <summary>
47497 Send UDP traffic on the virt_migration port.
47498 </summary>
47499 @@ -67830,7 +67914,7 @@ Domain allowed access.
47500 </param>
47501 <infoflow type="write" weight="10"/>
47502 </interface>
47503 -<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="92527">
47504 +<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="92545">
47505 <summary>
47506 Do not audit attempts to send UDP traffic on the virt_migration port.
47507 </summary>
47508 @@ -67841,7 +67925,7 @@ Domain to not audit.
47509 </param>
47510 <infoflow type="none"/>
47511 </interface>
47512 -<interface name="corenet_udp_receive_virt_migration_port" lineno="92542">
47513 +<interface name="corenet_udp_receive_virt_migration_port" lineno="92560">
47514 <summary>
47515 Receive UDP traffic on the virt_migration port.
47516 </summary>
47517 @@ -67852,7 +67936,7 @@ Domain allowed access.
47518 </param>
47519 <infoflow type="read" weight="10"/>
47520 </interface>
47521 -<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="92557">
47522 +<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="92575">
47523 <summary>
47524 Do not audit attempts to receive UDP traffic on the virt_migration port.
47525 </summary>
47526 @@ -67863,7 +67947,7 @@ Domain to not audit.
47527 </param>
47528 <infoflow type="none"/>
47529 </interface>
47530 -<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="92572">
47531 +<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="92590">
47532 <summary>
47533 Send and receive UDP traffic on the virt_migration port.
47534 </summary>
47535 @@ -67874,7 +67958,7 @@ Domain allowed access.
47536 </param>
47537 <infoflow type="both" weight="10"/>
47538 </interface>
47539 -<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="92588">
47540 +<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="92606">
47541 <summary>
47542 Do not audit attempts to send and receive
47543 UDP traffic on the virt_migration port.
47544 @@ -67886,7 +67970,7 @@ Domain to not audit.
47545 </param>
47546 <infoflow type="none"/>
47547 </interface>
47548 -<interface name="corenet_tcp_bind_virt_migration_port" lineno="92603">
47549 +<interface name="corenet_tcp_bind_virt_migration_port" lineno="92621">
47550 <summary>
47551 Bind TCP sockets to the virt_migration port.
47552 </summary>
47553 @@ -67897,7 +67981,7 @@ Domain allowed access.
47554 </param>
47555 <infoflow type="none"/>
47556 </interface>
47557 -<interface name="corenet_udp_bind_virt_migration_port" lineno="92623">
47558 +<interface name="corenet_udp_bind_virt_migration_port" lineno="92641">
47559 <summary>
47560 Bind UDP sockets to the virt_migration port.
47561 </summary>
47562 @@ -67908,7 +67992,7 @@ Domain allowed access.
47563 </param>
47564 <infoflow type="none"/>
47565 </interface>
47566 -<interface name="corenet_tcp_connect_virt_migration_port" lineno="92642">
47567 +<interface name="corenet_tcp_connect_virt_migration_port" lineno="92660">
47568 <summary>
47569 Make a TCP connection to the virt_migration port.
47570 </summary>
47571 @@ -67918,7 +68002,7 @@ Domain allowed access.
47572 </summary>
47573 </param>
47574 </interface>
47575 -<interface name="corenet_send_virt_migration_client_packets" lineno="92662">
47576 +<interface name="corenet_send_virt_migration_client_packets" lineno="92680">
47577 <summary>
47578 Send virt_migration_client packets.
47579 </summary>
47580 @@ -67929,7 +68013,7 @@ Domain allowed access.
47581 </param>
47582 <infoflow type="write" weight="10"/>
47583 </interface>
47584 -<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="92681">
47585 +<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="92699">
47586 <summary>
47587 Do not audit attempts to send virt_migration_client packets.
47588 </summary>
47589 @@ -67940,7 +68024,7 @@ Domain to not audit.
47590 </param>
47591 <infoflow type="none"/>
47592 </interface>
47593 -<interface name="corenet_receive_virt_migration_client_packets" lineno="92700">
47594 +<interface name="corenet_receive_virt_migration_client_packets" lineno="92718">
47595 <summary>
47596 Receive virt_migration_client packets.
47597 </summary>
47598 @@ -67951,7 +68035,7 @@ Domain allowed access.
47599 </param>
47600 <infoflow type="read" weight="10"/>
47601 </interface>
47602 -<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="92719">
47603 +<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="92737">
47604 <summary>
47605 Do not audit attempts to receive virt_migration_client packets.
47606 </summary>
47607 @@ -67962,7 +68046,7 @@ Domain allowed access.
47608 </param>
47609 <infoflow type="none"/>
47610 </interface>
47611 -<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="92738">
47612 +<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="92756">
47613 <summary>
47614 Send and receive virt_migration_client packets.
47615 </summary>
47616 @@ -67973,7 +68057,7 @@ Domain allowed access.
47617 </param>
47618 <infoflow type="both" weight="10"/>
47619 </interface>
47620 -<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="92754">
47621 +<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="92772">
47622 <summary>
47623 Do not audit attempts to send and receive virt_migration_client packets.
47624 </summary>
47625 @@ -67984,7 +68068,7 @@ Domain to not audit.
47626 </param>
47627 <infoflow type="none"/>
47628 </interface>
47629 -<interface name="corenet_relabelto_virt_migration_client_packets" lineno="92769">
47630 +<interface name="corenet_relabelto_virt_migration_client_packets" lineno="92787">
47631 <summary>
47632 Relabel packets to virt_migration_client the packet type.
47633 </summary>
47634 @@ -67994,7 +68078,7 @@ Domain allowed access.
47635 </summary>
47636 </param>
47637 </interface>
47638 -<interface name="corenet_send_virt_migration_server_packets" lineno="92789">
47639 +<interface name="corenet_send_virt_migration_server_packets" lineno="92807">
47640 <summary>
47641 Send virt_migration_server packets.
47642 </summary>
47643 @@ -68005,7 +68089,7 @@ Domain allowed access.
47644 </param>
47645 <infoflow type="write" weight="10"/>
47646 </interface>
47647 -<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="92808">
47648 +<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="92826">
47649 <summary>
47650 Do not audit attempts to send virt_migration_server packets.
47651 </summary>
47652 @@ -68016,7 +68100,7 @@ Domain to not audit.
47653 </param>
47654 <infoflow type="none"/>
47655 </interface>
47656 -<interface name="corenet_receive_virt_migration_server_packets" lineno="92827">
47657 +<interface name="corenet_receive_virt_migration_server_packets" lineno="92845">
47658 <summary>
47659 Receive virt_migration_server packets.
47660 </summary>
47661 @@ -68027,7 +68111,7 @@ Domain allowed access.
47662 </param>
47663 <infoflow type="read" weight="10"/>
47664 </interface>
47665 -<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="92846">
47666 +<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="92864">
47667 <summary>
47668 Do not audit attempts to receive virt_migration_server packets.
47669 </summary>
47670 @@ -68038,7 +68122,7 @@ Domain allowed access.
47671 </param>
47672 <infoflow type="none"/>
47673 </interface>
47674 -<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="92865">
47675 +<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="92883">
47676 <summary>
47677 Send and receive virt_migration_server packets.
47678 </summary>
47679 @@ -68049,7 +68133,7 @@ Domain allowed access.
47680 </param>
47681 <infoflow type="both" weight="10"/>
47682 </interface>
47683 -<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="92881">
47684 +<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="92899">
47685 <summary>
47686 Do not audit attempts to send and receive virt_migration_server packets.
47687 </summary>
47688 @@ -68060,7 +68144,7 @@ Domain to not audit.
47689 </param>
47690 <infoflow type="none"/>
47691 </interface>
47692 -<interface name="corenet_relabelto_virt_migration_server_packets" lineno="92896">
47693 +<interface name="corenet_relabelto_virt_migration_server_packets" lineno="92914">
47694 <summary>
47695 Relabel packets to virt_migration_server the packet type.
47696 </summary>
47697 @@ -68070,7 +68154,7 @@ Domain allowed access.
47698 </summary>
47699 </param>
47700 </interface>
47701 -<interface name="corenet_tcp_sendrecv_vnc_port" lineno="92918">
47702 +<interface name="corenet_tcp_sendrecv_vnc_port" lineno="92936">
47703 <summary>
47704 Send and receive TCP traffic on the vnc port.
47705 </summary>
47706 @@ -68081,7 +68165,7 @@ Domain allowed access.
47707 </param>
47708 <infoflow type="both" weight="10"/>
47709 </interface>
47710 -<interface name="corenet_udp_send_vnc_port" lineno="92933">
47711 +<interface name="corenet_udp_send_vnc_port" lineno="92951">
47712 <summary>
47713 Send UDP traffic on the vnc port.
47714 </summary>
47715 @@ -68092,7 +68176,7 @@ Domain allowed access.
47716 </param>
47717 <infoflow type="write" weight="10"/>
47718 </interface>
47719 -<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="92948">
47720 +<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="92966">
47721 <summary>
47722 Do not audit attempts to send UDP traffic on the vnc port.
47723 </summary>
47724 @@ -68103,7 +68187,7 @@ Domain to not audit.
47725 </param>
47726 <infoflow type="none"/>
47727 </interface>
47728 -<interface name="corenet_udp_receive_vnc_port" lineno="92963">
47729 +<interface name="corenet_udp_receive_vnc_port" lineno="92981">
47730 <summary>
47731 Receive UDP traffic on the vnc port.
47732 </summary>
47733 @@ -68114,7 +68198,7 @@ Domain allowed access.
47734 </param>
47735 <infoflow type="read" weight="10"/>
47736 </interface>
47737 -<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="92978">
47738 +<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="92996">
47739 <summary>
47740 Do not audit attempts to receive UDP traffic on the vnc port.
47741 </summary>
47742 @@ -68125,7 +68209,7 @@ Domain to not audit.
47743 </param>
47744 <infoflow type="none"/>
47745 </interface>
47746 -<interface name="corenet_udp_sendrecv_vnc_port" lineno="92993">
47747 +<interface name="corenet_udp_sendrecv_vnc_port" lineno="93011">
47748 <summary>
47749 Send and receive UDP traffic on the vnc port.
47750 </summary>
47751 @@ -68136,7 +68220,7 @@ Domain allowed access.
47752 </param>
47753 <infoflow type="both" weight="10"/>
47754 </interface>
47755 -<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="93009">
47756 +<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="93027">
47757 <summary>
47758 Do not audit attempts to send and receive
47759 UDP traffic on the vnc port.
47760 @@ -68148,7 +68232,7 @@ Domain to not audit.
47761 </param>
47762 <infoflow type="none"/>
47763 </interface>
47764 -<interface name="corenet_tcp_bind_vnc_port" lineno="93024">
47765 +<interface name="corenet_tcp_bind_vnc_port" lineno="93042">
47766 <summary>
47767 Bind TCP sockets to the vnc port.
47768 </summary>
47769 @@ -68159,7 +68243,7 @@ Domain allowed access.
47770 </param>
47771 <infoflow type="none"/>
47772 </interface>
47773 -<interface name="corenet_udp_bind_vnc_port" lineno="93044">
47774 +<interface name="corenet_udp_bind_vnc_port" lineno="93062">
47775 <summary>
47776 Bind UDP sockets to the vnc port.
47777 </summary>
47778 @@ -68170,7 +68254,7 @@ Domain allowed access.
47779 </param>
47780 <infoflow type="none"/>
47781 </interface>
47782 -<interface name="corenet_tcp_connect_vnc_port" lineno="93063">
47783 +<interface name="corenet_tcp_connect_vnc_port" lineno="93081">
47784 <summary>
47785 Make a TCP connection to the vnc port.
47786 </summary>
47787 @@ -68180,7 +68264,7 @@ Domain allowed access.
47788 </summary>
47789 </param>
47790 </interface>
47791 -<interface name="corenet_send_vnc_client_packets" lineno="93083">
47792 +<interface name="corenet_send_vnc_client_packets" lineno="93101">
47793 <summary>
47794 Send vnc_client packets.
47795 </summary>
47796 @@ -68191,7 +68275,7 @@ Domain allowed access.
47797 </param>
47798 <infoflow type="write" weight="10"/>
47799 </interface>
47800 -<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="93102">
47801 +<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="93120">
47802 <summary>
47803 Do not audit attempts to send vnc_client packets.
47804 </summary>
47805 @@ -68202,7 +68286,7 @@ Domain to not audit.
47806 </param>
47807 <infoflow type="none"/>
47808 </interface>
47809 -<interface name="corenet_receive_vnc_client_packets" lineno="93121">
47810 +<interface name="corenet_receive_vnc_client_packets" lineno="93139">
47811 <summary>
47812 Receive vnc_client packets.
47813 </summary>
47814 @@ -68213,7 +68297,7 @@ Domain allowed access.
47815 </param>
47816 <infoflow type="read" weight="10"/>
47817 </interface>
47818 -<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="93140">
47819 +<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="93158">
47820 <summary>
47821 Do not audit attempts to receive vnc_client packets.
47822 </summary>
47823 @@ -68224,7 +68308,7 @@ Domain allowed access.
47824 </param>
47825 <infoflow type="none"/>
47826 </interface>
47827 -<interface name="corenet_sendrecv_vnc_client_packets" lineno="93159">
47828 +<interface name="corenet_sendrecv_vnc_client_packets" lineno="93177">
47829 <summary>
47830 Send and receive vnc_client packets.
47831 </summary>
47832 @@ -68235,7 +68319,7 @@ Domain allowed access.
47833 </param>
47834 <infoflow type="both" weight="10"/>
47835 </interface>
47836 -<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="93175">
47837 +<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="93193">
47838 <summary>
47839 Do not audit attempts to send and receive vnc_client packets.
47840 </summary>
47841 @@ -68246,7 +68330,7 @@ Domain to not audit.
47842 </param>
47843 <infoflow type="none"/>
47844 </interface>
47845 -<interface name="corenet_relabelto_vnc_client_packets" lineno="93190">
47846 +<interface name="corenet_relabelto_vnc_client_packets" lineno="93208">
47847 <summary>
47848 Relabel packets to vnc_client the packet type.
47849 </summary>
47850 @@ -68256,7 +68340,7 @@ Domain allowed access.
47851 </summary>
47852 </param>
47853 </interface>
47854 -<interface name="corenet_send_vnc_server_packets" lineno="93210">
47855 +<interface name="corenet_send_vnc_server_packets" lineno="93228">
47856 <summary>
47857 Send vnc_server packets.
47858 </summary>
47859 @@ -68267,7 +68351,7 @@ Domain allowed access.
47860 </param>
47861 <infoflow type="write" weight="10"/>
47862 </interface>
47863 -<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="93229">
47864 +<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="93247">
47865 <summary>
47866 Do not audit attempts to send vnc_server packets.
47867 </summary>
47868 @@ -68278,7 +68362,7 @@ Domain to not audit.
47869 </param>
47870 <infoflow type="none"/>
47871 </interface>
47872 -<interface name="corenet_receive_vnc_server_packets" lineno="93248">
47873 +<interface name="corenet_receive_vnc_server_packets" lineno="93266">
47874 <summary>
47875 Receive vnc_server packets.
47876 </summary>
47877 @@ -68289,7 +68373,7 @@ Domain allowed access.
47878 </param>
47879 <infoflow type="read" weight="10"/>
47880 </interface>
47881 -<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="93267">
47882 +<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="93285">
47883 <summary>
47884 Do not audit attempts to receive vnc_server packets.
47885 </summary>
47886 @@ -68300,7 +68384,7 @@ Domain allowed access.
47887 </param>
47888 <infoflow type="none"/>
47889 </interface>
47890 -<interface name="corenet_sendrecv_vnc_server_packets" lineno="93286">
47891 +<interface name="corenet_sendrecv_vnc_server_packets" lineno="93304">
47892 <summary>
47893 Send and receive vnc_server packets.
47894 </summary>
47895 @@ -68311,7 +68395,7 @@ Domain allowed access.
47896 </param>
47897 <infoflow type="both" weight="10"/>
47898 </interface>
47899 -<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="93302">
47900 +<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="93320">
47901 <summary>
47902 Do not audit attempts to send and receive vnc_server packets.
47903 </summary>
47904 @@ -68322,7 +68406,7 @@ Domain to not audit.
47905 </param>
47906 <infoflow type="none"/>
47907 </interface>
47908 -<interface name="corenet_relabelto_vnc_server_packets" lineno="93317">
47909 +<interface name="corenet_relabelto_vnc_server_packets" lineno="93335">
47910 <summary>
47911 Relabel packets to vnc_server the packet type.
47912 </summary>
47913 @@ -68332,7 +68416,7 @@ Domain allowed access.
47914 </summary>
47915 </param>
47916 </interface>
47917 -<interface name="corenet_tcp_sendrecv_wccp_port" lineno="93339">
47918 +<interface name="corenet_tcp_sendrecv_wccp_port" lineno="93357">
47919 <summary>
47920 Send and receive TCP traffic on the wccp port.
47921 </summary>
47922 @@ -68343,7 +68427,7 @@ Domain allowed access.
47923 </param>
47924 <infoflow type="both" weight="10"/>
47925 </interface>
47926 -<interface name="corenet_udp_send_wccp_port" lineno="93354">
47927 +<interface name="corenet_udp_send_wccp_port" lineno="93372">
47928 <summary>
47929 Send UDP traffic on the wccp port.
47930 </summary>
47931 @@ -68354,7 +68438,7 @@ Domain allowed access.
47932 </param>
47933 <infoflow type="write" weight="10"/>
47934 </interface>
47935 -<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="93369">
47936 +<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="93387">
47937 <summary>
47938 Do not audit attempts to send UDP traffic on the wccp port.
47939 </summary>
47940 @@ -68365,7 +68449,7 @@ Domain to not audit.
47941 </param>
47942 <infoflow type="none"/>
47943 </interface>
47944 -<interface name="corenet_udp_receive_wccp_port" lineno="93384">
47945 +<interface name="corenet_udp_receive_wccp_port" lineno="93402">
47946 <summary>
47947 Receive UDP traffic on the wccp port.
47948 </summary>
47949 @@ -68376,7 +68460,7 @@ Domain allowed access.
47950 </param>
47951 <infoflow type="read" weight="10"/>
47952 </interface>
47953 -<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="93399">
47954 +<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="93417">
47955 <summary>
47956 Do not audit attempts to receive UDP traffic on the wccp port.
47957 </summary>
47958 @@ -68387,7 +68471,7 @@ Domain to not audit.
47959 </param>
47960 <infoflow type="none"/>
47961 </interface>
47962 -<interface name="corenet_udp_sendrecv_wccp_port" lineno="93414">
47963 +<interface name="corenet_udp_sendrecv_wccp_port" lineno="93432">
47964 <summary>
47965 Send and receive UDP traffic on the wccp port.
47966 </summary>
47967 @@ -68398,7 +68482,7 @@ Domain allowed access.
47968 </param>
47969 <infoflow type="both" weight="10"/>
47970 </interface>
47971 -<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="93430">
47972 +<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="93448">
47973 <summary>
47974 Do not audit attempts to send and receive
47975 UDP traffic on the wccp port.
47976 @@ -68410,7 +68494,7 @@ Domain to not audit.
47977 </param>
47978 <infoflow type="none"/>
47979 </interface>
47980 -<interface name="corenet_tcp_bind_wccp_port" lineno="93445">
47981 +<interface name="corenet_tcp_bind_wccp_port" lineno="93463">
47982 <summary>
47983 Bind TCP sockets to the wccp port.
47984 </summary>
47985 @@ -68421,7 +68505,7 @@ Domain allowed access.
47986 </param>
47987 <infoflow type="none"/>
47988 </interface>
47989 -<interface name="corenet_udp_bind_wccp_port" lineno="93465">
47990 +<interface name="corenet_udp_bind_wccp_port" lineno="93483">
47991 <summary>
47992 Bind UDP sockets to the wccp port.
47993 </summary>
47994 @@ -68432,7 +68516,7 @@ Domain allowed access.
47995 </param>
47996 <infoflow type="none"/>
47997 </interface>
47998 -<interface name="corenet_tcp_connect_wccp_port" lineno="93484">
47999 +<interface name="corenet_tcp_connect_wccp_port" lineno="93502">
48000 <summary>
48001 Make a TCP connection to the wccp port.
48002 </summary>
48003 @@ -68442,7 +68526,7 @@ Domain allowed access.
48004 </summary>
48005 </param>
48006 </interface>
48007 -<interface name="corenet_send_wccp_client_packets" lineno="93504">
48008 +<interface name="corenet_send_wccp_client_packets" lineno="93522">
48009 <summary>
48010 Send wccp_client packets.
48011 </summary>
48012 @@ -68453,7 +68537,7 @@ Domain allowed access.
48013 </param>
48014 <infoflow type="write" weight="10"/>
48015 </interface>
48016 -<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="93523">
48017 +<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="93541">
48018 <summary>
48019 Do not audit attempts to send wccp_client packets.
48020 </summary>
48021 @@ -68464,7 +68548,7 @@ Domain to not audit.
48022 </param>
48023 <infoflow type="none"/>
48024 </interface>
48025 -<interface name="corenet_receive_wccp_client_packets" lineno="93542">
48026 +<interface name="corenet_receive_wccp_client_packets" lineno="93560">
48027 <summary>
48028 Receive wccp_client packets.
48029 </summary>
48030 @@ -68475,7 +68559,7 @@ Domain allowed access.
48031 </param>
48032 <infoflow type="read" weight="10"/>
48033 </interface>
48034 -<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="93561">
48035 +<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="93579">
48036 <summary>
48037 Do not audit attempts to receive wccp_client packets.
48038 </summary>
48039 @@ -68486,7 +68570,7 @@ Domain allowed access.
48040 </param>
48041 <infoflow type="none"/>
48042 </interface>
48043 -<interface name="corenet_sendrecv_wccp_client_packets" lineno="93580">
48044 +<interface name="corenet_sendrecv_wccp_client_packets" lineno="93598">
48045 <summary>
48046 Send and receive wccp_client packets.
48047 </summary>
48048 @@ -68497,7 +68581,7 @@ Domain allowed access.
48049 </param>
48050 <infoflow type="both" weight="10"/>
48051 </interface>
48052 -<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="93596">
48053 +<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="93614">
48054 <summary>
48055 Do not audit attempts to send and receive wccp_client packets.
48056 </summary>
48057 @@ -68508,7 +68592,7 @@ Domain to not audit.
48058 </param>
48059 <infoflow type="none"/>
48060 </interface>
48061 -<interface name="corenet_relabelto_wccp_client_packets" lineno="93611">
48062 +<interface name="corenet_relabelto_wccp_client_packets" lineno="93629">
48063 <summary>
48064 Relabel packets to wccp_client the packet type.
48065 </summary>
48066 @@ -68518,7 +68602,7 @@ Domain allowed access.
48067 </summary>
48068 </param>
48069 </interface>
48070 -<interface name="corenet_send_wccp_server_packets" lineno="93631">
48071 +<interface name="corenet_send_wccp_server_packets" lineno="93649">
48072 <summary>
48073 Send wccp_server packets.
48074 </summary>
48075 @@ -68529,7 +68613,7 @@ Domain allowed access.
48076 </param>
48077 <infoflow type="write" weight="10"/>
48078 </interface>
48079 -<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="93650">
48080 +<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="93668">
48081 <summary>
48082 Do not audit attempts to send wccp_server packets.
48083 </summary>
48084 @@ -68540,7 +68624,7 @@ Domain to not audit.
48085 </param>
48086 <infoflow type="none"/>
48087 </interface>
48088 -<interface name="corenet_receive_wccp_server_packets" lineno="93669">
48089 +<interface name="corenet_receive_wccp_server_packets" lineno="93687">
48090 <summary>
48091 Receive wccp_server packets.
48092 </summary>
48093 @@ -68551,7 +68635,7 @@ Domain allowed access.
48094 </param>
48095 <infoflow type="read" weight="10"/>
48096 </interface>
48097 -<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="93688">
48098 +<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="93706">
48099 <summary>
48100 Do not audit attempts to receive wccp_server packets.
48101 </summary>
48102 @@ -68562,7 +68646,7 @@ Domain allowed access.
48103 </param>
48104 <infoflow type="none"/>
48105 </interface>
48106 -<interface name="corenet_sendrecv_wccp_server_packets" lineno="93707">
48107 +<interface name="corenet_sendrecv_wccp_server_packets" lineno="93725">
48108 <summary>
48109 Send and receive wccp_server packets.
48110 </summary>
48111 @@ -68573,7 +68657,7 @@ Domain allowed access.
48112 </param>
48113 <infoflow type="both" weight="10"/>
48114 </interface>
48115 -<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="93723">
48116 +<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="93741">
48117 <summary>
48118 Do not audit attempts to send and receive wccp_server packets.
48119 </summary>
48120 @@ -68584,7 +68668,7 @@ Domain to not audit.
48121 </param>
48122 <infoflow type="none"/>
48123 </interface>
48124 -<interface name="corenet_relabelto_wccp_server_packets" lineno="93738">
48125 +<interface name="corenet_relabelto_wccp_server_packets" lineno="93756">
48126 <summary>
48127 Relabel packets to wccp_server the packet type.
48128 </summary>
48129 @@ -68594,7 +68678,7 @@ Domain allowed access.
48130 </summary>
48131 </param>
48132 </interface>
48133 -<interface name="corenet_tcp_sendrecv_websm_port" lineno="93760">
48134 +<interface name="corenet_tcp_sendrecv_websm_port" lineno="93778">
48135 <summary>
48136 Send and receive TCP traffic on the websm port.
48137 </summary>
48138 @@ -68605,7 +68689,7 @@ Domain allowed access.
48139 </param>
48140 <infoflow type="both" weight="10"/>
48141 </interface>
48142 -<interface name="corenet_udp_send_websm_port" lineno="93775">
48143 +<interface name="corenet_udp_send_websm_port" lineno="93793">
48144 <summary>
48145 Send UDP traffic on the websm port.
48146 </summary>
48147 @@ -68616,7 +68700,7 @@ Domain allowed access.
48148 </param>
48149 <infoflow type="write" weight="10"/>
48150 </interface>
48151 -<interface name="corenet_dontaudit_udp_send_websm_port" lineno="93790">
48152 +<interface name="corenet_dontaudit_udp_send_websm_port" lineno="93808">
48153 <summary>
48154 Do not audit attempts to send UDP traffic on the websm port.
48155 </summary>
48156 @@ -68627,7 +68711,7 @@ Domain to not audit.
48157 </param>
48158 <infoflow type="none"/>
48159 </interface>
48160 -<interface name="corenet_udp_receive_websm_port" lineno="93805">
48161 +<interface name="corenet_udp_receive_websm_port" lineno="93823">
48162 <summary>
48163 Receive UDP traffic on the websm port.
48164 </summary>
48165 @@ -68638,7 +68722,7 @@ Domain allowed access.
48166 </param>
48167 <infoflow type="read" weight="10"/>
48168 </interface>
48169 -<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="93820">
48170 +<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="93838">
48171 <summary>
48172 Do not audit attempts to receive UDP traffic on the websm port.
48173 </summary>
48174 @@ -68649,7 +68733,7 @@ Domain to not audit.
48175 </param>
48176 <infoflow type="none"/>
48177 </interface>
48178 -<interface name="corenet_udp_sendrecv_websm_port" lineno="93835">
48179 +<interface name="corenet_udp_sendrecv_websm_port" lineno="93853">
48180 <summary>
48181 Send and receive UDP traffic on the websm port.
48182 </summary>
48183 @@ -68660,7 +68744,7 @@ Domain allowed access.
48184 </param>
48185 <infoflow type="both" weight="10"/>
48186 </interface>
48187 -<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="93851">
48188 +<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="93869">
48189 <summary>
48190 Do not audit attempts to send and receive
48191 UDP traffic on the websm port.
48192 @@ -68672,7 +68756,7 @@ Domain to not audit.
48193 </param>
48194 <infoflow type="none"/>
48195 </interface>
48196 -<interface name="corenet_tcp_bind_websm_port" lineno="93866">
48197 +<interface name="corenet_tcp_bind_websm_port" lineno="93884">
48198 <summary>
48199 Bind TCP sockets to the websm port.
48200 </summary>
48201 @@ -68683,7 +68767,7 @@ Domain allowed access.
48202 </param>
48203 <infoflow type="none"/>
48204 </interface>
48205 -<interface name="corenet_udp_bind_websm_port" lineno="93886">
48206 +<interface name="corenet_udp_bind_websm_port" lineno="93904">
48207 <summary>
48208 Bind UDP sockets to the websm port.
48209 </summary>
48210 @@ -68694,7 +68778,7 @@ Domain allowed access.
48211 </param>
48212 <infoflow type="none"/>
48213 </interface>
48214 -<interface name="corenet_tcp_connect_websm_port" lineno="93905">
48215 +<interface name="corenet_tcp_connect_websm_port" lineno="93923">
48216 <summary>
48217 Make a TCP connection to the websm port.
48218 </summary>
48219 @@ -68704,7 +68788,7 @@ Domain allowed access.
48220 </summary>
48221 </param>
48222 </interface>
48223 -<interface name="corenet_send_websm_client_packets" lineno="93925">
48224 +<interface name="corenet_send_websm_client_packets" lineno="93943">
48225 <summary>
48226 Send websm_client packets.
48227 </summary>
48228 @@ -68715,7 +68799,7 @@ Domain allowed access.
48229 </param>
48230 <infoflow type="write" weight="10"/>
48231 </interface>
48232 -<interface name="corenet_dontaudit_send_websm_client_packets" lineno="93944">
48233 +<interface name="corenet_dontaudit_send_websm_client_packets" lineno="93962">
48234 <summary>
48235 Do not audit attempts to send websm_client packets.
48236 </summary>
48237 @@ -68726,7 +68810,7 @@ Domain to not audit.
48238 </param>
48239 <infoflow type="none"/>
48240 </interface>
48241 -<interface name="corenet_receive_websm_client_packets" lineno="93963">
48242 +<interface name="corenet_receive_websm_client_packets" lineno="93981">
48243 <summary>
48244 Receive websm_client packets.
48245 </summary>
48246 @@ -68737,7 +68821,7 @@ Domain allowed access.
48247 </param>
48248 <infoflow type="read" weight="10"/>
48249 </interface>
48250 -<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="93982">
48251 +<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="94000">
48252 <summary>
48253 Do not audit attempts to receive websm_client packets.
48254 </summary>
48255 @@ -68748,7 +68832,7 @@ Domain allowed access.
48256 </param>
48257 <infoflow type="none"/>
48258 </interface>
48259 -<interface name="corenet_sendrecv_websm_client_packets" lineno="94001">
48260 +<interface name="corenet_sendrecv_websm_client_packets" lineno="94019">
48261 <summary>
48262 Send and receive websm_client packets.
48263 </summary>
48264 @@ -68759,7 +68843,7 @@ Domain allowed access.
48265 </param>
48266 <infoflow type="both" weight="10"/>
48267 </interface>
48268 -<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="94017">
48269 +<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="94035">
48270 <summary>
48271 Do not audit attempts to send and receive websm_client packets.
48272 </summary>
48273 @@ -68770,7 +68854,7 @@ Domain to not audit.
48274 </param>
48275 <infoflow type="none"/>
48276 </interface>
48277 -<interface name="corenet_relabelto_websm_client_packets" lineno="94032">
48278 +<interface name="corenet_relabelto_websm_client_packets" lineno="94050">
48279 <summary>
48280 Relabel packets to websm_client the packet type.
48281 </summary>
48282 @@ -68780,7 +68864,7 @@ Domain allowed access.
48283 </summary>
48284 </param>
48285 </interface>
48286 -<interface name="corenet_send_websm_server_packets" lineno="94052">
48287 +<interface name="corenet_send_websm_server_packets" lineno="94070">
48288 <summary>
48289 Send websm_server packets.
48290 </summary>
48291 @@ -68791,7 +68875,7 @@ Domain allowed access.
48292 </param>
48293 <infoflow type="write" weight="10"/>
48294 </interface>
48295 -<interface name="corenet_dontaudit_send_websm_server_packets" lineno="94071">
48296 +<interface name="corenet_dontaudit_send_websm_server_packets" lineno="94089">
48297 <summary>
48298 Do not audit attempts to send websm_server packets.
48299 </summary>
48300 @@ -68802,7 +68886,7 @@ Domain to not audit.
48301 </param>
48302 <infoflow type="none"/>
48303 </interface>
48304 -<interface name="corenet_receive_websm_server_packets" lineno="94090">
48305 +<interface name="corenet_receive_websm_server_packets" lineno="94108">
48306 <summary>
48307 Receive websm_server packets.
48308 </summary>
48309 @@ -68813,7 +68897,7 @@ Domain allowed access.
48310 </param>
48311 <infoflow type="read" weight="10"/>
48312 </interface>
48313 -<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="94109">
48314 +<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="94127">
48315 <summary>
48316 Do not audit attempts to receive websm_server packets.
48317 </summary>
48318 @@ -68824,7 +68908,7 @@ Domain allowed access.
48319 </param>
48320 <infoflow type="none"/>
48321 </interface>
48322 -<interface name="corenet_sendrecv_websm_server_packets" lineno="94128">
48323 +<interface name="corenet_sendrecv_websm_server_packets" lineno="94146">
48324 <summary>
48325 Send and receive websm_server packets.
48326 </summary>
48327 @@ -68835,7 +68919,7 @@ Domain allowed access.
48328 </param>
48329 <infoflow type="both" weight="10"/>
48330 </interface>
48331 -<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="94144">
48332 +<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="94162">
48333 <summary>
48334 Do not audit attempts to send and receive websm_server packets.
48335 </summary>
48336 @@ -68846,7 +68930,7 @@ Domain to not audit.
48337 </param>
48338 <infoflow type="none"/>
48339 </interface>
48340 -<interface name="corenet_relabelto_websm_server_packets" lineno="94159">
48341 +<interface name="corenet_relabelto_websm_server_packets" lineno="94177">
48342 <summary>
48343 Relabel packets to websm_server the packet type.
48344 </summary>
48345 @@ -68856,7 +68940,7 @@ Domain allowed access.
48346 </summary>
48347 </param>
48348 </interface>
48349 -<interface name="corenet_tcp_sendrecv_whois_port" lineno="94181">
48350 +<interface name="corenet_tcp_sendrecv_whois_port" lineno="94199">
48351 <summary>
48352 Send and receive TCP traffic on the whois port.
48353 </summary>
48354 @@ -68867,7 +68951,7 @@ Domain allowed access.
48355 </param>
48356 <infoflow type="both" weight="10"/>
48357 </interface>
48358 -<interface name="corenet_udp_send_whois_port" lineno="94196">
48359 +<interface name="corenet_udp_send_whois_port" lineno="94214">
48360 <summary>
48361 Send UDP traffic on the whois port.
48362 </summary>
48363 @@ -68878,7 +68962,7 @@ Domain allowed access.
48364 </param>
48365 <infoflow type="write" weight="10"/>
48366 </interface>
48367 -<interface name="corenet_dontaudit_udp_send_whois_port" lineno="94211">
48368 +<interface name="corenet_dontaudit_udp_send_whois_port" lineno="94229">
48369 <summary>
48370 Do not audit attempts to send UDP traffic on the whois port.
48371 </summary>
48372 @@ -68889,7 +68973,7 @@ Domain to not audit.
48373 </param>
48374 <infoflow type="none"/>
48375 </interface>
48376 -<interface name="corenet_udp_receive_whois_port" lineno="94226">
48377 +<interface name="corenet_udp_receive_whois_port" lineno="94244">
48378 <summary>
48379 Receive UDP traffic on the whois port.
48380 </summary>
48381 @@ -68900,7 +68984,7 @@ Domain allowed access.
48382 </param>
48383 <infoflow type="read" weight="10"/>
48384 </interface>
48385 -<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="94241">
48386 +<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="94259">
48387 <summary>
48388 Do not audit attempts to receive UDP traffic on the whois port.
48389 </summary>
48390 @@ -68911,7 +68995,7 @@ Domain to not audit.
48391 </param>
48392 <infoflow type="none"/>
48393 </interface>
48394 -<interface name="corenet_udp_sendrecv_whois_port" lineno="94256">
48395 +<interface name="corenet_udp_sendrecv_whois_port" lineno="94274">
48396 <summary>
48397 Send and receive UDP traffic on the whois port.
48398 </summary>
48399 @@ -68922,7 +69006,7 @@ Domain allowed access.
48400 </param>
48401 <infoflow type="both" weight="10"/>
48402 </interface>
48403 -<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="94272">
48404 +<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="94290">
48405 <summary>
48406 Do not audit attempts to send and receive
48407 UDP traffic on the whois port.
48408 @@ -68934,7 +69018,7 @@ Domain to not audit.
48409 </param>
48410 <infoflow type="none"/>
48411 </interface>
48412 -<interface name="corenet_tcp_bind_whois_port" lineno="94287">
48413 +<interface name="corenet_tcp_bind_whois_port" lineno="94305">
48414 <summary>
48415 Bind TCP sockets to the whois port.
48416 </summary>
48417 @@ -68945,7 +69029,7 @@ Domain allowed access.
48418 </param>
48419 <infoflow type="none"/>
48420 </interface>
48421 -<interface name="corenet_udp_bind_whois_port" lineno="94307">
48422 +<interface name="corenet_udp_bind_whois_port" lineno="94325">
48423 <summary>
48424 Bind UDP sockets to the whois port.
48425 </summary>
48426 @@ -68956,7 +69040,7 @@ Domain allowed access.
48427 </param>
48428 <infoflow type="none"/>
48429 </interface>
48430 -<interface name="corenet_tcp_connect_whois_port" lineno="94326">
48431 +<interface name="corenet_tcp_connect_whois_port" lineno="94344">
48432 <summary>
48433 Make a TCP connection to the whois port.
48434 </summary>
48435 @@ -68966,7 +69050,7 @@ Domain allowed access.
48436 </summary>
48437 </param>
48438 </interface>
48439 -<interface name="corenet_send_whois_client_packets" lineno="94346">
48440 +<interface name="corenet_send_whois_client_packets" lineno="94364">
48441 <summary>
48442 Send whois_client packets.
48443 </summary>
48444 @@ -68977,7 +69061,7 @@ Domain allowed access.
48445 </param>
48446 <infoflow type="write" weight="10"/>
48447 </interface>
48448 -<interface name="corenet_dontaudit_send_whois_client_packets" lineno="94365">
48449 +<interface name="corenet_dontaudit_send_whois_client_packets" lineno="94383">
48450 <summary>
48451 Do not audit attempts to send whois_client packets.
48452 </summary>
48453 @@ -68988,7 +69072,7 @@ Domain to not audit.
48454 </param>
48455 <infoflow type="none"/>
48456 </interface>
48457 -<interface name="corenet_receive_whois_client_packets" lineno="94384">
48458 +<interface name="corenet_receive_whois_client_packets" lineno="94402">
48459 <summary>
48460 Receive whois_client packets.
48461 </summary>
48462 @@ -68999,7 +69083,7 @@ Domain allowed access.
48463 </param>
48464 <infoflow type="read" weight="10"/>
48465 </interface>
48466 -<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="94403">
48467 +<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="94421">
48468 <summary>
48469 Do not audit attempts to receive whois_client packets.
48470 </summary>
48471 @@ -69010,7 +69094,7 @@ Domain allowed access.
48472 </param>
48473 <infoflow type="none"/>
48474 </interface>
48475 -<interface name="corenet_sendrecv_whois_client_packets" lineno="94422">
48476 +<interface name="corenet_sendrecv_whois_client_packets" lineno="94440">
48477 <summary>
48478 Send and receive whois_client packets.
48479 </summary>
48480 @@ -69021,7 +69105,7 @@ Domain allowed access.
48481 </param>
48482 <infoflow type="both" weight="10"/>
48483 </interface>
48484 -<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="94438">
48485 +<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="94456">
48486 <summary>
48487 Do not audit attempts to send and receive whois_client packets.
48488 </summary>
48489 @@ -69032,7 +69116,7 @@ Domain to not audit.
48490 </param>
48491 <infoflow type="none"/>
48492 </interface>
48493 -<interface name="corenet_relabelto_whois_client_packets" lineno="94453">
48494 +<interface name="corenet_relabelto_whois_client_packets" lineno="94471">
48495 <summary>
48496 Relabel packets to whois_client the packet type.
48497 </summary>
48498 @@ -69042,7 +69126,7 @@ Domain allowed access.
48499 </summary>
48500 </param>
48501 </interface>
48502 -<interface name="corenet_send_whois_server_packets" lineno="94473">
48503 +<interface name="corenet_send_whois_server_packets" lineno="94491">
48504 <summary>
48505 Send whois_server packets.
48506 </summary>
48507 @@ -69053,7 +69137,7 @@ Domain allowed access.
48508 </param>
48509 <infoflow type="write" weight="10"/>
48510 </interface>
48511 -<interface name="corenet_dontaudit_send_whois_server_packets" lineno="94492">
48512 +<interface name="corenet_dontaudit_send_whois_server_packets" lineno="94510">
48513 <summary>
48514 Do not audit attempts to send whois_server packets.
48515 </summary>
48516 @@ -69064,7 +69148,7 @@ Domain to not audit.
48517 </param>
48518 <infoflow type="none"/>
48519 </interface>
48520 -<interface name="corenet_receive_whois_server_packets" lineno="94511">
48521 +<interface name="corenet_receive_whois_server_packets" lineno="94529">
48522 <summary>
48523 Receive whois_server packets.
48524 </summary>
48525 @@ -69075,7 +69159,7 @@ Domain allowed access.
48526 </param>
48527 <infoflow type="read" weight="10"/>
48528 </interface>
48529 -<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="94530">
48530 +<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="94548">
48531 <summary>
48532 Do not audit attempts to receive whois_server packets.
48533 </summary>
48534 @@ -69086,7 +69170,7 @@ Domain allowed access.
48535 </param>
48536 <infoflow type="none"/>
48537 </interface>
48538 -<interface name="corenet_sendrecv_whois_server_packets" lineno="94549">
48539 +<interface name="corenet_sendrecv_whois_server_packets" lineno="94567">
48540 <summary>
48541 Send and receive whois_server packets.
48542 </summary>
48543 @@ -69097,7 +69181,7 @@ Domain allowed access.
48544 </param>
48545 <infoflow type="both" weight="10"/>
48546 </interface>
48547 -<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="94565">
48548 +<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="94583">
48549 <summary>
48550 Do not audit attempts to send and receive whois_server packets.
48551 </summary>
48552 @@ -69108,7 +69192,7 @@ Domain to not audit.
48553 </param>
48554 <infoflow type="none"/>
48555 </interface>
48556 -<interface name="corenet_relabelto_whois_server_packets" lineno="94580">
48557 +<interface name="corenet_relabelto_whois_server_packets" lineno="94598">
48558 <summary>
48559 Relabel packets to whois_server the packet type.
48560 </summary>
48561 @@ -69118,7 +69202,7 @@ Domain allowed access.
48562 </summary>
48563 </param>
48564 </interface>
48565 -<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="94602">
48566 +<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="94620">
48567 <summary>
48568 Send and receive TCP traffic on the winshadow port.
48569 </summary>
48570 @@ -69129,7 +69213,7 @@ Domain allowed access.
48571 </param>
48572 <infoflow type="both" weight="10"/>
48573 </interface>
48574 -<interface name="corenet_udp_send_winshadow_port" lineno="94617">
48575 +<interface name="corenet_udp_send_winshadow_port" lineno="94635">
48576 <summary>
48577 Send UDP traffic on the winshadow port.
48578 </summary>
48579 @@ -69140,7 +69224,7 @@ Domain allowed access.
48580 </param>
48581 <infoflow type="write" weight="10"/>
48582 </interface>
48583 -<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="94632">
48584 +<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="94650">
48585 <summary>
48586 Do not audit attempts to send UDP traffic on the winshadow port.
48587 </summary>
48588 @@ -69151,7 +69235,7 @@ Domain to not audit.
48589 </param>
48590 <infoflow type="none"/>
48591 </interface>
48592 -<interface name="corenet_udp_receive_winshadow_port" lineno="94647">
48593 +<interface name="corenet_udp_receive_winshadow_port" lineno="94665">
48594 <summary>
48595 Receive UDP traffic on the winshadow port.
48596 </summary>
48597 @@ -69162,7 +69246,7 @@ Domain allowed access.
48598 </param>
48599 <infoflow type="read" weight="10"/>
48600 </interface>
48601 -<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="94662">
48602 +<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="94680">
48603 <summary>
48604 Do not audit attempts to receive UDP traffic on the winshadow port.
48605 </summary>
48606 @@ -69173,7 +69257,7 @@ Domain to not audit.
48607 </param>
48608 <infoflow type="none"/>
48609 </interface>
48610 -<interface name="corenet_udp_sendrecv_winshadow_port" lineno="94677">
48611 +<interface name="corenet_udp_sendrecv_winshadow_port" lineno="94695">
48612 <summary>
48613 Send and receive UDP traffic on the winshadow port.
48614 </summary>
48615 @@ -69184,7 +69268,7 @@ Domain allowed access.
48616 </param>
48617 <infoflow type="both" weight="10"/>
48618 </interface>
48619 -<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="94693">
48620 +<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="94711">
48621 <summary>
48622 Do not audit attempts to send and receive
48623 UDP traffic on the winshadow port.
48624 @@ -69196,7 +69280,7 @@ Domain to not audit.
48625 </param>
48626 <infoflow type="none"/>
48627 </interface>
48628 -<interface name="corenet_tcp_bind_winshadow_port" lineno="94708">
48629 +<interface name="corenet_tcp_bind_winshadow_port" lineno="94726">
48630 <summary>
48631 Bind TCP sockets to the winshadow port.
48632 </summary>
48633 @@ -69207,7 +69291,7 @@ Domain allowed access.
48634 </param>
48635 <infoflow type="none"/>
48636 </interface>
48637 -<interface name="corenet_udp_bind_winshadow_port" lineno="94728">
48638 +<interface name="corenet_udp_bind_winshadow_port" lineno="94746">
48639 <summary>
48640 Bind UDP sockets to the winshadow port.
48641 </summary>
48642 @@ -69218,7 +69302,7 @@ Domain allowed access.
48643 </param>
48644 <infoflow type="none"/>
48645 </interface>
48646 -<interface name="corenet_tcp_connect_winshadow_port" lineno="94747">
48647 +<interface name="corenet_tcp_connect_winshadow_port" lineno="94765">
48648 <summary>
48649 Make a TCP connection to the winshadow port.
48650 </summary>
48651 @@ -69228,7 +69312,7 @@ Domain allowed access.
48652 </summary>
48653 </param>
48654 </interface>
48655 -<interface name="corenet_send_winshadow_client_packets" lineno="94767">
48656 +<interface name="corenet_send_winshadow_client_packets" lineno="94785">
48657 <summary>
48658 Send winshadow_client packets.
48659 </summary>
48660 @@ -69239,7 +69323,7 @@ Domain allowed access.
48661 </param>
48662 <infoflow type="write" weight="10"/>
48663 </interface>
48664 -<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="94786">
48665 +<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="94804">
48666 <summary>
48667 Do not audit attempts to send winshadow_client packets.
48668 </summary>
48669 @@ -69250,7 +69334,7 @@ Domain to not audit.
48670 </param>
48671 <infoflow type="none"/>
48672 </interface>
48673 -<interface name="corenet_receive_winshadow_client_packets" lineno="94805">
48674 +<interface name="corenet_receive_winshadow_client_packets" lineno="94823">
48675 <summary>
48676 Receive winshadow_client packets.
48677 </summary>
48678 @@ -69261,7 +69345,7 @@ Domain allowed access.
48679 </param>
48680 <infoflow type="read" weight="10"/>
48681 </interface>
48682 -<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="94824">
48683 +<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="94842">
48684 <summary>
48685 Do not audit attempts to receive winshadow_client packets.
48686 </summary>
48687 @@ -69272,7 +69356,7 @@ Domain allowed access.
48688 </param>
48689 <infoflow type="none"/>
48690 </interface>
48691 -<interface name="corenet_sendrecv_winshadow_client_packets" lineno="94843">
48692 +<interface name="corenet_sendrecv_winshadow_client_packets" lineno="94861">
48693 <summary>
48694 Send and receive winshadow_client packets.
48695 </summary>
48696 @@ -69283,7 +69367,7 @@ Domain allowed access.
48697 </param>
48698 <infoflow type="both" weight="10"/>
48699 </interface>
48700 -<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="94859">
48701 +<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="94877">
48702 <summary>
48703 Do not audit attempts to send and receive winshadow_client packets.
48704 </summary>
48705 @@ -69294,7 +69378,7 @@ Domain to not audit.
48706 </param>
48707 <infoflow type="none"/>
48708 </interface>
48709 -<interface name="corenet_relabelto_winshadow_client_packets" lineno="94874">
48710 +<interface name="corenet_relabelto_winshadow_client_packets" lineno="94892">
48711 <summary>
48712 Relabel packets to winshadow_client the packet type.
48713 </summary>
48714 @@ -69304,7 +69388,7 @@ Domain allowed access.
48715 </summary>
48716 </param>
48717 </interface>
48718 -<interface name="corenet_send_winshadow_server_packets" lineno="94894">
48719 +<interface name="corenet_send_winshadow_server_packets" lineno="94912">
48720 <summary>
48721 Send winshadow_server packets.
48722 </summary>
48723 @@ -69315,7 +69399,7 @@ Domain allowed access.
48724 </param>
48725 <infoflow type="write" weight="10"/>
48726 </interface>
48727 -<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="94913">
48728 +<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="94931">
48729 <summary>
48730 Do not audit attempts to send winshadow_server packets.
48731 </summary>
48732 @@ -69326,7 +69410,7 @@ Domain to not audit.
48733 </param>
48734 <infoflow type="none"/>
48735 </interface>
48736 -<interface name="corenet_receive_winshadow_server_packets" lineno="94932">
48737 +<interface name="corenet_receive_winshadow_server_packets" lineno="94950">
48738 <summary>
48739 Receive winshadow_server packets.
48740 </summary>
48741 @@ -69337,7 +69421,7 @@ Domain allowed access.
48742 </param>
48743 <infoflow type="read" weight="10"/>
48744 </interface>
48745 -<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="94951">
48746 +<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="94969">
48747 <summary>
48748 Do not audit attempts to receive winshadow_server packets.
48749 </summary>
48750 @@ -69348,7 +69432,7 @@ Domain allowed access.
48751 </param>
48752 <infoflow type="none"/>
48753 </interface>
48754 -<interface name="corenet_sendrecv_winshadow_server_packets" lineno="94970">
48755 +<interface name="corenet_sendrecv_winshadow_server_packets" lineno="94988">
48756 <summary>
48757 Send and receive winshadow_server packets.
48758 </summary>
48759 @@ -69359,7 +69443,7 @@ Domain allowed access.
48760 </param>
48761 <infoflow type="both" weight="10"/>
48762 </interface>
48763 -<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="94986">
48764 +<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="95004">
48765 <summary>
48766 Do not audit attempts to send and receive winshadow_server packets.
48767 </summary>
48768 @@ -69370,7 +69454,7 @@ Domain to not audit.
48769 </param>
48770 <infoflow type="none"/>
48771 </interface>
48772 -<interface name="corenet_relabelto_winshadow_server_packets" lineno="95001">
48773 +<interface name="corenet_relabelto_winshadow_server_packets" lineno="95019">
48774 <summary>
48775 Relabel packets to winshadow_server the packet type.
48776 </summary>
48777 @@ -69380,7 +69464,7 @@ Domain allowed access.
48778 </summary>
48779 </param>
48780 </interface>
48781 -<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="95023">
48782 +<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="95041">
48783 <summary>
48784 Send and receive TCP traffic on the wsdapi port.
48785 </summary>
48786 @@ -69391,7 +69475,7 @@ Domain allowed access.
48787 </param>
48788 <infoflow type="both" weight="10"/>
48789 </interface>
48790 -<interface name="corenet_udp_send_wsdapi_port" lineno="95038">
48791 +<interface name="corenet_udp_send_wsdapi_port" lineno="95056">
48792 <summary>
48793 Send UDP traffic on the wsdapi port.
48794 </summary>
48795 @@ -69402,7 +69486,7 @@ Domain allowed access.
48796 </param>
48797 <infoflow type="write" weight="10"/>
48798 </interface>
48799 -<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="95053">
48800 +<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="95071">
48801 <summary>
48802 Do not audit attempts to send UDP traffic on the wsdapi port.
48803 </summary>
48804 @@ -69413,7 +69497,7 @@ Domain to not audit.
48805 </param>
48806 <infoflow type="none"/>
48807 </interface>
48808 -<interface name="corenet_udp_receive_wsdapi_port" lineno="95068">
48809 +<interface name="corenet_udp_receive_wsdapi_port" lineno="95086">
48810 <summary>
48811 Receive UDP traffic on the wsdapi port.
48812 </summary>
48813 @@ -69424,7 +69508,7 @@ Domain allowed access.
48814 </param>
48815 <infoflow type="read" weight="10"/>
48816 </interface>
48817 -<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="95083">
48818 +<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="95101">
48819 <summary>
48820 Do not audit attempts to receive UDP traffic on the wsdapi port.
48821 </summary>
48822 @@ -69435,7 +69519,7 @@ Domain to not audit.
48823 </param>
48824 <infoflow type="none"/>
48825 </interface>
48826 -<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="95098">
48827 +<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="95116">
48828 <summary>
48829 Send and receive UDP traffic on the wsdapi port.
48830 </summary>
48831 @@ -69446,7 +69530,7 @@ Domain allowed access.
48832 </param>
48833 <infoflow type="both" weight="10"/>
48834 </interface>
48835 -<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="95114">
48836 +<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="95132">
48837 <summary>
48838 Do not audit attempts to send and receive
48839 UDP traffic on the wsdapi port.
48840 @@ -69458,7 +69542,7 @@ Domain to not audit.
48841 </param>
48842 <infoflow type="none"/>
48843 </interface>
48844 -<interface name="corenet_tcp_bind_wsdapi_port" lineno="95129">
48845 +<interface name="corenet_tcp_bind_wsdapi_port" lineno="95147">
48846 <summary>
48847 Bind TCP sockets to the wsdapi port.
48848 </summary>
48849 @@ -69469,7 +69553,7 @@ Domain allowed access.
48850 </param>
48851 <infoflow type="none"/>
48852 </interface>
48853 -<interface name="corenet_udp_bind_wsdapi_port" lineno="95149">
48854 +<interface name="corenet_udp_bind_wsdapi_port" lineno="95167">
48855 <summary>
48856 Bind UDP sockets to the wsdapi port.
48857 </summary>
48858 @@ -69480,7 +69564,7 @@ Domain allowed access.
48859 </param>
48860 <infoflow type="none"/>
48861 </interface>
48862 -<interface name="corenet_tcp_connect_wsdapi_port" lineno="95168">
48863 +<interface name="corenet_tcp_connect_wsdapi_port" lineno="95186">
48864 <summary>
48865 Make a TCP connection to the wsdapi port.
48866 </summary>
48867 @@ -69490,7 +69574,7 @@ Domain allowed access.
48868 </summary>
48869 </param>
48870 </interface>
48871 -<interface name="corenet_send_wsdapi_client_packets" lineno="95188">
48872 +<interface name="corenet_send_wsdapi_client_packets" lineno="95206">
48873 <summary>
48874 Send wsdapi_client packets.
48875 </summary>
48876 @@ -69501,7 +69585,7 @@ Domain allowed access.
48877 </param>
48878 <infoflow type="write" weight="10"/>
48879 </interface>
48880 -<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="95207">
48881 +<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="95225">
48882 <summary>
48883 Do not audit attempts to send wsdapi_client packets.
48884 </summary>
48885 @@ -69512,7 +69596,7 @@ Domain to not audit.
48886 </param>
48887 <infoflow type="none"/>
48888 </interface>
48889 -<interface name="corenet_receive_wsdapi_client_packets" lineno="95226">
48890 +<interface name="corenet_receive_wsdapi_client_packets" lineno="95244">
48891 <summary>
48892 Receive wsdapi_client packets.
48893 </summary>
48894 @@ -69523,7 +69607,7 @@ Domain allowed access.
48895 </param>
48896 <infoflow type="read" weight="10"/>
48897 </interface>
48898 -<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="95245">
48899 +<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="95263">
48900 <summary>
48901 Do not audit attempts to receive wsdapi_client packets.
48902 </summary>
48903 @@ -69534,7 +69618,7 @@ Domain allowed access.
48904 </param>
48905 <infoflow type="none"/>
48906 </interface>
48907 -<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="95264">
48908 +<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="95282">
48909 <summary>
48910 Send and receive wsdapi_client packets.
48911 </summary>
48912 @@ -69545,7 +69629,7 @@ Domain allowed access.
48913 </param>
48914 <infoflow type="both" weight="10"/>
48915 </interface>
48916 -<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="95280">
48917 +<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="95298">
48918 <summary>
48919 Do not audit attempts to send and receive wsdapi_client packets.
48920 </summary>
48921 @@ -69556,7 +69640,7 @@ Domain to not audit.
48922 </param>
48923 <infoflow type="none"/>
48924 </interface>
48925 -<interface name="corenet_relabelto_wsdapi_client_packets" lineno="95295">
48926 +<interface name="corenet_relabelto_wsdapi_client_packets" lineno="95313">
48927 <summary>
48928 Relabel packets to wsdapi_client the packet type.
48929 </summary>
48930 @@ -69566,7 +69650,7 @@ Domain allowed access.
48931 </summary>
48932 </param>
48933 </interface>
48934 -<interface name="corenet_send_wsdapi_server_packets" lineno="95315">
48935 +<interface name="corenet_send_wsdapi_server_packets" lineno="95333">
48936 <summary>
48937 Send wsdapi_server packets.
48938 </summary>
48939 @@ -69577,7 +69661,7 @@ Domain allowed access.
48940 </param>
48941 <infoflow type="write" weight="10"/>
48942 </interface>
48943 -<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="95334">
48944 +<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="95352">
48945 <summary>
48946 Do not audit attempts to send wsdapi_server packets.
48947 </summary>
48948 @@ -69588,7 +69672,7 @@ Domain to not audit.
48949 </param>
48950 <infoflow type="none"/>
48951 </interface>
48952 -<interface name="corenet_receive_wsdapi_server_packets" lineno="95353">
48953 +<interface name="corenet_receive_wsdapi_server_packets" lineno="95371">
48954 <summary>
48955 Receive wsdapi_server packets.
48956 </summary>
48957 @@ -69599,7 +69683,7 @@ Domain allowed access.
48958 </param>
48959 <infoflow type="read" weight="10"/>
48960 </interface>
48961 -<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="95372">
48962 +<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="95390">
48963 <summary>
48964 Do not audit attempts to receive wsdapi_server packets.
48965 </summary>
48966 @@ -69610,7 +69694,7 @@ Domain allowed access.
48967 </param>
48968 <infoflow type="none"/>
48969 </interface>
48970 -<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="95391">
48971 +<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="95409">
48972 <summary>
48973 Send and receive wsdapi_server packets.
48974 </summary>
48975 @@ -69621,7 +69705,7 @@ Domain allowed access.
48976 </param>
48977 <infoflow type="both" weight="10"/>
48978 </interface>
48979 -<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="95407">
48980 +<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="95425">
48981 <summary>
48982 Do not audit attempts to send and receive wsdapi_server packets.
48983 </summary>
48984 @@ -69632,7 +69716,7 @@ Domain to not audit.
48985 </param>
48986 <infoflow type="none"/>
48987 </interface>
48988 -<interface name="corenet_relabelto_wsdapi_server_packets" lineno="95422">
48989 +<interface name="corenet_relabelto_wsdapi_server_packets" lineno="95440">
48990 <summary>
48991 Relabel packets to wsdapi_server the packet type.
48992 </summary>
48993 @@ -69642,7 +69726,7 @@ Domain allowed access.
48994 </summary>
48995 </param>
48996 </interface>
48997 -<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="95444">
48998 +<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="95462">
48999 <summary>
49000 Send and receive TCP traffic on the wsicopy port.
49001 </summary>
49002 @@ -69653,7 +69737,7 @@ Domain allowed access.
49003 </param>
49004 <infoflow type="both" weight="10"/>
49005 </interface>
49006 -<interface name="corenet_udp_send_wsicopy_port" lineno="95459">
49007 +<interface name="corenet_udp_send_wsicopy_port" lineno="95477">
49008 <summary>
49009 Send UDP traffic on the wsicopy port.
49010 </summary>
49011 @@ -69664,7 +69748,7 @@ Domain allowed access.
49012 </param>
49013 <infoflow type="write" weight="10"/>
49014 </interface>
49015 -<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="95474">
49016 +<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="95492">
49017 <summary>
49018 Do not audit attempts to send UDP traffic on the wsicopy port.
49019 </summary>
49020 @@ -69675,7 +69759,7 @@ Domain to not audit.
49021 </param>
49022 <infoflow type="none"/>
49023 </interface>
49024 -<interface name="corenet_udp_receive_wsicopy_port" lineno="95489">
49025 +<interface name="corenet_udp_receive_wsicopy_port" lineno="95507">
49026 <summary>
49027 Receive UDP traffic on the wsicopy port.
49028 </summary>
49029 @@ -69686,7 +69770,7 @@ Domain allowed access.
49030 </param>
49031 <infoflow type="read" weight="10"/>
49032 </interface>
49033 -<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="95504">
49034 +<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="95522">
49035 <summary>
49036 Do not audit attempts to receive UDP traffic on the wsicopy port.
49037 </summary>
49038 @@ -69697,7 +69781,7 @@ Domain to not audit.
49039 </param>
49040 <infoflow type="none"/>
49041 </interface>
49042 -<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="95519">
49043 +<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="95537">
49044 <summary>
49045 Send and receive UDP traffic on the wsicopy port.
49046 </summary>
49047 @@ -69708,7 +69792,7 @@ Domain allowed access.
49048 </param>
49049 <infoflow type="both" weight="10"/>
49050 </interface>
49051 -<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="95535">
49052 +<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="95553">
49053 <summary>
49054 Do not audit attempts to send and receive
49055 UDP traffic on the wsicopy port.
49056 @@ -69720,7 +69804,7 @@ Domain to not audit.
49057 </param>
49058 <infoflow type="none"/>
49059 </interface>
49060 -<interface name="corenet_tcp_bind_wsicopy_port" lineno="95550">
49061 +<interface name="corenet_tcp_bind_wsicopy_port" lineno="95568">
49062 <summary>
49063 Bind TCP sockets to the wsicopy port.
49064 </summary>
49065 @@ -69731,7 +69815,7 @@ Domain allowed access.
49066 </param>
49067 <infoflow type="none"/>
49068 </interface>
49069 -<interface name="corenet_udp_bind_wsicopy_port" lineno="95570">
49070 +<interface name="corenet_udp_bind_wsicopy_port" lineno="95588">
49071 <summary>
49072 Bind UDP sockets to the wsicopy port.
49073 </summary>
49074 @@ -69742,7 +69826,7 @@ Domain allowed access.
49075 </param>
49076 <infoflow type="none"/>
49077 </interface>
49078 -<interface name="corenet_tcp_connect_wsicopy_port" lineno="95589">
49079 +<interface name="corenet_tcp_connect_wsicopy_port" lineno="95607">
49080 <summary>
49081 Make a TCP connection to the wsicopy port.
49082 </summary>
49083 @@ -69752,7 +69836,7 @@ Domain allowed access.
49084 </summary>
49085 </param>
49086 </interface>
49087 -<interface name="corenet_send_wsicopy_client_packets" lineno="95609">
49088 +<interface name="corenet_send_wsicopy_client_packets" lineno="95627">
49089 <summary>
49090 Send wsicopy_client packets.
49091 </summary>
49092 @@ -69763,7 +69847,7 @@ Domain allowed access.
49093 </param>
49094 <infoflow type="write" weight="10"/>
49095 </interface>
49096 -<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="95628">
49097 +<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="95646">
49098 <summary>
49099 Do not audit attempts to send wsicopy_client packets.
49100 </summary>
49101 @@ -69774,7 +69858,7 @@ Domain to not audit.
49102 </param>
49103 <infoflow type="none"/>
49104 </interface>
49105 -<interface name="corenet_receive_wsicopy_client_packets" lineno="95647">
49106 +<interface name="corenet_receive_wsicopy_client_packets" lineno="95665">
49107 <summary>
49108 Receive wsicopy_client packets.
49109 </summary>
49110 @@ -69785,7 +69869,7 @@ Domain allowed access.
49111 </param>
49112 <infoflow type="read" weight="10"/>
49113 </interface>
49114 -<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="95666">
49115 +<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="95684">
49116 <summary>
49117 Do not audit attempts to receive wsicopy_client packets.
49118 </summary>
49119 @@ -69796,7 +69880,7 @@ Domain allowed access.
49120 </param>
49121 <infoflow type="none"/>
49122 </interface>
49123 -<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="95685">
49124 +<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="95703">
49125 <summary>
49126 Send and receive wsicopy_client packets.
49127 </summary>
49128 @@ -69807,7 +69891,7 @@ Domain allowed access.
49129 </param>
49130 <infoflow type="both" weight="10"/>
49131 </interface>
49132 -<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="95701">
49133 +<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="95719">
49134 <summary>
49135 Do not audit attempts to send and receive wsicopy_client packets.
49136 </summary>
49137 @@ -69818,7 +69902,7 @@ Domain to not audit.
49138 </param>
49139 <infoflow type="none"/>
49140 </interface>
49141 -<interface name="corenet_relabelto_wsicopy_client_packets" lineno="95716">
49142 +<interface name="corenet_relabelto_wsicopy_client_packets" lineno="95734">
49143 <summary>
49144 Relabel packets to wsicopy_client the packet type.
49145 </summary>
49146 @@ -69828,7 +69912,7 @@ Domain allowed access.
49147 </summary>
49148 </param>
49149 </interface>
49150 -<interface name="corenet_send_wsicopy_server_packets" lineno="95736">
49151 +<interface name="corenet_send_wsicopy_server_packets" lineno="95754">
49152 <summary>
49153 Send wsicopy_server packets.
49154 </summary>
49155 @@ -69839,7 +69923,7 @@ Domain allowed access.
49156 </param>
49157 <infoflow type="write" weight="10"/>
49158 </interface>
49159 -<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="95755">
49160 +<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="95773">
49161 <summary>
49162 Do not audit attempts to send wsicopy_server packets.
49163 </summary>
49164 @@ -69850,7 +69934,7 @@ Domain to not audit.
49165 </param>
49166 <infoflow type="none"/>
49167 </interface>
49168 -<interface name="corenet_receive_wsicopy_server_packets" lineno="95774">
49169 +<interface name="corenet_receive_wsicopy_server_packets" lineno="95792">
49170 <summary>
49171 Receive wsicopy_server packets.
49172 </summary>
49173 @@ -69861,7 +69945,7 @@ Domain allowed access.
49174 </param>
49175 <infoflow type="read" weight="10"/>
49176 </interface>
49177 -<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="95793">
49178 +<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="95811">
49179 <summary>
49180 Do not audit attempts to receive wsicopy_server packets.
49181 </summary>
49182 @@ -69872,7 +69956,7 @@ Domain allowed access.
49183 </param>
49184 <infoflow type="none"/>
49185 </interface>
49186 -<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="95812">
49187 +<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="95830">
49188 <summary>
49189 Send and receive wsicopy_server packets.
49190 </summary>
49191 @@ -69883,7 +69967,7 @@ Domain allowed access.
49192 </param>
49193 <infoflow type="both" weight="10"/>
49194 </interface>
49195 -<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="95828">
49196 +<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="95846">
49197 <summary>
49198 Do not audit attempts to send and receive wsicopy_server packets.
49199 </summary>
49200 @@ -69894,7 +69978,7 @@ Domain to not audit.
49201 </param>
49202 <infoflow type="none"/>
49203 </interface>
49204 -<interface name="corenet_relabelto_wsicopy_server_packets" lineno="95843">
49205 +<interface name="corenet_relabelto_wsicopy_server_packets" lineno="95861">
49206 <summary>
49207 Relabel packets to wsicopy_server the packet type.
49208 </summary>
49209 @@ -69904,7 +69988,7 @@ Domain allowed access.
49210 </summary>
49211 </param>
49212 </interface>
49213 -<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="95865">
49214 +<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="95883">
49215 <summary>
49216 Send and receive TCP traffic on the xdmcp port.
49217 </summary>
49218 @@ -69915,7 +69999,7 @@ Domain allowed access.
49219 </param>
49220 <infoflow type="both" weight="10"/>
49221 </interface>
49222 -<interface name="corenet_udp_send_xdmcp_port" lineno="95880">
49223 +<interface name="corenet_udp_send_xdmcp_port" lineno="95898">
49224 <summary>
49225 Send UDP traffic on the xdmcp port.
49226 </summary>
49227 @@ -69926,7 +70010,7 @@ Domain allowed access.
49228 </param>
49229 <infoflow type="write" weight="10"/>
49230 </interface>
49231 -<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="95895">
49232 +<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="95913">
49233 <summary>
49234 Do not audit attempts to send UDP traffic on the xdmcp port.
49235 </summary>
49236 @@ -69937,7 +70021,7 @@ Domain to not audit.
49237 </param>
49238 <infoflow type="none"/>
49239 </interface>
49240 -<interface name="corenet_udp_receive_xdmcp_port" lineno="95910">
49241 +<interface name="corenet_udp_receive_xdmcp_port" lineno="95928">
49242 <summary>
49243 Receive UDP traffic on the xdmcp port.
49244 </summary>
49245 @@ -69948,7 +70032,7 @@ Domain allowed access.
49246 </param>
49247 <infoflow type="read" weight="10"/>
49248 </interface>
49249 -<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="95925">
49250 +<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="95943">
49251 <summary>
49252 Do not audit attempts to receive UDP traffic on the xdmcp port.
49253 </summary>
49254 @@ -69959,7 +70043,7 @@ Domain to not audit.
49255 </param>
49256 <infoflow type="none"/>
49257 </interface>
49258 -<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="95940">
49259 +<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="95958">
49260 <summary>
49261 Send and receive UDP traffic on the xdmcp port.
49262 </summary>
49263 @@ -69970,7 +70054,7 @@ Domain allowed access.
49264 </param>
49265 <infoflow type="both" weight="10"/>
49266 </interface>
49267 -<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="95956">
49268 +<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="95974">
49269 <summary>
49270 Do not audit attempts to send and receive
49271 UDP traffic on the xdmcp port.
49272 @@ -69982,7 +70066,7 @@ Domain to not audit.
49273 </param>
49274 <infoflow type="none"/>
49275 </interface>
49276 -<interface name="corenet_tcp_bind_xdmcp_port" lineno="95971">
49277 +<interface name="corenet_tcp_bind_xdmcp_port" lineno="95989">
49278 <summary>
49279 Bind TCP sockets to the xdmcp port.
49280 </summary>
49281 @@ -69993,7 +70077,7 @@ Domain allowed access.
49282 </param>
49283 <infoflow type="none"/>
49284 </interface>
49285 -<interface name="corenet_udp_bind_xdmcp_port" lineno="95991">
49286 +<interface name="corenet_udp_bind_xdmcp_port" lineno="96009">
49287 <summary>
49288 Bind UDP sockets to the xdmcp port.
49289 </summary>
49290 @@ -70004,7 +70088,7 @@ Domain allowed access.
49291 </param>
49292 <infoflow type="none"/>
49293 </interface>
49294 -<interface name="corenet_tcp_connect_xdmcp_port" lineno="96010">
49295 +<interface name="corenet_tcp_connect_xdmcp_port" lineno="96028">
49296 <summary>
49297 Make a TCP connection to the xdmcp port.
49298 </summary>
49299 @@ -70014,7 +70098,7 @@ Domain allowed access.
49300 </summary>
49301 </param>
49302 </interface>
49303 -<interface name="corenet_send_xdmcp_client_packets" lineno="96030">
49304 +<interface name="corenet_send_xdmcp_client_packets" lineno="96048">
49305 <summary>
49306 Send xdmcp_client packets.
49307 </summary>
49308 @@ -70025,7 +70109,7 @@ Domain allowed access.
49309 </param>
49310 <infoflow type="write" weight="10"/>
49311 </interface>
49312 -<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="96049">
49313 +<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="96067">
49314 <summary>
49315 Do not audit attempts to send xdmcp_client packets.
49316 </summary>
49317 @@ -70036,7 +70120,7 @@ Domain to not audit.
49318 </param>
49319 <infoflow type="none"/>
49320 </interface>
49321 -<interface name="corenet_receive_xdmcp_client_packets" lineno="96068">
49322 +<interface name="corenet_receive_xdmcp_client_packets" lineno="96086">
49323 <summary>
49324 Receive xdmcp_client packets.
49325 </summary>
49326 @@ -70047,7 +70131,7 @@ Domain allowed access.
49327 </param>
49328 <infoflow type="read" weight="10"/>
49329 </interface>
49330 -<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="96087">
49331 +<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="96105">
49332 <summary>
49333 Do not audit attempts to receive xdmcp_client packets.
49334 </summary>
49335 @@ -70058,7 +70142,7 @@ Domain allowed access.
49336 </param>
49337 <infoflow type="none"/>
49338 </interface>
49339 -<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="96106">
49340 +<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="96124">
49341 <summary>
49342 Send and receive xdmcp_client packets.
49343 </summary>
49344 @@ -70069,7 +70153,7 @@ Domain allowed access.
49345 </param>
49346 <infoflow type="both" weight="10"/>
49347 </interface>
49348 -<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="96122">
49349 +<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="96140">
49350 <summary>
49351 Do not audit attempts to send and receive xdmcp_client packets.
49352 </summary>
49353 @@ -70080,7 +70164,7 @@ Domain to not audit.
49354 </param>
49355 <infoflow type="none"/>
49356 </interface>
49357 -<interface name="corenet_relabelto_xdmcp_client_packets" lineno="96137">
49358 +<interface name="corenet_relabelto_xdmcp_client_packets" lineno="96155">
49359 <summary>
49360 Relabel packets to xdmcp_client the packet type.
49361 </summary>
49362 @@ -70090,7 +70174,7 @@ Domain allowed access.
49363 </summary>
49364 </param>
49365 </interface>
49366 -<interface name="corenet_send_xdmcp_server_packets" lineno="96157">
49367 +<interface name="corenet_send_xdmcp_server_packets" lineno="96175">
49368 <summary>
49369 Send xdmcp_server packets.
49370 </summary>
49371 @@ -70101,7 +70185,7 @@ Domain allowed access.
49372 </param>
49373 <infoflow type="write" weight="10"/>
49374 </interface>
49375 -<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="96176">
49376 +<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="96194">
49377 <summary>
49378 Do not audit attempts to send xdmcp_server packets.
49379 </summary>
49380 @@ -70112,7 +70196,7 @@ Domain to not audit.
49381 </param>
49382 <infoflow type="none"/>
49383 </interface>
49384 -<interface name="corenet_receive_xdmcp_server_packets" lineno="96195">
49385 +<interface name="corenet_receive_xdmcp_server_packets" lineno="96213">
49386 <summary>
49387 Receive xdmcp_server packets.
49388 </summary>
49389 @@ -70123,7 +70207,7 @@ Domain allowed access.
49390 </param>
49391 <infoflow type="read" weight="10"/>
49392 </interface>
49393 -<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="96214">
49394 +<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="96232">
49395 <summary>
49396 Do not audit attempts to receive xdmcp_server packets.
49397 </summary>
49398 @@ -70134,7 +70218,7 @@ Domain allowed access.
49399 </param>
49400 <infoflow type="none"/>
49401 </interface>
49402 -<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="96233">
49403 +<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="96251">
49404 <summary>
49405 Send and receive xdmcp_server packets.
49406 </summary>
49407 @@ -70145,7 +70229,7 @@ Domain allowed access.
49408 </param>
49409 <infoflow type="both" weight="10"/>
49410 </interface>
49411 -<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="96249">
49412 +<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="96267">
49413 <summary>
49414 Do not audit attempts to send and receive xdmcp_server packets.
49415 </summary>
49416 @@ -70156,7 +70240,7 @@ Domain to not audit.
49417 </param>
49418 <infoflow type="none"/>
49419 </interface>
49420 -<interface name="corenet_relabelto_xdmcp_server_packets" lineno="96264">
49421 +<interface name="corenet_relabelto_xdmcp_server_packets" lineno="96282">
49422 <summary>
49423 Relabel packets to xdmcp_server the packet type.
49424 </summary>
49425 @@ -70166,7 +70250,7 @@ Domain allowed access.
49426 </summary>
49427 </param>
49428 </interface>
49429 -<interface name="corenet_tcp_sendrecv_xen_port" lineno="96286">
49430 +<interface name="corenet_tcp_sendrecv_xen_port" lineno="96304">
49431 <summary>
49432 Send and receive TCP traffic on the xen port.
49433 </summary>
49434 @@ -70177,7 +70261,7 @@ Domain allowed access.
49435 </param>
49436 <infoflow type="both" weight="10"/>
49437 </interface>
49438 -<interface name="corenet_udp_send_xen_port" lineno="96301">
49439 +<interface name="corenet_udp_send_xen_port" lineno="96319">
49440 <summary>
49441 Send UDP traffic on the xen port.
49442 </summary>
49443 @@ -70188,7 +70272,7 @@ Domain allowed access.
49444 </param>
49445 <infoflow type="write" weight="10"/>
49446 </interface>
49447 -<interface name="corenet_dontaudit_udp_send_xen_port" lineno="96316">
49448 +<interface name="corenet_dontaudit_udp_send_xen_port" lineno="96334">
49449 <summary>
49450 Do not audit attempts to send UDP traffic on the xen port.
49451 </summary>
49452 @@ -70199,7 +70283,7 @@ Domain to not audit.
49453 </param>
49454 <infoflow type="none"/>
49455 </interface>
49456 -<interface name="corenet_udp_receive_xen_port" lineno="96331">
49457 +<interface name="corenet_udp_receive_xen_port" lineno="96349">
49458 <summary>
49459 Receive UDP traffic on the xen port.
49460 </summary>
49461 @@ -70210,7 +70294,7 @@ Domain allowed access.
49462 </param>
49463 <infoflow type="read" weight="10"/>
49464 </interface>
49465 -<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="96346">
49466 +<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="96364">
49467 <summary>
49468 Do not audit attempts to receive UDP traffic on the xen port.
49469 </summary>
49470 @@ -70221,7 +70305,7 @@ Domain to not audit.
49471 </param>
49472 <infoflow type="none"/>
49473 </interface>
49474 -<interface name="corenet_udp_sendrecv_xen_port" lineno="96361">
49475 +<interface name="corenet_udp_sendrecv_xen_port" lineno="96379">
49476 <summary>
49477 Send and receive UDP traffic on the xen port.
49478 </summary>
49479 @@ -70232,7 +70316,7 @@ Domain allowed access.
49480 </param>
49481 <infoflow type="both" weight="10"/>
49482 </interface>
49483 -<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="96377">
49484 +<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="96395">
49485 <summary>
49486 Do not audit attempts to send and receive
49487 UDP traffic on the xen port.
49488 @@ -70244,7 +70328,7 @@ Domain to not audit.
49489 </param>
49490 <infoflow type="none"/>
49491 </interface>
49492 -<interface name="corenet_tcp_bind_xen_port" lineno="96392">
49493 +<interface name="corenet_tcp_bind_xen_port" lineno="96410">
49494 <summary>
49495 Bind TCP sockets to the xen port.
49496 </summary>
49497 @@ -70255,7 +70339,7 @@ Domain allowed access.
49498 </param>
49499 <infoflow type="none"/>
49500 </interface>
49501 -<interface name="corenet_udp_bind_xen_port" lineno="96412">
49502 +<interface name="corenet_udp_bind_xen_port" lineno="96430">
49503 <summary>
49504 Bind UDP sockets to the xen port.
49505 </summary>
49506 @@ -70266,7 +70350,7 @@ Domain allowed access.
49507 </param>
49508 <infoflow type="none"/>
49509 </interface>
49510 -<interface name="corenet_tcp_connect_xen_port" lineno="96431">
49511 +<interface name="corenet_tcp_connect_xen_port" lineno="96449">
49512 <summary>
49513 Make a TCP connection to the xen port.
49514 </summary>
49515 @@ -70276,7 +70360,7 @@ Domain allowed access.
49516 </summary>
49517 </param>
49518 </interface>
49519 -<interface name="corenet_send_xen_client_packets" lineno="96451">
49520 +<interface name="corenet_send_xen_client_packets" lineno="96469">
49521 <summary>
49522 Send xen_client packets.
49523 </summary>
49524 @@ -70287,7 +70371,7 @@ Domain allowed access.
49525 </param>
49526 <infoflow type="write" weight="10"/>
49527 </interface>
49528 -<interface name="corenet_dontaudit_send_xen_client_packets" lineno="96470">
49529 +<interface name="corenet_dontaudit_send_xen_client_packets" lineno="96488">
49530 <summary>
49531 Do not audit attempts to send xen_client packets.
49532 </summary>
49533 @@ -70298,7 +70382,7 @@ Domain to not audit.
49534 </param>
49535 <infoflow type="none"/>
49536 </interface>
49537 -<interface name="corenet_receive_xen_client_packets" lineno="96489">
49538 +<interface name="corenet_receive_xen_client_packets" lineno="96507">
49539 <summary>
49540 Receive xen_client packets.
49541 </summary>
49542 @@ -70309,7 +70393,7 @@ Domain allowed access.
49543 </param>
49544 <infoflow type="read" weight="10"/>
49545 </interface>
49546 -<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="96508">
49547 +<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="96526">
49548 <summary>
49549 Do not audit attempts to receive xen_client packets.
49550 </summary>
49551 @@ -70320,7 +70404,7 @@ Domain allowed access.
49552 </param>
49553 <infoflow type="none"/>
49554 </interface>
49555 -<interface name="corenet_sendrecv_xen_client_packets" lineno="96527">
49556 +<interface name="corenet_sendrecv_xen_client_packets" lineno="96545">
49557 <summary>
49558 Send and receive xen_client packets.
49559 </summary>
49560 @@ -70331,7 +70415,7 @@ Domain allowed access.
49561 </param>
49562 <infoflow type="both" weight="10"/>
49563 </interface>
49564 -<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="96543">
49565 +<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="96561">
49566 <summary>
49567 Do not audit attempts to send and receive xen_client packets.
49568 </summary>
49569 @@ -70342,7 +70426,7 @@ Domain to not audit.
49570 </param>
49571 <infoflow type="none"/>
49572 </interface>
49573 -<interface name="corenet_relabelto_xen_client_packets" lineno="96558">
49574 +<interface name="corenet_relabelto_xen_client_packets" lineno="96576">
49575 <summary>
49576 Relabel packets to xen_client the packet type.
49577 </summary>
49578 @@ -70352,7 +70436,7 @@ Domain allowed access.
49579 </summary>
49580 </param>
49581 </interface>
49582 -<interface name="corenet_send_xen_server_packets" lineno="96578">
49583 +<interface name="corenet_send_xen_server_packets" lineno="96596">
49584 <summary>
49585 Send xen_server packets.
49586 </summary>
49587 @@ -70363,7 +70447,7 @@ Domain allowed access.
49588 </param>
49589 <infoflow type="write" weight="10"/>
49590 </interface>
49591 -<interface name="corenet_dontaudit_send_xen_server_packets" lineno="96597">
49592 +<interface name="corenet_dontaudit_send_xen_server_packets" lineno="96615">
49593 <summary>
49594 Do not audit attempts to send xen_server packets.
49595 </summary>
49596 @@ -70374,7 +70458,7 @@ Domain to not audit.
49597 </param>
49598 <infoflow type="none"/>
49599 </interface>
49600 -<interface name="corenet_receive_xen_server_packets" lineno="96616">
49601 +<interface name="corenet_receive_xen_server_packets" lineno="96634">
49602 <summary>
49603 Receive xen_server packets.
49604 </summary>
49605 @@ -70385,7 +70469,7 @@ Domain allowed access.
49606 </param>
49607 <infoflow type="read" weight="10"/>
49608 </interface>
49609 -<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="96635">
49610 +<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="96653">
49611 <summary>
49612 Do not audit attempts to receive xen_server packets.
49613 </summary>
49614 @@ -70396,7 +70480,7 @@ Domain allowed access.
49615 </param>
49616 <infoflow type="none"/>
49617 </interface>
49618 -<interface name="corenet_sendrecv_xen_server_packets" lineno="96654">
49619 +<interface name="corenet_sendrecv_xen_server_packets" lineno="96672">
49620 <summary>
49621 Send and receive xen_server packets.
49622 </summary>
49623 @@ -70407,7 +70491,7 @@ Domain allowed access.
49624 </param>
49625 <infoflow type="both" weight="10"/>
49626 </interface>
49627 -<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="96670">
49628 +<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="96688">
49629 <summary>
49630 Do not audit attempts to send and receive xen_server packets.
49631 </summary>
49632 @@ -70418,7 +70502,7 @@ Domain to not audit.
49633 </param>
49634 <infoflow type="none"/>
49635 </interface>
49636 -<interface name="corenet_relabelto_xen_server_packets" lineno="96685">
49637 +<interface name="corenet_relabelto_xen_server_packets" lineno="96703">
49638 <summary>
49639 Relabel packets to xen_server the packet type.
49640 </summary>
49641 @@ -70428,7 +70512,7 @@ Domain allowed access.
49642 </summary>
49643 </param>
49644 </interface>
49645 -<interface name="corenet_tcp_sendrecv_xfs_port" lineno="96707">
49646 +<interface name="corenet_tcp_sendrecv_xfs_port" lineno="96725">
49647 <summary>
49648 Send and receive TCP traffic on the xfs port.
49649 </summary>
49650 @@ -70439,7 +70523,7 @@ Domain allowed access.
49651 </param>
49652 <infoflow type="both" weight="10"/>
49653 </interface>
49654 -<interface name="corenet_udp_send_xfs_port" lineno="96722">
49655 +<interface name="corenet_udp_send_xfs_port" lineno="96740">
49656 <summary>
49657 Send UDP traffic on the xfs port.
49658 </summary>
49659 @@ -70450,7 +70534,7 @@ Domain allowed access.
49660 </param>
49661 <infoflow type="write" weight="10"/>
49662 </interface>
49663 -<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="96737">
49664 +<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="96755">
49665 <summary>
49666 Do not audit attempts to send UDP traffic on the xfs port.
49667 </summary>
49668 @@ -70461,7 +70545,7 @@ Domain to not audit.
49669 </param>
49670 <infoflow type="none"/>
49671 </interface>
49672 -<interface name="corenet_udp_receive_xfs_port" lineno="96752">
49673 +<interface name="corenet_udp_receive_xfs_port" lineno="96770">
49674 <summary>
49675 Receive UDP traffic on the xfs port.
49676 </summary>
49677 @@ -70472,7 +70556,7 @@ Domain allowed access.
49678 </param>
49679 <infoflow type="read" weight="10"/>
49680 </interface>
49681 -<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="96767">
49682 +<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="96785">
49683 <summary>
49684 Do not audit attempts to receive UDP traffic on the xfs port.
49685 </summary>
49686 @@ -70483,7 +70567,7 @@ Domain to not audit.
49687 </param>
49688 <infoflow type="none"/>
49689 </interface>
49690 -<interface name="corenet_udp_sendrecv_xfs_port" lineno="96782">
49691 +<interface name="corenet_udp_sendrecv_xfs_port" lineno="96800">
49692 <summary>
49693 Send and receive UDP traffic on the xfs port.
49694 </summary>
49695 @@ -70494,7 +70578,7 @@ Domain allowed access.
49696 </param>
49697 <infoflow type="both" weight="10"/>
49698 </interface>
49699 -<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="96798">
49700 +<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="96816">
49701 <summary>
49702 Do not audit attempts to send and receive
49703 UDP traffic on the xfs port.
49704 @@ -70506,7 +70590,7 @@ Domain to not audit.
49705 </param>
49706 <infoflow type="none"/>
49707 </interface>
49708 -<interface name="corenet_tcp_bind_xfs_port" lineno="96813">
49709 +<interface name="corenet_tcp_bind_xfs_port" lineno="96831">
49710 <summary>
49711 Bind TCP sockets to the xfs port.
49712 </summary>
49713 @@ -70517,7 +70601,7 @@ Domain allowed access.
49714 </param>
49715 <infoflow type="none"/>
49716 </interface>
49717 -<interface name="corenet_udp_bind_xfs_port" lineno="96833">
49718 +<interface name="corenet_udp_bind_xfs_port" lineno="96851">
49719 <summary>
49720 Bind UDP sockets to the xfs port.
49721 </summary>
49722 @@ -70528,7 +70612,7 @@ Domain allowed access.
49723 </param>
49724 <infoflow type="none"/>
49725 </interface>
49726 -<interface name="corenet_tcp_connect_xfs_port" lineno="96852">
49727 +<interface name="corenet_tcp_connect_xfs_port" lineno="96870">
49728 <summary>
49729 Make a TCP connection to the xfs port.
49730 </summary>
49731 @@ -70538,7 +70622,7 @@ Domain allowed access.
49732 </summary>
49733 </param>
49734 </interface>
49735 -<interface name="corenet_send_xfs_client_packets" lineno="96872">
49736 +<interface name="corenet_send_xfs_client_packets" lineno="96890">
49737 <summary>
49738 Send xfs_client packets.
49739 </summary>
49740 @@ -70549,7 +70633,7 @@ Domain allowed access.
49741 </param>
49742 <infoflow type="write" weight="10"/>
49743 </interface>
49744 -<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="96891">
49745 +<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="96909">
49746 <summary>
49747 Do not audit attempts to send xfs_client packets.
49748 </summary>
49749 @@ -70560,7 +70644,7 @@ Domain to not audit.
49750 </param>
49751 <infoflow type="none"/>
49752 </interface>
49753 -<interface name="corenet_receive_xfs_client_packets" lineno="96910">
49754 +<interface name="corenet_receive_xfs_client_packets" lineno="96928">
49755 <summary>
49756 Receive xfs_client packets.
49757 </summary>
49758 @@ -70571,7 +70655,7 @@ Domain allowed access.
49759 </param>
49760 <infoflow type="read" weight="10"/>
49761 </interface>
49762 -<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="96929">
49763 +<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="96947">
49764 <summary>
49765 Do not audit attempts to receive xfs_client packets.
49766 </summary>
49767 @@ -70582,7 +70666,7 @@ Domain allowed access.
49768 </param>
49769 <infoflow type="none"/>
49770 </interface>
49771 -<interface name="corenet_sendrecv_xfs_client_packets" lineno="96948">
49772 +<interface name="corenet_sendrecv_xfs_client_packets" lineno="96966">
49773 <summary>
49774 Send and receive xfs_client packets.
49775 </summary>
49776 @@ -70593,7 +70677,7 @@ Domain allowed access.
49777 </param>
49778 <infoflow type="both" weight="10"/>
49779 </interface>
49780 -<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="96964">
49781 +<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="96982">
49782 <summary>
49783 Do not audit attempts to send and receive xfs_client packets.
49784 </summary>
49785 @@ -70604,7 +70688,7 @@ Domain to not audit.
49786 </param>
49787 <infoflow type="none"/>
49788 </interface>
49789 -<interface name="corenet_relabelto_xfs_client_packets" lineno="96979">
49790 +<interface name="corenet_relabelto_xfs_client_packets" lineno="96997">
49791 <summary>
49792 Relabel packets to xfs_client the packet type.
49793 </summary>
49794 @@ -70614,7 +70698,7 @@ Domain allowed access.
49795 </summary>
49796 </param>
49797 </interface>
49798 -<interface name="corenet_send_xfs_server_packets" lineno="96999">
49799 +<interface name="corenet_send_xfs_server_packets" lineno="97017">
49800 <summary>
49801 Send xfs_server packets.
49802 </summary>
49803 @@ -70625,7 +70709,7 @@ Domain allowed access.
49804 </param>
49805 <infoflow type="write" weight="10"/>
49806 </interface>
49807 -<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="97018">
49808 +<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="97036">
49809 <summary>
49810 Do not audit attempts to send xfs_server packets.
49811 </summary>
49812 @@ -70636,7 +70720,7 @@ Domain to not audit.
49813 </param>
49814 <infoflow type="none"/>
49815 </interface>
49816 -<interface name="corenet_receive_xfs_server_packets" lineno="97037">
49817 +<interface name="corenet_receive_xfs_server_packets" lineno="97055">
49818 <summary>
49819 Receive xfs_server packets.
49820 </summary>
49821 @@ -70647,7 +70731,7 @@ Domain allowed access.
49822 </param>
49823 <infoflow type="read" weight="10"/>
49824 </interface>
49825 -<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="97056">
49826 +<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="97074">
49827 <summary>
49828 Do not audit attempts to receive xfs_server packets.
49829 </summary>
49830 @@ -70658,7 +70742,7 @@ Domain allowed access.
49831 </param>
49832 <infoflow type="none"/>
49833 </interface>
49834 -<interface name="corenet_sendrecv_xfs_server_packets" lineno="97075">
49835 +<interface name="corenet_sendrecv_xfs_server_packets" lineno="97093">
49836 <summary>
49837 Send and receive xfs_server packets.
49838 </summary>
49839 @@ -70669,7 +70753,7 @@ Domain allowed access.
49840 </param>
49841 <infoflow type="both" weight="10"/>
49842 </interface>
49843 -<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="97091">
49844 +<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="97109">
49845 <summary>
49846 Do not audit attempts to send and receive xfs_server packets.
49847 </summary>
49848 @@ -70680,7 +70764,7 @@ Domain to not audit.
49849 </param>
49850 <infoflow type="none"/>
49851 </interface>
49852 -<interface name="corenet_relabelto_xfs_server_packets" lineno="97106">
49853 +<interface name="corenet_relabelto_xfs_server_packets" lineno="97124">
49854 <summary>
49855 Relabel packets to xfs_server the packet type.
49856 </summary>
49857 @@ -70690,7 +70774,7 @@ Domain allowed access.
49858 </summary>
49859 </param>
49860 </interface>
49861 -<interface name="corenet_tcp_sendrecv_xserver_port" lineno="97128">
49862 +<interface name="corenet_tcp_sendrecv_xserver_port" lineno="97146">
49863 <summary>
49864 Send and receive TCP traffic on the xserver port.
49865 </summary>
49866 @@ -70701,7 +70785,7 @@ Domain allowed access.
49867 </param>
49868 <infoflow type="both" weight="10"/>
49869 </interface>
49870 -<interface name="corenet_udp_send_xserver_port" lineno="97143">
49871 +<interface name="corenet_udp_send_xserver_port" lineno="97161">
49872 <summary>
49873 Send UDP traffic on the xserver port.
49874 </summary>
49875 @@ -70712,7 +70796,7 @@ Domain allowed access.
49876 </param>
49877 <infoflow type="write" weight="10"/>
49878 </interface>
49879 -<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="97158">
49880 +<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="97176">
49881 <summary>
49882 Do not audit attempts to send UDP traffic on the xserver port.
49883 </summary>
49884 @@ -70723,7 +70807,7 @@ Domain to not audit.
49885 </param>
49886 <infoflow type="none"/>
49887 </interface>
49888 -<interface name="corenet_udp_receive_xserver_port" lineno="97173">
49889 +<interface name="corenet_udp_receive_xserver_port" lineno="97191">
49890 <summary>
49891 Receive UDP traffic on the xserver port.
49892 </summary>
49893 @@ -70734,7 +70818,7 @@ Domain allowed access.
49894 </param>
49895 <infoflow type="read" weight="10"/>
49896 </interface>
49897 -<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="97188">
49898 +<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="97206">
49899 <summary>
49900 Do not audit attempts to receive UDP traffic on the xserver port.
49901 </summary>
49902 @@ -70745,7 +70829,7 @@ Domain to not audit.
49903 </param>
49904 <infoflow type="none"/>
49905 </interface>
49906 -<interface name="corenet_udp_sendrecv_xserver_port" lineno="97203">
49907 +<interface name="corenet_udp_sendrecv_xserver_port" lineno="97221">
49908 <summary>
49909 Send and receive UDP traffic on the xserver port.
49910 </summary>
49911 @@ -70756,7 +70840,7 @@ Domain allowed access.
49912 </param>
49913 <infoflow type="both" weight="10"/>
49914 </interface>
49915 -<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="97219">
49916 +<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="97237">
49917 <summary>
49918 Do not audit attempts to send and receive
49919 UDP traffic on the xserver port.
49920 @@ -70768,7 +70852,7 @@ Domain to not audit.
49921 </param>
49922 <infoflow type="none"/>
49923 </interface>
49924 -<interface name="corenet_tcp_bind_xserver_port" lineno="97234">
49925 +<interface name="corenet_tcp_bind_xserver_port" lineno="97252">
49926 <summary>
49927 Bind TCP sockets to the xserver port.
49928 </summary>
49929 @@ -70779,7 +70863,7 @@ Domain allowed access.
49930 </param>
49931 <infoflow type="none"/>
49932 </interface>
49933 -<interface name="corenet_udp_bind_xserver_port" lineno="97254">
49934 +<interface name="corenet_udp_bind_xserver_port" lineno="97272">
49935 <summary>
49936 Bind UDP sockets to the xserver port.
49937 </summary>
49938 @@ -70790,7 +70874,7 @@ Domain allowed access.
49939 </param>
49940 <infoflow type="none"/>
49941 </interface>
49942 -<interface name="corenet_tcp_connect_xserver_port" lineno="97273">
49943 +<interface name="corenet_tcp_connect_xserver_port" lineno="97291">
49944 <summary>
49945 Make a TCP connection to the xserver port.
49946 </summary>
49947 @@ -70800,7 +70884,7 @@ Domain allowed access.
49948 </summary>
49949 </param>
49950 </interface>
49951 -<interface name="corenet_send_xserver_client_packets" lineno="97293">
49952 +<interface name="corenet_send_xserver_client_packets" lineno="97311">
49953 <summary>
49954 Send xserver_client packets.
49955 </summary>
49956 @@ -70811,7 +70895,7 @@ Domain allowed access.
49957 </param>
49958 <infoflow type="write" weight="10"/>
49959 </interface>
49960 -<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="97312">
49961 +<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="97330">
49962 <summary>
49963 Do not audit attempts to send xserver_client packets.
49964 </summary>
49965 @@ -70822,7 +70906,7 @@ Domain to not audit.
49966 </param>
49967 <infoflow type="none"/>
49968 </interface>
49969 -<interface name="corenet_receive_xserver_client_packets" lineno="97331">
49970 +<interface name="corenet_receive_xserver_client_packets" lineno="97349">
49971 <summary>
49972 Receive xserver_client packets.
49973 </summary>
49974 @@ -70833,7 +70917,7 @@ Domain allowed access.
49975 </param>
49976 <infoflow type="read" weight="10"/>
49977 </interface>
49978 -<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="97350">
49979 +<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="97368">
49980 <summary>
49981 Do not audit attempts to receive xserver_client packets.
49982 </summary>
49983 @@ -70844,7 +70928,7 @@ Domain allowed access.
49984 </param>
49985 <infoflow type="none"/>
49986 </interface>
49987 -<interface name="corenet_sendrecv_xserver_client_packets" lineno="97369">
49988 +<interface name="corenet_sendrecv_xserver_client_packets" lineno="97387">
49989 <summary>
49990 Send and receive xserver_client packets.
49991 </summary>
49992 @@ -70855,7 +70939,7 @@ Domain allowed access.
49993 </param>
49994 <infoflow type="both" weight="10"/>
49995 </interface>
49996 -<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="97385">
49997 +<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="97403">
49998 <summary>
49999 Do not audit attempts to send and receive xserver_client packets.
50000 </summary>
50001 @@ -70866,7 +70950,7 @@ Domain to not audit.
50002 </param>
50003 <infoflow type="none"/>
50004 </interface>
50005 -<interface name="corenet_relabelto_xserver_client_packets" lineno="97400">
50006 +<interface name="corenet_relabelto_xserver_client_packets" lineno="97418">
50007 <summary>
50008 Relabel packets to xserver_client the packet type.
50009 </summary>
50010 @@ -70876,7 +70960,7 @@ Domain allowed access.
50011 </summary>
50012 </param>
50013 </interface>
50014 -<interface name="corenet_send_xserver_server_packets" lineno="97420">
50015 +<interface name="corenet_send_xserver_server_packets" lineno="97438">
50016 <summary>
50017 Send xserver_server packets.
50018 </summary>
50019 @@ -70887,7 +70971,7 @@ Domain allowed access.
50020 </param>
50021 <infoflow type="write" weight="10"/>
50022 </interface>
50023 -<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="97439">
50024 +<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="97457">
50025 <summary>
50026 Do not audit attempts to send xserver_server packets.
50027 </summary>
50028 @@ -70898,7 +70982,7 @@ Domain to not audit.
50029 </param>
50030 <infoflow type="none"/>
50031 </interface>
50032 -<interface name="corenet_receive_xserver_server_packets" lineno="97458">
50033 +<interface name="corenet_receive_xserver_server_packets" lineno="97476">
50034 <summary>
50035 Receive xserver_server packets.
50036 </summary>
50037 @@ -70909,7 +70993,7 @@ Domain allowed access.
50038 </param>
50039 <infoflow type="read" weight="10"/>
50040 </interface>
50041 -<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="97477">
50042 +<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="97495">
50043 <summary>
50044 Do not audit attempts to receive xserver_server packets.
50045 </summary>
50046 @@ -70920,7 +71004,7 @@ Domain allowed access.
50047 </param>
50048 <infoflow type="none"/>
50049 </interface>
50050 -<interface name="corenet_sendrecv_xserver_server_packets" lineno="97496">
50051 +<interface name="corenet_sendrecv_xserver_server_packets" lineno="97514">
50052 <summary>
50053 Send and receive xserver_server packets.
50054 </summary>
50055 @@ -70931,7 +71015,7 @@ Domain allowed access.
50056 </param>
50057 <infoflow type="both" weight="10"/>
50058 </interface>
50059 -<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="97512">
50060 +<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="97530">
50061 <summary>
50062 Do not audit attempts to send and receive xserver_server packets.
50063 </summary>
50064 @@ -70942,7 +71026,7 @@ Domain to not audit.
50065 </param>
50066 <infoflow type="none"/>
50067 </interface>
50068 -<interface name="corenet_relabelto_xserver_server_packets" lineno="97527">
50069 +<interface name="corenet_relabelto_xserver_server_packets" lineno="97545">
50070 <summary>
50071 Relabel packets to xserver_server the packet type.
50072 </summary>
50073 @@ -70952,7 +71036,7 @@ Domain allowed access.
50074 </summary>
50075 </param>
50076 </interface>
50077 -<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="97549">
50078 +<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="97567">
50079 <summary>
50080 Send and receive TCP traffic on the zarafa port.
50081 </summary>
50082 @@ -70963,7 +71047,7 @@ Domain allowed access.
50083 </param>
50084 <infoflow type="both" weight="10"/>
50085 </interface>
50086 -<interface name="corenet_udp_send_zarafa_port" lineno="97564">
50087 +<interface name="corenet_udp_send_zarafa_port" lineno="97582">
50088 <summary>
50089 Send UDP traffic on the zarafa port.
50090 </summary>
50091 @@ -70974,7 +71058,7 @@ Domain allowed access.
50092 </param>
50093 <infoflow type="write" weight="10"/>
50094 </interface>
50095 -<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="97579">
50096 +<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="97597">
50097 <summary>
50098 Do not audit attempts to send UDP traffic on the zarafa port.
50099 </summary>
50100 @@ -70985,7 +71069,7 @@ Domain to not audit.
50101 </param>
50102 <infoflow type="none"/>
50103 </interface>
50104 -<interface name="corenet_udp_receive_zarafa_port" lineno="97594">
50105 +<interface name="corenet_udp_receive_zarafa_port" lineno="97612">
50106 <summary>
50107 Receive UDP traffic on the zarafa port.
50108 </summary>
50109 @@ -70996,7 +71080,7 @@ Domain allowed access.
50110 </param>
50111 <infoflow type="read" weight="10"/>
50112 </interface>
50113 -<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="97609">
50114 +<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="97627">
50115 <summary>
50116 Do not audit attempts to receive UDP traffic on the zarafa port.
50117 </summary>
50118 @@ -71007,7 +71091,7 @@ Domain to not audit.
50119 </param>
50120 <infoflow type="none"/>
50121 </interface>
50122 -<interface name="corenet_udp_sendrecv_zarafa_port" lineno="97624">
50123 +<interface name="corenet_udp_sendrecv_zarafa_port" lineno="97642">
50124 <summary>
50125 Send and receive UDP traffic on the zarafa port.
50126 </summary>
50127 @@ -71018,7 +71102,7 @@ Domain allowed access.
50128 </param>
50129 <infoflow type="both" weight="10"/>
50130 </interface>
50131 -<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="97640">
50132 +<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="97658">
50133 <summary>
50134 Do not audit attempts to send and receive
50135 UDP traffic on the zarafa port.
50136 @@ -71030,7 +71114,7 @@ Domain to not audit.
50137 </param>
50138 <infoflow type="none"/>
50139 </interface>
50140 -<interface name="corenet_tcp_bind_zarafa_port" lineno="97655">
50141 +<interface name="corenet_tcp_bind_zarafa_port" lineno="97673">
50142 <summary>
50143 Bind TCP sockets to the zarafa port.
50144 </summary>
50145 @@ -71041,7 +71125,7 @@ Domain allowed access.
50146 </param>
50147 <infoflow type="none"/>
50148 </interface>
50149 -<interface name="corenet_udp_bind_zarafa_port" lineno="97675">
50150 +<interface name="corenet_udp_bind_zarafa_port" lineno="97693">
50151 <summary>
50152 Bind UDP sockets to the zarafa port.
50153 </summary>
50154 @@ -71052,7 +71136,7 @@ Domain allowed access.
50155 </param>
50156 <infoflow type="none"/>
50157 </interface>
50158 -<interface name="corenet_tcp_connect_zarafa_port" lineno="97694">
50159 +<interface name="corenet_tcp_connect_zarafa_port" lineno="97712">
50160 <summary>
50161 Make a TCP connection to the zarafa port.
50162 </summary>
50163 @@ -71062,7 +71146,7 @@ Domain allowed access.
50164 </summary>
50165 </param>
50166 </interface>
50167 -<interface name="corenet_send_zarafa_client_packets" lineno="97714">
50168 +<interface name="corenet_send_zarafa_client_packets" lineno="97732">
50169 <summary>
50170 Send zarafa_client packets.
50171 </summary>
50172 @@ -71073,7 +71157,7 @@ Domain allowed access.
50173 </param>
50174 <infoflow type="write" weight="10"/>
50175 </interface>
50176 -<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="97733">
50177 +<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="97751">
50178 <summary>
50179 Do not audit attempts to send zarafa_client packets.
50180 </summary>
50181 @@ -71084,7 +71168,7 @@ Domain to not audit.
50182 </param>
50183 <infoflow type="none"/>
50184 </interface>
50185 -<interface name="corenet_receive_zarafa_client_packets" lineno="97752">
50186 +<interface name="corenet_receive_zarafa_client_packets" lineno="97770">
50187 <summary>
50188 Receive zarafa_client packets.
50189 </summary>
50190 @@ -71095,7 +71179,7 @@ Domain allowed access.
50191 </param>
50192 <infoflow type="read" weight="10"/>
50193 </interface>
50194 -<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="97771">
50195 +<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="97789">
50196 <summary>
50197 Do not audit attempts to receive zarafa_client packets.
50198 </summary>
50199 @@ -71106,7 +71190,7 @@ Domain allowed access.
50200 </param>
50201 <infoflow type="none"/>
50202 </interface>
50203 -<interface name="corenet_sendrecv_zarafa_client_packets" lineno="97790">
50204 +<interface name="corenet_sendrecv_zarafa_client_packets" lineno="97808">
50205 <summary>
50206 Send and receive zarafa_client packets.
50207 </summary>
50208 @@ -71117,7 +71201,7 @@ Domain allowed access.
50209 </param>
50210 <infoflow type="both" weight="10"/>
50211 </interface>
50212 -<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="97806">
50213 +<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="97824">
50214 <summary>
50215 Do not audit attempts to send and receive zarafa_client packets.
50216 </summary>
50217 @@ -71128,7 +71212,7 @@ Domain to not audit.
50218 </param>
50219 <infoflow type="none"/>
50220 </interface>
50221 -<interface name="corenet_relabelto_zarafa_client_packets" lineno="97821">
50222 +<interface name="corenet_relabelto_zarafa_client_packets" lineno="97839">
50223 <summary>
50224 Relabel packets to zarafa_client the packet type.
50225 </summary>
50226 @@ -71138,7 +71222,7 @@ Domain allowed access.
50227 </summary>
50228 </param>
50229 </interface>
50230 -<interface name="corenet_send_zarafa_server_packets" lineno="97841">
50231 +<interface name="corenet_send_zarafa_server_packets" lineno="97859">
50232 <summary>
50233 Send zarafa_server packets.
50234 </summary>
50235 @@ -71149,7 +71233,7 @@ Domain allowed access.
50236 </param>
50237 <infoflow type="write" weight="10"/>
50238 </interface>
50239 -<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="97860">
50240 +<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="97878">
50241 <summary>
50242 Do not audit attempts to send zarafa_server packets.
50243 </summary>
50244 @@ -71160,7 +71244,7 @@ Domain to not audit.
50245 </param>
50246 <infoflow type="none"/>
50247 </interface>
50248 -<interface name="corenet_receive_zarafa_server_packets" lineno="97879">
50249 +<interface name="corenet_receive_zarafa_server_packets" lineno="97897">
50250 <summary>
50251 Receive zarafa_server packets.
50252 </summary>
50253 @@ -71171,7 +71255,7 @@ Domain allowed access.
50254 </param>
50255 <infoflow type="read" weight="10"/>
50256 </interface>
50257 -<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="97898">
50258 +<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="97916">
50259 <summary>
50260 Do not audit attempts to receive zarafa_server packets.
50261 </summary>
50262 @@ -71182,7 +71266,7 @@ Domain allowed access.
50263 </param>
50264 <infoflow type="none"/>
50265 </interface>
50266 -<interface name="corenet_sendrecv_zarafa_server_packets" lineno="97917">
50267 +<interface name="corenet_sendrecv_zarafa_server_packets" lineno="97935">
50268 <summary>
50269 Send and receive zarafa_server packets.
50270 </summary>
50271 @@ -71193,7 +71277,7 @@ Domain allowed access.
50272 </param>
50273 <infoflow type="both" weight="10"/>
50274 </interface>
50275 -<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="97933">
50276 +<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="97951">
50277 <summary>
50278 Do not audit attempts to send and receive zarafa_server packets.
50279 </summary>
50280 @@ -71204,7 +71288,7 @@ Domain to not audit.
50281 </param>
50282 <infoflow type="none"/>
50283 </interface>
50284 -<interface name="corenet_relabelto_zarafa_server_packets" lineno="97948">
50285 +<interface name="corenet_relabelto_zarafa_server_packets" lineno="97966">
50286 <summary>
50287 Relabel packets to zarafa_server the packet type.
50288 </summary>
50289 @@ -71214,7 +71298,7 @@ Domain allowed access.
50290 </summary>
50291 </param>
50292 </interface>
50293 -<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="97970">
50294 +<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="97988">
50295 <summary>
50296 Send and receive TCP traffic on the zabbix port.
50297 </summary>
50298 @@ -71225,7 +71309,7 @@ Domain allowed access.
50299 </param>
50300 <infoflow type="both" weight="10"/>
50301 </interface>
50302 -<interface name="corenet_udp_send_zabbix_port" lineno="97985">
50303 +<interface name="corenet_udp_send_zabbix_port" lineno="98003">
50304 <summary>
50305 Send UDP traffic on the zabbix port.
50306 </summary>
50307 @@ -71236,7 +71320,7 @@ Domain allowed access.
50308 </param>
50309 <infoflow type="write" weight="10"/>
50310 </interface>
50311 -<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="98000">
50312 +<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="98018">
50313 <summary>
50314 Do not audit attempts to send UDP traffic on the zabbix port.
50315 </summary>
50316 @@ -71247,7 +71331,7 @@ Domain to not audit.
50317 </param>
50318 <infoflow type="none"/>
50319 </interface>
50320 -<interface name="corenet_udp_receive_zabbix_port" lineno="98015">
50321 +<interface name="corenet_udp_receive_zabbix_port" lineno="98033">
50322 <summary>
50323 Receive UDP traffic on the zabbix port.
50324 </summary>
50325 @@ -71258,7 +71342,7 @@ Domain allowed access.
50326 </param>
50327 <infoflow type="read" weight="10"/>
50328 </interface>
50329 -<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="98030">
50330 +<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="98048">
50331 <summary>
50332 Do not audit attempts to receive UDP traffic on the zabbix port.
50333 </summary>
50334 @@ -71269,7 +71353,7 @@ Domain to not audit.
50335 </param>
50336 <infoflow type="none"/>
50337 </interface>
50338 -<interface name="corenet_udp_sendrecv_zabbix_port" lineno="98045">
50339 +<interface name="corenet_udp_sendrecv_zabbix_port" lineno="98063">
50340 <summary>
50341 Send and receive UDP traffic on the zabbix port.
50342 </summary>
50343 @@ -71280,7 +71364,7 @@ Domain allowed access.
50344 </param>
50345 <infoflow type="both" weight="10"/>
50346 </interface>
50347 -<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="98061">
50348 +<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="98079">
50349 <summary>
50350 Do not audit attempts to send and receive
50351 UDP traffic on the zabbix port.
50352 @@ -71292,7 +71376,7 @@ Domain to not audit.
50353 </param>
50354 <infoflow type="none"/>
50355 </interface>
50356 -<interface name="corenet_tcp_bind_zabbix_port" lineno="98076">
50357 +<interface name="corenet_tcp_bind_zabbix_port" lineno="98094">
50358 <summary>
50359 Bind TCP sockets to the zabbix port.
50360 </summary>
50361 @@ -71303,7 +71387,7 @@ Domain allowed access.
50362 </param>
50363 <infoflow type="none"/>
50364 </interface>
50365 -<interface name="corenet_udp_bind_zabbix_port" lineno="98096">
50366 +<interface name="corenet_udp_bind_zabbix_port" lineno="98114">
50367 <summary>
50368 Bind UDP sockets to the zabbix port.
50369 </summary>
50370 @@ -71314,7 +71398,7 @@ Domain allowed access.
50371 </param>
50372 <infoflow type="none"/>
50373 </interface>
50374 -<interface name="corenet_tcp_connect_zabbix_port" lineno="98115">
50375 +<interface name="corenet_tcp_connect_zabbix_port" lineno="98133">
50376 <summary>
50377 Make a TCP connection to the zabbix port.
50378 </summary>
50379 @@ -71324,7 +71408,7 @@ Domain allowed access.
50380 </summary>
50381 </param>
50382 </interface>
50383 -<interface name="corenet_send_zabbix_client_packets" lineno="98135">
50384 +<interface name="corenet_send_zabbix_client_packets" lineno="98153">
50385 <summary>
50386 Send zabbix_client packets.
50387 </summary>
50388 @@ -71335,7 +71419,7 @@ Domain allowed access.
50389 </param>
50390 <infoflow type="write" weight="10"/>
50391 </interface>
50392 -<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="98154">
50393 +<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="98172">
50394 <summary>
50395 Do not audit attempts to send zabbix_client packets.
50396 </summary>
50397 @@ -71346,7 +71430,7 @@ Domain to not audit.
50398 </param>
50399 <infoflow type="none"/>
50400 </interface>
50401 -<interface name="corenet_receive_zabbix_client_packets" lineno="98173">
50402 +<interface name="corenet_receive_zabbix_client_packets" lineno="98191">
50403 <summary>
50404 Receive zabbix_client packets.
50405 </summary>
50406 @@ -71357,7 +71441,7 @@ Domain allowed access.
50407 </param>
50408 <infoflow type="read" weight="10"/>
50409 </interface>
50410 -<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="98192">
50411 +<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="98210">
50412 <summary>
50413 Do not audit attempts to receive zabbix_client packets.
50414 </summary>
50415 @@ -71368,7 +71452,7 @@ Domain allowed access.
50416 </param>
50417 <infoflow type="none"/>
50418 </interface>
50419 -<interface name="corenet_sendrecv_zabbix_client_packets" lineno="98211">
50420 +<interface name="corenet_sendrecv_zabbix_client_packets" lineno="98229">
50421 <summary>
50422 Send and receive zabbix_client packets.
50423 </summary>
50424 @@ -71379,7 +71463,7 @@ Domain allowed access.
50425 </param>
50426 <infoflow type="both" weight="10"/>
50427 </interface>
50428 -<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="98227">
50429 +<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="98245">
50430 <summary>
50431 Do not audit attempts to send and receive zabbix_client packets.
50432 </summary>
50433 @@ -71390,7 +71474,7 @@ Domain to not audit.
50434 </param>
50435 <infoflow type="none"/>
50436 </interface>
50437 -<interface name="corenet_relabelto_zabbix_client_packets" lineno="98242">
50438 +<interface name="corenet_relabelto_zabbix_client_packets" lineno="98260">
50439 <summary>
50440 Relabel packets to zabbix_client the packet type.
50441 </summary>
50442 @@ -71400,7 +71484,7 @@ Domain allowed access.
50443 </summary>
50444 </param>
50445 </interface>
50446 -<interface name="corenet_send_zabbix_server_packets" lineno="98262">
50447 +<interface name="corenet_send_zabbix_server_packets" lineno="98280">
50448 <summary>
50449 Send zabbix_server packets.
50450 </summary>
50451 @@ -71411,7 +71495,7 @@ Domain allowed access.
50452 </param>
50453 <infoflow type="write" weight="10"/>
50454 </interface>
50455 -<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="98281">
50456 +<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="98299">
50457 <summary>
50458 Do not audit attempts to send zabbix_server packets.
50459 </summary>
50460 @@ -71422,7 +71506,7 @@ Domain to not audit.
50461 </param>
50462 <infoflow type="none"/>
50463 </interface>
50464 -<interface name="corenet_receive_zabbix_server_packets" lineno="98300">
50465 +<interface name="corenet_receive_zabbix_server_packets" lineno="98318">
50466 <summary>
50467 Receive zabbix_server packets.
50468 </summary>
50469 @@ -71433,7 +71517,7 @@ Domain allowed access.
50470 </param>
50471 <infoflow type="read" weight="10"/>
50472 </interface>
50473 -<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="98319">
50474 +<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="98337">
50475 <summary>
50476 Do not audit attempts to receive zabbix_server packets.
50477 </summary>
50478 @@ -71444,7 +71528,7 @@ Domain allowed access.
50479 </param>
50480 <infoflow type="none"/>
50481 </interface>
50482 -<interface name="corenet_sendrecv_zabbix_server_packets" lineno="98338">
50483 +<interface name="corenet_sendrecv_zabbix_server_packets" lineno="98356">
50484 <summary>
50485 Send and receive zabbix_server packets.
50486 </summary>
50487 @@ -71455,7 +71539,7 @@ Domain allowed access.
50488 </param>
50489 <infoflow type="both" weight="10"/>
50490 </interface>
50491 -<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="98354">
50492 +<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="98372">
50493 <summary>
50494 Do not audit attempts to send and receive zabbix_server packets.
50495 </summary>
50496 @@ -71466,7 +71550,7 @@ Domain to not audit.
50497 </param>
50498 <infoflow type="none"/>
50499 </interface>
50500 -<interface name="corenet_relabelto_zabbix_server_packets" lineno="98369">
50501 +<interface name="corenet_relabelto_zabbix_server_packets" lineno="98387">
50502 <summary>
50503 Relabel packets to zabbix_server the packet type.
50504 </summary>
50505 @@ -71476,7 +71560,7 @@ Domain allowed access.
50506 </summary>
50507 </param>
50508 </interface>
50509 -<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="98391">
50510 +<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="98409">
50511 <summary>
50512 Send and receive TCP traffic on the zabbix_agent port.
50513 </summary>
50514 @@ -71487,7 +71571,7 @@ Domain allowed access.
50515 </param>
50516 <infoflow type="both" weight="10"/>
50517 </interface>
50518 -<interface name="corenet_udp_send_zabbix_agent_port" lineno="98406">
50519 +<interface name="corenet_udp_send_zabbix_agent_port" lineno="98424">
50520 <summary>
50521 Send UDP traffic on the zabbix_agent port.
50522 </summary>
50523 @@ -71498,7 +71582,7 @@ Domain allowed access.
50524 </param>
50525 <infoflow type="write" weight="10"/>
50526 </interface>
50527 -<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="98421">
50528 +<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="98439">
50529 <summary>
50530 Do not audit attempts to send UDP traffic on the zabbix_agent port.
50531 </summary>
50532 @@ -71509,7 +71593,7 @@ Domain to not audit.
50533 </param>
50534 <infoflow type="none"/>
50535 </interface>
50536 -<interface name="corenet_udp_receive_zabbix_agent_port" lineno="98436">
50537 +<interface name="corenet_udp_receive_zabbix_agent_port" lineno="98454">
50538 <summary>
50539 Receive UDP traffic on the zabbix_agent port.
50540 </summary>
50541 @@ -71520,7 +71604,7 @@ Domain allowed access.
50542 </param>
50543 <infoflow type="read" weight="10"/>
50544 </interface>
50545 -<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="98451">
50546 +<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="98469">
50547 <summary>
50548 Do not audit attempts to receive UDP traffic on the zabbix_agent port.
50549 </summary>
50550 @@ -71531,7 +71615,7 @@ Domain to not audit.
50551 </param>
50552 <infoflow type="none"/>
50553 </interface>
50554 -<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="98466">
50555 +<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="98484">
50556 <summary>
50557 Send and receive UDP traffic on the zabbix_agent port.
50558 </summary>
50559 @@ -71542,7 +71626,7 @@ Domain allowed access.
50560 </param>
50561 <infoflow type="both" weight="10"/>
50562 </interface>
50563 -<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="98482">
50564 +<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="98500">
50565 <summary>
50566 Do not audit attempts to send and receive
50567 UDP traffic on the zabbix_agent port.
50568 @@ -71554,7 +71638,7 @@ Domain to not audit.
50569 </param>
50570 <infoflow type="none"/>
50571 </interface>
50572 -<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="98497">
50573 +<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="98515">
50574 <summary>
50575 Bind TCP sockets to the zabbix_agent port.
50576 </summary>
50577 @@ -71565,7 +71649,7 @@ Domain allowed access.
50578 </param>
50579 <infoflow type="none"/>
50580 </interface>
50581 -<interface name="corenet_udp_bind_zabbix_agent_port" lineno="98517">
50582 +<interface name="corenet_udp_bind_zabbix_agent_port" lineno="98535">
50583 <summary>
50584 Bind UDP sockets to the zabbix_agent port.
50585 </summary>
50586 @@ -71576,7 +71660,7 @@ Domain allowed access.
50587 </param>
50588 <infoflow type="none"/>
50589 </interface>
50590 -<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="98536">
50591 +<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="98554">
50592 <summary>
50593 Make a TCP connection to the zabbix_agent port.
50594 </summary>
50595 @@ -71586,7 +71670,7 @@ Domain allowed access.
50596 </summary>
50597 </param>
50598 </interface>
50599 -<interface name="corenet_send_zabbix_agent_client_packets" lineno="98556">
50600 +<interface name="corenet_send_zabbix_agent_client_packets" lineno="98574">
50601 <summary>
50602 Send zabbix_agent_client packets.
50603 </summary>
50604 @@ -71597,7 +71681,7 @@ Domain allowed access.
50605 </param>
50606 <infoflow type="write" weight="10"/>
50607 </interface>
50608 -<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="98575">
50609 +<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="98593">
50610 <summary>
50611 Do not audit attempts to send zabbix_agent_client packets.
50612 </summary>
50613 @@ -71608,7 +71692,7 @@ Domain to not audit.
50614 </param>
50615 <infoflow type="none"/>
50616 </interface>
50617 -<interface name="corenet_receive_zabbix_agent_client_packets" lineno="98594">
50618 +<interface name="corenet_receive_zabbix_agent_client_packets" lineno="98612">
50619 <summary>
50620 Receive zabbix_agent_client packets.
50621 </summary>
50622 @@ -71619,7 +71703,7 @@ Domain allowed access.
50623 </param>
50624 <infoflow type="read" weight="10"/>
50625 </interface>
50626 -<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="98613">
50627 +<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="98631">
50628 <summary>
50629 Do not audit attempts to receive zabbix_agent_client packets.
50630 </summary>
50631 @@ -71630,7 +71714,7 @@ Domain allowed access.
50632 </param>
50633 <infoflow type="none"/>
50634 </interface>
50635 -<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="98632">
50636 +<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="98650">
50637 <summary>
50638 Send and receive zabbix_agent_client packets.
50639 </summary>
50640 @@ -71641,7 +71725,7 @@ Domain allowed access.
50641 </param>
50642 <infoflow type="both" weight="10"/>
50643 </interface>
50644 -<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="98648">
50645 +<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="98666">
50646 <summary>
50647 Do not audit attempts to send and receive zabbix_agent_client packets.
50648 </summary>
50649 @@ -71652,7 +71736,7 @@ Domain to not audit.
50650 </param>
50651 <infoflow type="none"/>
50652 </interface>
50653 -<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="98663">
50654 +<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="98681">
50655 <summary>
50656 Relabel packets to zabbix_agent_client the packet type.
50657 </summary>
50658 @@ -71662,7 +71746,7 @@ Domain allowed access.
50659 </summary>
50660 </param>
50661 </interface>
50662 -<interface name="corenet_send_zabbix_agent_server_packets" lineno="98683">
50663 +<interface name="corenet_send_zabbix_agent_server_packets" lineno="98701">
50664 <summary>
50665 Send zabbix_agent_server packets.
50666 </summary>
50667 @@ -71673,7 +71757,7 @@ Domain allowed access.
50668 </param>
50669 <infoflow type="write" weight="10"/>
50670 </interface>
50671 -<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="98702">
50672 +<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="98720">
50673 <summary>
50674 Do not audit attempts to send zabbix_agent_server packets.
50675 </summary>
50676 @@ -71684,7 +71768,7 @@ Domain to not audit.
50677 </param>
50678 <infoflow type="none"/>
50679 </interface>
50680 -<interface name="corenet_receive_zabbix_agent_server_packets" lineno="98721">
50681 +<interface name="corenet_receive_zabbix_agent_server_packets" lineno="98739">
50682 <summary>
50683 Receive zabbix_agent_server packets.
50684 </summary>
50685 @@ -71695,7 +71779,7 @@ Domain allowed access.
50686 </param>
50687 <infoflow type="read" weight="10"/>
50688 </interface>
50689 -<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="98740">
50690 +<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="98758">
50691 <summary>
50692 Do not audit attempts to receive zabbix_agent_server packets.
50693 </summary>
50694 @@ -71706,7 +71790,7 @@ Domain allowed access.
50695 </param>
50696 <infoflow type="none"/>
50697 </interface>
50698 -<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="98759">
50699 +<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="98777">
50700 <summary>
50701 Send and receive zabbix_agent_server packets.
50702 </summary>
50703 @@ -71717,7 +71801,7 @@ Domain allowed access.
50704 </param>
50705 <infoflow type="both" weight="10"/>
50706 </interface>
50707 -<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="98775">
50708 +<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="98793">
50709 <summary>
50710 Do not audit attempts to send and receive zabbix_agent_server packets.
50711 </summary>
50712 @@ -71728,7 +71812,7 @@ Domain to not audit.
50713 </param>
50714 <infoflow type="none"/>
50715 </interface>
50716 -<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="98790">
50717 +<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="98808">
50718 <summary>
50719 Relabel packets to zabbix_agent_server the packet type.
50720 </summary>
50721 @@ -71738,7 +71822,7 @@ Domain allowed access.
50722 </summary>
50723 </param>
50724 </interface>
50725 -<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="98812">
50726 +<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="98830">
50727 <summary>
50728 Send and receive TCP traffic on the zookeeper_client port.
50729 </summary>
50730 @@ -71749,7 +71833,7 @@ Domain allowed access.
50731 </param>
50732 <infoflow type="both" weight="10"/>
50733 </interface>
50734 -<interface name="corenet_udp_send_zookeeper_client_port" lineno="98827">
50735 +<interface name="corenet_udp_send_zookeeper_client_port" lineno="98845">
50736 <summary>
50737 Send UDP traffic on the zookeeper_client port.
50738 </summary>
50739 @@ -71760,7 +71844,7 @@ Domain allowed access.
50740 </param>
50741 <infoflow type="write" weight="10"/>
50742 </interface>
50743 -<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="98842">
50744 +<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="98860">
50745 <summary>
50746 Do not audit attempts to send UDP traffic on the zookeeper_client port.
50747 </summary>
50748 @@ -71771,7 +71855,7 @@ Domain to not audit.
50749 </param>
50750 <infoflow type="none"/>
50751 </interface>
50752 -<interface name="corenet_udp_receive_zookeeper_client_port" lineno="98857">
50753 +<interface name="corenet_udp_receive_zookeeper_client_port" lineno="98875">
50754 <summary>
50755 Receive UDP traffic on the zookeeper_client port.
50756 </summary>
50757 @@ -71782,7 +71866,7 @@ Domain allowed access.
50758 </param>
50759 <infoflow type="read" weight="10"/>
50760 </interface>
50761 -<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="98872">
50762 +<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="98890">
50763 <summary>
50764 Do not audit attempts to receive UDP traffic on the zookeeper_client port.
50765 </summary>
50766 @@ -71793,7 +71877,7 @@ Domain to not audit.
50767 </param>
50768 <infoflow type="none"/>
50769 </interface>
50770 -<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="98887">
50771 +<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="98905">
50772 <summary>
50773 Send and receive UDP traffic on the zookeeper_client port.
50774 </summary>
50775 @@ -71804,7 +71888,7 @@ Domain allowed access.
50776 </param>
50777 <infoflow type="both" weight="10"/>
50778 </interface>
50779 -<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="98903">
50780 +<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="98921">
50781 <summary>
50782 Do not audit attempts to send and receive
50783 UDP traffic on the zookeeper_client port.
50784 @@ -71816,7 +71900,7 @@ Domain to not audit.
50785 </param>
50786 <infoflow type="none"/>
50787 </interface>
50788 -<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="98918">
50789 +<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="98936">
50790 <summary>
50791 Bind TCP sockets to the zookeeper_client port.
50792 </summary>
50793 @@ -71827,7 +71911,7 @@ Domain allowed access.
50794 </param>
50795 <infoflow type="none"/>
50796 </interface>
50797 -<interface name="corenet_udp_bind_zookeeper_client_port" lineno="98938">
50798 +<interface name="corenet_udp_bind_zookeeper_client_port" lineno="98956">
50799 <summary>
50800 Bind UDP sockets to the zookeeper_client port.
50801 </summary>
50802 @@ -71838,7 +71922,7 @@ Domain allowed access.
50803 </param>
50804 <infoflow type="none"/>
50805 </interface>
50806 -<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="98957">
50807 +<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="98975">
50808 <summary>
50809 Make a TCP connection to the zookeeper_client port.
50810 </summary>
50811 @@ -71848,7 +71932,7 @@ Domain allowed access.
50812 </summary>
50813 </param>
50814 </interface>
50815 -<interface name="corenet_send_zookeeper_client_client_packets" lineno="98977">
50816 +<interface name="corenet_send_zookeeper_client_client_packets" lineno="98995">
50817 <summary>
50818 Send zookeeper_client_client packets.
50819 </summary>
50820 @@ -71859,7 +71943,7 @@ Domain allowed access.
50821 </param>
50822 <infoflow type="write" weight="10"/>
50823 </interface>
50824 -<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="98996">
50825 +<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="99014">
50826 <summary>
50827 Do not audit attempts to send zookeeper_client_client packets.
50828 </summary>
50829 @@ -71870,7 +71954,7 @@ Domain to not audit.
50830 </param>
50831 <infoflow type="none"/>
50832 </interface>
50833 -<interface name="corenet_receive_zookeeper_client_client_packets" lineno="99015">
50834 +<interface name="corenet_receive_zookeeper_client_client_packets" lineno="99033">
50835 <summary>
50836 Receive zookeeper_client_client packets.
50837 </summary>
50838 @@ -71881,7 +71965,7 @@ Domain allowed access.
50839 </param>
50840 <infoflow type="read" weight="10"/>
50841 </interface>
50842 -<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="99034">
50843 +<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="99052">
50844 <summary>
50845 Do not audit attempts to receive zookeeper_client_client packets.
50846 </summary>
50847 @@ -71892,7 +71976,7 @@ Domain allowed access.
50848 </param>
50849 <infoflow type="none"/>
50850 </interface>
50851 -<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="99053">
50852 +<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="99071">
50853 <summary>
50854 Send and receive zookeeper_client_client packets.
50855 </summary>
50856 @@ -71903,7 +71987,7 @@ Domain allowed access.
50857 </param>
50858 <infoflow type="both" weight="10"/>
50859 </interface>
50860 -<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="99069">
50861 +<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="99087">
50862 <summary>
50863 Do not audit attempts to send and receive zookeeper_client_client packets.
50864 </summary>
50865 @@ -71914,7 +71998,7 @@ Domain to not audit.
50866 </param>
50867 <infoflow type="none"/>
50868 </interface>
50869 -<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="99084">
50870 +<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="99102">
50871 <summary>
50872 Relabel packets to zookeeper_client_client the packet type.
50873 </summary>
50874 @@ -71924,7 +72008,7 @@ Domain allowed access.
50875 </summary>
50876 </param>
50877 </interface>
50878 -<interface name="corenet_send_zookeeper_client_server_packets" lineno="99104">
50879 +<interface name="corenet_send_zookeeper_client_server_packets" lineno="99122">
50880 <summary>
50881 Send zookeeper_client_server packets.
50882 </summary>
50883 @@ -71935,7 +72019,7 @@ Domain allowed access.
50884 </param>
50885 <infoflow type="write" weight="10"/>
50886 </interface>
50887 -<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="99123">
50888 +<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="99141">
50889 <summary>
50890 Do not audit attempts to send zookeeper_client_server packets.
50891 </summary>
50892 @@ -71946,7 +72030,7 @@ Domain to not audit.
50893 </param>
50894 <infoflow type="none"/>
50895 </interface>
50896 -<interface name="corenet_receive_zookeeper_client_server_packets" lineno="99142">
50897 +<interface name="corenet_receive_zookeeper_client_server_packets" lineno="99160">
50898 <summary>
50899 Receive zookeeper_client_server packets.
50900 </summary>
50901 @@ -71957,7 +72041,7 @@ Domain allowed access.
50902 </param>
50903 <infoflow type="read" weight="10"/>
50904 </interface>
50905 -<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="99161">
50906 +<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="99179">
50907 <summary>
50908 Do not audit attempts to receive zookeeper_client_server packets.
50909 </summary>
50910 @@ -71968,7 +72052,7 @@ Domain allowed access.
50911 </param>
50912 <infoflow type="none"/>
50913 </interface>
50914 -<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="99180">
50915 +<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="99198">
50916 <summary>
50917 Send and receive zookeeper_client_server packets.
50918 </summary>
50919 @@ -71979,7 +72063,7 @@ Domain allowed access.
50920 </param>
50921 <infoflow type="both" weight="10"/>
50922 </interface>
50923 -<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="99196">
50924 +<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="99214">
50925 <summary>
50926 Do not audit attempts to send and receive zookeeper_client_server packets.
50927 </summary>
50928 @@ -71990,7 +72074,7 @@ Domain to not audit.
50929 </param>
50930 <infoflow type="none"/>
50931 </interface>
50932 -<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="99211">
50933 +<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="99229">
50934 <summary>
50935 Relabel packets to zookeeper_client_server the packet type.
50936 </summary>
50937 @@ -72000,7 +72084,7 @@ Domain allowed access.
50938 </summary>
50939 </param>
50940 </interface>
50941 -<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="99233">
50942 +<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="99251">
50943 <summary>
50944 Send and receive TCP traffic on the zookeeper_election port.
50945 </summary>
50946 @@ -72011,7 +72095,7 @@ Domain allowed access.
50947 </param>
50948 <infoflow type="both" weight="10"/>
50949 </interface>
50950 -<interface name="corenet_udp_send_zookeeper_election_port" lineno="99248">
50951 +<interface name="corenet_udp_send_zookeeper_election_port" lineno="99266">
50952 <summary>
50953 Send UDP traffic on the zookeeper_election port.
50954 </summary>
50955 @@ -72022,7 +72106,7 @@ Domain allowed access.
50956 </param>
50957 <infoflow type="write" weight="10"/>
50958 </interface>
50959 -<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="99263">
50960 +<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="99281">
50961 <summary>
50962 Do not audit attempts to send UDP traffic on the zookeeper_election port.
50963 </summary>
50964 @@ -72033,7 +72117,7 @@ Domain to not audit.
50965 </param>
50966 <infoflow type="none"/>
50967 </interface>
50968 -<interface name="corenet_udp_receive_zookeeper_election_port" lineno="99278">
50969 +<interface name="corenet_udp_receive_zookeeper_election_port" lineno="99296">
50970 <summary>
50971 Receive UDP traffic on the zookeeper_election port.
50972 </summary>
50973 @@ -72044,7 +72128,7 @@ Domain allowed access.
50974 </param>
50975 <infoflow type="read" weight="10"/>
50976 </interface>
50977 -<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="99293">
50978 +<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="99311">
50979 <summary>
50980 Do not audit attempts to receive UDP traffic on the zookeeper_election port.
50981 </summary>
50982 @@ -72055,7 +72139,7 @@ Domain to not audit.
50983 </param>
50984 <infoflow type="none"/>
50985 </interface>
50986 -<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="99308">
50987 +<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="99326">
50988 <summary>
50989 Send and receive UDP traffic on the zookeeper_election port.
50990 </summary>
50991 @@ -72066,7 +72150,7 @@ Domain allowed access.
50992 </param>
50993 <infoflow type="both" weight="10"/>
50994 </interface>
50995 -<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="99324">
50996 +<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="99342">
50997 <summary>
50998 Do not audit attempts to send and receive
50999 UDP traffic on the zookeeper_election port.
51000 @@ -72078,7 +72162,7 @@ Domain to not audit.
51001 </param>
51002 <infoflow type="none"/>
51003 </interface>
51004 -<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="99339">
51005 +<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="99357">
51006 <summary>
51007 Bind TCP sockets to the zookeeper_election port.
51008 </summary>
51009 @@ -72089,7 +72173,7 @@ Domain allowed access.
51010 </param>
51011 <infoflow type="none"/>
51012 </interface>
51013 -<interface name="corenet_udp_bind_zookeeper_election_port" lineno="99359">
51014 +<interface name="corenet_udp_bind_zookeeper_election_port" lineno="99377">
51015 <summary>
51016 Bind UDP sockets to the zookeeper_election port.
51017 </summary>
51018 @@ -72100,7 +72184,7 @@ Domain allowed access.
51019 </param>
51020 <infoflow type="none"/>
51021 </interface>
51022 -<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="99378">
51023 +<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="99396">
51024 <summary>
51025 Make a TCP connection to the zookeeper_election port.
51026 </summary>
51027 @@ -72110,7 +72194,7 @@ Domain allowed access.
51028 </summary>
51029 </param>
51030 </interface>
51031 -<interface name="corenet_send_zookeeper_election_client_packets" lineno="99398">
51032 +<interface name="corenet_send_zookeeper_election_client_packets" lineno="99416">
51033 <summary>
51034 Send zookeeper_election_client packets.
51035 </summary>
51036 @@ -72121,7 +72205,7 @@ Domain allowed access.
51037 </param>
51038 <infoflow type="write" weight="10"/>
51039 </interface>
51040 -<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="99417">
51041 +<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="99435">
51042 <summary>
51043 Do not audit attempts to send zookeeper_election_client packets.
51044 </summary>
51045 @@ -72132,7 +72216,7 @@ Domain to not audit.
51046 </param>
51047 <infoflow type="none"/>
51048 </interface>
51049 -<interface name="corenet_receive_zookeeper_election_client_packets" lineno="99436">
51050 +<interface name="corenet_receive_zookeeper_election_client_packets" lineno="99454">
51051 <summary>
51052 Receive zookeeper_election_client packets.
51053 </summary>
51054 @@ -72143,7 +72227,7 @@ Domain allowed access.
51055 </param>
51056 <infoflow type="read" weight="10"/>
51057 </interface>
51058 -<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="99455">
51059 +<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="99473">
51060 <summary>
51061 Do not audit attempts to receive zookeeper_election_client packets.
51062 </summary>
51063 @@ -72154,7 +72238,7 @@ Domain allowed access.
51064 </param>
51065 <infoflow type="none"/>
51066 </interface>
51067 -<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="99474">
51068 +<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="99492">
51069 <summary>
51070 Send and receive zookeeper_election_client packets.
51071 </summary>
51072 @@ -72165,7 +72249,7 @@ Domain allowed access.
51073 </param>
51074 <infoflow type="both" weight="10"/>
51075 </interface>
51076 -<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="99490">
51077 +<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="99508">
51078 <summary>
51079 Do not audit attempts to send and receive zookeeper_election_client packets.
51080 </summary>
51081 @@ -72176,7 +72260,7 @@ Domain to not audit.
51082 </param>
51083 <infoflow type="none"/>
51084 </interface>
51085 -<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="99505">
51086 +<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="99523">
51087 <summary>
51088 Relabel packets to zookeeper_election_client the packet type.
51089 </summary>
51090 @@ -72186,7 +72270,7 @@ Domain allowed access.
51091 </summary>
51092 </param>
51093 </interface>
51094 -<interface name="corenet_send_zookeeper_election_server_packets" lineno="99525">
51095 +<interface name="corenet_send_zookeeper_election_server_packets" lineno="99543">
51096 <summary>
51097 Send zookeeper_election_server packets.
51098 </summary>
51099 @@ -72197,7 +72281,7 @@ Domain allowed access.
51100 </param>
51101 <infoflow type="write" weight="10"/>
51102 </interface>
51103 -<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="99544">
51104 +<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="99562">
51105 <summary>
51106 Do not audit attempts to send zookeeper_election_server packets.
51107 </summary>
51108 @@ -72208,7 +72292,7 @@ Domain to not audit.
51109 </param>
51110 <infoflow type="none"/>
51111 </interface>
51112 -<interface name="corenet_receive_zookeeper_election_server_packets" lineno="99563">
51113 +<interface name="corenet_receive_zookeeper_election_server_packets" lineno="99581">
51114 <summary>
51115 Receive zookeeper_election_server packets.
51116 </summary>
51117 @@ -72219,7 +72303,7 @@ Domain allowed access.
51118 </param>
51119 <infoflow type="read" weight="10"/>
51120 </interface>
51121 -<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="99582">
51122 +<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="99600">
51123 <summary>
51124 Do not audit attempts to receive zookeeper_election_server packets.
51125 </summary>
51126 @@ -72230,7 +72314,7 @@ Domain allowed access.
51127 </param>
51128 <infoflow type="none"/>
51129 </interface>
51130 -<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="99601">
51131 +<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="99619">
51132 <summary>
51133 Send and receive zookeeper_election_server packets.
51134 </summary>
51135 @@ -72241,7 +72325,7 @@ Domain allowed access.
51136 </param>
51137 <infoflow type="both" weight="10"/>
51138 </interface>
51139 -<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="99617">
51140 +<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="99635">
51141 <summary>
51142 Do not audit attempts to send and receive zookeeper_election_server packets.
51143 </summary>
51144 @@ -72252,7 +72336,7 @@ Domain to not audit.
51145 </param>
51146 <infoflow type="none"/>
51147 </interface>
51148 -<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="99632">
51149 +<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="99650">
51150 <summary>
51151 Relabel packets to zookeeper_election_server the packet type.
51152 </summary>
51153 @@ -72262,7 +72346,7 @@ Domain allowed access.
51154 </summary>
51155 </param>
51156 </interface>
51157 -<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="99654">
51158 +<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="99672">
51159 <summary>
51160 Send and receive TCP traffic on the zookeeper_leader port.
51161 </summary>
51162 @@ -72273,7 +72357,7 @@ Domain allowed access.
51163 </param>
51164 <infoflow type="both" weight="10"/>
51165 </interface>
51166 -<interface name="corenet_udp_send_zookeeper_leader_port" lineno="99669">
51167 +<interface name="corenet_udp_send_zookeeper_leader_port" lineno="99687">
51168 <summary>
51169 Send UDP traffic on the zookeeper_leader port.
51170 </summary>
51171 @@ -72284,7 +72368,7 @@ Domain allowed access.
51172 </param>
51173 <infoflow type="write" weight="10"/>
51174 </interface>
51175 -<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="99684">
51176 +<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="99702">
51177 <summary>
51178 Do not audit attempts to send UDP traffic on the zookeeper_leader port.
51179 </summary>
51180 @@ -72295,7 +72379,7 @@ Domain to not audit.
51181 </param>
51182 <infoflow type="none"/>
51183 </interface>
51184 -<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="99699">
51185 +<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="99717">
51186 <summary>
51187 Receive UDP traffic on the zookeeper_leader port.
51188 </summary>
51189 @@ -72306,7 +72390,7 @@ Domain allowed access.
51190 </param>
51191 <infoflow type="read" weight="10"/>
51192 </interface>
51193 -<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="99714">
51194 +<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="99732">
51195 <summary>
51196 Do not audit attempts to receive UDP traffic on the zookeeper_leader port.
51197 </summary>
51198 @@ -72317,7 +72401,7 @@ Domain to not audit.
51199 </param>
51200 <infoflow type="none"/>
51201 </interface>
51202 -<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="99729">
51203 +<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="99747">
51204 <summary>
51205 Send and receive UDP traffic on the zookeeper_leader port.
51206 </summary>
51207 @@ -72328,7 +72412,7 @@ Domain allowed access.
51208 </param>
51209 <infoflow type="both" weight="10"/>
51210 </interface>
51211 -<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="99745">
51212 +<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="99763">
51213 <summary>
51214 Do not audit attempts to send and receive
51215 UDP traffic on the zookeeper_leader port.
51216 @@ -72340,7 +72424,7 @@ Domain to not audit.
51217 </param>
51218 <infoflow type="none"/>
51219 </interface>
51220 -<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="99760">
51221 +<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="99778">
51222 <summary>
51223 Bind TCP sockets to the zookeeper_leader port.
51224 </summary>
51225 @@ -72351,7 +72435,7 @@ Domain allowed access.
51226 </param>
51227 <infoflow type="none"/>
51228 </interface>
51229 -<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="99780">
51230 +<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="99798">
51231 <summary>
51232 Bind UDP sockets to the zookeeper_leader port.
51233 </summary>
51234 @@ -72362,7 +72446,7 @@ Domain allowed access.
51235 </param>
51236 <infoflow type="none"/>
51237 </interface>
51238 -<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="99799">
51239 +<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="99817">
51240 <summary>
51241 Make a TCP connection to the zookeeper_leader port.
51242 </summary>
51243 @@ -72372,7 +72456,7 @@ Domain allowed access.
51244 </summary>
51245 </param>
51246 </interface>
51247 -<interface name="corenet_send_zookeeper_leader_client_packets" lineno="99819">
51248 +<interface name="corenet_send_zookeeper_leader_client_packets" lineno="99837">
51249 <summary>
51250 Send zookeeper_leader_client packets.
51251 </summary>
51252 @@ -72383,7 +72467,7 @@ Domain allowed access.
51253 </param>
51254 <infoflow type="write" weight="10"/>
51255 </interface>
51256 -<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="99838">
51257 +<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="99856">
51258 <summary>
51259 Do not audit attempts to send zookeeper_leader_client packets.
51260 </summary>
51261 @@ -72394,7 +72478,7 @@ Domain to not audit.
51262 </param>
51263 <infoflow type="none"/>
51264 </interface>
51265 -<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="99857">
51266 +<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="99875">
51267 <summary>
51268 Receive zookeeper_leader_client packets.
51269 </summary>
51270 @@ -72405,7 +72489,7 @@ Domain allowed access.
51271 </param>
51272 <infoflow type="read" weight="10"/>
51273 </interface>
51274 -<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="99876">
51275 +<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="99894">
51276 <summary>
51277 Do not audit attempts to receive zookeeper_leader_client packets.
51278 </summary>
51279 @@ -72416,7 +72500,7 @@ Domain allowed access.
51280 </param>
51281 <infoflow type="none"/>
51282 </interface>
51283 -<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="99895">
51284 +<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="99913">
51285 <summary>
51286 Send and receive zookeeper_leader_client packets.
51287 </summary>
51288 @@ -72427,7 +72511,7 @@ Domain allowed access.
51289 </param>
51290 <infoflow type="both" weight="10"/>
51291 </interface>
51292 -<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="99911">
51293 +<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="99929">
51294 <summary>
51295 Do not audit attempts to send and receive zookeeper_leader_client packets.
51296 </summary>
51297 @@ -72438,7 +72522,7 @@ Domain to not audit.
51298 </param>
51299 <infoflow type="none"/>
51300 </interface>
51301 -<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="99926">
51302 +<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="99944">
51303 <summary>
51304 Relabel packets to zookeeper_leader_client the packet type.
51305 </summary>
51306 @@ -72448,7 +72532,7 @@ Domain allowed access.
51307 </summary>
51308 </param>
51309 </interface>
51310 -<interface name="corenet_send_zookeeper_leader_server_packets" lineno="99946">
51311 +<interface name="corenet_send_zookeeper_leader_server_packets" lineno="99964">
51312 <summary>
51313 Send zookeeper_leader_server packets.
51314 </summary>
51315 @@ -72459,7 +72543,7 @@ Domain allowed access.
51316 </param>
51317 <infoflow type="write" weight="10"/>
51318 </interface>
51319 -<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="99965">
51320 +<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="99983">
51321 <summary>
51322 Do not audit attempts to send zookeeper_leader_server packets.
51323 </summary>
51324 @@ -72470,7 +72554,7 @@ Domain to not audit.
51325 </param>
51326 <infoflow type="none"/>
51327 </interface>
51328 -<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="99984">
51329 +<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="100002">
51330 <summary>
51331 Receive zookeeper_leader_server packets.
51332 </summary>
51333 @@ -72481,7 +72565,7 @@ Domain allowed access.
51334 </param>
51335 <infoflow type="read" weight="10"/>
51336 </interface>
51337 -<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="100003">
51338 +<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="100021">
51339 <summary>
51340 Do not audit attempts to receive zookeeper_leader_server packets.
51341 </summary>
51342 @@ -72492,7 +72576,7 @@ Domain allowed access.
51343 </param>
51344 <infoflow type="none"/>
51345 </interface>
51346 -<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="100022">
51347 +<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="100040">
51348 <summary>
51349 Send and receive zookeeper_leader_server packets.
51350 </summary>
51351 @@ -72503,7 +72587,7 @@ Domain allowed access.
51352 </param>
51353 <infoflow type="both" weight="10"/>
51354 </interface>
51355 -<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="100038">
51356 +<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="100056">
51357 <summary>
51358 Do not audit attempts to send and receive zookeeper_leader_server packets.
51359 </summary>
51360 @@ -72514,7 +72598,7 @@ Domain to not audit.
51361 </param>
51362 <infoflow type="none"/>
51363 </interface>
51364 -<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="100053">
51365 +<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="100071">
51366 <summary>
51367 Relabel packets to zookeeper_leader_server the packet type.
51368 </summary>
51369 @@ -72524,7 +72608,7 @@ Domain allowed access.
51370 </summary>
51371 </param>
51372 </interface>
51373 -<interface name="corenet_tcp_sendrecv_zebra_port" lineno="100075">
51374 +<interface name="corenet_tcp_sendrecv_zebra_port" lineno="100093">
51375 <summary>
51376 Send and receive TCP traffic on the zebra port.
51377 </summary>
51378 @@ -72535,7 +72619,7 @@ Domain allowed access.
51379 </param>
51380 <infoflow type="both" weight="10"/>
51381 </interface>
51382 -<interface name="corenet_udp_send_zebra_port" lineno="100090">
51383 +<interface name="corenet_udp_send_zebra_port" lineno="100108">
51384 <summary>
51385 Send UDP traffic on the zebra port.
51386 </summary>
51387 @@ -72546,7 +72630,7 @@ Domain allowed access.
51388 </param>
51389 <infoflow type="write" weight="10"/>
51390 </interface>
51391 -<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="100105">
51392 +<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="100123">
51393 <summary>
51394 Do not audit attempts to send UDP traffic on the zebra port.
51395 </summary>
51396 @@ -72557,7 +72641,7 @@ Domain to not audit.
51397 </param>
51398 <infoflow type="none"/>
51399 </interface>
51400 -<interface name="corenet_udp_receive_zebra_port" lineno="100120">
51401 +<interface name="corenet_udp_receive_zebra_port" lineno="100138">
51402 <summary>
51403 Receive UDP traffic on the zebra port.
51404 </summary>
51405 @@ -72568,7 +72652,7 @@ Domain allowed access.
51406 </param>
51407 <infoflow type="read" weight="10"/>
51408 </interface>
51409 -<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="100135">
51410 +<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="100153">
51411 <summary>
51412 Do not audit attempts to receive UDP traffic on the zebra port.
51413 </summary>
51414 @@ -72579,7 +72663,7 @@ Domain to not audit.
51415 </param>
51416 <infoflow type="none"/>
51417 </interface>
51418 -<interface name="corenet_udp_sendrecv_zebra_port" lineno="100150">
51419 +<interface name="corenet_udp_sendrecv_zebra_port" lineno="100168">
51420 <summary>
51421 Send and receive UDP traffic on the zebra port.
51422 </summary>
51423 @@ -72590,7 +72674,7 @@ Domain allowed access.
51424 </param>
51425 <infoflow type="both" weight="10"/>
51426 </interface>
51427 -<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="100166">
51428 +<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="100184">
51429 <summary>
51430 Do not audit attempts to send and receive
51431 UDP traffic on the zebra port.
51432 @@ -72602,7 +72686,7 @@ Domain to not audit.
51433 </param>
51434 <infoflow type="none"/>
51435 </interface>
51436 -<interface name="corenet_tcp_bind_zebra_port" lineno="100181">
51437 +<interface name="corenet_tcp_bind_zebra_port" lineno="100199">
51438 <summary>
51439 Bind TCP sockets to the zebra port.
51440 </summary>
51441 @@ -72613,7 +72697,7 @@ Domain allowed access.
51442 </param>
51443 <infoflow type="none"/>
51444 </interface>
51445 -<interface name="corenet_udp_bind_zebra_port" lineno="100201">
51446 +<interface name="corenet_udp_bind_zebra_port" lineno="100219">
51447 <summary>
51448 Bind UDP sockets to the zebra port.
51449 </summary>
51450 @@ -72624,7 +72708,7 @@ Domain allowed access.
51451 </param>
51452 <infoflow type="none"/>
51453 </interface>
51454 -<interface name="corenet_tcp_connect_zebra_port" lineno="100220">
51455 +<interface name="corenet_tcp_connect_zebra_port" lineno="100238">
51456 <summary>
51457 Make a TCP connection to the zebra port.
51458 </summary>
51459 @@ -72634,7 +72718,7 @@ Domain allowed access.
51460 </summary>
51461 </param>
51462 </interface>
51463 -<interface name="corenet_send_zebra_client_packets" lineno="100240">
51464 +<interface name="corenet_send_zebra_client_packets" lineno="100258">
51465 <summary>
51466 Send zebra_client packets.
51467 </summary>
51468 @@ -72645,7 +72729,7 @@ Domain allowed access.
51469 </param>
51470 <infoflow type="write" weight="10"/>
51471 </interface>
51472 -<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="100259">
51473 +<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="100277">
51474 <summary>
51475 Do not audit attempts to send zebra_client packets.
51476 </summary>
51477 @@ -72656,7 +72740,7 @@ Domain to not audit.
51478 </param>
51479 <infoflow type="none"/>
51480 </interface>
51481 -<interface name="corenet_receive_zebra_client_packets" lineno="100278">
51482 +<interface name="corenet_receive_zebra_client_packets" lineno="100296">
51483 <summary>
51484 Receive zebra_client packets.
51485 </summary>
51486 @@ -72667,7 +72751,7 @@ Domain allowed access.
51487 </param>
51488 <infoflow type="read" weight="10"/>
51489 </interface>
51490 -<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="100297">
51491 +<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="100315">
51492 <summary>
51493 Do not audit attempts to receive zebra_client packets.
51494 </summary>
51495 @@ -72678,7 +72762,7 @@ Domain allowed access.
51496 </param>
51497 <infoflow type="none"/>
51498 </interface>
51499 -<interface name="corenet_sendrecv_zebra_client_packets" lineno="100316">
51500 +<interface name="corenet_sendrecv_zebra_client_packets" lineno="100334">
51501 <summary>
51502 Send and receive zebra_client packets.
51503 </summary>
51504 @@ -72689,7 +72773,7 @@ Domain allowed access.
51505 </param>
51506 <infoflow type="both" weight="10"/>
51507 </interface>
51508 -<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="100332">
51509 +<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="100350">
51510 <summary>
51511 Do not audit attempts to send and receive zebra_client packets.
51512 </summary>
51513 @@ -72700,7 +72784,7 @@ Domain to not audit.
51514 </param>
51515 <infoflow type="none"/>
51516 </interface>
51517 -<interface name="corenet_relabelto_zebra_client_packets" lineno="100347">
51518 +<interface name="corenet_relabelto_zebra_client_packets" lineno="100365">
51519 <summary>
51520 Relabel packets to zebra_client the packet type.
51521 </summary>
51522 @@ -72710,7 +72794,7 @@ Domain allowed access.
51523 </summary>
51524 </param>
51525 </interface>
51526 -<interface name="corenet_send_zebra_server_packets" lineno="100367">
51527 +<interface name="corenet_send_zebra_server_packets" lineno="100385">
51528 <summary>
51529 Send zebra_server packets.
51530 </summary>
51531 @@ -72721,7 +72805,7 @@ Domain allowed access.
51532 </param>
51533 <infoflow type="write" weight="10"/>
51534 </interface>
51535 -<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="100386">
51536 +<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="100404">
51537 <summary>
51538 Do not audit attempts to send zebra_server packets.
51539 </summary>
51540 @@ -72732,7 +72816,7 @@ Domain to not audit.
51541 </param>
51542 <infoflow type="none"/>
51543 </interface>
51544 -<interface name="corenet_receive_zebra_server_packets" lineno="100405">
51545 +<interface name="corenet_receive_zebra_server_packets" lineno="100423">
51546 <summary>
51547 Receive zebra_server packets.
51548 </summary>
51549 @@ -72743,7 +72827,7 @@ Domain allowed access.
51550 </param>
51551 <infoflow type="read" weight="10"/>
51552 </interface>
51553 -<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="100424">
51554 +<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="100442">
51555 <summary>
51556 Do not audit attempts to receive zebra_server packets.
51557 </summary>
51558 @@ -72754,7 +72838,7 @@ Domain allowed access.
51559 </param>
51560 <infoflow type="none"/>
51561 </interface>
51562 -<interface name="corenet_sendrecv_zebra_server_packets" lineno="100443">
51563 +<interface name="corenet_sendrecv_zebra_server_packets" lineno="100461">
51564 <summary>
51565 Send and receive zebra_server packets.
51566 </summary>
51567 @@ -72765,7 +72849,7 @@ Domain allowed access.
51568 </param>
51569 <infoflow type="both" weight="10"/>
51570 </interface>
51571 -<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="100459">
51572 +<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="100477">
51573 <summary>
51574 Do not audit attempts to send and receive zebra_server packets.
51575 </summary>
51576 @@ -72776,7 +72860,7 @@ Domain to not audit.
51577 </param>
51578 <infoflow type="none"/>
51579 </interface>
51580 -<interface name="corenet_relabelto_zebra_server_packets" lineno="100474">
51581 +<interface name="corenet_relabelto_zebra_server_packets" lineno="100492">
51582 <summary>
51583 Relabel packets to zebra_server the packet type.
51584 </summary>
51585 @@ -72786,7 +72870,7 @@ Domain allowed access.
51586 </summary>
51587 </param>
51588 </interface>
51589 -<interface name="corenet_tcp_sendrecv_zented_port" lineno="100496">
51590 +<interface name="corenet_tcp_sendrecv_zented_port" lineno="100514">
51591 <summary>
51592 Send and receive TCP traffic on the zented port.
51593 </summary>
51594 @@ -72797,7 +72881,7 @@ Domain allowed access.
51595 </param>
51596 <infoflow type="both" weight="10"/>
51597 </interface>
51598 -<interface name="corenet_udp_send_zented_port" lineno="100511">
51599 +<interface name="corenet_udp_send_zented_port" lineno="100529">
51600 <summary>
51601 Send UDP traffic on the zented port.
51602 </summary>
51603 @@ -72808,7 +72892,7 @@ Domain allowed access.
51604 </param>
51605 <infoflow type="write" weight="10"/>
51606 </interface>
51607 -<interface name="corenet_dontaudit_udp_send_zented_port" lineno="100526">
51608 +<interface name="corenet_dontaudit_udp_send_zented_port" lineno="100544">
51609 <summary>
51610 Do not audit attempts to send UDP traffic on the zented port.
51611 </summary>
51612 @@ -72819,7 +72903,7 @@ Domain to not audit.
51613 </param>
51614 <infoflow type="none"/>
51615 </interface>
51616 -<interface name="corenet_udp_receive_zented_port" lineno="100541">
51617 +<interface name="corenet_udp_receive_zented_port" lineno="100559">
51618 <summary>
51619 Receive UDP traffic on the zented port.
51620 </summary>
51621 @@ -72830,7 +72914,7 @@ Domain allowed access.
51622 </param>
51623 <infoflow type="read" weight="10"/>
51624 </interface>
51625 -<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="100556">
51626 +<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="100574">
51627 <summary>
51628 Do not audit attempts to receive UDP traffic on the zented port.
51629 </summary>
51630 @@ -72841,7 +72925,7 @@ Domain to not audit.
51631 </param>
51632 <infoflow type="none"/>
51633 </interface>
51634 -<interface name="corenet_udp_sendrecv_zented_port" lineno="100571">
51635 +<interface name="corenet_udp_sendrecv_zented_port" lineno="100589">
51636 <summary>
51637 Send and receive UDP traffic on the zented port.
51638 </summary>
51639 @@ -72852,7 +72936,7 @@ Domain allowed access.
51640 </param>
51641 <infoflow type="both" weight="10"/>
51642 </interface>
51643 -<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="100587">
51644 +<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="100605">
51645 <summary>
51646 Do not audit attempts to send and receive
51647 UDP traffic on the zented port.
51648 @@ -72864,7 +72948,7 @@ Domain to not audit.
51649 </param>
51650 <infoflow type="none"/>
51651 </interface>
51652 -<interface name="corenet_tcp_bind_zented_port" lineno="100602">
51653 +<interface name="corenet_tcp_bind_zented_port" lineno="100620">
51654 <summary>
51655 Bind TCP sockets to the zented port.
51656 </summary>
51657 @@ -72875,7 +72959,7 @@ Domain allowed access.
51658 </param>
51659 <infoflow type="none"/>
51660 </interface>
51661 -<interface name="corenet_udp_bind_zented_port" lineno="100622">
51662 +<interface name="corenet_udp_bind_zented_port" lineno="100640">
51663 <summary>
51664 Bind UDP sockets to the zented port.
51665 </summary>
51666 @@ -72886,7 +72970,7 @@ Domain allowed access.
51667 </param>
51668 <infoflow type="none"/>
51669 </interface>
51670 -<interface name="corenet_tcp_connect_zented_port" lineno="100641">
51671 +<interface name="corenet_tcp_connect_zented_port" lineno="100659">
51672 <summary>
51673 Make a TCP connection to the zented port.
51674 </summary>
51675 @@ -72896,7 +72980,7 @@ Domain allowed access.
51676 </summary>
51677 </param>
51678 </interface>
51679 -<interface name="corenet_send_zented_client_packets" lineno="100661">
51680 +<interface name="corenet_send_zented_client_packets" lineno="100679">
51681 <summary>
51682 Send zented_client packets.
51683 </summary>
51684 @@ -72907,7 +72991,7 @@ Domain allowed access.
51685 </param>
51686 <infoflow type="write" weight="10"/>
51687 </interface>
51688 -<interface name="corenet_dontaudit_send_zented_client_packets" lineno="100680">
51689 +<interface name="corenet_dontaudit_send_zented_client_packets" lineno="100698">
51690 <summary>
51691 Do not audit attempts to send zented_client packets.
51692 </summary>
51693 @@ -72918,7 +73002,7 @@ Domain to not audit.
51694 </param>
51695 <infoflow type="none"/>
51696 </interface>
51697 -<interface name="corenet_receive_zented_client_packets" lineno="100699">
51698 +<interface name="corenet_receive_zented_client_packets" lineno="100717">
51699 <summary>
51700 Receive zented_client packets.
51701 </summary>
51702 @@ -72929,7 +73013,7 @@ Domain allowed access.
51703 </param>
51704 <infoflow type="read" weight="10"/>
51705 </interface>
51706 -<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="100718">
51707 +<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="100736">
51708 <summary>
51709 Do not audit attempts to receive zented_client packets.
51710 </summary>
51711 @@ -72940,7 +73024,7 @@ Domain allowed access.
51712 </param>
51713 <infoflow type="none"/>
51714 </interface>
51715 -<interface name="corenet_sendrecv_zented_client_packets" lineno="100737">
51716 +<interface name="corenet_sendrecv_zented_client_packets" lineno="100755">
51717 <summary>
51718 Send and receive zented_client packets.
51719 </summary>
51720 @@ -72951,7 +73035,7 @@ Domain allowed access.
51721 </param>
51722 <infoflow type="both" weight="10"/>
51723 </interface>
51724 -<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="100753">
51725 +<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="100771">
51726 <summary>
51727 Do not audit attempts to send and receive zented_client packets.
51728 </summary>
51729 @@ -72962,7 +73046,7 @@ Domain to not audit.
51730 </param>
51731 <infoflow type="none"/>
51732 </interface>
51733 -<interface name="corenet_relabelto_zented_client_packets" lineno="100768">
51734 +<interface name="corenet_relabelto_zented_client_packets" lineno="100786">
51735 <summary>
51736 Relabel packets to zented_client the packet type.
51737 </summary>
51738 @@ -72972,7 +73056,7 @@ Domain allowed access.
51739 </summary>
51740 </param>
51741 </interface>
51742 -<interface name="corenet_send_zented_server_packets" lineno="100788">
51743 +<interface name="corenet_send_zented_server_packets" lineno="100806">
51744 <summary>
51745 Send zented_server packets.
51746 </summary>
51747 @@ -72983,7 +73067,7 @@ Domain allowed access.
51748 </param>
51749 <infoflow type="write" weight="10"/>
51750 </interface>
51751 -<interface name="corenet_dontaudit_send_zented_server_packets" lineno="100807">
51752 +<interface name="corenet_dontaudit_send_zented_server_packets" lineno="100825">
51753 <summary>
51754 Do not audit attempts to send zented_server packets.
51755 </summary>
51756 @@ -72994,7 +73078,7 @@ Domain to not audit.
51757 </param>
51758 <infoflow type="none"/>
51759 </interface>
51760 -<interface name="corenet_receive_zented_server_packets" lineno="100826">
51761 +<interface name="corenet_receive_zented_server_packets" lineno="100844">
51762 <summary>
51763 Receive zented_server packets.
51764 </summary>
51765 @@ -73005,7 +73089,7 @@ Domain allowed access.
51766 </param>
51767 <infoflow type="read" weight="10"/>
51768 </interface>
51769 -<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="100845">
51770 +<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="100863">
51771 <summary>
51772 Do not audit attempts to receive zented_server packets.
51773 </summary>
51774 @@ -73016,7 +73100,7 @@ Domain allowed access.
51775 </param>
51776 <infoflow type="none"/>
51777 </interface>
51778 -<interface name="corenet_sendrecv_zented_server_packets" lineno="100864">
51779 +<interface name="corenet_sendrecv_zented_server_packets" lineno="100882">
51780 <summary>
51781 Send and receive zented_server packets.
51782 </summary>
51783 @@ -73027,7 +73111,7 @@ Domain allowed access.
51784 </param>
51785 <infoflow type="both" weight="10"/>
51786 </interface>
51787 -<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="100880">
51788 +<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="100898">
51789 <summary>
51790 Do not audit attempts to send and receive zented_server packets.
51791 </summary>
51792 @@ -73038,7 +73122,7 @@ Domain to not audit.
51793 </param>
51794 <infoflow type="none"/>
51795 </interface>
51796 -<interface name="corenet_relabelto_zented_server_packets" lineno="100895">
51797 +<interface name="corenet_relabelto_zented_server_packets" lineno="100913">
51798 <summary>
51799 Relabel packets to zented_server the packet type.
51800 </summary>
51801 @@ -73048,7 +73132,7 @@ Domain allowed access.
51802 </summary>
51803 </param>
51804 </interface>
51805 -<interface name="corenet_tcp_sendrecv_zope_port" lineno="100917">
51806 +<interface name="corenet_tcp_sendrecv_zope_port" lineno="100935">
51807 <summary>
51808 Send and receive TCP traffic on the zope port.
51809 </summary>
51810 @@ -73059,7 +73143,7 @@ Domain allowed access.
51811 </param>
51812 <infoflow type="both" weight="10"/>
51813 </interface>
51814 -<interface name="corenet_udp_send_zope_port" lineno="100932">
51815 +<interface name="corenet_udp_send_zope_port" lineno="100950">
51816 <summary>
51817 Send UDP traffic on the zope port.
51818 </summary>
51819 @@ -73070,7 +73154,7 @@ Domain allowed access.
51820 </param>
51821 <infoflow type="write" weight="10"/>
51822 </interface>
51823 -<interface name="corenet_dontaudit_udp_send_zope_port" lineno="100947">
51824 +<interface name="corenet_dontaudit_udp_send_zope_port" lineno="100965">
51825 <summary>
51826 Do not audit attempts to send UDP traffic on the zope port.
51827 </summary>
51828 @@ -73081,7 +73165,7 @@ Domain to not audit.
51829 </param>
51830 <infoflow type="none"/>
51831 </interface>
51832 -<interface name="corenet_udp_receive_zope_port" lineno="100962">
51833 +<interface name="corenet_udp_receive_zope_port" lineno="100980">
51834 <summary>
51835 Receive UDP traffic on the zope port.
51836 </summary>
51837 @@ -73092,7 +73176,7 @@ Domain allowed access.
51838 </param>
51839 <infoflow type="read" weight="10"/>
51840 </interface>
51841 -<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="100977">
51842 +<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="100995">
51843 <summary>
51844 Do not audit attempts to receive UDP traffic on the zope port.
51845 </summary>
51846 @@ -73103,7 +73187,7 @@ Domain to not audit.
51847 </param>
51848 <infoflow type="none"/>
51849 </interface>
51850 -<interface name="corenet_udp_sendrecv_zope_port" lineno="100992">
51851 +<interface name="corenet_udp_sendrecv_zope_port" lineno="101010">
51852 <summary>
51853 Send and receive UDP traffic on the zope port.
51854 </summary>
51855 @@ -73114,7 +73198,7 @@ Domain allowed access.
51856 </param>
51857 <infoflow type="both" weight="10"/>
51858 </interface>
51859 -<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="101008">
51860 +<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="101026">
51861 <summary>
51862 Do not audit attempts to send and receive
51863 UDP traffic on the zope port.
51864 @@ -73126,7 +73210,7 @@ Domain to not audit.
51865 </param>
51866 <infoflow type="none"/>
51867 </interface>
51868 -<interface name="corenet_tcp_bind_zope_port" lineno="101023">
51869 +<interface name="corenet_tcp_bind_zope_port" lineno="101041">
51870 <summary>
51871 Bind TCP sockets to the zope port.
51872 </summary>
51873 @@ -73137,7 +73221,7 @@ Domain allowed access.
51874 </param>
51875 <infoflow type="none"/>
51876 </interface>
51877 -<interface name="corenet_udp_bind_zope_port" lineno="101043">
51878 +<interface name="corenet_udp_bind_zope_port" lineno="101061">
51879 <summary>
51880 Bind UDP sockets to the zope port.
51881 </summary>
51882 @@ -73148,7 +73232,7 @@ Domain allowed access.
51883 </param>
51884 <infoflow type="none"/>
51885 </interface>
51886 -<interface name="corenet_tcp_connect_zope_port" lineno="101062">
51887 +<interface name="corenet_tcp_connect_zope_port" lineno="101080">
51888 <summary>
51889 Make a TCP connection to the zope port.
51890 </summary>
51891 @@ -73158,7 +73242,7 @@ Domain allowed access.
51892 </summary>
51893 </param>
51894 </interface>
51895 -<interface name="corenet_send_zope_client_packets" lineno="101082">
51896 +<interface name="corenet_send_zope_client_packets" lineno="101100">
51897 <summary>
51898 Send zope_client packets.
51899 </summary>
51900 @@ -73169,7 +73253,7 @@ Domain allowed access.
51901 </param>
51902 <infoflow type="write" weight="10"/>
51903 </interface>
51904 -<interface name="corenet_dontaudit_send_zope_client_packets" lineno="101101">
51905 +<interface name="corenet_dontaudit_send_zope_client_packets" lineno="101119">
51906 <summary>
51907 Do not audit attempts to send zope_client packets.
51908 </summary>
51909 @@ -73180,7 +73264,7 @@ Domain to not audit.
51910 </param>
51911 <infoflow type="none"/>
51912 </interface>
51913 -<interface name="corenet_receive_zope_client_packets" lineno="101120">
51914 +<interface name="corenet_receive_zope_client_packets" lineno="101138">
51915 <summary>
51916 Receive zope_client packets.
51917 </summary>
51918 @@ -73191,7 +73275,7 @@ Domain allowed access.
51919 </param>
51920 <infoflow type="read" weight="10"/>
51921 </interface>
51922 -<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="101139">
51923 +<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="101157">
51924 <summary>
51925 Do not audit attempts to receive zope_client packets.
51926 </summary>
51927 @@ -73202,7 +73286,7 @@ Domain allowed access.
51928 </param>
51929 <infoflow type="none"/>
51930 </interface>
51931 -<interface name="corenet_sendrecv_zope_client_packets" lineno="101158">
51932 +<interface name="corenet_sendrecv_zope_client_packets" lineno="101176">
51933 <summary>
51934 Send and receive zope_client packets.
51935 </summary>
51936 @@ -73213,7 +73297,7 @@ Domain allowed access.
51937 </param>
51938 <infoflow type="both" weight="10"/>
51939 </interface>
51940 -<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="101174">
51941 +<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="101192">
51942 <summary>
51943 Do not audit attempts to send and receive zope_client packets.
51944 </summary>
51945 @@ -73224,7 +73308,7 @@ Domain to not audit.
51946 </param>
51947 <infoflow type="none"/>
51948 </interface>
51949 -<interface name="corenet_relabelto_zope_client_packets" lineno="101189">
51950 +<interface name="corenet_relabelto_zope_client_packets" lineno="101207">
51951 <summary>
51952 Relabel packets to zope_client the packet type.
51953 </summary>
51954 @@ -73234,7 +73318,7 @@ Domain allowed access.
51955 </summary>
51956 </param>
51957 </interface>
51958 -<interface name="corenet_send_zope_server_packets" lineno="101209">
51959 +<interface name="corenet_send_zope_server_packets" lineno="101227">
51960 <summary>
51961 Send zope_server packets.
51962 </summary>
51963 @@ -73245,7 +73329,7 @@ Domain allowed access.
51964 </param>
51965 <infoflow type="write" weight="10"/>
51966 </interface>
51967 -<interface name="corenet_dontaudit_send_zope_server_packets" lineno="101228">
51968 +<interface name="corenet_dontaudit_send_zope_server_packets" lineno="101246">
51969 <summary>
51970 Do not audit attempts to send zope_server packets.
51971 </summary>
51972 @@ -73256,7 +73340,7 @@ Domain to not audit.
51973 </param>
51974 <infoflow type="none"/>
51975 </interface>
51976 -<interface name="corenet_receive_zope_server_packets" lineno="101247">
51977 +<interface name="corenet_receive_zope_server_packets" lineno="101265">
51978 <summary>
51979 Receive zope_server packets.
51980 </summary>
51981 @@ -73267,7 +73351,7 @@ Domain allowed access.
51982 </param>
51983 <infoflow type="read" weight="10"/>
51984 </interface>
51985 -<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="101266">
51986 +<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="101284">
51987 <summary>
51988 Do not audit attempts to receive zope_server packets.
51989 </summary>
51990 @@ -73278,7 +73362,7 @@ Domain allowed access.
51991 </param>
51992 <infoflow type="none"/>
51993 </interface>
51994 -<interface name="corenet_sendrecv_zope_server_packets" lineno="101285">
51995 +<interface name="corenet_sendrecv_zope_server_packets" lineno="101303">
51996 <summary>
51997 Send and receive zope_server packets.
51998 </summary>
51999 @@ -73289,7 +73373,7 @@ Domain allowed access.
52000 </param>
52001 <infoflow type="both" weight="10"/>
52002 </interface>
52003 -<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="101301">
52004 +<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="101319">
52005 <summary>
52006 Do not audit attempts to send and receive zope_server packets.
52007 </summary>
52008 @@ -73300,7 +73384,7 @@ Domain to not audit.
52009 </param>
52010 <infoflow type="none"/>
52011 </interface>
52012 -<interface name="corenet_relabelto_zope_server_packets" lineno="101316">
52013 +<interface name="corenet_relabelto_zope_server_packets" lineno="101334">
52014 <summary>
52015 Relabel packets to zope_server the packet type.
52016 </summary>
52017 @@ -73310,7 +73394,7 @@ Domain allowed access.
52018 </summary>
52019 </param>
52020 </interface>
52021 -<interface name="corenet_tcp_sendrecv_lo_if" lineno="101339">
52022 +<interface name="corenet_tcp_sendrecv_lo_if" lineno="101357">
52023 <summary>
52024 Send and receive TCP network traffic on the lo interface.
52025 </summary>
52026 @@ -73321,7 +73405,7 @@ Domain allowed access.
52027 </param>
52028 <infoflow type="both" weight="10"/>
52029 </interface>
52030 -<interface name="corenet_udp_send_lo_if" lineno="101358">
52031 +<interface name="corenet_udp_send_lo_if" lineno="101376">
52032 <summary>
52033 Send UDP network traffic on the lo interface.
52034 </summary>
52035 @@ -73332,7 +73416,7 @@ Domain allowed access.
52036 </param>
52037 <infoflow type="write" weight="10"/>
52038 </interface>
52039 -<interface name="corenet_udp_receive_lo_if" lineno="101377">
52040 +<interface name="corenet_udp_receive_lo_if" lineno="101395">
52041 <summary>
52042 Receive UDP network traffic on the lo interface.
52043 </summary>
52044 @@ -73343,7 +73427,7 @@ Domain allowed access.
52045 </param>
52046 <infoflow type="read" weight="10"/>
52047 </interface>
52048 -<interface name="corenet_udp_sendrecv_lo_if" lineno="101396">
52049 +<interface name="corenet_udp_sendrecv_lo_if" lineno="101414">
52050 <summary>
52051 Send and receive UDP network traffic on the lo interface.
52052 </summary>
52053 @@ -73354,7 +73438,7 @@ Domain allowed access.
52054 </param>
52055 <infoflow type="both" weight="10"/>
52056 </interface>
52057 -<interface name="corenet_raw_send_lo_if" lineno="101412">
52058 +<interface name="corenet_raw_send_lo_if" lineno="101430">
52059 <summary>
52060 Send raw IP packets on the lo interface.
52061 </summary>
52062 @@ -73365,7 +73449,7 @@ Domain allowed access.
52063 </param>
52064 <infoflow type="write" weight="10"/>
52065 </interface>
52066 -<interface name="corenet_raw_receive_lo_if" lineno="101431">
52067 +<interface name="corenet_raw_receive_lo_if" lineno="101449">
52068 <summary>
52069 Receive raw IP packets on the lo interface.
52070 </summary>
52071 @@ -73376,7 +73460,7 @@ Domain allowed access.
52072 </param>
52073 <infoflow type="read" weight="10"/>
52074 </interface>
52075 -<interface name="corenet_raw_sendrecv_lo_if" lineno="101450">
52076 +<interface name="corenet_raw_sendrecv_lo_if" lineno="101468">
52077 <summary>
52078 Send and receive raw IP packets on the lo interface.
52079 </summary>
52080 @@ -74725,7 +74809,27 @@ Domain allowed access.
52081 </summary>
52082 </param>
52083 </interface>
52084 -<interface name="dev_read_kmsg" lineno="2381">
52085 +<interface name="dev_rw_hyperv_kvp" lineno="2381">
52086 +<summary>
52087 +Allow read/write the hypervkvp device
52088 +</summary>
52089 +<param name="domain">
52090 +<summary>
52091 +Domain allowed access.
52092 +</summary>
52093 +</param>
52094 +</interface>
52095 +<interface name="dev_rw_hyperv_vss" lineno="2399">
52096 +<summary>
52097 +Allow read/write the hypervvssd device
52098 +</summary>
52099 +<param name="domain">
52100 +<summary>
52101 +Domain allowed access.
52102 +</summary>
52103 +</param>
52104 +</interface>
52105 +<interface name="dev_read_kmsg" lineno="2417">
52106 <summary>
52107 Read the kernel messages
52108 </summary>
52109 @@ -74735,7 +74839,7 @@ Domain allowed access.
52110 </summary>
52111 </param>
52112 </interface>
52113 -<interface name="dev_dontaudit_read_kmsg" lineno="2399">
52114 +<interface name="dev_dontaudit_read_kmsg" lineno="2435">
52115 <summary>
52116 Do not audit attempts to read the kernel messages
52117 </summary>
52118 @@ -74745,7 +74849,7 @@ Domain to not audit.
52119 </summary>
52120 </param>
52121 </interface>
52122 -<interface name="dev_write_kmsg" lineno="2417">
52123 +<interface name="dev_write_kmsg" lineno="2453">
52124 <summary>
52125 Write to the kernel messages device
52126 </summary>
52127 @@ -74755,7 +74859,7 @@ Domain allowed access.
52128 </summary>
52129 </param>
52130 </interface>
52131 -<interface name="dev_rw_kmsg" lineno="2435">
52132 +<interface name="dev_rw_kmsg" lineno="2471">
52133 <summary>
52134 Read and write to the kernel messages device
52135 </summary>
52136 @@ -74765,7 +74869,7 @@ Domain allowed access.
52137 </summary>
52138 </param>
52139 </interface>
52140 -<interface name="dev_mounton_kmsg" lineno="2453">
52141 +<interface name="dev_mounton_kmsg" lineno="2489">
52142 <summary>
52143 Mount on the kernel messages device
52144 </summary>
52145 @@ -74775,7 +74879,7 @@ Domain allowed access.
52146 </summary>
52147 </param>
52148 </interface>
52149 -<interface name="dev_getattr_ksm_dev" lineno="2471">
52150 +<interface name="dev_getattr_ksm_dev" lineno="2507">
52151 <summary>
52152 Get the attributes of the ksm devices.
52153 </summary>
52154 @@ -74785,7 +74889,7 @@ Domain allowed access.
52155 </summary>
52156 </param>
52157 </interface>
52158 -<interface name="dev_setattr_ksm_dev" lineno="2489">
52159 +<interface name="dev_setattr_ksm_dev" lineno="2525">
52160 <summary>
52161 Set the attributes of the ksm devices.
52162 </summary>
52163 @@ -74795,7 +74899,7 @@ Domain allowed access.
52164 </summary>
52165 </param>
52166 </interface>
52167 -<interface name="dev_read_ksm" lineno="2507">
52168 +<interface name="dev_read_ksm" lineno="2543">
52169 <summary>
52170 Read the ksm devices.
52171 </summary>
52172 @@ -74805,7 +74909,7 @@ Domain allowed access.
52173 </summary>
52174 </param>
52175 </interface>
52176 -<interface name="dev_rw_ksm" lineno="2525">
52177 +<interface name="dev_rw_ksm" lineno="2561">
52178 <summary>
52179 Read and write to ksm devices.
52180 </summary>
52181 @@ -74815,7 +74919,7 @@ Domain allowed access.
52182 </summary>
52183 </param>
52184 </interface>
52185 -<interface name="dev_getattr_kvm_dev" lineno="2543">
52186 +<interface name="dev_getattr_kvm_dev" lineno="2579">
52187 <summary>
52188 Get the attributes of the kvm devices.
52189 </summary>
52190 @@ -74825,7 +74929,7 @@ Domain allowed access.
52191 </summary>
52192 </param>
52193 </interface>
52194 -<interface name="dev_setattr_kvm_dev" lineno="2561">
52195 +<interface name="dev_setattr_kvm_dev" lineno="2597">
52196 <summary>
52197 Set the attributes of the kvm devices.
52198 </summary>
52199 @@ -74835,7 +74939,7 @@ Domain allowed access.
52200 </summary>
52201 </param>
52202 </interface>
52203 -<interface name="dev_read_kvm" lineno="2579">
52204 +<interface name="dev_read_kvm" lineno="2615">
52205 <summary>
52206 Read the kvm devices.
52207 </summary>
52208 @@ -74845,7 +74949,7 @@ Domain allowed access.
52209 </summary>
52210 </param>
52211 </interface>
52212 -<interface name="dev_rw_kvm" lineno="2597">
52213 +<interface name="dev_rw_kvm" lineno="2633">
52214 <summary>
52215 Read and write to kvm devices.
52216 </summary>
52217 @@ -74855,7 +74959,7 @@ Domain allowed access.
52218 </summary>
52219 </param>
52220 </interface>
52221 -<interface name="dev_read_lirc" lineno="2615">
52222 +<interface name="dev_read_lirc" lineno="2651">
52223 <summary>
52224 Read the lirc device.
52225 </summary>
52226 @@ -74865,7 +74969,7 @@ Domain allowed access.
52227 </summary>
52228 </param>
52229 </interface>
52230 -<interface name="dev_rw_lirc" lineno="2633">
52231 +<interface name="dev_rw_lirc" lineno="2669">
52232 <summary>
52233 Read and write the lirc device.
52234 </summary>
52235 @@ -74875,7 +74979,7 @@ Domain allowed access.
52236 </summary>
52237 </param>
52238 </interface>
52239 -<interface name="dev_filetrans_lirc" lineno="2657">
52240 +<interface name="dev_filetrans_lirc" lineno="2693">
52241 <summary>
52242 Automatic type transition to the type
52243 for lirc device nodes when created in /dev.
52244 @@ -74891,7 +74995,7 @@ The name of the object being created.
52245 </summary>
52246 </param>
52247 </interface>
52248 -<interface name="dev_rw_loop_control" lineno="2675">
52249 +<interface name="dev_rw_loop_control" lineno="2711">
52250 <summary>
52251 Read and write the loop-control device.
52252 </summary>
52253 @@ -74901,7 +75005,7 @@ Domain allowed access.
52254 </summary>
52255 </param>
52256 </interface>
52257 -<interface name="dev_getattr_lvm_control" lineno="2693">
52258 +<interface name="dev_getattr_lvm_control" lineno="2729">
52259 <summary>
52260 Get the attributes of the lvm comtrol device.
52261 </summary>
52262 @@ -74911,7 +75015,7 @@ Domain allowed access.
52263 </summary>
52264 </param>
52265 </interface>
52266 -<interface name="dev_read_lvm_control" lineno="2711">
52267 +<interface name="dev_read_lvm_control" lineno="2747">
52268 <summary>
52269 Read the lvm comtrol device.
52270 </summary>
52271 @@ -74921,7 +75025,7 @@ Domain allowed access.
52272 </summary>
52273 </param>
52274 </interface>
52275 -<interface name="dev_rw_lvm_control" lineno="2729">
52276 +<interface name="dev_rw_lvm_control" lineno="2765">
52277 <summary>
52278 Read and write the lvm control device.
52279 </summary>
52280 @@ -74931,7 +75035,7 @@ Domain allowed access.
52281 </summary>
52282 </param>
52283 </interface>
52284 -<interface name="dev_dontaudit_rw_lvm_control" lineno="2747">
52285 +<interface name="dev_dontaudit_rw_lvm_control" lineno="2783">
52286 <summary>
52287 Do not audit attempts to read and write lvm control device.
52288 </summary>
52289 @@ -74941,7 +75045,7 @@ Domain to not audit.
52290 </summary>
52291 </param>
52292 </interface>
52293 -<interface name="dev_delete_lvm_control_dev" lineno="2765">
52294 +<interface name="dev_delete_lvm_control_dev" lineno="2801">
52295 <summary>
52296 Delete the lvm control device.
52297 </summary>
52298 @@ -74951,7 +75055,7 @@ Domain allowed access.
52299 </summary>
52300 </param>
52301 </interface>
52302 -<interface name="dev_dontaudit_getattr_memory_dev" lineno="2783">
52303 +<interface name="dev_dontaudit_getattr_memory_dev" lineno="2819">
52304 <summary>
52305 dontaudit getattr raw memory devices (e.g. /dev/mem).
52306 </summary>
52307 @@ -74961,7 +75065,7 @@ Domain to not audit.
52308 </summary>
52309 </param>
52310 </interface>
52311 -<interface name="dev_read_raw_memory" lineno="2804">
52312 +<interface name="dev_read_raw_memory" lineno="2840">
52313 <summary>
52314 Read raw memory devices (e.g. /dev/mem).
52315 This is extremely dangerous as it can bypass the
52316 @@ -74974,7 +75078,7 @@ Domain allowed access.
52317 </summary>
52318 </param>
52319 </interface>
52320 -<interface name="dev_read_raw_memory_cond" lineno="2834">
52321 +<interface name="dev_read_raw_memory_cond" lineno="2870">
52322 <summary>
52323 Read raw memory devices (e.g. /dev/mem) if a tunable is set.
52324 This is extremely dangerous as it can bypass the
52325 @@ -74992,7 +75096,7 @@ Tunable to depend on
52326 </summary>
52327 </param>
52328 </interface>
52329 -<interface name="dev_dontaudit_read_raw_memory" lineno="2861">
52330 +<interface name="dev_dontaudit_read_raw_memory" lineno="2897">
52331 <summary>
52332 Do not audit attempts to read raw memory devices
52333 (e.g. /dev/mem).
52334 @@ -75006,7 +75110,7 @@ Domain to not audit.
52335 </summary>
52336 </param>
52337 </interface>
52338 -<interface name="dev_write_raw_memory" lineno="2882">
52339 +<interface name="dev_write_raw_memory" lineno="2918">
52340 <summary>
52341 Write raw memory devices (e.g. /dev/mem).
52342 This is extremely dangerous as it can bypass the
52343 @@ -75019,7 +75123,7 @@ Domain allowed access.
52344 </summary>
52345 </param>
52346 </interface>
52347 -<interface name="dev_write_raw_memory_cond" lineno="2912">
52348 +<interface name="dev_write_raw_memory_cond" lineno="2948">
52349 <summary>
52350 Write raw memory devices (e.g. /dev/mem) if a tunable is set.
52351 This is extremely dangerous as it can bypass the
52352 @@ -75037,7 +75141,7 @@ Tunable to depend on
52353 </summary>
52354 </param>
52355 </interface>
52356 -<interface name="dev_rx_raw_memory" lineno="2938">
52357 +<interface name="dev_rx_raw_memory" lineno="2974">
52358 <summary>
52359 Read and execute raw memory devices (e.g. /dev/mem).
52360 This is extremely dangerous as it can bypass the
52361 @@ -75050,7 +75154,7 @@ Domain allowed access.
52362 </summary>
52363 </param>
52364 </interface>
52365 -<interface name="dev_wx_raw_memory" lineno="2960">
52366 +<interface name="dev_wx_raw_memory" lineno="2996">
52367 <summary>
52368 Write and execute raw memory devices (e.g. /dev/mem).
52369 This is extremely dangerous as it can bypass the
52370 @@ -75063,7 +75167,7 @@ Domain allowed access.
52371 </summary>
52372 </param>
52373 </interface>
52374 -<interface name="dev_wx_raw_memory_cond" lineno="2987">
52375 +<interface name="dev_wx_raw_memory_cond" lineno="3023">
52376 <summary>
52377 Write and execute raw memory devices (e.g. /dev/mem) if a tunable is set.
52378 This is extremely dangerous as it can bypass the
52379 @@ -75081,7 +75185,7 @@ Tunable to depend on
52380 </summary>
52381 </param>
52382 </interface>
52383 -<interface name="dev_getattr_misc_dev" lineno="3010">
52384 +<interface name="dev_getattr_misc_dev" lineno="3046">
52385 <summary>
52386 Get the attributes of miscellaneous devices.
52387 </summary>
52388 @@ -75091,7 +75195,7 @@ Domain allowed access.
52389 </summary>
52390 </param>
52391 </interface>
52392 -<interface name="dev_dontaudit_getattr_misc_dev" lineno="3029">
52393 +<interface name="dev_dontaudit_getattr_misc_dev" lineno="3065">
52394 <summary>
52395 Do not audit attempts to get the attributes
52396 of miscellaneous devices.
52397 @@ -75102,7 +75206,7 @@ Domain to not audit.
52398 </summary>
52399 </param>
52400 </interface>
52401 -<interface name="dev_setattr_misc_dev" lineno="3047">
52402 +<interface name="dev_setattr_misc_dev" lineno="3083">
52403 <summary>
52404 Set the attributes of miscellaneous devices.
52405 </summary>
52406 @@ -75112,7 +75216,7 @@ Domain allowed access.
52407 </summary>
52408 </param>
52409 </interface>
52410 -<interface name="dev_dontaudit_setattr_misc_dev" lineno="3066">
52411 +<interface name="dev_dontaudit_setattr_misc_dev" lineno="3102">
52412 <summary>
52413 Do not audit attempts to set the attributes
52414 of miscellaneous devices.
52415 @@ -75123,7 +75227,7 @@ Domain to not audit.
52416 </summary>
52417 </param>
52418 </interface>
52419 -<interface name="dev_read_misc" lineno="3084">
52420 +<interface name="dev_read_misc" lineno="3120">
52421 <summary>
52422 Read miscellaneous devices.
52423 </summary>
52424 @@ -75133,7 +75237,7 @@ Domain allowed access.
52425 </summary>
52426 </param>
52427 </interface>
52428 -<interface name="dev_write_misc" lineno="3102">
52429 +<interface name="dev_write_misc" lineno="3138">
52430 <summary>
52431 Write miscellaneous devices.
52432 </summary>
52433 @@ -75143,7 +75247,7 @@ Domain allowed access.
52434 </summary>
52435 </param>
52436 </interface>
52437 -<interface name="dev_dontaudit_rw_misc" lineno="3120">
52438 +<interface name="dev_dontaudit_rw_misc" lineno="3156">
52439 <summary>
52440 Do not audit attempts to read and write miscellaneous devices.
52441 </summary>
52442 @@ -75153,7 +75257,7 @@ Domain allowed access.
52443 </summary>
52444 </param>
52445 </interface>
52446 -<interface name="dev_getattr_modem_dev" lineno="3138">
52447 +<interface name="dev_getattr_modem_dev" lineno="3174">
52448 <summary>
52449 Get the attributes of the modem devices.
52450 </summary>
52451 @@ -75163,7 +75267,7 @@ Domain allowed access.
52452 </summary>
52453 </param>
52454 </interface>
52455 -<interface name="dev_setattr_modem_dev" lineno="3156">
52456 +<interface name="dev_setattr_modem_dev" lineno="3192">
52457 <summary>
52458 Set the attributes of the modem devices.
52459 </summary>
52460 @@ -75173,7 +75277,7 @@ Domain allowed access.
52461 </summary>
52462 </param>
52463 </interface>
52464 -<interface name="dev_read_modem" lineno="3174">
52465 +<interface name="dev_read_modem" lineno="3210">
52466 <summary>
52467 Read the modem devices.
52468 </summary>
52469 @@ -75183,7 +75287,7 @@ Domain allowed access.
52470 </summary>
52471 </param>
52472 </interface>
52473 -<interface name="dev_rw_modem" lineno="3192">
52474 +<interface name="dev_rw_modem" lineno="3228">
52475 <summary>
52476 Read and write to modem devices.
52477 </summary>
52478 @@ -75193,7 +75297,7 @@ Domain allowed access.
52479 </summary>
52480 </param>
52481 </interface>
52482 -<interface name="dev_getattr_mouse_dev" lineno="3210">
52483 +<interface name="dev_getattr_mouse_dev" lineno="3246">
52484 <summary>
52485 Get the attributes of the mouse devices.
52486 </summary>
52487 @@ -75203,7 +75307,7 @@ Domain allowed access.
52488 </summary>
52489 </param>
52490 </interface>
52491 -<interface name="dev_setattr_mouse_dev" lineno="3228">
52492 +<interface name="dev_setattr_mouse_dev" lineno="3264">
52493 <summary>
52494 Set the attributes of the mouse devices.
52495 </summary>
52496 @@ -75213,7 +75317,7 @@ Domain allowed access.
52497 </summary>
52498 </param>
52499 </interface>
52500 -<interface name="dev_read_mouse" lineno="3246">
52501 +<interface name="dev_read_mouse" lineno="3282">
52502 <summary>
52503 Read the mouse devices.
52504 </summary>
52505 @@ -75223,7 +75327,7 @@ Domain allowed access.
52506 </summary>
52507 </param>
52508 </interface>
52509 -<interface name="dev_rw_mouse" lineno="3264">
52510 +<interface name="dev_rw_mouse" lineno="3300">
52511 <summary>
52512 Read and write to mouse devices.
52513 </summary>
52514 @@ -75233,7 +75337,7 @@ Domain allowed access.
52515 </summary>
52516 </param>
52517 </interface>
52518 -<interface name="dev_getattr_mtrr_dev" lineno="3283">
52519 +<interface name="dev_getattr_mtrr_dev" lineno="3319">
52520 <summary>
52521 Get the attributes of the memory type range
52522 registers (MTRR) device.
52523 @@ -75244,7 +75348,7 @@ Domain allowed access.
52524 </summary>
52525 </param>
52526 </interface>
52527 -<interface name="dev_dontaudit_write_mtrr" lineno="3303">
52528 +<interface name="dev_dontaudit_write_mtrr" lineno="3339">
52529 <summary>
52530 Do not audit attempts to write the memory type
52531 range registers (MTRR).
52532 @@ -75255,7 +75359,7 @@ Domain to not audit.
52533 </summary>
52534 </param>
52535 </interface>
52536 -<interface name="dev_rw_mtrr" lineno="3322">
52537 +<interface name="dev_rw_mtrr" lineno="3358">
52538 <summary>
52539 Read and write the memory type range registers (MTRR).
52540 </summary>
52541 @@ -75265,7 +75369,7 @@ Domain allowed access.
52542 </summary>
52543 </param>
52544 </interface>
52545 -<interface name="dev_getattr_netcontrol_dev" lineno="3341">
52546 +<interface name="dev_getattr_netcontrol_dev" lineno="3377">
52547 <summary>
52548 Get the attributes of the network control device (Deprecated)
52549 </summary>
52550 @@ -75275,7 +75379,7 @@ Domain allowed access.
52551 </summary>
52552 </param>
52553 </interface>
52554 -<interface name="dev_read_netcontrol" lineno="3356">
52555 +<interface name="dev_read_netcontrol" lineno="3392">
52556 <summary>
52557 Read the network control identity. (Deprecated)
52558 </summary>
52559 @@ -75285,7 +75389,7 @@ Domain allowed access.
52560 </summary>
52561 </param>
52562 </interface>
52563 -<interface name="dev_rw_netcontrol" lineno="3371">
52564 +<interface name="dev_rw_netcontrol" lineno="3407">
52565 <summary>
52566 Read and write the the network control device. (Deprecated)
52567 </summary>
52568 @@ -75295,7 +75399,7 @@ Domain allowed access.
52569 </summary>
52570 </param>
52571 </interface>
52572 -<interface name="dev_getattr_null_dev" lineno="3386">
52573 +<interface name="dev_getattr_null_dev" lineno="3422">
52574 <summary>
52575 Get the attributes of the null device nodes.
52576 </summary>
52577 @@ -75305,7 +75409,7 @@ Domain allowed access.
52578 </summary>
52579 </param>
52580 </interface>
52581 -<interface name="dev_setattr_null_dev" lineno="3404">
52582 +<interface name="dev_setattr_null_dev" lineno="3440">
52583 <summary>
52584 Set the attributes of the null device nodes.
52585 </summary>
52586 @@ -75315,7 +75419,7 @@ Domain allowed access.
52587 </summary>
52588 </param>
52589 </interface>
52590 -<interface name="dev_dontaudit_setattr_null_dev" lineno="3423">
52591 +<interface name="dev_dontaudit_setattr_null_dev" lineno="3459">
52592 <summary>
52593 Do not audit attempts to set the attributes of
52594 the null device nodes.
52595 @@ -75326,7 +75430,7 @@ Domain to not audit.
52596 </summary>
52597 </param>
52598 </interface>
52599 -<interface name="dev_delete_null" lineno="3441">
52600 +<interface name="dev_delete_null" lineno="3477">
52601 <summary>
52602 Delete the null device (/dev/null).
52603 </summary>
52604 @@ -75336,7 +75440,7 @@ Domain allowed access.
52605 </summary>
52606 </param>
52607 </interface>
52608 -<interface name="dev_rw_null" lineno="3459">
52609 +<interface name="dev_rw_null" lineno="3495">
52610 <summary>
52611 Read and write to the null device (/dev/null).
52612 </summary>
52613 @@ -75346,7 +75450,7 @@ Domain allowed access.
52614 </summary>
52615 </param>
52616 </interface>
52617 -<interface name="dev_create_null_dev" lineno="3477">
52618 +<interface name="dev_create_null_dev" lineno="3513">
52619 <summary>
52620 Create the null device (/dev/null).
52621 </summary>
52622 @@ -75356,7 +75460,7 @@ Domain allowed access.
52623 </summary>
52624 </param>
52625 </interface>
52626 -<interface name="dev_manage_null_service" lineno="3496">
52627 +<interface name="dev_manage_null_service" lineno="3532">
52628 <summary>
52629 Manage services with script type null_device_t for when
52630 /lib/systemd/system/something.service is a link to /dev/null
52631 @@ -75367,7 +75471,7 @@ Domain allowed access.
52632 </summary>
52633 </param>
52634 </interface>
52635 -<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3516">
52636 +<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3552">
52637 <summary>
52638 Do not audit attempts to get the attributes
52639 of the BIOS non-volatile RAM device.
52640 @@ -75378,7 +75482,7 @@ Domain to not audit.
52641 </summary>
52642 </param>
52643 </interface>
52644 -<interface name="dev_rw_nvram" lineno="3534">
52645 +<interface name="dev_rw_nvram" lineno="3570">
52646 <summary>
52647 Read and write BIOS non-volatile RAM.
52648 </summary>
52649 @@ -75388,7 +75492,7 @@ Domain allowed access.
52650 </summary>
52651 </param>
52652 </interface>
52653 -<interface name="dev_getattr_printer_dev" lineno="3552">
52654 +<interface name="dev_getattr_printer_dev" lineno="3588">
52655 <summary>
52656 Get the attributes of the printer device nodes.
52657 </summary>
52658 @@ -75398,7 +75502,7 @@ Domain allowed access.
52659 </summary>
52660 </param>
52661 </interface>
52662 -<interface name="dev_setattr_printer_dev" lineno="3570">
52663 +<interface name="dev_setattr_printer_dev" lineno="3606">
52664 <summary>
52665 Set the attributes of the printer device nodes.
52666 </summary>
52667 @@ -75408,7 +75512,7 @@ Domain allowed access.
52668 </summary>
52669 </param>
52670 </interface>
52671 -<interface name="dev_append_printer" lineno="3589">
52672 +<interface name="dev_append_printer" lineno="3625">
52673 <summary>
52674 Append the printer device.
52675 </summary>
52676 @@ -75418,7 +75522,7 @@ Domain allowed access.
52677 </summary>
52678 </param>
52679 </interface>
52680 -<interface name="dev_rw_printer" lineno="3607">
52681 +<interface name="dev_rw_printer" lineno="3643">
52682 <summary>
52683 Read and write the printer device.
52684 </summary>
52685 @@ -75428,7 +75532,7 @@ Domain allowed access.
52686 </summary>
52687 </param>
52688 </interface>
52689 -<interface name="dev_getattr_pmqos_dev" lineno="3625">
52690 +<interface name="dev_getattr_pmqos_dev" lineno="3661">
52691 <summary>
52692 Get the attributes of PM QoS devices
52693 </summary>
52694 @@ -75438,7 +75542,7 @@ Domain allowed access.
52695 </summary>
52696 </param>
52697 </interface>
52698 -<interface name="dev_read_pmqos" lineno="3643">
52699 +<interface name="dev_read_pmqos" lineno="3679">
52700 <summary>
52701 Read the PM QoS devices.
52702 </summary>
52703 @@ -75448,7 +75552,7 @@ Domain allowed access.
52704 </summary>
52705 </param>
52706 </interface>
52707 -<interface name="dev_rw_pmqos" lineno="3661">
52708 +<interface name="dev_rw_pmqos" lineno="3697">
52709 <summary>
52710 Read and write the the PM QoS devices.
52711 </summary>
52712 @@ -75458,7 +75562,7 @@ Domain allowed access.
52713 </summary>
52714 </param>
52715 </interface>
52716 -<interface name="dev_getattr_qemu_dev" lineno="3680">
52717 +<interface name="dev_getattr_qemu_dev" lineno="3716">
52718 <summary>
52719 Get the attributes of the QEMU
52720 microcode and id interfaces.
52721 @@ -75469,7 +75573,7 @@ Domain allowed access.
52722 </summary>
52723 </param>
52724 </interface>
52725 -<interface name="dev_setattr_qemu_dev" lineno="3699">
52726 +<interface name="dev_setattr_qemu_dev" lineno="3735">
52727 <summary>
52728 Set the attributes of the QEMU
52729 microcode and id interfaces.
52730 @@ -75480,7 +75584,7 @@ Domain allowed access.
52731 </summary>
52732 </param>
52733 </interface>
52734 -<interface name="dev_read_qemu" lineno="3717">
52735 +<interface name="dev_read_qemu" lineno="3753">
52736 <summary>
52737 Read the QEMU device
52738 </summary>
52739 @@ -75490,7 +75594,7 @@ Domain allowed access.
52740 </summary>
52741 </param>
52742 </interface>
52743 -<interface name="dev_rw_qemu" lineno="3735">
52744 +<interface name="dev_rw_qemu" lineno="3771">
52745 <summary>
52746 Read and write the the QEMU device.
52747 </summary>
52748 @@ -75500,7 +75604,7 @@ Domain allowed access.
52749 </summary>
52750 </param>
52751 </interface>
52752 -<interface name="dev_read_rand" lineno="3769">
52753 +<interface name="dev_read_rand" lineno="3805">
52754 <summary>
52755 Read from random number generator
52756 devices (e.g., /dev/random).
52757 @@ -75526,7 +75630,7 @@ Domain allowed access.
52758 </param>
52759 <infoflow type="read" weight="10"/>
52760 </interface>
52761 -<interface name="dev_dontaudit_read_rand" lineno="3788">
52762 +<interface name="dev_dontaudit_read_rand" lineno="3824">
52763 <summary>
52764 Do not audit attempts to read from random
52765 number generator devices (e.g., /dev/random)
52766 @@ -75537,7 +75641,7 @@ Domain to not audit.
52767 </summary>
52768 </param>
52769 </interface>
52770 -<interface name="dev_dontaudit_append_rand" lineno="3807">
52771 +<interface name="dev_dontaudit_append_rand" lineno="3843">
52772 <summary>
52773 Do not audit attempts to append to random
52774 number generator devices (e.g., /dev/random)
52775 @@ -75548,7 +75652,7 @@ Domain to not audit.
52776 </summary>
52777 </param>
52778 </interface>
52779 -<interface name="dev_write_rand" lineno="3827">
52780 +<interface name="dev_write_rand" lineno="3863">
52781 <summary>
52782 Write to the random device (e.g., /dev/random). This adds
52783 entropy used to generate the random data read from the
52784 @@ -75560,7 +75664,7 @@ Domain allowed access.
52785 </summary>
52786 </param>
52787 </interface>
52788 -<interface name="dev_create_rand_dev" lineno="3845">
52789 +<interface name="dev_create_rand_dev" lineno="3881">
52790 <summary>
52791 Create the random device (/dev/random).
52792 </summary>
52793 @@ -75570,7 +75674,7 @@ Domain allowed access.
52794 </summary>
52795 </param>
52796 </interface>
52797 -<interface name="dev_read_realtime_clock" lineno="3863">
52798 +<interface name="dev_read_realtime_clock" lineno="3899">
52799 <summary>
52800 Read the realtime clock (/dev/rtc).
52801 </summary>
52802 @@ -75580,7 +75684,7 @@ Domain allowed access.
52803 </summary>
52804 </param>
52805 </interface>
52806 -<interface name="dev_write_realtime_clock" lineno="3881">
52807 +<interface name="dev_write_realtime_clock" lineno="3917">
52808 <summary>
52809 Set the realtime clock (/dev/rtc).
52810 </summary>
52811 @@ -75590,7 +75694,7 @@ Domain allowed access.
52812 </summary>
52813 </param>
52814 </interface>
52815 -<interface name="dev_rw_realtime_clock" lineno="3901">
52816 +<interface name="dev_rw_realtime_clock" lineno="3937">
52817 <summary>
52818 Read and set the realtime clock (/dev/rtc).
52819 </summary>
52820 @@ -75600,7 +75704,7 @@ Domain allowed access.
52821 </summary>
52822 </param>
52823 </interface>
52824 -<interface name="dev_getattr_scanner_dev" lineno="3916">
52825 +<interface name="dev_getattr_scanner_dev" lineno="3952">
52826 <summary>
52827 Get the attributes of the scanner device.
52828 </summary>
52829 @@ -75610,7 +75714,7 @@ Domain allowed access.
52830 </summary>
52831 </param>
52832 </interface>
52833 -<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3935">
52834 +<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3971">
52835 <summary>
52836 Do not audit attempts to get the attributes of
52837 the scanner device.
52838 @@ -75621,7 +75725,7 @@ Domain to not audit.
52839 </summary>
52840 </param>
52841 </interface>
52842 -<interface name="dev_setattr_scanner_dev" lineno="3953">
52843 +<interface name="dev_setattr_scanner_dev" lineno="3989">
52844 <summary>
52845 Set the attributes of the scanner device.
52846 </summary>
52847 @@ -75631,7 +75735,7 @@ Domain allowed access.
52848 </summary>
52849 </param>
52850 </interface>
52851 -<interface name="dev_dontaudit_setattr_scanner_dev" lineno="3972">
52852 +<interface name="dev_dontaudit_setattr_scanner_dev" lineno="4008">
52853 <summary>
52854 Do not audit attempts to set the attributes of
52855 the scanner device.
52856 @@ -75642,7 +75746,7 @@ Domain to not audit.
52857 </summary>
52858 </param>
52859 </interface>
52860 -<interface name="dev_rw_scanner" lineno="3990">
52861 +<interface name="dev_rw_scanner" lineno="4026">
52862 <summary>
52863 Read and write the scanner device.
52864 </summary>
52865 @@ -75652,7 +75756,7 @@ Domain allowed access.
52866 </summary>
52867 </param>
52868 </interface>
52869 -<interface name="dev_getattr_sound_dev" lineno="4008">
52870 +<interface name="dev_getattr_sound_dev" lineno="4044">
52871 <summary>
52872 Get the attributes of the sound devices.
52873 </summary>
52874 @@ -75662,7 +75766,7 @@ Domain allowed access.
52875 </summary>
52876 </param>
52877 </interface>
52878 -<interface name="dev_setattr_sound_dev" lineno="4026">
52879 +<interface name="dev_setattr_sound_dev" lineno="4062">
52880 <summary>
52881 Set the attributes of the sound devices.
52882 </summary>
52883 @@ -75672,7 +75776,7 @@ Domain allowed access.
52884 </summary>
52885 </param>
52886 </interface>
52887 -<interface name="dev_read_sound" lineno="4044">
52888 +<interface name="dev_read_sound" lineno="4080">
52889 <summary>
52890 Read the sound devices.
52891 </summary>
52892 @@ -75682,7 +75786,7 @@ Domain allowed access.
52893 </summary>
52894 </param>
52895 </interface>
52896 -<interface name="dev_write_sound" lineno="4063">
52897 +<interface name="dev_write_sound" lineno="4099">
52898 <summary>
52899 Write the sound devices.
52900 </summary>
52901 @@ -75692,7 +75796,7 @@ Domain allowed access.
52902 </summary>
52903 </param>
52904 </interface>
52905 -<interface name="dev_read_sound_mixer" lineno="4082">
52906 +<interface name="dev_read_sound_mixer" lineno="4118">
52907 <summary>
52908 Read the sound mixer devices.
52909 </summary>
52910 @@ -75702,7 +75806,7 @@ Domain allowed access.
52911 </summary>
52912 </param>
52913 </interface>
52914 -<interface name="dev_write_sound_mixer" lineno="4101">
52915 +<interface name="dev_write_sound_mixer" lineno="4137">
52916 <summary>
52917 Write the sound mixer devices.
52918 </summary>
52919 @@ -75712,7 +75816,7 @@ Domain allowed access.
52920 </summary>
52921 </param>
52922 </interface>
52923 -<interface name="dev_getattr_power_mgmt_dev" lineno="4120">
52924 +<interface name="dev_getattr_power_mgmt_dev" lineno="4156">
52925 <summary>
52926 Get the attributes of the the power management device.
52927 </summary>
52928 @@ -75722,7 +75826,7 @@ Domain allowed access.
52929 </summary>
52930 </param>
52931 </interface>
52932 -<interface name="dev_setattr_power_mgmt_dev" lineno="4138">
52933 +<interface name="dev_setattr_power_mgmt_dev" lineno="4174">
52934 <summary>
52935 Set the attributes of the the power management device.
52936 </summary>
52937 @@ -75732,7 +75836,7 @@ Domain allowed access.
52938 </summary>
52939 </param>
52940 </interface>
52941 -<interface name="dev_rw_power_management" lineno="4156">
52942 +<interface name="dev_rw_power_management" lineno="4192">
52943 <summary>
52944 Read and write the the power management device.
52945 </summary>
52946 @@ -75742,7 +75846,7 @@ Domain allowed access.
52947 </summary>
52948 </param>
52949 </interface>
52950 -<interface name="dev_getattr_smartcard_dev" lineno="4174">
52951 +<interface name="dev_getattr_smartcard_dev" lineno="4210">
52952 <summary>
52953 Getattr on smartcard devices
52954 </summary>
52955 @@ -75752,7 +75856,7 @@ Domain allowed access.
52956 </summary>
52957 </param>
52958 </interface>
52959 -<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4193">
52960 +<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4229">
52961 <summary>
52962 dontaudit getattr on smartcard devices
52963 </summary>
52964 @@ -75762,7 +75866,7 @@ Domain to not audit.
52965 </summary>
52966 </param>
52967 </interface>
52968 -<interface name="dev_rw_smartcard" lineno="4212">
52969 +<interface name="dev_rw_smartcard" lineno="4248">
52970 <summary>
52971 Read and write smartcard devices.
52972 </summary>
52973 @@ -75772,7 +75876,7 @@ Domain allowed access.
52974 </summary>
52975 </param>
52976 </interface>
52977 -<interface name="dev_manage_smartcard" lineno="4230">
52978 +<interface name="dev_manage_smartcard" lineno="4266">
52979 <summary>
52980 Create, read, write, and delete smartcard devices.
52981 </summary>
52982 @@ -75782,7 +75886,7 @@ Domain allowed access.
52983 </summary>
52984 </param>
52985 </interface>
52986 -<interface name="dev_rw_sysdig" lineno="4248">
52987 +<interface name="dev_rw_sysdig" lineno="4284">
52988 <summary>
52989 Read, write and map the sysdig device.
52990 </summary>
52991 @@ -75792,7 +75896,7 @@ Domain allowed access.
52992 </summary>
52993 </param>
52994 </interface>
52995 -<interface name="dev_mounton_sysfs" lineno="4267">
52996 +<interface name="dev_mounton_sysfs" lineno="4303">
52997 <summary>
52998 Mount a filesystem on sysfs. (Deprecated)
52999 </summary>
53000 @@ -75802,7 +75906,7 @@ Domain allow access.
53001 </summary>
53002 </param>
53003 </interface>
53004 -<interface name="dev_associate_sysfs" lineno="4282">
53005 +<interface name="dev_associate_sysfs" lineno="4318">
53006 <summary>
53007 Associate a file to a sysfs filesystem.
53008 </summary>
53009 @@ -75812,7 +75916,7 @@ The type of the file to be associated to sysfs.
53010 </summary>
53011 </param>
53012 </interface>
53013 -<interface name="dev_getattr_sysfs_dirs" lineno="4300">
53014 +<interface name="dev_getattr_sysfs_dirs" lineno="4336">
53015 <summary>
53016 Get the attributes of sysfs directories.
53017 </summary>
53018 @@ -75822,7 +75926,7 @@ Domain allowed access.
53019 </summary>
53020 </param>
53021 </interface>
53022 -<interface name="dev_getattr_sysfs" lineno="4318">
53023 +<interface name="dev_getattr_sysfs" lineno="4354">
53024 <summary>
53025 Get the attributes of sysfs filesystem
53026 </summary>
53027 @@ -75832,7 +75936,7 @@ Domain allowed access.
53028 </summary>
53029 </param>
53030 </interface>
53031 -<interface name="dev_mount_sysfs" lineno="4336">
53032 +<interface name="dev_mount_sysfs" lineno="4372">
53033 <summary>
53034 mount a sysfs filesystem
53035 </summary>
53036 @@ -75842,7 +75946,7 @@ Domain allowed access.
53037 </summary>
53038 </param>
53039 </interface>
53040 -<interface name="dev_remount_sysfs" lineno="4354">
53041 +<interface name="dev_remount_sysfs" lineno="4390">
53042 <summary>
53043 Remount a sysfs filesystem.
53044 </summary>
53045 @@ -75852,7 +75956,7 @@ Domain allow access.
53046 </summary>
53047 </param>
53048 </interface>
53049 -<interface name="dev_dontaudit_getattr_sysfs" lineno="4372">
53050 +<interface name="dev_dontaudit_getattr_sysfs" lineno="4408">
53051 <summary>
53052 Do not audit getting the attributes of sysfs filesystem
53053 </summary>
53054 @@ -75862,7 +75966,7 @@ Domain to dontaudit access from
53055 </summary>
53056 </param>
53057 </interface>
53058 -<interface name="dev_dontaudit_read_sysfs" lineno="4390">
53059 +<interface name="dev_dontaudit_read_sysfs" lineno="4426">
53060 <summary>
53061 Dont audit attempts to read hardware state information
53062 </summary>
53063 @@ -75872,7 +75976,7 @@ Domain for which the attempts do not need to be audited
53064 </summary>
53065 </param>
53066 </interface>
53067 -<interface name="dev_mounton_sysfs_dirs" lineno="4410">
53068 +<interface name="dev_mounton_sysfs_dirs" lineno="4446">
53069 <summary>
53070 Mount on sysfs directories.
53071 </summary>
53072 @@ -75882,7 +75986,7 @@ Domain allowed access.
53073 </summary>
53074 </param>
53075 </interface>
53076 -<interface name="dev_search_sysfs" lineno="4428">
53077 +<interface name="dev_search_sysfs" lineno="4464">
53078 <summary>
53079 Search the sysfs directories.
53080 </summary>
53081 @@ -75892,7 +75996,7 @@ Domain allowed access.
53082 </summary>
53083 </param>
53084 </interface>
53085 -<interface name="dev_dontaudit_search_sysfs" lineno="4446">
53086 +<interface name="dev_dontaudit_search_sysfs" lineno="4482">
53087 <summary>
53088 Do not audit attempts to search sysfs.
53089 </summary>
53090 @@ -75902,7 +76006,7 @@ Domain to not audit.
53091 </summary>
53092 </param>
53093 </interface>
53094 -<interface name="dev_list_sysfs" lineno="4464">
53095 +<interface name="dev_list_sysfs" lineno="4500">
53096 <summary>
53097 List the contents of the sysfs directories.
53098 </summary>
53099 @@ -75912,7 +76016,7 @@ Domain allowed access.
53100 </summary>
53101 </param>
53102 </interface>
53103 -<interface name="dev_write_sysfs_dirs" lineno="4483">
53104 +<interface name="dev_write_sysfs_dirs" lineno="4519">
53105 <summary>
53106 Write in a sysfs directories.
53107 </summary>
53108 @@ -75922,7 +76026,7 @@ Domain allowed access.
53109 </summary>
53110 </param>
53111 </interface>
53112 -<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4501">
53113 +<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4537">
53114 <summary>
53115 Do not audit attempts to write in a sysfs directory.
53116 </summary>
53117 @@ -75932,7 +76036,7 @@ Domain to not audit.
53118 </summary>
53119 </param>
53120 </interface>
53121 -<interface name="dev_dontaudit_write_sysfs_files" lineno="4519">
53122 +<interface name="dev_dontaudit_write_sysfs_files" lineno="4555">
53123 <summary>
53124 Do not audit attempts to write to a sysfs file.
53125 </summary>
53126 @@ -75942,7 +76046,7 @@ Domain to not audit.
53127 </summary>
53128 </param>
53129 </interface>
53130 -<interface name="dev_manage_sysfs_dirs" lineno="4538">
53131 +<interface name="dev_manage_sysfs_dirs" lineno="4574">
53132 <summary>
53133 Create, read, write, and delete sysfs
53134 directories.
53135 @@ -75953,7 +76057,7 @@ Domain allowed access.
53136 </summary>
53137 </param>
53138 </interface>
53139 -<interface name="dev_read_sysfs" lineno="4565">
53140 +<interface name="dev_read_sysfs" lineno="4601">
53141 <summary>
53142 Read hardware state information.
53143 </summary>
53144 @@ -75972,7 +76076,7 @@ Domain allowed access.
53145 </param>
53146 <infoflow type="read" weight="10"/>
53147 </interface>
53148 -<interface name="dev_write_sysfs" lineno="4593">
53149 +<interface name="dev_write_sysfs" lineno="4629">
53150 <summary>
53151 Write to hardware state information.
53152 </summary>
53153 @@ -75989,7 +76093,7 @@ Domain allowed access.
53154 </param>
53155 <infoflow type="read" weight="10"/>
53156 </interface>
53157 -<interface name="dev_rw_sysfs" lineno="4612">
53158 +<interface name="dev_rw_sysfs" lineno="4648">
53159 <summary>
53160 Allow caller to modify hardware state information.
53161 </summary>
53162 @@ -75999,7 +76103,7 @@ Domain allowed access.
53163 </summary>
53164 </param>
53165 </interface>
53166 -<interface name="dev_create_sysfs_files" lineno="4633">
53167 +<interface name="dev_create_sysfs_files" lineno="4669">
53168 <summary>
53169 Add a sysfs file
53170 </summary>
53171 @@ -76009,7 +76113,7 @@ Domain allowed access.
53172 </summary>
53173 </param>
53174 </interface>
53175 -<interface name="dev_relabel_sysfs_dirs" lineno="4651">
53176 +<interface name="dev_relabel_sysfs_dirs" lineno="4687">
53177 <summary>
53178 Relabel hardware state directories.
53179 </summary>
53180 @@ -76019,7 +76123,7 @@ Domain allowed access.
53181 </summary>
53182 </param>
53183 </interface>
53184 -<interface name="dev_relabel_all_sysfs" lineno="4669">
53185 +<interface name="dev_relabel_all_sysfs" lineno="4705">
53186 <summary>
53187 Relabel from/to all sysfs types.
53188 </summary>
53189 @@ -76029,7 +76133,7 @@ Domain allowed access.
53190 </summary>
53191 </param>
53192 </interface>
53193 -<interface name="dev_setattr_all_sysfs" lineno="4689">
53194 +<interface name="dev_setattr_all_sysfs" lineno="4725">
53195 <summary>
53196 Set the attributes of sysfs files, directories and symlinks.
53197 </summary>
53198 @@ -76039,7 +76143,7 @@ Domain allowed access.
53199 </summary>
53200 </param>
53201 </interface>
53202 -<interface name="dev_rw_tpm" lineno="4709">
53203 +<interface name="dev_rw_tpm" lineno="4745">
53204 <summary>
53205 Read and write the TPM device.
53206 </summary>
53207 @@ -76049,7 +76153,7 @@ Domain allowed access.
53208 </summary>
53209 </param>
53210 </interface>
53211 -<interface name="dev_read_urand" lineno="4750">
53212 +<interface name="dev_read_urand" lineno="4786">
53213 <summary>
53214 Read from pseudo random number generator devices (e.g., /dev/urandom).
53215 </summary>
53216 @@ -76082,7 +76186,7 @@ Domain allowed access.
53217 </param>
53218 <infoflow type="read" weight="10"/>
53219 </interface>
53220 -<interface name="dev_dontaudit_read_urand" lineno="4769">
53221 +<interface name="dev_dontaudit_read_urand" lineno="4805">
53222 <summary>
53223 Do not audit attempts to read from pseudo
53224 random devices (e.g., /dev/urandom)
53225 @@ -76093,7 +76197,7 @@ Domain to not audit.
53226 </summary>
53227 </param>
53228 </interface>
53229 -<interface name="dev_write_urand" lineno="4788">
53230 +<interface name="dev_write_urand" lineno="4824">
53231 <summary>
53232 Write to the pseudo random device (e.g., /dev/urandom). This
53233 sets the random number generator seed.
53234 @@ -76104,7 +76208,7 @@ Domain allowed access.
53235 </summary>
53236 </param>
53237 </interface>
53238 -<interface name="dev_create_urand_dev" lineno="4806">
53239 +<interface name="dev_create_urand_dev" lineno="4842">
53240 <summary>
53241 Create the urandom device (/dev/urandom).
53242 </summary>
53243 @@ -76114,7 +76218,7 @@ Domain allowed access.
53244 </summary>
53245 </param>
53246 </interface>
53247 -<interface name="dev_getattr_generic_usb_dev" lineno="4824">
53248 +<interface name="dev_getattr_generic_usb_dev" lineno="4860">
53249 <summary>
53250 Getattr generic the USB devices.
53251 </summary>
53252 @@ -76124,7 +76228,7 @@ Domain allowed access.
53253 </summary>
53254 </param>
53255 </interface>
53256 -<interface name="dev_setattr_generic_usb_dev" lineno="4842">
53257 +<interface name="dev_setattr_generic_usb_dev" lineno="4878">
53258 <summary>
53259 Setattr generic the USB devices.
53260 </summary>
53261 @@ -76134,7 +76238,7 @@ Domain allowed access.
53262 </summary>
53263 </param>
53264 </interface>
53265 -<interface name="dev_read_generic_usb_dev" lineno="4860">
53266 +<interface name="dev_read_generic_usb_dev" lineno="4896">
53267 <summary>
53268 Read generic the USB devices.
53269 </summary>
53270 @@ -76144,7 +76248,7 @@ Domain allowed access.
53271 </summary>
53272 </param>
53273 </interface>
53274 -<interface name="dev_rw_generic_usb_dev" lineno="4878">
53275 +<interface name="dev_rw_generic_usb_dev" lineno="4914">
53276 <summary>
53277 Read and write generic the USB devices.
53278 </summary>
53279 @@ -76154,7 +76258,7 @@ Domain allowed access.
53280 </summary>
53281 </param>
53282 </interface>
53283 -<interface name="dev_relabel_generic_usb_dev" lineno="4896">
53284 +<interface name="dev_relabel_generic_usb_dev" lineno="4932">
53285 <summary>
53286 Relabel generic the USB devices.
53287 </summary>
53288 @@ -76164,7 +76268,7 @@ Domain allowed access.
53289 </summary>
53290 </param>
53291 </interface>
53292 -<interface name="dev_read_usbmon_dev" lineno="4914">
53293 +<interface name="dev_read_usbmon_dev" lineno="4950">
53294 <summary>
53295 Read USB monitor devices.
53296 </summary>
53297 @@ -76174,7 +76278,7 @@ Domain allowed access.
53298 </summary>
53299 </param>
53300 </interface>
53301 -<interface name="dev_write_usbmon_dev" lineno="4932">
53302 +<interface name="dev_write_usbmon_dev" lineno="4968">
53303 <summary>
53304 Write USB monitor devices.
53305 </summary>
53306 @@ -76184,7 +76288,7 @@ Domain allowed access.
53307 </summary>
53308 </param>
53309 </interface>
53310 -<interface name="dev_mount_usbfs" lineno="4950">
53311 +<interface name="dev_mount_usbfs" lineno="4986">
53312 <summary>
53313 Mount a usbfs filesystem.
53314 </summary>
53315 @@ -76194,7 +76298,7 @@ Domain allowed access.
53316 </summary>
53317 </param>
53318 </interface>
53319 -<interface name="dev_associate_usbfs" lineno="4968">
53320 +<interface name="dev_associate_usbfs" lineno="5004">
53321 <summary>
53322 Associate a file to a usbfs filesystem.
53323 </summary>
53324 @@ -76204,7 +76308,7 @@ The type of the file to be associated to usbfs.
53325 </summary>
53326 </param>
53327 </interface>
53328 -<interface name="dev_getattr_usbfs_dirs" lineno="4986">
53329 +<interface name="dev_getattr_usbfs_dirs" lineno="5022">
53330 <summary>
53331 Get the attributes of a directory in the usb filesystem.
53332 </summary>
53333 @@ -76214,7 +76318,7 @@ Domain allowed access.
53334 </summary>
53335 </param>
53336 </interface>
53337 -<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="5005">
53338 +<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="5041">
53339 <summary>
53340 Do not audit attempts to get the attributes
53341 of a directory in the usb filesystem.
53342 @@ -76225,7 +76329,7 @@ Domain to not audit.
53343 </summary>
53344 </param>
53345 </interface>
53346 -<interface name="dev_search_usbfs" lineno="5023">
53347 +<interface name="dev_search_usbfs" lineno="5059">
53348 <summary>
53349 Search the directory containing USB hardware information.
53350 </summary>
53351 @@ -76235,7 +76339,7 @@ Domain allowed access.
53352 </summary>
53353 </param>
53354 </interface>
53355 -<interface name="dev_list_usbfs" lineno="5041">
53356 +<interface name="dev_list_usbfs" lineno="5077">
53357 <summary>
53358 Allow caller to get a list of usb hardware.
53359 </summary>
53360 @@ -76245,7 +76349,7 @@ Domain allowed access.
53361 </summary>
53362 </param>
53363 </interface>
53364 -<interface name="dev_setattr_usbfs_files" lineno="5062">
53365 +<interface name="dev_setattr_usbfs_files" lineno="5098">
53366 <summary>
53367 Set the attributes of usbfs filesystem.
53368 </summary>
53369 @@ -76255,7 +76359,7 @@ Domain allowed access.
53370 </summary>
53371 </param>
53372 </interface>
53373 -<interface name="dev_read_usbfs" lineno="5082">
53374 +<interface name="dev_read_usbfs" lineno="5118">
53375 <summary>
53376 Read USB hardware information using
53377 the usbfs filesystem interface.
53378 @@ -76266,7 +76370,7 @@ Domain allowed access.
53379 </summary>
53380 </param>
53381 </interface>
53382 -<interface name="dev_rw_usbfs" lineno="5102">
53383 +<interface name="dev_rw_usbfs" lineno="5138">
53384 <summary>
53385 Allow caller to modify usb hardware configuration files.
53386 </summary>
53387 @@ -76276,7 +76380,7 @@ Domain allowed access.
53388 </summary>
53389 </param>
53390 </interface>
53391 -<interface name="dev_getattr_video_dev" lineno="5122">
53392 +<interface name="dev_getattr_video_dev" lineno="5158">
53393 <summary>
53394 Get the attributes of video4linux devices.
53395 </summary>
53396 @@ -76286,7 +76390,7 @@ Domain allowed access.
53397 </summary>
53398 </param>
53399 </interface>
53400 -<interface name="dev_rw_userio_dev" lineno="5140">
53401 +<interface name="dev_rw_userio_dev" lineno="5176">
53402 <summary>
53403 Read and write userio device.
53404 </summary>
53405 @@ -76296,7 +76400,7 @@ Domain allowed access.
53406 </summary>
53407 </param>
53408 </interface>
53409 -<interface name="dev_dontaudit_getattr_video_dev" lineno="5159">
53410 +<interface name="dev_dontaudit_getattr_video_dev" lineno="5195">
53411 <summary>
53412 Do not audit attempts to get the attributes
53413 of video4linux device nodes.
53414 @@ -76307,7 +76411,7 @@ Domain to not audit.
53415 </summary>
53416 </param>
53417 </interface>
53418 -<interface name="dev_setattr_video_dev" lineno="5177">
53419 +<interface name="dev_setattr_video_dev" lineno="5213">
53420 <summary>
53421 Set the attributes of video4linux device nodes.
53422 </summary>
53423 @@ -76317,7 +76421,7 @@ Domain allowed access.
53424 </summary>
53425 </param>
53426 </interface>
53427 -<interface name="dev_dontaudit_setattr_video_dev" lineno="5196">
53428 +<interface name="dev_dontaudit_setattr_video_dev" lineno="5232">
53429 <summary>
53430 Do not audit attempts to set the attributes
53431 of video4linux device nodes.
53432 @@ -76328,7 +76432,7 @@ Domain to not audit.
53433 </summary>
53434 </param>
53435 </interface>
53436 -<interface name="dev_read_video_dev" lineno="5214">
53437 +<interface name="dev_read_video_dev" lineno="5250">
53438 <summary>
53439 Read the video4linux devices.
53440 </summary>
53441 @@ -76338,7 +76442,7 @@ Domain allowed access.
53442 </summary>
53443 </param>
53444 </interface>
53445 -<interface name="dev_write_video_dev" lineno="5232">
53446 +<interface name="dev_write_video_dev" lineno="5268">
53447 <summary>
53448 Write the video4linux devices.
53449 </summary>
53450 @@ -76348,7 +76452,7 @@ Domain allowed access.
53451 </summary>
53452 </param>
53453 </interface>
53454 -<interface name="dev_rw_vfio_dev" lineno="5250">
53455 +<interface name="dev_rw_vfio_dev" lineno="5286">
53456 <summary>
53457 Read and write vfio devices.
53458 </summary>
53459 @@ -76358,7 +76462,7 @@ Domain allowed access.
53460 </summary>
53461 </param>
53462 </interface>
53463 -<interface name="dev_relabelfrom_vfio_dev" lineno="5268">
53464 +<interface name="dev_relabelfrom_vfio_dev" lineno="5304">
53465 <summary>
53466 Relabel vfio devices.
53467 </summary>
53468 @@ -76368,7 +76472,7 @@ Domain allowed access.
53469 </summary>
53470 </param>
53471 </interface>
53472 -<interface name="dev_rw_vhost" lineno="5286">
53473 +<interface name="dev_rw_vhost" lineno="5322">
53474 <summary>
53475 Allow read/write the vhost devices
53476 </summary>
53477 @@ -76378,7 +76482,7 @@ Domain allowed access.
53478 </summary>
53479 </param>
53480 </interface>
53481 -<interface name="dev_rw_vmware" lineno="5304">
53482 +<interface name="dev_rw_vmware" lineno="5340">
53483 <summary>
53484 Read and write VMWare devices.
53485 </summary>
53486 @@ -76388,7 +76492,7 @@ Domain allowed access.
53487 </summary>
53488 </param>
53489 </interface>
53490 -<interface name="dev_rwx_vmware" lineno="5322">
53491 +<interface name="dev_rwx_vmware" lineno="5358">
53492 <summary>
53493 Read, write, and mmap VMWare devices.
53494 </summary>
53495 @@ -76398,7 +76502,7 @@ Domain allowed access.
53496 </summary>
53497 </param>
53498 </interface>
53499 -<interface name="dev_read_watchdog" lineno="5341">
53500 +<interface name="dev_read_watchdog" lineno="5377">
53501 <summary>
53502 Read from watchdog devices.
53503 </summary>
53504 @@ -76408,7 +76512,7 @@ Domain allowed access.
53505 </summary>
53506 </param>
53507 </interface>
53508 -<interface name="dev_write_watchdog" lineno="5359">
53509 +<interface name="dev_write_watchdog" lineno="5395">
53510 <summary>
53511 Write to watchdog devices.
53512 </summary>
53513 @@ -76418,7 +76522,7 @@ Domain allowed access.
53514 </summary>
53515 </param>
53516 </interface>
53517 -<interface name="dev_read_wireless" lineno="5377">
53518 +<interface name="dev_read_wireless" lineno="5413">
53519 <summary>
53520 Read the wireless device.
53521 </summary>
53522 @@ -76428,7 +76532,7 @@ Domain allowed access.
53523 </summary>
53524 </param>
53525 </interface>
53526 -<interface name="dev_rw_wireless" lineno="5395">
53527 +<interface name="dev_rw_wireless" lineno="5431">
53528 <summary>
53529 Read and write the the wireless device.
53530 </summary>
53531 @@ -76438,7 +76542,7 @@ Domain allowed access.
53532 </summary>
53533 </param>
53534 </interface>
53535 -<interface name="dev_manage_wireless" lineno="5413">
53536 +<interface name="dev_manage_wireless" lineno="5449">
53537 <summary>
53538 manage the wireless device.
53539 </summary>
53540 @@ -76448,7 +76552,7 @@ Domain allowed access.
53541 </summary>
53542 </param>
53543 </interface>
53544 -<interface name="dev_rw_xen" lineno="5431">
53545 +<interface name="dev_rw_xen" lineno="5467">
53546 <summary>
53547 Read and write Xen devices.
53548 </summary>
53549 @@ -76458,7 +76562,7 @@ Domain allowed access.
53550 </summary>
53551 </param>
53552 </interface>
53553 -<interface name="dev_manage_xen" lineno="5450">
53554 +<interface name="dev_manage_xen" lineno="5486">
53555 <summary>
53556 Create, read, write, and delete Xen devices.
53557 </summary>
53558 @@ -76468,7 +76572,7 @@ Domain allowed access.
53559 </summary>
53560 </param>
53561 </interface>
53562 -<interface name="dev_filetrans_xen" lineno="5474">
53563 +<interface name="dev_filetrans_xen" lineno="5510">
53564 <summary>
53565 Automatic type transition to the type
53566 for xen device nodes when created in /dev.
53567 @@ -76484,7 +76588,7 @@ The name of the object being created.
53568 </summary>
53569 </param>
53570 </interface>
53571 -<interface name="dev_getattr_xserver_misc_dev" lineno="5492">
53572 +<interface name="dev_getattr_xserver_misc_dev" lineno="5528">
53573 <summary>
53574 Get the attributes of X server miscellaneous devices.
53575 </summary>
53576 @@ -76494,7 +76598,7 @@ Domain allowed access.
53577 </summary>
53578 </param>
53579 </interface>
53580 -<interface name="dev_setattr_xserver_misc_dev" lineno="5510">
53581 +<interface name="dev_setattr_xserver_misc_dev" lineno="5546">
53582 <summary>
53583 Set the attributes of X server miscellaneous devices.
53584 </summary>
53585 @@ -76504,7 +76608,7 @@ Domain allowed access.
53586 </summary>
53587 </param>
53588 </interface>
53589 -<interface name="dev_rw_xserver_misc" lineno="5528">
53590 +<interface name="dev_rw_xserver_misc" lineno="5564">
53591 <summary>
53592 Read and write X server miscellaneous devices.
53593 </summary>
53594 @@ -76514,7 +76618,7 @@ Domain allowed access.
53595 </summary>
53596 </param>
53597 </interface>
53598 -<interface name="dev_map_xserver_misc" lineno="5546">
53599 +<interface name="dev_map_xserver_misc" lineno="5582">
53600 <summary>
53601 Map X server miscellaneous devices.
53602 </summary>
53603 @@ -76524,7 +76628,7 @@ Domain allowed access.
53604 </summary>
53605 </param>
53606 </interface>
53607 -<interface name="dev_rw_zero" lineno="5564">
53608 +<interface name="dev_rw_zero" lineno="5600">
53609 <summary>
53610 Read and write to the zero device (/dev/zero).
53611 </summary>
53612 @@ -76534,7 +76638,7 @@ Domain allowed access.
53613 </summary>
53614 </param>
53615 </interface>
53616 -<interface name="dev_rwx_zero" lineno="5582">
53617 +<interface name="dev_rwx_zero" lineno="5618">
53618 <summary>
53619 Read, write, and execute the zero device (/dev/zero).
53620 </summary>
53621 @@ -76544,7 +76648,7 @@ Domain allowed access.
53622 </summary>
53623 </param>
53624 </interface>
53625 -<interface name="dev_execmod_zero" lineno="5601">
53626 +<interface name="dev_execmod_zero" lineno="5637">
53627 <summary>
53628 Execmod the zero device (/dev/zero).
53629 </summary>
53630 @@ -76554,7 +76658,7 @@ Domain allowed access.
53631 </summary>
53632 </param>
53633 </interface>
53634 -<interface name="dev_create_zero_dev" lineno="5620">
53635 +<interface name="dev_create_zero_dev" lineno="5656">
53636 <summary>
53637 Create the zero device (/dev/zero).
53638 </summary>
53639 @@ -76564,7 +76668,7 @@ Domain allowed access.
53640 </summary>
53641 </param>
53642 </interface>
53643 -<interface name="dev_read_cpu_online" lineno="5643">
53644 +<interface name="dev_read_cpu_online" lineno="5679">
53645 <summary>
53646 Read cpu online hardware state information
53647 </summary>
53648 @@ -76579,7 +76683,7 @@ Domain allowed access.
53649 </summary>
53650 </param>
53651 </interface>
53652 -<interface name="dev_unconfined" lineno="5663">
53653 +<interface name="dev_unconfined" lineno="5699">
53654 <summary>
53655 Unconfined access to devices.
53656 </summary>
53657 @@ -76589,7 +76693,7 @@ Domain allowed access.
53658 </summary>
53659 </param>
53660 </interface>
53661 -<interface name="dev_relabel_cpu_online" lineno="5683">
53662 +<interface name="dev_relabel_cpu_online" lineno="5719">
53663 <summary>
53664 Relabel cpu online hardware state information.
53665 </summary>
53666 @@ -76599,7 +76703,7 @@ Domain allowed access.
53667 </summary>
53668 </param>
53669 </interface>
53670 -<interface name="dev_dontaudit_read_usbmon_dev" lineno="5702">
53671 +<interface name="dev_dontaudit_read_usbmon_dev" lineno="5738">
53672 <summary>
53673 Dont audit attempts to read usbmon devices
53674 </summary>
53675 @@ -78355,7 +78459,7 @@ must be negated by the caller.
53676 </param>
53677 <rolecap/>
53678 </interface>
53679 -<interface name="files_search_all" lineno="1259">
53680 +<interface name="files_search_all" lineno="1255">
53681 <summary>
53682 Search the contents of all directories on
53683 extended attribute filesystems.
53684 @@ -78366,7 +78470,7 @@ Domain allowed access.
53685 </summary>
53686 </param>
53687 </interface>
53688 -<interface name="files_list_all" lineno="1278">
53689 +<interface name="files_list_all" lineno="1274">
53690 <summary>
53691 List the contents of all directories on
53692 extended attribute filesystems.
53693 @@ -78377,7 +78481,7 @@ Domain allowed access.
53694 </summary>
53695 </param>
53696 </interface>
53697 -<interface name="files_create_all_files_as" lineno="1296">
53698 +<interface name="files_create_all_files_as" lineno="1292">
53699 <summary>
53700 Create all files as is.
53701 </summary>
53702 @@ -78387,7 +78491,7 @@ Domain allowed access.
53703 </summary>
53704 </param>
53705 </interface>
53706 -<interface name="files_dontaudit_search_all_dirs" lineno="1316">
53707 +<interface name="files_dontaudit_search_all_dirs" lineno="1312">
53708 <summary>
53709 Do not audit attempts to search the
53710 contents of any directories on extended
53711 @@ -78399,7 +78503,7 @@ Domain to not audit.
53712 </summary>
53713 </param>
53714 </interface>
53715 -<interface name="files_getattr_all_file_type_fs" lineno="1339">
53716 +<interface name="files_getattr_all_file_type_fs" lineno="1335">
53717 <summary>
53718 Get the attributes of all filesystems
53719 with the type of a file.
53720 @@ -78410,7 +78514,7 @@ Domain allowed access.
53721 </summary>
53722 </param>
53723 </interface>
53724 -<interface name="files_relabelto_all_file_type_fs" lineno="1357">
53725 +<interface name="files_relabelto_all_file_type_fs" lineno="1353">
53726 <summary>
53727 Relabel a filesystem to the type of a file.
53728 </summary>
53729 @@ -78420,7 +78524,7 @@ Domain allowed access.
53730 </summary>
53731 </param>
53732 </interface>
53733 -<interface name="files_relabel_all_file_type_fs" lineno="1375">
53734 +<interface name="files_relabel_all_file_type_fs" lineno="1371">
53735 <summary>
53736 Relabel a filesystem to and from the type of a file.
53737 </summary>
53738 @@ -78430,7 +78534,7 @@ Domain allowed access.
53739 </summary>
53740 </param>
53741 </interface>
53742 -<interface name="files_mount_all_file_type_fs" lineno="1393">
53743 +<interface name="files_mount_all_file_type_fs" lineno="1389">
53744 <summary>
53745 Mount all filesystems with the type of a file.
53746 </summary>
53747 @@ -78440,7 +78544,7 @@ Domain allowed access.
53748 </summary>
53749 </param>
53750 </interface>
53751 -<interface name="files_unmount_all_file_type_fs" lineno="1411">
53752 +<interface name="files_unmount_all_file_type_fs" lineno="1407">
53753 <summary>
53754 Unmount all filesystems with the type of a file.
53755 </summary>
53756 @@ -78450,7 +78554,7 @@ Domain allowed access.
53757 </summary>
53758 </param>
53759 </interface>
53760 -<interface name="files_list_non_auth_dirs" lineno="1430">
53761 +<interface name="files_list_non_auth_dirs" lineno="1426">
53762 <summary>
53763 Read all non-authentication related
53764 directories.
53765 @@ -78461,7 +78565,7 @@ Domain allowed access.
53766 </summary>
53767 </param>
53768 </interface>
53769 -<interface name="files_read_non_auth_files" lineno="1449">
53770 +<interface name="files_read_non_auth_files" lineno="1445">
53771 <summary>
53772 Read all non-authentication related
53773 files.
53774 @@ -78472,7 +78576,7 @@ Domain allowed access.
53775 </summary>
53776 </param>
53777 </interface>
53778 -<interface name="files_read_non_auth_symlinks" lineno="1468">
53779 +<interface name="files_read_non_auth_symlinks" lineno="1464">
53780 <summary>
53781 Read all non-authentication related
53782 symbolic links.
53783 @@ -78483,7 +78587,7 @@ Domain allowed access.
53784 </summary>
53785 </param>
53786 </interface>
53787 -<interface name="files_rw_non_auth_files" lineno="1486">
53788 +<interface name="files_rw_non_auth_files" lineno="1482">
53789 <summary>
53790 rw non-authentication related files.
53791 </summary>
53792 @@ -78493,7 +78597,7 @@ Domain allowed access.
53793 </summary>
53794 </param>
53795 </interface>
53796 -<interface name="files_manage_non_auth_files" lineno="1506">
53797 +<interface name="files_manage_non_auth_files" lineno="1502">
53798 <summary>
53799 Manage non-authentication related
53800 files.
53801 @@ -78505,7 +78609,7 @@ Domain allowed access.
53802 </param>
53803 <rolecap/>
53804 </interface>
53805 -<interface name="files_map_non_auth_files" lineno="1534">
53806 +<interface name="files_map_non_auth_files" lineno="1526">
53807 <summary>
53808 Mmap non-authentication related
53809 files.
53810 @@ -78517,7 +78621,7 @@ Domain allowed access.
53811 </param>
53812 <rolecap/>
53813 </interface>
53814 -<interface name="files_relabel_non_auth_files" lineno="1554">
53815 +<interface name="files_relabel_non_auth_files" lineno="1546">
53816 <summary>
53817 Relabel all non-authentication related
53818 files.
53819 @@ -78529,7 +78633,7 @@ Domain allowed access.
53820 </param>
53821 <rolecap/>
53822 </interface>
53823 -<interface name="files_manage_config_dirs" lineno="1587">
53824 +<interface name="files_manage_config_dirs" lineno="1579">
53825 <summary>
53826 Manage all configuration directories on filesystem
53827 </summary>
53828 @@ -78540,7 +78644,7 @@ Domain allowed access.
53829 </param>
53830
53831 </interface>
53832 -<interface name="files_relabel_config_dirs" lineno="1606">
53833 +<interface name="files_relabel_config_dirs" lineno="1598">
53834 <summary>
53835 Relabel configuration directories
53836 </summary>
53837 @@ -78551,7 +78655,7 @@ Domain allowed access.
53838 </param>
53839
53840 </interface>
53841 -<interface name="files_dontaudit_relabel_config_dirs" lineno="1625">
53842 +<interface name="files_dontaudit_relabel_config_dirs" lineno="1617">
53843 <summary>
53844 Do not audit attempts to relabel configuration directories
53845 </summary>
53846 @@ -78562,7 +78666,7 @@ Domain not to audit.
53847 </param>
53848
53849 </interface>
53850 -<interface name="files_read_config_files" lineno="1643">
53851 +<interface name="files_read_config_files" lineno="1635">
53852 <summary>
53853 Read config files in /etc.
53854 </summary>
53855 @@ -78572,7 +78676,7 @@ Domain allowed access.
53856 </summary>
53857 </param>
53858 </interface>
53859 -<interface name="files_manage_config_files" lineno="1664">
53860 +<interface name="files_manage_config_files" lineno="1656">
53861 <summary>
53862 Manage all configuration files on filesystem
53863 </summary>
53864 @@ -78583,7 +78687,7 @@ Domain allowed access.
53865 </param>
53866
53867 </interface>
53868 -<interface name="files_relabel_config_files" lineno="1683">
53869 +<interface name="files_relabel_config_files" lineno="1675">
53870 <summary>
53871 Relabel configuration files
53872 </summary>
53873 @@ -78594,7 +78698,7 @@ Domain allowed access.
53874 </param>
53875
53876 </interface>
53877 -<interface name="files_dontaudit_relabel_config_files" lineno="1702">
53878 +<interface name="files_dontaudit_relabel_config_files" lineno="1694">
53879 <summary>
53880 Do not audit attempts to relabel configuration files
53881 </summary>
53882 @@ -78605,7 +78709,7 @@ Domain not to audit.
53883 </param>
53884
53885 </interface>
53886 -<interface name="files_mounton_all_mountpoints" lineno="1720">
53887 +<interface name="files_mounton_all_mountpoints" lineno="1712">
53888 <summary>
53889 Mount a filesystem on all mount points.
53890 </summary>
53891 @@ -78615,7 +78719,7 @@ Domain allowed access.
53892 </summary>
53893 </param>
53894 </interface>
53895 -<interface name="files_getattr_all_mountpoints" lineno="1741">
53896 +<interface name="files_getattr_all_mountpoints" lineno="1733">
53897 <summary>
53898 Get the attributes of all mount points.
53899 </summary>
53900 @@ -78625,7 +78729,7 @@ Domain allowed access.
53901 </summary>
53902 </param>
53903 </interface>
53904 -<interface name="files_setattr_all_mountpoints" lineno="1759">
53905 +<interface name="files_setattr_all_mountpoints" lineno="1751">
53906 <summary>
53907 Set the attributes of all mount points.
53908 </summary>
53909 @@ -78635,7 +78739,7 @@ Domain allowed access.
53910 </summary>
53911 </param>
53912 </interface>
53913 -<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1777">
53914 +<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1769">
53915 <summary>
53916 Do not audit attempts to set the attributes on all mount points.
53917 </summary>
53918 @@ -78645,7 +78749,7 @@ Domain to not audit.
53919 </summary>
53920 </param>
53921 </interface>
53922 -<interface name="files_search_all_mountpoints" lineno="1795">
53923 +<interface name="files_search_all_mountpoints" lineno="1787">
53924 <summary>
53925 Search all mount points.
53926 </summary>
53927 @@ -78655,7 +78759,7 @@ Domain allowed access.
53928 </summary>
53929 </param>
53930 </interface>
53931 -<interface name="files_dontaudit_search_all_mountpoints" lineno="1813">
53932 +<interface name="files_dontaudit_search_all_mountpoints" lineno="1805">
53933 <summary>
53934 Do not audit searching of all mount points.
53935 </summary>
53936 @@ -78665,7 +78769,7 @@ Domain to not audit.
53937 </summary>
53938 </param>
53939 </interface>
53940 -<interface name="files_list_all_mountpoints" lineno="1831">
53941 +<interface name="files_list_all_mountpoints" lineno="1823">
53942 <summary>
53943 List all mount points.
53944 </summary>
53945 @@ -78675,7 +78779,7 @@ Domain allowed access.
53946 </summary>
53947 </param>
53948 </interface>
53949 -<interface name="files_dontaudit_list_all_mountpoints" lineno="1849">
53950 +<interface name="files_dontaudit_list_all_mountpoints" lineno="1841">
53951 <summary>
53952 Do not audit listing of all mount points.
53953 </summary>
53954 @@ -78685,7 +78789,17 @@ Domain to not audit.
53955 </summary>
53956 </param>
53957 </interface>
53958 -<interface name="files_dontaudit_write_all_mountpoints" lineno="1867">
53959 +<interface name="files_write_all_mountpoints" lineno="1859">
53960 +<summary>
53961 +Check if all mountpoints are writable.
53962 +</summary>
53963 +<param name="domain">
53964 +<summary>
53965 +Domain allowed access.
53966 +</summary>
53967 +</param>
53968 +</interface>
53969 +<interface name="files_dontaudit_write_all_mountpoints" lineno="1877">
53970 <summary>
53971 Do not audit attempts to write to mount points.
53972 </summary>
53973 @@ -78695,7 +78809,7 @@ Domain to not audit.
53974 </summary>
53975 </param>
53976 </interface>
53977 -<interface name="files_list_root" lineno="1885">
53978 +<interface name="files_list_root" lineno="1895">
53979 <summary>
53980 List the contents of the root directory.
53981 </summary>
53982 @@ -78705,7 +78819,7 @@ Domain allowed access.
53983 </summary>
53984 </param>
53985 </interface>
53986 -<interface name="files_delete_root_symlinks" lineno="1905">
53987 +<interface name="files_delete_root_symlinks" lineno="1915">
53988 <summary>
53989 Delete symbolic links in the
53990 root directory.
53991 @@ -78716,7 +78830,7 @@ Domain allowed access.
53992 </summary>
53993 </param>
53994 </interface>
53995 -<interface name="files_dontaudit_write_root_dirs" lineno="1923">
53996 +<interface name="files_dontaudit_write_root_dirs" lineno="1933">
53997 <summary>
53998 Do not audit attempts to write to / dirs.
53999 </summary>
54000 @@ -78726,7 +78840,7 @@ Domain to not audit.
54001 </summary>
54002 </param>
54003 </interface>
54004 -<interface name="files_dontaudit_rw_root_dir" lineno="1942">
54005 +<interface name="files_dontaudit_rw_root_dir" lineno="1952">
54006 <summary>
54007 Do not audit attempts to write
54008 files in the root directory.
54009 @@ -78737,7 +78851,7 @@ Domain to not audit.
54010 </summary>
54011 </param>
54012 </interface>
54013 -<interface name="files_watch_root_dirs" lineno="1960">
54014 +<interface name="files_watch_root_dirs" lineno="1970">
54015 <summary>
54016 Watch the root directory.
54017 </summary>
54018 @@ -78747,7 +78861,7 @@ Domain allowed access.
54019 </summary>
54020 </param>
54021 </interface>
54022 -<interface name="files_root_filetrans" lineno="1994">
54023 +<interface name="files_root_filetrans" lineno="2004">
54024 <summary>
54025 Create an object in the root directory, with a private
54026 type using a type transition.
54027 @@ -78773,7 +78887,7 @@ The name of the object being created.
54028 </summary>
54029 </param>
54030 </interface>
54031 -<interface name="files_dontaudit_read_root_files" lineno="2013">
54032 +<interface name="files_dontaudit_read_root_files" lineno="2023">
54033 <summary>
54034 Do not audit attempts to read files in
54035 the root directory.
54036 @@ -78784,7 +78898,7 @@ Domain to not audit.
54037 </summary>
54038 </param>
54039 </interface>
54040 -<interface name="files_dontaudit_rw_root_files" lineno="2032">
54041 +<interface name="files_dontaudit_rw_root_files" lineno="2042">
54042 <summary>
54043 Do not audit attempts to read or write
54044 files in the root directory.
54045 @@ -78795,7 +78909,7 @@ Domain to not audit.
54046 </summary>
54047 </param>
54048 </interface>
54049 -<interface name="files_dontaudit_rw_root_chr_files" lineno="2051">
54050 +<interface name="files_dontaudit_rw_root_chr_files" lineno="2061">
54051 <summary>
54052 Do not audit attempts to read or write
54053 character device nodes in the root directory.
54054 @@ -78806,7 +78920,7 @@ Domain to not audit.
54055 </summary>
54056 </param>
54057 </interface>
54058 -<interface name="files_delete_root_chr_files" lineno="2070">
54059 +<interface name="files_delete_root_chr_files" lineno="2080">
54060 <summary>
54061 Delete character device nodes in
54062 the root directory.
54063 @@ -78817,7 +78931,7 @@ Domain allowed access.
54064 </summary>
54065 </param>
54066 </interface>
54067 -<interface name="files_delete_root_files" lineno="2088">
54068 +<interface name="files_delete_root_files" lineno="2098">
54069 <summary>
54070 Delete files in the root directory.
54071 </summary>
54072 @@ -78827,7 +78941,7 @@ Domain allowed access.
54073 </summary>
54074 </param>
54075 </interface>
54076 -<interface name="files_exec_root_files" lineno="2106">
54077 +<interface name="files_exec_root_files" lineno="2116">
54078 <summary>
54079 Execute files in the root directory.
54080 </summary>
54081 @@ -78837,7 +78951,7 @@ Domain allowed access.
54082 </summary>
54083 </param>
54084 </interface>
54085 -<interface name="files_delete_root_dir_entry" lineno="2124">
54086 +<interface name="files_delete_root_dir_entry" lineno="2134">
54087 <summary>
54088 Remove entries from the root directory.
54089 </summary>
54090 @@ -78847,7 +78961,7 @@ Domain allowed access.
54091 </summary>
54092 </param>
54093 </interface>
54094 -<interface name="files_manage_root_dir" lineno="2142">
54095 +<interface name="files_manage_root_dir" lineno="2152">
54096 <summary>
54097 Manage the root directory.
54098 </summary>
54099 @@ -78857,7 +78971,7 @@ Domain allowed access.
54100 </summary>
54101 </param>
54102 </interface>
54103 -<interface name="files_getattr_rootfs" lineno="2161">
54104 +<interface name="files_getattr_rootfs" lineno="2171">
54105 <summary>
54106 Get the attributes of a rootfs
54107 file system.
54108 @@ -78868,7 +78982,7 @@ Domain allowed access.
54109 </summary>
54110 </param>
54111 </interface>
54112 -<interface name="files_associate_rootfs" lineno="2179">
54113 +<interface name="files_associate_rootfs" lineno="2189">
54114 <summary>
54115 Associate to root file system.
54116 </summary>
54117 @@ -78878,7 +78992,7 @@ Type of the file to associate.
54118 </summary>
54119 </param>
54120 </interface>
54121 -<interface name="files_relabel_rootfs" lineno="2197">
54122 +<interface name="files_relabel_rootfs" lineno="2207">
54123 <summary>
54124 Relabel to and from rootfs file system.
54125 </summary>
54126 @@ -78888,7 +79002,7 @@ Domain allowed access.
54127 </summary>
54128 </param>
54129 </interface>
54130 -<interface name="files_unmount_rootfs" lineno="2215">
54131 +<interface name="files_unmount_rootfs" lineno="2225">
54132 <summary>
54133 Unmount a rootfs filesystem.
54134 </summary>
54135 @@ -78898,7 +79012,7 @@ Domain allowed access.
54136 </summary>
54137 </param>
54138 </interface>
54139 -<interface name="files_mounton_root" lineno="2233">
54140 +<interface name="files_mounton_root" lineno="2243">
54141 <summary>
54142 Mount on the root directory (/)
54143 </summary>
54144 @@ -78908,7 +79022,28 @@ Domain allowed access.
54145 </summary>
54146 </param>
54147 </interface>
54148 -<interface name="files_getattr_boot_dirs" lineno="2251">
54149 +<interface name="files_getattr_boot_fs" lineno="2262">
54150 +<summary>
54151 +Get the attributes of a filesystem
54152 +mounted on /boot.
54153 +</summary>
54154 +<param name="domain">
54155 +<summary>
54156 +Domain allowed access.
54157 +</summary>
54158 +</param>
54159 +</interface>
54160 +<interface name="files_remount_boot" lineno="2280">
54161 +<summary>
54162 +Remount a filesystem mounted on /boot.
54163 +</summary>
54164 +<param name="domain">
54165 +<summary>
54166 +Domain allowed access.
54167 +</summary>
54168 +</param>
54169 +</interface>
54170 +<interface name="files_getattr_boot_dirs" lineno="2298">
54171 <summary>
54172 Get attributes of the /boot directory.
54173 </summary>
54174 @@ -78918,7 +79053,7 @@ Domain allowed access.
54175 </summary>
54176 </param>
54177 </interface>
54178 -<interface name="files_dontaudit_getattr_boot_dirs" lineno="2270">
54179 +<interface name="files_dontaudit_getattr_boot_dirs" lineno="2317">
54180 <summary>
54181 Do not audit attempts to get attributes
54182 of the /boot directory.
54183 @@ -78929,7 +79064,7 @@ Domain to not audit.
54184 </summary>
54185 </param>
54186 </interface>
54187 -<interface name="files_search_boot" lineno="2288">
54188 +<interface name="files_search_boot" lineno="2335">
54189 <summary>
54190 Search the /boot directory.
54191 </summary>
54192 @@ -78939,7 +79074,7 @@ Domain allowed access.
54193 </summary>
54194 </param>
54195 </interface>
54196 -<interface name="files_dontaudit_search_boot" lineno="2306">
54197 +<interface name="files_dontaudit_search_boot" lineno="2353">
54198 <summary>
54199 Do not audit attempts to search the /boot directory.
54200 </summary>
54201 @@ -78949,7 +79084,7 @@ Domain to not audit.
54202 </summary>
54203 </param>
54204 </interface>
54205 -<interface name="files_list_boot" lineno="2324">
54206 +<interface name="files_list_boot" lineno="2371">
54207 <summary>
54208 List the /boot directory.
54209 </summary>
54210 @@ -78959,7 +79094,7 @@ Domain allowed access.
54211 </summary>
54212 </param>
54213 </interface>
54214 -<interface name="files_dontaudit_list_boot" lineno="2342">
54215 +<interface name="files_dontaudit_list_boot" lineno="2389">
54216 <summary>
54217 Do not audit attempts to list the /boot directory.
54218 </summary>
54219 @@ -78969,7 +79104,7 @@ Domain allowed access.
54220 </summary>
54221 </param>
54222 </interface>
54223 -<interface name="files_create_boot_dirs" lineno="2360">
54224 +<interface name="files_create_boot_dirs" lineno="2407">
54225 <summary>
54226 Create directories in /boot
54227 </summary>
54228 @@ -78979,7 +79114,7 @@ Domain allowed access.
54229 </summary>
54230 </param>
54231 </interface>
54232 -<interface name="files_manage_boot_dirs" lineno="2379">
54233 +<interface name="files_manage_boot_dirs" lineno="2426">
54234 <summary>
54235 Create, read, write, and delete
54236 directories in /boot.
54237 @@ -78990,7 +79125,7 @@ Domain allowed access.
54238 </summary>
54239 </param>
54240 </interface>
54241 -<interface name="files_boot_filetrans" lineno="2413">
54242 +<interface name="files_boot_filetrans" lineno="2460">
54243 <summary>
54244 Create a private type object in boot
54245 with an automatic type transition
54246 @@ -79016,7 +79151,7 @@ The name of the object being created.
54247 </summary>
54248 </param>
54249 </interface>
54250 -<interface name="files_read_boot_files" lineno="2432">
54251 +<interface name="files_read_boot_files" lineno="2479">
54252 <summary>
54253 read files in the /boot directory.
54254 </summary>
54255 @@ -79027,7 +79162,7 @@ Domain allowed access.
54256 </param>
54257 <rolecap/>
54258 </interface>
54259 -<interface name="files_manage_boot_files" lineno="2452">
54260 +<interface name="files_manage_boot_files" lineno="2499">
54261 <summary>
54262 Create, read, write, and delete files
54263 in the /boot directory.
54264 @@ -79039,7 +79174,7 @@ Domain allowed access.
54265 </param>
54266 <rolecap/>
54267 </interface>
54268 -<interface name="files_relabelfrom_boot_files" lineno="2470">
54269 +<interface name="files_relabelfrom_boot_files" lineno="2517">
54270 <summary>
54271 Relabel from files in the /boot directory.
54272 </summary>
54273 @@ -79049,7 +79184,7 @@ Domain allowed access.
54274 </summary>
54275 </param>
54276 </interface>
54277 -<interface name="files_read_boot_symlinks" lineno="2488">
54278 +<interface name="files_read_boot_symlinks" lineno="2535">
54279 <summary>
54280 Read symbolic links in the /boot directory.
54281 </summary>
54282 @@ -79059,7 +79194,7 @@ Domain allowed access.
54283 </summary>
54284 </param>
54285 </interface>
54286 -<interface name="files_rw_boot_symlinks" lineno="2507">
54287 +<interface name="files_rw_boot_symlinks" lineno="2554">
54288 <summary>
54289 Read and write symbolic links
54290 in the /boot directory.
54291 @@ -79070,7 +79205,7 @@ Domain allowed access.
54292 </summary>
54293 </param>
54294 </interface>
54295 -<interface name="files_manage_boot_symlinks" lineno="2527">
54296 +<interface name="files_manage_boot_symlinks" lineno="2574">
54297 <summary>
54298 Create, read, write, and delete symbolic links
54299 in the /boot directory.
54300 @@ -79081,7 +79216,7 @@ Domain allowed access.
54301 </summary>
54302 </param>
54303 </interface>
54304 -<interface name="files_read_kernel_img" lineno="2545">
54305 +<interface name="files_read_kernel_img" lineno="2592">
54306 <summary>
54307 Read kernel files in the /boot directory.
54308 </summary>
54309 @@ -79091,7 +79226,7 @@ Domain allowed access.
54310 </summary>
54311 </param>
54312 </interface>
54313 -<interface name="files_create_kernel_img" lineno="2566">
54314 +<interface name="files_create_kernel_img" lineno="2613">
54315 <summary>
54316 Install a kernel into the /boot directory.
54317 </summary>
54318 @@ -79102,7 +79237,7 @@ Domain allowed access.
54319 </param>
54320 <rolecap/>
54321 </interface>
54322 -<interface name="files_delete_kernel" lineno="2586">
54323 +<interface name="files_delete_kernel" lineno="2633">
54324 <summary>
54325 Delete a kernel from /boot.
54326 </summary>
54327 @@ -79113,7 +79248,7 @@ Domain allowed access.
54328 </param>
54329 <rolecap/>
54330 </interface>
54331 -<interface name="files_getattr_default_dirs" lineno="2604">
54332 +<interface name="files_getattr_default_dirs" lineno="2651">
54333 <summary>
54334 Getattr of directories with the default file type.
54335 </summary>
54336 @@ -79123,7 +79258,7 @@ Domain allowed access.
54337 </summary>
54338 </param>
54339 </interface>
54340 -<interface name="files_dontaudit_getattr_default_dirs" lineno="2623">
54341 +<interface name="files_dontaudit_getattr_default_dirs" lineno="2670">
54342 <summary>
54343 Do not audit attempts to get the attributes of
54344 directories with the default file type.
54345 @@ -79134,7 +79269,7 @@ Domain to not audit.
54346 </summary>
54347 </param>
54348 </interface>
54349 -<interface name="files_search_default" lineno="2641">
54350 +<interface name="files_search_default" lineno="2688">
54351 <summary>
54352 Search the contents of directories with the default file type.
54353 </summary>
54354 @@ -79144,7 +79279,7 @@ Domain allowed access.
54355 </summary>
54356 </param>
54357 </interface>
54358 -<interface name="files_list_default" lineno="2659">
54359 +<interface name="files_list_default" lineno="2706">
54360 <summary>
54361 List contents of directories with the default file type.
54362 </summary>
54363 @@ -79154,7 +79289,7 @@ Domain allowed access.
54364 </summary>
54365 </param>
54366 </interface>
54367 -<interface name="files_dontaudit_list_default" lineno="2678">
54368 +<interface name="files_dontaudit_list_default" lineno="2725">
54369 <summary>
54370 Do not audit attempts to list contents of
54371 directories with the default file type.
54372 @@ -79165,7 +79300,7 @@ Domain to not audit.
54373 </summary>
54374 </param>
54375 </interface>
54376 -<interface name="files_manage_default_dirs" lineno="2697">
54377 +<interface name="files_manage_default_dirs" lineno="2744">
54378 <summary>
54379 Create, read, write, and delete directories with
54380 the default file type.
54381 @@ -79176,7 +79311,7 @@ Domain allowed access.
54382 </summary>
54383 </param>
54384 </interface>
54385 -<interface name="files_mounton_default" lineno="2715">
54386 +<interface name="files_mounton_default" lineno="2762">
54387 <summary>
54388 Mount a filesystem on a directory with the default file type.
54389 </summary>
54390 @@ -79186,7 +79321,7 @@ Domain allowed access.
54391 </summary>
54392 </param>
54393 </interface>
54394 -<interface name="files_dontaudit_getattr_default_files" lineno="2734">
54395 +<interface name="files_dontaudit_getattr_default_files" lineno="2781">
54396 <summary>
54397 Do not audit attempts to get the attributes of
54398 files with the default file type.
54399 @@ -79197,7 +79332,7 @@ Domain to not audit.
54400 </summary>
54401 </param>
54402 </interface>
54403 -<interface name="files_read_default_files" lineno="2752">
54404 +<interface name="files_read_default_files" lineno="2799">
54405 <summary>
54406 Read files with the default file type.
54407 </summary>
54408 @@ -79207,7 +79342,7 @@ Domain allowed access.
54409 </summary>
54410 </param>
54411 </interface>
54412 -<interface name="files_dontaudit_read_default_files" lineno="2771">
54413 +<interface name="files_dontaudit_read_default_files" lineno="2818">
54414 <summary>
54415 Do not audit attempts to read files
54416 with the default file type.
54417 @@ -79218,7 +79353,7 @@ Domain to not audit.
54418 </summary>
54419 </param>
54420 </interface>
54421 -<interface name="files_manage_default_files" lineno="2790">
54422 +<interface name="files_manage_default_files" lineno="2837">
54423 <summary>
54424 Create, read, write, and delete files with
54425 the default file type.
54426 @@ -79229,7 +79364,7 @@ Domain allowed access.
54427 </summary>
54428 </param>
54429 </interface>
54430 -<interface name="files_read_default_symlinks" lineno="2808">
54431 +<interface name="files_read_default_symlinks" lineno="2855">
54432 <summary>
54433 Read symbolic links with the default file type.
54434 </summary>
54435 @@ -79239,7 +79374,7 @@ Domain allowed access.
54436 </summary>
54437 </param>
54438 </interface>
54439 -<interface name="files_read_default_sockets" lineno="2826">
54440 +<interface name="files_read_default_sockets" lineno="2873">
54441 <summary>
54442 Read sockets with the default file type.
54443 </summary>
54444 @@ -79249,7 +79384,7 @@ Domain allowed access.
54445 </summary>
54446 </param>
54447 </interface>
54448 -<interface name="files_read_default_pipes" lineno="2844">
54449 +<interface name="files_read_default_pipes" lineno="2891">
54450 <summary>
54451 Read named pipes with the default file type.
54452 </summary>
54453 @@ -79259,7 +79394,7 @@ Domain allowed access.
54454 </summary>
54455 </param>
54456 </interface>
54457 -<interface name="files_search_etc" lineno="2862">
54458 +<interface name="files_search_etc" lineno="2909">
54459 <summary>
54460 Search the contents of /etc directories.
54461 </summary>
54462 @@ -79269,7 +79404,7 @@ Domain allowed access.
54463 </summary>
54464 </param>
54465 </interface>
54466 -<interface name="files_setattr_etc_dirs" lineno="2880">
54467 +<interface name="files_setattr_etc_dirs" lineno="2927">
54468 <summary>
54469 Set the attributes of the /etc directories.
54470 </summary>
54471 @@ -79279,7 +79414,7 @@ Domain allowed access.
54472 </summary>
54473 </param>
54474 </interface>
54475 -<interface name="files_list_etc" lineno="2898">
54476 +<interface name="files_list_etc" lineno="2945">
54477 <summary>
54478 List the contents of /etc directories.
54479 </summary>
54480 @@ -79289,7 +79424,7 @@ Domain allowed access.
54481 </summary>
54482 </param>
54483 </interface>
54484 -<interface name="files_dontaudit_write_etc_dirs" lineno="2916">
54485 +<interface name="files_dontaudit_write_etc_dirs" lineno="2963">
54486 <summary>
54487 Do not audit attempts to write to /etc dirs.
54488 </summary>
54489 @@ -79299,7 +79434,7 @@ Domain to not audit.
54490 </summary>
54491 </param>
54492 </interface>
54493 -<interface name="files_rw_etc_dirs" lineno="2934">
54494 +<interface name="files_rw_etc_dirs" lineno="2981">
54495 <summary>
54496 Add and remove entries from /etc directories.
54497 </summary>
54498 @@ -79309,7 +79444,7 @@ Domain allowed access.
54499 </summary>
54500 </param>
54501 </interface>
54502 -<interface name="files_manage_etc_dirs" lineno="2953">
54503 +<interface name="files_manage_etc_dirs" lineno="3000">
54504 <summary>
54505 Manage generic directories in /etc
54506 </summary>
54507 @@ -79320,7 +79455,7 @@ Domain allowed access
54508 </param>
54509
54510 </interface>
54511 -<interface name="files_relabelto_etc_dirs" lineno="2971">
54512 +<interface name="files_relabelto_etc_dirs" lineno="3018">
54513 <summary>
54514 Relabel directories to etc_t.
54515 </summary>
54516 @@ -79330,7 +79465,7 @@ Domain allowed access.
54517 </summary>
54518 </param>
54519 </interface>
54520 -<interface name="files_mounton_etc_dirs" lineno="2990">
54521 +<interface name="files_mounton_etc_dirs" lineno="3037">
54522 <summary>
54523 Mount a filesystem on the
54524 etc directories.
54525 @@ -79341,7 +79476,7 @@ Domain allowed access.
54526 </summary>
54527 </param>
54528 </interface>
54529 -<interface name="files_watch_etc_dirs" lineno="3008">
54530 +<interface name="files_watch_etc_dirs" lineno="3055">
54531 <summary>
54532 Watch /etc directories
54533 </summary>
54534 @@ -79351,7 +79486,7 @@ Domain allowed access.
54535 </summary>
54536 </param>
54537 </interface>
54538 -<interface name="files_read_etc_files" lineno="3060">
54539 +<interface name="files_read_etc_files" lineno="3107">
54540 <summary>
54541 Read generic files in /etc.
54542 </summary>
54543 @@ -79395,7 +79530,7 @@ Domain allowed access.
54544 </param>
54545 <infoflow type="read" weight="10"/>
54546 </interface>
54547 -<interface name="files_map_etc_files" lineno="3092">
54548 +<interface name="files_map_etc_files" lineno="3139">
54549 <summary>
54550 Map generic files in /etc.
54551 </summary>
54552 @@ -79417,7 +79552,7 @@ Domain allowed access.
54553 </param>
54554 <infoflow type="read" weight="10"/>
54555 </interface>
54556 -<interface name="files_dontaudit_write_etc_files" lineno="3110">
54557 +<interface name="files_dontaudit_write_etc_files" lineno="3157">
54558 <summary>
54559 Do not audit attempts to write generic files in /etc.
54560 </summary>
54561 @@ -79427,7 +79562,7 @@ Domain allowed access.
54562 </summary>
54563 </param>
54564 </interface>
54565 -<interface name="files_rw_etc_files" lineno="3129">
54566 +<interface name="files_rw_etc_files" lineno="3176">
54567 <summary>
54568 Read and write generic files in /etc.
54569 </summary>
54570 @@ -79438,7 +79573,7 @@ Domain allowed access.
54571 </param>
54572 <rolecap/>
54573 </interface>
54574 -<interface name="files_manage_etc_files" lineno="3151">
54575 +<interface name="files_manage_etc_files" lineno="3198">
54576 <summary>
54577 Create, read, write, and delete generic
54578 files in /etc.
54579 @@ -79450,7 +79585,7 @@ Domain allowed access.
54580 </param>
54581 <rolecap/>
54582 </interface>
54583 -<interface name="files_dontaudit_manage_etc_files" lineno="3172">
54584 +<interface name="files_dontaudit_manage_etc_files" lineno="3219">
54585 <summary>
54586 Do not audit attempts to create, read, write,
54587 and delete generic files in /etc.
54588 @@ -79462,7 +79597,7 @@ Domain to not audit.
54589 </param>
54590 <rolecap/>
54591 </interface>
54592 -<interface name="files_delete_etc_files" lineno="3190">
54593 +<interface name="files_delete_etc_files" lineno="3237">
54594 <summary>
54595 Delete system configuration files in /etc.
54596 </summary>
54597 @@ -79472,7 +79607,7 @@ Domain allowed access.
54598 </summary>
54599 </param>
54600 </interface>
54601 -<interface name="files_exec_etc_files" lineno="3208">
54602 +<interface name="files_exec_etc_files" lineno="3255">
54603 <summary>
54604 Execute generic files in /etc.
54605 </summary>
54606 @@ -79482,7 +79617,17 @@ Domain allowed access.
54607 </summary>
54608 </param>
54609 </interface>
54610 -<interface name="files_get_etc_unit_status" lineno="3228">
54611 +<interface name="files_watch_etc_files" lineno="3275">
54612 +<summary>
54613 +Watch /etc files.
54614 +</summary>
54615 +<param name="domain">
54616 +<summary>
54617 +Domain allowed access.
54618 +</summary>
54619 +</param>
54620 +</interface>
54621 +<interface name="files_get_etc_unit_status" lineno="3293">
54622 <summary>
54623 Get etc_t service status.
54624 </summary>
54625 @@ -79492,7 +79637,7 @@ Domain allowed access.
54626 </summary>
54627 </param>
54628 </interface>
54629 -<interface name="files_start_etc_service" lineno="3247">
54630 +<interface name="files_start_etc_service" lineno="3312">
54631 <summary>
54632 start etc_t service
54633 </summary>
54634 @@ -79502,7 +79647,7 @@ Domain allowed access.
54635 </summary>
54636 </param>
54637 </interface>
54638 -<interface name="files_stop_etc_service" lineno="3266">
54639 +<interface name="files_stop_etc_service" lineno="3331">
54640 <summary>
54641 stop etc_t service
54642 </summary>
54643 @@ -79512,7 +79657,7 @@ Domain allowed access.
54644 </summary>
54645 </param>
54646 </interface>
54647 -<interface name="files_relabel_etc_files" lineno="3285">
54648 +<interface name="files_relabel_etc_files" lineno="3350">
54649 <summary>
54650 Relabel from and to generic files in /etc.
54651 </summary>
54652 @@ -79522,7 +79667,7 @@ Domain allowed access.
54653 </summary>
54654 </param>
54655 </interface>
54656 -<interface name="files_read_etc_symlinks" lineno="3304">
54657 +<interface name="files_read_etc_symlinks" lineno="3369">
54658 <summary>
54659 Read symbolic links in /etc.
54660 </summary>
54661 @@ -79532,7 +79677,7 @@ Domain allowed access.
54662 </summary>
54663 </param>
54664 </interface>
54665 -<interface name="files_watch_etc_symlinks" lineno="3322">
54666 +<interface name="files_watch_etc_symlinks" lineno="3387">
54667 <summary>
54668 Watch /etc symlinks
54669 </summary>
54670 @@ -79542,7 +79687,7 @@ Domain allowed access.
54671 </summary>
54672 </param>
54673 </interface>
54674 -<interface name="files_manage_etc_symlinks" lineno="3340">
54675 +<interface name="files_manage_etc_symlinks" lineno="3405">
54676 <summary>
54677 Create, read, write, and delete symbolic links in /etc.
54678 </summary>
54679 @@ -79552,7 +79697,7 @@ Domain allowed access.
54680 </summary>
54681 </param>
54682 </interface>
54683 -<interface name="files_etc_filetrans" lineno="3374">
54684 +<interface name="files_etc_filetrans" lineno="3439">
54685 <summary>
54686 Create objects in /etc with a private
54687 type using a type_transition.
54688 @@ -79578,7 +79723,7 @@ The name of the object being created.
54689 </summary>
54690 </param>
54691 </interface>
54692 -<interface name="files_create_boot_flag" lineno="3404">
54693 +<interface name="files_create_boot_flag" lineno="3469">
54694 <summary>
54695 Create a boot flag.
54696 </summary>
54697 @@ -79600,7 +79745,7 @@ The name of the object being created.
54698 </param>
54699 <rolecap/>
54700 </interface>
54701 -<interface name="files_delete_boot_flag" lineno="3430">
54702 +<interface name="files_delete_boot_flag" lineno="3495">
54703 <summary>
54704 Delete a boot flag.
54705 </summary>
54706 @@ -79617,7 +79762,7 @@ Domain allowed access.
54707 </param>
54708 <rolecap/>
54709 </interface>
54710 -<interface name="files_getattr_etc_runtime_dirs" lineno="3449">
54711 +<interface name="files_getattr_etc_runtime_dirs" lineno="3514">
54712 <summary>
54713 Get the attributes of the
54714 etc_runtime directories.
54715 @@ -79628,7 +79773,7 @@ Domain allowed access.
54716 </summary>
54717 </param>
54718 </interface>
54719 -<interface name="files_mounton_etc_runtime_dirs" lineno="3468">
54720 +<interface name="files_mounton_etc_runtime_dirs" lineno="3533">
54721 <summary>
54722 Mount a filesystem on the
54723 etc_runtime directories.
54724 @@ -79639,7 +79784,7 @@ Domain allowed access.
54725 </summary>
54726 </param>
54727 </interface>
54728 -<interface name="files_relabelto_etc_runtime_dirs" lineno="3486">
54729 +<interface name="files_relabelto_etc_runtime_dirs" lineno="3551">
54730 <summary>
54731 Relabel to etc_runtime_t dirs.
54732 </summary>
54733 @@ -79649,7 +79794,7 @@ Domain allowed access.
54734 </summary>
54735 </param>
54736 </interface>
54737 -<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3504">
54738 +<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3569">
54739 <summary>
54740 Do not audit attempts to set the attributes of the etc_runtime files
54741 </summary>
54742 @@ -79659,7 +79804,7 @@ Domain to not audit.
54743 </summary>
54744 </param>
54745 </interface>
54746 -<interface name="files_read_etc_runtime_files" lineno="3542">
54747 +<interface name="files_read_etc_runtime_files" lineno="3607">
54748 <summary>
54749 Read files in /etc that are dynamically
54750 created on boot, such as mtab.
54751 @@ -79689,7 +79834,7 @@ Domain allowed access.
54752 <infoflow type="read" weight="10" />
54753 <rolecap/>
54754 </interface>
54755 -<interface name="files_dontaudit_read_etc_runtime_files" lineno="3564">
54756 +<interface name="files_dontaudit_read_etc_runtime_files" lineno="3629">
54757 <summary>
54758 Do not audit attempts to read files
54759 in /etc that are dynamically
54760 @@ -79701,7 +79846,7 @@ Domain to not audit.
54761 </summary>
54762 </param>
54763 </interface>
54764 -<interface name="files_dontaudit_read_etc_files" lineno="3583">
54765 +<interface name="files_dontaudit_read_etc_files" lineno="3648">
54766 <summary>
54767 Do not audit attempts to read files
54768 in /etc
54769 @@ -79712,7 +79857,7 @@ Domain to not audit.
54770 </summary>
54771 </param>
54772 </interface>
54773 -<interface name="files_dontaudit_write_etc_runtime_files" lineno="3602">
54774 +<interface name="files_dontaudit_write_etc_runtime_files" lineno="3667">
54775 <summary>
54776 Do not audit attempts to write
54777 etc runtime files.
54778 @@ -79723,7 +79868,7 @@ Domain to not audit.
54779 </summary>
54780 </param>
54781 </interface>
54782 -<interface name="files_rw_etc_runtime_files" lineno="3622">
54783 +<interface name="files_rw_etc_runtime_files" lineno="3687">
54784 <summary>
54785 Read and write files in /etc that are dynamically
54786 created on boot, such as mtab.
54787 @@ -79735,7 +79880,7 @@ Domain allowed access.
54788 </param>
54789 <rolecap/>
54790 </interface>
54791 -<interface name="files_manage_etc_runtime_files" lineno="3644">
54792 +<interface name="files_manage_etc_runtime_files" lineno="3709">
54793 <summary>
54794 Create, read, write, and delete files in
54795 /etc that are dynamically created on boot,
54796 @@ -79748,7 +79893,7 @@ Domain allowed access.
54797 </param>
54798 <rolecap/>
54799 </interface>
54800 -<interface name="files_relabelto_etc_runtime_files" lineno="3662">
54801 +<interface name="files_relabelto_etc_runtime_files" lineno="3727">
54802 <summary>
54803 Relabel to etc_runtime_t files.
54804 </summary>
54805 @@ -79758,7 +79903,7 @@ Domain allowed access.
54806 </summary>
54807 </param>
54808 </interface>
54809 -<interface name="files_etc_filetrans_etc_runtime" lineno="3691">
54810 +<interface name="files_etc_filetrans_etc_runtime" lineno="3756">
54811 <summary>
54812 Create, etc runtime objects with an automatic
54813 type transition.
54814 @@ -79779,7 +79924,7 @@ The name of the object being created.
54815 </summary>
54816 </param>
54817 </interface>
54818 -<interface name="files_getattr_home_dir" lineno="3710">
54819 +<interface name="files_getattr_home_dir" lineno="3775">
54820 <summary>
54821 Get the attributes of the home directories root
54822 (/home).
54823 @@ -79790,7 +79935,7 @@ Domain allowed access.
54824 </summary>
54825 </param>
54826 </interface>
54827 -<interface name="files_dontaudit_getattr_home_dir" lineno="3731">
54828 +<interface name="files_dontaudit_getattr_home_dir" lineno="3796">
54829 <summary>
54830 Do not audit attempts to get the
54831 attributes of the home directories root
54832 @@ -79802,7 +79947,7 @@ Domain to not audit.
54833 </summary>
54834 </param>
54835 </interface>
54836 -<interface name="files_search_home" lineno="3750">
54837 +<interface name="files_search_home" lineno="3815">
54838 <summary>
54839 Search home directories root (/home).
54840 </summary>
54841 @@ -79812,7 +79957,7 @@ Domain allowed access.
54842 </summary>
54843 </param>
54844 </interface>
54845 -<interface name="files_dontaudit_search_home" lineno="3770">
54846 +<interface name="files_dontaudit_search_home" lineno="3835">
54847 <summary>
54848 Do not audit attempts to search
54849 home directories root (/home).
54850 @@ -79823,7 +79968,7 @@ Domain to not audit.
54851 </summary>
54852 </param>
54853 </interface>
54854 -<interface name="files_dontaudit_list_home" lineno="3790">
54855 +<interface name="files_dontaudit_list_home" lineno="3855">
54856 <summary>
54857 Do not audit attempts to list
54858 home directories root (/home).
54859 @@ -79834,7 +79979,7 @@ Domain to not audit.
54860 </summary>
54861 </param>
54862 </interface>
54863 -<interface name="files_list_home" lineno="3809">
54864 +<interface name="files_list_home" lineno="3874">
54865 <summary>
54866 Get listing of home directories.
54867 </summary>
54868 @@ -79844,7 +79989,7 @@ Domain allowed access.
54869 </summary>
54870 </param>
54871 </interface>
54872 -<interface name="files_relabelto_home" lineno="3828">
54873 +<interface name="files_relabelto_home" lineno="3893">
54874 <summary>
54875 Relabel to user home root (/home).
54876 </summary>
54877 @@ -79854,7 +79999,7 @@ Domain allowed access.
54878 </summary>
54879 </param>
54880 </interface>
54881 -<interface name="files_relabelfrom_home" lineno="3846">
54882 +<interface name="files_relabelfrom_home" lineno="3911">
54883 <summary>
54884 Relabel from user home root (/home).
54885 </summary>
54886 @@ -79864,7 +80009,17 @@ Domain allowed access.
54887 </summary>
54888 </param>
54889 </interface>
54890 -<interface name="files_home_filetrans" lineno="3879">
54891 +<interface name="files_watch_home" lineno="3929">
54892 +<summary>
54893 +Watch the user home root (/home).
54894 +</summary>
54895 +<param name="domain">
54896 +<summary>
54897 +Domain allowed access.
54898 +</summary>
54899 +</param>
54900 +</interface>
54901 +<interface name="files_home_filetrans" lineno="3962">
54902 <summary>
54903 Create objects in /home.
54904 </summary>
54905 @@ -79889,7 +80044,7 @@ The name of the object being created.
54906 </summary>
54907 </param>
54908 </interface>
54909 -<interface name="files_getattr_lost_found_dirs" lineno="3897">
54910 +<interface name="files_getattr_lost_found_dirs" lineno="3980">
54911 <summary>
54912 Get the attributes of lost+found directories.
54913 </summary>
54914 @@ -79899,7 +80054,7 @@ Domain allowed access.
54915 </summary>
54916 </param>
54917 </interface>
54918 -<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3916">
54919 +<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3999">
54920 <summary>
54921 Do not audit attempts to get the attributes of
54922 lost+found directories.
54923 @@ -79910,7 +80065,7 @@ Domain to not audit.
54924 </summary>
54925 </param>
54926 </interface>
54927 -<interface name="files_list_lost_found" lineno="3934">
54928 +<interface name="files_list_lost_found" lineno="4017">
54929 <summary>
54930 List the contents of lost+found directories.
54931 </summary>
54932 @@ -79920,7 +80075,7 @@ Domain allowed access.
54933 </summary>
54934 </param>
54935 </interface>
54936 -<interface name="files_manage_lost_found" lineno="3954">
54937 +<interface name="files_manage_lost_found" lineno="4037">
54938 <summary>
54939 Create, read, write, and delete objects in
54940 lost+found directories.
54941 @@ -79932,7 +80087,7 @@ Domain allowed access.
54942 </param>
54943 <rolecap/>
54944 </interface>
54945 -<interface name="files_search_mnt" lineno="3976">
54946 +<interface name="files_search_mnt" lineno="4059">
54947 <summary>
54948 Search the contents of /mnt.
54949 </summary>
54950 @@ -79942,7 +80097,7 @@ Domain allowed access.
54951 </summary>
54952 </param>
54953 </interface>
54954 -<interface name="files_dontaudit_search_mnt" lineno="3994">
54955 +<interface name="files_dontaudit_search_mnt" lineno="4077">
54956 <summary>
54957 Do not audit attempts to search /mnt.
54958 </summary>
54959 @@ -79952,7 +80107,7 @@ Domain to not audit.
54960 </summary>
54961 </param>
54962 </interface>
54963 -<interface name="files_list_mnt" lineno="4012">
54964 +<interface name="files_list_mnt" lineno="4095">
54965 <summary>
54966 List the contents of /mnt.
54967 </summary>
54968 @@ -79962,7 +80117,7 @@ Domain allowed access.
54969 </summary>
54970 </param>
54971 </interface>
54972 -<interface name="files_dontaudit_list_mnt" lineno="4030">
54973 +<interface name="files_dontaudit_list_mnt" lineno="4113">
54974 <summary>
54975 Do not audit attempts to list the contents of /mnt.
54976 </summary>
54977 @@ -79972,7 +80127,7 @@ Domain allowed access.
54978 </summary>
54979 </param>
54980 </interface>
54981 -<interface name="files_mounton_mnt" lineno="4048">
54982 +<interface name="files_mounton_mnt" lineno="4131">
54983 <summary>
54984 Mount a filesystem on /mnt.
54985 </summary>
54986 @@ -79982,7 +80137,7 @@ Domain allowed access.
54987 </summary>
54988 </param>
54989 </interface>
54990 -<interface name="files_manage_mnt_dirs" lineno="4067">
54991 +<interface name="files_manage_mnt_dirs" lineno="4150">
54992 <summary>
54993 Create, read, write, and delete directories in /mnt.
54994 </summary>
54995 @@ -79993,7 +80148,7 @@ Domain allowed access.
54996 </param>
54997 <rolecap/>
54998 </interface>
54999 -<interface name="files_manage_mnt_files" lineno="4085">
55000 +<interface name="files_manage_mnt_files" lineno="4168">
55001 <summary>
55002 Create, read, write, and delete files in /mnt.
55003 </summary>
55004 @@ -80003,7 +80158,7 @@ Domain allowed access.
55005 </summary>
55006 </param>
55007 </interface>
55008 -<interface name="files_read_mnt_files" lineno="4103">
55009 +<interface name="files_read_mnt_files" lineno="4186">
55010 <summary>
55011 read files in /mnt.
55012 </summary>
55013 @@ -80013,7 +80168,7 @@ Domain allowed access.
55014 </summary>
55015 </param>
55016 </interface>
55017 -<interface name="files_read_mnt_symlinks" lineno="4121">
55018 +<interface name="files_read_mnt_symlinks" lineno="4204">
55019 <summary>
55020 Read symbolic links in /mnt.
55021 </summary>
55022 @@ -80023,7 +80178,7 @@ Domain allowed access.
55023 </summary>
55024 </param>
55025 </interface>
55026 -<interface name="files_manage_mnt_symlinks" lineno="4139">
55027 +<interface name="files_manage_mnt_symlinks" lineno="4222">
55028 <summary>
55029 Create, read, write, and delete symbolic links in /mnt.
55030 </summary>
55031 @@ -80033,7 +80188,7 @@ Domain allowed access.
55032 </summary>
55033 </param>
55034 </interface>
55035 -<interface name="files_search_kernel_modules" lineno="4157">
55036 +<interface name="files_search_kernel_modules" lineno="4240">
55037 <summary>
55038 Search the contents of the kernel module directories.
55039 </summary>
55040 @@ -80043,7 +80198,7 @@ Domain allowed access.
55041 </summary>
55042 </param>
55043 </interface>
55044 -<interface name="files_list_kernel_modules" lineno="4176">
55045 +<interface name="files_list_kernel_modules" lineno="4259">
55046 <summary>
55047 List the contents of the kernel module directories.
55048 </summary>
55049 @@ -80053,7 +80208,7 @@ Domain allowed access.
55050 </summary>
55051 </param>
55052 </interface>
55053 -<interface name="files_getattr_kernel_modules" lineno="4195">
55054 +<interface name="files_getattr_kernel_modules" lineno="4278">
55055 <summary>
55056 Get the attributes of kernel module files.
55057 </summary>
55058 @@ -80063,7 +80218,7 @@ Domain allowed access.
55059 </summary>
55060 </param>
55061 </interface>
55062 -<interface name="files_read_kernel_modules" lineno="4213">
55063 +<interface name="files_read_kernel_modules" lineno="4296">
55064 <summary>
55065 Read kernel module files.
55066 </summary>
55067 @@ -80073,7 +80228,7 @@ Domain allowed access.
55068 </summary>
55069 </param>
55070 </interface>
55071 -<interface name="files_mmap_read_kernel_modules" lineno="4233">
55072 +<interface name="files_mmap_read_kernel_modules" lineno="4316">
55073 <summary>
55074 Read and mmap kernel module files.
55075 </summary>
55076 @@ -80083,7 +80238,7 @@ Domain allowed access.
55077 </summary>
55078 </param>
55079 </interface>
55080 -<interface name="files_write_kernel_modules" lineno="4254">
55081 +<interface name="files_write_kernel_modules" lineno="4337">
55082 <summary>
55083 Write kernel module files.
55084 </summary>
55085 @@ -80093,7 +80248,7 @@ Domain allowed access.
55086 </summary>
55087 </param>
55088 </interface>
55089 -<interface name="files_delete_kernel_modules" lineno="4273">
55090 +<interface name="files_delete_kernel_modules" lineno="4356">
55091 <summary>
55092 Delete kernel module files.
55093 </summary>
55094 @@ -80103,7 +80258,7 @@ Domain allowed access.
55095 </summary>
55096 </param>
55097 </interface>
55098 -<interface name="files_manage_kernel_modules" lineno="4293">
55099 +<interface name="files_manage_kernel_modules" lineno="4376">
55100 <summary>
55101 Create, read, write, and delete
55102 kernel module files.
55103 @@ -80115,7 +80270,7 @@ Domain allowed access.
55104 </param>
55105 <rolecap/>
55106 </interface>
55107 -<interface name="files_relabel_kernel_modules" lineno="4313">
55108 +<interface name="files_relabel_kernel_modules" lineno="4396">
55109 <summary>
55110 Relabel from and to kernel module files.
55111 </summary>
55112 @@ -80125,7 +80280,7 @@ Domain allowed access.
55113 </summary>
55114 </param>
55115 </interface>
55116 -<interface name="files_kernel_modules_filetrans" lineno="4348">
55117 +<interface name="files_kernel_modules_filetrans" lineno="4431">
55118 <summary>
55119 Create objects in the kernel module directories
55120 with a private type via an automatic type transition.
55121 @@ -80151,7 +80306,7 @@ The name of the object being created.
55122 </summary>
55123 </param>
55124 </interface>
55125 -<interface name="files_load_kernel_modules" lineno="4366">
55126 +<interface name="files_load_kernel_modules" lineno="4449">
55127 <summary>
55128 Load kernel module files.
55129 </summary>
55130 @@ -80161,7 +80316,7 @@ Domain allowed access.
55131 </summary>
55132 </param>
55133 </interface>
55134 -<interface name="files_dontaudit_load_kernel_modules" lineno="4385">
55135 +<interface name="files_dontaudit_load_kernel_modules" lineno="4468">
55136 <summary>
55137 Load kernel module files.
55138 </summary>
55139 @@ -80171,7 +80326,7 @@ Domain allowed access.
55140 </summary>
55141 </param>
55142 </interface>
55143 -<interface name="files_list_world_readable" lineno="4405">
55144 +<interface name="files_list_world_readable" lineno="4488">
55145 <summary>
55146 List world-readable directories.
55147 </summary>
55148 @@ -80182,7 +80337,7 @@ Domain allowed access.
55149 </param>
55150 <rolecap/>
55151 </interface>
55152 -<interface name="files_read_world_readable_files" lineno="4424">
55153 +<interface name="files_read_world_readable_files" lineno="4507">
55154 <summary>
55155 Read world-readable files.
55156 </summary>
55157 @@ -80193,7 +80348,7 @@ Domain allowed access.
55158 </param>
55159 <rolecap/>
55160 </interface>
55161 -<interface name="files_read_world_readable_symlinks" lineno="4443">
55162 +<interface name="files_read_world_readable_symlinks" lineno="4526">
55163 <summary>
55164 Read world-readable symbolic links.
55165 </summary>
55166 @@ -80204,7 +80359,7 @@ Domain allowed access.
55167 </param>
55168 <rolecap/>
55169 </interface>
55170 -<interface name="files_read_world_readable_pipes" lineno="4461">
55171 +<interface name="files_read_world_readable_pipes" lineno="4544">
55172 <summary>
55173 Read world-readable named pipes.
55174 </summary>
55175 @@ -80214,7 +80369,7 @@ Domain allowed access.
55176 </summary>
55177 </param>
55178 </interface>
55179 -<interface name="files_read_world_readable_sockets" lineno="4479">
55180 +<interface name="files_read_world_readable_sockets" lineno="4562">
55181 <summary>
55182 Read world-readable sockets.
55183 </summary>
55184 @@ -80224,7 +80379,7 @@ Domain allowed access.
55185 </summary>
55186 </param>
55187 </interface>
55188 -<interface name="files_associate_tmp" lineno="4499">
55189 +<interface name="files_associate_tmp" lineno="4582">
55190 <summary>
55191 Allow the specified type to associate
55192 to a filesystem with the type of the
55193 @@ -80236,7 +80391,7 @@ Type of the file to associate.
55194 </summary>
55195 </param>
55196 </interface>
55197 -<interface name="files_getattr_tmp_dirs" lineno="4517">
55198 +<interface name="files_getattr_tmp_dirs" lineno="4600">
55199 <summary>
55200 Get the attributes of the tmp directory (/tmp).
55201 </summary>
55202 @@ -80246,7 +80401,7 @@ Domain allowed access.
55203 </summary>
55204 </param>
55205 </interface>
55206 -<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4536">
55207 +<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4619">
55208 <summary>
55209 Do not audit attempts to get the
55210 attributes of the tmp directory (/tmp).
55211 @@ -80257,7 +80412,7 @@ Domain allowed access.
55212 </summary>
55213 </param>
55214 </interface>
55215 -<interface name="files_search_tmp" lineno="4554">
55216 +<interface name="files_search_tmp" lineno="4637">
55217 <summary>
55218 Search the tmp directory (/tmp).
55219 </summary>
55220 @@ -80267,7 +80422,7 @@ Domain allowed access.
55221 </summary>
55222 </param>
55223 </interface>
55224 -<interface name="files_dontaudit_search_tmp" lineno="4572">
55225 +<interface name="files_dontaudit_search_tmp" lineno="4655">
55226 <summary>
55227 Do not audit attempts to search the tmp directory (/tmp).
55228 </summary>
55229 @@ -80277,7 +80432,7 @@ Domain to not audit.
55230 </summary>
55231 </param>
55232 </interface>
55233 -<interface name="files_list_tmp" lineno="4590">
55234 +<interface name="files_list_tmp" lineno="4673">
55235 <summary>
55236 Read the tmp directory (/tmp).
55237 </summary>
55238 @@ -80287,7 +80442,7 @@ Domain allowed access.
55239 </summary>
55240 </param>
55241 </interface>
55242 -<interface name="files_dontaudit_list_tmp" lineno="4608">
55243 +<interface name="files_dontaudit_list_tmp" lineno="4691">
55244 <summary>
55245 Do not audit listing of the tmp directory (/tmp).
55246 </summary>
55247 @@ -80297,7 +80452,7 @@ Domain not to audit.
55248 </summary>
55249 </param>
55250 </interface>
55251 -<interface name="files_delete_tmp_dir_entry" lineno="4626">
55252 +<interface name="files_delete_tmp_dir_entry" lineno="4709">
55253 <summary>
55254 Remove entries from the tmp directory.
55255 </summary>
55256 @@ -80307,7 +80462,7 @@ Domain allowed access.
55257 </summary>
55258 </param>
55259 </interface>
55260 -<interface name="files_read_generic_tmp_files" lineno="4644">
55261 +<interface name="files_read_generic_tmp_files" lineno="4727">
55262 <summary>
55263 Read files in the tmp directory (/tmp).
55264 </summary>
55265 @@ -80317,7 +80472,7 @@ Domain allowed access.
55266 </summary>
55267 </param>
55268 </interface>
55269 -<interface name="files_manage_generic_tmp_dirs" lineno="4662">
55270 +<interface name="files_manage_generic_tmp_dirs" lineno="4745">
55271 <summary>
55272 Manage temporary directories in /tmp.
55273 </summary>
55274 @@ -80327,7 +80482,7 @@ Domain allowed access.
55275 </summary>
55276 </param>
55277 </interface>
55278 -<interface name="files_relabel_generic_tmp_dirs" lineno="4680">
55279 +<interface name="files_relabel_generic_tmp_dirs" lineno="4763">
55280 <summary>
55281 Relabel temporary directories in /tmp.
55282 </summary>
55283 @@ -80337,7 +80492,7 @@ Domain allowed access.
55284 </summary>
55285 </param>
55286 </interface>
55287 -<interface name="files_manage_generic_tmp_files" lineno="4698">
55288 +<interface name="files_manage_generic_tmp_files" lineno="4781">
55289 <summary>
55290 Manage temporary files and directories in /tmp.
55291 </summary>
55292 @@ -80347,7 +80502,7 @@ Domain allowed access.
55293 </summary>
55294 </param>
55295 </interface>
55296 -<interface name="files_read_generic_tmp_symlinks" lineno="4716">
55297 +<interface name="files_read_generic_tmp_symlinks" lineno="4799">
55298 <summary>
55299 Read symbolic links in the tmp directory (/tmp).
55300 </summary>
55301 @@ -80357,7 +80512,7 @@ Domain allowed access.
55302 </summary>
55303 </param>
55304 </interface>
55305 -<interface name="files_rw_generic_tmp_sockets" lineno="4734">
55306 +<interface name="files_rw_generic_tmp_sockets" lineno="4817">
55307 <summary>
55308 Read and write generic named sockets in the tmp directory (/tmp).
55309 </summary>
55310 @@ -80367,7 +80522,7 @@ Domain allowed access.
55311 </summary>
55312 </param>
55313 </interface>
55314 -<interface name="files_mounton_tmp" lineno="4752">
55315 +<interface name="files_mounton_tmp" lineno="4835">
55316 <summary>
55317 Mount filesystems in the tmp directory (/tmp)
55318 </summary>
55319 @@ -80377,7 +80532,7 @@ Domain allowed access.
55320 </summary>
55321 </param>
55322 </interface>
55323 -<interface name="files_setattr_all_tmp_dirs" lineno="4770">
55324 +<interface name="files_setattr_all_tmp_dirs" lineno="4853">
55325 <summary>
55326 Set the attributes of all tmp directories.
55327 </summary>
55328 @@ -80387,7 +80542,7 @@ Domain allowed access.
55329 </summary>
55330 </param>
55331 </interface>
55332 -<interface name="files_list_all_tmp" lineno="4788">
55333 +<interface name="files_list_all_tmp" lineno="4871">
55334 <summary>
55335 List all tmp directories.
55336 </summary>
55337 @@ -80397,7 +80552,7 @@ Domain allowed access.
55338 </summary>
55339 </param>
55340 </interface>
55341 -<interface name="files_relabel_all_tmp_dirs" lineno="4808">
55342 +<interface name="files_relabel_all_tmp_dirs" lineno="4891">
55343 <summary>
55344 Relabel to and from all temporary
55345 directory types.
55346 @@ -80409,7 +80564,7 @@ Domain allowed access.
55347 </param>
55348 <rolecap/>
55349 </interface>
55350 -<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4829">
55351 +<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4912">
55352 <summary>
55353 Do not audit attempts to get the attributes
55354 of all tmp files.
55355 @@ -80420,7 +80575,7 @@ Domain not to audit.
55356 </summary>
55357 </param>
55358 </interface>
55359 -<interface name="files_getattr_all_tmp_files" lineno="4848">
55360 +<interface name="files_getattr_all_tmp_files" lineno="4931">
55361 <summary>
55362 Allow attempts to get the attributes
55363 of all tmp files.
55364 @@ -80431,7 +80586,7 @@ Domain allowed access.
55365 </summary>
55366 </param>
55367 </interface>
55368 -<interface name="files_relabel_all_tmp_files" lineno="4868">
55369 +<interface name="files_relabel_all_tmp_files" lineno="4951">
55370 <summary>
55371 Relabel to and from all temporary
55372 file types.
55373 @@ -80443,7 +80598,7 @@ Domain allowed access.
55374 </param>
55375 <rolecap/>
55376 </interface>
55377 -<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4889">
55378 +<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4972">
55379 <summary>
55380 Do not audit attempts to get the attributes
55381 of all tmp sock_file.
55382 @@ -80454,7 +80609,7 @@ Domain not to audit.
55383 </summary>
55384 </param>
55385 </interface>
55386 -<interface name="files_read_all_tmp_files" lineno="4907">
55387 +<interface name="files_read_all_tmp_files" lineno="4990">
55388 <summary>
55389 Read all tmp files.
55390 </summary>
55391 @@ -80464,7 +80619,7 @@ Domain allowed access.
55392 </summary>
55393 </param>
55394 </interface>
55395 -<interface name="files_tmp_filetrans" lineno="4941">
55396 +<interface name="files_tmp_filetrans" lineno="5024">
55397 <summary>
55398 Create an object in the tmp directories, with a private
55399 type using a type transition.
55400 @@ -80490,7 +80645,7 @@ The name of the object being created.
55401 </summary>
55402 </param>
55403 </interface>
55404 -<interface name="files_purge_tmp" lineno="4959">
55405 +<interface name="files_purge_tmp" lineno="5042">
55406 <summary>
55407 Delete the contents of /tmp.
55408 </summary>
55409 @@ -80500,7 +80655,17 @@ Domain allowed access.
55410 </summary>
55411 </param>
55412 </interface>
55413 -<interface name="files_setattr_usr_dirs" lineno="4982">
55414 +<interface name="files_getattr_all_tmpfs_files" lineno="5065">
55415 +<summary>
55416 +Get the attributes of all tmpfs files.
55417 +</summary>
55418 +<param name="type">
55419 +<summary>
55420 +Domain allowed access.
55421 +</summary>
55422 +</param>
55423 +</interface>
55424 +<interface name="files_setattr_usr_dirs" lineno="5084">
55425 <summary>
55426 Set the attributes of the /usr directory.
55427 </summary>
55428 @@ -80510,7 +80675,7 @@ Domain allowed access.
55429 </summary>
55430 </param>
55431 </interface>
55432 -<interface name="files_search_usr" lineno="5000">
55433 +<interface name="files_search_usr" lineno="5102">
55434 <summary>
55435 Search the content of /usr.
55436 </summary>
55437 @@ -80520,7 +80685,7 @@ Domain allowed access.
55438 </summary>
55439 </param>
55440 </interface>
55441 -<interface name="files_list_usr" lineno="5019">
55442 +<interface name="files_list_usr" lineno="5121">
55443 <summary>
55444 List the contents of generic
55445 directories in /usr.
55446 @@ -80531,7 +80696,7 @@ Domain allowed access.
55447 </summary>
55448 </param>
55449 </interface>
55450 -<interface name="files_dontaudit_write_usr_dirs" lineno="5037">
55451 +<interface name="files_dontaudit_write_usr_dirs" lineno="5139">
55452 <summary>
55453 Do not audit write of /usr dirs
55454 </summary>
55455 @@ -80541,7 +80706,7 @@ Domain to not audit.
55456 </summary>
55457 </param>
55458 </interface>
55459 -<interface name="files_rw_usr_dirs" lineno="5055">
55460 +<interface name="files_rw_usr_dirs" lineno="5157">
55461 <summary>
55462 Add and remove entries from /usr directories.
55463 </summary>
55464 @@ -80551,7 +80716,7 @@ Domain allowed access.
55465 </summary>
55466 </param>
55467 </interface>
55468 -<interface name="files_dontaudit_rw_usr_dirs" lineno="5074">
55469 +<interface name="files_dontaudit_rw_usr_dirs" lineno="5176">
55470 <summary>
55471 Do not audit attempts to add and remove
55472 entries from /usr directories.
55473 @@ -80562,7 +80727,7 @@ Domain to not audit.
55474 </summary>
55475 </param>
55476 </interface>
55477 -<interface name="files_delete_usr_dirs" lineno="5092">
55478 +<interface name="files_delete_usr_dirs" lineno="5194">
55479 <summary>
55480 Delete generic directories in /usr in the caller domain.
55481 </summary>
55482 @@ -80572,7 +80737,7 @@ Domain allowed access.
55483 </summary>
55484 </param>
55485 </interface>
55486 -<interface name="files_watch_usr_dirs" lineno="5110">
55487 +<interface name="files_watch_usr_dirs" lineno="5212">
55488 <summary>
55489 Watch generic directories in /usr.
55490 </summary>
55491 @@ -80582,7 +80747,7 @@ Domain allowed access.
55492 </summary>
55493 </param>
55494 </interface>
55495 -<interface name="files_delete_usr_files" lineno="5128">
55496 +<interface name="files_delete_usr_files" lineno="5230">
55497 <summary>
55498 Delete generic files in /usr in the caller domain.
55499 </summary>
55500 @@ -80592,7 +80757,7 @@ Domain allowed access.
55501 </summary>
55502 </param>
55503 </interface>
55504 -<interface name="files_getattr_usr_files" lineno="5146">
55505 +<interface name="files_getattr_usr_files" lineno="5248">
55506 <summary>
55507 Get the attributes of files in /usr.
55508 </summary>
55509 @@ -80602,7 +80767,7 @@ Domain allowed access.
55510 </summary>
55511 </param>
55512 </interface>
55513 -<interface name="files_map_usr_files" lineno="5165">
55514 +<interface name="files_map_usr_files" lineno="5267">
55515 <summary>
55516 Map generic files in /usr.
55517 </summary>
55518 @@ -80613,7 +80778,7 @@ Domain allowed access.
55519 </param>
55520 <infoflow type="read" weight="10"/>
55521 </interface>
55522 -<interface name="files_read_usr_files" lineno="5201">
55523 +<interface name="files_read_usr_files" lineno="5303">
55524 <summary>
55525 Read generic files in /usr.
55526 </summary>
55527 @@ -80641,7 +80806,7 @@ Domain allowed access.
55528 </param>
55529 <infoflow type="read" weight="10"/>
55530 </interface>
55531 -<interface name="files_exec_usr_files" lineno="5221">
55532 +<interface name="files_exec_usr_files" lineno="5323">
55533 <summary>
55534 Execute generic programs in /usr in the caller domain.
55535 </summary>
55536 @@ -80651,7 +80816,7 @@ Domain allowed access.
55537 </summary>
55538 </param>
55539 </interface>
55540 -<interface name="files_dontaudit_write_usr_files" lineno="5241">
55541 +<interface name="files_dontaudit_write_usr_files" lineno="5343">
55542 <summary>
55543 dontaudit write of /usr files
55544 </summary>
55545 @@ -80661,7 +80826,7 @@ Domain to not audit.
55546 </summary>
55547 </param>
55548 </interface>
55549 -<interface name="files_manage_usr_files" lineno="5259">
55550 +<interface name="files_manage_usr_files" lineno="5361">
55551 <summary>
55552 Create, read, write, and delete files in the /usr directory.
55553 </summary>
55554 @@ -80671,7 +80836,7 @@ Domain allowed access.
55555 </summary>
55556 </param>
55557 </interface>
55558 -<interface name="files_relabelto_usr_files" lineno="5277">
55559 +<interface name="files_relabelto_usr_files" lineno="5379">
55560 <summary>
55561 Relabel a file to the type used in /usr.
55562 </summary>
55563 @@ -80681,7 +80846,7 @@ Domain allowed access.
55564 </summary>
55565 </param>
55566 </interface>
55567 -<interface name="files_relabelfrom_usr_files" lineno="5295">
55568 +<interface name="files_relabelfrom_usr_files" lineno="5397">
55569 <summary>
55570 Relabel a file from the type used in /usr.
55571 </summary>
55572 @@ -80691,7 +80856,7 @@ Domain allowed access.
55573 </summary>
55574 </param>
55575 </interface>
55576 -<interface name="files_read_usr_symlinks" lineno="5313">
55577 +<interface name="files_read_usr_symlinks" lineno="5415">
55578 <summary>
55579 Read symbolic links in /usr.
55580 </summary>
55581 @@ -80701,7 +80866,7 @@ Domain allowed access.
55582 </summary>
55583 </param>
55584 </interface>
55585 -<interface name="files_usr_filetrans" lineno="5346">
55586 +<interface name="files_usr_filetrans" lineno="5448">
55587 <summary>
55588 Create objects in the /usr directory
55589 </summary>
55590 @@ -80726,7 +80891,7 @@ The name of the object being created.
55591 </summary>
55592 </param>
55593 </interface>
55594 -<interface name="files_search_src" lineno="5364">
55595 +<interface name="files_search_src" lineno="5466">
55596 <summary>
55597 Search directories in /usr/src.
55598 </summary>
55599 @@ -80736,7 +80901,7 @@ Domain allowed access.
55600 </summary>
55601 </param>
55602 </interface>
55603 -<interface name="files_dontaudit_search_src" lineno="5382">
55604 +<interface name="files_dontaudit_search_src" lineno="5484">
55605 <summary>
55606 Do not audit attempts to search /usr/src.
55607 </summary>
55608 @@ -80746,7 +80911,7 @@ Domain to not audit.
55609 </summary>
55610 </param>
55611 </interface>
55612 -<interface name="files_getattr_usr_src_files" lineno="5400">
55613 +<interface name="files_getattr_usr_src_files" lineno="5502">
55614 <summary>
55615 Get the attributes of files in /usr/src.
55616 </summary>
55617 @@ -80756,7 +80921,7 @@ Domain allowed access.
55618 </summary>
55619 </param>
55620 </interface>
55621 -<interface name="files_read_usr_src_files" lineno="5421">
55622 +<interface name="files_read_usr_src_files" lineno="5523">
55623 <summary>
55624 Read files in /usr/src.
55625 </summary>
55626 @@ -80766,7 +80931,7 @@ Domain allowed access.
55627 </summary>
55628 </param>
55629 </interface>
55630 -<interface name="files_exec_usr_src_files" lineno="5442">
55631 +<interface name="files_exec_usr_src_files" lineno="5544">
55632 <summary>
55633 Execute programs in /usr/src in the caller domain.
55634 </summary>
55635 @@ -80776,7 +80941,7 @@ Domain allowed access.
55636 </summary>
55637 </param>
55638 </interface>
55639 -<interface name="files_create_kernel_symbol_table" lineno="5462">
55640 +<interface name="files_create_kernel_symbol_table" lineno="5564">
55641 <summary>
55642 Install a system.map into the /boot directory.
55643 </summary>
55644 @@ -80786,7 +80951,7 @@ Domain allowed access.
55645 </summary>
55646 </param>
55647 </interface>
55648 -<interface name="files_read_kernel_symbol_table" lineno="5481">
55649 +<interface name="files_read_kernel_symbol_table" lineno="5583">
55650 <summary>
55651 Read system.map in the /boot directory.
55652 </summary>
55653 @@ -80796,7 +80961,7 @@ Domain allowed access.
55654 </summary>
55655 </param>
55656 </interface>
55657 -<interface name="files_delete_kernel_symbol_table" lineno="5500">
55658 +<interface name="files_delete_kernel_symbol_table" lineno="5602">
55659 <summary>
55660 Delete a system.map in the /boot directory.
55661 </summary>
55662 @@ -80806,7 +80971,7 @@ Domain allowed access.
55663 </summary>
55664 </param>
55665 </interface>
55666 -<interface name="files_search_var" lineno="5519">
55667 +<interface name="files_search_var" lineno="5621">
55668 <summary>
55669 Search the contents of /var.
55670 </summary>
55671 @@ -80816,7 +80981,7 @@ Domain allowed access.
55672 </summary>
55673 </param>
55674 </interface>
55675 -<interface name="files_dontaudit_write_var_dirs" lineno="5537">
55676 +<interface name="files_dontaudit_write_var_dirs" lineno="5639">
55677 <summary>
55678 Do not audit attempts to write to /var.
55679 </summary>
55680 @@ -80826,7 +80991,7 @@ Domain to not audit.
55681 </summary>
55682 </param>
55683 </interface>
55684 -<interface name="files_write_var_dirs" lineno="5555">
55685 +<interface name="files_write_var_dirs" lineno="5657">
55686 <summary>
55687 Allow attempts to write to /var.dirs
55688 </summary>
55689 @@ -80836,7 +81001,7 @@ Domain allowed access.
55690 </summary>
55691 </param>
55692 </interface>
55693 -<interface name="files_dontaudit_search_var" lineno="5574">
55694 +<interface name="files_dontaudit_search_var" lineno="5676">
55695 <summary>
55696 Do not audit attempts to search
55697 the contents of /var.
55698 @@ -80847,7 +81012,7 @@ Domain to not audit.
55699 </summary>
55700 </param>
55701 </interface>
55702 -<interface name="files_list_var" lineno="5592">
55703 +<interface name="files_list_var" lineno="5694">
55704 <summary>
55705 List the contents of /var.
55706 </summary>
55707 @@ -80857,7 +81022,7 @@ Domain allowed access.
55708 </summary>
55709 </param>
55710 </interface>
55711 -<interface name="files_dontaudit_list_var" lineno="5611">
55712 +<interface name="files_dontaudit_list_var" lineno="5713">
55713 <summary>
55714 Do not audit attempts to list
55715 the contents of /var.
55716 @@ -80868,7 +81033,7 @@ Domain to not audit.
55717 </summary>
55718 </param>
55719 </interface>
55720 -<interface name="files_manage_var_dirs" lineno="5630">
55721 +<interface name="files_manage_var_dirs" lineno="5732">
55722 <summary>
55723 Create, read, write, and delete directories
55724 in the /var directory.
55725 @@ -80879,7 +81044,7 @@ Domain allowed access.
55726 </summary>
55727 </param>
55728 </interface>
55729 -<interface name="files_relabel_var_dirs" lineno="5648">
55730 +<interface name="files_relabel_var_dirs" lineno="5750">
55731 <summary>
55732 relabelto/from var directories
55733 </summary>
55734 @@ -80889,7 +81054,7 @@ Domain allowed access.
55735 </summary>
55736 </param>
55737 </interface>
55738 -<interface name="files_read_var_files" lineno="5666">
55739 +<interface name="files_read_var_files" lineno="5768">
55740 <summary>
55741 Read files in the /var directory.
55742 </summary>
55743 @@ -80899,7 +81064,7 @@ Domain allowed access.
55744 </summary>
55745 </param>
55746 </interface>
55747 -<interface name="files_append_var_files" lineno="5684">
55748 +<interface name="files_append_var_files" lineno="5786">
55749 <summary>
55750 Append files in the /var directory.
55751 </summary>
55752 @@ -80909,7 +81074,7 @@ Domain allowed access.
55753 </summary>
55754 </param>
55755 </interface>
55756 -<interface name="files_rw_var_files" lineno="5702">
55757 +<interface name="files_rw_var_files" lineno="5804">
55758 <summary>
55759 Read and write files in the /var directory.
55760 </summary>
55761 @@ -80919,7 +81084,7 @@ Domain allowed access.
55762 </summary>
55763 </param>
55764 </interface>
55765 -<interface name="files_dontaudit_rw_var_files" lineno="5721">
55766 +<interface name="files_dontaudit_rw_var_files" lineno="5823">
55767 <summary>
55768 Do not audit attempts to read and write
55769 files in the /var directory.
55770 @@ -80930,7 +81095,7 @@ Domain to not audit.
55771 </summary>
55772 </param>
55773 </interface>
55774 -<interface name="files_manage_var_files" lineno="5739">
55775 +<interface name="files_manage_var_files" lineno="5841">
55776 <summary>
55777 Create, read, write, and delete files in the /var directory.
55778 </summary>
55779 @@ -80940,7 +81105,7 @@ Domain allowed access.
55780 </summary>
55781 </param>
55782 </interface>
55783 -<interface name="files_read_var_symlinks" lineno="5757">
55784 +<interface name="files_read_var_symlinks" lineno="5859">
55785 <summary>
55786 Read symbolic links in the /var directory.
55787 </summary>
55788 @@ -80950,7 +81115,7 @@ Domain allowed access.
55789 </summary>
55790 </param>
55791 </interface>
55792 -<interface name="files_manage_var_symlinks" lineno="5776">
55793 +<interface name="files_manage_var_symlinks" lineno="5878">
55794 <summary>
55795 Create, read, write, and delete symbolic
55796 links in the /var directory.
55797 @@ -80961,7 +81126,7 @@ Domain allowed access.
55798 </summary>
55799 </param>
55800 </interface>
55801 -<interface name="files_var_filetrans" lineno="5809">
55802 +<interface name="files_var_filetrans" lineno="5911">
55803 <summary>
55804 Create objects in the /var directory
55805 </summary>
55806 @@ -80986,7 +81151,7 @@ The name of the object being created.
55807 </summary>
55808 </param>
55809 </interface>
55810 -<interface name="files_getattr_var_lib_dirs" lineno="5827">
55811 +<interface name="files_getattr_var_lib_dirs" lineno="5929">
55812 <summary>
55813 Get the attributes of the /var/lib directory.
55814 </summary>
55815 @@ -80996,7 +81161,7 @@ Domain allowed access.
55816 </summary>
55817 </param>
55818 </interface>
55819 -<interface name="files_search_var_lib" lineno="5859">
55820 +<interface name="files_search_var_lib" lineno="5961">
55821 <summary>
55822 Search the /var/lib directory.
55823 </summary>
55824 @@ -81020,7 +81185,7 @@ Domain allowed access.
55825 </param>
55826 <infoflow type="read" weight="5"/>
55827 </interface>
55828 -<interface name="files_dontaudit_search_var_lib" lineno="5879">
55829 +<interface name="files_dontaudit_search_var_lib" lineno="5981">
55830 <summary>
55831 Do not audit attempts to search the
55832 contents of /var/lib.
55833 @@ -81032,7 +81197,7 @@ Domain to not audit.
55834 </param>
55835 <infoflow type="read" weight="5"/>
55836 </interface>
55837 -<interface name="files_list_var_lib" lineno="5897">
55838 +<interface name="files_list_var_lib" lineno="5999">
55839 <summary>
55840 List the contents of the /var/lib directory.
55841 </summary>
55842 @@ -81042,7 +81207,7 @@ Domain allowed access.
55843 </summary>
55844 </param>
55845 </interface>
55846 -<interface name="files_rw_var_lib_dirs" lineno="5915">
55847 +<interface name="files_rw_var_lib_dirs" lineno="6017">
55848 <summary>
55849 Read-write /var/lib directories
55850 </summary>
55851 @@ -81052,7 +81217,7 @@ Domain allowed access.
55852 </summary>
55853 </param>
55854 </interface>
55855 -<interface name="files_manage_var_lib_dirs" lineno="5933">
55856 +<interface name="files_manage_var_lib_dirs" lineno="6035">
55857 <summary>
55858 manage var_lib_t dirs
55859 </summary>
55860 @@ -81062,7 +81227,7 @@ Domain allowed access.
55861 </summary>
55862 </param>
55863 </interface>
55864 -<interface name="files_relabel_var_lib_dirs" lineno="5952">
55865 +<interface name="files_relabel_var_lib_dirs" lineno="6054">
55866 <summary>
55867 relabel var_lib_t dirs
55868 </summary>
55869 @@ -81072,7 +81237,7 @@ Domain allowed access.
55870 </summary>
55871 </param>
55872 </interface>
55873 -<interface name="files_var_lib_filetrans" lineno="5986">
55874 +<interface name="files_var_lib_filetrans" lineno="6088">
55875 <summary>
55876 Create objects in the /var/lib directory
55877 </summary>
55878 @@ -81097,7 +81262,7 @@ The name of the object being created.
55879 </summary>
55880 </param>
55881 </interface>
55882 -<interface name="files_read_var_lib_files" lineno="6005">
55883 +<interface name="files_read_var_lib_files" lineno="6107">
55884 <summary>
55885 Read generic files in /var/lib.
55886 </summary>
55887 @@ -81107,7 +81272,7 @@ Domain allowed access.
55888 </summary>
55889 </param>
55890 </interface>
55891 -<interface name="files_read_var_lib_symlinks" lineno="6024">
55892 +<interface name="files_read_var_lib_symlinks" lineno="6126">
55893 <summary>
55894 Read generic symbolic links in /var/lib
55895 </summary>
55896 @@ -81117,7 +81282,7 @@ Domain allowed access.
55897 </summary>
55898 </param>
55899 </interface>
55900 -<interface name="files_manage_urandom_seed" lineno="6046">
55901 +<interface name="files_manage_urandom_seed" lineno="6148">
55902 <summary>
55903 Create, read, write, and delete the
55904 pseudorandom number generator seed.
55905 @@ -81128,7 +81293,7 @@ Domain allowed access.
55906 </summary>
55907 </param>
55908 </interface>
55909 -<interface name="files_manage_mounttab" lineno="6066">
55910 +<interface name="files_manage_mounttab" lineno="6168">
55911 <summary>
55912 Allow domain to manage mount tables
55913 necessary for rpcd, nfsd, etc.
55914 @@ -81139,7 +81304,7 @@ Domain allowed access.
55915 </summary>
55916 </param>
55917 </interface>
55918 -<interface name="files_setattr_lock_dirs" lineno="6085">
55919 +<interface name="files_setattr_lock_dirs" lineno="6187">
55920 <summary>
55921 Set the attributes of the generic lock directories.
55922 </summary>
55923 @@ -81149,7 +81314,7 @@ Domain allowed access.
55924 </summary>
55925 </param>
55926 </interface>
55927 -<interface name="files_search_locks" lineno="6103">
55928 +<interface name="files_search_locks" lineno="6205">
55929 <summary>
55930 Search the locks directory (/var/lock).
55931 </summary>
55932 @@ -81159,7 +81324,7 @@ Domain allowed access.
55933 </summary>
55934 </param>
55935 </interface>
55936 -<interface name="files_dontaudit_search_locks" lineno="6123">
55937 +<interface name="files_dontaudit_search_locks" lineno="6225">
55938 <summary>
55939 Do not audit attempts to search the
55940 locks directory (/var/lock).
55941 @@ -81170,7 +81335,7 @@ Domain to not audit.
55942 </summary>
55943 </param>
55944 </interface>
55945 -<interface name="files_list_locks" lineno="6142">
55946 +<interface name="files_list_locks" lineno="6244">
55947 <summary>
55948 List generic lock directories.
55949 </summary>
55950 @@ -81180,7 +81345,7 @@ Domain allowed access.
55951 </summary>
55952 </param>
55953 </interface>
55954 -<interface name="files_check_write_lock_dirs" lineno="6161">
55955 +<interface name="files_check_write_lock_dirs" lineno="6263">
55956 <summary>
55957 Test write access on lock directories.
55958 </summary>
55959 @@ -81190,7 +81355,7 @@ Domain allowed access.
55960 </summary>
55961 </param>
55962 </interface>
55963 -<interface name="files_add_entry_lock_dirs" lineno="6180">
55964 +<interface name="files_add_entry_lock_dirs" lineno="6282">
55965 <summary>
55966 Add entries in the /var/lock directories.
55967 </summary>
55968 @@ -81200,7 +81365,7 @@ Domain allowed access.
55969 </summary>
55970 </param>
55971 </interface>
55972 -<interface name="files_rw_lock_dirs" lineno="6200">
55973 +<interface name="files_rw_lock_dirs" lineno="6302">
55974 <summary>
55975 Add and remove entries in the /var/lock
55976 directories.
55977 @@ -81211,7 +81376,7 @@ Domain allowed access.
55978 </summary>
55979 </param>
55980 </interface>
55981 -<interface name="files_create_lock_dirs" lineno="6219">
55982 +<interface name="files_create_lock_dirs" lineno="6321">
55983 <summary>
55984 Create lock directories
55985 </summary>
55986 @@ -81221,7 +81386,7 @@ Domain allowed access
55987 </summary>
55988 </param>
55989 </interface>
55990 -<interface name="files_relabel_all_lock_dirs" lineno="6240">
55991 +<interface name="files_relabel_all_lock_dirs" lineno="6342">
55992 <summary>
55993 Relabel to and from all lock directory types.
55994 </summary>
55995 @@ -81232,7 +81397,7 @@ Domain allowed access.
55996 </param>
55997 <rolecap/>
55998 </interface>
55999 -<interface name="files_getattr_generic_locks" lineno="6261">
56000 +<interface name="files_getattr_generic_locks" lineno="6363">
56001 <summary>
56002 Get the attributes of generic lock files.
56003 </summary>
56004 @@ -81242,7 +81407,7 @@ Domain allowed access.
56005 </summary>
56006 </param>
56007 </interface>
56008 -<interface name="files_delete_generic_locks" lineno="6282">
56009 +<interface name="files_delete_generic_locks" lineno="6384">
56010 <summary>
56011 Delete generic lock files.
56012 </summary>
56013 @@ -81252,7 +81417,7 @@ Domain allowed access.
56014 </summary>
56015 </param>
56016 </interface>
56017 -<interface name="files_manage_generic_locks" lineno="6303">
56018 +<interface name="files_manage_generic_locks" lineno="6405">
56019 <summary>
56020 Create, read, write, and delete generic
56021 lock files.
56022 @@ -81263,7 +81428,7 @@ Domain allowed access.
56023 </summary>
56024 </param>
56025 </interface>
56026 -<interface name="files_delete_all_locks" lineno="6325">
56027 +<interface name="files_delete_all_locks" lineno="6427">
56028 <summary>
56029 Delete all lock files.
56030 </summary>
56031 @@ -81274,7 +81439,7 @@ Domain allowed access.
56032 </param>
56033 <rolecap/>
56034 </interface>
56035 -<interface name="files_read_all_locks" lineno="6346">
56036 +<interface name="files_read_all_locks" lineno="6448">
56037 <summary>
56038 Read all lock files.
56039 </summary>
56040 @@ -81284,7 +81449,7 @@ Domain allowed access.
56041 </summary>
56042 </param>
56043 </interface>
56044 -<interface name="files_manage_all_locks" lineno="6369">
56045 +<interface name="files_manage_all_locks" lineno="6471">
56046 <summary>
56047 manage all lock files.
56048 </summary>
56049 @@ -81294,7 +81459,7 @@ Domain allowed access.
56050 </summary>
56051 </param>
56052 </interface>
56053 -<interface name="files_relabel_all_locks" lineno="6392">
56054 +<interface name="files_relabel_all_locks" lineno="6494">
56055 <summary>
56056 Relabel from/to all lock files.
56057 </summary>
56058 @@ -81304,7 +81469,7 @@ Domain allowed access.
56059 </summary>
56060 </param>
56061 </interface>
56062 -<interface name="files_lock_filetrans" lineno="6431">
56063 +<interface name="files_lock_filetrans" lineno="6533">
56064 <summary>
56065 Create an object in the locks directory, with a private
56066 type using a type transition.
56067 @@ -81330,7 +81495,7 @@ The name of the object being created.
56068 </summary>
56069 </param>
56070 </interface>
56071 -<interface name="files_dontaudit_getattr_pid_dirs" lineno="6452">
56072 +<interface name="files_dontaudit_getattr_pid_dirs" lineno="6554">
56073 <summary>
56074 Do not audit attempts to get the attributes
56075 of the /var/run directory. (Deprecated)
56076 @@ -81341,7 +81506,7 @@ Domain to not audit.
56077 </summary>
56078 </param>
56079 </interface>
56080 -<interface name="files_mounton_pid_dirs" lineno="6467">
56081 +<interface name="files_mounton_pid_dirs" lineno="6569">
56082 <summary>
56083 mounton a /var/run directory. (Deprecated)
56084 </summary>
56085 @@ -81351,7 +81516,7 @@ Domain allowed access.
56086 </summary>
56087 </param>
56088 </interface>
56089 -<interface name="files_setattr_pid_dirs" lineno="6482">
56090 +<interface name="files_setattr_pid_dirs" lineno="6584">
56091 <summary>
56092 Set the attributes of the /var/run directory. (Deprecated)
56093 </summary>
56094 @@ -81361,7 +81526,7 @@ Domain allowed access.
56095 </summary>
56096 </param>
56097 </interface>
56098 -<interface name="files_search_pids" lineno="6498">
56099 +<interface name="files_search_pids" lineno="6600">
56100 <summary>
56101 Search the contents of runtime process
56102 ID directories (/var/run). (Deprecated)
56103 @@ -81372,7 +81537,7 @@ Domain allowed access.
56104 </summary>
56105 </param>
56106 </interface>
56107 -<interface name="files_dontaudit_search_pids" lineno="6514">
56108 +<interface name="files_dontaudit_search_pids" lineno="6616">
56109 <summary>
56110 Do not audit attempts to search
56111 the /var/run directory. (Deprecated)
56112 @@ -81383,7 +81548,7 @@ Domain to not audit.
56113 </summary>
56114 </param>
56115 </interface>
56116 -<interface name="files_list_pids" lineno="6530">
56117 +<interface name="files_list_pids" lineno="6632">
56118 <summary>
56119 List the contents of the runtime process
56120 ID directories (/var/run). (Deprecated)
56121 @@ -81394,7 +81559,7 @@ Domain allowed access.
56122 </summary>
56123 </param>
56124 </interface>
56125 -<interface name="files_check_write_pid_dirs" lineno="6545">
56126 +<interface name="files_check_write_pid_dirs" lineno="6647">
56127 <summary>
56128 Check write access on /var/run directories. (Deprecated)
56129 </summary>
56130 @@ -81404,7 +81569,7 @@ Domain allowed access.
56131 </summary>
56132 </param>
56133 </interface>
56134 -<interface name="files_create_pid_dirs" lineno="6560">
56135 +<interface name="files_create_pid_dirs" lineno="6662">
56136 <summary>
56137 Create a /var/run directory. (Deprecated)
56138 </summary>
56139 @@ -81414,7 +81579,7 @@ Domain allowed access.
56140 </summary>
56141 </param>
56142 </interface>
56143 -<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6576">
56144 +<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6678">
56145 <summary>
56146 Do not audit attempts to get the attributes
56147 of the /var/run directory.
56148 @@ -81425,7 +81590,7 @@ Domain to not audit.
56149 </summary>
56150 </param>
56151 </interface>
56152 -<interface name="files_mounton_runtime_dirs" lineno="6595">
56153 +<interface name="files_mounton_runtime_dirs" lineno="6697">
56154 <summary>
56155 mounton a /var/run directory.
56156 </summary>
56157 @@ -81435,7 +81600,7 @@ Domain allowed access.
56158 </summary>
56159 </param>
56160 </interface>
56161 -<interface name="files_setattr_runtime_dirs" lineno="6613">
56162 +<interface name="files_setattr_runtime_dirs" lineno="6715">
56163 <summary>
56164 Set the attributes of the /var/run directory.
56165 </summary>
56166 @@ -81445,7 +81610,7 @@ Domain allowed access.
56167 </summary>
56168 </param>
56169 </interface>
56170 -<interface name="files_search_runtime" lineno="6633">
56171 +<interface name="files_search_runtime" lineno="6735">
56172 <summary>
56173 Search the contents of runtime process
56174 ID directories (/var/run).
56175 @@ -81456,7 +81621,7 @@ Domain allowed access.
56176 </summary>
56177 </param>
56178 </interface>
56179 -<interface name="files_dontaudit_search_runtime" lineno="6653">
56180 +<interface name="files_dontaudit_search_runtime" lineno="6755">
56181 <summary>
56182 Do not audit attempts to search
56183 the /var/run directory.
56184 @@ -81467,7 +81632,7 @@ Domain to not audit.
56185 </summary>
56186 </param>
56187 </interface>
56188 -<interface name="files_list_runtime" lineno="6673">
56189 +<interface name="files_list_runtime" lineno="6775">
56190 <summary>
56191 List the contents of the runtime process
56192 ID directories (/var/run).
56193 @@ -81478,7 +81643,7 @@ Domain allowed access.
56194 </summary>
56195 </param>
56196 </interface>
56197 -<interface name="files_check_write_runtime_dirs" lineno="6692">
56198 +<interface name="files_check_write_runtime_dirs" lineno="6794">
56199 <summary>
56200 Check write access on /var/run directories.
56201 </summary>
56202 @@ -81488,7 +81653,7 @@ Domain allowed access.
56203 </summary>
56204 </param>
56205 </interface>
56206 -<interface name="files_create_runtime_dirs" lineno="6710">
56207 +<interface name="files_create_runtime_dirs" lineno="6812">
56208 <summary>
56209 Create a /var/run directory.
56210 </summary>
56211 @@ -81498,7 +81663,7 @@ Domain allowed access.
56212 </summary>
56213 </param>
56214 </interface>
56215 -<interface name="files_watch_runtime_dirs" lineno="6728">
56216 +<interface name="files_watch_runtime_dirs" lineno="6830">
56217 <summary>
56218 Watch /var/run directories.
56219 </summary>
56220 @@ -81508,7 +81673,7 @@ Domain allowed access.
56221 </summary>
56222 </param>
56223 </interface>
56224 -<interface name="files_read_generic_pids" lineno="6746">
56225 +<interface name="files_read_generic_pids" lineno="6848">
56226 <summary>
56227 Read generic process ID files. (Deprecated)
56228 </summary>
56229 @@ -81518,7 +81683,7 @@ Domain allowed access.
56230 </summary>
56231 </param>
56232 </interface>
56233 -<interface name="files_write_generic_pid_pipes" lineno="6761">
56234 +<interface name="files_write_generic_pid_pipes" lineno="6863">
56235 <summary>
56236 Write named generic process ID pipes. (Deprecated)
56237 </summary>
56238 @@ -81528,7 +81693,7 @@ Domain allowed access.
56239 </summary>
56240 </param>
56241 </interface>
56242 -<interface name="files_pid_filetrans" lineno="6818">
56243 +<interface name="files_pid_filetrans" lineno="6920">
56244 <summary>
56245 Create an object in the process ID directory, with a private type. (Deprecated)
56246 </summary>
56247 @@ -81580,7 +81745,7 @@ The name of the object being created.
56248 </param>
56249 <infoflow type="write" weight="10"/>
56250 </interface>
56251 -<interface name="files_pid_filetrans_lock_dir" lineno="6838">
56252 +<interface name="files_pid_filetrans_lock_dir" lineno="6940">
56253 <summary>
56254 Create a generic lock directory within the run directories. (Deprecated)
56255 </summary>
56256 @@ -81595,7 +81760,7 @@ The name of the object being created.
56257 </summary>
56258 </param>
56259 </interface>
56260 -<interface name="files_rw_generic_pids" lineno="6853">
56261 +<interface name="files_rw_generic_pids" lineno="6955">
56262 <summary>
56263 Read and write generic process ID files. (Deprecated)
56264 </summary>
56265 @@ -81605,7 +81770,7 @@ Domain allowed access.
56266 </summary>
56267 </param>
56268 </interface>
56269 -<interface name="files_dontaudit_getattr_all_pids" lineno="6869">
56270 +<interface name="files_dontaudit_getattr_all_pids" lineno="6971">
56271 <summary>
56272 Do not audit attempts to get the attributes of
56273 daemon runtime data files. (Deprecated)
56274 @@ -81616,7 +81781,7 @@ Domain to not audit.
56275 </summary>
56276 </param>
56277 </interface>
56278 -<interface name="files_dontaudit_write_all_pids" lineno="6884">
56279 +<interface name="files_dontaudit_write_all_pids" lineno="6986">
56280 <summary>
56281 Do not audit attempts to write to daemon runtime data files. (Deprecated)
56282 </summary>
56283 @@ -81626,7 +81791,7 @@ Domain to not audit.
56284 </summary>
56285 </param>
56286 </interface>
56287 -<interface name="files_dontaudit_ioctl_all_pids" lineno="6899">
56288 +<interface name="files_dontaudit_ioctl_all_pids" lineno="7001">
56289 <summary>
56290 Do not audit attempts to ioctl daemon runtime data files. (Deprecated)
56291 </summary>
56292 @@ -81636,7 +81801,7 @@ Domain to not audit.
56293 </summary>
56294 </param>
56295 </interface>
56296 -<interface name="files_manage_all_pid_dirs" lineno="6915">
56297 +<interface name="files_manage_all_pid_dirs" lineno="7017">
56298 <summary>
56299 manage all pidfile directories
56300 in the /var/run directory. (Deprecated)
56301 @@ -81647,7 +81812,7 @@ Domain allowed access.
56302 </summary>
56303 </param>
56304 </interface>
56305 -<interface name="files_read_all_pids" lineno="6931">
56306 +<interface name="files_read_all_pids" lineno="7033">
56307 <summary>
56308 Read all process ID files. (Deprecated)
56309 </summary>
56310 @@ -81658,7 +81823,7 @@ Domain allowed access.
56311 </param>
56312 <rolecap/>
56313 </interface>
56314 -<interface name="files_exec_generic_pid_files" lineno="6946">
56315 +<interface name="files_exec_generic_pid_files" lineno="7048">
56316 <summary>
56317 Execute generic programs in /var/run in the caller domain. (Deprecated)
56318 </summary>
56319 @@ -81668,7 +81833,7 @@ Domain allowed access.
56320 </summary>
56321 </param>
56322 </interface>
56323 -<interface name="files_relabel_all_pid_files" lineno="6961">
56324 +<interface name="files_relabel_all_pid_files" lineno="7063">
56325 <summary>
56326 Relabel all pid files. (Deprecated)
56327 </summary>
56328 @@ -81678,7 +81843,7 @@ Domain allowed access.
56329 </summary>
56330 </param>
56331 </interface>
56332 -<interface name="files_delete_all_pids" lineno="6977">
56333 +<interface name="files_delete_all_pids" lineno="7079">
56334 <summary>
56335 Delete all process IDs. (Deprecated)
56336 </summary>
56337 @@ -81689,7 +81854,7 @@ Domain allowed access.
56338 </param>
56339 <rolecap/>
56340 </interface>
56341 -<interface name="files_create_all_pid_sockets" lineno="6996">
56342 +<interface name="files_create_all_pid_sockets" lineno="7098">
56343 <summary>
56344 Create all pid sockets. (Deprecated)
56345 </summary>
56346 @@ -81699,7 +81864,7 @@ Domain allowed access.
56347 </summary>
56348 </param>
56349 </interface>
56350 -<interface name="files_create_all_pid_pipes" lineno="7011">
56351 +<interface name="files_create_all_pid_pipes" lineno="7113">
56352 <summary>
56353 Create all pid named pipes. (Deprecated)
56354 </summary>
56355 @@ -81709,7 +81874,7 @@ Domain allowed access.
56356 </summary>
56357 </param>
56358 </interface>
56359 -<interface name="files_read_runtime_files" lineno="7026">
56360 +<interface name="files_read_runtime_files" lineno="7128">
56361 <summary>
56362 Read generic runtime files.
56363 </summary>
56364 @@ -81719,7 +81884,7 @@ Domain allowed access.
56365 </summary>
56366 </param>
56367 </interface>
56368 -<interface name="files_exec_runtime" lineno="7046">
56369 +<interface name="files_exec_runtime" lineno="7148">
56370 <summary>
56371 Execute generic programs in /var/run in the caller domain.
56372 </summary>
56373 @@ -81729,7 +81894,7 @@ Domain allowed access.
56374 </summary>
56375 </param>
56376 </interface>
56377 -<interface name="files_rw_runtime_files" lineno="7064">
56378 +<interface name="files_rw_runtime_files" lineno="7166">
56379 <summary>
56380 Read and write generic runtime files.
56381 </summary>
56382 @@ -81739,7 +81904,7 @@ Domain allowed access.
56383 </summary>
56384 </param>
56385 </interface>
56386 -<interface name="files_delete_runtime_symlinks" lineno="7084">
56387 +<interface name="files_delete_runtime_symlinks" lineno="7186">
56388 <summary>
56389 Delete generic runtime symlinks.
56390 </summary>
56391 @@ -81749,7 +81914,7 @@ Domain allowed access.
56392 </summary>
56393 </param>
56394 </interface>
56395 -<interface name="files_write_runtime_pipes" lineno="7102">
56396 +<interface name="files_write_runtime_pipes" lineno="7204">
56397 <summary>
56398 Write named generic runtime pipes.
56399 </summary>
56400 @@ -81759,7 +81924,7 @@ Domain allowed access.
56401 </summary>
56402 </param>
56403 </interface>
56404 -<interface name="files_delete_all_runtime_dirs" lineno="7122">
56405 +<interface name="files_delete_all_runtime_dirs" lineno="7224">
56406 <summary>
56407 Delete all runtime dirs.
56408 </summary>
56409 @@ -81770,7 +81935,7 @@ Domain allowed access.
56410 </param>
56411 <rolecap/>
56412 </interface>
56413 -<interface name="files_manage_all_runtime_dirs" lineno="7140">
56414 +<interface name="files_manage_all_runtime_dirs" lineno="7242">
56415 <summary>
56416 Create, read, write, and delete all runtime directories.
56417 </summary>
56418 @@ -81780,7 +81945,7 @@ Domain allowed access.
56419 </summary>
56420 </param>
56421 </interface>
56422 -<interface name="files_relabel_all_runtime_dirs" lineno="7158">
56423 +<interface name="files_relabel_all_runtime_dirs" lineno="7260">
56424 <summary>
56425 Relabel all runtime directories.
56426 </summary>
56427 @@ -81790,7 +81955,7 @@ Domain allowed access.
56428 </summary>
56429 </param>
56430 </interface>
56431 -<interface name="files_dontaudit_getattr_all_runtime_files" lineno="7177">
56432 +<interface name="files_dontaudit_getattr_all_runtime_files" lineno="7279">
56433 <summary>
56434 Do not audit attempts to get the attributes of
56435 all runtime data files.
56436 @@ -81801,7 +81966,7 @@ Domain to not audit.
56437 </summary>
56438 </param>
56439 </interface>
56440 -<interface name="files_read_all_runtime_files" lineno="7198">
56441 +<interface name="files_read_all_runtime_files" lineno="7300">
56442 <summary>
56443 Read all runtime files.
56444 </summary>
56445 @@ -81812,7 +81977,7 @@ Domain allowed access.
56446 </param>
56447 <rolecap/>
56448 </interface>
56449 -<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7219">
56450 +<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7321">
56451 <summary>
56452 Do not audit attempts to ioctl all runtime files.
56453 </summary>
56454 @@ -81822,7 +81987,7 @@ Domain to not audit.
56455 </summary>
56456 </param>
56457 </interface>
56458 -<interface name="files_dontaudit_write_all_runtime_files" lineno="7239">
56459 +<interface name="files_dontaudit_write_all_runtime_files" lineno="7341">
56460 <summary>
56461 Do not audit attempts to write to all runtime files.
56462 </summary>
56463 @@ -81832,7 +81997,7 @@ Domain to not audit.
56464 </summary>
56465 </param>
56466 </interface>
56467 -<interface name="files_delete_all_runtime_files" lineno="7260">
56468 +<interface name="files_delete_all_runtime_files" lineno="7362">
56469 <summary>
56470 Delete all runtime files.
56471 </summary>
56472 @@ -81843,7 +82008,7 @@ Domain allowed access.
56473 </param>
56474 <rolecap/>
56475 </interface>
56476 -<interface name="files_manage_all_runtime_files" lineno="7279">
56477 +<interface name="files_manage_all_runtime_files" lineno="7381">
56478 <summary>
56479 Create, read, write and delete all
56480 var_run (pid) files
56481 @@ -81854,7 +82019,7 @@ Domain allowed access.
56482 </summary>
56483 </param>
56484 </interface>
56485 -<interface name="files_relabel_all_runtime_files" lineno="7297">
56486 +<interface name="files_relabel_all_runtime_files" lineno="7399">
56487 <summary>
56488 Relabel all runtime files.
56489 </summary>
56490 @@ -81864,7 +82029,7 @@ Domain allowed access.
56491 </summary>
56492 </param>
56493 </interface>
56494 -<interface name="files_delete_all_runtime_symlinks" lineno="7316">
56495 +<interface name="files_delete_all_runtime_symlinks" lineno="7418">
56496 <summary>
56497 Delete all runtime symlinks.
56498 </summary>
56499 @@ -81875,7 +82040,7 @@ Domain allowed access.
56500 </param>
56501 <rolecap/>
56502 </interface>
56503 -<interface name="files_manage_all_runtime_symlinks" lineno="7335">
56504 +<interface name="files_manage_all_runtime_symlinks" lineno="7437">
56505 <summary>
56506 Create, read, write and delete all
56507 var_run (pid) symbolic links.
56508 @@ -81886,7 +82051,7 @@ Domain allowed access.
56509 </summary>
56510 </param>
56511 </interface>
56512 -<interface name="files_relabel_all_runtime_symlinks" lineno="7353">
56513 +<interface name="files_relabel_all_runtime_symlinks" lineno="7455">
56514 <summary>
56515 Relabel all runtime symbolic links.
56516 </summary>
56517 @@ -81896,7 +82061,7 @@ Domain allowed access.
56518 </summary>
56519 </param>
56520 </interface>
56521 -<interface name="files_create_all_runtime_pipes" lineno="7371">
56522 +<interface name="files_create_all_runtime_pipes" lineno="7473">
56523 <summary>
56524 Create all runtime named pipes
56525 </summary>
56526 @@ -81906,7 +82071,7 @@ Domain allowed access.
56527 </summary>
56528 </param>
56529 </interface>
56530 -<interface name="files_delete_all_runtime_pipes" lineno="7390">
56531 +<interface name="files_delete_all_runtime_pipes" lineno="7492">
56532 <summary>
56533 Delete all runtime named pipes
56534 </summary>
56535 @@ -81916,7 +82081,7 @@ Domain allowed access.
56536 </summary>
56537 </param>
56538 </interface>
56539 -<interface name="files_create_all_runtime_sockets" lineno="7409">
56540 +<interface name="files_create_all_runtime_sockets" lineno="7511">
56541 <summary>
56542 Create all runtime sockets.
56543 </summary>
56544 @@ -81926,7 +82091,7 @@ Domain allowed access.
56545 </summary>
56546 </param>
56547 </interface>
56548 -<interface name="files_delete_all_runtime_sockets" lineno="7427">
56549 +<interface name="files_delete_all_runtime_sockets" lineno="7529">
56550 <summary>
56551 Delete all runtime sockets.
56552 </summary>
56553 @@ -81936,7 +82101,7 @@ Domain allowed access.
56554 </summary>
56555 </param>
56556 </interface>
56557 -<interface name="files_relabel_all_runtime_sockets" lineno="7445">
56558 +<interface name="files_relabel_all_runtime_sockets" lineno="7547">
56559 <summary>
56560 Relabel all runtime named sockets.
56561 </summary>
56562 @@ -81946,7 +82111,7 @@ Domain allowed access.
56563 </summary>
56564 </param>
56565 </interface>
56566 -<interface name="files_runtime_filetrans" lineno="7505">
56567 +<interface name="files_runtime_filetrans" lineno="7607">
56568 <summary>
56569 Create an object in the /run directory, with a private type.
56570 </summary>
56571 @@ -81998,7 +82163,7 @@ The name of the object being created.
56572 </param>
56573 <infoflow type="write" weight="10"/>
56574 </interface>
56575 -<interface name="files_runtime_filetrans_lock_dir" lineno="7530">
56576 +<interface name="files_runtime_filetrans_lock_dir" lineno="7632">
56577 <summary>
56578 Create a generic lock directory within the run directories.
56579 </summary>
56580 @@ -82013,7 +82178,7 @@ The name of the object being created.
56581 </summary>
56582 </param>
56583 </interface>
56584 -<interface name="files_create_all_spool_sockets" lineno="7548">
56585 +<interface name="files_create_all_spool_sockets" lineno="7650">
56586 <summary>
56587 Create all spool sockets
56588 </summary>
56589 @@ -82023,7 +82188,7 @@ Domain allowed access.
56590 </summary>
56591 </param>
56592 </interface>
56593 -<interface name="files_delete_all_spool_sockets" lineno="7566">
56594 +<interface name="files_delete_all_spool_sockets" lineno="7668">
56595 <summary>
56596 Delete all spool sockets
56597 </summary>
56598 @@ -82033,7 +82198,7 @@ Domain allowed access.
56599 </summary>
56600 </param>
56601 </interface>
56602 -<interface name="files_delete_all_pid_dirs" lineno="7584">
56603 +<interface name="files_delete_all_pid_dirs" lineno="7686">
56604 <summary>
56605 Delete all process ID directories. (Deprecated)
56606 </summary>
56607 @@ -82043,7 +82208,7 @@ Domain allowed access.
56608 </summary>
56609 </param>
56610 </interface>
56611 -<interface name="files_manage_all_pids" lineno="7600">
56612 +<interface name="files_manage_all_pids" lineno="7702">
56613 <summary>
56614 Create, read, write and delete all
56615 var_run (pid) content (Deprecated)
56616 @@ -82054,7 +82219,7 @@ Domain allowed access.
56617 </summary>
56618 </param>
56619 </interface>
56620 -<interface name="files_relabel_all_pid_dirs" lineno="7617">
56621 +<interface name="files_relabel_all_pid_dirs" lineno="7719">
56622 <summary>
56623 Relabel to/from all var_run (pid) directories (Deprecated)
56624 </summary>
56625 @@ -82064,7 +82229,7 @@ Domain allowed access.
56626 </summary>
56627 </param>
56628 </interface>
56629 -<interface name="files_relabel_all_pid_sock_files" lineno="7632">
56630 +<interface name="files_relabel_all_pid_sock_files" lineno="7734">
56631 <summary>
56632 Relabel to/from all var_run (pid) socket files (Deprecated)
56633 </summary>
56634 @@ -82074,7 +82239,7 @@ Domain allowed access.
56635 </summary>
56636 </param>
56637 </interface>
56638 -<interface name="files_relabel_all_pids" lineno="7647">
56639 +<interface name="files_relabel_all_pids" lineno="7749">
56640 <summary>
56641 Relabel to/from all var_run (pid) files and directories (Deprecated)
56642 </summary>
56643 @@ -82084,7 +82249,7 @@ Domain allowed access.
56644 </summary>
56645 </param>
56646 </interface>
56647 -<interface name="files_mounton_all_poly_members" lineno="7665">
56648 +<interface name="files_mounton_all_poly_members" lineno="7767">
56649 <summary>
56650 Mount filesystems on all polyinstantiation
56651 member directories.
56652 @@ -82095,7 +82260,7 @@ Domain allowed access.
56653 </summary>
56654 </param>
56655 </interface>
56656 -<interface name="files_search_spool" lineno="7684">
56657 +<interface name="files_search_spool" lineno="7786">
56658 <summary>
56659 Search the contents of generic spool
56660 directories (/var/spool).
56661 @@ -82106,7 +82271,7 @@ Domain allowed access.
56662 </summary>
56663 </param>
56664 </interface>
56665 -<interface name="files_dontaudit_search_spool" lineno="7703">
56666 +<interface name="files_dontaudit_search_spool" lineno="7805">
56667 <summary>
56668 Do not audit attempts to search generic
56669 spool directories.
56670 @@ -82117,7 +82282,7 @@ Domain to not audit.
56671 </summary>
56672 </param>
56673 </interface>
56674 -<interface name="files_list_spool" lineno="7722">
56675 +<interface name="files_list_spool" lineno="7824">
56676 <summary>
56677 List the contents of generic spool
56678 (/var/spool) directories.
56679 @@ -82128,7 +82293,7 @@ Domain allowed access.
56680 </summary>
56681 </param>
56682 </interface>
56683 -<interface name="files_manage_generic_spool_dirs" lineno="7741">
56684 +<interface name="files_manage_generic_spool_dirs" lineno="7843">
56685 <summary>
56686 Create, read, write, and delete generic
56687 spool directories (/var/spool).
56688 @@ -82139,7 +82304,7 @@ Domain allowed access.
56689 </summary>
56690 </param>
56691 </interface>
56692 -<interface name="files_read_generic_spool" lineno="7760">
56693 +<interface name="files_read_generic_spool" lineno="7862">
56694 <summary>
56695 Read generic spool files.
56696 </summary>
56697 @@ -82149,7 +82314,7 @@ Domain allowed access.
56698 </summary>
56699 </param>
56700 </interface>
56701 -<interface name="files_manage_generic_spool" lineno="7780">
56702 +<interface name="files_manage_generic_spool" lineno="7882">
56703 <summary>
56704 Create, read, write, and delete generic
56705 spool files.
56706 @@ -82160,7 +82325,7 @@ Domain allowed access.
56707 </summary>
56708 </param>
56709 </interface>
56710 -<interface name="files_spool_filetrans" lineno="7816">
56711 +<interface name="files_spool_filetrans" lineno="7918">
56712 <summary>
56713 Create objects in the spool directory
56714 with a private type with a type transition.
56715 @@ -82187,7 +82352,7 @@ The name of the object being created.
56716 </summary>
56717 </param>
56718 </interface>
56719 -<interface name="files_polyinstantiate_all" lineno="7836">
56720 +<interface name="files_polyinstantiate_all" lineno="7938">
56721 <summary>
56722 Allow access to manage all polyinstantiated
56723 directories on the system.
56724 @@ -82198,7 +82363,7 @@ Domain allowed access.
56725 </summary>
56726 </param>
56727 </interface>
56728 -<interface name="files_unconfined" lineno="7890">
56729 +<interface name="files_unconfined" lineno="7992">
56730 <summary>
56731 Unconfined access to files.
56732 </summary>
56733 @@ -82208,7 +82373,7 @@ Domain allowed access.
56734 </summary>
56735 </param>
56736 </interface>
56737 -<interface name="files_manage_etc_runtime_lnk_files" lineno="7912">
56738 +<interface name="files_manage_etc_runtime_lnk_files" lineno="8014">
56739 <summary>
56740 Create, read, write, and delete symbolic links in
56741 /etc that are dynamically created on boot.
56742 @@ -82220,7 +82385,7 @@ Domain allowed access.
56743 </param>
56744 <rolecap/>
56745 </interface>
56746 -<interface name="files_dontaudit_read_etc_runtime" lineno="7930">
56747 +<interface name="files_dontaudit_read_etc_runtime" lineno="8032">
56748 <summary>
56749 Do not audit attempts to read etc_runtime resources
56750 </summary>
56751 @@ -82230,7 +82395,7 @@ Domain allowed access.
56752 </summary>
56753 </param>
56754 </interface>
56755 -<interface name="files_list_src" lineno="7948">
56756 +<interface name="files_list_src" lineno="8050">
56757 <summary>
56758 List usr/src files
56759 </summary>
56760 @@ -82240,7 +82405,7 @@ Domain allowed access
56761 </summary>
56762 </param>
56763 </interface>
56764 -<interface name="files_read_src_files" lineno="7966">
56765 +<interface name="files_read_src_files" lineno="8068">
56766 <summary>
56767 Read usr/src files
56768 </summary>
56769 @@ -82250,7 +82415,7 @@ Domain allowed access
56770 </summary>
56771 </param>
56772 </interface>
56773 -<interface name="files_manage_src_files" lineno="7984">
56774 +<interface name="files_manage_src_files" lineno="8086">
56775 <summary>
56776 Manage /usr/src files
56777 </summary>
56778 @@ -82260,7 +82425,7 @@ Domain allowed access
56779 </summary>
56780 </param>
56781 </interface>
56782 -<interface name="files_lib_filetrans_kernel_modules" lineno="8015">
56783 +<interface name="files_lib_filetrans_kernel_modules" lineno="8117">
56784 <summary>
56785 Create a resource in the generic lib location
56786 with an automatic type transition towards the kernel modules
56787 @@ -82282,7 +82447,7 @@ Optional name of the resource
56788 </summary>
56789 </param>
56790 </interface>
56791 -<interface name="files_read_etc_runtime" lineno="8033">
56792 +<interface name="files_read_etc_runtime" lineno="8135">
56793 <summary>
56794 Read etc runtime resources
56795 </summary>
56796 @@ -82292,7 +82457,7 @@ Domain allowed access
56797 </summary>
56798 </param>
56799 </interface>
56800 -<interface name="files_relabel_all_non_security_file_types" lineno="8055">
56801 +<interface name="files_relabel_all_non_security_file_types" lineno="8157">
56802 <summary>
56803 Allow relabel from and to non-security types
56804 </summary>
56805 @@ -82303,7 +82468,7 @@ Domain allowed access.
56806 </param>
56807 <rolecap/>
56808 </interface>
56809 -<interface name="files_manage_all_non_security_file_types" lineno="8085">
56810 +<interface name="files_manage_all_non_security_file_types" lineno="8187">
56811 <summary>
56812 Manage non-security-sensitive resource types
56813 </summary>
56814 @@ -82314,7 +82479,7 @@ Domain allowed access.
56815 </param>
56816 <rolecap/>
56817 </interface>
56818 -<interface name="files_relabel_all_pidfiles" lineno="8107">
56819 +<interface name="files_relabel_all_pidfiles" lineno="8209">
56820 <summary>
56821 Allow relabeling from and to any pidfile associated type
56822 </summary>
56823 @@ -82792,7 +82957,17 @@ Domain allowed access.
56824 </summary>
56825 </param>
56826 </interface>
56827 -<interface name="fs_delete_cgroup_dirs" lineno="783">
56828 +<interface name="fs_ioctl_cgroup_dirs" lineno="783">
56829 +<summary>
56830 +Ioctl cgroup directories.
56831 +</summary>
56832 +<param name="domain">
56833 +<summary>
56834 +Domain allowed access.
56835 +</summary>
56836 +</param>
56837 +</interface>
56838 +<interface name="fs_delete_cgroup_dirs" lineno="802">
56839 <summary>
56840 Delete cgroup directories.
56841 </summary>
56842 @@ -82802,7 +82977,7 @@ Domain allowed access.
56843 </summary>
56844 </param>
56845 </interface>
56846 -<interface name="fs_manage_cgroup_dirs" lineno="802">
56847 +<interface name="fs_manage_cgroup_dirs" lineno="821">
56848 <summary>
56849 Manage cgroup directories.
56850 </summary>
56851 @@ -82812,7 +82987,7 @@ Domain allowed access.
56852 </summary>
56853 </param>
56854 </interface>
56855 -<interface name="fs_relabel_cgroup_dirs" lineno="822">
56856 +<interface name="fs_relabel_cgroup_dirs" lineno="841">
56857 <summary>
56858 Relabel cgroup directories.
56859 </summary>
56860 @@ -82822,7 +82997,7 @@ Domain allowed access.
56861 </summary>
56862 </param>
56863 </interface>
56864 -<interface name="fs_getattr_cgroup_files" lineno="840">
56865 +<interface name="fs_getattr_cgroup_files" lineno="859">
56866 <summary>
56867 Get attributes of cgroup files.
56868 </summary>
56869 @@ -82832,7 +83007,7 @@ Domain allowed access.
56870 </summary>
56871 </param>
56872 </interface>
56873 -<interface name="fs_read_cgroup_files" lineno="860">
56874 +<interface name="fs_read_cgroup_files" lineno="879">
56875 <summary>
56876 Read cgroup files.
56877 </summary>
56878 @@ -82842,7 +83017,7 @@ Domain allowed access.
56879 </summary>
56880 </param>
56881 </interface>
56882 -<interface name="fs_watch_cgroup_files" lineno="881">
56883 +<interface name="fs_watch_cgroup_files" lineno="900">
56884 <summary>
56885 Watch cgroup files.
56886 </summary>
56887 @@ -82852,7 +83027,7 @@ Domain allowed access.
56888 </summary>
56889 </param>
56890 </interface>
56891 -<interface name="fs_create_cgroup_links" lineno="900">
56892 +<interface name="fs_create_cgroup_links" lineno="919">
56893 <summary>
56894 Create cgroup lnk_files.
56895 </summary>
56896 @@ -82862,7 +83037,7 @@ Domain allowed access.
56897 </summary>
56898 </param>
56899 </interface>
56900 -<interface name="fs_write_cgroup_files" lineno="920">
56901 +<interface name="fs_write_cgroup_files" lineno="939">
56902 <summary>
56903 Write cgroup files.
56904 </summary>
56905 @@ -82872,7 +83047,7 @@ Domain allowed access.
56906 </summary>
56907 </param>
56908 </interface>
56909 -<interface name="fs_rw_cgroup_files" lineno="939">
56910 +<interface name="fs_rw_cgroup_files" lineno="958">
56911 <summary>
56912 Read and write cgroup files.
56913 </summary>
56914 @@ -82882,7 +83057,7 @@ Domain allowed access.
56915 </summary>
56916 </param>
56917 </interface>
56918 -<interface name="fs_dontaudit_rw_cgroup_files" lineno="961">
56919 +<interface name="fs_dontaudit_rw_cgroup_files" lineno="980">
56920 <summary>
56921 Do not audit attempts to open,
56922 get attributes, read and write
56923 @@ -82894,7 +83069,7 @@ Domain to not audit.
56924 </summary>
56925 </param>
56926 </interface>
56927 -<interface name="fs_manage_cgroup_files" lineno="979">
56928 +<interface name="fs_manage_cgroup_files" lineno="998">
56929 <summary>
56930 Manage cgroup files.
56931 </summary>
56932 @@ -82904,7 +83079,7 @@ Domain allowed access.
56933 </summary>
56934 </param>
56935 </interface>
56936 -<interface name="fs_relabel_cgroup_symlinks" lineno="999">
56937 +<interface name="fs_relabel_cgroup_symlinks" lineno="1018">
56938 <summary>
56939 Relabel cgroup symbolic links.
56940 </summary>
56941 @@ -82914,7 +83089,7 @@ Domain allowed access.
56942 </summary>
56943 </param>
56944 </interface>
56945 -<interface name="fs_mounton_cgroup" lineno="1017">
56946 +<interface name="fs_mounton_cgroup" lineno="1036">
56947 <summary>
56948 Mount on cgroup directories.
56949 </summary>
56950 @@ -82924,7 +83099,7 @@ Domain allowed access.
56951 </summary>
56952 </param>
56953 </interface>
56954 -<interface name="fs_cgroup_filetrans" lineno="1051">
56955 +<interface name="fs_cgroup_filetrans" lineno="1070">
56956 <summary>
56957 Create an object in a cgroup tmpfs filesystem, with a private
56958 type using a type transition.
56959 @@ -82950,7 +83125,7 @@ The name of the object being created.
56960 </summary>
56961 </param>
56962 </interface>
56963 -<interface name="fs_dontaudit_list_cifs_dirs" lineno="1072">
56964 +<interface name="fs_dontaudit_list_cifs_dirs" lineno="1091">
56965 <summary>
56966 Do not audit attempts to read
56967 dirs on a CIFS or SMB filesystem.
56968 @@ -82961,7 +83136,7 @@ Domain to not audit.
56969 </summary>
56970 </param>
56971 </interface>
56972 -<interface name="fs_mount_cifs" lineno="1090">
56973 +<interface name="fs_mount_cifs" lineno="1109">
56974 <summary>
56975 Mount a CIFS or SMB network filesystem.
56976 </summary>
56977 @@ -82971,7 +83146,7 @@ Domain allowed access.
56978 </summary>
56979 </param>
56980 </interface>
56981 -<interface name="fs_remount_cifs" lineno="1109">
56982 +<interface name="fs_remount_cifs" lineno="1128">
56983 <summary>
56984 Remount a CIFS or SMB network filesystem.
56985 This allows some mount options to be changed.
56986 @@ -82982,7 +83157,7 @@ Domain allowed access.
56987 </summary>
56988 </param>
56989 </interface>
56990 -<interface name="fs_unmount_cifs" lineno="1127">
56991 +<interface name="fs_unmount_cifs" lineno="1146">
56992 <summary>
56993 Unmount a CIFS or SMB network filesystem.
56994 </summary>
56995 @@ -82992,7 +83167,7 @@ Domain allowed access.
56996 </summary>
56997 </param>
56998 </interface>
56999 -<interface name="fs_getattr_cifs" lineno="1147">
57000 +<interface name="fs_getattr_cifs" lineno="1166">
57001 <summary>
57002 Get the attributes of a CIFS or
57003 SMB network filesystem.
57004 @@ -83004,7 +83179,7 @@ Domain allowed access.
57005 </param>
57006 <rolecap/>
57007 </interface>
57008 -<interface name="fs_search_cifs" lineno="1165">
57009 +<interface name="fs_search_cifs" lineno="1184">
57010 <summary>
57011 Search directories on a CIFS or SMB filesystem.
57012 </summary>
57013 @@ -83014,7 +83189,7 @@ Domain allowed access.
57014 </summary>
57015 </param>
57016 </interface>
57017 -<interface name="fs_list_cifs" lineno="1184">
57018 +<interface name="fs_list_cifs" lineno="1203">
57019 <summary>
57020 List the contents of directories on a
57021 CIFS or SMB filesystem.
57022 @@ -83025,7 +83200,7 @@ Domain allowed access.
57023 </summary>
57024 </param>
57025 </interface>
57026 -<interface name="fs_dontaudit_list_cifs" lineno="1203">
57027 +<interface name="fs_dontaudit_list_cifs" lineno="1222">
57028 <summary>
57029 Do not audit attempts to list the contents
57030 of directories on a CIFS or SMB filesystem.
57031 @@ -83036,7 +83211,7 @@ Domain to not audit.
57032 </summary>
57033 </param>
57034 </interface>
57035 -<interface name="fs_mounton_cifs" lineno="1221">
57036 +<interface name="fs_mounton_cifs" lineno="1240">
57037 <summary>
57038 Mounton a CIFS filesystem.
57039 </summary>
57040 @@ -83046,7 +83221,7 @@ Domain allowed access.
57041 </summary>
57042 </param>
57043 </interface>
57044 -<interface name="fs_read_cifs_files" lineno="1240">
57045 +<interface name="fs_read_cifs_files" lineno="1259">
57046 <summary>
57047 Read files on a CIFS or SMB filesystem.
57048 </summary>
57049 @@ -83057,7 +83232,7 @@ Domain allowed access.
57050 </param>
57051 <rolecap/>
57052 </interface>
57053 -<interface name="fs_read_all_inherited_image_files" lineno="1260">
57054 +<interface name="fs_read_all_inherited_image_files" lineno="1279">
57055 <summary>
57056 Read all inherited filesystem image files.
57057 </summary>
57058 @@ -83068,7 +83243,7 @@ Domain allowed access.
57059 </param>
57060 <rolecap/>
57061 </interface>
57062 -<interface name="fs_read_all_image_files" lineno="1279">
57063 +<interface name="fs_read_all_image_files" lineno="1298">
57064 <summary>
57065 Read all filesystem image files.
57066 </summary>
57067 @@ -83079,7 +83254,7 @@ Domain allowed access.
57068 </param>
57069 <rolecap/>
57070 </interface>
57071 -<interface name="fs_mmap_read_all_image_files" lineno="1298">
57072 +<interface name="fs_mmap_read_all_image_files" lineno="1317">
57073 <summary>
57074 Mmap-read all filesystem image files.
57075 </summary>
57076 @@ -83090,7 +83265,7 @@ Domain allowed access.
57077 </param>
57078 <rolecap/>
57079 </interface>
57080 -<interface name="fs_rw_all_image_files" lineno="1317">
57081 +<interface name="fs_rw_all_image_files" lineno="1336">
57082 <summary>
57083 Read and write all filesystem image files.
57084 </summary>
57085 @@ -83101,7 +83276,7 @@ Domain allowed access.
57086 </param>
57087 <rolecap/>
57088 </interface>
57089 -<interface name="fs_mmap_rw_all_image_files" lineno="1336">
57090 +<interface name="fs_mmap_rw_all_image_files" lineno="1355">
57091 <summary>
57092 Mmap-Read-write all filesystem image files.
57093 </summary>
57094 @@ -83112,7 +83287,7 @@ Domain allowed access.
57095 </param>
57096 <rolecap/>
57097 </interface>
57098 -<interface name="fs_dontaudit_write_all_image_files" lineno="1355">
57099 +<interface name="fs_dontaudit_write_all_image_files" lineno="1374">
57100 <summary>
57101 Do not audit attempts to write all filesystem image files.
57102 </summary>
57103 @@ -83123,7 +83298,7 @@ Domain allowed access.
57104 </param>
57105 <rolecap/>
57106 </interface>
57107 -<interface name="fs_getattr_noxattr_fs" lineno="1375">
57108 +<interface name="fs_getattr_noxattr_fs" lineno="1394">
57109 <summary>
57110 Get the attributes of filesystems that
57111 do not have extended attribute support.
57112 @@ -83135,7 +83310,7 @@ Domain allowed access.
57113 </param>
57114 <rolecap/>
57115 </interface>
57116 -<interface name="fs_list_noxattr_fs" lineno="1393">
57117 +<interface name="fs_list_noxattr_fs" lineno="1412">
57118 <summary>
57119 Read all noxattrfs directories.
57120 </summary>
57121 @@ -83145,7 +83320,7 @@ Domain allowed access.
57122 </summary>
57123 </param>
57124 </interface>
57125 -<interface name="fs_dontaudit_list_noxattr_fs" lineno="1412">
57126 +<interface name="fs_dontaudit_list_noxattr_fs" lineno="1431">
57127 <summary>
57128 Do not audit attempts to list all
57129 noxattrfs directories.
57130 @@ -83156,7 +83331,7 @@ Domain to not audit.
57131 </summary>
57132 </param>
57133 </interface>
57134 -<interface name="fs_manage_noxattr_fs_dirs" lineno="1430">
57135 +<interface name="fs_manage_noxattr_fs_dirs" lineno="1449">
57136 <summary>
57137 Create, read, write, and delete all noxattrfs directories.
57138 </summary>
57139 @@ -83166,7 +83341,7 @@ Domain allowed access.
57140 </summary>
57141 </param>
57142 </interface>
57143 -<interface name="fs_read_noxattr_fs_files" lineno="1448">
57144 +<interface name="fs_read_noxattr_fs_files" lineno="1467">
57145 <summary>
57146 Read all noxattrfs files.
57147 </summary>
57148 @@ -83176,7 +83351,7 @@ Domain allowed access.
57149 </summary>
57150 </param>
57151 </interface>
57152 -<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1468">
57153 +<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1487">
57154 <summary>
57155 Do not audit attempts to read all
57156 noxattrfs files.
57157 @@ -83187,7 +83362,7 @@ Domain to not audit.
57158 </summary>
57159 </param>
57160 </interface>
57161 -<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1486">
57162 +<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1505">
57163 <summary>
57164 Dont audit attempts to write to noxattrfs files.
57165 </summary>
57166 @@ -83197,7 +83372,7 @@ Domain to not audit.
57167 </summary>
57168 </param>
57169 </interface>
57170 -<interface name="fs_manage_noxattr_fs_files" lineno="1504">
57171 +<interface name="fs_manage_noxattr_fs_files" lineno="1523">
57172 <summary>
57173 Create, read, write, and delete all noxattrfs files.
57174 </summary>
57175 @@ -83207,7 +83382,7 @@ Domain allowed access.
57176 </summary>
57177 </param>
57178 </interface>
57179 -<interface name="fs_read_noxattr_fs_symlinks" lineno="1523">
57180 +<interface name="fs_read_noxattr_fs_symlinks" lineno="1542">
57181 <summary>
57182 Read all noxattrfs symbolic links.
57183 </summary>
57184 @@ -83217,7 +83392,7 @@ Domain allowed access.
57185 </summary>
57186 </param>
57187 </interface>
57188 -<interface name="fs_manage_noxattr_fs_symlinks" lineno="1542">
57189 +<interface name="fs_manage_noxattr_fs_symlinks" lineno="1561">
57190 <summary>
57191 Manage all noxattrfs symbolic links.
57192 </summary>
57193 @@ -83227,7 +83402,7 @@ Domain allowed access.
57194 </summary>
57195 </param>
57196 </interface>
57197 -<interface name="fs_relabelfrom_noxattr_fs" lineno="1562">
57198 +<interface name="fs_relabelfrom_noxattr_fs" lineno="1581">
57199 <summary>
57200 Relabel all objects from filesystems that
57201 do not support extended attributes.
57202 @@ -83238,7 +83413,7 @@ Domain allowed access.
57203 </summary>
57204 </param>
57205 </interface>
57206 -<interface name="fs_dontaudit_read_cifs_files" lineno="1588">
57207 +<interface name="fs_dontaudit_read_cifs_files" lineno="1607">
57208 <summary>
57209 Do not audit attempts to read
57210 files on a CIFS or SMB filesystem.
57211 @@ -83249,7 +83424,7 @@ Domain to not audit.
57212 </summary>
57213 </param>
57214 </interface>
57215 -<interface name="fs_append_cifs_files" lineno="1608">
57216 +<interface name="fs_append_cifs_files" lineno="1627">
57217 <summary>
57218 Append files
57219 on a CIFS filesystem.
57220 @@ -83261,7 +83436,7 @@ Domain allowed access.
57221 </param>
57222 <rolecap/>
57223 </interface>
57224 -<interface name="fs_dontaudit_append_cifs_files" lineno="1628">
57225 +<interface name="fs_dontaudit_append_cifs_files" lineno="1647">
57226 <summary>
57227 dontaudit Append files
57228 on a CIFS filesystem.
57229 @@ -83273,7 +83448,7 @@ Domain to not audit.
57230 </param>
57231 <rolecap/>
57232 </interface>
57233 -<interface name="fs_dontaudit_rw_cifs_files" lineno="1647">
57234 +<interface name="fs_dontaudit_rw_cifs_files" lineno="1666">
57235 <summary>
57236 Do not audit attempts to read or
57237 write files on a CIFS or SMB filesystem.
57238 @@ -83284,7 +83459,7 @@ Domain to not audit.
57239 </summary>
57240 </param>
57241 </interface>
57242 -<interface name="fs_read_cifs_symlinks" lineno="1665">
57243 +<interface name="fs_read_cifs_symlinks" lineno="1684">
57244 <summary>
57245 Read symbolic links on a CIFS or SMB filesystem.
57246 </summary>
57247 @@ -83294,7 +83469,7 @@ Domain allowed access.
57248 </summary>
57249 </param>
57250 </interface>
57251 -<interface name="fs_read_cifs_named_pipes" lineno="1685">
57252 +<interface name="fs_read_cifs_named_pipes" lineno="1704">
57253 <summary>
57254 Read named pipes
57255 on a CIFS or SMB network filesystem.
57256 @@ -83305,7 +83480,7 @@ Domain allowed access.
57257 </summary>
57258 </param>
57259 </interface>
57260 -<interface name="fs_read_cifs_named_sockets" lineno="1704">
57261 +<interface name="fs_read_cifs_named_sockets" lineno="1723">
57262 <summary>
57263 Read named sockets
57264 on a CIFS or SMB network filesystem.
57265 @@ -83316,7 +83491,7 @@ Domain allowed access.
57266 </summary>
57267 </param>
57268 </interface>
57269 -<interface name="fs_exec_cifs_files" lineno="1725">
57270 +<interface name="fs_exec_cifs_files" lineno="1744">
57271 <summary>
57272 Execute files on a CIFS or SMB
57273 network filesystem, in the caller
57274 @@ -83329,7 +83504,7 @@ Domain allowed access.
57275 </param>
57276 <rolecap/>
57277 </interface>
57278 -<interface name="fs_manage_cifs_dirs" lineno="1746">
57279 +<interface name="fs_manage_cifs_dirs" lineno="1765">
57280 <summary>
57281 Create, read, write, and delete directories
57282 on a CIFS or SMB network filesystem.
57283 @@ -83341,7 +83516,7 @@ Domain allowed access.
57284 </param>
57285 <rolecap/>
57286 </interface>
57287 -<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1766">
57288 +<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1785">
57289 <summary>
57290 Do not audit attempts to create, read,
57291 write, and delete directories
57292 @@ -83353,7 +83528,7 @@ Domain to not audit.
57293 </summary>
57294 </param>
57295 </interface>
57296 -<interface name="fs_manage_cifs_files" lineno="1786">
57297 +<interface name="fs_manage_cifs_files" lineno="1805">
57298 <summary>
57299 Create, read, write, and delete files
57300 on a CIFS or SMB network filesystem.
57301 @@ -83365,7 +83540,7 @@ Domain allowed access.
57302 </param>
57303 <rolecap/>
57304 </interface>
57305 -<interface name="fs_dontaudit_manage_cifs_files" lineno="1806">
57306 +<interface name="fs_dontaudit_manage_cifs_files" lineno="1825">
57307 <summary>
57308 Do not audit attempts to create, read,
57309 write, and delete files
57310 @@ -83377,7 +83552,7 @@ Domain to not audit.
57311 </summary>
57312 </param>
57313 </interface>
57314 -<interface name="fs_manage_cifs_symlinks" lineno="1825">
57315 +<interface name="fs_manage_cifs_symlinks" lineno="1844">
57316 <summary>
57317 Create, read, write, and delete symbolic links
57318 on a CIFS or SMB network filesystem.
57319 @@ -83388,7 +83563,7 @@ Domain allowed access.
57320 </summary>
57321 </param>
57322 </interface>
57323 -<interface name="fs_manage_cifs_named_pipes" lineno="1844">
57324 +<interface name="fs_manage_cifs_named_pipes" lineno="1863">
57325 <summary>
57326 Create, read, write, and delete named pipes
57327 on a CIFS or SMB network filesystem.
57328 @@ -83399,7 +83574,7 @@ Domain allowed access.
57329 </summary>
57330 </param>
57331 </interface>
57332 -<interface name="fs_manage_cifs_named_sockets" lineno="1863">
57333 +<interface name="fs_manage_cifs_named_sockets" lineno="1882">
57334 <summary>
57335 Create, read, write, and delete named sockets
57336 on a CIFS or SMB network filesystem.
57337 @@ -83410,7 +83585,7 @@ Domain allowed access.
57338 </summary>
57339 </param>
57340 </interface>
57341 -<interface name="fs_cifs_domtrans" lineno="1906">
57342 +<interface name="fs_cifs_domtrans" lineno="1925">
57343 <summary>
57344 Execute a file on a CIFS or SMB filesystem
57345 in the specified domain.
57346 @@ -83445,7 +83620,7 @@ The type of the new process.
57347 </summary>
57348 </param>
57349 </interface>
57350 -<interface name="fs_manage_configfs_dirs" lineno="1926">
57351 +<interface name="fs_manage_configfs_dirs" lineno="1945">
57352 <summary>
57353 Create, read, write, and delete dirs
57354 on a configfs filesystem.
57355 @@ -83456,7 +83631,7 @@ Domain allowed access.
57356 </summary>
57357 </param>
57358 </interface>
57359 -<interface name="fs_manage_configfs_files" lineno="1945">
57360 +<interface name="fs_manage_configfs_files" lineno="1964">
57361 <summary>
57362 Create, read, write, and delete files
57363 on a configfs filesystem.
57364 @@ -83467,7 +83642,7 @@ Domain allowed access.
57365 </summary>
57366 </param>
57367 </interface>
57368 -<interface name="fs_mount_dos_fs" lineno="1964">
57369 +<interface name="fs_mount_dos_fs" lineno="1983">
57370 <summary>
57371 Mount a DOS filesystem, such as
57372 FAT32 or NTFS.
57373 @@ -83478,7 +83653,7 @@ Domain allowed access.
57374 </summary>
57375 </param>
57376 </interface>
57377 -<interface name="fs_remount_dos_fs" lineno="1984">
57378 +<interface name="fs_remount_dos_fs" lineno="2003">
57379 <summary>
57380 Remount a DOS filesystem, such as
57381 FAT32 or NTFS. This allows
57382 @@ -83490,7 +83665,7 @@ Domain allowed access.
57383 </summary>
57384 </param>
57385 </interface>
57386 -<interface name="fs_unmount_dos_fs" lineno="2003">
57387 +<interface name="fs_unmount_dos_fs" lineno="2022">
57388 <summary>
57389 Unmount a DOS filesystem, such as
57390 FAT32 or NTFS.
57391 @@ -83501,7 +83676,7 @@ Domain allowed access.
57392 </summary>
57393 </param>
57394 </interface>
57395 -<interface name="fs_getattr_dos_fs" lineno="2023">
57396 +<interface name="fs_getattr_dos_fs" lineno="2042">
57397 <summary>
57398 Get the attributes of a DOS
57399 filesystem, such as FAT32 or NTFS.
57400 @@ -83513,7 +83688,7 @@ Domain allowed access.
57401 </param>
57402 <rolecap/>
57403 </interface>
57404 -<interface name="fs_relabelfrom_dos_fs" lineno="2042">
57405 +<interface name="fs_relabelfrom_dos_fs" lineno="2061">
57406 <summary>
57407 Allow changing of the label of a
57408 DOS filesystem using the context= mount option.
57409 @@ -83524,7 +83699,7 @@ Domain allowed access.
57410 </summary>
57411 </param>
57412 </interface>
57413 -<interface name="fs_getattr_dos_dirs" lineno="2060">
57414 +<interface name="fs_getattr_dos_dirs" lineno="2079">
57415 <summary>
57416 Get attributes of directories on a dosfs filesystem.
57417 </summary>
57418 @@ -83534,7 +83709,7 @@ Domain allowed access.
57419 </summary>
57420 </param>
57421 </interface>
57422 -<interface name="fs_search_dos" lineno="2078">
57423 +<interface name="fs_search_dos" lineno="2097">
57424 <summary>
57425 Search dosfs filesystem.
57426 </summary>
57427 @@ -83544,7 +83719,7 @@ Domain allowed access.
57428 </summary>
57429 </param>
57430 </interface>
57431 -<interface name="fs_list_dos" lineno="2096">
57432 +<interface name="fs_list_dos" lineno="2115">
57433 <summary>
57434 List dirs DOS filesystem.
57435 </summary>
57436 @@ -83554,7 +83729,7 @@ Domain allowed access.
57437 </summary>
57438 </param>
57439 </interface>
57440 -<interface name="fs_manage_dos_dirs" lineno="2115">
57441 +<interface name="fs_manage_dos_dirs" lineno="2134">
57442 <summary>
57443 Create, read, write, and delete dirs
57444 on a DOS filesystem.
57445 @@ -83565,7 +83740,7 @@ Domain allowed access.
57446 </summary>
57447 </param>
57448 </interface>
57449 -<interface name="fs_read_dos_files" lineno="2133">
57450 +<interface name="fs_read_dos_files" lineno="2152">
57451 <summary>
57452 Read files on a DOS filesystem.
57453 </summary>
57454 @@ -83575,7 +83750,7 @@ Domain allowed access.
57455 </summary>
57456 </param>
57457 </interface>
57458 -<interface name="fs_mmap_read_dos_files" lineno="2151">
57459 +<interface name="fs_mmap_read_dos_files" lineno="2170">
57460 <summary>
57461 Read and map files on a DOS filesystem.
57462 </summary>
57463 @@ -83585,7 +83760,7 @@ Domain allowed access.
57464 </summary>
57465 </param>
57466 </interface>
57467 -<interface name="fs_manage_dos_files" lineno="2171">
57468 +<interface name="fs_manage_dos_files" lineno="2190">
57469 <summary>
57470 Create, read, write, and delete files
57471 on a DOS filesystem.
57472 @@ -83596,7 +83771,52 @@ Domain allowed access.
57473 </summary>
57474 </param>
57475 </interface>
57476 -<interface name="fs_getattr_efivarfs" lineno="2189">
57477 +<interface name="fs_list_ecryptfs" lineno="2208">
57478 +<summary>
57479 +Read symbolic links on an eCryptfs filesystem.
57480 +</summary>
57481 +<param name="domain">
57482 +<summary>
57483 +Domain allowed access.
57484 +</summary>
57485 +</param>
57486 +</interface>
57487 +<interface name="fs_manage_ecryptfs_dirs" lineno="2229">
57488 +<summary>
57489 +Create, read, write, and delete directories
57490 +on an eCryptfs filesystem.
57491 +</summary>
57492 +<param name="domain">
57493 +<summary>
57494 +Domain allowed access.
57495 +</summary>
57496 +</param>
57497 +<rolecap/>
57498 +</interface>
57499 +<interface name="fs_manage_ecryptfs_files" lineno="2249">
57500 +<summary>
57501 +Create, read, write, and delete files
57502 +on an eCryptfs filesystem.
57503 +</summary>
57504 +<param name="domain">
57505 +<summary>
57506 +Domain allowed access.
57507 +</summary>
57508 +</param>
57509 +<rolecap/>
57510 +</interface>
57511 +<interface name="fs_manage_ecryptfs_named_sockets" lineno="2268">
57512 +<summary>
57513 +Create, read, write, and delete named sockets
57514 +on an eCryptfs filesystem.
57515 +</summary>
57516 +<param name="domain">
57517 +<summary>
57518 +Domain allowed access.
57519 +</summary>
57520 +</param>
57521 +</interface>
57522 +<interface name="fs_getattr_efivarfs" lineno="2286">
57523 <summary>
57524 Get the attributes of efivarfs filesystems.
57525 </summary>
57526 @@ -83606,7 +83826,7 @@ Domain allowed access.
57527 </summary>
57528 </param>
57529 </interface>
57530 -<interface name="fs_list_efivars" lineno="2207">
57531 +<interface name="fs_list_efivars" lineno="2304">
57532 <summary>
57533 List dirs in efivarfs filesystem.
57534 </summary>
57535 @@ -83616,7 +83836,7 @@ Domain allowed access.
57536 </summary>
57537 </param>
57538 </interface>
57539 -<interface name="fs_read_efivarfs_files" lineno="2227">
57540 +<interface name="fs_read_efivarfs_files" lineno="2324">
57541 <summary>
57542 Read files in efivarfs
57543 - contains Linux Kernel configuration options for UEFI systems
57544 @@ -83628,7 +83848,7 @@ Domain allowed access.
57545 </param>
57546 <rolecap/>
57547 </interface>
57548 -<interface name="fs_manage_efivarfs_files" lineno="2247">
57549 +<interface name="fs_manage_efivarfs_files" lineno="2344">
57550 <summary>
57551 Create, read, write, and delete files
57552 on a efivarfs filesystem.
57553 @@ -83640,7 +83860,7 @@ Domain allowed access.
57554 </summary>
57555 </param>
57556 </interface>
57557 -<interface name="fs_getattr_fusefs" lineno="2265">
57558 +<interface name="fs_getattr_fusefs" lineno="2362">
57559 <summary>
57560 stat a FUSE filesystem
57561 </summary>
57562 @@ -83650,7 +83870,7 @@ Domain allowed access.
57563 </summary>
57564 </param>
57565 </interface>
57566 -<interface name="fs_mount_fusefs" lineno="2283">
57567 +<interface name="fs_mount_fusefs" lineno="2380">
57568 <summary>
57569 Mount a FUSE filesystem.
57570 </summary>
57571 @@ -83660,7 +83880,7 @@ Domain allowed access.
57572 </summary>
57573 </param>
57574 </interface>
57575 -<interface name="fs_unmount_fusefs" lineno="2301">
57576 +<interface name="fs_unmount_fusefs" lineno="2398">
57577 <summary>
57578 Unmount a FUSE filesystem.
57579 </summary>
57580 @@ -83670,7 +83890,7 @@ Domain allowed access.
57581 </summary>
57582 </param>
57583 </interface>
57584 -<interface name="fs_remount_fusefs" lineno="2319">
57585 +<interface name="fs_remount_fusefs" lineno="2416">
57586 <summary>
57587 Remount a FUSE filesystem.
57588 </summary>
57589 @@ -83680,7 +83900,7 @@ Domain allowed access.
57590 </summary>
57591 </param>
57592 </interface>
57593 -<interface name="fs_mounton_fusefs" lineno="2337">
57594 +<interface name="fs_mounton_fusefs" lineno="2434">
57595 <summary>
57596 Mounton a FUSEFS filesystem.
57597 </summary>
57598 @@ -83690,7 +83910,7 @@ Domain allowed access.
57599 </summary>
57600 </param>
57601 </interface>
57602 -<interface name="fs_fusefs_entry_type" lineno="2356">
57603 +<interface name="fs_fusefs_entry_type" lineno="2453">
57604 <summary>
57605 Make FUSEFS files an entrypoint for the
57606 specified domain.
57607 @@ -83701,7 +83921,7 @@ The domain for which fusefs_t is an entrypoint.
57608 </summary>
57609 </param>
57610 </interface>
57611 -<interface name="fs_fusefs_domtrans" lineno="2389">
57612 +<interface name="fs_fusefs_domtrans" lineno="2486">
57613 <summary>
57614 Execute FUSEFS files in a specified domain.
57615 </summary>
57616 @@ -83726,7 +83946,7 @@ Domain to transition to.
57617 </summary>
57618 </param>
57619 </interface>
57620 -<interface name="fs_search_fusefs" lineno="2409">
57621 +<interface name="fs_search_fusefs" lineno="2506">
57622 <summary>
57623 Search directories
57624 on a FUSEFS filesystem.
57625 @@ -83738,7 +83958,7 @@ Domain allowed access.
57626 </param>
57627 <rolecap/>
57628 </interface>
57629 -<interface name="fs_dontaudit_list_fusefs" lineno="2428">
57630 +<interface name="fs_dontaudit_list_fusefs" lineno="2525">
57631 <summary>
57632 Do not audit attempts to list the contents
57633 of directories on a FUSEFS filesystem.
57634 @@ -83749,7 +83969,7 @@ Domain to not audit.
57635 </summary>
57636 </param>
57637 </interface>
57638 -<interface name="fs_manage_fusefs_dirs" lineno="2448">
57639 +<interface name="fs_manage_fusefs_dirs" lineno="2545">
57640 <summary>
57641 Create, read, write, and delete directories
57642 on a FUSEFS filesystem.
57643 @@ -83761,7 +83981,7 @@ Domain allowed access.
57644 </param>
57645 <rolecap/>
57646 </interface>
57647 -<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2468">
57648 +<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2565">
57649 <summary>
57650 Do not audit attempts to create, read,
57651 write, and delete directories
57652 @@ -83773,7 +83993,7 @@ Domain to not audit.
57653 </summary>
57654 </param>
57655 </interface>
57656 -<interface name="fs_read_fusefs_files" lineno="2487">
57657 +<interface name="fs_read_fusefs_files" lineno="2584">
57658 <summary>
57659 Read, a FUSEFS filesystem.
57660 </summary>
57661 @@ -83784,7 +84004,7 @@ Domain allowed access.
57662 </param>
57663 <rolecap/>
57664 </interface>
57665 -<interface name="fs_exec_fusefs_files" lineno="2506">
57666 +<interface name="fs_exec_fusefs_files" lineno="2603">
57667 <summary>
57668 Execute files on a FUSEFS filesystem.
57669 </summary>
57670 @@ -83795,7 +84015,7 @@ Domain allowed access.
57671 </param>
57672 <rolecap/>
57673 </interface>
57674 -<interface name="fs_manage_fusefs_files" lineno="2526">
57675 +<interface name="fs_manage_fusefs_files" lineno="2623">
57676 <summary>
57677 Create, read, write, and delete files
57678 on a FUSEFS filesystem.
57679 @@ -83807,7 +84027,7 @@ Domain allowed access.
57680 </param>
57681 <rolecap/>
57682 </interface>
57683 -<interface name="fs_dontaudit_manage_fusefs_files" lineno="2546">
57684 +<interface name="fs_dontaudit_manage_fusefs_files" lineno="2643">
57685 <summary>
57686 Do not audit attempts to create,
57687 read, write, and delete files
57688 @@ -83819,7 +84039,7 @@ Domain to not audit.
57689 </summary>
57690 </param>
57691 </interface>
57692 -<interface name="fs_read_fusefs_symlinks" lineno="2564">
57693 +<interface name="fs_read_fusefs_symlinks" lineno="2661">
57694 <summary>
57695 Read symbolic links on a FUSEFS filesystem.
57696 </summary>
57697 @@ -83829,7 +84049,7 @@ Domain allowed access.
57698 </summary>
57699 </param>
57700 </interface>
57701 -<interface name="fs_manage_fusefs_symlinks" lineno="2584">
57702 +<interface name="fs_manage_fusefs_symlinks" lineno="2681">
57703 <summary>
57704 Manage symlinks on a FUSEFS filesystem.
57705 </summary>
57706 @@ -83840,7 +84060,7 @@ Domain allowed access.
57707 </param>
57708 <rolecap/>
57709 </interface>
57710 -<interface name="fs_getattr_hugetlbfs" lineno="2603">
57711 +<interface name="fs_getattr_hugetlbfs" lineno="2700">
57712 <summary>
57713 Get the attributes of an hugetlbfs
57714 filesystem.
57715 @@ -83851,7 +84071,7 @@ Domain allowed access.
57716 </summary>
57717 </param>
57718 </interface>
57719 -<interface name="fs_list_hugetlbfs" lineno="2621">
57720 +<interface name="fs_list_hugetlbfs" lineno="2718">
57721 <summary>
57722 List hugetlbfs.
57723 </summary>
57724 @@ -83861,7 +84081,7 @@ Domain allowed access.
57725 </summary>
57726 </param>
57727 </interface>
57728 -<interface name="fs_manage_hugetlbfs_dirs" lineno="2639">
57729 +<interface name="fs_manage_hugetlbfs_dirs" lineno="2736">
57730 <summary>
57731 Manage hugetlbfs dirs.
57732 </summary>
57733 @@ -83871,7 +84091,7 @@ Domain allowed access.
57734 </summary>
57735 </param>
57736 </interface>
57737 -<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2657">
57738 +<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2754">
57739 <summary>
57740 Read and write inherited hugetlbfs files.
57741 </summary>
57742 @@ -83881,7 +84101,7 @@ Domain allowed access.
57743 </summary>
57744 </param>
57745 </interface>
57746 -<interface name="fs_rw_hugetlbfs_files" lineno="2675">
57747 +<interface name="fs_rw_hugetlbfs_files" lineno="2772">
57748 <summary>
57749 Read and write hugetlbfs files.
57750 </summary>
57751 @@ -83891,7 +84111,7 @@ Domain allowed access.
57752 </summary>
57753 </param>
57754 </interface>
57755 -<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2693">
57756 +<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2790">
57757 <summary>
57758 Read, map and write hugetlbfs files.
57759 </summary>
57760 @@ -83901,7 +84121,7 @@ Domain allowed access.
57761 </summary>
57762 </param>
57763 </interface>
57764 -<interface name="fs_associate_hugetlbfs" lineno="2712">
57765 +<interface name="fs_associate_hugetlbfs" lineno="2809">
57766 <summary>
57767 Allow the type to associate to hugetlbfs filesystems.
57768 </summary>
57769 @@ -83911,7 +84131,7 @@ The type of the object to be associated.
57770 </summary>
57771 </param>
57772 </interface>
57773 -<interface name="fs_search_inotifyfs" lineno="2730">
57774 +<interface name="fs_search_inotifyfs" lineno="2827">
57775 <summary>
57776 Search inotifyfs filesystem.
57777 </summary>
57778 @@ -83921,7 +84141,7 @@ Domain allowed access.
57779 </summary>
57780 </param>
57781 </interface>
57782 -<interface name="fs_list_inotifyfs" lineno="2748">
57783 +<interface name="fs_list_inotifyfs" lineno="2845">
57784 <summary>
57785 List inotifyfs filesystem.
57786 </summary>
57787 @@ -83931,7 +84151,7 @@ Domain allowed access.
57788 </summary>
57789 </param>
57790 </interface>
57791 -<interface name="fs_dontaudit_list_inotifyfs" lineno="2766">
57792 +<interface name="fs_dontaudit_list_inotifyfs" lineno="2863">
57793 <summary>
57794 Dontaudit List inotifyfs filesystem.
57795 </summary>
57796 @@ -83941,7 +84161,7 @@ Domain to not audit.
57797 </summary>
57798 </param>
57799 </interface>
57800 -<interface name="fs_hugetlbfs_filetrans" lineno="2800">
57801 +<interface name="fs_hugetlbfs_filetrans" lineno="2897">
57802 <summary>
57803 Create an object in a hugetlbfs filesystem, with a private
57804 type using a type transition.
57805 @@ -83967,7 +84187,7 @@ The name of the object being created.
57806 </summary>
57807 </param>
57808 </interface>
57809 -<interface name="fs_mount_iso9660_fs" lineno="2820">
57810 +<interface name="fs_mount_iso9660_fs" lineno="2917">
57811 <summary>
57812 Mount an iso9660 filesystem, which
57813 is usually used on CDs.
57814 @@ -83978,7 +84198,7 @@ Domain allowed access.
57815 </summary>
57816 </param>
57817 </interface>
57818 -<interface name="fs_remount_iso9660_fs" lineno="2840">
57819 +<interface name="fs_remount_iso9660_fs" lineno="2937">
57820 <summary>
57821 Remount an iso9660 filesystem, which
57822 is usually used on CDs. This allows
57823 @@ -83990,7 +84210,7 @@ Domain allowed access.
57824 </summary>
57825 </param>
57826 </interface>
57827 -<interface name="fs_relabelfrom_iso9660_fs" lineno="2859">
57828 +<interface name="fs_relabelfrom_iso9660_fs" lineno="2956">
57829 <summary>
57830 Allow changing of the label of a
57831 filesystem with iso9660 type
57832 @@ -84001,7 +84221,7 @@ Domain allowed access.
57833 </summary>
57834 </param>
57835 </interface>
57836 -<interface name="fs_unmount_iso9660_fs" lineno="2878">
57837 +<interface name="fs_unmount_iso9660_fs" lineno="2975">
57838 <summary>
57839 Unmount an iso9660 filesystem, which
57840 is usually used on CDs.
57841 @@ -84012,7 +84232,7 @@ Domain allowed access.
57842 </summary>
57843 </param>
57844 </interface>
57845 -<interface name="fs_getattr_iso9660_fs" lineno="2898">
57846 +<interface name="fs_getattr_iso9660_fs" lineno="2995">
57847 <summary>
57848 Get the attributes of an iso9660
57849 filesystem, which is usually used on CDs.
57850 @@ -84024,7 +84244,7 @@ Domain allowed access.
57851 </param>
57852 <rolecap/>
57853 </interface>
57854 -<interface name="fs_getattr_iso9660_files" lineno="2917">
57855 +<interface name="fs_getattr_iso9660_files" lineno="3014">
57856 <summary>
57857 Get the attributes of files on an iso9660
57858 filesystem, which is usually used on CDs.
57859 @@ -84035,7 +84255,7 @@ Domain allowed access.
57860 </summary>
57861 </param>
57862 </interface>
57863 -<interface name="fs_read_iso9660_files" lineno="2937">
57864 +<interface name="fs_read_iso9660_files" lineno="3034">
57865 <summary>
57866 Read files on an iso9660 filesystem, which
57867 is usually used on CDs.
57868 @@ -84046,7 +84266,7 @@ Domain allowed access.
57869 </summary>
57870 </param>
57871 </interface>
57872 -<interface name="fs_mount_nfs" lineno="2957">
57873 +<interface name="fs_mount_nfs" lineno="3054">
57874 <summary>
57875 Mount a NFS filesystem.
57876 </summary>
57877 @@ -84056,7 +84276,7 @@ Domain allowed access.
57878 </summary>
57879 </param>
57880 </interface>
57881 -<interface name="fs_remount_nfs" lineno="2976">
57882 +<interface name="fs_remount_nfs" lineno="3073">
57883 <summary>
57884 Remount a NFS filesystem. This allows
57885 some mount options to be changed.
57886 @@ -84067,7 +84287,7 @@ Domain allowed access.
57887 </summary>
57888 </param>
57889 </interface>
57890 -<interface name="fs_unmount_nfs" lineno="2994">
57891 +<interface name="fs_unmount_nfs" lineno="3091">
57892 <summary>
57893 Unmount a NFS filesystem.
57894 </summary>
57895 @@ -84077,7 +84297,7 @@ Domain allowed access.
57896 </summary>
57897 </param>
57898 </interface>
57899 -<interface name="fs_getattr_nfs" lineno="3013">
57900 +<interface name="fs_getattr_nfs" lineno="3110">
57901 <summary>
57902 Get the attributes of a NFS filesystem.
57903 </summary>
57904 @@ -84088,7 +84308,7 @@ Domain allowed access.
57905 </param>
57906 <rolecap/>
57907 </interface>
57908 -<interface name="fs_search_nfs" lineno="3031">
57909 +<interface name="fs_search_nfs" lineno="3128">
57910 <summary>
57911 Search directories on a NFS filesystem.
57912 </summary>
57913 @@ -84098,7 +84318,7 @@ Domain allowed access.
57914 </summary>
57915 </param>
57916 </interface>
57917 -<interface name="fs_list_nfs" lineno="3049">
57918 +<interface name="fs_list_nfs" lineno="3146">
57919 <summary>
57920 List NFS filesystem.
57921 </summary>
57922 @@ -84108,7 +84328,7 @@ Domain allowed access.
57923 </summary>
57924 </param>
57925 </interface>
57926 -<interface name="fs_dontaudit_list_nfs" lineno="3068">
57927 +<interface name="fs_dontaudit_list_nfs" lineno="3165">
57928 <summary>
57929 Do not audit attempts to list the contents
57930 of directories on a NFS filesystem.
57931 @@ -84119,7 +84339,7 @@ Domain to not audit.
57932 </summary>
57933 </param>
57934 </interface>
57935 -<interface name="fs_mounton_nfs" lineno="3086">
57936 +<interface name="fs_mounton_nfs" lineno="3183">
57937 <summary>
57938 Mounton a NFS filesystem.
57939 </summary>
57940 @@ -84129,7 +84349,7 @@ Domain allowed access.
57941 </summary>
57942 </param>
57943 </interface>
57944 -<interface name="fs_read_nfs_files" lineno="3105">
57945 +<interface name="fs_read_nfs_files" lineno="3202">
57946 <summary>
57947 Read files on a NFS filesystem.
57948 </summary>
57949 @@ -84140,7 +84360,7 @@ Domain allowed access.
57950 </param>
57951 <rolecap/>
57952 </interface>
57953 -<interface name="fs_dontaudit_read_nfs_files" lineno="3125">
57954 +<interface name="fs_dontaudit_read_nfs_files" lineno="3222">
57955 <summary>
57956 Do not audit attempts to read
57957 files on a NFS filesystem.
57958 @@ -84151,7 +84371,7 @@ Domain to not audit.
57959 </summary>
57960 </param>
57961 </interface>
57962 -<interface name="fs_write_nfs_files" lineno="3143">
57963 +<interface name="fs_write_nfs_files" lineno="3240">
57964 <summary>
57965 Read files on a NFS filesystem.
57966 </summary>
57967 @@ -84161,7 +84381,7 @@ Domain allowed access.
57968 </summary>
57969 </param>
57970 </interface>
57971 -<interface name="fs_exec_nfs_files" lineno="3163">
57972 +<interface name="fs_exec_nfs_files" lineno="3260">
57973 <summary>
57974 Execute files on a NFS filesystem.
57975 </summary>
57976 @@ -84172,7 +84392,7 @@ Domain allowed access.
57977 </param>
57978 <rolecap/>
57979 </interface>
57980 -<interface name="fs_append_nfs_files" lineno="3184">
57981 +<interface name="fs_append_nfs_files" lineno="3281">
57982 <summary>
57983 Append files
57984 on a NFS filesystem.
57985 @@ -84184,7 +84404,7 @@ Domain allowed access.
57986 </param>
57987 <rolecap/>
57988 </interface>
57989 -<interface name="fs_dontaudit_append_nfs_files" lineno="3204">
57990 +<interface name="fs_dontaudit_append_nfs_files" lineno="3301">
57991 <summary>
57992 dontaudit Append files
57993 on a NFS filesystem.
57994 @@ -84196,7 +84416,7 @@ Domain to not audit.
57995 </param>
57996 <rolecap/>
57997 </interface>
57998 -<interface name="fs_dontaudit_rw_nfs_files" lineno="3223">
57999 +<interface name="fs_dontaudit_rw_nfs_files" lineno="3320">
58000 <summary>
58001 Do not audit attempts to read or
58002 write files on a NFS filesystem.
58003 @@ -84207,7 +84427,7 @@ Domain to not audit.
58004 </summary>
58005 </param>
58006 </interface>
58007 -<interface name="fs_read_nfs_symlinks" lineno="3241">
58008 +<interface name="fs_read_nfs_symlinks" lineno="3338">
58009 <summary>
58010 Read symbolic links on a NFS filesystem.
58011 </summary>
58012 @@ -84217,7 +84437,7 @@ Domain allowed access.
58013 </summary>
58014 </param>
58015 </interface>
58016 -<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3260">
58017 +<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3357">
58018 <summary>
58019 Dontaudit read symbolic links on a NFS filesystem.
58020 </summary>
58021 @@ -84227,7 +84447,7 @@ Domain to not audit.
58022 </summary>
58023 </param>
58024 </interface>
58025 -<interface name="fs_read_nfs_named_sockets" lineno="3278">
58026 +<interface name="fs_read_nfs_named_sockets" lineno="3375">
58027 <summary>
58028 Read named sockets on a NFS filesystem.
58029 </summary>
58030 @@ -84237,7 +84457,7 @@ Domain allowed access.
58031 </summary>
58032 </param>
58033 </interface>
58034 -<interface name="fs_read_nfs_named_pipes" lineno="3297">
58035 +<interface name="fs_read_nfs_named_pipes" lineno="3394">
58036 <summary>
58037 Read named pipes on a NFS network filesystem.
58038 </summary>
58039 @@ -84248,7 +84468,7 @@ Domain allowed access.
58040 </param>
58041 <rolecap/>
58042 </interface>
58043 -<interface name="fs_getattr_rpc_dirs" lineno="3316">
58044 +<interface name="fs_getattr_rpc_dirs" lineno="3413">
58045 <summary>
58046 Get the attributes of directories of RPC
58047 file system pipes.
58048 @@ -84259,7 +84479,7 @@ Domain allowed access.
58049 </summary>
58050 </param>
58051 </interface>
58052 -<interface name="fs_search_rpc" lineno="3335">
58053 +<interface name="fs_search_rpc" lineno="3432">
58054 <summary>
58055 Search directories of RPC file system pipes.
58056 </summary>
58057 @@ -84269,7 +84489,7 @@ Domain allowed access.
58058 </summary>
58059 </param>
58060 </interface>
58061 -<interface name="fs_search_removable" lineno="3353">
58062 +<interface name="fs_search_removable" lineno="3450">
58063 <summary>
58064 Search removable storage directories.
58065 </summary>
58066 @@ -84279,7 +84499,7 @@ Domain allowed access.
58067 </summary>
58068 </param>
58069 </interface>
58070 -<interface name="fs_dontaudit_list_removable" lineno="3371">
58071 +<interface name="fs_dontaudit_list_removable" lineno="3468">
58072 <summary>
58073 Do not audit attempts to list removable storage directories.
58074 </summary>
58075 @@ -84289,7 +84509,7 @@ Domain not to audit.
58076 </summary>
58077 </param>
58078 </interface>
58079 -<interface name="fs_read_removable_files" lineno="3389">
58080 +<interface name="fs_read_removable_files" lineno="3486">
58081 <summary>
58082 Read removable storage files.
58083 </summary>
58084 @@ -84299,7 +84519,7 @@ Domain allowed access.
58085 </summary>
58086 </param>
58087 </interface>
58088 -<interface name="fs_dontaudit_read_removable_files" lineno="3407">
58089 +<interface name="fs_dontaudit_read_removable_files" lineno="3504">
58090 <summary>
58091 Do not audit attempts to read removable storage files.
58092 </summary>
58093 @@ -84309,7 +84529,7 @@ Domain not to audit.
58094 </summary>
58095 </param>
58096 </interface>
58097 -<interface name="fs_dontaudit_write_removable_files" lineno="3425">
58098 +<interface name="fs_dontaudit_write_removable_files" lineno="3522">
58099 <summary>
58100 Do not audit attempts to write removable storage files.
58101 </summary>
58102 @@ -84319,7 +84539,7 @@ Domain not to audit.
58103 </summary>
58104 </param>
58105 </interface>
58106 -<interface name="fs_read_removable_symlinks" lineno="3443">
58107 +<interface name="fs_read_removable_symlinks" lineno="3540">
58108 <summary>
58109 Read removable storage symbolic links.
58110 </summary>
58111 @@ -84329,7 +84549,7 @@ Domain allowed access.
58112 </summary>
58113 </param>
58114 </interface>
58115 -<interface name="fs_read_removable_blk_files" lineno="3461">
58116 +<interface name="fs_read_removable_blk_files" lineno="3558">
58117 <summary>
58118 Read block nodes on removable filesystems.
58119 </summary>
58120 @@ -84339,7 +84559,7 @@ Domain allowed access.
58121 </summary>
58122 </param>
58123 </interface>
58124 -<interface name="fs_rw_removable_blk_files" lineno="3480">
58125 +<interface name="fs_rw_removable_blk_files" lineno="3577">
58126 <summary>
58127 Read and write block nodes on removable filesystems.
58128 </summary>
58129 @@ -84349,7 +84569,7 @@ Domain allowed access.
58130 </summary>
58131 </param>
58132 </interface>
58133 -<interface name="fs_list_rpc" lineno="3499">
58134 +<interface name="fs_list_rpc" lineno="3596">
58135 <summary>
58136 Read directories of RPC file system pipes.
58137 </summary>
58138 @@ -84359,7 +84579,7 @@ Domain allowed access.
58139 </summary>
58140 </param>
58141 </interface>
58142 -<interface name="fs_read_rpc_files" lineno="3517">
58143 +<interface name="fs_read_rpc_files" lineno="3614">
58144 <summary>
58145 Read files of RPC file system pipes.
58146 </summary>
58147 @@ -84369,7 +84589,7 @@ Domain allowed access.
58148 </summary>
58149 </param>
58150 </interface>
58151 -<interface name="fs_read_rpc_symlinks" lineno="3535">
58152 +<interface name="fs_read_rpc_symlinks" lineno="3632">
58153 <summary>
58154 Read symbolic links of RPC file system pipes.
58155 </summary>
58156 @@ -84379,7 +84599,7 @@ Domain allowed access.
58157 </summary>
58158 </param>
58159 </interface>
58160 -<interface name="fs_read_rpc_sockets" lineno="3553">
58161 +<interface name="fs_read_rpc_sockets" lineno="3650">
58162 <summary>
58163 Read sockets of RPC file system pipes.
58164 </summary>
58165 @@ -84389,7 +84609,7 @@ Domain allowed access.
58166 </summary>
58167 </param>
58168 </interface>
58169 -<interface name="fs_rw_rpc_sockets" lineno="3571">
58170 +<interface name="fs_rw_rpc_sockets" lineno="3668">
58171 <summary>
58172 Read and write sockets of RPC file system pipes.
58173 </summary>
58174 @@ -84399,7 +84619,7 @@ Domain allowed access.
58175 </summary>
58176 </param>
58177 </interface>
58178 -<interface name="fs_manage_nfs_dirs" lineno="3591">
58179 +<interface name="fs_manage_nfs_dirs" lineno="3688">
58180 <summary>
58181 Create, read, write, and delete directories
58182 on a NFS filesystem.
58183 @@ -84411,7 +84631,7 @@ Domain allowed access.
58184 </param>
58185 <rolecap/>
58186 </interface>
58187 -<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3611">
58188 +<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3708">
58189 <summary>
58190 Do not audit attempts to create, read,
58191 write, and delete directories
58192 @@ -84423,7 +84643,7 @@ Domain to not audit.
58193 </summary>
58194 </param>
58195 </interface>
58196 -<interface name="fs_manage_nfs_files" lineno="3631">
58197 +<interface name="fs_manage_nfs_files" lineno="3728">
58198 <summary>
58199 Create, read, write, and delete files
58200 on a NFS filesystem.
58201 @@ -84435,7 +84655,7 @@ Domain allowed access.
58202 </param>
58203 <rolecap/>
58204 </interface>
58205 -<interface name="fs_dontaudit_manage_nfs_files" lineno="3651">
58206 +<interface name="fs_dontaudit_manage_nfs_files" lineno="3748">
58207 <summary>
58208 Do not audit attempts to create,
58209 read, write, and delete files
58210 @@ -84447,7 +84667,7 @@ Domain to not audit.
58211 </summary>
58212 </param>
58213 </interface>
58214 -<interface name="fs_manage_nfs_symlinks" lineno="3671">
58215 +<interface name="fs_manage_nfs_symlinks" lineno="3768">
58216 <summary>
58217 Create, read, write, and delete symbolic links
58218 on a NFS network filesystem.
58219 @@ -84459,7 +84679,7 @@ Domain allowed access.
58220 </param>
58221 <rolecap/>
58222 </interface>
58223 -<interface name="fs_manage_nfs_named_pipes" lineno="3690">
58224 +<interface name="fs_manage_nfs_named_pipes" lineno="3787">
58225 <summary>
58226 Create, read, write, and delete named pipes
58227 on a NFS filesystem.
58228 @@ -84470,7 +84690,7 @@ Domain allowed access.
58229 </summary>
58230 </param>
58231 </interface>
58232 -<interface name="fs_manage_nfs_named_sockets" lineno="3709">
58233 +<interface name="fs_manage_nfs_named_sockets" lineno="3806">
58234 <summary>
58235 Create, read, write, and delete named sockets
58236 on a NFS filesystem.
58237 @@ -84481,7 +84701,7 @@ Domain allowed access.
58238 </summary>
58239 </param>
58240 </interface>
58241 -<interface name="fs_nfs_domtrans" lineno="3752">
58242 +<interface name="fs_nfs_domtrans" lineno="3849">
58243 <summary>
58244 Execute a file on a NFS filesystem
58245 in the specified domain.
58246 @@ -84516,7 +84736,7 @@ The type of the new process.
58247 </summary>
58248 </param>
58249 </interface>
58250 -<interface name="fs_mount_nfsd_fs" lineno="3771">
58251 +<interface name="fs_mount_nfsd_fs" lineno="3868">
58252 <summary>
58253 Mount a NFS server pseudo filesystem.
58254 </summary>
58255 @@ -84526,7 +84746,7 @@ Domain allowed access.
58256 </summary>
58257 </param>
58258 </interface>
58259 -<interface name="fs_remount_nfsd_fs" lineno="3790">
58260 +<interface name="fs_remount_nfsd_fs" lineno="3887">
58261 <summary>
58262 Mount a NFS server pseudo filesystem.
58263 This allows some mount options to be changed.
58264 @@ -84537,7 +84757,7 @@ Domain allowed access.
58265 </summary>
58266 </param>
58267 </interface>
58268 -<interface name="fs_unmount_nfsd_fs" lineno="3808">
58269 +<interface name="fs_unmount_nfsd_fs" lineno="3905">
58270 <summary>
58271 Unmount a NFS server pseudo filesystem.
58272 </summary>
58273 @@ -84547,7 +84767,7 @@ Domain allowed access.
58274 </summary>
58275 </param>
58276 </interface>
58277 -<interface name="fs_getattr_nfsd_fs" lineno="3827">
58278 +<interface name="fs_getattr_nfsd_fs" lineno="3924">
58279 <summary>
58280 Get the attributes of a NFS server
58281 pseudo filesystem.
58282 @@ -84558,7 +84778,7 @@ Domain allowed access.
58283 </summary>
58284 </param>
58285 </interface>
58286 -<interface name="fs_search_nfsd_fs" lineno="3845">
58287 +<interface name="fs_search_nfsd_fs" lineno="3942">
58288 <summary>
58289 Search NFS server directories.
58290 </summary>
58291 @@ -84568,7 +84788,7 @@ Domain allowed access.
58292 </summary>
58293 </param>
58294 </interface>
58295 -<interface name="fs_list_nfsd_fs" lineno="3863">
58296 +<interface name="fs_list_nfsd_fs" lineno="3960">
58297 <summary>
58298 List NFS server directories.
58299 </summary>
58300 @@ -84578,7 +84798,7 @@ Domain allowed access.
58301 </summary>
58302 </param>
58303 </interface>
58304 -<interface name="fs_watch_nfsd_dirs" lineno="3881">
58305 +<interface name="fs_watch_nfsd_dirs" lineno="3978">
58306 <summary>
58307 Watch NFS server directories.
58308 </summary>
58309 @@ -84588,7 +84808,7 @@ Domain allowed access.
58310 </summary>
58311 </param>
58312 </interface>
58313 -<interface name="fs_getattr_nfsd_files" lineno="3899">
58314 +<interface name="fs_getattr_nfsd_files" lineno="3996">
58315 <summary>
58316 Getattr files on an nfsd filesystem
58317 </summary>
58318 @@ -84598,7 +84818,7 @@ Domain allowed access.
58319 </summary>
58320 </param>
58321 </interface>
58322 -<interface name="fs_rw_nfsd_fs" lineno="3917">
58323 +<interface name="fs_rw_nfsd_fs" lineno="4014">
58324 <summary>
58325 Read and write NFS server files.
58326 </summary>
58327 @@ -84608,7 +84828,17 @@ Domain allowed access.
58328 </summary>
58329 </param>
58330 </interface>
58331 -<interface name="fs_read_nsfs_files" lineno="3935">
58332 +<interface name="fs_getattr_nsfs_files" lineno="4032">
58333 +<summary>
58334 +Get the attributes of nsfs inodes (e.g. /proc/pid/ns/uts)
58335 +</summary>
58336 +<param name="domain">
58337 +<summary>
58338 +Domain allowed access.
58339 +</summary>
58340 +</param>
58341 +</interface>
58342 +<interface name="fs_read_nsfs_files" lineno="4050">
58343 <summary>
58344 Read nsfs inodes (e.g. /proc/pid/ns/uts)
58345 </summary>
58346 @@ -84618,7 +84848,7 @@ Domain allowed access.
58347 </summary>
58348 </param>
58349 </interface>
58350 -<interface name="fs_getattr_nsfs" lineno="3953">
58351 +<interface name="fs_getattr_nsfs" lineno="4068">
58352 <summary>
58353 Get the attributes of an nsfs filesystem.
58354 </summary>
58355 @@ -84628,7 +84858,7 @@ Domain allowed access.
58356 </summary>
58357 </param>
58358 </interface>
58359 -<interface name="fs_unmount_nsfs" lineno="3971">
58360 +<interface name="fs_unmount_nsfs" lineno="4086">
58361 <summary>
58362 Unmount an nsfs filesystem.
58363 </summary>
58364 @@ -84638,7 +84868,7 @@ Domain allowed access.
58365 </summary>
58366 </param>
58367 </interface>
58368 -<interface name="fs_getattr_pstorefs" lineno="3989">
58369 +<interface name="fs_getattr_pstorefs" lineno="4104">
58370 <summary>
58371 Get the attributes of a pstore filesystem.
58372 </summary>
58373 @@ -84648,7 +84878,7 @@ Domain allowed access.
58374 </summary>
58375 </param>
58376 </interface>
58377 -<interface name="fs_getattr_pstore_dirs" lineno="4008">
58378 +<interface name="fs_getattr_pstore_dirs" lineno="4123">
58379 <summary>
58380 Get the attributes of directories
58381 of a pstore filesystem.
58382 @@ -84659,7 +84889,7 @@ Domain allowed access.
58383 </summary>
58384 </param>
58385 </interface>
58386 -<interface name="fs_create_pstore_dirs" lineno="4027">
58387 +<interface name="fs_create_pstore_dirs" lineno="4142">
58388 <summary>
58389 Create pstore directories.
58390 </summary>
58391 @@ -84669,7 +84899,7 @@ Domain allowed access.
58392 </summary>
58393 </param>
58394 </interface>
58395 -<interface name="fs_relabel_pstore_dirs" lineno="4046">
58396 +<interface name="fs_relabel_pstore_dirs" lineno="4161">
58397 <summary>
58398 Relabel to/from pstore_t directories.
58399 </summary>
58400 @@ -84679,7 +84909,7 @@ Domain allowed access.
58401 </summary>
58402 </param>
58403 </interface>
58404 -<interface name="fs_list_pstore_dirs" lineno="4065">
58405 +<interface name="fs_list_pstore_dirs" lineno="4180">
58406 <summary>
58407 List the directories
58408 of a pstore filesystem.
58409 @@ -84690,7 +84920,7 @@ Domain allowed access.
58410 </summary>
58411 </param>
58412 </interface>
58413 -<interface name="fs_read_pstore_files" lineno="4084">
58414 +<interface name="fs_read_pstore_files" lineno="4199">
58415 <summary>
58416 Read pstore_t files
58417 </summary>
58418 @@ -84700,7 +84930,7 @@ Domain allowed access.
58419 </summary>
58420 </param>
58421 </interface>
58422 -<interface name="fs_delete_pstore_files" lineno="4103">
58423 +<interface name="fs_delete_pstore_files" lineno="4218">
58424 <summary>
58425 Delete the files
58426 of a pstore filesystem.
58427 @@ -84711,7 +84941,7 @@ Domain allowed access.
58428 </summary>
58429 </param>
58430 </interface>
58431 -<interface name="fs_associate_ramfs" lineno="4122">
58432 +<interface name="fs_associate_ramfs" lineno="4237">
58433 <summary>
58434 Allow the type to associate to ramfs filesystems.
58435 </summary>
58436 @@ -84721,7 +84951,7 @@ The type of the object to be associated.
58437 </summary>
58438 </param>
58439 </interface>
58440 -<interface name="fs_mount_ramfs" lineno="4140">
58441 +<interface name="fs_mount_ramfs" lineno="4255">
58442 <summary>
58443 Mount a RAM filesystem.
58444 </summary>
58445 @@ -84731,7 +84961,7 @@ Domain allowed access.
58446 </summary>
58447 </param>
58448 </interface>
58449 -<interface name="fs_remount_ramfs" lineno="4159">
58450 +<interface name="fs_remount_ramfs" lineno="4274">
58451 <summary>
58452 Remount a RAM filesystem. This allows
58453 some mount options to be changed.
58454 @@ -84742,7 +84972,7 @@ Domain allowed access.
58455 </summary>
58456 </param>
58457 </interface>
58458 -<interface name="fs_unmount_ramfs" lineno="4177">
58459 +<interface name="fs_unmount_ramfs" lineno="4292">
58460 <summary>
58461 Unmount a RAM filesystem.
58462 </summary>
58463 @@ -84752,7 +84982,7 @@ Domain allowed access.
58464 </summary>
58465 </param>
58466 </interface>
58467 -<interface name="fs_getattr_ramfs" lineno="4195">
58468 +<interface name="fs_getattr_ramfs" lineno="4310">
58469 <summary>
58470 Get the attributes of a RAM filesystem.
58471 </summary>
58472 @@ -84762,7 +84992,7 @@ Domain allowed access.
58473 </summary>
58474 </param>
58475 </interface>
58476 -<interface name="fs_search_ramfs" lineno="4213">
58477 +<interface name="fs_search_ramfs" lineno="4328">
58478 <summary>
58479 Search directories on a ramfs
58480 </summary>
58481 @@ -84772,7 +85002,7 @@ Domain allowed access.
58482 </summary>
58483 </param>
58484 </interface>
58485 -<interface name="fs_dontaudit_search_ramfs" lineno="4231">
58486 +<interface name="fs_dontaudit_search_ramfs" lineno="4346">
58487 <summary>
58488 Dontaudit Search directories on a ramfs
58489 </summary>
58490 @@ -84782,7 +85012,7 @@ Domain to not audit.
58491 </summary>
58492 </param>
58493 </interface>
58494 -<interface name="fs_manage_ramfs_dirs" lineno="4250">
58495 +<interface name="fs_manage_ramfs_dirs" lineno="4365">
58496 <summary>
58497 Create, read, write, and delete
58498 directories on a ramfs.
58499 @@ -84793,7 +85023,7 @@ Domain allowed access.
58500 </summary>
58501 </param>
58502 </interface>
58503 -<interface name="fs_dontaudit_read_ramfs_files" lineno="4268">
58504 +<interface name="fs_dontaudit_read_ramfs_files" lineno="4383">
58505 <summary>
58506 Dontaudit read on a ramfs files.
58507 </summary>
58508 @@ -84803,7 +85033,7 @@ Domain to not audit.
58509 </summary>
58510 </param>
58511 </interface>
58512 -<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4286">
58513 +<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4401">
58514 <summary>
58515 Dontaudit read on a ramfs fifo_files.
58516 </summary>
58517 @@ -84813,7 +85043,7 @@ Domain to not audit.
58518 </summary>
58519 </param>
58520 </interface>
58521 -<interface name="fs_manage_ramfs_files" lineno="4305">
58522 +<interface name="fs_manage_ramfs_files" lineno="4420">
58523 <summary>
58524 Create, read, write, and delete
58525 files on a ramfs filesystem.
58526 @@ -84824,7 +85054,7 @@ Domain allowed access.
58527 </summary>
58528 </param>
58529 </interface>
58530 -<interface name="fs_write_ramfs_pipes" lineno="4323">
58531 +<interface name="fs_write_ramfs_pipes" lineno="4438">
58532 <summary>
58533 Write to named pipe on a ramfs filesystem.
58534 </summary>
58535 @@ -84834,7 +85064,7 @@ Domain allowed access.
58536 </summary>
58537 </param>
58538 </interface>
58539 -<interface name="fs_dontaudit_write_ramfs_pipes" lineno="4342">
58540 +<interface name="fs_dontaudit_write_ramfs_pipes" lineno="4457">
58541 <summary>
58542 Do not audit attempts to write to named
58543 pipes on a ramfs filesystem.
58544 @@ -84845,7 +85075,7 @@ Domain to not audit.
58545 </summary>
58546 </param>
58547 </interface>
58548 -<interface name="fs_rw_ramfs_pipes" lineno="4360">
58549 +<interface name="fs_rw_ramfs_pipes" lineno="4475">
58550 <summary>
58551 Read and write a named pipe on a ramfs filesystem.
58552 </summary>
58553 @@ -84855,7 +85085,7 @@ Domain allowed access.
58554 </summary>
58555 </param>
58556 </interface>
58557 -<interface name="fs_manage_ramfs_pipes" lineno="4379">
58558 +<interface name="fs_manage_ramfs_pipes" lineno="4494">
58559 <summary>
58560 Create, read, write, and delete
58561 named pipes on a ramfs filesystem.
58562 @@ -84866,7 +85096,7 @@ Domain allowed access.
58563 </summary>
58564 </param>
58565 </interface>
58566 -<interface name="fs_write_ramfs_sockets" lineno="4397">
58567 +<interface name="fs_write_ramfs_sockets" lineno="4512">
58568 <summary>
58569 Write to named socket on a ramfs filesystem.
58570 </summary>
58571 @@ -84876,7 +85106,7 @@ Domain allowed access.
58572 </summary>
58573 </param>
58574 </interface>
58575 -<interface name="fs_manage_ramfs_sockets" lineno="4416">
58576 +<interface name="fs_manage_ramfs_sockets" lineno="4531">
58577 <summary>
58578 Create, read, write, and delete
58579 named sockets on a ramfs filesystem.
58580 @@ -84887,7 +85117,7 @@ Domain allowed access.
58581 </summary>
58582 </param>
58583 </interface>
58584 -<interface name="fs_mount_romfs" lineno="4434">
58585 +<interface name="fs_mount_romfs" lineno="4549">
58586 <summary>
58587 Mount a ROM filesystem.
58588 </summary>
58589 @@ -84897,7 +85127,7 @@ Domain allowed access.
58590 </summary>
58591 </param>
58592 </interface>
58593 -<interface name="fs_remount_romfs" lineno="4453">
58594 +<interface name="fs_remount_romfs" lineno="4568">
58595 <summary>
58596 Remount a ROM filesystem. This allows
58597 some mount options to be changed.
58598 @@ -84908,7 +85138,7 @@ Domain allowed access.
58599 </summary>
58600 </param>
58601 </interface>
58602 -<interface name="fs_unmount_romfs" lineno="4471">
58603 +<interface name="fs_unmount_romfs" lineno="4586">
58604 <summary>
58605 Unmount a ROM filesystem.
58606 </summary>
58607 @@ -84918,7 +85148,7 @@ Domain allowed access.
58608 </summary>
58609 </param>
58610 </interface>
58611 -<interface name="fs_getattr_romfs" lineno="4490">
58612 +<interface name="fs_getattr_romfs" lineno="4605">
58613 <summary>
58614 Get the attributes of a ROM
58615 filesystem.
58616 @@ -84929,7 +85159,7 @@ Domain allowed access.
58617 </summary>
58618 </param>
58619 </interface>
58620 -<interface name="fs_mount_rpc_pipefs" lineno="4508">
58621 +<interface name="fs_mount_rpc_pipefs" lineno="4623">
58622 <summary>
58623 Mount a RPC pipe filesystem.
58624 </summary>
58625 @@ -84939,7 +85169,7 @@ Domain allowed access.
58626 </summary>
58627 </param>
58628 </interface>
58629 -<interface name="fs_remount_rpc_pipefs" lineno="4527">
58630 +<interface name="fs_remount_rpc_pipefs" lineno="4642">
58631 <summary>
58632 Remount a RPC pipe filesystem. This
58633 allows some mount option to be changed.
58634 @@ -84950,7 +85180,7 @@ Domain allowed access.
58635 </summary>
58636 </param>
58637 </interface>
58638 -<interface name="fs_unmount_rpc_pipefs" lineno="4545">
58639 +<interface name="fs_unmount_rpc_pipefs" lineno="4660">
58640 <summary>
58641 Unmount a RPC pipe filesystem.
58642 </summary>
58643 @@ -84960,7 +85190,7 @@ Domain allowed access.
58644 </summary>
58645 </param>
58646 </interface>
58647 -<interface name="fs_getattr_rpc_pipefs" lineno="4564">
58648 +<interface name="fs_getattr_rpc_pipefs" lineno="4679">
58649 <summary>
58650 Get the attributes of a RPC pipe
58651 filesystem.
58652 @@ -84971,7 +85201,7 @@ Domain allowed access.
58653 </summary>
58654 </param>
58655 </interface>
58656 -<interface name="fs_rw_rpc_named_pipes" lineno="4582">
58657 +<interface name="fs_rw_rpc_named_pipes" lineno="4697">
58658 <summary>
58659 Read and write RPC pipe filesystem named pipes.
58660 </summary>
58661 @@ -84981,7 +85211,7 @@ Domain allowed access.
58662 </summary>
58663 </param>
58664 </interface>
58665 -<interface name="fs_mount_tmpfs" lineno="4600">
58666 +<interface name="fs_mount_tmpfs" lineno="4715">
58667 <summary>
58668 Mount a tmpfs filesystem.
58669 </summary>
58670 @@ -84991,7 +85221,7 @@ Domain allowed access.
58671 </summary>
58672 </param>
58673 </interface>
58674 -<interface name="fs_remount_tmpfs" lineno="4618">
58675 +<interface name="fs_remount_tmpfs" lineno="4733">
58676 <summary>
58677 Remount a tmpfs filesystem.
58678 </summary>
58679 @@ -85001,7 +85231,7 @@ Domain allowed access.
58680 </summary>
58681 </param>
58682 </interface>
58683 -<interface name="fs_unmount_tmpfs" lineno="4636">
58684 +<interface name="fs_unmount_tmpfs" lineno="4751">
58685 <summary>
58686 Unmount a tmpfs filesystem.
58687 </summary>
58688 @@ -85011,7 +85241,7 @@ Domain allowed access.
58689 </summary>
58690 </param>
58691 </interface>
58692 -<interface name="fs_dontaudit_getattr_tmpfs" lineno="4654">
58693 +<interface name="fs_dontaudit_getattr_tmpfs" lineno="4769">
58694 <summary>
58695 Do not audit getting the attributes of a tmpfs filesystem
58696 </summary>
58697 @@ -85021,7 +85251,7 @@ Domain to not audit
58698 </summary>
58699 </param>
58700 </interface>
58701 -<interface name="fs_getattr_tmpfs" lineno="4674">
58702 +<interface name="fs_getattr_tmpfs" lineno="4789">
58703 <summary>
58704 Get the attributes of a tmpfs
58705 filesystem.
58706 @@ -85033,7 +85263,7 @@ Domain allowed access.
58707 </param>
58708 <rolecap/>
58709 </interface>
58710 -<interface name="fs_associate_tmpfs" lineno="4692">
58711 +<interface name="fs_associate_tmpfs" lineno="4807">
58712 <summary>
58713 Allow the type to associate to tmpfs filesystems.
58714 </summary>
58715 @@ -85043,7 +85273,7 @@ The type of the object to be associated.
58716 </summary>
58717 </param>
58718 </interface>
58719 -<interface name="fs_relabelfrom_tmpfs" lineno="4710">
58720 +<interface name="fs_relabelfrom_tmpfs" lineno="4825">
58721 <summary>
58722 Relabel from tmpfs filesystem.
58723 </summary>
58724 @@ -85053,7 +85283,7 @@ Domain allowed access.
58725 </summary>
58726 </param>
58727 </interface>
58728 -<interface name="fs_getattr_tmpfs_dirs" lineno="4728">
58729 +<interface name="fs_getattr_tmpfs_dirs" lineno="4843">
58730 <summary>
58731 Get the attributes of tmpfs directories.
58732 </summary>
58733 @@ -85063,7 +85293,7 @@ Domain allowed access.
58734 </summary>
58735 </param>
58736 </interface>
58737 -<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4747">
58738 +<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4862">
58739 <summary>
58740 Do not audit attempts to get the attributes
58741 of tmpfs directories.
58742 @@ -85074,7 +85304,7 @@ Domain to not audit.
58743 </summary>
58744 </param>
58745 </interface>
58746 -<interface name="fs_mounton_tmpfs" lineno="4765">
58747 +<interface name="fs_mounton_tmpfs" lineno="4880">
58748 <summary>
58749 Mount on tmpfs directories.
58750 </summary>
58751 @@ -85084,7 +85314,7 @@ Domain allowed access.
58752 </summary>
58753 </param>
58754 </interface>
58755 -<interface name="fs_mounton_tmpfs_files" lineno="4783">
58756 +<interface name="fs_mounton_tmpfs_files" lineno="4898">
58757 <summary>
58758 Mount on tmpfs files.
58759 </summary>
58760 @@ -85094,7 +85324,7 @@ Domain allowed access.
58761 </summary>
58762 </param>
58763 </interface>
58764 -<interface name="fs_setattr_tmpfs_dirs" lineno="4801">
58765 +<interface name="fs_setattr_tmpfs_dirs" lineno="4916">
58766 <summary>
58767 Set the attributes of tmpfs directories.
58768 </summary>
58769 @@ -85104,7 +85334,7 @@ Domain allowed access.
58770 </summary>
58771 </param>
58772 </interface>
58773 -<interface name="fs_search_tmpfs" lineno="4819">
58774 +<interface name="fs_search_tmpfs" lineno="4934">
58775 <summary>
58776 Search tmpfs directories.
58777 </summary>
58778 @@ -85114,7 +85344,7 @@ Domain allowed access.
58779 </summary>
58780 </param>
58781 </interface>
58782 -<interface name="fs_list_tmpfs" lineno="4837">
58783 +<interface name="fs_list_tmpfs" lineno="4952">
58784 <summary>
58785 List the contents of generic tmpfs directories.
58786 </summary>
58787 @@ -85124,7 +85354,7 @@ Domain allowed access.
58788 </summary>
58789 </param>
58790 </interface>
58791 -<interface name="fs_dontaudit_list_tmpfs" lineno="4856">
58792 +<interface name="fs_dontaudit_list_tmpfs" lineno="4971">
58793 <summary>
58794 Do not audit attempts to list the
58795 contents of generic tmpfs directories.
58796 @@ -85135,7 +85365,7 @@ Domain to not audit.
58797 </summary>
58798 </param>
58799 </interface>
58800 -<interface name="fs_manage_tmpfs_dirs" lineno="4875">
58801 +<interface name="fs_manage_tmpfs_dirs" lineno="4990">
58802 <summary>
58803 Create, read, write, and delete
58804 tmpfs directories
58805 @@ -85146,7 +85376,7 @@ Domain allowed access.
58806 </summary>
58807 </param>
58808 </interface>
58809 -<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="4894">
58810 +<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="5009">
58811 <summary>
58812 Do not audit attempts to write
58813 tmpfs directories
58814 @@ -85157,7 +85387,7 @@ Domain to not audit.
58815 </summary>
58816 </param>
58817 </interface>
58818 -<interface name="fs_relabelfrom_tmpfs_dirs" lineno="4912">
58819 +<interface name="fs_relabelfrom_tmpfs_dirs" lineno="5027">
58820 <summary>
58821 Relabel from tmpfs_t dir
58822 </summary>
58823 @@ -85167,7 +85397,7 @@ Domain allowed access.
58824 </summary>
58825 </param>
58826 </interface>
58827 -<interface name="fs_relabel_tmpfs_dirs" lineno="4930">
58828 +<interface name="fs_relabel_tmpfs_dirs" lineno="5045">
58829 <summary>
58830 Relabel directory on tmpfs filesystems.
58831 </summary>
58832 @@ -85177,7 +85407,7 @@ Domain allowed access.
58833 </summary>
58834 </param>
58835 </interface>
58836 -<interface name="fs_tmpfs_filetrans" lineno="4963">
58837 +<interface name="fs_tmpfs_filetrans" lineno="5078">
58838 <summary>
58839 Create an object in a tmpfs filesystem, with a private
58840 type using a type transition.
58841 @@ -85203,7 +85433,7 @@ The name of the object being created.
58842 </summary>
58843 </param>
58844 </interface>
58845 -<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="4983">
58846 +<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="5098">
58847 <summary>
58848 Do not audit attempts to getattr
58849 generic tmpfs files.
58850 @@ -85214,7 +85444,7 @@ Domain to not audit.
58851 </summary>
58852 </param>
58853 </interface>
58854 -<interface name="fs_dontaudit_rw_tmpfs_files" lineno="5002">
58855 +<interface name="fs_dontaudit_rw_tmpfs_files" lineno="5117">
58856 <summary>
58857 Do not audit attempts to read or write
58858 generic tmpfs files.
58859 @@ -85225,7 +85455,7 @@ Domain to not audit.
58860 </summary>
58861 </param>
58862 </interface>
58863 -<interface name="fs_delete_tmpfs_symlinks" lineno="5020">
58864 +<interface name="fs_delete_tmpfs_symlinks" lineno="5135">
58865 <summary>
58866 Delete tmpfs symbolic links.
58867 </summary>
58868 @@ -85235,7 +85465,7 @@ Domain allowed access.
58869 </summary>
58870 </param>
58871 </interface>
58872 -<interface name="fs_manage_auto_mountpoints" lineno="5039">
58873 +<interface name="fs_manage_auto_mountpoints" lineno="5154">
58874 <summary>
58875 Create, read, write, and delete
58876 auto moutpoints.
58877 @@ -85246,7 +85476,7 @@ Domain allowed access.
58878 </summary>
58879 </param>
58880 </interface>
58881 -<interface name="fs_read_tmpfs_files" lineno="5057">
58882 +<interface name="fs_read_tmpfs_files" lineno="5172">
58883 <summary>
58884 Read generic tmpfs files.
58885 </summary>
58886 @@ -85256,7 +85486,7 @@ Domain allowed access.
58887 </summary>
58888 </param>
58889 </interface>
58890 -<interface name="fs_rw_tmpfs_files" lineno="5075">
58891 +<interface name="fs_rw_tmpfs_files" lineno="5190">
58892 <summary>
58893 Read and write generic tmpfs files.
58894 </summary>
58895 @@ -85266,7 +85496,7 @@ Domain allowed access.
58896 </summary>
58897 </param>
58898 </interface>
58899 -<interface name="fs_relabel_tmpfs_files" lineno="5093">
58900 +<interface name="fs_relabel_tmpfs_files" lineno="5208">
58901 <summary>
58902 Relabel files on tmpfs filesystems.
58903 </summary>
58904 @@ -85276,7 +85506,7 @@ Domain allowed access.
58905 </summary>
58906 </param>
58907 </interface>
58908 -<interface name="fs_read_tmpfs_symlinks" lineno="5111">
58909 +<interface name="fs_read_tmpfs_symlinks" lineno="5226">
58910 <summary>
58911 Read tmpfs link files.
58912 </summary>
58913 @@ -85286,7 +85516,7 @@ Domain allowed access.
58914 </summary>
58915 </param>
58916 </interface>
58917 -<interface name="fs_relabelfrom_tmpfs_sockets" lineno="5129">
58918 +<interface name="fs_relabelfrom_tmpfs_sockets" lineno="5244">
58919 <summary>
58920 Relabelfrom socket files on tmpfs filesystems.
58921 </summary>
58922 @@ -85296,7 +85526,7 @@ Domain allowed access.
58923 </summary>
58924 </param>
58925 </interface>
58926 -<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="5147">
58927 +<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="5262">
58928 <summary>
58929 Relabelfrom tmpfs link files.
58930 </summary>
58931 @@ -85306,7 +85536,7 @@ Domain allowed access.
58932 </summary>
58933 </param>
58934 </interface>
58935 -<interface name="fs_rw_tmpfs_chr_files" lineno="5165">
58936 +<interface name="fs_rw_tmpfs_chr_files" lineno="5280">
58937 <summary>
58938 Read and write character nodes on tmpfs filesystems.
58939 </summary>
58940 @@ -85316,7 +85546,7 @@ Domain allowed access.
58941 </summary>
58942 </param>
58943 </interface>
58944 -<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5184">
58945 +<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5299">
58946 <summary>
58947 dontaudit Read and write character nodes on tmpfs filesystems.
58948 </summary>
58949 @@ -85326,7 +85556,7 @@ Domain to not audit.
58950 </summary>
58951 </param>
58952 </interface>
58953 -<interface name="fs_relabel_tmpfs_chr_files" lineno="5203">
58954 +<interface name="fs_relabel_tmpfs_chr_files" lineno="5318">
58955 <summary>
58956 Relabel character nodes on tmpfs filesystems.
58957 </summary>
58958 @@ -85336,7 +85566,7 @@ Domain allowed access.
58959 </summary>
58960 </param>
58961 </interface>
58962 -<interface name="fs_relabel_tmpfs_chr_file" lineno="5222">
58963 +<interface name="fs_relabel_tmpfs_chr_file" lineno="5337">
58964 <summary>
58965 Relabel character nodes on tmpfs filesystems.
58966 </summary>
58967 @@ -85346,7 +85576,7 @@ Domain allowed access.
58968 </summary>
58969 </param>
58970 </interface>
58971 -<interface name="fs_rw_tmpfs_blk_files" lineno="5237">
58972 +<interface name="fs_rw_tmpfs_blk_files" lineno="5352">
58973 <summary>
58974 Read and write block nodes on tmpfs filesystems.
58975 </summary>
58976 @@ -85356,7 +85586,7 @@ Domain allowed access.
58977 </summary>
58978 </param>
58979 </interface>
58980 -<interface name="fs_relabel_tmpfs_blk_files" lineno="5256">
58981 +<interface name="fs_relabel_tmpfs_blk_files" lineno="5371">
58982 <summary>
58983 Relabel block nodes on tmpfs filesystems.
58984 </summary>
58985 @@ -85366,7 +85596,7 @@ Domain allowed access.
58986 </summary>
58987 </param>
58988 </interface>
58989 -<interface name="fs_relabel_tmpfs_blk_file" lineno="5275">
58990 +<interface name="fs_relabel_tmpfs_blk_file" lineno="5390">
58991 <summary>
58992 Relabel block nodes on tmpfs filesystems.
58993 </summary>
58994 @@ -85376,7 +85606,7 @@ Domain allowed access.
58995 </summary>
58996 </param>
58997 </interface>
58998 -<interface name="fs_relabel_tmpfs_fifo_files" lineno="5290">
58999 +<interface name="fs_relabel_tmpfs_fifo_files" lineno="5405">
59000 <summary>
59001 Relabel named pipes on tmpfs filesystems.
59002 </summary>
59003 @@ -85386,7 +85616,7 @@ Domain allowed access.
59004 </summary>
59005 </param>
59006 </interface>
59007 -<interface name="fs_manage_tmpfs_files" lineno="5310">
59008 +<interface name="fs_manage_tmpfs_files" lineno="5425">
59009 <summary>
59010 Read and write, create and delete generic
59011 files on tmpfs filesystems.
59012 @@ -85397,7 +85627,7 @@ Domain allowed access.
59013 </summary>
59014 </param>
59015 </interface>
59016 -<interface name="fs_manage_tmpfs_symlinks" lineno="5329">
59017 +<interface name="fs_manage_tmpfs_symlinks" lineno="5444">
59018 <summary>
59019 Read and write, create and delete symbolic
59020 links on tmpfs filesystems.
59021 @@ -85408,7 +85638,7 @@ Domain allowed access.
59022 </summary>
59023 </param>
59024 </interface>
59025 -<interface name="fs_manage_tmpfs_sockets" lineno="5348">
59026 +<interface name="fs_manage_tmpfs_sockets" lineno="5463">
59027 <summary>
59028 Read and write, create and delete socket
59029 files on tmpfs filesystems.
59030 @@ -85419,7 +85649,7 @@ Domain allowed access.
59031 </summary>
59032 </param>
59033 </interface>
59034 -<interface name="fs_manage_tmpfs_chr_files" lineno="5367">
59035 +<interface name="fs_manage_tmpfs_chr_files" lineno="5482">
59036 <summary>
59037 Read and write, create and delete character
59038 nodes on tmpfs filesystems.
59039 @@ -85430,7 +85660,7 @@ Domain allowed access.
59040 </summary>
59041 </param>
59042 </interface>
59043 -<interface name="fs_manage_tmpfs_blk_files" lineno="5386">
59044 +<interface name="fs_manage_tmpfs_blk_files" lineno="5501">
59045 <summary>
59046 Read and write, create and delete block nodes
59047 on tmpfs filesystems.
59048 @@ -85441,7 +85671,7 @@ Domain allowed access.
59049 </summary>
59050 </param>
59051 </interface>
59052 -<interface name="fs_getattr_tracefs" lineno="5404">
59053 +<interface name="fs_getattr_tracefs" lineno="5519">
59054 <summary>
59055 Get the attributes of a trace filesystem.
59056 </summary>
59057 @@ -85451,7 +85681,7 @@ Domain allowed access.
59058 </summary>
59059 </param>
59060 </interface>
59061 -<interface name="fs_getattr_tracefs_dirs" lineno="5422">
59062 +<interface name="fs_getattr_tracefs_dirs" lineno="5537">
59063 <summary>
59064 Get attributes of dirs on tracefs filesystem.
59065 </summary>
59066 @@ -85461,7 +85691,7 @@ Domain allowed access.
59067 </summary>
59068 </param>
59069 </interface>
59070 -<interface name="fs_search_tracefs" lineno="5440">
59071 +<interface name="fs_search_tracefs" lineno="5555">
59072 <summary>
59073 search directories on a tracefs filesystem
59074 </summary>
59075 @@ -85471,7 +85701,7 @@ Domain allowed access.
59076 </summary>
59077 </param>
59078 </interface>
59079 -<interface name="fs_getattr_tracefs_files" lineno="5459">
59080 +<interface name="fs_getattr_tracefs_files" lineno="5574">
59081 <summary>
59082 Get the attributes of files
59083 on a trace filesystem.
59084 @@ -85482,7 +85712,7 @@ Domain allowed access.
59085 </summary>
59086 </param>
59087 </interface>
59088 -<interface name="fs_mount_xenfs" lineno="5477">
59089 +<interface name="fs_mount_xenfs" lineno="5592">
59090 <summary>
59091 Mount a XENFS filesystem.
59092 </summary>
59093 @@ -85492,7 +85722,7 @@ Domain allowed access.
59094 </summary>
59095 </param>
59096 </interface>
59097 -<interface name="fs_search_xenfs" lineno="5495">
59098 +<interface name="fs_search_xenfs" lineno="5610">
59099 <summary>
59100 Search the XENFS filesystem.
59101 </summary>
59102 @@ -85502,7 +85732,7 @@ Domain allowed access.
59103 </summary>
59104 </param>
59105 </interface>
59106 -<interface name="fs_manage_xenfs_dirs" lineno="5515">
59107 +<interface name="fs_manage_xenfs_dirs" lineno="5630">
59108 <summary>
59109 Create, read, write, and delete directories
59110 on a XENFS filesystem.
59111 @@ -85514,7 +85744,7 @@ Domain allowed access.
59112 </param>
59113 <rolecap/>
59114 </interface>
59115 -<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5535">
59116 +<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5650">
59117 <summary>
59118 Do not audit attempts to create, read,
59119 write, and delete directories
59120 @@ -85526,7 +85756,7 @@ Domain to not audit.
59121 </summary>
59122 </param>
59123 </interface>
59124 -<interface name="fs_manage_xenfs_files" lineno="5555">
59125 +<interface name="fs_manage_xenfs_files" lineno="5670">
59126 <summary>
59127 Create, read, write, and delete files
59128 on a XENFS filesystem.
59129 @@ -85538,7 +85768,7 @@ Domain allowed access.
59130 </param>
59131 <rolecap/>
59132 </interface>
59133 -<interface name="fs_mmap_xenfs_files" lineno="5573">
59134 +<interface name="fs_mmap_xenfs_files" lineno="5688">
59135 <summary>
59136 Map files a XENFS filesystem.
59137 </summary>
59138 @@ -85548,7 +85778,7 @@ Domain allowed access.
59139 </summary>
59140 </param>
59141 </interface>
59142 -<interface name="fs_dontaudit_manage_xenfs_files" lineno="5593">
59143 +<interface name="fs_dontaudit_manage_xenfs_files" lineno="5708">
59144 <summary>
59145 Do not audit attempts to create,
59146 read, write, and delete files
59147 @@ -85560,7 +85790,7 @@ Domain to not audit.
59148 </summary>
59149 </param>
59150 </interface>
59151 -<interface name="fs_mount_all_fs" lineno="5611">
59152 +<interface name="fs_mount_all_fs" lineno="5726">
59153 <summary>
59154 Mount all filesystems.
59155 </summary>
59156 @@ -85570,7 +85800,7 @@ Domain allowed access.
59157 </summary>
59158 </param>
59159 </interface>
59160 -<interface name="fs_remount_all_fs" lineno="5630">
59161 +<interface name="fs_remount_all_fs" lineno="5745">
59162 <summary>
59163 Remount all filesystems. This
59164 allows some mount options to be changed.
59165 @@ -85581,7 +85811,7 @@ Domain allowed access.
59166 </summary>
59167 </param>
59168 </interface>
59169 -<interface name="fs_unmount_all_fs" lineno="5648">
59170 +<interface name="fs_unmount_all_fs" lineno="5763">
59171 <summary>
59172 Unmount all filesystems.
59173 </summary>
59174 @@ -85591,7 +85821,7 @@ Domain allowed access.
59175 </summary>
59176 </param>
59177 </interface>
59178 -<interface name="fs_getattr_all_fs" lineno="5680">
59179 +<interface name="fs_getattr_all_fs" lineno="5795">
59180 <summary>
59181 Get the attributes of all filesystems.
59182 </summary>
59183 @@ -85615,7 +85845,7 @@ Domain allowed access.
59184 <infoflow type="read" weight="5"/>
59185 <rolecap/>
59186 </interface>
59187 -<interface name="fs_dontaudit_getattr_all_fs" lineno="5700">
59188 +<interface name="fs_dontaudit_getattr_all_fs" lineno="5815">
59189 <summary>
59190 Do not audit attempts to get the attributes
59191 all filesystems.
59192 @@ -85626,7 +85856,7 @@ Domain to not audit.
59193 </summary>
59194 </param>
59195 </interface>
59196 -<interface name="fs_get_all_fs_quotas" lineno="5719">
59197 +<interface name="fs_get_all_fs_quotas" lineno="5834">
59198 <summary>
59199 Get the quotas of all filesystems.
59200 </summary>
59201 @@ -85637,7 +85867,7 @@ Domain allowed access.
59202 </param>
59203 <rolecap/>
59204 </interface>
59205 -<interface name="fs_set_all_quotas" lineno="5738">
59206 +<interface name="fs_set_all_quotas" lineno="5853">
59207 <summary>
59208 Set the quotas of all filesystems.
59209 </summary>
59210 @@ -85648,7 +85878,7 @@ Domain allowed access.
59211 </param>
59212 <rolecap/>
59213 </interface>
59214 -<interface name="fs_relabelfrom_all_fs" lineno="5756">
59215 +<interface name="fs_relabelfrom_all_fs" lineno="5871">
59216 <summary>
59217 Relabelfrom all filesystems.
59218 </summary>
59219 @@ -85658,7 +85888,7 @@ Domain allowed access.
59220 </summary>
59221 </param>
59222 </interface>
59223 -<interface name="fs_getattr_all_dirs" lineno="5775">
59224 +<interface name="fs_getattr_all_dirs" lineno="5890">
59225 <summary>
59226 Get the attributes of all directories
59227 with a filesystem type.
59228 @@ -85669,7 +85899,7 @@ Domain allowed access.
59229 </summary>
59230 </param>
59231 </interface>
59232 -<interface name="fs_search_all" lineno="5793">
59233 +<interface name="fs_search_all" lineno="5908">
59234 <summary>
59235 Search all directories with a filesystem type.
59236 </summary>
59237 @@ -85679,7 +85909,7 @@ Domain allowed access.
59238 </summary>
59239 </param>
59240 </interface>
59241 -<interface name="fs_list_all" lineno="5811">
59242 +<interface name="fs_list_all" lineno="5926">
59243 <summary>
59244 List all directories with a filesystem type.
59245 </summary>
59246 @@ -85689,7 +85919,7 @@ Domain allowed access.
59247 </summary>
59248 </param>
59249 </interface>
59250 -<interface name="fs_getattr_all_files" lineno="5830">
59251 +<interface name="fs_getattr_all_files" lineno="5945">
59252 <summary>
59253 Get the attributes of all files with
59254 a filesystem type.
59255 @@ -85700,7 +85930,7 @@ Domain allowed access.
59256 </summary>
59257 </param>
59258 </interface>
59259 -<interface name="fs_dontaudit_getattr_all_files" lineno="5849">
59260 +<interface name="fs_dontaudit_getattr_all_files" lineno="5964">
59261 <summary>
59262 Do not audit attempts to get the attributes
59263 of all files with a filesystem type.
59264 @@ -85711,7 +85941,7 @@ Domain to not audit.
59265 </summary>
59266 </param>
59267 </interface>
59268 -<interface name="fs_getattr_all_symlinks" lineno="5868">
59269 +<interface name="fs_getattr_all_symlinks" lineno="5983">
59270 <summary>
59271 Get the attributes of all symbolic links with
59272 a filesystem type.
59273 @@ -85722,7 +85952,7 @@ Domain allowed access.
59274 </summary>
59275 </param>
59276 </interface>
59277 -<interface name="fs_dontaudit_getattr_all_symlinks" lineno="5887">
59278 +<interface name="fs_dontaudit_getattr_all_symlinks" lineno="6002">
59279 <summary>
59280 Do not audit attempts to get the attributes
59281 of all symbolic links with a filesystem type.
59282 @@ -85733,7 +85963,7 @@ Domain to not audit.
59283 </summary>
59284 </param>
59285 </interface>
59286 -<interface name="fs_getattr_all_pipes" lineno="5906">
59287 +<interface name="fs_getattr_all_pipes" lineno="6021">
59288 <summary>
59289 Get the attributes of all named pipes with
59290 a filesystem type.
59291 @@ -85744,7 +85974,7 @@ Domain allowed access.
59292 </summary>
59293 </param>
59294 </interface>
59295 -<interface name="fs_dontaudit_getattr_all_pipes" lineno="5925">
59296 +<interface name="fs_dontaudit_getattr_all_pipes" lineno="6040">
59297 <summary>
59298 Do not audit attempts to get the attributes
59299 of all named pipes with a filesystem type.
59300 @@ -85755,7 +85985,7 @@ Domain to not audit.
59301 </summary>
59302 </param>
59303 </interface>
59304 -<interface name="fs_getattr_all_sockets" lineno="5944">
59305 +<interface name="fs_getattr_all_sockets" lineno="6059">
59306 <summary>
59307 Get the attributes of all named sockets with
59308 a filesystem type.
59309 @@ -85766,7 +85996,7 @@ Domain allowed access.
59310 </summary>
59311 </param>
59312 </interface>
59313 -<interface name="fs_dontaudit_getattr_all_sockets" lineno="5963">
59314 +<interface name="fs_dontaudit_getattr_all_sockets" lineno="6078">
59315 <summary>
59316 Do not audit attempts to get the attributes
59317 of all named sockets with a filesystem type.
59318 @@ -85777,7 +86007,7 @@ Domain to not audit.
59319 </summary>
59320 </param>
59321 </interface>
59322 -<interface name="fs_getattr_all_blk_files" lineno="5982">
59323 +<interface name="fs_getattr_all_blk_files" lineno="6097">
59324 <summary>
59325 Get the attributes of all block device nodes with
59326 a filesystem type.
59327 @@ -85788,7 +86018,7 @@ Domain allowed access.
59328 </summary>
59329 </param>
59330 </interface>
59331 -<interface name="fs_getattr_all_chr_files" lineno="6001">
59332 +<interface name="fs_getattr_all_chr_files" lineno="6116">
59333 <summary>
59334 Get the attributes of all character device nodes with
59335 a filesystem type.
59336 @@ -85799,7 +86029,7 @@ Domain allowed access.
59337 </summary>
59338 </param>
59339 </interface>
59340 -<interface name="fs_unconfined" lineno="6019">
59341 +<interface name="fs_unconfined" lineno="6134">
59342 <summary>
59343 Unconfined access to filesystems
59344 </summary>
59345 @@ -90282,7 +90512,27 @@ Domain to not audit.
59346 </summary>
59347 </param>
59348 </interface>
59349 -<interface name="term_getattr_all_ttys" lineno="1298">
59350 +<interface name="term_watch_unallocated_ttys" lineno="1297">
59351 +<summary>
59352 +Watch unallocated ttys.
59353 +</summary>
59354 +<param name="domain">
59355 +<summary>
59356 +Domain allowed access.
59357 +</summary>
59358 +</param>
59359 +</interface>
59360 +<interface name="term_watch_reads_unallocated_ttys" lineno="1316">
59361 +<summary>
59362 +Watch reads on unallocated ttys.
59363 +</summary>
59364 +<param name="domain">
59365 +<summary>
59366 +Domain allowed access.
59367 +</summary>
59368 +</param>
59369 +</interface>
59370 +<interface name="term_getattr_all_ttys" lineno="1336">
59371 <summary>
59372 Get the attributes of all tty device nodes.
59373 </summary>
59374 @@ -90293,7 +90543,7 @@ Domain allowed access.
59375 </param>
59376 <rolecap/>
59377 </interface>
59378 -<interface name="term_dontaudit_getattr_all_ttys" lineno="1318">
59379 +<interface name="term_dontaudit_getattr_all_ttys" lineno="1356">
59380 <summary>
59381 Do not audit attempts to get the
59382 attributes of any tty device nodes.
59383 @@ -90304,7 +90554,7 @@ Domain to not audit.
59384 </summary>
59385 </param>
59386 </interface>
59387 -<interface name="term_setattr_all_ttys" lineno="1338">
59388 +<interface name="term_setattr_all_ttys" lineno="1376">
59389 <summary>
59390 Set the attributes of all tty device nodes.
59391 </summary>
59392 @@ -90315,7 +90565,7 @@ Domain allowed access.
59393 </param>
59394 <rolecap/>
59395 </interface>
59396 -<interface name="term_relabel_all_ttys" lineno="1357">
59397 +<interface name="term_relabel_all_ttys" lineno="1395">
59398 <summary>
59399 Relabel from and to all tty device nodes.
59400 </summary>
59401 @@ -90325,7 +90575,7 @@ Domain allowed access.
59402 </summary>
59403 </param>
59404 </interface>
59405 -<interface name="term_write_all_ttys" lineno="1376">
59406 +<interface name="term_write_all_ttys" lineno="1414">
59407 <summary>
59408 Write to all ttys.
59409 </summary>
59410 @@ -90335,7 +90585,7 @@ Domain allowed access.
59411 </summary>
59412 </param>
59413 </interface>
59414 -<interface name="term_use_all_ttys" lineno="1396">
59415 +<interface name="term_use_all_ttys" lineno="1434">
59416 <summary>
59417 Read and write all ttys.
59418 </summary>
59419 @@ -90346,7 +90596,7 @@ Domain allowed access.
59420 </param>
59421 <rolecap/>
59422 </interface>
59423 -<interface name="term_dontaudit_use_all_ttys" lineno="1416">
59424 +<interface name="term_dontaudit_use_all_ttys" lineno="1454">
59425 <summary>
59426 Do not audit attempts to read or write
59427 any ttys.
59428 @@ -90357,7 +90607,7 @@ Domain to not audit.
59429 </summary>
59430 </param>
59431 </interface>
59432 -<interface name="term_use_virtio_console" lineno="1434">
59433 +<interface name="term_use_virtio_console" lineno="1472">
59434 <summary>
59435 Read from and write virtio console.
59436 </summary>
59437 @@ -91756,7 +92006,17 @@ Domain allowed to transition.
59438 </summary>
59439 </param>
59440 </interface>
59441 -<interface name="apache_initrc_domtrans" lineno="249">
59442 +<interface name="apache_exec" lineno="249">
59443 +<summary>
59444 +Execute httpd
59445 +</summary>
59446 +<param name="domain">
59447 +<summary>
59448 +Domain allowed to execute it.
59449 +</summary>
59450 +</param>
59451 +</interface>
59452 +<interface name="apache_initrc_domtrans" lineno="267">
59453 <summary>
59454 Execute httpd server in the httpd domain.
59455 </summary>
59456 @@ -91766,7 +92026,7 @@ Domain allowed to transition.
59457 </summary>
59458 </param>
59459 </interface>
59460 -<interface name="apache_signal" lineno="267">
59461 +<interface name="apache_signal" lineno="285">
59462 <summary>
59463 Send generic signals to httpd.
59464 </summary>
59465 @@ -91776,7 +92036,7 @@ Domain allowed access.
59466 </summary>
59467 </param>
59468 </interface>
59469 -<interface name="apache_signull" lineno="285">
59470 +<interface name="apache_signull" lineno="303">
59471 <summary>
59472 Send null signals to httpd.
59473 </summary>
59474 @@ -91786,7 +92046,7 @@ Domain allowed access.
59475 </summary>
59476 </param>
59477 </interface>
59478 -<interface name="apache_sigchld" lineno="303">
59479 +<interface name="apache_sigchld" lineno="321">
59480 <summary>
59481 Send child terminated signals to httpd.
59482 </summary>
59483 @@ -91796,7 +92056,7 @@ Domain allowed access.
59484 </summary>
59485 </param>
59486 </interface>
59487 -<interface name="apache_use_fds" lineno="322">
59488 +<interface name="apache_use_fds" lineno="340">
59489 <summary>
59490 Inherit and use file descriptors
59491 from httpd.
59492 @@ -91807,7 +92067,7 @@ Domain allowed access.
59493 </summary>
59494 </param>
59495 </interface>
59496 -<interface name="apache_dontaudit_rw_fifo_file" lineno="341">
59497 +<interface name="apache_dontaudit_rw_fifo_file" lineno="359">
59498 <summary>
59499 Do not audit attempts to read and
59500 write httpd unnamed pipes.
59501 @@ -91818,7 +92078,7 @@ Domain to not audit.
59502 </summary>
59503 </param>
59504 </interface>
59505 -<interface name="apache_dontaudit_rw_stream_sockets" lineno="360">
59506 +<interface name="apache_dontaudit_rw_stream_sockets" lineno="378">
59507 <summary>
59508 Do not audit attempts to read and
59509 write httpd unix domain stream sockets.
59510 @@ -91829,7 +92089,7 @@ Domain to not audit.
59511 </summary>
59512 </param>
59513 </interface>
59514 -<interface name="apache_rw_stream_sockets" lineno="379">
59515 +<interface name="apache_rw_stream_sockets" lineno="397">
59516 <summary>
59517 Read and write httpd unix domain
59518 stream sockets.
59519 @@ -91840,7 +92100,7 @@ Domain allowed access.
59520 </summary>
59521 </param>
59522 </interface>
59523 -<interface name="apache_dontaudit_rw_tcp_sockets" lineno="398">
59524 +<interface name="apache_dontaudit_rw_tcp_sockets" lineno="416">
59525 <summary>
59526 Do not audit attempts to read and
59527 write httpd TCP sockets.
59528 @@ -91851,7 +92111,7 @@ Domain to not audit.
59529 </summary>
59530 </param>
59531 </interface>
59532 -<interface name="apache_reload" lineno="416">
59533 +<interface name="apache_reload" lineno="434">
59534 <summary>
59535 Reload the httpd service (systemd).
59536 </summary>
59537 @@ -91861,7 +92121,7 @@ Domain allowed access.
59538 </summary>
59539 </param>
59540 </interface>
59541 -<interface name="apache_read_all_ra_content" lineno="435">
59542 +<interface name="apache_read_all_ra_content" lineno="453">
59543 <summary>
59544 Read all appendable content
59545 </summary>
59546 @@ -91871,7 +92131,7 @@ Domain allowed access.
59547 </summary>
59548 </param>
59549 </interface>
59550 -<interface name="apache_append_all_ra_content" lineno="454">
59551 +<interface name="apache_append_all_ra_content" lineno="472">
59552 <summary>
59553 Append to all appendable web content
59554 </summary>
59555 @@ -91881,7 +92141,7 @@ Domain allowed access.
59556 </summary>
59557 </param>
59558 </interface>
59559 -<interface name="apache_read_all_rw_content" lineno="472">
59560 +<interface name="apache_read_all_rw_content" lineno="490">
59561 <summary>
59562 Read all read/write content
59563 </summary>
59564 @@ -91891,7 +92151,7 @@ Domain allowed access.
59565 </summary>
59566 </param>
59567 </interface>
59568 -<interface name="apache_manage_all_rw_content" lineno="491">
59569 +<interface name="apache_manage_all_rw_content" lineno="509">
59570 <summary>
59571 Manage all read/write content
59572 </summary>
59573 @@ -91901,7 +92161,7 @@ Domain allowed access.
59574 </summary>
59575 </param>
59576 </interface>
59577 -<interface name="apache_read_all_content" lineno="510">
59578 +<interface name="apache_read_all_content" lineno="528">
59579 <summary>
59580 Read all web content.
59581 </summary>
59582 @@ -91911,7 +92171,7 @@ Domain allowed access.
59583 </summary>
59584 </param>
59585 </interface>
59586 -<interface name="apache_search_all_content" lineno="532">
59587 +<interface name="apache_search_all_content" lineno="550">
59588 <summary>
59589 Search all apache content.
59590 </summary>
59591 @@ -91921,7 +92181,7 @@ Domain allowed access.
59592 </summary>
59593 </param>
59594 </interface>
59595 -<interface name="apache_list_all_content" lineno="550">
59596 +<interface name="apache_list_all_content" lineno="568">
59597 <summary>
59598 List all apache content.
59599 </summary>
59600 @@ -91931,7 +92191,7 @@ Domain allowed access.
59601 </summary>
59602 </param>
59603 </interface>
59604 -<interface name="apache_manage_all_content" lineno="570">
59605 +<interface name="apache_manage_all_content" lineno="588">
59606 <summary>
59607 Create, read, write, and delete
59608 all httpd content.
59609 @@ -91943,7 +92203,7 @@ Domain allowed access.
59610 </param>
59611 <rolecap/>
59612 </interface>
59613 -<interface name="apache_setattr_cache_dirs" lineno="594">
59614 +<interface name="apache_setattr_cache_dirs" lineno="612">
59615 <summary>
59616 Set attributes httpd cache directories.
59617 </summary>
59618 @@ -91953,7 +92213,7 @@ Domain allowed access.
59619 </summary>
59620 </param>
59621 </interface>
59622 -<interface name="apache_list_cache" lineno="612">
59623 +<interface name="apache_list_cache" lineno="630">
59624 <summary>
59625 List httpd cache directories.
59626 </summary>
59627 @@ -91963,7 +92223,7 @@ Domain allowed access.
59628 </summary>
59629 </param>
59630 </interface>
59631 -<interface name="apache_rw_cache_files" lineno="630">
59632 +<interface name="apache_rw_cache_files" lineno="648">
59633 <summary>
59634 Read and write httpd cache files.
59635 </summary>
59636 @@ -91973,7 +92233,7 @@ Domain allowed access.
59637 </summary>
59638 </param>
59639 </interface>
59640 -<interface name="apache_delete_cache_dirs" lineno="648">
59641 +<interface name="apache_delete_cache_dirs" lineno="666">
59642 <summary>
59643 Delete httpd cache directories.
59644 </summary>
59645 @@ -91983,7 +92243,7 @@ Domain allowed access.
59646 </summary>
59647 </param>
59648 </interface>
59649 -<interface name="apache_delete_cache_files" lineno="666">
59650 +<interface name="apache_delete_cache_files" lineno="684">
59651 <summary>
59652 Delete httpd cache files.
59653 </summary>
59654 @@ -91993,7 +92253,7 @@ Domain allowed access.
59655 </summary>
59656 </param>
59657 </interface>
59658 -<interface name="apache_read_config" lineno="685">
59659 +<interface name="apache_read_config" lineno="703">
59660 <summary>
59661 Read httpd configuration files.
59662 </summary>
59663 @@ -92004,7 +92264,7 @@ Domain allowed access.
59664 </param>
59665 <rolecap/>
59666 </interface>
59667 -<interface name="apache_search_config" lineno="706">
59668 +<interface name="apache_search_config" lineno="724">
59669 <summary>
59670 Search httpd configuration directories.
59671 </summary>
59672 @@ -92014,7 +92274,7 @@ Domain allowed access.
59673 </summary>
59674 </param>
59675 </interface>
59676 -<interface name="apache_manage_config" lineno="726">
59677 +<interface name="apache_manage_config" lineno="744">
59678 <summary>
59679 Create, read, write, and delete
59680 httpd configuration files.
59681 @@ -92025,7 +92285,7 @@ Domain allowed access.
59682 </summary>
59683 </param>
59684 </interface>
59685 -<interface name="apache_domtrans_helper" lineno="748">
59686 +<interface name="apache_domtrans_helper" lineno="766">
59687 <summary>
59688 Execute the Apache helper program
59689 with a domain transition.
59690 @@ -92036,7 +92296,7 @@ Domain allowed access.
59691 </summary>
59692 </param>
59693 </interface>
59694 -<interface name="apache_run_helper" lineno="775">
59695 +<interface name="apache_run_helper" lineno="793">
59696 <summary>
59697 Execute the Apache helper program with
59698 a domain transition, and allow the
59699 @@ -92054,7 +92314,7 @@ Role allowed access.
59700 </param>
59701 <rolecap/>
59702 </interface>
59703 -<interface name="apache_read_log" lineno="795">
59704 +<interface name="apache_read_log" lineno="813">
59705 <summary>
59706 Read httpd log files.
59707 </summary>
59708 @@ -92065,7 +92325,7 @@ Domain allowed access.
59709 </param>
59710 <rolecap/>
59711 </interface>
59712 -<interface name="apache_append_log" lineno="816">
59713 +<interface name="apache_append_log" lineno="834">
59714 <summary>
59715 Append httpd log files.
59716 </summary>
59717 @@ -92075,7 +92335,7 @@ Domain allowed access.
59718 </summary>
59719 </param>
59720 </interface>
59721 -<interface name="apache_dontaudit_append_log" lineno="837">
59722 +<interface name="apache_dontaudit_append_log" lineno="855">
59723 <summary>
59724 Do not audit attempts to append
59725 httpd log files.
59726 @@ -92086,7 +92346,7 @@ Domain to not audit.
59727 </summary>
59728 </param>
59729 </interface>
59730 -<interface name="apache_manage_log" lineno="856">
59731 +<interface name="apache_manage_log" lineno="874">
59732 <summary>
59733 Create, read, write, and delete
59734 httpd log files.
59735 @@ -92097,7 +92357,7 @@ Domain allowed access.
59736 </summary>
59737 </param>
59738 </interface>
59739 -<interface name="apache_write_log" lineno="877">
59740 +<interface name="apache_write_log" lineno="895">
59741 <summary>
59742 Write apache log files.
59743 </summary>
59744 @@ -92107,7 +92367,7 @@ Domain allowed access.
59745 </summary>
59746 </param>
59747 </interface>
59748 -<interface name="apache_dontaudit_search_modules" lineno="897">
59749 +<interface name="apache_dontaudit_search_modules" lineno="915">
59750 <summary>
59751 Do not audit attempts to search
59752 httpd module directories.
59753 @@ -92118,7 +92378,7 @@ Domain to not audit.
59754 </summary>
59755 </param>
59756 </interface>
59757 -<interface name="apache_list_modules" lineno="915">
59758 +<interface name="apache_list_modules" lineno="933">
59759 <summary>
59760 List httpd module directories.
59761 </summary>
59762 @@ -92128,7 +92388,7 @@ Domain allowed access.
59763 </summary>
59764 </param>
59765 </interface>
59766 -<interface name="apache_exec_modules" lineno="933">
59767 +<interface name="apache_exec_modules" lineno="951">
59768 <summary>
59769 Execute httpd module files.
59770 </summary>
59771 @@ -92138,7 +92398,7 @@ Domain allowed access.
59772 </summary>
59773 </param>
59774 </interface>
59775 -<interface name="apache_read_module_files" lineno="953">
59776 +<interface name="apache_read_module_files" lineno="971">
59777 <summary>
59778 Read httpd module files.
59779 </summary>
59780 @@ -92148,7 +92408,7 @@ Domain allowed access.
59781 </summary>
59782 </param>
59783 </interface>
59784 -<interface name="apache_domtrans_rotatelogs" lineno="973">
59785 +<interface name="apache_domtrans_rotatelogs" lineno="991">
59786 <summary>
59787 Execute a domain transition to
59788 run httpd_rotatelogs.
59789 @@ -92159,7 +92419,7 @@ Domain allowed to transition.
59790 </summary>
59791 </param>
59792 </interface>
59793 -<interface name="apache_list_sys_content" lineno="992">
59794 +<interface name="apache_list_sys_content" lineno="1010">
59795 <summary>
59796 List httpd system content directories.
59797 </summary>
59798 @@ -92169,7 +92429,7 @@ Domain allowed access.
59799 </summary>
59800 </param>
59801 </interface>
59802 -<interface name="apache_manage_sys_content" lineno="1013">
59803 +<interface name="apache_manage_sys_content" lineno="1031">
59804 <summary>
59805 Create, read, write, and delete
59806 httpd system content files.
59807 @@ -92181,7 +92441,7 @@ Domain allowed access.
59808 </param>
59809 <rolecap/>
59810 </interface>
59811 -<interface name="apache_manage_sys_rw_content" lineno="1035">
59812 +<interface name="apache_manage_sys_rw_content" lineno="1053">
59813 <summary>
59814 Create, read, write, and delete
59815 httpd system rw content.
59816 @@ -92192,7 +92452,7 @@ Domain allowed access.
59817 </summary>
59818 </param>
59819 </interface>
59820 -<interface name="apache_domtrans_sys_script" lineno="1057">
59821 +<interface name="apache_domtrans_sys_script" lineno="1075">
59822 <summary>
59823 Execute all httpd scripts in the
59824 system script domain.
59825 @@ -92203,7 +92463,7 @@ Domain allowed to transition.
59826 </summary>
59827 </param>
59828 </interface>
59829 -<interface name="apache_dontaudit_rw_sys_script_stream_sockets" lineno="1080">
59830 +<interface name="apache_dontaudit_rw_sys_script_stream_sockets" lineno="1098">
59831 <summary>
59832 Do not audit attempts to read and
59833 write httpd system script unix
59834 @@ -92215,7 +92475,7 @@ Domain to not audit.
59835 </summary>
59836 </param>
59837 </interface>
59838 -<interface name="apache_domtrans_all_scripts" lineno="1099">
59839 +<interface name="apache_domtrans_all_scripts" lineno="1117">
59840 <summary>
59841 Execute all user scripts in the user
59842 script domain.
59843 @@ -92226,7 +92486,7 @@ Domain allowed to transition.
59844 </summary>
59845 </param>
59846 </interface>
59847 -<interface name="apache_run_all_scripts" lineno="1124">
59848 +<interface name="apache_run_all_scripts" lineno="1142">
59849 <summary>
59850 Execute all user scripts in the user
59851 script domain. Add user script domains
59852 @@ -92243,7 +92503,7 @@ Role allowed access.
59853 </summary>
59854 </param>
59855 </interface>
59856 -<interface name="apache_read_squirrelmail_data" lineno="1143">
59857 +<interface name="apache_read_squirrelmail_data" lineno="1161">
59858 <summary>
59859 Read httpd squirrelmail data files.
59860 </summary>
59861 @@ -92253,7 +92513,7 @@ Domain allowed access.
59862 </summary>
59863 </param>
59864 </interface>
59865 -<interface name="apache_append_squirrelmail_data" lineno="1161">
59866 +<interface name="apache_append_squirrelmail_data" lineno="1179">
59867 <summary>
59868 Append httpd squirrelmail data files.
59869 </summary>
59870 @@ -92263,7 +92523,7 @@ Domain allowed access.
59871 </summary>
59872 </param>
59873 </interface>
59874 -<interface name="apache_delete_squirrelmail_spool" lineno="1179">
59875 +<interface name="apache_delete_squirrelmail_spool" lineno="1197">
59876 <summary>
59877 delete httpd squirrelmail spool files.
59878 </summary>
59879 @@ -92273,7 +92533,7 @@ Domain allowed access.
59880 </summary>
59881 </param>
59882 </interface>
59883 -<interface name="apache_search_sys_content" lineno="1197">
59884 +<interface name="apache_search_sys_content" lineno="1215">
59885 <summary>
59886 Search httpd system content.
59887 </summary>
59888 @@ -92283,7 +92543,7 @@ Domain allowed access.
59889 </summary>
59890 </param>
59891 </interface>
59892 -<interface name="apache_read_sys_content" lineno="1216">
59893 +<interface name="apache_read_sys_content" lineno="1234">
59894 <summary>
59895 Read httpd system content.
59896 </summary>
59897 @@ -92293,7 +92553,7 @@ Domain allowed access.
59898 </summary>
59899 </param>
59900 </interface>
59901 -<interface name="apache_search_sys_scripts" lineno="1236">
59902 +<interface name="apache_search_sys_scripts" lineno="1254">
59903 <summary>
59904 Search httpd system CGI directories.
59905 </summary>
59906 @@ -92303,7 +92563,7 @@ Domain allowed access.
59907 </summary>
59908 </param>
59909 </interface>
59910 -<interface name="apache_manage_all_user_content" lineno="1256">
59911 +<interface name="apache_manage_all_user_content" lineno="1274">
59912 <summary>
59913 Create, read, write, and delete all
59914 user httpd content.
59915 @@ -92315,7 +92575,7 @@ Domain allowed access.
59916 </param>
59917 <rolecap/>
59918 </interface>
59919 -<interface name="apache_search_sys_script_state" lineno="1277">
59920 +<interface name="apache_search_sys_script_state" lineno="1295">
59921 <summary>
59922 Search system script state directories.
59923 </summary>
59924 @@ -92325,7 +92585,7 @@ Domain allowed access.
59925 </summary>
59926 </param>
59927 </interface>
59928 -<interface name="apache_read_tmp_files" lineno="1295">
59929 +<interface name="apache_read_tmp_files" lineno="1313">
59930 <summary>
59931 Read httpd tmp files.
59932 </summary>
59933 @@ -92335,7 +92595,7 @@ Domain allowed access.
59934 </summary>
59935 </param>
59936 </interface>
59937 -<interface name="apache_dontaudit_write_tmp_files" lineno="1315">
59938 +<interface name="apache_dontaudit_write_tmp_files" lineno="1333">
59939 <summary>
59940 Do not audit attempts to write
59941 httpd tmp files.
59942 @@ -92346,7 +92606,7 @@ Domain to not audit.
59943 </summary>
59944 </param>
59945 </interface>
59946 -<interface name="apache_delete_lib_files" lineno="1333">
59947 +<interface name="apache_delete_lib_files" lineno="1351">
59948 <summary>
59949 Delete httpd_var_lib_t files
59950 </summary>
59951 @@ -92356,7 +92616,7 @@ Domain that can delete the files
59952 </summary>
59953 </param>
59954 </interface>
59955 -<interface name="apache_cgi_domain" lineno="1364">
59956 +<interface name="apache_cgi_domain" lineno="1382">
59957 <summary>
59958 Execute CGI in the specified domain.
59959 </summary>
59960 @@ -92378,7 +92638,7 @@ Type of the executable to enter the cgi domain.
59961 </summary>
59962 </param>
59963 </interface>
59964 -<interface name="apache_admin" lineno="1392">
59965 +<interface name="apache_admin" lineno="1410">
59966 <summary>
59967 All of the rules required to
59968 administrate an apache environment.
59969 @@ -92395,6 +92655,16 @@ Role allowed access.
59970 </param>
59971 <rolecap/>
59972 </interface>
59973 +<interface name="apache_rw_runtime_files" lineno="1462">
59974 +<summary>
59975 +rw httpd_runtime_t files
59976 +</summary>
59977 +<param name="domain">
59978 +<summary>
59979 +Domain allowed access.
59980 +</summary>
59981 +</param>
59982 +</interface>
59983 <tunable name="allow_httpd_anon_write" dftval="false">
59984 <desc>
59985 <p>
59986 @@ -94992,7 +95262,7 @@ Role allowed access.
59987 </summary>
59988 </param>
59989 </template>
59990 -<template name="container_system_role" lineno="187">
59991 +<template name="container_system_role" lineno="175">
59992 <summary>
59993 Role access for system containers.
59994 </summary>
59995 @@ -95018,7 +95288,7 @@ Role allowed access.
59996 </summary>
59997 </param>
59998 </template>
59999 -<template name="container_user_role" lineno="229">
60000 +<template name="container_user_role" lineno="217">
60001 <summary>
60002 Role access for user containers.
60003 </summary>
60004 @@ -95044,7 +95314,33 @@ Role allowed access.
60005 </summary>
60006 </param>
60007 </template>
60008 -<interface name="container_domtrans_generic_engine" lineno="307">
60009 +<template name="container_unconfined_role" lineno="280">
60010 +<summary>
60011 +Unconfined role access for containers.
60012 +</summary>
60013 +<param name="role_prefix">
60014 +<summary>
60015 +The prefix of the user role (e.g., user
60016 +is the prefix for user_r).
60017 +</summary>
60018 +</param>
60019 +<param name="user_domain">
60020 +<summary>
60021 +User domain for the role.
60022 +</summary>
60023 +</param>
60024 +<param name="user_exec_domain">
60025 +<summary>
60026 +User exec domain for execute and transition access.
60027 +</summary>
60028 +</param>
60029 +<param name="role">
60030 +<summary>
60031 +Role allowed access.
60032 +</summary>
60033 +</param>
60034 +</template>
60035 +<interface name="container_domtrans_generic_engine" lineno="319">
60036 <summary>
60037 Execute generic container engines in the
60038 container engine domain.
60039 @@ -95055,7 +95351,7 @@ Domain allowed to transition.
60040 </summary>
60041 </param>
60042 </interface>
60043 -<interface name="container_run_generic_engine" lineno="333">
60044 +<interface name="container_run_generic_engine" lineno="345">
60045 <summary>
60046 Execute generic container engines in the
60047 container engine domain, and allow the
60048 @@ -95072,7 +95368,7 @@ The role to be allowed the container domain.
60049 </summary>
60050 </param>
60051 </interface>
60052 -<interface name="container_engine_executable_file" lineno="353">
60053 +<interface name="container_engine_executable_file" lineno="365">
60054 <summary>
60055 Make the specified type usable for files
60056 that are executables for container engines.
60057 @@ -95083,7 +95379,7 @@ Type to be used for files.
60058 </summary>
60059 </param>
60060 </interface>
60061 -<interface name="container_generic_engine_domtrans" lineno="380">
60062 +<interface name="container_generic_engine_domtrans" lineno="392">
60063 <summary>
60064 Execute a generic container engine
60065 executable with an automatic transition
60066 @@ -95100,7 +95396,7 @@ The type of the new process.
60067 </summary>
60068 </param>
60069 </interface>
60070 -<interface name="container_engine_executable_entrypoint" lineno="401">
60071 +<interface name="container_engine_executable_entrypoint" lineno="413">
60072 <summary>
60073 Allow the generic container engine
60074 executables to be an entrypoint
60075 @@ -95112,7 +95408,7 @@ Domain allowed access.
60076 </summary>
60077 </param>
60078 </interface>
60079 -<interface name="container_engine_dbus_chat" lineno="420">
60080 +<interface name="container_engine_dbus_chat" lineno="432">
60081 <summary>
60082 Send and receive messages from
60083 container engines over dbus.
60084 @@ -95123,7 +95419,7 @@ Domain allowed access.
60085 </summary>
60086 </param>
60087 </interface>
60088 -<interface name="container_runtime_named_socket_activation" lineno="443">
60089 +<interface name="container_runtime_named_socket_activation" lineno="455">
60090 <summary>
60091 Allow the specified domain to be started
60092 by systemd socket activation using a
60093 @@ -95136,7 +95432,7 @@ Domain allowed access.
60094 </summary>
60095 </param>
60096 </interface>
60097 -<interface name="container_manage_engine_tmp_files" lineno="462">
60098 +<interface name="container_manage_engine_tmp_files" lineno="474">
60099 <summary>
60100 Allow the specified domain to manage
60101 container engine temporary files.
60102 @@ -95147,7 +95443,7 @@ Domain allowed access.
60103 </summary>
60104 </param>
60105 </interface>
60106 -<interface name="container_manage_engine_tmp_sock_files" lineno="482">
60107 +<interface name="container_manage_engine_tmp_sock_files" lineno="494">
60108 <summary>
60109 Allow the specified domain to manage
60110 container engine temporary named sockets.
60111 @@ -95158,7 +95454,7 @@ Domain allowed access.
60112 </summary>
60113 </param>
60114 </interface>
60115 -<interface name="container_engine_tmp_filetrans" lineno="514">
60116 +<interface name="container_engine_tmp_filetrans" lineno="526">
60117 <summary>
60118 Allow the specified domain to create
60119 objects in generic temporary directories
60120 @@ -95181,7 +95477,7 @@ The name of the object being created.
60121 </summary>
60122 </param>
60123 </interface>
60124 -<interface name="container_read_system_container_state" lineno="533">
60125 +<interface name="container_read_system_container_state" lineno="545">
60126 <summary>
60127 Read the process state (/proc/pid)
60128 of all system containers.
60129 @@ -95192,7 +95488,7 @@ Domain allowed access.
60130 </summary>
60131 </param>
60132 </interface>
60133 -<interface name="container_read_user_container_state" lineno="552">
60134 +<interface name="container_read_user_container_state" lineno="564">
60135 <summary>
60136 Read the process state (/proc/pid)
60137 of all user containers.
60138 @@ -95203,7 +95499,7 @@ Domain allowed access.
60139 </summary>
60140 </param>
60141 </interface>
60142 -<interface name="container_manage_all_containers" lineno="572">
60143 +<interface name="container_manage_all_containers" lineno="584">
60144 <summary>
60145 All of the permissions necessary
60146 for a container engine to manage
60147 @@ -95215,7 +95511,7 @@ Domain allowed access.
60148 </summary>
60149 </param>
60150 </interface>
60151 -<interface name="container_domtrans" lineno="592">
60152 +<interface name="container_domtrans" lineno="604">
60153 <summary>
60154 Allow the specified domain to
60155 perform a type transition to
60156 @@ -95227,7 +95523,7 @@ Domain allowed to transition.
60157 </summary>
60158 </param>
60159 </interface>
60160 -<interface name="container_stream_connect_system_containers" lineno="611">
60161 +<interface name="container_stream_connect_system_containers" lineno="623">
60162 <summary>
60163 Connect to a system container domain
60164 over a unix stream socket.
60165 @@ -95238,7 +95534,7 @@ Domain allowed access.
60166 </summary>
60167 </param>
60168 </interface>
60169 -<interface name="container_stream_connect_user_containers" lineno="633">
60170 +<interface name="container_stream_connect_user_containers" lineno="645">
60171 <summary>
60172 Connect to a user container domain
60173 over a unix stream socket.
60174 @@ -95249,7 +95545,7 @@ Domain allowed access.
60175 </summary>
60176 </param>
60177 </interface>
60178 -<interface name="container_stream_connect_all_containers" lineno="655">
60179 +<interface name="container_stream_connect_all_containers" lineno="667">
60180 <summary>
60181 Connect to a container domain
60182 over a unix stream socket.
60183 @@ -95260,7 +95556,7 @@ Domain allowed access.
60184 </summary>
60185 </param>
60186 </interface>
60187 -<interface name="container_signal_all_containers" lineno="678">
60188 +<interface name="container_signal_all_containers" lineno="690">
60189 <summary>
60190 Allow the specified domain to
60191 send all signals to a container
60192 @@ -95272,7 +95568,7 @@ Domain allowed to transition.
60193 </summary>
60194 </param>
60195 </interface>
60196 -<interface name="container_setattr_container_ptys" lineno="696">
60197 +<interface name="container_setattr_container_ptys" lineno="708">
60198 <summary>
60199 Set the attributes of container ptys.
60200 </summary>
60201 @@ -95282,7 +95578,7 @@ Domain allowed access.
60202 </summary>
60203 </param>
60204 </interface>
60205 -<interface name="container_use_container_ptys" lineno="714">
60206 +<interface name="container_use_container_ptys" lineno="726">
60207 <summary>
60208 Read and write container ptys.
60209 </summary>
60210 @@ -95292,7 +95588,7 @@ Domain allowed access.
60211 </summary>
60212 </param>
60213 </interface>
60214 -<interface name="container_mountpoint" lineno="733">
60215 +<interface name="container_mountpoint" lineno="745">
60216 <summary>
60217 Make the specified type usable as a mountpoint
60218 for containers.
60219 @@ -95303,7 +95599,29 @@ Type to be used as a mountpoint.
60220 </summary>
60221 </param>
60222 </interface>
60223 -<interface name="container_manage_config_files" lineno="752">
60224 +<interface name="container_create_config_files" lineno="764">
60225 +<summary>
60226 +Allow the specified domain to
60227 +create container config files.
60228 +</summary>
60229 +<param name="domain">
60230 +<summary>
60231 +Domain allowed access.
60232 +</summary>
60233 +</param>
60234 +</interface>
60235 +<interface name="container_write_config_files" lineno="783">
60236 +<summary>
60237 +Allow the specified domain to
60238 +write container config files.
60239 +</summary>
60240 +<param name="domain">
60241 +<summary>
60242 +Domain allowed access.
60243 +</summary>
60244 +</param>
60245 +</interface>
60246 +<interface name="container_manage_config_files" lineno="802">
60247 <summary>
60248 Allow the specified domain to
60249 manage container config files.
60250 @@ -95314,7 +95632,7 @@ Domain allowed access.
60251 </summary>
60252 </param>
60253 </interface>
60254 -<interface name="container_file_root_filetrans" lineno="773">
60255 +<interface name="container_file_root_filetrans" lineno="823">
60256 <summary>
60257 Allow the specified domain to
60258 create container files in the
60259 @@ -95327,7 +95645,7 @@ Domain allowed access.
60260 </summary>
60261 </param>
60262 </interface>
60263 -<interface name="container_manage_dirs" lineno="792">
60264 +<interface name="container_manage_dirs" lineno="842">
60265 <summary>
60266 Allow the specified domain to
60267 manage container file directories.
60268 @@ -95338,7 +95656,7 @@ Domain allowed access.
60269 </summary>
60270 </param>
60271 </interface>
60272 -<interface name="container_manage_files" lineno="811">
60273 +<interface name="container_manage_files" lineno="861">
60274 <summary>
60275 Allow the specified domain to
60276 manage container files.
60277 @@ -95349,7 +95667,7 @@ Domain allowed access.
60278 </summary>
60279 </param>
60280 </interface>
60281 -<interface name="container_manage_lnk_files" lineno="830">
60282 +<interface name="container_manage_lnk_files" lineno="880">
60283 <summary>
60284 Allow the specified domain to
60285 manage container lnk files.
60286 @@ -95360,7 +95678,7 @@ Domain allowed access.
60287 </summary>
60288 </param>
60289 </interface>
60290 -<interface name="container_manage_fifo_files" lineno="849">
60291 +<interface name="container_manage_fifo_files" lineno="899">
60292 <summary>
60293 Allow the specified domain to
60294 manage container fifo files.
60295 @@ -95371,7 +95689,7 @@ Domain allowed access.
60296 </summary>
60297 </param>
60298 </interface>
60299 -<interface name="container_manage_sock_files" lineno="868">
60300 +<interface name="container_manage_sock_files" lineno="918">
60301 <summary>
60302 Allow the specified domain to
60303 manage container sock files.
60304 @@ -95382,7 +95700,7 @@ Domain allowed access.
60305 </summary>
60306 </param>
60307 </interface>
60308 -<interface name="container_rw_chr_files" lineno="887">
60309 +<interface name="container_rw_chr_files" lineno="937">
60310 <summary>
60311 Allow the specified domain to read
60312 and write container chr files.
60313 @@ -95393,7 +95711,7 @@ Domain allowed access.
60314 </summary>
60315 </param>
60316 </interface>
60317 -<interface name="container_dontaudit_rw_chr_files" lineno="906">
60318 +<interface name="container_dontaudit_rw_chr_files" lineno="956">
60319 <summary>
60320 Do not audit attempts to read
60321 and write container chr files.
60322 @@ -95404,7 +95722,7 @@ Domain allowed access.
60323 </summary>
60324 </param>
60325 </interface>
60326 -<interface name="container_manage_chr_files" lineno="925">
60327 +<interface name="container_manage_chr_files" lineno="975">
60328 <summary>
60329 Allow the specified domain to
60330 manage container chr files.
60331 @@ -95415,7 +95733,7 @@ Domain allowed access.
60332 </summary>
60333 </param>
60334 </interface>
60335 -<interface name="container_manage_home_config" lineno="944">
60336 +<interface name="container_manage_home_config" lineno="994">
60337 <summary>
60338 Allow the specified domain to
60339 manage container config home content.
60340 @@ -95426,7 +95744,7 @@ Domain allowed access.
60341 </summary>
60342 </param>
60343 </interface>
60344 -<interface name="container_config_home_filetrans" lineno="976">
60345 +<interface name="container_config_home_filetrans" lineno="1026">
60346 <summary>
60347 Allow the specified domain to create
60348 objects in an xdg_config directory
60349 @@ -95449,7 +95767,7 @@ The name of the object being created.
60350 </summary>
60351 </param>
60352 </interface>
60353 -<interface name="container_manage_home_data_files" lineno="996">
60354 +<interface name="container_manage_home_data_files" lineno="1046">
60355 <summary>
60356 Allow the specified domain to
60357 manage container data home files.
60358 @@ -95460,7 +95778,7 @@ Domain allowed access.
60359 </summary>
60360 </param>
60361 </interface>
60362 -<interface name="container_manage_home_data_fifo_files" lineno="1016">
60363 +<interface name="container_manage_home_data_fifo_files" lineno="1066">
60364 <summary>
60365 Allow the specified domain to
60366 manage container data home named
60367 @@ -95472,7 +95790,7 @@ Domain allowed access.
60368 </summary>
60369 </param>
60370 </interface>
60371 -<interface name="container_manage_home_data_sock_files" lineno="1036">
60372 +<interface name="container_manage_home_data_sock_files" lineno="1086">
60373 <summary>
60374 Allow the specified domain to
60375 manage container data home named
60376 @@ -95484,7 +95802,51 @@ Domain allowed access.
60377 </summary>
60378 </param>
60379 </interface>
60380 -<interface name="container_relabel_all_content" lineno="1056">
60381 +<interface name="container_admin_all_files" lineno="1104">
60382 +<summary>
60383 +Administrate all container files.
60384 +</summary>
60385 +<param name="domain">
60386 +<summary>
60387 +Domain allowed access.
60388 +</summary>
60389 +</param>
60390 +</interface>
60391 +<interface name="container_admin_all_ro_files" lineno="1124">
60392 +<summary>
60393 +Administrate all container read-only files.
60394 +</summary>
60395 +<param name="domain">
60396 +<summary>
60397 +Domain allowed access.
60398 +</summary>
60399 +</param>
60400 +</interface>
60401 +<interface name="container_admin_all_user_runtime_content" lineno="1146">
60402 +<summary>
60403 +All of the rules necessary for a user
60404 +to manage user container runtime data
60405 +in their user runtime directory.
60406 +</summary>
60407 +<param name="domain">
60408 +<summary>
60409 +Domain allowed access.
60410 +</summary>
60411 +</param>
60412 +</interface>
60413 +<interface name="container_manage_all_home_content" lineno="1166">
60414 +<summary>
60415 +All of the rules necessary for a user
60416 +to manage container data in their home
60417 +directory.
60418 +</summary>
60419 +<param name="domain">
60420 +<summary>
60421 +Domain allowed access.
60422 +</summary>
60423 +</param>
60424 +</interface>
60425 +<interface name="container_relabel_all_content" lineno="1210">
60426 <summary>
60427 Allow the specified domain to
60428 relabel container files and
60429 @@ -95496,7 +95858,18 @@ Domain allowed access.
60430 </summary>
60431 </param>
60432 </interface>
60433 -<interface name="container_relabel_fs" lineno="1075">
60434 +<interface name="container_remount_fs" lineno="1229">
60435 +<summary>
60436 +Allow the specified domain to
60437 +remount container filesystems.
60438 +</summary>
60439 +<param name="domain">
60440 +<summary>
60441 +Domain allowed access.
60442 +</summary>
60443 +</param>
60444 +</interface>
60445 +<interface name="container_relabel_fs" lineno="1248">
60446 <summary>
60447 Allow the specified domain to
60448 relabel container filesystems.
60449 @@ -95507,7 +95880,7 @@ Domain allowed access.
60450 </summary>
60451 </param>
60452 </interface>
60453 -<interface name="container_getattr_fs" lineno="1095">
60454 +<interface name="container_getattr_fs" lineno="1268">
60455 <summary>
60456 Allow the specified domain to
60457 get the attributes of container
60458 @@ -95519,7 +95892,7 @@ Domain allowed access.
60459 </summary>
60460 </param>
60461 </interface>
60462 -<interface name="container_search_runtime" lineno="1114">
60463 +<interface name="container_search_runtime" lineno="1287">
60464 <summary>
60465 Allow the specified domain to search
60466 runtime container directories.
60467 @@ -95530,7 +95903,7 @@ Domain allowed access.
60468 </summary>
60469 </param>
60470 </interface>
60471 -<interface name="container_manage_runtime_files" lineno="1134">
60472 +<interface name="container_manage_runtime_files" lineno="1307">
60473 <summary>
60474 Allow the specified domain to manage
60475 runtime container files.
60476 @@ -95541,7 +95914,7 @@ Domain allowed access.
60477 </summary>
60478 </param>
60479 </interface>
60480 -<interface name="container_manage_runtime_fifo_files" lineno="1153">
60481 +<interface name="container_manage_runtime_fifo_files" lineno="1326">
60482 <summary>
60483 Allow the specified domain to manage
60484 runtime container named pipes.
60485 @@ -95552,7 +95925,7 @@ Domain allowed access.
60486 </summary>
60487 </param>
60488 </interface>
60489 -<interface name="container_manage_runtime_sock_files" lineno="1172">
60490 +<interface name="container_manage_runtime_sock_files" lineno="1345">
60491 <summary>
60492 Allow the specified domain to manage
60493 runtime container named sockets.
60494 @@ -95563,7 +95936,7 @@ Domain allowed access.
60495 </summary>
60496 </param>
60497 </interface>
60498 -<interface name="container_manage_user_runtime_files" lineno="1191">
60499 +<interface name="container_manage_user_runtime_files" lineno="1364">
60500 <summary>
60501 Allow the specified domain to manage
60502 user runtime container files.
60503 @@ -95574,7 +95947,7 @@ Domain allowed access.
60504 </summary>
60505 </param>
60506 </interface>
60507 -<interface name="container_rw_user_runtime_sock_files" lineno="1210">
60508 +<interface name="container_rw_user_runtime_sock_files" lineno="1383">
60509 <summary>
60510 Allow the specified domain to read and
60511 write user runtime container named sockets.
60512 @@ -95585,7 +95958,7 @@ Domain allowed access.
60513 </summary>
60514 </param>
60515 </interface>
60516 -<interface name="container_search_var_lib" lineno="1229">
60517 +<interface name="container_search_var_lib" lineno="1402">
60518 <summary>
60519 Allow the specified domain to search
60520 container directories in /var/lib.
60521 @@ -95596,7 +95969,7 @@ Domain allowed access.
60522 </summary>
60523 </param>
60524 </interface>
60525 -<interface name="container_manage_var_lib_files" lineno="1249">
60526 +<interface name="container_manage_var_lib_files" lineno="1422">
60527 <summary>
60528 Allow the specified domain to manage
60529 container files in /var/lib.
60530 @@ -95607,7 +95980,7 @@ Domain allowed access.
60531 </summary>
60532 </param>
60533 </interface>
60534 -<interface name="container_manage_var_lib_fifo_files" lineno="1268">
60535 +<interface name="container_manage_var_lib_fifo_files" lineno="1441">
60536 <summary>
60537 Allow the specified domain to manage
60538 container named pipes in /var/lib.
60539 @@ -95618,7 +95991,7 @@ Domain allowed access.
60540 </summary>
60541 </param>
60542 </interface>
60543 -<interface name="container_manage_var_lib_sock_files" lineno="1287">
60544 +<interface name="container_manage_var_lib_sock_files" lineno="1460">
60545 <summary>
60546 Allow the specified domain to manage
60547 container named sockets in /var/lib.
60548 @@ -95629,7 +96002,7 @@ Domain allowed access.
60549 </summary>
60550 </param>
60551 </interface>
60552 -<interface name="container_unlabeled_var_lib_filetrans" lineno="1318">
60553 +<interface name="container_unlabeled_var_lib_filetrans" lineno="1491">
60554 <summary>
60555 Allow the specified domain to create
60556 objects in unlabeled directories with
60557 @@ -95652,7 +96025,18 @@ The name of the object being created.
60558 </summary>
60559 </param>
60560 </interface>
60561 -<interface name="container_admin" lineno="1346">
60562 +<interface name="container_start_units" lineno="1512">
60563 +<summary>
60564 +Allow the specified domain to start
60565 +systemd units for containers.
60566 +</summary>
60567 +<param name="domain">
60568 +<summary>
60569 +Domain allowed access.
60570 +</summary>
60571 +</param>
60572 +</interface>
60573 +<interface name="container_admin" lineno="1539">
60574 <summary>
60575 All of the rules required to
60576 administrate a container
60577 @@ -95686,6 +96070,27 @@ Allow container engines to mount on all non-security files.
60578 </p>
60579 </desc>
60580 </tunable>
60581 +<tunable name="container_manage_public_content" dftval="false">
60582 +<desc>
60583 +<p>
60584 +Allow containers to manage all read-writable public content.
60585 +</p>
60586 +</desc>
60587 +</tunable>
60588 +<tunable name="container_read_public_content" dftval="false">
60589 +<desc>
60590 +<p>
60591 +Allow containers to read all public content.
60592 +</p>
60593 +</desc>
60594 +</tunable>
60595 +<tunable name="container_use_ecryptfs" dftval="false">
60596 +<desc>
60597 +<p>
60598 +Allow containers to use eCryptfs filesystems.
60599 +</p>
60600 +</desc>
60601 +</tunable>
60602 <tunable name="container_use_nfs" dftval="false">
60603 <desc>
60604 <p>
60605 @@ -96950,7 +97355,7 @@ User domain for the role
60606 </summary>
60607 </param>
60608 </template>
60609 -<interface name="dbus_system_bus_client" lineno="140">
60610 +<interface name="dbus_system_bus_client" lineno="137">
60611 <summary>
60612 Template for creating connections to
60613 the system bus.
60614 @@ -96961,7 +97366,7 @@ Domain allowed access.
60615 </summary>
60616 </param>
60617 </interface>
60618 -<interface name="dbus_connect_all_session_bus" lineno="179">
60619 +<interface name="dbus_connect_all_session_bus" lineno="176">
60620 <summary>
60621 Acquire service on all DBUS
60622 session busses.
60623 @@ -96972,7 +97377,7 @@ Domain allowed access.
60624 </summary>
60625 </param>
60626 </interface>
60627 -<template name="dbus_connect_spec_session_bus" lineno="205">
60628 +<template name="dbus_connect_spec_session_bus" lineno="202">
60629 <summary>
60630 Acquire service on specified
60631 DBUS session bus.
60632 @@ -96989,7 +97394,7 @@ Domain allowed access.
60633 </summary>
60634 </param>
60635 </template>
60636 -<interface name="dbus_all_session_bus_client" lineno="225">
60637 +<interface name="dbus_all_session_bus_client" lineno="222">
60638 <summary>
60639 Creating connections to all
60640 DBUS session busses.
60641 @@ -97000,7 +97405,7 @@ Domain allowed access.
60642 </summary>
60643 </param>
60644 </interface>
60645 -<template name="dbus_spec_session_bus_client" lineno="257">
60646 +<template name="dbus_spec_session_bus_client" lineno="254">
60647 <summary>
60648 Creating connections to specified
60649 DBUS session bus.
60650 @@ -97017,7 +97422,7 @@ Domain allowed access.
60651 </summary>
60652 </param>
60653 </template>
60654 -<interface name="dbus_send_all_session_bus" lineno="284">
60655 +<interface name="dbus_send_all_session_bus" lineno="281">
60656 <summary>
60657 Send messages to all DBUS
60658 session busses.
60659 @@ -97028,7 +97433,7 @@ Domain allowed access.
60660 </summary>
60661 </param>
60662 </interface>
60663 -<template name="dbus_send_spec_session_bus" lineno="310">
60664 +<template name="dbus_send_spec_session_bus" lineno="307">
60665 <summary>
60666 Send messages to specified
60667 DBUS session busses.
60668 @@ -97045,7 +97450,7 @@ Domain allowed access.
60669 </summary>
60670 </param>
60671 </template>
60672 -<interface name="dbus_getattr_session_runtime_socket" lineno="330">
60673 +<interface name="dbus_getattr_session_runtime_socket" lineno="327">
60674 <summary>
60675 Allow the specified domain to get the
60676 attributes of the session dbus sock file.
60677 @@ -97056,7 +97461,7 @@ Domain allowed access.
60678 </summary>
60679 </param>
60680 </interface>
60681 -<interface name="dbus_write_session_runtime_socket" lineno="349">
60682 +<interface name="dbus_write_session_runtime_socket" lineno="346">
60683 <summary>
60684 Allow the specified domain to write to
60685 the session dbus sock file.
60686 @@ -97067,7 +97472,7 @@ Domain allowed access.
60687 </summary>
60688 </param>
60689 </interface>
60690 -<interface name="dbus_read_config" lineno="367">
60691 +<interface name="dbus_read_config" lineno="364">
60692 <summary>
60693 Read dbus configuration content.
60694 </summary>
60695 @@ -97077,7 +97482,7 @@ Domain allowed access.
60696 </summary>
60697 </param>
60698 </interface>
60699 -<interface name="dbus_read_lib_files" lineno="386">
60700 +<interface name="dbus_read_lib_files" lineno="383">
60701 <summary>
60702 Read system dbus lib files.
60703 </summary>
60704 @@ -97087,7 +97492,7 @@ Domain allowed access.
60705 </summary>
60706 </param>
60707 </interface>
60708 -<interface name="dbus_relabel_lib_dirs" lineno="406">
60709 +<interface name="dbus_relabel_lib_dirs" lineno="403">
60710 <summary>
60711 Relabel system dbus lib directory.
60712 </summary>
60713 @@ -97097,7 +97502,7 @@ Domain allowed access.
60714 </summary>
60715 </param>
60716 </interface>
60717 -<interface name="dbus_manage_lib_files" lineno="426">
60718 +<interface name="dbus_manage_lib_files" lineno="423">
60719 <summary>
60720 Create, read, write, and delete
60721 system dbus lib files.
60722 @@ -97108,7 +97513,7 @@ Domain allowed access.
60723 </summary>
60724 </param>
60725 </interface>
60726 -<interface name="dbus_all_session_domain" lineno="452">
60727 +<interface name="dbus_all_session_domain" lineno="449">
60728 <summary>
60729 Allow a application domain to be
60730 started by the specified session bus.
60731 @@ -97125,7 +97530,7 @@ entry point to this domain.
60732 </summary>
60733 </param>
60734 </interface>
60735 -<template name="dbus_spec_session_domain" lineno="486">
60736 +<template name="dbus_spec_session_domain" lineno="483">
60737 <summary>
60738 Allow a application domain to be
60739 started by the specified session bus.
60740 @@ -97148,7 +97553,7 @@ entry point to this domain.
60741 </summary>
60742 </param>
60743 </template>
60744 -<interface name="dbus_connect_system_bus" lineno="507">
60745 +<interface name="dbus_connect_system_bus" lineno="504">
60746 <summary>
60747 Acquire service on the DBUS system bus.
60748 </summary>
60749 @@ -97158,7 +97563,7 @@ Domain allowed access.
60750 </summary>
60751 </param>
60752 </interface>
60753 -<interface name="dbus_send_system_bus" lineno="526">
60754 +<interface name="dbus_send_system_bus" lineno="523">
60755 <summary>
60756 Send messages to the DBUS system bus.
60757 </summary>
60758 @@ -97168,7 +97573,7 @@ Domain allowed access.
60759 </summary>
60760 </param>
60761 </interface>
60762 -<interface name="dbus_system_bus_unconfined" lineno="545">
60763 +<interface name="dbus_system_bus_unconfined" lineno="542">
60764 <summary>
60765 Unconfined access to DBUS system bus.
60766 </summary>
60767 @@ -97178,7 +97583,7 @@ Domain allowed access.
60768 </summary>
60769 </param>
60770 </interface>
60771 -<interface name="dbus_system_domain" lineno="570">
60772 +<interface name="dbus_system_domain" lineno="567">
60773 <summary>
60774 Create a domain for processes which
60775 can be started by the DBUS system bus.
60776 @@ -97194,7 +97599,7 @@ Type of the program to be used as an entry point to this domain.
60777 </summary>
60778 </param>
60779 </interface>
60780 -<interface name="dbus_use_system_bus_fds" lineno="610">
60781 +<interface name="dbus_use_system_bus_fds" lineno="605">
60782 <summary>
60783 Use and inherit DBUS system bus
60784 file descriptors.
60785 @@ -97205,7 +97610,7 @@ Domain allowed access.
60786 </summary>
60787 </param>
60788 </interface>
60789 -<interface name="dbus_dontaudit_system_bus_rw_tcp_sockets" lineno="629">
60790 +<interface name="dbus_dontaudit_system_bus_rw_tcp_sockets" lineno="624">
60791 <summary>
60792 Do not audit attempts to read and
60793 write DBUS system bus TCP sockets.
60794 @@ -97216,7 +97621,7 @@ Domain to not audit.
60795 </summary>
60796 </param>
60797 </interface>
60798 -<interface name="dbus_watch_system_bus_runtime_dirs" lineno="647">
60799 +<interface name="dbus_watch_system_bus_runtime_dirs" lineno="642">
60800 <summary>
60801 Watch system bus runtime directories.
60802 </summary>
60803 @@ -97226,7 +97631,17 @@ Domain allowed access.
60804 </summary>
60805 </param>
60806 </interface>
60807 -<interface name="dbus_list_system_bus_runtime" lineno="665">
60808 +<interface name="dbus_read_system_bus_runtime_files" lineno="660">
60809 +<summary>
60810 +Read system bus runtime files.
60811 +</summary>
60812 +<param name="domain">
60813 +<summary>
60814 +Domain allowed access.
60815 +</summary>
60816 +</param>
60817 +</interface>
60818 +<interface name="dbus_list_system_bus_runtime" lineno="679">
60819 <summary>
60820 List system bus runtime directories.
60821 </summary>
60822 @@ -97236,7 +97651,7 @@ Domain allowed access.
60823 </summary>
60824 </param>
60825 </interface>
60826 -<interface name="dbus_watch_system_bus_runtime_named_sockets" lineno="683">
60827 +<interface name="dbus_watch_system_bus_runtime_named_sockets" lineno="697">
60828 <summary>
60829 Watch system bus runtime named sockets.
60830 </summary>
60831 @@ -97246,7 +97661,7 @@ Domain allowed access.
60832 </summary>
60833 </param>
60834 </interface>
60835 -<interface name="dbus_read_system_bus_runtime_named_sockets" lineno="701">
60836 +<interface name="dbus_read_system_bus_runtime_named_sockets" lineno="715">
60837 <summary>
60838 Read system bus runtime named sockets.
60839 </summary>
60840 @@ -97256,7 +97671,7 @@ Domain allowed access.
60841 </summary>
60842 </param>
60843 </interface>
60844 -<interface name="dbus_unconfined" lineno="719">
60845 +<interface name="dbus_unconfined" lineno="733">
60846 <summary>
60847 Unconfined access to DBUS.
60848 </summary>
60849 @@ -97266,7 +97681,7 @@ Domain allowed access.
60850 </summary>
60851 </param>
60852 </interface>
60853 -<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="749">
60854 +<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="763">
60855 <summary>
60856 Create resources in /run or /var/run with the system_dbusd_runtime_t
60857 label. This method is deprecated in favor of the init_daemon_run_dir
60858 @@ -97288,7 +97703,7 @@ Optional file name used for the resource
60859 </summary>
60860 </param>
60861 </interface>
60862 -<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="763">
60863 +<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="777">
60864 <summary>
60865 Create directories with the system_dbusd_runtime_t label
60866 </summary>
60867 @@ -97307,6 +97722,23 @@ over D-Bus. This is needed by openvpn3-linux.
60868 </p>
60869 </desc>
60870 </tunable>
60871 +<tunable name="dbus_broker_run_transient_units" dftval="false">
60872 +<desc>
60873 +<p>
60874 +Allow dbus-daemon system bus to to run systemd transient
60875 +units. This is used by dbus-broker for dbus-activated
60876 +services when the unit file for the service does not exist.
60877 +</p>
60878 +</desc>
60879 +</tunable>
60880 +<tunable name="dbus_broker_system_bus" dftval="false">
60881 +<desc>
60882 +<p>
60883 +Enable additional rules to support using dbus-broker
60884 +as the dbus-daemon system bus.
60885 +</p>
60886 +</desc>
60887 +</tunable>
60888 </module>
60889 <module name="ddclient" filename="policy/modules/services/ddclient.if">
60890 <summary>Update dynamic IP address at DynDNS.org.</summary>
60891 @@ -101404,7 +101836,27 @@ Domain allowed to transition.
60892 </summary>
60893 </param>
60894 </interface>
60895 -<interface name="mailman_exec" lineno="120">
60896 +<interface name="mailman_stream_connect_cgi" lineno="120">
60897 +<summary>
60898 +Talk to mailman_cgi_t via Unix domain socket
60899 +</summary>
60900 +<param name="domain">
60901 +<summary>
60902 +Domain talking to mailman
60903 +</summary>
60904 +</param>
60905 +</interface>
60906 +<interface name="mailman_manage_runtime_files" lineno="139">
60907 +<summary>
60908 +Manage mailman runtime files
60909 +</summary>
60910 +<param name="domain">
60911 +<summary>
60912 +Domain to manage the files
60913 +</summary>
60914 +</param>
60915 +</interface>
60916 +<interface name="mailman_exec" lineno="158">
60917 <summary>
60918 Execute mailman in the caller domain.
60919 </summary>
60920 @@ -101414,7 +101866,7 @@ Domain allowed access.
60921 </summary>
60922 </param>
60923 </interface>
60924 -<interface name="mailman_signal_cgi" lineno="139">
60925 +<interface name="mailman_signal_cgi" lineno="177">
60926 <summary>
60927 Send generic signals to mailman cgi.
60928 </summary>
60929 @@ -101424,7 +101876,7 @@ Domain allowed access.
60930 </summary>
60931 </param>
60932 </interface>
60933 -<interface name="mailman_search_data" lineno="157">
60934 +<interface name="mailman_search_data" lineno="195">
60935 <summary>
60936 Search mailman data directories.
60937 </summary>
60938 @@ -101434,7 +101886,7 @@ Domain allowed access.
60939 </summary>
60940 </param>
60941 </interface>
60942 -<interface name="mailman_read_data_files" lineno="176">
60943 +<interface name="mailman_read_data_files" lineno="214">
60944 <summary>
60945 Read mailman data content.
60946 </summary>
60947 @@ -101444,7 +101896,17 @@ Domain allowed access.
60948 </summary>
60949 </param>
60950 </interface>
60951 -<interface name="mailman_manage_data_files" lineno="198">
60952 +<interface name="mailman_map_data_files" lineno="235">
60953 +<summary>
60954 +map mailman data content.
60955 +</summary>
60956 +<param name="domain">
60957 +<summary>
60958 +Domain allowed access.
60959 +</summary>
60960 +</param>
60961 +</interface>
60962 +<interface name="mailman_manage_data_files" lineno="254">
60963 <summary>
60964 Create, read, write, and delete
60965 mailman data files.
60966 @@ -101455,7 +101917,7 @@ Domain allowed access.
60967 </summary>
60968 </param>
60969 </interface>
60970 -<interface name="mailman_list_data" lineno="218">
60971 +<interface name="mailman_list_data" lineno="274">
60972 <summary>
60973 List mailman data directories.
60974 </summary>
60975 @@ -101465,7 +101927,7 @@ Domain allowed access.
60976 </summary>
60977 </param>
60978 </interface>
60979 -<interface name="mailman_read_data_symlinks" lineno="237">
60980 +<interface name="mailman_read_data_symlinks" lineno="293">
60981 <summary>
60982 Read mailman data symbolic links.
60983 </summary>
60984 @@ -101475,7 +101937,7 @@ Domain allowed access.
60985 </summary>
60986 </param>
60987 </interface>
60988 -<interface name="mailman_read_log" lineno="255">
60989 +<interface name="mailman_read_log" lineno="311">
60990 <summary>
60991 Read mailman log files.
60992 </summary>
60993 @@ -101485,7 +101947,7 @@ Domain allowed access.
60994 </summary>
60995 </param>
60996 </interface>
60997 -<interface name="mailman_append_log" lineno="274">
60998 +<interface name="mailman_append_log" lineno="330">
60999 <summary>
61000 Append mailman log files.
61001 </summary>
61002 @@ -101495,7 +101957,7 @@ Domain allowed access.
61003 </summary>
61004 </param>
61005 </interface>
61006 -<interface name="mailman_manage_log" lineno="294">
61007 +<interface name="mailman_manage_log" lineno="350">
61008 <summary>
61009 Create, read, write, and delete
61010 mailman log content.
61011 @@ -101506,7 +101968,7 @@ Domain allowed access.
61012 </summary>
61013 </param>
61014 </interface>
61015 -<interface name="mailman_read_archive" lineno="314">
61016 +<interface name="mailman_read_archive" lineno="370">
61017 <summary>
61018 Read mailman archive content.
61019 </summary>
61020 @@ -101516,7 +101978,7 @@ Domain allowed access.
61021 </summary>
61022 </param>
61023 </interface>
61024 -<interface name="mailman_domtrans_queue" lineno="337">
61025 +<interface name="mailman_domtrans_queue" lineno="393">
61026 <summary>
61027 Execute mailman_queue in the
61028 mailman_queue domain.
61029 @@ -101527,6 +101989,34 @@ Domain allowed to transition.
61030 </summary>
61031 </param>
61032 </interface>
61033 +<interface name="mailman_manage_lockdir" lineno="412">
61034 +<summary>
61035 +Manage mailman lock dir
61036 +</summary>
61037 +<param name="domain">
61038 +<summary>
61039 +Domain allowed to manage it.
61040 +</summary>
61041 +</param>
61042 +</interface>
61043 +</module>
61044 +<module name="matrixd" filename="policy/modules/services/matrixd.if">
61045 +<summary>matrix.org synapse reference server.</summary>
61046 +<tunable name="matrix_allow_federation" dftval="true">
61047 +<desc>
61048 +<p>
61049 +Determine whether Matrixd is allowed to federate
61050 +(bind all UDP ports and connect to all TCP ports).
61051 +</p>
61052 +</desc>
61053 +</tunable>
61054 +<tunable name="matrix_postgresql_connect" dftval="false">
61055 +<desc>
61056 +<p>
61057 +Determine whether Matrixd can connect to the Postgres database.
61058 +</p>
61059 +</desc>
61060 +</tunable>
61061 </module>
61062 <module name="mediawiki" filename="policy/modules/services/mediawiki.if">
61063 <summary>Open source wiki package written in PHP.</summary>
61064 @@ -102588,7 +103078,7 @@ Domain to not audit.
61065 </summary>
61066 </param>
61067 </interface>
61068 -<interface name="mta_read_spool_symlinks" lineno="835">
61069 +<interface name="mta_read_spool_symlinks" lineno="836">
61070 <summary>
61071 Allow reading mail spool symlinks.
61072 </summary>
61073 @@ -102598,7 +103088,7 @@ Domain to not audit.
61074 </summary>
61075 </param>
61076 </interface>
61077 -<interface name="mta_dontaudit_read_spool_symlinks" lineno="854">
61078 +<interface name="mta_dontaudit_read_spool_symlinks" lineno="855">
61079 <summary>
61080 Do not audit attempts to read
61081 mail spool symlinks.
61082 @@ -102609,7 +103099,7 @@ Domain to not audit.
61083 </summary>
61084 </param>
61085 </interface>
61086 -<interface name="mta_getattr_spool" lineno="872">
61087 +<interface name="mta_getattr_spool" lineno="873">
61088 <summary>
61089 Get attributes of mail spool content.
61090 </summary>
61091 @@ -102619,7 +103109,7 @@ Domain allowed access.
61092 </summary>
61093 </param>
61094 </interface>
61095 -<interface name="mta_dontaudit_getattr_spool_files" lineno="894">
61096 +<interface name="mta_dontaudit_getattr_spool_files" lineno="895">
61097 <summary>
61098 Do not audit attempts to get
61099 attributes of mail spool files.
61100 @@ -102630,7 +103120,7 @@ Domain to not audit.
61101 </summary>
61102 </param>
61103 </interface>
61104 -<interface name="mta_spool_filetrans" lineno="932">
61105 +<interface name="mta_spool_filetrans" lineno="933">
61106 <summary>
61107 Create specified objects in the
61108 mail spool directory with a
61109 @@ -102657,7 +103147,7 @@ The name of the object being created.
61110 </summary>
61111 </param>
61112 </interface>
61113 -<interface name="mta_read_spool_files" lineno="951">
61114 +<interface name="mta_read_spool_files" lineno="952">
61115 <summary>
61116 Read mail spool files.
61117 </summary>
61118 @@ -102667,7 +103157,7 @@ Domain allowed access.
61119 </summary>
61120 </param>
61121 </interface>
61122 -<interface name="mta_rw_spool" lineno="971">
61123 +<interface name="mta_rw_spool" lineno="972">
61124 <summary>
61125 Read and write mail spool files.
61126 </summary>
61127 @@ -102677,7 +103167,7 @@ Domain allowed access.
61128 </summary>
61129 </param>
61130 </interface>
61131 -<interface name="mta_append_spool" lineno="992">
61132 +<interface name="mta_append_spool" lineno="993">
61133 <summary>
61134 Create, read, and write mail spool files.
61135 </summary>
61136 @@ -102687,7 +103177,7 @@ Domain allowed access.
61137 </summary>
61138 </param>
61139 </interface>
61140 -<interface name="mta_delete_spool" lineno="1013">
61141 +<interface name="mta_delete_spool" lineno="1014">
61142 <summary>
61143 Delete mail spool files.
61144 </summary>
61145 @@ -102697,7 +103187,7 @@ Domain allowed access.
61146 </summary>
61147 </param>
61148 </interface>
61149 -<interface name="mta_manage_spool" lineno="1033">
61150 +<interface name="mta_manage_spool" lineno="1034">
61151 <summary>
61152 Create, read, write, and delete
61153 mail spool content.
61154 @@ -102708,7 +103198,7 @@ Domain allowed access.
61155 </summary>
61156 </param>
61157 </interface>
61158 -<interface name="mta_watch_spool" lineno="1055">
61159 +<interface name="mta_watch_spool" lineno="1056">
61160 <summary>
61161 Watch mail spool content.
61162 </summary>
61163 @@ -102718,7 +103208,7 @@ Domain allowed access.
61164 </summary>
61165 </param>
61166 </interface>
61167 -<interface name="mta_queue_filetrans" lineno="1090">
61168 +<interface name="mta_queue_filetrans" lineno="1091">
61169 <summary>
61170 Create specified objects in the
61171 mail queue spool directory with a
61172 @@ -102745,7 +103235,7 @@ The name of the object being created.
61173 </summary>
61174 </param>
61175 </interface>
61176 -<interface name="mta_search_queue" lineno="1109">
61177 +<interface name="mta_search_queue" lineno="1110">
61178 <summary>
61179 Search mail queue directories.
61180 </summary>
61181 @@ -102755,7 +103245,7 @@ Domain allowed access.
61182 </summary>
61183 </param>
61184 </interface>
61185 -<interface name="mta_list_queue" lineno="1128">
61186 +<interface name="mta_list_queue" lineno="1129">
61187 <summary>
61188 List mail queue directories.
61189 </summary>
61190 @@ -102765,7 +103255,7 @@ Domain allowed access.
61191 </summary>
61192 </param>
61193 </interface>
61194 -<interface name="mta_read_queue" lineno="1147">
61195 +<interface name="mta_read_queue" lineno="1148">
61196 <summary>
61197 Read mail queue files.
61198 </summary>
61199 @@ -102775,7 +103265,7 @@ Domain allowed access.
61200 </summary>
61201 </param>
61202 </interface>
61203 -<interface name="mta_dontaudit_rw_queue" lineno="1167">
61204 +<interface name="mta_dontaudit_rw_queue" lineno="1168">
61205 <summary>
61206 Do not audit attempts to read and
61207 write mail queue content.
61208 @@ -102786,7 +103276,7 @@ Domain to not audit.
61209 </summary>
61210 </param>
61211 </interface>
61212 -<interface name="mta_manage_queue" lineno="1187">
61213 +<interface name="mta_manage_queue" lineno="1188">
61214 <summary>
61215 Create, read, write, and delete
61216 mail queue content.
61217 @@ -102797,7 +103287,7 @@ Domain allowed access.
61218 </summary>
61219 </param>
61220 </interface>
61221 -<interface name="mta_read_sendmail_bin" lineno="1207">
61222 +<interface name="mta_read_sendmail_bin" lineno="1208">
61223 <summary>
61224 Read sendmail binary.
61225 </summary>
61226 @@ -102807,7 +103297,7 @@ Domain allowed access.
61227 </summary>
61228 </param>
61229 </interface>
61230 -<interface name="mta_rw_user_mail_stream_sockets" lineno="1226">
61231 +<interface name="mta_rw_user_mail_stream_sockets" lineno="1227">
61232 <summary>
61233 Read and write unix domain stream
61234 sockets of all base mail domains.
61235 @@ -103830,6 +104320,9 @@ Role allowed access.
61236 <rolecap/>
61237 </interface>
61238 </module>
61239 +<module name="node_exporter" filename="policy/modules/services/node_exporter.if">
61240 +<summary>Prometheus Node Exporter</summary>
61241 +</module>
61242 <module name="nscd" filename="policy/modules/services/nscd.if">
61243 <summary>Name service cache daemon.</summary>
61244 <interface name="nscd_signal" lineno="13">
61245 @@ -105351,7 +105844,22 @@ Role allowed access.
61246 </module>
61247 <module name="podman" filename="policy/modules/services/podman.if">
61248 <summary>Policy for podman</summary>
61249 -<interface name="podman_domtrans" lineno="13">
61250 +<template name="podman_conmon_domain_template" lineno="18">
61251 +<summary>
61252 +Template for conmon domains.
61253 +</summary>
61254 +<param name="prefix">
61255 +<summary>
61256 +Prefix for generated types.
61257 +</summary>
61258 +</param>
61259 +<param name="source_domain">
61260 +<summary>
61261 +Domain allowed to transition.
61262 +</summary>
61263 +</param>
61264 +</template>
61265 +<interface name="podman_domtrans" lineno="55">
61266 <summary>
61267 Execute podman in the podman domain.
61268 </summary>
61269 @@ -105361,7 +105869,7 @@ Domain allowed to transition.
61270 </summary>
61271 </param>
61272 </interface>
61273 -<interface name="podman_run" lineno="39">
61274 +<interface name="podman_run" lineno="81">
61275 <summary>
61276 Execute podman in the podman domain,
61277 and allow the specified role the
61278 @@ -105378,7 +105886,7 @@ The role to be allowed the podman domain.
61279 </summary>
61280 </param>
61281 </interface>
61282 -<interface name="podman_domtrans_user" lineno="60">
61283 +<interface name="podman_domtrans_user" lineno="102">
61284 <summary>
61285 Execute podman in the podman user
61286 domain (rootless podman).
61287 @@ -105389,7 +105897,7 @@ Domain allowed to transition.
61288 </summary>
61289 </param>
61290 </interface>
61291 -<interface name="podman_run_user" lineno="87">
61292 +<interface name="podman_run_user" lineno="129">
61293 <summary>
61294 Execute podman in the podman user
61295 domain, and allow the specified role
61296 @@ -105407,9 +105915,9 @@ The role to be allowed the podman domain.
61297 </summary>
61298 </param>
61299 </interface>
61300 -<interface name="podman_domtrans_conmon" lineno="107">
61301 +<interface name="podman_domtrans_conmon" lineno="149">
61302 <summary>
61303 -Execute conmon in the conmon domain.
61304 +Execute conmon in the podman conmon domain.
61305 </summary>
61306 <param name="domain">
61307 <summary>
61308 @@ -105417,11 +105925,11 @@ Domain allowed to transition.
61309 </summary>
61310 </param>
61311 </interface>
61312 -<interface name="podman_run_conmon" lineno="133">
61313 +<interface name="podman_run_conmon" lineno="175">
61314 <summary>
61315 -Execute conmon in the conmon domain,
61316 -and allow the specified role the
61317 -conmon domain.
61318 +Execute conmon in the podman conmon
61319 +domain, and allow the specified role
61320 +the podman conmon domain.
61321 </summary>
61322 <param name="domain">
61323 <summary>
61324 @@ -105434,10 +105942,10 @@ The role to be allowed the conmon domain.
61325 </summary>
61326 </param>
61327 </interface>
61328 -<interface name="podman_domtrans_conmon_user" lineno="154">
61329 +<interface name="podman_domtrans_conmon_user" lineno="196">
61330 <summary>
61331 -Execute conmon in the conmon user
61332 -domain (rootless podman).
61333 +Execute conmon in the podman conmon
61334 +user domain (rootless podman).
61335 </summary>
61336 <param name="domain">
61337 <summary>
61338 @@ -105445,12 +105953,12 @@ Domain allowed to transition.
61339 </summary>
61340 </param>
61341 </interface>
61342 -<interface name="podman_run_conmon_user" lineno="181">
61343 +<interface name="podman_run_conmon_user" lineno="223">
61344 <summary>
61345 -Execute conmon in the conmon user
61346 -domain, and allow the specified role
61347 -the conmon user domain (rootless
61348 -podman).
61349 +Execute conmon in the podman conmon
61350 +user domain, and allow the specified
61351 +role the podman conmon user domain
61352 +(rootless podman).
61353 </summary>
61354 <param name="domain">
61355 <summary>
61356 @@ -105463,7 +105971,44 @@ The role to be allowed the conmon domain.
61357 </summary>
61358 </param>
61359 </interface>
61360 -<template name="podman_user_role" lineno="218">
61361 +<interface name="podman_spec_rangetrans_conmon" lineno="249">
61362 +<summary>
61363 +Make the specified domain perform a
61364 +range transition when executing conmon.
61365 +</summary>
61366 +<param name="domain">
61367 +<summary>
61368 +Domain to transition ranges.
61369 +</summary>
61370 +</param>
61371 +<param name="range">
61372 +<summary>
61373 +MLS range to transition to.
61374 +</summary>
61375 +</param>
61376 +</interface>
61377 +<interface name="podman_rw_conmon_pipes" lineno="272">
61378 +<summary>
61379 +Read and write podman conmon unnamed pipes.
61380 +</summary>
61381 +<param name="domain">
61382 +<summary>
61383 +Domain allowed access.
61384 +</summary>
61385 +</param>
61386 +</interface>
61387 +<interface name="podman_use_conmon_fds" lineno="293">
61388 +<summary>
61389 +Allow the specified domain to inherit
61390 +file descriptors from podman conmon.
61391 +</summary>
61392 +<param name="domain">
61393 +<summary>
61394 +Domain allowed access.
61395 +</summary>
61396 +</param>
61397 +</interface>
61398 +<template name="podman_user_role" lineno="330">
61399 <summary>
61400 Role access for rootless podman.
61401 </summary>
61402 @@ -105490,7 +106035,7 @@ Role allowed access.
61403 </param>
61404 <rolecap/>
61405 </template>
61406 -<interface name="podman_admin" lineno="255">
61407 +<interface name="podman_admin" lineno="367">
61408 <summary>
61409 All of the rules required to
61410 administrate a podman
61411 @@ -105649,6 +106194,46 @@ Domain allowed access.
61412 </summary>
61413 </param>
61414 </interface>
61415 +<interface name="policykit_get_unit_status" lineno="260">
61416 +<summary>
61417 +Get the status of the polkit systemd unit.
61418 +</summary>
61419 +<param name="domain">
61420 +<summary>
61421 +Domain allowed access.
61422 +</summary>
61423 +</param>
61424 +</interface>
61425 +<interface name="policykit_start_unit" lineno="279">
61426 +<summary>
61427 +Start the polkit systemd unit.
61428 +</summary>
61429 +<param name="domain">
61430 +<summary>
61431 +Domain allowed access.
61432 +</summary>
61433 +</param>
61434 +</interface>
61435 +<interface name="policykit_stop_unit" lineno="298">
61436 +<summary>
61437 +Stop the polkit systemd unit.
61438 +</summary>
61439 +<param name="domain">
61440 +<summary>
61441 +Domain allowed access.
61442 +</summary>
61443 +</param>
61444 +</interface>
61445 +<interface name="policykit_reload_unit" lineno="317">
61446 +<summary>
61447 +Reload the polkit systemd unit.
61448 +</summary>
61449 +<param name="domain">
61450 +<summary>
61451 +Domain allowed access.
61452 +</summary>
61453 +</param>
61454 +</interface>
61455 </module>
61456 <module name="portmap" filename="policy/modules/services/portmap.if">
61457 <summary>RPC port mapping service.</summary>
61458 @@ -110653,7 +111238,7 @@ is the prefix for sshd_t).
61459 </summary>
61460 </param>
61461 </template>
61462 -<template name="ssh_role_template" lineno="309">
61463 +<template name="ssh_role_template" lineno="322">
61464 <summary>
61465 Role access for ssh
61466 </summary>
61467 @@ -110679,7 +111264,7 @@ Role allowed access
61468 </summary>
61469 </param>
61470 </template>
61471 -<interface name="ssh_sigchld" lineno="474">
61472 +<interface name="ssh_sigchld" lineno="487">
61473 <summary>
61474 Send a SIGCHLD signal to the ssh server.
61475 </summary>
61476 @@ -110689,7 +111274,7 @@ Domain allowed access.
61477 </summary>
61478 </param>
61479 </interface>
61480 -<interface name="ssh_signal" lineno="492">
61481 +<interface name="ssh_signal" lineno="505">
61482 <summary>
61483 Send a generic signal to the ssh server.
61484 </summary>
61485 @@ -110699,7 +111284,7 @@ Domain allowed access.
61486 </summary>
61487 </param>
61488 </interface>
61489 -<interface name="ssh_signull" lineno="510">
61490 +<interface name="ssh_signull" lineno="523">
61491 <summary>
61492 Send a null signal to sshd processes.
61493 </summary>
61494 @@ -110709,7 +111294,7 @@ Domain allowed access.
61495 </summary>
61496 </param>
61497 </interface>
61498 -<interface name="ssh_read_pipes" lineno="528">
61499 +<interface name="ssh_read_pipes" lineno="541">
61500 <summary>
61501 Read a ssh server unnamed pipe.
61502 </summary>
61503 @@ -110719,7 +111304,7 @@ Domain allowed access.
61504 </summary>
61505 </param>
61506 </interface>
61507 -<interface name="ssh_rw_pipes" lineno="545">
61508 +<interface name="ssh_rw_pipes" lineno="558">
61509 <summary>
61510 Read and write a ssh server unnamed pipe.
61511 </summary>
61512 @@ -110729,7 +111314,7 @@ Domain allowed access.
61513 </summary>
61514 </param>
61515 </interface>
61516 -<interface name="ssh_rw_stream_sockets" lineno="563">
61517 +<interface name="ssh_rw_stream_sockets" lineno="576">
61518 <summary>
61519 Read and write ssh server unix domain stream sockets.
61520 </summary>
61521 @@ -110739,7 +111324,7 @@ Domain allowed access.
61522 </summary>
61523 </param>
61524 </interface>
61525 -<interface name="ssh_rw_tcp_sockets" lineno="581">
61526 +<interface name="ssh_rw_tcp_sockets" lineno="594">
61527 <summary>
61528 Read and write ssh server TCP sockets.
61529 </summary>
61530 @@ -110749,7 +111334,7 @@ Domain allowed access.
61531 </summary>
61532 </param>
61533 </interface>
61534 -<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="600">
61535 +<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="613">
61536 <summary>
61537 Do not audit attempts to read and write
61538 ssh server TCP sockets.
61539 @@ -110760,7 +111345,7 @@ Domain to not audit.
61540 </summary>
61541 </param>
61542 </interface>
61543 -<interface name="ssh_exec_sshd" lineno="618">
61544 +<interface name="ssh_exec_sshd" lineno="631">
61545 <summary>
61546 Execute the ssh daemon in the caller domain.
61547 </summary>
61548 @@ -110770,7 +111355,7 @@ Domain allowed access.
61549 </summary>
61550 </param>
61551 </interface>
61552 -<interface name="ssh_domtrans" lineno="637">
61553 +<interface name="ssh_domtrans" lineno="650">
61554 <summary>
61555 Execute the ssh daemon sshd domain.
61556 </summary>
61557 @@ -110780,7 +111365,7 @@ Domain allowed to transition.
61558 </summary>
61559 </param>
61560 </interface>
61561 -<interface name="ssh_client_domtrans" lineno="655">
61562 +<interface name="ssh_client_domtrans" lineno="668">
61563 <summary>
61564 Execute the ssh client in the ssh client domain.
61565 </summary>
61566 @@ -110790,7 +111375,7 @@ Domain allowed to transition.
61567 </summary>
61568 </param>
61569 </interface>
61570 -<interface name="ssh_exec" lineno="673">
61571 +<interface name="ssh_exec" lineno="686">
61572 <summary>
61573 Execute the ssh client in the caller domain.
61574 </summary>
61575 @@ -110800,7 +111385,7 @@ Domain allowed access.
61576 </summary>
61577 </param>
61578 </interface>
61579 -<interface name="ssh_setattr_key_files" lineno="692">
61580 +<interface name="ssh_setattr_key_files" lineno="705">
61581 <summary>
61582 Set the attributes of sshd key files.
61583 </summary>
61584 @@ -110810,7 +111395,7 @@ Domain allowed access.
61585 </summary>
61586 </param>
61587 </interface>
61588 -<interface name="ssh_agent_exec" lineno="711">
61589 +<interface name="ssh_agent_exec" lineno="724">
61590 <summary>
61591 Execute the ssh agent client in the caller domain.
61592 </summary>
61593 @@ -110820,7 +111405,27 @@ Domain allowed access.
61594 </summary>
61595 </param>
61596 </interface>
61597 -<interface name="ssh_read_user_home_files" lineno="730">
61598 +<interface name="ssh_setattr_home_dirs" lineno="743">
61599 +<summary>
61600 +Set the attributes of ssh home directory (~/.ssh)
61601 +</summary>
61602 +<param name="domain">
61603 +<summary>
61604 +Domain allowed access.
61605 +</summary>
61606 +</param>
61607 +</interface>
61608 +<interface name="ssh_create_home_dirs" lineno="761">
61609 +<summary>
61610 +Create ssh home directory (~/.ssh)
61611 +</summary>
61612 +<param name="domain">
61613 +<summary>
61614 +Domain allowed access.
61615 +</summary>
61616 +</param>
61617 +</interface>
61618 +<interface name="ssh_read_user_home_files" lineno="780">
61619 <summary>
61620 Read ssh home directory content
61621 </summary>
61622 @@ -110830,7 +111435,7 @@ Domain allowed access.
61623 </summary>
61624 </param>
61625 </interface>
61626 -<interface name="ssh_domtrans_keygen" lineno="751">
61627 +<interface name="ssh_domtrans_keygen" lineno="801">
61628 <summary>
61629 Execute the ssh key generator in the ssh keygen domain.
61630 </summary>
61631 @@ -110840,17 +111445,27 @@ Domain allowed to transition.
61632 </summary>
61633 </param>
61634 </interface>
61635 -<interface name="ssh_dontaudit_read_server_keys" lineno="769">
61636 +<interface name="ssh_read_server_keys" lineno="819">
61637 <summary>
61638 Read ssh server keys
61639 </summary>
61640 <param name="domain">
61641 <summary>
61642 +Domain allowed access.
61643 +</summary>
61644 +</param>
61645 +</interface>
61646 +<interface name="ssh_dontaudit_read_server_keys" lineno="837">
61647 +<summary>
61648 +Do not audit denials on reading ssh server keys
61649 +</summary>
61650 +<param name="domain">
61651 +<summary>
61652 Domain to not audit.
61653 </summary>
61654 </param>
61655 </interface>
61656 -<interface name="ssh_manage_home_files" lineno="787">
61657 +<interface name="ssh_manage_home_files" lineno="855">
61658 <summary>
61659 Manage ssh home directory content
61660 </summary>
61661 @@ -110860,7 +111475,7 @@ Domain allowed access.
61662 </summary>
61663 </param>
61664 </interface>
61665 -<interface name="ssh_delete_tmp" lineno="806">
61666 +<interface name="ssh_delete_tmp" lineno="874">
61667 <summary>
61668 Delete from the ssh temp files.
61669 </summary>
61670 @@ -110870,7 +111485,7 @@ Domain allowed access.
61671 </summary>
61672 </param>
61673 </interface>
61674 -<interface name="ssh_dontaudit_agent_tmp" lineno="825">
61675 +<interface name="ssh_dontaudit_agent_tmp" lineno="893">
61676 <summary>
61677 dontaudit access to ssh agent tmp dirs
61678 </summary>
61679 @@ -115841,7 +116456,7 @@ Domain allowed access.
61680 </summary>
61681 </param>
61682 </interface>
61683 -<interface name="fstools_signal" lineno="76">
61684 +<interface name="fstools_signal" lineno="77">
61685 <summary>
61686 Send signal to fsadm process
61687 </summary>
61688 @@ -115851,7 +116466,7 @@ Domain allowed access.
61689 </summary>
61690 </param>
61691 </interface>
61692 -<interface name="fstools_use_fds" lineno="94">
61693 +<interface name="fstools_use_fds" lineno="95">
61694 <summary>
61695 Inherit fstools file descriptors.
61696 </summary>
61697 @@ -115861,7 +116476,7 @@ The type of the process performing this action.
61698 </summary>
61699 </param>
61700 </interface>
61701 -<interface name="fstools_read_pipes" lineno="112">
61702 +<interface name="fstools_read_pipes" lineno="113">
61703 <summary>
61704 Read fstools unnamed pipes.
61705 </summary>
61706 @@ -115871,7 +116486,7 @@ Domain allowed access.
61707 </summary>
61708 </param>
61709 </interface>
61710 -<interface name="fstools_relabelto_entry_files" lineno="131">
61711 +<interface name="fstools_relabelto_entry_files" lineno="132">
61712 <summary>
61713 Relabel a file to the type used by the
61714 filesystem tools programs.
61715 @@ -115882,7 +116497,7 @@ Domain allowed access.
61716 </summary>
61717 </param>
61718 </interface>
61719 -<interface name="fstools_manage_entry_files" lineno="150">
61720 +<interface name="fstools_manage_entry_files" lineno="151">
61721 <summary>
61722 Create, read, write, and delete a file used by the
61723 filesystem tools programs.
61724 @@ -115893,7 +116508,7 @@ Domain allowed access.
61725 </summary>
61726 </param>
61727 </interface>
61728 -<interface name="fstools_write_log" lineno="168">
61729 +<interface name="fstools_write_log" lineno="169">
61730 <summary>
61731 Write to fsadm_log_t
61732 </summary>
61733 @@ -115903,7 +116518,7 @@ Domain allowed access.
61734 </summary>
61735 </param>
61736 </interface>
61737 -<interface name="fstools_manage_runtime_files" lineno="187">
61738 +<interface name="fstools_manage_runtime_files" lineno="188">
61739 <summary>
61740 Create, read, write, and delete filesystem tools
61741 runtime files.
61742 @@ -115914,7 +116529,7 @@ Domain allowed access.
61743 </summary>
61744 </param>
61745 </interface>
61746 -<interface name="fstools_getattr_swap_files" lineno="205">
61747 +<interface name="fstools_getattr_swap_files" lineno="206">
61748 <summary>
61749 Getattr swapfile
61750 </summary>
61751 @@ -115924,7 +116539,7 @@ Domain allowed access.
61752 </summary>
61753 </param>
61754 </interface>
61755 -<interface name="fstools_dontaudit_getattr_swap_files" lineno="223">
61756 +<interface name="fstools_dontaudit_getattr_swap_files" lineno="224">
61757 <summary>
61758 Ignore access to a swapfile.
61759 </summary>
61760 @@ -115934,7 +116549,7 @@ Domain to not audit.
61761 </summary>
61762 </param>
61763 </interface>
61764 -<interface name="fstools_relabelto_swap_files" lineno="241">
61765 +<interface name="fstools_relabelto_swap_files" lineno="242">
61766 <summary>
61767 Relabel to swapfile.
61768 </summary>
61769 @@ -115944,7 +116559,7 @@ Domain allowed access.
61770 </summary>
61771 </param>
61772 </interface>
61773 -<interface name="fstools_manage_swap_files" lineno="259">
61774 +<interface name="fstools_manage_swap_files" lineno="260">
61775 <summary>
61776 Manage swapfile.
61777 </summary>
61778 @@ -116244,7 +116859,7 @@ Type of the program to be used as an entry point to this domain.
61779 </param>
61780 <infoflow type="read" weight="10"/>
61781 </interface>
61782 -<interface name="init_ranged_daemon_domain" lineno="431">
61783 +<interface name="init_ranged_daemon_domain" lineno="433">
61784 <summary>
61785 Create a domain for long running processes
61786 (daemons/services) which are started by init scripts,
61787 @@ -116286,7 +116901,7 @@ MLS/MCS range for the domain.
61788 </param>
61789 <infoflow type="read" weight="10"/>
61790 </interface>
61791 -<interface name="init_abstract_socket_activation" lineno="462">
61792 +<interface name="init_abstract_socket_activation" lineno="464">
61793 <summary>
61794 Abstract socket service activation (systemd).
61795 </summary>
61796 @@ -116296,7 +116911,7 @@ The domain to be started by systemd socket activation.
61797 </summary>
61798 </param>
61799 </interface>
61800 -<interface name="init_named_socket_activation" lineno="487">
61801 +<interface name="init_named_socket_activation" lineno="489">
61802 <summary>
61803 Named socket service activation (systemd).
61804 </summary>
61805 @@ -116311,7 +116926,7 @@ The domain socket file type.
61806 </summary>
61807 </param>
61808 </interface>
61809 -<interface name="init_system_domain" lineno="538">
61810 +<interface name="init_system_domain" lineno="540">
61811 <summary>
61812 Create a domain for short running processes
61813 which are started by init scripts.
61814 @@ -116348,7 +116963,7 @@ Type of the program to be used as an entry point to this domain.
61815 </param>
61816 <infoflow type="read" weight="10"/>
61817 </interface>
61818 -<interface name="init_ranged_system_domain" lineno="600">
61819 +<interface name="init_ranged_system_domain" lineno="602">
61820 <summary>
61821 Create a domain for short running processes
61822 which are started by init scripts.
61823 @@ -116391,7 +117006,7 @@ Range for the domain.
61824 </param>
61825 <infoflow type="read" weight="10"/>
61826 </interface>
61827 -<interface name="init_dyntrans" lineno="631">
61828 +<interface name="init_dyntrans" lineno="633">
61829 <summary>
61830 Allow domain dyntransition to init_t domain.
61831 </summary>
61832 @@ -116401,7 +117016,7 @@ Domain allowed to transition.
61833 </summary>
61834 </param>
61835 </interface>
61836 -<interface name="init_daemon_pid_file" lineno="660">
61837 +<interface name="init_daemon_pid_file" lineno="662">
61838 <summary>
61839 Mark the file type as a daemon pid file, allowing initrc_t
61840 to create it (Deprecated)
61841 @@ -116422,7 +117037,7 @@ Filename of the file that the init script creates
61842 </summary>
61843 </param>
61844 </interface>
61845 -<interface name="init_daemon_runtime_file" lineno="687">
61846 +<interface name="init_daemon_runtime_file" lineno="689">
61847 <summary>
61848 Mark the file type as a daemon runtime file, allowing initrc_t
61849 to create it
61850 @@ -116443,7 +117058,7 @@ Filename of the file that the init script creates
61851 </summary>
61852 </param>
61853 </interface>
61854 -<interface name="init_daemon_lock_file" lineno="720">
61855 +<interface name="init_daemon_lock_file" lineno="722">
61856 <summary>
61857 Mark the file type as a daemon lock file, allowing initrc_t
61858 to create it
61859 @@ -116464,7 +117079,7 @@ Filename of the file that the init script creates
61860 </summary>
61861 </param>
61862 </interface>
61863 -<interface name="init_domtrans" lineno="742">
61864 +<interface name="init_domtrans" lineno="744">
61865 <summary>
61866 Execute init (/sbin/init) with a domain transition.
61867 </summary>
61868 @@ -116474,7 +117089,7 @@ Domain allowed to transition.
61869 </summary>
61870 </param>
61871 </interface>
61872 -<interface name="init_pgm_spec_user_daemon_domain" lineno="766">
61873 +<interface name="init_pgm_spec_user_daemon_domain" lineno="768">
61874 <summary>
61875 Execute init (/sbin/init) with a domain transition
61876 to the provided domain.
61877 @@ -116490,7 +117105,7 @@ The type to be used as a systemd --user domain.
61878 </summary>
61879 </param>
61880 </interface>
61881 -<interface name="init_exec" lineno="794">
61882 +<interface name="init_exec" lineno="796">
61883 <summary>
61884 Execute the init program in the caller domain.
61885 </summary>
61886 @@ -116501,7 +117116,7 @@ Domain allowed access.
61887 </param>
61888 <rolecap/>
61889 </interface>
61890 -<interface name="init_pgm_entrypoint" lineno="815">
61891 +<interface name="init_pgm_entrypoint" lineno="817">
61892 <summary>
61893 Allow the init program to be an entrypoint
61894 for the specified domain.
61895 @@ -116513,7 +117128,7 @@ Domain allowed access.
61896 </param>
61897 <rolecap/>
61898 </interface>
61899 -<interface name="init_exec_rc" lineno="844">
61900 +<interface name="init_exec_rc" lineno="846">
61901 <summary>
61902 Execute the rc application in the caller domain.
61903 </summary>
61904 @@ -116534,7 +117149,7 @@ Domain allowed access.
61905 </summary>
61906 </param>
61907 </interface>
61908 -<interface name="init_getpgid" lineno="863">
61909 +<interface name="init_getpgid" lineno="865">
61910 <summary>
61911 Get the process group of init.
61912 </summary>
61913 @@ -116544,7 +117159,7 @@ Domain allowed access.
61914 </summary>
61915 </param>
61916 </interface>
61917 -<interface name="init_signal" lineno="881">
61918 +<interface name="init_signal" lineno="883">
61919 <summary>
61920 Send init a generic signal.
61921 </summary>
61922 @@ -116554,7 +117169,7 @@ Domain allowed access.
61923 </summary>
61924 </param>
61925 </interface>
61926 -<interface name="init_signull" lineno="899">
61927 +<interface name="init_signull" lineno="901">
61928 <summary>
61929 Send init a null signal.
61930 </summary>
61931 @@ -116564,7 +117179,7 @@ Domain allowed access.
61932 </summary>
61933 </param>
61934 </interface>
61935 -<interface name="init_sigchld" lineno="917">
61936 +<interface name="init_sigchld" lineno="919">
61937 <summary>
61938 Send init a SIGCHLD signal.
61939 </summary>
61940 @@ -116574,7 +117189,7 @@ Domain allowed access.
61941 </summary>
61942 </param>
61943 </interface>
61944 -<interface name="init_setsched" lineno="935">
61945 +<interface name="init_setsched" lineno="937">
61946 <summary>
61947 Set the nice level of init.
61948 </summary>
61949 @@ -116584,7 +117199,7 @@ Domain allowed access.
61950 </summary>
61951 </param>
61952 </interface>
61953 -<interface name="init_stream_connect" lineno="953">
61954 +<interface name="init_stream_connect" lineno="955">
61955 <summary>
61956 Connect to init with a unix socket.
61957 </summary>
61958 @@ -116594,7 +117209,7 @@ Domain allowed access.
61959 </summary>
61960 </param>
61961 </interface>
61962 -<interface name="init_unix_stream_socket_connectto" lineno="974">
61963 +<interface name="init_unix_stream_socket_connectto" lineno="976">
61964 <summary>
61965 Connect to init with a unix socket.
61966 Without any additional permissions.
61967 @@ -116605,7 +117220,7 @@ Domain allowed access.
61968 </summary>
61969 </param>
61970 </interface>
61971 -<interface name="init_use_fds" lineno="1032">
61972 +<interface name="init_use_fds" lineno="1034">
61973 <summary>
61974 Inherit and use file descriptors from init.
61975 </summary>
61976 @@ -116655,7 +117270,7 @@ Domain allowed access.
61977 </param>
61978 <infoflow type="read" weight="1"/>
61979 </interface>
61980 -<interface name="init_dontaudit_use_fds" lineno="1051">
61981 +<interface name="init_dontaudit_use_fds" lineno="1053">
61982 <summary>
61983 Do not audit attempts to inherit file
61984 descriptors from init.
61985 @@ -116666,7 +117281,7 @@ Domain to not audit.
61986 </summary>
61987 </param>
61988 </interface>
61989 -<interface name="init_dgram_send" lineno="1070">
61990 +<interface name="init_dgram_send" lineno="1072">
61991 <summary>
61992 Send messages to init unix datagram sockets.
61993 </summary>
61994 @@ -116677,7 +117292,7 @@ Domain allowed access.
61995 </param>
61996 <rolecap/>
61997 </interface>
61998 -<interface name="init_rw_inherited_stream_socket" lineno="1090">
61999 +<interface name="init_rw_inherited_stream_socket" lineno="1092">
62000 <summary>
62001 Read and write to inherited init unix streams.
62002 </summary>
62003 @@ -116687,7 +117302,7 @@ Domain allowed access.
62004 </summary>
62005 </param>
62006 </interface>
62007 -<interface name="init_rw_stream_sockets" lineno="1109">
62008 +<interface name="init_rw_stream_sockets" lineno="1111">
62009 <summary>
62010 Allow the specified domain to read/write to
62011 init with unix domain stream sockets.
62012 @@ -116698,7 +117313,17 @@ Domain allowed access.
62013 </summary>
62014 </param>
62015 </interface>
62016 -<interface name="init_start_system" lineno="1127">
62017 +<interface name="init_dontaudit_search_keys" lineno="1129">
62018 +<summary>
62019 +Do not audit attempts to search init keys.
62020 +</summary>
62021 +<param name="domain">
62022 +<summary>
62023 +Domain allowed access.
62024 +</summary>
62025 +</param>
62026 +</interface>
62027 +<interface name="init_start_system" lineno="1147">
62028 <summary>
62029 start service (systemd).
62030 </summary>
62031 @@ -116708,7 +117333,7 @@ Domain allowed access.
62032 </summary>
62033 </param>
62034 </interface>
62035 -<interface name="init_stop_system" lineno="1145">
62036 +<interface name="init_stop_system" lineno="1165">
62037 <summary>
62038 stop service (systemd).
62039 </summary>
62040 @@ -116718,7 +117343,7 @@ Domain allowed access.
62041 </summary>
62042 </param>
62043 </interface>
62044 -<interface name="init_get_system_status" lineno="1163">
62045 +<interface name="init_get_system_status" lineno="1183">
62046 <summary>
62047 Get all service status (systemd).
62048 </summary>
62049 @@ -116728,7 +117353,7 @@ Domain allowed access.
62050 </summary>
62051 </param>
62052 </interface>
62053 -<interface name="init_enable" lineno="1181">
62054 +<interface name="init_enable" lineno="1201">
62055 <summary>
62056 Enable all systemd services (systemd).
62057 </summary>
62058 @@ -116738,7 +117363,7 @@ Domain allowed access.
62059 </summary>
62060 </param>
62061 </interface>
62062 -<interface name="init_disable" lineno="1199">
62063 +<interface name="init_disable" lineno="1219">
62064 <summary>
62065 Disable all services (systemd).
62066 </summary>
62067 @@ -116748,7 +117373,7 @@ Domain allowed access.
62068 </summary>
62069 </param>
62070 </interface>
62071 -<interface name="init_reload" lineno="1217">
62072 +<interface name="init_reload" lineno="1237">
62073 <summary>
62074 Reload all services (systemd).
62075 </summary>
62076 @@ -116758,7 +117383,7 @@ Domain allowed access.
62077 </summary>
62078 </param>
62079 </interface>
62080 -<interface name="init_reboot_system" lineno="1235">
62081 +<interface name="init_reboot_system" lineno="1255">
62082 <summary>
62083 Reboot the system (systemd).
62084 </summary>
62085 @@ -116768,7 +117393,7 @@ Domain allowed access.
62086 </summary>
62087 </param>
62088 </interface>
62089 -<interface name="init_shutdown_system" lineno="1253">
62090 +<interface name="init_shutdown_system" lineno="1273">
62091 <summary>
62092 Shutdown (halt) the system (systemd).
62093 </summary>
62094 @@ -116778,7 +117403,7 @@ Domain allowed access.
62095 </summary>
62096 </param>
62097 </interface>
62098 -<interface name="init_service_status" lineno="1271">
62099 +<interface name="init_service_status" lineno="1291">
62100 <summary>
62101 Allow specified domain to get init status
62102 </summary>
62103 @@ -116788,7 +117413,7 @@ Domain to allow access.
62104 </summary>
62105 </param>
62106 </interface>
62107 -<interface name="init_service_start" lineno="1290">
62108 +<interface name="init_service_start" lineno="1310">
62109 <summary>
62110 Allow specified domain to get init start
62111 </summary>
62112 @@ -116798,7 +117423,7 @@ Domain to allow access.
62113 </summary>
62114 </param>
62115 </interface>
62116 -<interface name="init_dbus_chat" lineno="1310">
62117 +<interface name="init_dbus_chat" lineno="1330">
62118 <summary>
62119 Send and receive messages from
62120 systemd over dbus.
62121 @@ -116809,7 +117434,7 @@ Domain allowed access.
62122 </summary>
62123 </param>
62124 </interface>
62125 -<interface name="init_run_bpf" lineno="1330">
62126 +<interface name="init_run_bpf" lineno="1350">
62127 <summary>
62128 Run init BPF programs.
62129 </summary>
62130 @@ -116819,7 +117444,7 @@ Domain allowed access.
62131 </summary>
62132 </param>
62133 </interface>
62134 -<interface name="init_read_var_lib_links" lineno="1349">
62135 +<interface name="init_read_var_lib_links" lineno="1369">
62136 <summary>
62137 read/follow symlinks under /var/lib/systemd/
62138 </summary>
62139 @@ -116829,7 +117454,17 @@ Domain allowed access.
62140 </summary>
62141 </param>
62142 </interface>
62143 -<interface name="init_list_var_lib_dirs" lineno="1368">
62144 +<interface name="init_search_var_lib_dirs" lineno="1388">
62145 +<summary>
62146 +Search /var/lib/systemd/ dirs
62147 +</summary>
62148 +<param name="domain">
62149 +<summary>
62150 +Domain allowed access.
62151 +</summary>
62152 +</param>
62153 +</interface>
62154 +<interface name="init_list_var_lib_dirs" lineno="1407">
62155 <summary>
62156 List /var/lib/systemd/ dir
62157 </summary>
62158 @@ -116839,7 +117474,7 @@ Domain allowed access.
62159 </summary>
62160 </param>
62161 </interface>
62162 -<interface name="init_relabel_var_lib_dirs" lineno="1386">
62163 +<interface name="init_relabel_var_lib_dirs" lineno="1425">
62164 <summary>
62165 Relabel dirs in /var/lib/systemd/.
62166 </summary>
62167 @@ -116849,7 +117484,7 @@ Domain allowed access.
62168 </summary>
62169 </param>
62170 </interface>
62171 -<interface name="init_manage_var_lib_files" lineno="1404">
62172 +<interface name="init_manage_var_lib_files" lineno="1443">
62173 <summary>
62174 Manage files in /var/lib/systemd/.
62175 </summary>
62176 @@ -116859,7 +117494,7 @@ Domain allowed access.
62177 </summary>
62178 </param>
62179 </interface>
62180 -<interface name="init_var_lib_filetrans" lineno="1439">
62181 +<interface name="init_var_lib_filetrans" lineno="1478">
62182 <summary>
62183 Create files in /var/lib/systemd
62184 with an automatic type transition.
62185 @@ -116885,7 +117520,7 @@ The name of the object being created.
62186 </summary>
62187 </param>
62188 </interface>
62189 -<interface name="init_search_pids" lineno="1458">
62190 +<interface name="init_search_pids" lineno="1497">
62191 <summary>
62192 Allow search directory in the /run/systemd directory. (Deprecated)
62193 </summary>
62194 @@ -116895,7 +117530,7 @@ Domain allowed access.
62195 </summary>
62196 </param>
62197 </interface>
62198 -<interface name="init_list_pids" lineno="1473">
62199 +<interface name="init_list_pids" lineno="1512">
62200 <summary>
62201 Allow listing of the /run/systemd directory. (Deprecated)
62202 </summary>
62203 @@ -116905,7 +117540,7 @@ Domain allowed access.
62204 </summary>
62205 </param>
62206 </interface>
62207 -<interface name="init_manage_pid_symlinks" lineno="1488">
62208 +<interface name="init_manage_pid_symlinks" lineno="1527">
62209 <summary>
62210 Create symbolic links in the /run/systemd directory. (Deprecated)
62211 </summary>
62212 @@ -116915,7 +117550,7 @@ Domain allowed access.
62213 </summary>
62214 </param>
62215 </interface>
62216 -<interface name="init_create_pid_files" lineno="1503">
62217 +<interface name="init_create_pid_files" lineno="1542">
62218 <summary>
62219 Create files in the /run/systemd directory. (Deprecated)
62220 </summary>
62221 @@ -116925,7 +117560,7 @@ Domain allowed access.
62222 </summary>
62223 </param>
62224 </interface>
62225 -<interface name="init_write_pid_files" lineno="1518">
62226 +<interface name="init_write_pid_files" lineno="1557">
62227 <summary>
62228 Write files in the /run/systemd directory. (Deprecated)
62229 </summary>
62230 @@ -116935,7 +117570,7 @@ Domain allowed access.
62231 </summary>
62232 </param>
62233 </interface>
62234 -<interface name="init_manage_pid_dirs" lineno="1534">
62235 +<interface name="init_manage_pid_dirs" lineno="1573">
62236 <summary>
62237 Create, read, write, and delete
62238 directories in the /run/systemd directory. (Deprecated)
62239 @@ -116946,7 +117581,7 @@ Domain allowed access.
62240 </summary>
62241 </param>
62242 </interface>
62243 -<interface name="init_pid_filetrans" lineno="1564">
62244 +<interface name="init_pid_filetrans" lineno="1603">
62245 <summary>
62246 Create files in an init PID directory. (Deprecated)
62247 </summary>
62248 @@ -116971,7 +117606,7 @@ The name of the object being created.
62249 </summary>
62250 </param>
62251 </interface>
62252 -<interface name="init_search_runtime" lineno="1579">
62253 +<interface name="init_search_runtime" lineno="1618">
62254 <summary>
62255 Search init runtime directories, e.g. /run/systemd.
62256 </summary>
62257 @@ -116981,7 +117616,7 @@ Domain allowed access.
62258 </summary>
62259 </param>
62260 </interface>
62261 -<interface name="init_list_runtime" lineno="1597">
62262 +<interface name="init_list_runtime" lineno="1636">
62263 <summary>
62264 List init runtime directories, e.g. /run/systemd.
62265 </summary>
62266 @@ -116991,7 +117626,7 @@ Domain allowed access.
62267 </summary>
62268 </param>
62269 </interface>
62270 -<interface name="init_manage_runtime_dirs" lineno="1617">
62271 +<interface name="init_manage_runtime_dirs" lineno="1656">
62272 <summary>
62273 Create, read, write, and delete
62274 directories in the /run/systemd directory.
62275 @@ -117002,7 +117637,7 @@ Domain allowed access.
62276 </summary>
62277 </param>
62278 </interface>
62279 -<interface name="init_runtime_filetrans" lineno="1650">
62280 +<interface name="init_runtime_filetrans" lineno="1689">
62281 <summary>
62282 Create files in an init runtime directory with a private type.
62283 </summary>
62284 @@ -117027,7 +117662,7 @@ The name of the object being created.
62285 </summary>
62286 </param>
62287 </interface>
62288 -<interface name="init_write_runtime_files" lineno="1669">
62289 +<interface name="init_write_runtime_files" lineno="1708">
62290 <summary>
62291 Write init runtime files, e.g. in /run/systemd.
62292 </summary>
62293 @@ -117037,7 +117672,7 @@ Domain allowed access.
62294 </summary>
62295 </param>
62296 </interface>
62297 -<interface name="init_create_runtime_files" lineno="1687">
62298 +<interface name="init_create_runtime_files" lineno="1726">
62299 <summary>
62300 Create init runtime files, e.g. in /run/systemd.
62301 </summary>
62302 @@ -117047,7 +117682,7 @@ Domain allowed access.
62303 </summary>
62304 </param>
62305 </interface>
62306 -<interface name="init_manage_runtime_symlinks" lineno="1705">
62307 +<interface name="init_manage_runtime_symlinks" lineno="1744">
62308 <summary>
62309 Create init runtime symbolic links, e.g. in /run/systemd.
62310 </summary>
62311 @@ -117057,7 +117692,7 @@ Domain allowed access.
62312 </summary>
62313 </param>
62314 </interface>
62315 -<interface name="init_getattr_initctl" lineno="1723">
62316 +<interface name="init_getattr_initctl" lineno="1762">
62317 <summary>
62318 Get the attributes of initctl.
62319 </summary>
62320 @@ -117067,7 +117702,7 @@ Domain allowed access.
62321 </summary>
62322 </param>
62323 </interface>
62324 -<interface name="init_dontaudit_getattr_initctl" lineno="1744">
62325 +<interface name="init_dontaudit_getattr_initctl" lineno="1783">
62326 <summary>
62327 Do not audit attempts to get the
62328 attributes of initctl.
62329 @@ -117078,7 +117713,7 @@ Domain to not audit.
62330 </summary>
62331 </param>
62332 </interface>
62333 -<interface name="init_write_initctl" lineno="1762">
62334 +<interface name="init_write_initctl" lineno="1801">
62335 <summary>
62336 Write to initctl.
62337 </summary>
62338 @@ -117088,7 +117723,7 @@ Domain allowed access.
62339 </summary>
62340 </param>
62341 </interface>
62342 -<interface name="init_telinit" lineno="1783">
62343 +<interface name="init_telinit" lineno="1822">
62344 <summary>
62345 Use telinit (Read and write initctl).
62346 </summary>
62347 @@ -117099,7 +117734,7 @@ Domain allowed access.
62348 </param>
62349 <rolecap/>
62350 </interface>
62351 -<interface name="init_rw_initctl" lineno="1816">
62352 +<interface name="init_rw_initctl" lineno="1855">
62353 <summary>
62354 Read and write initctl.
62355 </summary>
62356 @@ -117109,7 +117744,7 @@ Domain allowed access.
62357 </summary>
62358 </param>
62359 </interface>
62360 -<interface name="init_dontaudit_rw_initctl" lineno="1837">
62361 +<interface name="init_dontaudit_rw_initctl" lineno="1876">
62362 <summary>
62363 Do not audit attempts to read and
62364 write initctl.
62365 @@ -117120,7 +117755,7 @@ Domain to not audit.
62366 </summary>
62367 </param>
62368 </interface>
62369 -<interface name="init_script_file_entry_type" lineno="1856">
62370 +<interface name="init_script_file_entry_type" lineno="1895">
62371 <summary>
62372 Make init scripts an entry point for
62373 the specified domain.
62374 @@ -117131,7 +117766,7 @@ Domain allowed access.
62375 </summary>
62376 </param>
62377 </interface>
62378 -<interface name="init_spec_domtrans_script" lineno="1879">
62379 +<interface name="init_spec_domtrans_script" lineno="1918">
62380 <summary>
62381 Execute init scripts with a specified domain transition.
62382 </summary>
62383 @@ -117141,7 +117776,7 @@ Domain allowed to transition.
62384 </summary>
62385 </param>
62386 </interface>
62387 -<interface name="init_domtrans_script" lineno="1906">
62388 +<interface name="init_domtrans_script" lineno="1945">
62389 <summary>
62390 Execute init scripts with an automatic domain transition.
62391 </summary>
62392 @@ -117151,7 +117786,7 @@ Domain allowed to transition.
62393 </summary>
62394 </param>
62395 </interface>
62396 -<interface name="init_domtrans_labeled_script" lineno="1941">
62397 +<interface name="init_domtrans_labeled_script" lineno="1980">
62398 <summary>
62399 Execute labelled init scripts with an automatic domain transition.
62400 </summary>
62401 @@ -117161,7 +117796,7 @@ Domain allowed to transition.
62402 </summary>
62403 </param>
62404 </interface>
62405 -<interface name="init_script_file_domtrans" lineno="1987">
62406 +<interface name="init_script_file_domtrans" lineno="2026">
62407 <summary>
62408 Execute a init script in a specified domain.
62409 </summary>
62410 @@ -117186,7 +117821,7 @@ Domain to transition to.
62411 </summary>
62412 </param>
62413 </interface>
62414 -<interface name="init_kill_scripts" lineno="2006">
62415 +<interface name="init_kill_scripts" lineno="2045">
62416 <summary>
62417 Send a kill signal to init scripts.
62418 </summary>
62419 @@ -117196,7 +117831,7 @@ Domain allowed access.
62420 </summary>
62421 </param>
62422 </interface>
62423 -<interface name="init_manage_script_service" lineno="2024">
62424 +<interface name="init_manage_script_service" lineno="2063">
62425 <summary>
62426 Allow manage service for initrc_exec_t scripts
62427 </summary>
62428 @@ -117206,7 +117841,7 @@ Target domain
62429 </summary>
62430 </param>
62431 </interface>
62432 -<interface name="init_labeled_script_domtrans" lineno="2049">
62433 +<interface name="init_labeled_script_domtrans" lineno="2088">
62434 <summary>
62435 Transition to the init script domain
62436 on a specified labeled init script.
62437 @@ -117222,7 +117857,7 @@ Labeled init script file.
62438 </summary>
62439 </param>
62440 </interface>
62441 -<interface name="init_all_labeled_script_domtrans" lineno="2071">
62442 +<interface name="init_all_labeled_script_domtrans" lineno="2110">
62443 <summary>
62444 Transition to the init script domain
62445 for all labeled init script types
62446 @@ -117233,7 +117868,7 @@ Domain allowed to transition.
62447 </summary>
62448 </param>
62449 </interface>
62450 -<interface name="init_get_script_status" lineno="2089">
62451 +<interface name="init_get_script_status" lineno="2128">
62452 <summary>
62453 Allow getting service status of initrc_exec_t scripts
62454 </summary>
62455 @@ -117243,7 +117878,7 @@ Target domain
62456 </summary>
62457 </param>
62458 </interface>
62459 -<interface name="init_startstop_service" lineno="2129">
62460 +<interface name="init_startstop_service" lineno="2168">
62461 <summary>
62462 Allow the role to start and stop
62463 labeled services.
62464 @@ -117274,7 +117909,7 @@ Systemd unit file type.
62465 </summary>
62466 </param>
62467 </interface>
62468 -<interface name="init_run_daemon" lineno="2185">
62469 +<interface name="init_run_daemon" lineno="2224">
62470 <summary>
62471 Start and stop daemon programs directly.
62472 </summary>
62473 @@ -117296,7 +117931,7 @@ The role to be performing this action.
62474 </summary>
62475 </param>
62476 </interface>
62477 -<interface name="init_startstop_all_script_services" lineno="2207">
62478 +<interface name="init_startstop_all_script_services" lineno="2246">
62479 <summary>
62480 Start and stop init_script_file_type services
62481 </summary>
62482 @@ -117306,7 +117941,7 @@ domain that can start and stop the services
62483 </summary>
62484 </param>
62485 </interface>
62486 -<interface name="init_read_state" lineno="2226">
62487 +<interface name="init_read_state" lineno="2265">
62488 <summary>
62489 Read the process state (/proc/pid) of init.
62490 </summary>
62491 @@ -117316,7 +117951,7 @@ Domain allowed access.
62492 </summary>
62493 </param>
62494 </interface>
62495 -<interface name="init_dontaudit_read_state" lineno="2246">
62496 +<interface name="init_dontaudit_read_state" lineno="2285">
62497 <summary>
62498 Dontaudit read the process state (/proc/pid) of init.
62499 </summary>
62500 @@ -117326,7 +117961,7 @@ Domain to not audit.
62501 </summary>
62502 </param>
62503 </interface>
62504 -<interface name="init_ptrace" lineno="2267">
62505 +<interface name="init_ptrace" lineno="2306">
62506 <summary>
62507 Ptrace init
62508 </summary>
62509 @@ -117337,7 +117972,7 @@ Domain allowed access.
62510 </param>
62511 <rolecap/>
62512 </interface>
62513 -<interface name="init_getattr" lineno="2286">
62514 +<interface name="init_getattr" lineno="2325">
62515 <summary>
62516 get init process stats
62517 </summary>
62518 @@ -117348,7 +117983,7 @@ Domain allowed access.
62519 </param>
62520 <rolecap/>
62521 </interface>
62522 -<interface name="init_read_script_pipes" lineno="2304">
62523 +<interface name="init_read_script_pipes" lineno="2343">
62524 <summary>
62525 Read an init script unnamed pipe.
62526 </summary>
62527 @@ -117358,7 +117993,7 @@ Domain allowed access.
62528 </summary>
62529 </param>
62530 </interface>
62531 -<interface name="init_write_script_pipes" lineno="2322">
62532 +<interface name="init_write_script_pipes" lineno="2361">
62533 <summary>
62534 Write an init script unnamed pipe.
62535 </summary>
62536 @@ -117368,7 +118003,7 @@ Domain allowed access.
62537 </summary>
62538 </param>
62539 </interface>
62540 -<interface name="init_getattr_script_files" lineno="2340">
62541 +<interface name="init_getattr_script_files" lineno="2379">
62542 <summary>
62543 Get the attribute of init script entrypoint files.
62544 </summary>
62545 @@ -117378,7 +118013,7 @@ Domain allowed access.
62546 </summary>
62547 </param>
62548 </interface>
62549 -<interface name="init_read_script_files" lineno="2359">
62550 +<interface name="init_read_script_files" lineno="2398">
62551 <summary>
62552 Read init scripts.
62553 </summary>
62554 @@ -117388,7 +118023,7 @@ Domain allowed access.
62555 </summary>
62556 </param>
62557 </interface>
62558 -<interface name="init_exec_script_files" lineno="2378">
62559 +<interface name="init_exec_script_files" lineno="2417">
62560 <summary>
62561 Execute init scripts in the caller domain.
62562 </summary>
62563 @@ -117398,7 +118033,7 @@ Domain allowed access.
62564 </summary>
62565 </param>
62566 </interface>
62567 -<interface name="init_getattr_all_script_files" lineno="2397">
62568 +<interface name="init_getattr_all_script_files" lineno="2436">
62569 <summary>
62570 Get the attribute of all init script entrypoint files.
62571 </summary>
62572 @@ -117408,7 +118043,7 @@ Domain allowed access.
62573 </summary>
62574 </param>
62575 </interface>
62576 -<interface name="init_read_all_script_files" lineno="2416">
62577 +<interface name="init_read_all_script_files" lineno="2455">
62578 <summary>
62579 Read all init script files.
62580 </summary>
62581 @@ -117418,7 +118053,7 @@ Domain allowed access.
62582 </summary>
62583 </param>
62584 </interface>
62585 -<interface name="init_dontaudit_read_all_script_files" lineno="2440">
62586 +<interface name="init_dontaudit_read_all_script_files" lineno="2479">
62587 <summary>
62588 Dontaudit read all init script files.
62589 </summary>
62590 @@ -117428,7 +118063,7 @@ Domain to not audit.
62591 </summary>
62592 </param>
62593 </interface>
62594 -<interface name="init_exec_all_script_files" lineno="2458">
62595 +<interface name="init_exec_all_script_files" lineno="2497">
62596 <summary>
62597 Execute all init scripts in the caller domain.
62598 </summary>
62599 @@ -117438,7 +118073,7 @@ Domain allowed access.
62600 </summary>
62601 </param>
62602 </interface>
62603 -<interface name="init_read_script_state" lineno="2477">
62604 +<interface name="init_read_script_state" lineno="2516">
62605 <summary>
62606 Read the process state (/proc/pid) of the init scripts.
62607 </summary>
62608 @@ -117448,7 +118083,7 @@ Domain allowed access.
62609 </summary>
62610 </param>
62611 </interface>
62612 -<interface name="init_use_script_fds" lineno="2496">
62613 +<interface name="init_use_script_fds" lineno="2535">
62614 <summary>
62615 Inherit and use init script file descriptors.
62616 </summary>
62617 @@ -117458,7 +118093,7 @@ Domain allowed access.
62618 </summary>
62619 </param>
62620 </interface>
62621 -<interface name="init_dontaudit_use_script_fds" lineno="2515">
62622 +<interface name="init_dontaudit_use_script_fds" lineno="2554">
62623 <summary>
62624 Do not audit attempts to inherit
62625 init script file descriptors.
62626 @@ -117469,7 +118104,7 @@ Domain to not audit.
62627 </summary>
62628 </param>
62629 </interface>
62630 -<interface name="init_search_script_keys" lineno="2533">
62631 +<interface name="init_search_script_keys" lineno="2572">
62632 <summary>
62633 Search init script keys.
62634 </summary>
62635 @@ -117479,7 +118114,7 @@ Domain allowed access.
62636 </summary>
62637 </param>
62638 </interface>
62639 -<interface name="init_getpgid_script" lineno="2551">
62640 +<interface name="init_getpgid_script" lineno="2590">
62641 <summary>
62642 Get the process group ID of init scripts.
62643 </summary>
62644 @@ -117489,7 +118124,7 @@ Domain allowed access.
62645 </summary>
62646 </param>
62647 </interface>
62648 -<interface name="init_sigchld_script" lineno="2569">
62649 +<interface name="init_sigchld_script" lineno="2608">
62650 <summary>
62651 Send SIGCHLD signals to init scripts.
62652 </summary>
62653 @@ -117499,7 +118134,7 @@ Domain allowed access.
62654 </summary>
62655 </param>
62656 </interface>
62657 -<interface name="init_signal_script" lineno="2587">
62658 +<interface name="init_signal_script" lineno="2626">
62659 <summary>
62660 Send generic signals to init scripts.
62661 </summary>
62662 @@ -117509,7 +118144,7 @@ Domain allowed access.
62663 </summary>
62664 </param>
62665 </interface>
62666 -<interface name="init_signull_script" lineno="2605">
62667 +<interface name="init_signull_script" lineno="2644">
62668 <summary>
62669 Send null signals to init scripts.
62670 </summary>
62671 @@ -117519,7 +118154,7 @@ Domain allowed access.
62672 </summary>
62673 </param>
62674 </interface>
62675 -<interface name="init_rw_script_pipes" lineno="2623">
62676 +<interface name="init_rw_script_pipes" lineno="2662">
62677 <summary>
62678 Read and write init script unnamed pipes.
62679 </summary>
62680 @@ -117529,7 +118164,7 @@ Domain allowed access.
62681 </summary>
62682 </param>
62683 </interface>
62684 -<interface name="init_stream_connect_script" lineno="2642">
62685 +<interface name="init_stream_connect_script" lineno="2681">
62686 <summary>
62687 Allow the specified domain to connect to
62688 init scripts with a unix socket.
62689 @@ -117540,7 +118175,7 @@ Domain allowed access.
62690 </summary>
62691 </param>
62692 </interface>
62693 -<interface name="init_rw_script_stream_sockets" lineno="2661">
62694 +<interface name="init_rw_script_stream_sockets" lineno="2700">
62695 <summary>
62696 Allow the specified domain to read/write to
62697 init scripts with a unix domain stream sockets.
62698 @@ -117551,7 +118186,7 @@ Domain allowed access.
62699 </summary>
62700 </param>
62701 </interface>
62702 -<interface name="init_dontaudit_stream_connect_script" lineno="2680">
62703 +<interface name="init_dontaudit_stream_connect_script" lineno="2719">
62704 <summary>
62705 Dont audit the specified domain connecting to
62706 init scripts with a unix domain stream socket.
62707 @@ -117562,7 +118197,7 @@ Domain to not audit.
62708 </summary>
62709 </param>
62710 </interface>
62711 -<interface name="init_dbus_send_script" lineno="2697">
62712 +<interface name="init_dbus_send_script" lineno="2736">
62713 <summary>
62714 Send messages to init scripts over dbus.
62715 </summary>
62716 @@ -117572,7 +118207,7 @@ Domain allowed access.
62717 </summary>
62718 </param>
62719 </interface>
62720 -<interface name="init_dbus_chat_script" lineno="2717">
62721 +<interface name="init_dbus_chat_script" lineno="2756">
62722 <summary>
62723 Send and receive messages from
62724 init scripts over dbus.
62725 @@ -117583,7 +118218,7 @@ Domain allowed access.
62726 </summary>
62727 </param>
62728 </interface>
62729 -<interface name="init_use_script_ptys" lineno="2746">
62730 +<interface name="init_use_script_ptys" lineno="2785">
62731 <summary>
62732 Read and write the init script pty.
62733 </summary>
62734 @@ -117602,7 +118237,7 @@ Domain allowed access.
62735 </summary>
62736 </param>
62737 </interface>
62738 -<interface name="init_use_inherited_script_ptys" lineno="2765">
62739 +<interface name="init_use_inherited_script_ptys" lineno="2804">
62740 <summary>
62741 Read and write inherited init script ptys.
62742 </summary>
62743 @@ -117612,7 +118247,7 @@ Domain allowed access.
62744 </summary>
62745 </param>
62746 </interface>
62747 -<interface name="init_dontaudit_use_script_ptys" lineno="2787">
62748 +<interface name="init_dontaudit_use_script_ptys" lineno="2826">
62749 <summary>
62750 Do not audit attempts to read and
62751 write the init script pty.
62752 @@ -117623,7 +118258,7 @@ Domain to not audit.
62753 </summary>
62754 </param>
62755 </interface>
62756 -<interface name="init_getattr_script_status_files" lineno="2806">
62757 +<interface name="init_getattr_script_status_files" lineno="2845">
62758 <summary>
62759 Get the attributes of init script
62760 status files.
62761 @@ -117634,7 +118269,7 @@ Domain allowed access.
62762 </summary>
62763 </param>
62764 </interface>
62765 -<interface name="init_dontaudit_read_script_status_files" lineno="2825">
62766 +<interface name="init_dontaudit_read_script_status_files" lineno="2864">
62767 <summary>
62768 Do not audit attempts to read init script
62769 status files.
62770 @@ -117645,7 +118280,7 @@ Domain to not audit.
62771 </summary>
62772 </param>
62773 </interface>
62774 -<interface name="init_search_run" lineno="2844">
62775 +<interface name="init_search_run" lineno="2883">
62776 <summary>
62777 Search the /run/systemd directory.
62778 </summary>
62779 @@ -117655,7 +118290,7 @@ Domain allowed access.
62780 </summary>
62781 </param>
62782 </interface>
62783 -<interface name="init_read_script_tmp_files" lineno="2863">
62784 +<interface name="init_read_script_tmp_files" lineno="2902">
62785 <summary>
62786 Read init script temporary data.
62787 </summary>
62788 @@ -117665,7 +118300,7 @@ Domain allowed access.
62789 </summary>
62790 </param>
62791 </interface>
62792 -<interface name="init_rw_inherited_script_tmp_files" lineno="2882">
62793 +<interface name="init_rw_inherited_script_tmp_files" lineno="2921">
62794 <summary>
62795 Read and write init script inherited temporary data.
62796 </summary>
62797 @@ -117675,7 +118310,7 @@ Domain allowed access.
62798 </summary>
62799 </param>
62800 </interface>
62801 -<interface name="init_rw_script_tmp_files" lineno="2900">
62802 +<interface name="init_rw_script_tmp_files" lineno="2939">
62803 <summary>
62804 Read and write init script temporary data.
62805 </summary>
62806 @@ -117685,7 +118320,7 @@ Domain allowed access.
62807 </summary>
62808 </param>
62809 </interface>
62810 -<interface name="init_script_tmp_filetrans" lineno="2935">
62811 +<interface name="init_script_tmp_filetrans" lineno="2974">
62812 <summary>
62813 Create files in a init script
62814 temporary data directory.
62815 @@ -117711,7 +118346,7 @@ The name of the object being created.
62816 </summary>
62817 </param>
62818 </interface>
62819 -<interface name="init_getattr_utmp" lineno="2954">
62820 +<interface name="init_getattr_utmp" lineno="2993">
62821 <summary>
62822 Get the attributes of init script process id files.
62823 </summary>
62824 @@ -117721,7 +118356,7 @@ Domain allowed access.
62825 </summary>
62826 </param>
62827 </interface>
62828 -<interface name="init_read_utmp" lineno="2972">
62829 +<interface name="init_read_utmp" lineno="3011">
62830 <summary>
62831 Read utmp.
62832 </summary>
62833 @@ -117731,7 +118366,7 @@ Domain allowed access.
62834 </summary>
62835 </param>
62836 </interface>
62837 -<interface name="init_dontaudit_write_utmp" lineno="2991">
62838 +<interface name="init_dontaudit_write_utmp" lineno="3030">
62839 <summary>
62840 Do not audit attempts to write utmp.
62841 </summary>
62842 @@ -117741,7 +118376,7 @@ Domain to not audit.
62843 </summary>
62844 </param>
62845 </interface>
62846 -<interface name="init_write_utmp" lineno="3009">
62847 +<interface name="init_write_utmp" lineno="3048">
62848 <summary>
62849 Write to utmp.
62850 </summary>
62851 @@ -117751,7 +118386,7 @@ Domain allowed access.
62852 </summary>
62853 </param>
62854 </interface>
62855 -<interface name="init_dontaudit_lock_utmp" lineno="3029">
62856 +<interface name="init_dontaudit_lock_utmp" lineno="3068">
62857 <summary>
62858 Do not audit attempts to lock
62859 init script pid files.
62860 @@ -117762,7 +118397,7 @@ Domain to not audit.
62861 </summary>
62862 </param>
62863 </interface>
62864 -<interface name="init_rw_utmp" lineno="3047">
62865 +<interface name="init_rw_utmp" lineno="3086">
62866 <summary>
62867 Read and write utmp.
62868 </summary>
62869 @@ -117772,7 +118407,7 @@ Domain allowed access.
62870 </summary>
62871 </param>
62872 </interface>
62873 -<interface name="init_dontaudit_rw_utmp" lineno="3066">
62874 +<interface name="init_dontaudit_rw_utmp" lineno="3105">
62875 <summary>
62876 Do not audit attempts to read and write utmp.
62877 </summary>
62878 @@ -117782,7 +118417,7 @@ Domain to not audit.
62879 </summary>
62880 </param>
62881 </interface>
62882 -<interface name="init_manage_utmp" lineno="3084">
62883 +<interface name="init_manage_utmp" lineno="3123">
62884 <summary>
62885 Create, read, write, and delete utmp.
62886 </summary>
62887 @@ -117792,7 +118427,7 @@ Domain allowed access.
62888 </summary>
62889 </param>
62890 </interface>
62891 -<interface name="init_watch_utmp" lineno="3103">
62892 +<interface name="init_watch_utmp" lineno="3142">
62893 <summary>
62894 Add a watch on utmp.
62895 </summary>
62896 @@ -117802,7 +118437,7 @@ Domain allowed access.
62897 </summary>
62898 </param>
62899 </interface>
62900 -<interface name="init_relabel_utmp" lineno="3121">
62901 +<interface name="init_relabel_utmp" lineno="3160">
62902 <summary>
62903 Relabel utmp.
62904 </summary>
62905 @@ -117812,7 +118447,7 @@ Domain allowed access.
62906 </summary>
62907 </param>
62908 </interface>
62909 -<interface name="init_runtime_filetrans_utmp" lineno="3140">
62910 +<interface name="init_runtime_filetrans_utmp" lineno="3179">
62911 <summary>
62912 Create files in /var/run with the
62913 utmp file type.
62914 @@ -117823,7 +118458,7 @@ Domain allowed access.
62915 </summary>
62916 </param>
62917 </interface>
62918 -<interface name="init_create_runtime_dirs" lineno="3158">
62919 +<interface name="init_create_runtime_dirs" lineno="3197">
62920 <summary>
62921 Create a directory in the /run/systemd directory.
62922 </summary>
62923 @@ -117833,7 +118468,7 @@ Domain allowed access.
62924 </summary>
62925 </param>
62926 </interface>
62927 -<interface name="init_read_runtime_files" lineno="3177">
62928 +<interface name="init_read_runtime_files" lineno="3216">
62929 <summary>
62930 Read init_runtime_t files
62931 </summary>
62932 @@ -117843,7 +118478,7 @@ domain
62933 </summary>
62934 </param>
62935 </interface>
62936 -<interface name="init_rename_runtime_files" lineno="3195">
62937 +<interface name="init_rename_runtime_files" lineno="3234">
62938 <summary>
62939 Rename init_runtime_t files
62940 </summary>
62941 @@ -117853,7 +118488,7 @@ domain
62942 </summary>
62943 </param>
62944 </interface>
62945 -<interface name="init_setattr_runtime_files" lineno="3213">
62946 +<interface name="init_setattr_runtime_files" lineno="3252">
62947 <summary>
62948 Setattr init_runtime_t files
62949 </summary>
62950 @@ -117863,7 +118498,7 @@ domain
62951 </summary>
62952 </param>
62953 </interface>
62954 -<interface name="init_delete_runtime_files" lineno="3231">
62955 +<interface name="init_delete_runtime_files" lineno="3270">
62956 <summary>
62957 Delete init_runtime_t files
62958 </summary>
62959 @@ -117873,7 +118508,7 @@ domain
62960 </summary>
62961 </param>
62962 </interface>
62963 -<interface name="init_write_runtime_socket" lineno="3250">
62964 +<interface name="init_write_runtime_socket" lineno="3289">
62965 <summary>
62966 Allow the specified domain to write to
62967 init sock file.
62968 @@ -117884,7 +118519,7 @@ Domain allowed access.
62969 </summary>
62970 </param>
62971 </interface>
62972 -<interface name="init_read_runtime_pipes" lineno="3268">
62973 +<interface name="init_read_runtime_pipes" lineno="3307">
62974 <summary>
62975 Read init unnamed pipes.
62976 </summary>
62977 @@ -117894,7 +118529,7 @@ Domain allowed access.
62978 </summary>
62979 </param>
62980 </interface>
62981 -<interface name="init_read_runtime_symlinks" lineno="3286">
62982 +<interface name="init_read_runtime_symlinks" lineno="3325">
62983 <summary>
62984 read systemd unit symlinks (usually under /run/systemd/units/)
62985 </summary>
62986 @@ -117904,7 +118539,7 @@ Domain allowed access.
62987 </summary>
62988 </param>
62989 </interface>
62990 -<interface name="init_tcp_recvfrom_all_daemons" lineno="3304">
62991 +<interface name="init_tcp_recvfrom_all_daemons" lineno="3343">
62992 <summary>
62993 Allow the specified domain to connect to daemon with a tcp socket
62994 </summary>
62995 @@ -117914,7 +118549,7 @@ Domain allowed access.
62996 </summary>
62997 </param>
62998 </interface>
62999 -<interface name="init_udp_recvfrom_all_daemons" lineno="3322">
63000 +<interface name="init_udp_recvfrom_all_daemons" lineno="3361">
63001 <summary>
63002 Allow the specified domain to connect to daemon with a udp socket
63003 </summary>
63004 @@ -117924,7 +118559,7 @@ Domain allowed access.
63005 </summary>
63006 </param>
63007 </interface>
63008 -<interface name="init_read_script_status_files" lineno="3341">
63009 +<interface name="init_read_script_status_files" lineno="3380">
63010 <summary>
63011 Allow reading the init script state files
63012 </summary>
63013 @@ -117934,7 +118569,7 @@ Domain allowed access
63014 </summary>
63015 </param>
63016 </interface>
63017 -<interface name="init_relabelto_script_state" lineno="3359">
63018 +<interface name="init_relabelto_script_state" lineno="3398">
63019 <summary>
63020 Label to init script status files
63021 </summary>
63022 @@ -117944,7 +118579,7 @@ Domain allowed access
63023 </summary>
63024 </param>
63025 </interface>
63026 -<interface name="init_script_readable_type" lineno="3378">
63027 +<interface name="init_script_readable_type" lineno="3417">
63028 <summary>
63029 Mark as a readable type for the initrc_t domain
63030 </summary>
63031 @@ -117954,7 +118589,7 @@ Type that initrc_t needs read access to
63032 </summary>
63033 </param>
63034 </interface>
63035 -<interface name="init_search_units" lineno="3396">
63036 +<interface name="init_search_units" lineno="3435">
63037 <summary>
63038 Search systemd unit dirs.
63039 </summary>
63040 @@ -117964,7 +118599,7 @@ Domain allowed access.
63041 </summary>
63042 </param>
63043 </interface>
63044 -<interface name="init_list_unit_dirs" lineno="3421">
63045 +<interface name="init_list_unit_dirs" lineno="3460">
63046 <summary>
63047 List systemd unit dirs.
63048 </summary>
63049 @@ -117974,7 +118609,17 @@ Domain allowed access.
63050 </summary>
63051 </param>
63052 </interface>
63053 -<interface name="init_read_generic_units_files" lineno="3441">
63054 +<interface name="init_getattr_generic_units_files" lineno="3480">
63055 +<summary>
63056 +Get the attributes of systemd unit files
63057 +</summary>
63058 +<param name="domain">
63059 +<summary>
63060 +Domain allowed access.
63061 +</summary>
63062 +</param>
63063 +</interface>
63064 +<interface name="init_read_generic_units_files" lineno="3498">
63065 <summary>
63066 Read systemd unit files
63067 </summary>
63068 @@ -117984,7 +118629,7 @@ Domain allowed access.
63069 </summary>
63070 </param>
63071 </interface>
63072 -<interface name="init_read_generic_units_symlinks" lineno="3459">
63073 +<interface name="init_read_generic_units_symlinks" lineno="3516">
63074 <summary>
63075 Read systemd unit links
63076 </summary>
63077 @@ -117994,7 +118639,7 @@ Domain allowed access.
63078 </summary>
63079 </param>
63080 </interface>
63081 -<interface name="init_get_generic_units_status" lineno="3477">
63082 +<interface name="init_get_generic_units_status" lineno="3534">
63083 <summary>
63084 Get status of generic systemd units.
63085 </summary>
63086 @@ -118004,7 +118649,7 @@ Domain allowed access.
63087 </summary>
63088 </param>
63089 </interface>
63090 -<interface name="init_start_generic_units" lineno="3496">
63091 +<interface name="init_start_generic_units" lineno="3553">
63092 <summary>
63093 Start generic systemd units.
63094 </summary>
63095 @@ -118014,7 +118659,7 @@ Domain allowed access.
63096 </summary>
63097 </param>
63098 </interface>
63099 -<interface name="init_stop_generic_units" lineno="3515">
63100 +<interface name="init_stop_generic_units" lineno="3572">
63101 <summary>
63102 Stop generic systemd units.
63103 </summary>
63104 @@ -118024,7 +118669,7 @@ Domain to not audit.
63105 </summary>
63106 </param>
63107 </interface>
63108 -<interface name="init_reload_generic_units" lineno="3534">
63109 +<interface name="init_reload_generic_units" lineno="3591">
63110 <summary>
63111 Reload generic systemd units.
63112 </summary>
63113 @@ -118034,7 +118679,47 @@ Domain allowed access.
63114 </summary>
63115 </param>
63116 </interface>
63117 -<interface name="init_get_all_units_status" lineno="3553">
63118 +<interface name="init_get_transient_units_status" lineno="3610">
63119 +<summary>
63120 +Get status of transient systemd units.
63121 +</summary>
63122 +<param name="domain">
63123 +<summary>
63124 +Domain allowed access.
63125 +</summary>
63126 +</param>
63127 +</interface>
63128 +<interface name="init_start_transient_units" lineno="3629">
63129 +<summary>
63130 +Start transient systemd units.
63131 +</summary>
63132 +<param name="domain">
63133 +<summary>
63134 +Domain allowed access.
63135 +</summary>
63136 +</param>
63137 +</interface>
63138 +<interface name="init_stop_transient_units" lineno="3648">
63139 +<summary>
63140 +Stop transient systemd units.
63141 +</summary>
63142 +<param name="domain">
63143 +<summary>
63144 +Domain to not audit.
63145 +</summary>
63146 +</param>
63147 +</interface>
63148 +<interface name="init_reload_transient_units" lineno="3667">
63149 +<summary>
63150 +Reload transient systemd units.
63151 +</summary>
63152 +<param name="domain">
63153 +<summary>
63154 +Domain allowed access.
63155 +</summary>
63156 +</param>
63157 +</interface>
63158 +<interface name="init_get_all_units_status" lineno="3687">
63159 <summary>
63160 Get status of all systemd units.
63161 </summary>
63162 @@ -118044,7 +118729,7 @@ Domain allowed access.
63163 </summary>
63164 </param>
63165 </interface>
63166 -<interface name="init_manage_all_units" lineno="3572">
63167 +<interface name="init_manage_all_units" lineno="3706">
63168 <summary>
63169 All perms on all systemd units.
63170 </summary>
63171 @@ -118054,7 +118739,7 @@ Domain allowed access.
63172 </summary>
63173 </param>
63174 </interface>
63175 -<interface name="init_start_all_units" lineno="3592">
63176 +<interface name="init_start_all_units" lineno="3726">
63177 <summary>
63178 Start all systemd units.
63179 </summary>
63180 @@ -118064,7 +118749,7 @@ Domain allowed access.
63181 </summary>
63182 </param>
63183 </interface>
63184 -<interface name="init_stop_all_units" lineno="3611">
63185 +<interface name="init_stop_all_units" lineno="3745">
63186 <summary>
63187 Stop all systemd units.
63188 </summary>
63189 @@ -118074,7 +118759,7 @@ Domain to not audit.
63190 </summary>
63191 </param>
63192 </interface>
63193 -<interface name="init_reload_all_units" lineno="3630">
63194 +<interface name="init_reload_all_units" lineno="3764">
63195 <summary>
63196 Reload all systemd units.
63197 </summary>
63198 @@ -118084,7 +118769,7 @@ Domain allowed access.
63199 </summary>
63200 </param>
63201 </interface>
63202 -<interface name="init_manage_all_unit_files" lineno="3649">
63203 +<interface name="init_manage_all_unit_files" lineno="3783">
63204 <summary>
63205 Manage systemd unit dirs and the files in them
63206 </summary>
63207 @@ -118094,7 +118779,7 @@ Domain allowed access.
63208 </summary>
63209 </param>
63210 </interface>
63211 -<interface name="init_linkable_keyring" lineno="3670">
63212 +<interface name="init_linkable_keyring" lineno="3804">
63213 <summary>
63214 Associate the specified domain to be a domain whose
63215 keyring init should be allowed to link.
63216 @@ -118105,7 +118790,7 @@ Domain whose keyring init should be allowed to link.
63217 </summary>
63218 </param>
63219 </interface>
63220 -<interface name="init_admin" lineno="3688">
63221 +<interface name="init_admin" lineno="3822">
63222 <summary>
63223 Allow unconfined access to send instructions to init
63224 </summary>
63225 @@ -118115,7 +118800,7 @@ Target domain
63226 </summary>
63227 </param>
63228 </interface>
63229 -<interface name="init_getrlimit" lineno="3720">
63230 +<interface name="init_getrlimit" lineno="3854">
63231 <summary>
63232 Allow getting init_t rlimit
63233 </summary>
63234 @@ -118412,7 +119097,7 @@ Domain allowed to transition.
63235 </summary>
63236 </param>
63237 </interface>
63238 -<interface name="iptables_run" lineno="43">
63239 +<interface name="iptables_run" lineno="41">
63240 <summary>
63241 Execute iptables in the iptables domain, and
63242 allow the specified role the iptables domain.
63243 @@ -118429,7 +119114,7 @@ Role allowed access.
63244 </param>
63245 <rolecap/>
63246 </interface>
63247 -<interface name="iptables_exec" lineno="62">
63248 +<interface name="iptables_exec" lineno="60">
63249 <summary>
63250 Execute iptables in the caller domain.
63251 </summary>
63252 @@ -118439,7 +119124,7 @@ Domain allowed access.
63253 </summary>
63254 </param>
63255 </interface>
63256 -<interface name="iptables_initrc_domtrans" lineno="82">
63257 +<interface name="iptables_initrc_domtrans" lineno="80">
63258 <summary>
63259 Execute iptables init scripts in
63260 the init script domain.
63261 @@ -118450,7 +119135,7 @@ Domain allowed to transition.
63262 </summary>
63263 </param>
63264 </interface>
63265 -<interface name="iptables_setattr_config" lineno="100">
63266 +<interface name="iptables_setattr_config" lineno="98">
63267 <summary>
63268 Set the attributes of iptables config files.
63269 </summary>
63270 @@ -118460,7 +119145,7 @@ Domain allowed access.
63271 </summary>
63272 </param>
63273 </interface>
63274 -<interface name="iptables_read_config" lineno="119">
63275 +<interface name="iptables_read_config" lineno="117">
63276 <summary>
63277 Read iptables config files.
63278 </summary>
63279 @@ -118470,7 +119155,7 @@ Domain allowed access.
63280 </summary>
63281 </param>
63282 </interface>
63283 -<interface name="iptables_etc_filetrans_config" lineno="140">
63284 +<interface name="iptables_etc_filetrans_config" lineno="138">
63285 <summary>
63286 Create files in /etc with the type used for
63287 the iptables config files.
63288 @@ -118481,7 +119166,7 @@ Domain allowed access.
63289 </summary>
63290 </param>
63291 </interface>
63292 -<interface name="iptables_manage_config" lineno="158">
63293 +<interface name="iptables_manage_config" lineno="156">
63294 <summary>
63295 Manage iptables config files.
63296 </summary>
63297 @@ -118491,7 +119176,7 @@ Domain allowed access.
63298 </summary>
63299 </param>
63300 </interface>
63301 -<interface name="iptables_dontaudit_read_pids" lineno="177">
63302 +<interface name="iptables_dontaudit_read_pids" lineno="175">
63303 <summary>
63304 dontaudit reading iptables_runtime_t (Deprecated)
63305 </summary>
63306 @@ -118501,7 +119186,7 @@ Domain to not audit.
63307 </summary>
63308 </param>
63309 </interface>
63310 -<interface name="iptables_dontaudit_read_runtime_files" lineno="192">
63311 +<interface name="iptables_dontaudit_read_runtime_files" lineno="190">
63312 <summary>
63313 Do not audit reading iptables runtime files.
63314 </summary>
63315 @@ -118511,7 +119196,7 @@ Domain to not audit.
63316 </summary>
63317 </param>
63318 </interface>
63319 -<interface name="iptables_startstop" lineno="210">
63320 +<interface name="iptables_startstop" lineno="208">
63321 <summary>
63322 Allow specified domain to start and stop iptables service
63323 </summary>
63324 @@ -118521,7 +119206,7 @@ Domain allowed access.
63325 </summary>
63326 </param>
63327 </interface>
63328 -<interface name="iptables_status" lineno="229">
63329 +<interface name="iptables_status" lineno="227">
63330 <summary>
63331 Allow specified domain to get status of iptables service
63332 </summary>
63333 @@ -118531,7 +119216,7 @@ Domain allowed access.
63334 </summary>
63335 </param>
63336 </interface>
63337 -<interface name="iptables_admin" lineno="256">
63338 +<interface name="iptables_admin" lineno="254">
63339 <summary>
63340 All of the rules required to
63341 administrate an iptables
63342 @@ -118743,7 +119428,24 @@ Domain to not audit.
63343 </summary>
63344 </param>
63345 </interface>
63346 -<interface name="libs_manage_lib_dirs" lineno="246">
63347 +<interface name="libs_dontaudit_manage_lib_dirs" lineno="253">
63348 +<summary>
63349 +Do not audit attempts to manage to library directories.
63350 +</summary>
63351 +<desc>
63352 +<p>
63353 +Do not audit attempts to manage to library directories.
63354 +Typically this is used to quiet attempts to recompile
63355 +python byte code.
63356 +</p>
63357 +</desc>
63358 +<param name="domain">
63359 +<summary>
63360 +Domain to not audit.
63361 +</summary>
63362 +</param>
63363 +</interface>
63364 +<interface name="libs_manage_lib_dirs" lineno="271">
63365 <summary>
63366 Create, read, write, and delete library directories.
63367 </summary>
63368 @@ -118753,7 +119455,7 @@ Domain allowed access.
63369 </summary>
63370 </param>
63371 </interface>
63372 -<interface name="libs_dontaudit_setattr_lib_files" lineno="264">
63373 +<interface name="libs_dontaudit_setattr_lib_files" lineno="289">
63374 <summary>
63375 dontaudit attempts to setattr on library files
63376 </summary>
63377 @@ -118763,7 +119465,7 @@ Domain to not audit.
63378 </summary>
63379 </param>
63380 </interface>
63381 -<interface name="libs_read_lib_files" lineno="283">
63382 +<interface name="libs_read_lib_files" lineno="308">
63383 <summary>
63384 Read files in the library directories, such
63385 as static libraries.
63386 @@ -118774,7 +119476,7 @@ Domain allowed access.
63387 </summary>
63388 </param>
63389 </interface>
63390 -<interface name="libs_exec_lib_files" lineno="304">
63391 +<interface name="libs_exec_lib_files" lineno="329">
63392 <summary>
63393 Execute library scripts in the caller domain.
63394 </summary>
63395 @@ -118784,7 +119486,7 @@ Domain allowed access.
63396 </summary>
63397 </param>
63398 </interface>
63399 -<interface name="libs_manage_lib_files" lineno="327">
63400 +<interface name="libs_manage_lib_files" lineno="352">
63401 <summary>
63402 Create, read, write, and delete generic
63403 files in library directories.
63404 @@ -118795,7 +119497,18 @@ Domain allowed access.
63405 </summary>
63406 </param>
63407 </interface>
63408 -<interface name="libs_relabelto_lib_files" lineno="345">
63409 +<interface name="libs_dontaudit_manage_lib_files" lineno="371">
63410 +<summary>
63411 +Do not audit attempts to create, read, write,
63412 +and delete generic files in library directories.
63413 +</summary>
63414 +<param name="domain">
63415 +<summary>
63416 +Domain to not audit.
63417 +</summary>
63418 +</param>
63419 +</interface>
63420 +<interface name="libs_relabelto_lib_files" lineno="389">
63421 <summary>
63422 Relabel files to the type used in library directories.
63423 </summary>
63424 @@ -118805,7 +119518,7 @@ Domain allowed access.
63425 </summary>
63426 </param>
63427 </interface>
63428 -<interface name="libs_relabel_lib_files" lineno="365">
63429 +<interface name="libs_relabel_lib_files" lineno="409">
63430 <summary>
63431 Relabel to and from the type used
63432 for generic lib files.
63433 @@ -118816,7 +119529,7 @@ Domain allowed access.
63434 </summary>
63435 </param>
63436 </interface>
63437 -<interface name="libs_delete_lib_symlinks" lineno="384">
63438 +<interface name="libs_delete_lib_symlinks" lineno="428">
63439 <summary>
63440 Delete generic symlinks in library directories.
63441 </summary>
63442 @@ -118826,7 +119539,7 @@ Domain allowed access.
63443 </summary>
63444 </param>
63445 </interface>
63446 -<interface name="libs_manage_lib_symlinks" lineno="402">
63447 +<interface name="libs_manage_lib_symlinks" lineno="446">
63448 <summary>
63449 Manage generic symlinks in library directories.
63450 </summary>
63451 @@ -118836,7 +119549,7 @@ Domain allowed access.
63452 </summary>
63453 </param>
63454 </interface>
63455 -<interface name="libs_manage_shared_libs" lineno="421">
63456 +<interface name="libs_manage_shared_libs" lineno="465">
63457 <summary>
63458 Create, read, write, and delete shared libraries.
63459 </summary>
63460 @@ -118846,7 +119559,7 @@ Domain allowed access.
63461 </summary>
63462 </param>
63463 </interface>
63464 -<interface name="libs_use_shared_libs" lineno="439">
63465 +<interface name="libs_use_shared_libs" lineno="483">
63466 <summary>
63467 Load and execute functions from shared libraries.
63468 </summary>
63469 @@ -118856,7 +119569,7 @@ Domain allowed access.
63470 </summary>
63471 </param>
63472 </interface>
63473 -<interface name="libs_legacy_use_shared_libs" lineno="462">
63474 +<interface name="libs_legacy_use_shared_libs" lineno="506">
63475 <summary>
63476 Load and execute functions from shared libraries,
63477 with legacy support.
63478 @@ -118867,7 +119580,7 @@ Domain allowed access.
63479 </summary>
63480 </param>
63481 </interface>
63482 -<interface name="libs_relabel_shared_libs" lineno="483">
63483 +<interface name="libs_relabel_shared_libs" lineno="527">
63484 <summary>
63485 Relabel to and from the type used for
63486 shared libraries.
63487 @@ -118878,7 +119591,7 @@ Domain allowed access.
63488 </summary>
63489 </param>
63490 </interface>
63491 -<interface name="libs_generic_etc_filetrans_ld_so_cache" lineno="516">
63492 +<interface name="libs_generic_etc_filetrans_ld_so_cache" lineno="560">
63493 <summary>
63494 Create an object in etc with a type transition to
63495 the ld_so_cache_t type
63496 @@ -118901,7 +119614,7 @@ Name of the resource created for which a type transition occurs
63497 </summary>
63498 </param>
63499 </interface>
63500 -<interface name="libs_lib_filetrans" lineno="550">
63501 +<interface name="libs_lib_filetrans" lineno="594">
63502 <summary>
63503 Create an object in the generic lib location with a type transition
63504 to the provided type
63505 @@ -118927,7 +119640,7 @@ Name of the resource created for which a type transition should occur
63506 </summary>
63507 </param>
63508 </interface>
63509 -<interface name="libs_relabel_lib_dirs" lineno="571">
63510 +<interface name="libs_relabel_lib_dirs" lineno="615">
63511 <summary>
63512 Relabel to and from the type used
63513 for generic lib directories.
63514 @@ -122118,7 +122831,17 @@ Domain allowed access.
63515 </summary>
63516 </param>
63517 </interface>
63518 -<interface name="sysnet_domtrans_ifconfig" lineno="627">
63519 +<interface name="sysnet_manage_dhcpc_runtime_files" lineno="627">
63520 +<summary>
63521 +Create, read, write, and delete dhcp client runtime files.
63522 +</summary>
63523 +<param name="domain">
63524 +<summary>
63525 +Domain allowed access.
63526 +</summary>
63527 +</param>
63528 +</interface>
63529 +<interface name="sysnet_domtrans_ifconfig" lineno="645">
63530 <summary>
63531 Execute ifconfig in the ifconfig domain.
63532 </summary>
63533 @@ -122128,7 +122851,7 @@ Domain allowed to transition.
63534 </summary>
63535 </param>
63536 </interface>
63537 -<interface name="sysnet_run_ifconfig" lineno="654">
63538 +<interface name="sysnet_run_ifconfig" lineno="672">
63539 <summary>
63540 Execute ifconfig in the ifconfig domain, and
63541 allow the specified role the ifconfig domain,
63542 @@ -122146,7 +122869,7 @@ Role allowed access.
63543 </param>
63544 <rolecap/>
63545 </interface>
63546 -<interface name="sysnet_exec_ifconfig" lineno="674">
63547 +<interface name="sysnet_exec_ifconfig" lineno="692">
63548 <summary>
63549 Execute ifconfig in the caller domain.
63550 </summary>
63551 @@ -122156,7 +122879,7 @@ Domain allowed access.
63552 </summary>
63553 </param>
63554 </interface>
63555 -<interface name="sysnet_signal_ifconfig" lineno="694">
63556 +<interface name="sysnet_signal_ifconfig" lineno="712">
63557 <summary>
63558 Send a generic signal to ifconfig.
63559 </summary>
63560 @@ -122167,7 +122890,7 @@ Domain allowed access.
63561 </param>
63562 <rolecap/>
63563 </interface>
63564 -<interface name="sysnet_signull_ifconfig" lineno="713">
63565 +<interface name="sysnet_signull_ifconfig" lineno="731">
63566 <summary>
63567 Send null signals to ifconfig.
63568 </summary>
63569 @@ -122178,7 +122901,7 @@ Domain allowed access.
63570 </param>
63571 <rolecap/>
63572 </interface>
63573 -<interface name="sysnet_create_netns_dirs" lineno="732">
63574 +<interface name="sysnet_create_netns_dirs" lineno="750">
63575 <summary>
63576 Create the /run/netns directory with
63577 an automatic type transition.
63578 @@ -122189,7 +122912,7 @@ Domain allowed access.
63579 </summary>
63580 </param>
63581 </interface>
63582 -<interface name="sysnet_netns_filetrans" lineno="766">
63583 +<interface name="sysnet_netns_filetrans" lineno="784">
63584 <summary>
63585 Create an object in the /run/netns
63586 directory with a private type.
63587 @@ -122215,7 +122938,7 @@ The name of the object being created.
63588 </summary>
63589 </param>
63590 </interface>
63591 -<interface name="sysnet_read_dhcp_config" lineno="787">
63592 +<interface name="sysnet_read_dhcp_config" lineno="805">
63593 <summary>
63594 Read the DHCP configuration files.
63595 </summary>
63596 @@ -122225,7 +122948,7 @@ Domain allowed access.
63597 </summary>
63598 </param>
63599 </interface>
63600 -<interface name="sysnet_search_dhcp_state" lineno="807">
63601 +<interface name="sysnet_search_dhcp_state" lineno="825">
63602 <summary>
63603 Search the DHCP state data directory.
63604 </summary>
63605 @@ -122235,7 +122958,7 @@ Domain allowed access.
63606 </summary>
63607 </param>
63608 </interface>
63609 -<interface name="sysnet_dhcp_state_filetrans" lineno="851">
63610 +<interface name="sysnet_dhcp_state_filetrans" lineno="869">
63611 <summary>
63612 Create DHCP state data.
63613 </summary>
63614 @@ -122270,7 +122993,7 @@ The name of the object being created.
63615 </summary>
63616 </param>
63617 </interface>
63618 -<interface name="sysnet_dns_name_resolve" lineno="871">
63619 +<interface name="sysnet_dns_name_resolve" lineno="889">
63620 <summary>
63621 Perform a DNS name resolution.
63622 </summary>
63623 @@ -122281,7 +123004,7 @@ Domain allowed access.
63624 </param>
63625 <rolecap/>
63626 </interface>
63627 -<interface name="sysnet_use_ldap" lineno="921">
63628 +<interface name="sysnet_use_ldap" lineno="940">
63629 <summary>
63630 Connect and use a LDAP server.
63631 </summary>
63632 @@ -122291,7 +123014,7 @@ Domain allowed access.
63633 </summary>
63634 </param>
63635 </interface>
63636 -<interface name="sysnet_use_portmap" lineno="948">
63637 +<interface name="sysnet_use_portmap" lineno="967">
63638 <summary>
63639 Connect and use remote port mappers.
63640 </summary>
63641 @@ -122301,7 +123024,7 @@ Domain allowed access.
63642 </summary>
63643 </param>
63644 </interface>
63645 -<interface name="sysnet_dhcpc_script_entry" lineno="982">
63646 +<interface name="sysnet_dhcpc_script_entry" lineno="1001">
63647 <summary>
63648 Make the specified program domain
63649 accessable from the DHCP hooks/scripts.
63650 @@ -122353,7 +123076,7 @@ The type for the user pty
63651 </summary>
63652 </param>
63653 </template>
63654 -<template name="systemd_user_daemon_domain" lineno="205">
63655 +<template name="systemd_user_daemon_domain" lineno="221">
63656 <summary>
63657 Allow the specified domain to be started as a daemon by the
63658 specified systemd user instance.
63659 @@ -122374,7 +123097,7 @@ Domain to allow the systemd user domain to run.
63660 </summary>
63661 </param>
63662 </template>
63663 -<interface name="systemd_user_activated_sock_file" lineno="226">
63664 +<interface name="systemd_user_activated_sock_file" lineno="242">
63665 <summary>
63666 Associate the specified file type to be a type whose sock files
63667 can be managed by systemd user instances for socket activation.
63668 @@ -122385,7 +123108,7 @@ File type to be associated.
63669 </summary>
63670 </param>
63671 </interface>
63672 -<interface name="systemd_user_unix_stream_activated_socket" lineno="251">
63673 +<interface name="systemd_user_unix_stream_activated_socket" lineno="267">
63674 <summary>
63675 Associate the specified domain to be a domain whose unix stream
63676 sockets and sock files can be managed by systemd user instances
63677 @@ -122402,7 +123125,7 @@ File type of the domain's sock files to be associated.
63678 </summary>
63679 </param>
63680 </interface>
63681 -<template name="systemd_user_send_systemd_notify" lineno="277">
63682 +<template name="systemd_user_send_systemd_notify" lineno="293">
63683 <summary>
63684 Allow the target domain the permissions necessary
63685 to use systemd notify when started by the specified
63686 @@ -122419,7 +123142,7 @@ Domain to be allowed systemd notify permissions.
63687 </summary>
63688 </param>
63689 </template>
63690 -<template name="systemd_user_app_status" lineno="305">
63691 +<template name="systemd_user_app_status" lineno="321">
63692 <summary>
63693 Allow the target domain to be monitored and have its output
63694 captured by the specified systemd user instance domain.
63695 @@ -122435,7 +123158,7 @@ Domain to allow the systemd user instance to monitor.
63696 </summary>
63697 </param>
63698 </template>
63699 -<template name="systemd_read_user_manager_state" lineno="345">
63700 +<template name="systemd_read_user_manager_state" lineno="361">
63701 <summary>
63702 Read the process state (/proc/pid) of
63703 the specified systemd user instance.
63704 @@ -122451,7 +123174,7 @@ Domain allowed access.
63705 </summary>
63706 </param>
63707 </template>
63708 -<template name="systemd_user_manager_system_start" lineno="369">
63709 +<template name="systemd_user_manager_system_start" lineno="385">
63710 <summary>
63711 Send a start request to the specified
63712 systemd user instance system object.
63713 @@ -122467,7 +123190,7 @@ Domain allowed access.
63714 </summary>
63715 </param>
63716 </template>
63717 -<template name="systemd_user_manager_system_stop" lineno="393">
63718 +<template name="systemd_user_manager_system_stop" lineno="409">
63719 <summary>
63720 Send a stop request to the specified
63721 systemd user instance system object.
63722 @@ -122483,7 +123206,7 @@ Domain allowed access.
63723 </summary>
63724 </param>
63725 </template>
63726 -<template name="systemd_user_manager_system_status" lineno="417">
63727 +<template name="systemd_user_manager_system_status" lineno="433">
63728 <summary>
63729 Get the status of the specified
63730 systemd user instance system object.
63731 @@ -122499,7 +123222,7 @@ Domain allowed access.
63732 </summary>
63733 </param>
63734 </template>
63735 -<template name="systemd_user_manager_dbus_chat" lineno="441">
63736 +<template name="systemd_user_manager_dbus_chat" lineno="457">
63737 <summary>
63738 Send and receive messages from the
63739 specified systemd user instance over dbus.
63740 @@ -122515,7 +123238,7 @@ Domain allowed access.
63741 </summary>
63742 </param>
63743 </template>
63744 -<interface name="systemd_search_conf_home_content" lineno="462">
63745 +<interface name="systemd_search_conf_home_content" lineno="478">
63746 <summary>
63747 Allow the specified domain to search systemd config home
63748 content.
63749 @@ -122526,7 +123249,7 @@ Domain allowed access.
63750 </summary>
63751 </param>
63752 </interface>
63753 -<interface name="systemd_manage_conf_home_content" lineno="481">
63754 +<interface name="systemd_manage_conf_home_content" lineno="497">
63755 <summary>
63756 Allow the specified domain to manage systemd config home
63757 content.
63758 @@ -122537,7 +123260,7 @@ Domain allowed access.
63759 </summary>
63760 </param>
63761 </interface>
63762 -<interface name="systemd_relabel_conf_home_content" lineno="502">
63763 +<interface name="systemd_relabel_conf_home_content" lineno="518">
63764 <summary>
63765 Allow the specified domain to relabel systemd config home
63766 content.
63767 @@ -122548,7 +123271,7 @@ Domain allowed access.
63768 </summary>
63769 </param>
63770 </interface>
63771 -<interface name="systemd_search_data_home_content" lineno="523">
63772 +<interface name="systemd_search_data_home_content" lineno="539">
63773 <summary>
63774 Allow the specified domain to search systemd data home
63775 content.
63776 @@ -122559,7 +123282,7 @@ Domain allowed access.
63777 </summary>
63778 </param>
63779 </interface>
63780 -<interface name="systemd_manage_data_home_content" lineno="542">
63781 +<interface name="systemd_manage_data_home_content" lineno="558">
63782 <summary>
63783 Allow the specified domain to manage systemd data home
63784 content.
63785 @@ -122570,7 +123293,7 @@ Domain allowed access.
63786 </summary>
63787 </param>
63788 </interface>
63789 -<interface name="systemd_relabel_data_home_content" lineno="563">
63790 +<interface name="systemd_relabel_data_home_content" lineno="579">
63791 <summary>
63792 Allow the specified domain to relabel systemd data home
63793 content.
63794 @@ -122581,7 +123304,7 @@ Domain allowed access.
63795 </summary>
63796 </param>
63797 </interface>
63798 -<interface name="systemd_search_user_runtime" lineno="584">
63799 +<interface name="systemd_search_user_runtime" lineno="600">
63800 <summary>
63801 Allow the specified domain to search systemd user runtime
63802 content.
63803 @@ -122592,7 +123315,7 @@ Domain allowed access.
63804 </summary>
63805 </param>
63806 </interface>
63807 -<interface name="systemd_read_user_runtime_files" lineno="602">
63808 +<interface name="systemd_read_user_runtime_files" lineno="618">
63809 <summary>
63810 Allow the specified domain to read systemd user runtime files.
63811 </summary>
63812 @@ -122602,7 +123325,7 @@ Domain allowed access.
63813 </summary>
63814 </param>
63815 </interface>
63816 -<interface name="systemd_read_user_runtime_lnk_files" lineno="620">
63817 +<interface name="systemd_read_user_runtime_lnk_files" lineno="636">
63818 <summary>
63819 Allow the specified domain to read systemd user runtime lnk files.
63820 </summary>
63821 @@ -122612,7 +123335,7 @@ Domain allowed access.
63822 </summary>
63823 </param>
63824 </interface>
63825 -<interface name="systemd_write_user_runtime_socket" lineno="639">
63826 +<interface name="systemd_write_user_runtime_socket" lineno="655">
63827 <summary>
63828 Allow the specified domain to write to
63829 the systemd user runtime named socket.
63830 @@ -122623,7 +123346,18 @@ Domain allowed access.
63831 </summary>
63832 </param>
63833 </interface>
63834 -<interface name="systemd_read_user_unit_files" lineno="658">
63835 +<interface name="systemd_read_user_unit_files" lineno="674">
63836 +<summary>
63837 +Allow the specified domain to read system-wide systemd
63838 +user unit files. (Deprecated)
63839 +</summary>
63840 +<param name="domain">
63841 +<summary>
63842 +Domain allowed access.
63843 +</summary>
63844 +</param>
63845 +</interface>
63846 +<interface name="systemd_read_user_units_files" lineno="690">
63847 <summary>
63848 Allow the specified domain to read system-wide systemd
63849 user unit files.
63850 @@ -122634,7 +123368,17 @@ Domain allowed access.
63851 </summary>
63852 </param>
63853 </interface>
63854 -<interface name="systemd_read_user_runtime_units" lineno="678">
63855 +<interface name="systemd_read_user_runtime_units" lineno="710">
63856 +<summary>
63857 +Allow the specified domain to read systemd user runtime unit files. (Deprecated)
63858 +</summary>
63859 +<param name="domain">
63860 +<summary>
63861 +Domain allowed access.
63862 +</summary>
63863 +</param>
63864 +</interface>
63865 +<interface name="systemd_read_user_runtime_units_files" lineno="725">
63866 <summary>
63867 Allow the specified domain to read systemd user runtime unit files.
63868 </summary>
63869 @@ -122644,7 +123388,7 @@ Domain allowed access.
63870 </summary>
63871 </param>
63872 </interface>
63873 -<interface name="systemd_search_user_runtime_unit_dirs" lineno="698">
63874 +<interface name="systemd_search_user_runtime_unit_dirs" lineno="745">
63875 <summary>
63876 Allow the specified domain to search systemd user runtime unit
63877 directories.
63878 @@ -122655,7 +123399,7 @@ Domain allowed access.
63879 </summary>
63880 </param>
63881 </interface>
63882 -<interface name="systemd_list_user_runtime_unit_dirs" lineno="717">
63883 +<interface name="systemd_list_user_runtime_unit_dirs" lineno="764">
63884 <summary>
63885 Allow the specified domain to list the contents of systemd
63886 user runtime unit directories.
63887 @@ -122666,7 +123410,17 @@ Domain allowed access.
63888 </summary>
63889 </param>
63890 </interface>
63891 -<interface name="systemd_status_user_runtime_units" lineno="735">
63892 +<interface name="systemd_status_user_runtime_units" lineno="782">
63893 +<summary>
63894 +Allow the specified domain to get the status of systemd user runtime units. (Deprecated)
63895 +</summary>
63896 +<param name="domain">
63897 +<summary>
63898 +Domain allowed access.
63899 +</summary>
63900 +</param>
63901 +</interface>
63902 +<interface name="systemd_get_user_runtime_units_status" lineno="797">
63903 <summary>
63904 Allow the specified domain to get the status of systemd user runtime units.
63905 </summary>
63906 @@ -122676,7 +123430,7 @@ Domain allowed access.
63907 </summary>
63908 </param>
63909 </interface>
63910 -<interface name="systemd_start_user_runtime_units" lineno="754">
63911 +<interface name="systemd_start_user_runtime_units" lineno="816">
63912 <summary>
63913 Allow the specified domain to start systemd user runtime units.
63914 </summary>
63915 @@ -122686,7 +123440,7 @@ Domain allowed access.
63916 </summary>
63917 </param>
63918 </interface>
63919 -<interface name="systemd_stop_user_runtime_units" lineno="773">
63920 +<interface name="systemd_stop_user_runtime_units" lineno="835">
63921 <summary>
63922 Allow the specified domain to stop systemd user runtime units.
63923 </summary>
63924 @@ -122696,7 +123450,7 @@ Domain allowed access.
63925 </summary>
63926 </param>
63927 </interface>
63928 -<interface name="systemd_reload_user_runtime_units" lineno="792">
63929 +<interface name="systemd_reload_user_runtime_units" lineno="854">
63930 <summary>
63931 Allow the specified domain to reload systemd user runtime units.
63932 </summary>
63933 @@ -122706,7 +123460,79 @@ Domain allowed access.
63934 </summary>
63935 </param>
63936 </interface>
63937 -<interface name="systemd_log_parse_environment" lineno="812">
63938 +<interface name="systemd_read_user_transient_units_files" lineno="873">
63939 +<summary>
63940 +Allow the specified domain to read systemd user transient unit files.
63941 +</summary>
63942 +<param name="domain">
63943 +<summary>
63944 +Domain allowed access.
63945 +</summary>
63946 +</param>
63947 +</interface>
63948 +<interface name="systemd_search_user_transient_unit_dirs" lineno="893">
63949 +<summary>
63950 +Allow the specified domain to search systemd user transient unit
63951 +directories.
63952 +</summary>
63953 +<param name="domain">
63954 +<summary>
63955 +Domain allowed access.
63956 +</summary>
63957 +</param>
63958 +</interface>
63959 +<interface name="systemd_list_user_transient_unit_dirs" lineno="912">
63960 +<summary>
63961 +Allow the specified domain to list the contents of systemd
63962 +user transient unit directories.
63963 +</summary>
63964 +<param name="domain">
63965 +<summary>
63966 +Domain allowed access.
63967 +</summary>
63968 +</param>
63969 +</interface>
63970 +<interface name="systemd_get_user_transient_units_status" lineno="930">
63971 +<summary>
63972 +Allow the specified domain to get the status of systemd user transient units.
63973 +</summary>
63974 +<param name="domain">
63975 +<summary>
63976 +Domain allowed access.
63977 +</summary>
63978 +</param>
63979 +</interface>
63980 +<interface name="systemd_start_user_transient_units" lineno="949">
63981 +<summary>
63982 +Allow the specified domain to start systemd user transient units.
63983 +</summary>
63984 +<param name="domain">
63985 +<summary>
63986 +Domain allowed access.
63987 +</summary>
63988 +</param>
63989 +</interface>
63990 +<interface name="systemd_stop_user_transient_units" lineno="968">
63991 +<summary>
63992 +Allow the specified domain to stop systemd user transient units.
63993 +</summary>
63994 +<param name="domain">
63995 +<summary>
63996 +Domain allowed access.
63997 +</summary>
63998 +</param>
63999 +</interface>
64000 +<interface name="systemd_reload_user_transient_units" lineno="987">
64001 +<summary>
64002 +Allow the specified domain to reload systemd user transient units.
64003 +</summary>
64004 +<param name="domain">
64005 +<summary>
64006 +Domain allowed access.
64007 +</summary>
64008 +</param>
64009 +</interface>
64010 +<interface name="systemd_log_parse_environment" lineno="1007">
64011 <summary>
64012 Make the specified type usable as an
64013 log parse environment type.
64014 @@ -122717,7 +123543,7 @@ Type to be used as a log parse environment type.
64015 </summary>
64016 </param>
64017 </interface>
64018 -<interface name="systemd_use_nss" lineno="832">
64019 +<interface name="systemd_use_nss" lineno="1027">
64020 <summary>
64021 Allow domain to use systemd's Name Service Switch (NSS) module.
64022 This module provides UNIX user and group name resolution for dynamic users
64023 @@ -122729,7 +123555,7 @@ Domain allowed access
64024 </summary>
64025 </param>
64026 </interface>
64027 -<interface name="systemd_PrivateDevices" lineno="859">
64028 +<interface name="systemd_PrivateDevices" lineno="1054">
64029 <summary>
64030 Allow domain to be used as a systemd service with a unit
64031 that uses PrivateDevices=yes in section [Service].
64032 @@ -122740,7 +123566,17 @@ Domain allowed access
64033 </summary>
64034 </param>
64035 </interface>
64036 -<interface name="systemd_read_hwdb" lineno="876">
64037 +<interface name="systemd_rw_homework_semaphores" lineno="1071">
64038 +<summary>
64039 +Read and write systemd-homework semaphores.
64040 +</summary>
64041 +<param name="domain">
64042 +<summary>
64043 +Domain allowed access
64044 +</summary>
64045 +</param>
64046 +</interface>
64047 +<interface name="systemd_read_hwdb" lineno="1089">
64048 <summary>
64049 Allow domain to read udev hwdb file
64050 </summary>
64051 @@ -122750,7 +123586,7 @@ domain allowed access
64052 </summary>
64053 </param>
64054 </interface>
64055 -<interface name="systemd_map_hwdb" lineno="894">
64056 +<interface name="systemd_map_hwdb" lineno="1107">
64057 <summary>
64058 Allow domain to map udev hwdb file
64059 </summary>
64060 @@ -122760,7 +123596,7 @@ domain allowed access
64061 </summary>
64062 </param>
64063 </interface>
64064 -<interface name="systemd_read_logind_pids" lineno="912">
64065 +<interface name="systemd_read_logind_pids" lineno="1125">
64066 <summary>
64067 Read systemd_login PID files. (Deprecated)
64068 </summary>
64069 @@ -122770,7 +123606,7 @@ Domain allowed access.
64070 </summary>
64071 </param>
64072 </interface>
64073 -<interface name="systemd_manage_logind_pid_pipes" lineno="927">
64074 +<interface name="systemd_manage_logind_pid_pipes" lineno="1140">
64075 <summary>
64076 Manage systemd_login PID pipes. (Deprecated)
64077 </summary>
64078 @@ -122780,7 +123616,7 @@ Domain allowed access.
64079 </summary>
64080 </param>
64081 </interface>
64082 -<interface name="systemd_write_logind_pid_pipes" lineno="942">
64083 +<interface name="systemd_write_logind_pid_pipes" lineno="1155">
64084 <summary>
64085 Write systemd_login named pipe. (Deprecated)
64086 </summary>
64087 @@ -122790,7 +123626,7 @@ Domain allowed access.
64088 </summary>
64089 </param>
64090 </interface>
64091 -<interface name="systemd_watch_logind_runtime_dirs" lineno="957">
64092 +<interface name="systemd_watch_logind_runtime_dirs" lineno="1170">
64093 <summary>
64094 Watch systemd-logind runtime dirs.
64095 </summary>
64096 @@ -122800,7 +123636,7 @@ Domain allowed access.
64097 </summary>
64098 </param>
64099 </interface>
64100 -<interface name="systemd_read_logind_runtime_files" lineno="976">
64101 +<interface name="systemd_read_logind_runtime_files" lineno="1189">
64102 <summary>
64103 Read systemd-logind runtime files.
64104 </summary>
64105 @@ -122810,7 +123646,7 @@ Domain allowed access.
64106 </summary>
64107 </param>
64108 </interface>
64109 -<interface name="systemd_manage_logind_runtime_pipes" lineno="996">
64110 +<interface name="systemd_manage_logind_runtime_pipes" lineno="1209">
64111 <summary>
64112 Manage systemd-logind runtime pipes.
64113 </summary>
64114 @@ -122820,7 +123656,7 @@ Domain allowed access.
64115 </summary>
64116 </param>
64117 </interface>
64118 -<interface name="systemd_write_logind_runtime_pipes" lineno="1015">
64119 +<interface name="systemd_write_logind_runtime_pipes" lineno="1228">
64120 <summary>
64121 Write systemd-logind runtime named pipe.
64122 </summary>
64123 @@ -122830,7 +123666,7 @@ Domain allowed access.
64124 </summary>
64125 </param>
64126 </interface>
64127 -<interface name="systemd_use_logind_fds" lineno="1036">
64128 +<interface name="systemd_use_logind_fds" lineno="1249">
64129 <summary>
64130 Use inherited systemd
64131 logind file descriptors.
64132 @@ -122841,7 +123677,7 @@ Domain allowed access.
64133 </summary>
64134 </param>
64135 </interface>
64136 -<interface name="systemd_watch_logind_sessions_dirs" lineno="1054">
64137 +<interface name="systemd_watch_logind_sessions_dirs" lineno="1267">
64138 <summary>
64139 Watch logind sessions dirs.
64140 </summary>
64141 @@ -122851,7 +123687,7 @@ Domain allowed access.
64142 </summary>
64143 </param>
64144 </interface>
64145 -<interface name="systemd_read_logind_sessions_files" lineno="1073">
64146 +<interface name="systemd_read_logind_sessions_files" lineno="1286">
64147 <summary>
64148 Read logind sessions files.
64149 </summary>
64150 @@ -122861,7 +123697,7 @@ Domain allowed access.
64151 </summary>
64152 </param>
64153 </interface>
64154 -<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="1094">
64155 +<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="1307">
64156 <summary>
64157 Write inherited logind sessions pipes.
64158 </summary>
64159 @@ -122871,7 +123707,7 @@ Domain allowed access.
64160 </summary>
64161 </param>
64162 </interface>
64163 -<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="1114">
64164 +<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="1327">
64165 <summary>
64166 Write inherited logind inhibit pipes.
64167 </summary>
64168 @@ -122881,7 +123717,7 @@ Domain allowed access.
64169 </summary>
64170 </param>
64171 </interface>
64172 -<interface name="systemd_dbus_chat_logind" lineno="1135">
64173 +<interface name="systemd_dbus_chat_logind" lineno="1348">
64174 <summary>
64175 Send and receive messages from
64176 systemd logind over dbus.
64177 @@ -122892,7 +123728,7 @@ Domain allowed access.
64178 </summary>
64179 </param>
64180 </interface>
64181 -<interface name="systemd_status_logind" lineno="1155">
64182 +<interface name="systemd_status_logind" lineno="1368">
64183 <summary>
64184 Get the system status information from systemd_login
64185 </summary>
64186 @@ -122902,7 +123738,7 @@ Domain allowed access.
64187 </summary>
64188 </param>
64189 </interface>
64190 -<interface name="systemd_signull_logind" lineno="1174">
64191 +<interface name="systemd_signull_logind" lineno="1387">
64192 <summary>
64193 Send systemd_login a null signal.
64194 </summary>
64195 @@ -122912,7 +123748,7 @@ Domain allowed access.
64196 </summary>
64197 </param>
64198 </interface>
64199 -<interface name="systemd_manage_userdb_runtime_dirs" lineno="1192">
64200 +<interface name="systemd_manage_userdb_runtime_dirs" lineno="1405">
64201 <summary>
64202 Manage systemd userdb runtime directories.
64203 </summary>
64204 @@ -122922,7 +123758,7 @@ Domain allowed access.
64205 </summary>
64206 </param>
64207 </interface>
64208 -<interface name="systemd_manage_userdb_runtime_sock_files" lineno="1210">
64209 +<interface name="systemd_manage_userdb_runtime_sock_files" lineno="1423">
64210 <summary>
64211 Manage socket files under /run/systemd/userdb .
64212 </summary>
64213 @@ -122932,7 +123768,7 @@ Domain allowed access.
64214 </summary>
64215 </param>
64216 </interface>
64217 -<interface name="systemd_stream_connect_userdb" lineno="1228">
64218 +<interface name="systemd_stream_connect_userdb" lineno="1441">
64219 <summary>
64220 Connect to /run/systemd/userdb/io.systemd.DynamicUser .
64221 </summary>
64222 @@ -122942,7 +123778,7 @@ Domain allowed access.
64223 </summary>
64224 </param>
64225 </interface>
64226 -<interface name="systemd_read_machines" lineno="1249">
64227 +<interface name="systemd_read_machines" lineno="1463">
64228 <summary>
64229 Allow reading /run/systemd/machines
64230 </summary>
64231 @@ -122952,7 +123788,7 @@ Domain that can access the machines files
64232 </summary>
64233 </param>
64234 </interface>
64235 -<interface name="systemd_connect_machined" lineno="1268">
64236 +<interface name="systemd_connect_machined" lineno="1482">
64237 <summary>
64238 Allow connecting to /run/systemd/userdb/io.systemd.Machine socket
64239 </summary>
64240 @@ -122962,7 +123798,7 @@ Domain that can access the socket
64241 </summary>
64242 </param>
64243 </interface>
64244 -<interface name="systemd_dbus_chat_machined" lineno="1287">
64245 +<interface name="systemd_dbus_chat_machined" lineno="1501">
64246 <summary>
64247 Send and receive messages from
64248 systemd machined over dbus.
64249 @@ -122973,7 +123809,7 @@ Domain allowed access.
64250 </summary>
64251 </param>
64252 </interface>
64253 -<interface name="systemd_dbus_chat_hostnamed" lineno="1308">
64254 +<interface name="systemd_dbus_chat_hostnamed" lineno="1522">
64255 <summary>
64256 Send and receive messages from
64257 systemd hostnamed over dbus.
64258 @@ -122984,7 +123820,7 @@ Domain allowed access.
64259 </summary>
64260 </param>
64261 </interface>
64262 -<interface name="systemd_use_passwd_agent_fds" lineno="1328">
64263 +<interface name="systemd_use_passwd_agent_fds" lineno="1542">
64264 <summary>
64265 allow systemd_passwd_agent to inherit fds
64266 </summary>
64267 @@ -122994,7 +123830,7 @@ Domain that owns the fds
64268 </summary>
64269 </param>
64270 </interface>
64271 -<interface name="systemd_run_passwd_agent" lineno="1351">
64272 +<interface name="systemd_run_passwd_agent" lineno="1565">
64273 <summary>
64274 allow systemd_passwd_agent to be run by admin
64275 </summary>
64276 @@ -123009,7 +123845,7 @@ role that it runs in
64277 </summary>
64278 </param>
64279 </interface>
64280 -<interface name="systemd_use_passwd_agent" lineno="1372">
64281 +<interface name="systemd_use_passwd_agent" lineno="1586">
64282 <summary>
64283 Allow a systemd_passwd_agent_t process to interact with a daemon
64284 that needs a password from the sysadmin.
64285 @@ -123020,7 +123856,7 @@ Domain allowed access.
64286 </summary>
64287 </param>
64288 </interface>
64289 -<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="1396">
64290 +<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="1610">
64291 <summary>
64292 Transition to systemd_passwd_runtime_t when creating dirs
64293 </summary>
64294 @@ -123030,9 +123866,9 @@ Domain allowed access.
64295 </summary>
64296 </param>
64297 </interface>
64298 -<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="1417">
64299 +<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="1631">
64300 <summary>
64301 -Transition to systemd_userdb_runtime_t when
64302 +Transition to systemd_userdbd_runtime_t when
64303 creating the userdb directory inside an init runtime
64304 directory.
64305 </summary>
64306 @@ -123042,7 +123878,7 @@ Domain allowed access.
64307 </summary>
64308 </param>
64309 </interface>
64310 -<interface name="systemd_manage_passwd_runtime_symlinks" lineno="1435">
64311 +<interface name="systemd_manage_passwd_runtime_symlinks" lineno="1649">
64312 <summary>
64313 Allow to domain to create systemd-passwd symlink
64314 </summary>
64315 @@ -123052,7 +123888,7 @@ Domain allowed access.
64316 </summary>
64317 </param>
64318 </interface>
64319 -<interface name="systemd_watch_passwd_runtime_dirs" lineno="1453">
64320 +<interface name="systemd_watch_passwd_runtime_dirs" lineno="1667">
64321 <summary>
64322 Allow a domain to watch systemd-passwd runtime dirs.
64323 </summary>
64324 @@ -123062,7 +123898,7 @@ Domain allowed access.
64325 </summary>
64326 </param>
64327 </interface>
64328 -<interface name="systemd_manage_all_units" lineno="1471">
64329 +<interface name="systemd_manage_all_units" lineno="1685">
64330 <summary>
64331 manage systemd unit dirs and the files in them (Deprecated)
64332 </summary>
64333 @@ -123072,7 +123908,7 @@ Domain allowed access.
64334 </summary>
64335 </param>
64336 </interface>
64337 -<interface name="systemd_list_journal_dirs" lineno="1486">
64338 +<interface name="systemd_list_journal_dirs" lineno="1700">
64339 <summary>
64340 Allow domain to list the contents of systemd_journal_t dirs
64341 </summary>
64342 @@ -123082,7 +123918,7 @@ Domain allowed access.
64343 </summary>
64344 </param>
64345 </interface>
64346 -<interface name="systemd_read_journal_files" lineno="1504">
64347 +<interface name="systemd_read_journal_files" lineno="1718">
64348 <summary>
64349 Allow domain to read systemd_journal_t files
64350 </summary>
64351 @@ -123092,7 +123928,7 @@ Domain allowed access.
64352 </summary>
64353 </param>
64354 </interface>
64355 -<interface name="systemd_manage_journal_files" lineno="1523">
64356 +<interface name="systemd_manage_journal_files" lineno="1737">
64357 <summary>
64358 Allow domain to create/manage systemd_journal_t files
64359 </summary>
64360 @@ -123102,7 +123938,7 @@ Domain allowed access.
64361 </summary>
64362 </param>
64363 </interface>
64364 -<interface name="systemd_watch_journal_dirs" lineno="1543">
64365 +<interface name="systemd_watch_journal_dirs" lineno="1757">
64366 <summary>
64367 Allow domain to add a watch on systemd_journal_t directories
64368 </summary>
64369 @@ -123112,7 +123948,7 @@ Domain allowed access.
64370 </summary>
64371 </param>
64372 </interface>
64373 -<interface name="systemd_relabelto_journal_dirs" lineno="1561">
64374 +<interface name="systemd_relabelto_journal_dirs" lineno="1775">
64375 <summary>
64376 Relabel to systemd-journald directory type.
64377 </summary>
64378 @@ -123122,7 +123958,7 @@ Domain allowed access.
64379 </summary>
64380 </param>
64381 </interface>
64382 -<interface name="systemd_relabelto_journal_files" lineno="1580">
64383 +<interface name="systemd_relabelto_journal_files" lineno="1794">
64384 <summary>
64385 Relabel to systemd-journald file type.
64386 </summary>
64387 @@ -123132,7 +123968,7 @@ Domain allowed access.
64388 </summary>
64389 </param>
64390 </interface>
64391 -<interface name="systemd_read_networkd_units" lineno="1600">
64392 +<interface name="systemd_read_networkd_units" lineno="1814">
64393 <summary>
64394 Allow domain to read systemd_networkd_t unit files
64395 </summary>
64396 @@ -123142,7 +123978,7 @@ Domain allowed access.
64397 </summary>
64398 </param>
64399 </interface>
64400 -<interface name="systemd_manage_networkd_units" lineno="1620">
64401 +<interface name="systemd_manage_networkd_units" lineno="1834">
64402 <summary>
64403 Allow domain to create/manage systemd_networkd_t unit files
64404 </summary>
64405 @@ -123152,7 +123988,7 @@ Domain allowed access.
64406 </summary>
64407 </param>
64408 </interface>
64409 -<interface name="systemd_enabledisable_networkd" lineno="1640">
64410 +<interface name="systemd_enabledisable_networkd" lineno="1854">
64411 <summary>
64412 Allow specified domain to enable systemd-networkd units
64413 </summary>
64414 @@ -123162,7 +123998,7 @@ Domain allowed access.
64415 </summary>
64416 </param>
64417 </interface>
64418 -<interface name="systemd_startstop_networkd" lineno="1659">
64419 +<interface name="systemd_startstop_networkd" lineno="1873">
64420 <summary>
64421 Allow specified domain to start systemd-networkd units
64422 </summary>
64423 @@ -123172,7 +124008,7 @@ Domain allowed access.
64424 </summary>
64425 </param>
64426 </interface>
64427 -<interface name="systemd_dbus_chat_networkd" lineno="1679">
64428 +<interface name="systemd_dbus_chat_networkd" lineno="1893">
64429 <summary>
64430 Send and receive messages from
64431 systemd networkd over dbus.
64432 @@ -123183,7 +124019,7 @@ Domain allowed access.
64433 </summary>
64434 </param>
64435 </interface>
64436 -<interface name="systemd_status_networkd" lineno="1699">
64437 +<interface name="systemd_status_networkd" lineno="1913">
64438 <summary>
64439 Allow specified domain to get status of systemd-networkd
64440 </summary>
64441 @@ -123193,7 +124029,7 @@ Domain allowed access.
64442 </summary>
64443 </param>
64444 </interface>
64445 -<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="1718">
64446 +<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="1932">
64447 <summary>
64448 Relabel systemd_networkd tun socket.
64449 </summary>
64450 @@ -123203,7 +124039,7 @@ Domain allowed access.
64451 </summary>
64452 </param>
64453 </interface>
64454 -<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="1736">
64455 +<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="1950">
64456 <summary>
64457 Read/Write from systemd_networkd netlink route socket.
64458 </summary>
64459 @@ -123213,7 +124049,7 @@ Domain allowed access.
64460 </summary>
64461 </param>
64462 </interface>
64463 -<interface name="systemd_list_networkd_runtime" lineno="1754">
64464 +<interface name="systemd_list_networkd_runtime" lineno="1968">
64465 <summary>
64466 Allow domain to list dirs under /run/systemd/netif
64467 </summary>
64468 @@ -123223,7 +124059,7 @@ domain permitted the access
64469 </summary>
64470 </param>
64471 </interface>
64472 -<interface name="systemd_watch_networkd_runtime_dirs" lineno="1773">
64473 +<interface name="systemd_watch_networkd_runtime_dirs" lineno="1987">
64474 <summary>
64475 Watch directories under /run/systemd/netif
64476 </summary>
64477 @@ -123233,7 +124069,7 @@ Domain permitted the access
64478 </summary>
64479 </param>
64480 </interface>
64481 -<interface name="systemd_read_networkd_runtime" lineno="1792">
64482 +<interface name="systemd_read_networkd_runtime" lineno="2006">
64483 <summary>
64484 Allow domain to read files generated by systemd_networkd
64485 </summary>
64486 @@ -123243,7 +124079,7 @@ domain allowed access
64487 </summary>
64488 </param>
64489 </interface>
64490 -<interface name="systemd_read_logind_state" lineno="1811">
64491 +<interface name="systemd_read_logind_state" lineno="2025">
64492 <summary>
64493 Allow systemd_logind_t to read process state for cgroup file
64494 </summary>
64495 @@ -123253,7 +124089,19 @@ Domain systemd_logind_t may access.
64496 </summary>
64497 </param>
64498 </interface>
64499 -<interface name="systemd_start_user_manager_units" lineno="1831">
64500 +<interface name="systemd_create_logind_linger_dir" lineno="2046">
64501 +<summary>
64502 +Allow the specified domain to create
64503 +the systemd-logind linger directory with
64504 +the correct context.
64505 +</summary>
64506 +<param name="domain">
64507 +<summary>
64508 +Domain allowed access.
64509 +</summary>
64510 +</param>
64511 +</interface>
64512 +<interface name="systemd_start_user_manager_units" lineno="2066">
64513 <summary>
64514 Allow the specified domain to start systemd
64515 user manager units (systemd --user).
64516 @@ -123264,7 +124112,7 @@ Domain allowed access.
64517 </summary>
64518 </param>
64519 </interface>
64520 -<interface name="systemd_stop_user_manager_units" lineno="1851">
64521 +<interface name="systemd_stop_user_manager_units" lineno="2086">
64522 <summary>
64523 Allow the specified domain to stop systemd
64524 user manager units (systemd --user).
64525 @@ -123275,7 +124123,7 @@ Domain allowed access.
64526 </summary>
64527 </param>
64528 </interface>
64529 -<interface name="systemd_reload_user_manager_units" lineno="1871">
64530 +<interface name="systemd_reload_user_manager_units" lineno="2106">
64531 <summary>
64532 Allow the specified domain to reload systemd
64533 user manager units (systemd --user).
64534 @@ -123286,7 +124134,7 @@ Domain allowed access.
64535 </summary>
64536 </param>
64537 </interface>
64538 -<interface name="systemd_status_user_manager_units" lineno="1891">
64539 +<interface name="systemd_get_user_manager_units_status" lineno="2126">
64540 <summary>
64541 Get the status of systemd user manager
64542 units (systemd --user).
64543 @@ -123297,7 +124145,7 @@ Domain allowed access.
64544 </summary>
64545 </param>
64546 </interface>
64547 -<interface name="systemd_start_power_units" lineno="1910">
64548 +<interface name="systemd_start_power_units" lineno="2145">
64549 <summary>
64550 Allow specified domain to start power units
64551 </summary>
64552 @@ -123307,7 +124155,7 @@ Domain to not audit.
64553 </summary>
64554 </param>
64555 </interface>
64556 -<interface name="systemd_status_power_units" lineno="1929">
64557 +<interface name="systemd_status_power_units" lineno="2164">
64558 <summary>
64559 Get the system status information about power units
64560 </summary>
64561 @@ -123317,7 +124165,7 @@ Domain allowed access.
64562 </summary>
64563 </param>
64564 </interface>
64565 -<interface name="systemd_stream_connect_socket_proxyd" lineno="1948">
64566 +<interface name="systemd_stream_connect_socket_proxyd" lineno="2183">
64567 <summary>
64568 Allows connections to the systemd-socket-proxyd's socket.
64569 </summary>
64570 @@ -123327,7 +124175,7 @@ Domain allowed access.
64571 </summary>
64572 </param>
64573 </interface>
64574 -<interface name="systemd_tmpfiles_conf_file" lineno="1967">
64575 +<interface name="systemd_tmpfiles_conf_file" lineno="2202">
64576 <summary>
64577 Make the specified type usable for
64578 systemd tmpfiles config files.
64579 @@ -123338,7 +124186,7 @@ Type to be used for systemd tmpfiles config files.
64580 </summary>
64581 </param>
64582 </interface>
64583 -<interface name="systemd_tmpfiles_creator" lineno="1988">
64584 +<interface name="systemd_tmpfiles_creator" lineno="2223">
64585 <summary>
64586 Allow the specified domain to create
64587 the tmpfiles config directory with
64588 @@ -123350,7 +124198,7 @@ Domain allowed access.
64589 </summary>
64590 </param>
64591 </interface>
64592 -<interface name="systemd_tmpfiles_conf_filetrans" lineno="2024">
64593 +<interface name="systemd_tmpfiles_conf_filetrans" lineno="2259">
64594 <summary>
64595 Create an object in the systemd tmpfiles config
64596 directory, with a private type
64597 @@ -123377,7 +124225,7 @@ The name of the object being created.
64598 </summary>
64599 </param>
64600 </interface>
64601 -<interface name="systemd_list_tmpfiles_conf" lineno="2043">
64602 +<interface name="systemd_list_tmpfiles_conf" lineno="2278">
64603 <summary>
64604 Allow domain to list systemd tmpfiles config directory
64605 </summary>
64606 @@ -123387,7 +124235,7 @@ Domain allowed access.
64607 </summary>
64608 </param>
64609 </interface>
64610 -<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="2061">
64611 +<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="2296">
64612 <summary>
64613 Allow domain to relabel to systemd tmpfiles config directory
64614 </summary>
64615 @@ -123397,7 +124245,7 @@ Domain allowed access.
64616 </summary>
64617 </param>
64618 </interface>
64619 -<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="2079">
64620 +<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="2314">
64621 <summary>
64622 Allow domain to relabel to systemd tmpfiles config files
64623 </summary>
64624 @@ -123407,7 +124255,7 @@ Domain allowed access.
64625 </summary>
64626 </param>
64627 </interface>
64628 -<interface name="systemd_tmpfilesd_managed" lineno="2097">
64629 +<interface name="systemd_tmpfilesd_managed" lineno="2332">
64630 <summary>
64631 Allow systemd_tmpfiles_t to manage filesystem objects
64632 </summary>
64633 @@ -123417,7 +124265,18 @@ Type of object to manage
64634 </summary>
64635 </param>
64636 </interface>
64637 -<interface name="systemd_dbus_chat_resolved" lineno="2124">
64638 +<interface name="systemd_stream_connect_resolved" lineno="2359">
64639 +<summary>
64640 +Connect to systemd resolved over
64641 +/run/systemd/resolve/io.systemd.Resolve .
64642 +</summary>
64643 +<param name="domain">
64644 +<summary>
64645 +Domain allowed access.
64646 +</summary>
64647 +</param>
64648 +</interface>
64649 +<interface name="systemd_dbus_chat_resolved" lineno="2380">
64650 <summary>
64651 Send and receive messages from
64652 systemd resolved over dbus.
64653 @@ -123428,7 +124287,7 @@ Domain allowed access.
64654 </summary>
64655 </param>
64656 </interface>
64657 -<interface name="systemd_read_resolved_runtime" lineno="2144">
64658 +<interface name="systemd_read_resolved_runtime" lineno="2400">
64659 <summary>
64660 Allow domain to read resolv.conf file generated by systemd_resolved
64661 </summary>
64662 @@ -123438,7 +124297,17 @@ domain allowed access
64663 </summary>
64664 </param>
64665 </interface>
64666 -<interface name="systemd_getattr_updated_runtime" lineno="2162">
64667 +<interface name="systemd_exec_systemctl" lineno="2422">
64668 +<summary>
64669 +Execute the systemctl program.
64670 +</summary>
64671 +<param name="domain">
64672 +<summary>
64673 +Domain allowed access.
64674 +</summary>
64675 +</param>
64676 +</interface>
64677 +<interface name="systemd_getattr_updated_runtime" lineno="2453">
64678 <summary>
64679 Allow domain to getattr on .updated file (generated by systemd-update-done
64680 </summary>
64681 @@ -123448,7 +124317,7 @@ domain allowed access
64682 </summary>
64683 </param>
64684 </interface>
64685 -<interface name="systemd_search_all_user_keys" lineno="2180">
64686 +<interface name="systemd_search_all_user_keys" lineno="2471">
64687 <summary>
64688 Search keys for the all systemd --user domains.
64689 </summary>
64690 @@ -123458,7 +124327,7 @@ Domain allowed access.
64691 </summary>
64692 </param>
64693 </interface>
64694 -<interface name="systemd_create_all_user_keys" lineno="2198">
64695 +<interface name="systemd_create_all_user_keys" lineno="2489">
64696 <summary>
64697 Create keys for the all systemd --user domains.
64698 </summary>
64699 @@ -123468,7 +124337,7 @@ Domain allowed access.
64700 </summary>
64701 </param>
64702 </interface>
64703 -<interface name="systemd_write_all_user_keys" lineno="2216">
64704 +<interface name="systemd_write_all_user_keys" lineno="2507">
64705 <summary>
64706 Write keys for the all systemd --user domains.
64707 </summary>
64708 @@ -123478,7 +124347,7 @@ Domain allowed access.
64709 </summary>
64710 </param>
64711 </interface>
64712 -<interface name="systemd_domtrans_sysusers" lineno="2235">
64713 +<interface name="systemd_domtrans_sysusers" lineno="2526">
64714 <summary>
64715 Execute systemd-sysusers in the
64716 systemd sysusers domain.
64717 @@ -123489,7 +124358,7 @@ Domain allowed access.
64718 </summary>
64719 </param>
64720 </interface>
64721 -<interface name="systemd_run_sysusers" lineno="2260">
64722 +<interface name="systemd_run_sysusers" lineno="2551">
64723 <summary>
64724 Run systemd-sysusers with a domain transition.
64725 </summary>
64726 @@ -123505,7 +124374,7 @@ Role allowed access.
64727 </param>
64728 <rolecap/>
64729 </interface>
64730 -<interface name="systemd_use_inherited_machined_ptys" lineno="2280">
64731 +<interface name="systemd_use_inherited_machined_ptys" lineno="2571">
64732 <summary>
64733 receive and use a systemd_machined_devpts_t file handle
64734 </summary>
64735 @@ -123523,6 +124392,13 @@ Enable support for systemd-tmpfiles to manage all non-security files.
64736 </p>
64737 </desc>
64738 </tunable>
64739 +<tunable name="systemd_networkd_dhcp_server" dftval="false">
64740 +<desc>
64741 +<p>
64742 +Allow systemd-networkd to run its DHCPd server component
64743 +</p>
64744 +</desc>
64745 +</tunable>
64746 <tunable name="systemd_nspawn_labeled_namespace" dftval="false">
64747 <desc>
64748 <p>
64749 @@ -124675,7 +125551,7 @@ is the prefix for user_t).
64750 </summary>
64751 </param>
64752 </template>
64753 -<template name="userdom_login_user_template" lineno="954">
64754 +<template name="userdom_login_user_template" lineno="958">
64755 <summary>
64756 The template for creating a login user.
64757 </summary>
64758 @@ -124693,7 +125569,7 @@ is the prefix for user_t).
64759 </summary>
64760 </param>
64761 </template>
64762 -<template name="userdom_restricted_user_template" lineno="1077">
64763 +<template name="userdom_restricted_user_template" lineno="1081">
64764 <summary>
64765 The template for creating a unprivileged login user.
64766 </summary>
64767 @@ -124711,7 +125587,7 @@ is the prefix for user_t).
64768 </summary>
64769 </param>
64770 </template>
64771 -<template name="userdom_restricted_xwindows_user_template" lineno="1118">
64772 +<template name="userdom_restricted_xwindows_user_template" lineno="1122">
64773 <summary>
64774 The template for creating a unprivileged xwindows login user.
64775 </summary>
64776 @@ -124732,7 +125608,7 @@ is the prefix for user_t).
64777 </summary>
64778 </param>
64779 </template>
64780 -<template name="userdom_unpriv_user_template" lineno="1201">
64781 +<template name="userdom_unpriv_user_template" lineno="1205">
64782 <summary>
64783 The template for creating a unprivileged user roughly
64784 equivalent to a regular linux user.
64785 @@ -124755,7 +125631,7 @@ is the prefix for user_t).
64786 </summary>
64787 </param>
64788 </template>
64789 -<template name="userdom_admin_user_template" lineno="1321">
64790 +<template name="userdom_admin_user_template" lineno="1325">
64791 <summary>
64792 The template for creating an administrative user.
64793 </summary>
64794 @@ -124784,7 +125660,7 @@ is the prefix for sysadm_t).
64795 </summary>
64796 </param>
64797 </template>
64798 -<interface name="userdom_security_admin_template" lineno="1501">
64799 +<interface name="userdom_security_admin_template" lineno="1505">
64800 <summary>
64801 Allow user to run as a secadm
64802 </summary>
64803 @@ -124810,7 +125686,7 @@ The role of the object to create.
64804 </summary>
64805 </param>
64806 </interface>
64807 -<template name="userdom_xdg_user_template" lineno="1604">
64808 +<template name="userdom_xdg_user_template" lineno="1608">
64809 <summary>
64810 Allow user to interact with xdg content types
64811 </summary>
64812 @@ -124831,7 +125707,7 @@ Domain allowed access.
64813 </summary>
64814 </param>
64815 </template>
64816 -<interface name="userdom_user_application_type" lineno="1653">
64817 +<interface name="userdom_user_application_type" lineno="1657">
64818 <summary>
64819 Make the specified type usable as
64820 a user application domain type.
64821 @@ -124842,7 +125718,7 @@ Type to be used as a user application domain.
64822 </summary>
64823 </param>
64824 </interface>
64825 -<interface name="userdom_user_application_domain" lineno="1674">
64826 +<interface name="userdom_user_application_domain" lineno="1678">
64827 <summary>
64828 Make the specified type usable as
64829 a user application domain.
64830 @@ -124858,7 +125734,7 @@ Type to be used as the domain entry point.
64831 </summary>
64832 </param>
64833 </interface>
64834 -<interface name="userdom_user_home_content" lineno="1691">
64835 +<interface name="userdom_user_home_content" lineno="1695">
64836 <summary>
64837 Make the specified type usable in a
64838 user home directory.
64839 @@ -124870,7 +125746,7 @@ user home directory.
64840 </summary>
64841 </param>
64842 </interface>
64843 -<interface name="userdom_user_tmp_file" lineno="1717">
64844 +<interface name="userdom_user_tmp_file" lineno="1721">
64845 <summary>
64846 Make the specified type usable as a
64847 user temporary file.
64848 @@ -124882,7 +125758,7 @@ temporary directories.
64849 </summary>
64850 </param>
64851 </interface>
64852 -<interface name="userdom_user_tmpfs_file" lineno="1734">
64853 +<interface name="userdom_user_tmpfs_file" lineno="1738">
64854 <summary>
64855 Make the specified type usable as a
64856 user tmpfs file.
64857 @@ -124894,7 +125770,7 @@ tmpfs directories.
64858 </summary>
64859 </param>
64860 </interface>
64861 -<interface name="userdom_attach_admin_tun_iface" lineno="1749">
64862 +<interface name="userdom_attach_admin_tun_iface" lineno="1753">
64863 <summary>
64864 Allow domain to attach to TUN devices created by administrative users.
64865 </summary>
64866 @@ -124904,7 +125780,7 @@ Domain allowed access.
64867 </summary>
64868 </param>
64869 </interface>
64870 -<interface name="userdom_setattr_user_ptys" lineno="1768">
64871 +<interface name="userdom_setattr_user_ptys" lineno="1772">
64872 <summary>
64873 Set the attributes of a user pty.
64874 </summary>
64875 @@ -124914,7 +125790,7 @@ Domain allowed access.
64876 </summary>
64877 </param>
64878 </interface>
64879 -<interface name="userdom_create_user_pty" lineno="1786">
64880 +<interface name="userdom_create_user_pty" lineno="1790">
64881 <summary>
64882 Create a user pty.
64883 </summary>
64884 @@ -124924,7 +125800,7 @@ Domain allowed access.
64885 </summary>
64886 </param>
64887 </interface>
64888 -<interface name="userdom_getattr_user_home_dirs" lineno="1804">
64889 +<interface name="userdom_getattr_user_home_dirs" lineno="1808">
64890 <summary>
64891 Get the attributes of user home directories.
64892 </summary>
64893 @@ -124934,7 +125810,7 @@ Domain allowed access.
64894 </summary>
64895 </param>
64896 </interface>
64897 -<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1823">
64898 +<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1827">
64899 <summary>
64900 Do not audit attempts to get the attributes of user home directories.
64901 </summary>
64902 @@ -124944,7 +125820,7 @@ Domain to not audit.
64903 </summary>
64904 </param>
64905 </interface>
64906 -<interface name="userdom_search_user_home_dirs" lineno="1841">
64907 +<interface name="userdom_search_user_home_dirs" lineno="1845">
64908 <summary>
64909 Search user home directories.
64910 </summary>
64911 @@ -124954,7 +125830,7 @@ Domain allowed access.
64912 </summary>
64913 </param>
64914 </interface>
64915 -<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1868">
64916 +<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1872">
64917 <summary>
64918 Do not audit attempts to search user home directories.
64919 </summary>
64920 @@ -124972,7 +125848,7 @@ Domain to not audit.
64921 </param>
64922 <infoflow type="none"/>
64923 </interface>
64924 -<interface name="userdom_list_user_home_dirs" lineno="1886">
64925 +<interface name="userdom_list_user_home_dirs" lineno="1890">
64926 <summary>
64927 List user home directories.
64928 </summary>
64929 @@ -124982,7 +125858,7 @@ Domain allowed access.
64930 </summary>
64931 </param>
64932 </interface>
64933 -<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1905">
64934 +<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1909">
64935 <summary>
64936 Do not audit attempts to list user home subdirectories.
64937 </summary>
64938 @@ -124992,7 +125868,7 @@ Domain to not audit.
64939 </summary>
64940 </param>
64941 </interface>
64942 -<interface name="userdom_create_user_home_dirs" lineno="1923">
64943 +<interface name="userdom_create_user_home_dirs" lineno="1927">
64944 <summary>
64945 Create user home directories.
64946 </summary>
64947 @@ -125002,7 +125878,7 @@ Domain allowed access.
64948 </summary>
64949 </param>
64950 </interface>
64951 -<interface name="userdom_manage_user_home_dirs" lineno="1941">
64952 +<interface name="userdom_manage_user_home_dirs" lineno="1945">
64953 <summary>
64954 Manage user home directories.
64955 </summary>
64956 @@ -125012,7 +125888,7 @@ Domain allowed access.
64957 </summary>
64958 </param>
64959 </interface>
64960 -<interface name="userdom_relabelto_user_home_dirs" lineno="1959">
64961 +<interface name="userdom_relabelto_user_home_dirs" lineno="1963">
64962 <summary>
64963 Relabel to user home directories.
64964 </summary>
64965 @@ -125022,7 +125898,7 @@ Domain allowed access.
64966 </summary>
64967 </param>
64968 </interface>
64969 -<interface name="userdom_home_filetrans_user_home_dir" lineno="1983">
64970 +<interface name="userdom_home_filetrans_user_home_dir" lineno="1987">
64971 <summary>
64972 Create directories in the home dir root with
64973 the user home directory type.
64974 @@ -125038,7 +125914,7 @@ The name of the object being created.
64975 </summary>
64976 </param>
64977 </interface>
64978 -<interface name="userdom_user_home_domtrans" lineno="2020">
64979 +<interface name="userdom_user_home_domtrans" lineno="2024">
64980 <summary>
64981 Do a domain transition to the specified
64982 domain when executing a program in the
64983 @@ -125067,7 +125943,7 @@ Domain to transition to.
64984 </summary>
64985 </param>
64986 </interface>
64987 -<interface name="userdom_dontaudit_search_user_home_content" lineno="2040">
64988 +<interface name="userdom_dontaudit_search_user_home_content" lineno="2044">
64989 <summary>
64990 Do not audit attempts to search user home content directories.
64991 </summary>
64992 @@ -125077,7 +125953,7 @@ Domain to not audit.
64993 </summary>
64994 </param>
64995 </interface>
64996 -<interface name="userdom_list_all_user_home_content" lineno="2058">
64997 +<interface name="userdom_list_all_user_home_content" lineno="2062">
64998 <summary>
64999 List all users home content directories.
65000 </summary>
65001 @@ -125087,7 +125963,7 @@ Domain allowed access.
65002 </summary>
65003 </param>
65004 </interface>
65005 -<interface name="userdom_list_user_home_content" lineno="2077">
65006 +<interface name="userdom_list_user_home_content" lineno="2081">
65007 <summary>
65008 List contents of users home directory.
65009 </summary>
65010 @@ -125097,7 +125973,7 @@ Domain allowed access.
65011 </summary>
65012 </param>
65013 </interface>
65014 -<interface name="userdom_manage_user_home_content_dirs" lineno="2096">
65015 +<interface name="userdom_manage_user_home_content_dirs" lineno="2100">
65016 <summary>
65017 Create, read, write, and delete directories
65018 in a user home subdirectory.
65019 @@ -125108,7 +125984,7 @@ Domain allowed access.
65020 </summary>
65021 </param>
65022 </interface>
65023 -<interface name="userdom_delete_all_user_home_content_dirs" lineno="2115">
65024 +<interface name="userdom_delete_all_user_home_content_dirs" lineno="2119">
65025 <summary>
65026 Delete all user home content directories.
65027 </summary>
65028 @@ -125118,7 +125994,7 @@ Domain allowed access.
65029 </summary>
65030 </param>
65031 </interface>
65032 -<interface name="userdom_delete_user_home_content_dirs" lineno="2135">
65033 +<interface name="userdom_delete_user_home_content_dirs" lineno="2139">
65034 <summary>
65035 Delete directories in a user home subdirectory.
65036 </summary>
65037 @@ -125128,7 +126004,7 @@ Domain allowed access.
65038 </summary>
65039 </param>
65040 </interface>
65041 -<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2153">
65042 +<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2157">
65043 <summary>
65044 Set attributes of all user home content directories.
65045 </summary>
65046 @@ -125138,7 +126014,7 @@ Domain allowed access.
65047 </summary>
65048 </param>
65049 </interface>
65050 -<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2173">
65051 +<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2177">
65052 <summary>
65053 Do not audit attempts to set the
65054 attributes of user home files.
65055 @@ -125149,7 +126025,7 @@ Domain to not audit.
65056 </summary>
65057 </param>
65058 </interface>
65059 -<interface name="userdom_map_user_home_content_files" lineno="2191">
65060 +<interface name="userdom_map_user_home_content_files" lineno="2195">
65061 <summary>
65062 Map user home files.
65063 </summary>
65064 @@ -125159,7 +126035,7 @@ Domain allowed access.
65065 </summary>
65066 </param>
65067 </interface>
65068 -<interface name="userdom_mmap_user_home_content_files" lineno="2209">
65069 +<interface name="userdom_mmap_user_home_content_files" lineno="2213">
65070 <summary>
65071 Mmap user home files.
65072 </summary>
65073 @@ -125169,7 +126045,7 @@ Domain allowed access.
65074 </summary>
65075 </param>
65076 </interface>
65077 -<interface name="userdom_read_user_home_content_files" lineno="2228">
65078 +<interface name="userdom_read_user_home_content_files" lineno="2232">
65079 <summary>
65080 Read user home files.
65081 </summary>
65082 @@ -125179,7 +126055,7 @@ Domain allowed access.
65083 </summary>
65084 </param>
65085 </interface>
65086 -<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2247">
65087 +<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2251">
65088 <summary>
65089 Do not audit attempts to read user home files.
65090 </summary>
65091 @@ -125189,7 +126065,7 @@ Domain to not audit.
65092 </summary>
65093 </param>
65094 </interface>
65095 -<interface name="userdom_read_all_user_home_content" lineno="2266">
65096 +<interface name="userdom_read_all_user_home_content" lineno="2270">
65097 <summary>
65098 Read all user home content, including application-specific resources.
65099 </summary>
65100 @@ -125199,7 +126075,7 @@ Domain allowed access
65101 </summary>
65102 </param>
65103 </interface>
65104 -<interface name="userdom_manage_all_user_home_content" lineno="2288">
65105 +<interface name="userdom_manage_all_user_home_content" lineno="2292">
65106 <summary>
65107 Manage all user home content, including application-specific resources.
65108 </summary>
65109 @@ -125209,7 +126085,7 @@ Domain allowed access
65110 </summary>
65111 </param>
65112 </interface>
65113 -<interface name="userdom_map_all_user_home_content_files" lineno="2310">
65114 +<interface name="userdom_map_all_user_home_content_files" lineno="2314">
65115 <summary>
65116 Map all user home content, including application-specific resources.
65117 </summary>
65118 @@ -125219,7 +126095,7 @@ Domain allowed access
65119 </summary>
65120 </param>
65121 </interface>
65122 -<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2328">
65123 +<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2332">
65124 <summary>
65125 Do not audit attempts to append user home files.
65126 </summary>
65127 @@ -125229,7 +126105,7 @@ Domain to not audit.
65128 </summary>
65129 </param>
65130 </interface>
65131 -<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2346">
65132 +<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2350">
65133 <summary>
65134 Do not audit attempts to write user home files.
65135 </summary>
65136 @@ -125239,7 +126115,7 @@ Domain to not audit.
65137 </summary>
65138 </param>
65139 </interface>
65140 -<interface name="userdom_delete_all_user_home_content_files" lineno="2364">
65141 +<interface name="userdom_delete_all_user_home_content_files" lineno="2368">
65142 <summary>
65143 Delete all user home content files.
65144 </summary>
65145 @@ -125249,7 +126125,7 @@ Domain allowed access.
65146 </summary>
65147 </param>
65148 </interface>
65149 -<interface name="userdom_delete_user_home_content_files" lineno="2384">
65150 +<interface name="userdom_delete_user_home_content_files" lineno="2388">
65151 <summary>
65152 Delete files in a user home subdirectory.
65153 </summary>
65154 @@ -125259,7 +126135,7 @@ Domain allowed access.
65155 </summary>
65156 </param>
65157 </interface>
65158 -<interface name="userdom_relabel_generic_user_home_dirs" lineno="2402">
65159 +<interface name="userdom_relabel_generic_user_home_dirs" lineno="2406">
65160 <summary>
65161 Relabel generic user home dirs.
65162 </summary>
65163 @@ -125269,7 +126145,7 @@ Domain allowed access.
65164 </summary>
65165 </param>
65166 </interface>
65167 -<interface name="userdom_relabel_generic_user_home_files" lineno="2420">
65168 +<interface name="userdom_relabel_generic_user_home_files" lineno="2424">
65169 <summary>
65170 Relabel generic user home files.
65171 </summary>
65172 @@ -125279,7 +126155,7 @@ Domain allowed access.
65173 </summary>
65174 </param>
65175 </interface>
65176 -<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2438">
65177 +<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2442">
65178 <summary>
65179 Do not audit attempts to relabel user home files.
65180 </summary>
65181 @@ -125289,7 +126165,7 @@ Domain to not audit.
65182 </summary>
65183 </param>
65184 </interface>
65185 -<interface name="userdom_read_user_home_content_symlinks" lineno="2456">
65186 +<interface name="userdom_read_user_home_content_symlinks" lineno="2460">
65187 <summary>
65188 Read user home subdirectory symbolic links.
65189 </summary>
65190 @@ -125299,7 +126175,7 @@ Domain allowed access.
65191 </summary>
65192 </param>
65193 </interface>
65194 -<interface name="userdom_exec_user_home_content_files" lineno="2476">
65195 +<interface name="userdom_exec_user_home_content_files" lineno="2480">
65196 <summary>
65197 Execute user home files.
65198 </summary>
65199 @@ -125310,7 +126186,7 @@ Domain allowed access.
65200 </param>
65201 <rolecap/>
65202 </interface>
65203 -<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2503">
65204 +<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2507">
65205 <summary>
65206 Do not audit attempts to execute user home files.
65207 </summary>
65208 @@ -125320,7 +126196,7 @@ Domain to not audit.
65209 </summary>
65210 </param>
65211 </interface>
65212 -<interface name="userdom_manage_user_home_content_files" lineno="2522">
65213 +<interface name="userdom_manage_user_home_content_files" lineno="2526">
65214 <summary>
65215 Create, read, write, and delete files
65216 in a user home subdirectory.
65217 @@ -125331,7 +126207,7 @@ Domain allowed access.
65218 </summary>
65219 </param>
65220 </interface>
65221 -<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2543">
65222 +<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2547">
65223 <summary>
65224 Do not audit attempts to create, read, write, and delete directories
65225 in a user home subdirectory.
65226 @@ -125342,7 +126218,7 @@ Domain to not audit.
65227 </summary>
65228 </param>
65229 </interface>
65230 -<interface name="userdom_manage_user_home_content_symlinks" lineno="2562">
65231 +<interface name="userdom_manage_user_home_content_symlinks" lineno="2566">
65232 <summary>
65233 Create, read, write, and delete symbolic links
65234 in a user home subdirectory.
65235 @@ -125353,7 +126229,7 @@ Domain allowed access.
65236 </summary>
65237 </param>
65238 </interface>
65239 -<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2582">
65240 +<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2586">
65241 <summary>
65242 Delete all user home content symbolic links.
65243 </summary>
65244 @@ -125363,7 +126239,7 @@ Domain allowed access.
65245 </summary>
65246 </param>
65247 </interface>
65248 -<interface name="userdom_delete_user_home_content_symlinks" lineno="2602">
65249 +<interface name="userdom_delete_user_home_content_symlinks" lineno="2606">
65250 <summary>
65251 Delete symbolic links in a user home directory.
65252 </summary>
65253 @@ -125373,7 +126249,7 @@ Domain allowed access.
65254 </summary>
65255 </param>
65256 </interface>
65257 -<interface name="userdom_manage_user_home_content_pipes" lineno="2621">
65258 +<interface name="userdom_manage_user_home_content_pipes" lineno="2625">
65259 <summary>
65260 Create, read, write, and delete named pipes
65261 in a user home subdirectory.
65262 @@ -125384,7 +126260,7 @@ Domain allowed access.
65263 </summary>
65264 </param>
65265 </interface>
65266 -<interface name="userdom_manage_user_home_content_sockets" lineno="2642">
65267 +<interface name="userdom_manage_user_home_content_sockets" lineno="2646">
65268 <summary>
65269 Create, read, write, and delete named sockets
65270 in a user home subdirectory.
65271 @@ -125395,7 +126271,7 @@ Domain allowed access.
65272 </summary>
65273 </param>
65274 </interface>
65275 -<interface name="userdom_user_home_dir_filetrans" lineno="2679">
65276 +<interface name="userdom_user_home_dir_filetrans" lineno="2683">
65277 <summary>
65278 Create objects in a user home directory
65279 with an automatic type transition to
65280 @@ -125422,7 +126298,7 @@ The name of the object being created.
65281 </summary>
65282 </param>
65283 </interface>
65284 -<interface name="userdom_user_home_content_filetrans" lineno="2716">
65285 +<interface name="userdom_user_home_content_filetrans" lineno="2720">
65286 <summary>
65287 Create objects in a directory located
65288 in a user home directory with an
65289 @@ -125450,7 +126326,7 @@ The name of the object being created.
65290 </summary>
65291 </param>
65292 </interface>
65293 -<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2747">
65294 +<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2751">
65295 <summary>
65296 Automatically use the user_cert_t label for selected resources
65297 created in a users home directory
65298 @@ -125471,7 +126347,7 @@ Name of the resource that is being created
65299 </summary>
65300 </param>
65301 </interface>
65302 -<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2777">
65303 +<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2781">
65304 <summary>
65305 Create objects in a user home directory
65306 with an automatic type transition to
65307 @@ -125493,7 +126369,7 @@ The name of the object being created.
65308 </summary>
65309 </param>
65310 </interface>
65311 -<interface name="userdom_exec_user_bin_files" lineno="2796">
65312 +<interface name="userdom_exec_user_bin_files" lineno="2800">
65313 <summary>
65314 Execute user executable files.
65315 </summary>
65316 @@ -125503,7 +126379,7 @@ Domain allowed access.
65317 </summary>
65318 </param>
65319 </interface>
65320 -<interface name="userdom_manage_user_bin" lineno="2816">
65321 +<interface name="userdom_manage_user_bin" lineno="2820">
65322 <summary>
65323 Manage user executable files.
65324 </summary>
65325 @@ -125513,7 +126389,7 @@ Domain allowed access.
65326 </summary>
65327 </param>
65328 </interface>
65329 -<interface name="userdom_read_user_certs" lineno="2838">
65330 +<interface name="userdom_read_user_certs" lineno="2842">
65331 <summary>
65332 Read user SSL certificates.
65333 </summary>
65334 @@ -125524,7 +126400,7 @@ Domain allowed access.
65335 </param>
65336 <rolecap/>
65337 </interface>
65338 -<interface name="userdom_dontaudit_manage_user_certs" lineno="2861">
65339 +<interface name="userdom_dontaudit_manage_user_certs" lineno="2865">
65340 <summary>
65341 Do not audit attempts to manage
65342 the user SSL certificates.
65343 @@ -125536,7 +126412,7 @@ Domain allowed access.
65344 </param>
65345 <rolecap/>
65346 </interface>
65347 -<interface name="userdom_manage_user_certs" lineno="2881">
65348 +<interface name="userdom_manage_user_certs" lineno="2885">
65349 <summary>
65350 Manage user SSL certificates.
65351 </summary>
65352 @@ -125546,7 +126422,7 @@ Domain allowed access.
65353 </summary>
65354 </param>
65355 </interface>
65356 -<interface name="userdom_write_user_tmp_sockets" lineno="2902">
65357 +<interface name="userdom_write_user_tmp_sockets" lineno="2906">
65358 <summary>
65359 Write to user temporary named sockets.
65360 </summary>
65361 @@ -125556,7 +126432,7 @@ Domain allowed access.
65362 </summary>
65363 </param>
65364 </interface>
65365 -<interface name="userdom_list_user_tmp" lineno="2922">
65366 +<interface name="userdom_list_user_tmp" lineno="2926">
65367 <summary>
65368 List user temporary directories.
65369 </summary>
65370 @@ -125566,7 +126442,7 @@ Domain allowed access.
65371 </summary>
65372 </param>
65373 </interface>
65374 -<interface name="userdom_dontaudit_list_user_tmp" lineno="2944">
65375 +<interface name="userdom_dontaudit_list_user_tmp" lineno="2948">
65376 <summary>
65377 Do not audit attempts to list user
65378 temporary directories.
65379 @@ -125577,7 +126453,7 @@ Domain to not audit.
65380 </summary>
65381 </param>
65382 </interface>
65383 -<interface name="userdom_delete_user_tmp_dirs" lineno="2962">
65384 +<interface name="userdom_delete_user_tmp_dirs" lineno="2966">
65385 <summary>
65386 Delete users temporary directories.
65387 </summary>
65388 @@ -125587,7 +126463,7 @@ Domain allowed access.
65389 </summary>
65390 </param>
65391 </interface>
65392 -<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2981">
65393 +<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2985">
65394 <summary>
65395 Do not audit attempts to manage users
65396 temporary directories.
65397 @@ -125598,7 +126474,7 @@ Domain to not audit.
65398 </summary>
65399 </param>
65400 </interface>
65401 -<interface name="userdom_read_user_tmp_files" lineno="2999">
65402 +<interface name="userdom_read_user_tmp_files" lineno="3003">
65403 <summary>
65404 Read user temporary files.
65405 </summary>
65406 @@ -125608,7 +126484,7 @@ Domain allowed access.
65407 </summary>
65408 </param>
65409 </interface>
65410 -<interface name="userdom_map_user_tmp_files" lineno="3020">
65411 +<interface name="userdom_map_user_tmp_files" lineno="3024">
65412 <summary>
65413 Map user temporary files.
65414 </summary>
65415 @@ -125618,7 +126494,7 @@ Domain allowed access.
65416 </summary>
65417 </param>
65418 </interface>
65419 -<interface name="userdom_dontaudit_read_user_tmp_files" lineno="3039">
65420 +<interface name="userdom_dontaudit_read_user_tmp_files" lineno="3043">
65421 <summary>
65422 Do not audit attempts to read users
65423 temporary files.
65424 @@ -125629,7 +126505,7 @@ Domain to not audit.
65425 </summary>
65426 </param>
65427 </interface>
65428 -<interface name="userdom_dontaudit_append_user_tmp_files" lineno="3058">
65429 +<interface name="userdom_dontaudit_append_user_tmp_files" lineno="3062">
65430 <summary>
65431 Do not audit attempts to append users
65432 temporary files.
65433 @@ -125640,7 +126516,7 @@ Domain to not audit.
65434 </summary>
65435 </param>
65436 </interface>
65437 -<interface name="userdom_rw_user_tmp_files" lineno="3076">
65438 +<interface name="userdom_rw_user_tmp_files" lineno="3080">
65439 <summary>
65440 Read and write user temporary files.
65441 </summary>
65442 @@ -125650,7 +126526,7 @@ Domain allowed access.
65443 </summary>
65444 </param>
65445 </interface>
65446 -<interface name="userdom_delete_user_tmp_files" lineno="3097">
65447 +<interface name="userdom_delete_user_tmp_files" lineno="3101">
65448 <summary>
65449 Delete users temporary files.
65450 </summary>
65451 @@ -125660,7 +126536,7 @@ Domain allowed access.
65452 </summary>
65453 </param>
65454 </interface>
65455 -<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="3116">
65456 +<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="3120">
65457 <summary>
65458 Do not audit attempts to manage users
65459 temporary files.
65460 @@ -125671,7 +126547,7 @@ Domain to not audit.
65461 </summary>
65462 </param>
65463 </interface>
65464 -<interface name="userdom_read_user_tmp_symlinks" lineno="3134">
65465 +<interface name="userdom_read_user_tmp_symlinks" lineno="3138">
65466 <summary>
65467 Read user temporary symbolic links.
65468 </summary>
65469 @@ -125681,7 +126557,7 @@ Domain allowed access.
65470 </summary>
65471 </param>
65472 </interface>
65473 -<interface name="userdom_delete_user_tmp_symlinks" lineno="3155">
65474 +<interface name="userdom_delete_user_tmp_symlinks" lineno="3159">
65475 <summary>
65476 Delete users temporary symbolic links.
65477 </summary>
65478 @@ -125691,7 +126567,7 @@ Domain allowed access.
65479 </summary>
65480 </param>
65481 </interface>
65482 -<interface name="userdom_manage_user_tmp_dirs" lineno="3174">
65483 +<interface name="userdom_manage_user_tmp_dirs" lineno="3178">
65484 <summary>
65485 Create, read, write, and delete user
65486 temporary directories.
65487 @@ -125702,7 +126578,7 @@ Domain allowed access.
65488 </summary>
65489 </param>
65490 </interface>
65491 -<interface name="userdom_delete_user_tmp_named_pipes" lineno="3194">
65492 +<interface name="userdom_delete_user_tmp_named_pipes" lineno="3198">
65493 <summary>
65494 Delete users temporary named pipes.
65495 </summary>
65496 @@ -125712,7 +126588,7 @@ Domain allowed access.
65497 </summary>
65498 </param>
65499 </interface>
65500 -<interface name="userdom_manage_user_tmp_files" lineno="3213">
65501 +<interface name="userdom_manage_user_tmp_files" lineno="3217">
65502 <summary>
65503 Create, read, write, and delete user
65504 temporary files.
65505 @@ -125723,7 +126599,7 @@ Domain allowed access.
65506 </summary>
65507 </param>
65508 </interface>
65509 -<interface name="userdom_delete_user_tmp_named_sockets" lineno="3233">
65510 +<interface name="userdom_delete_user_tmp_named_sockets" lineno="3237">
65511 <summary>
65512 Delete users temporary named sockets.
65513 </summary>
65514 @@ -125733,7 +126609,7 @@ Domain allowed access.
65515 </summary>
65516 </param>
65517 </interface>
65518 -<interface name="userdom_manage_user_tmp_symlinks" lineno="3252">
65519 +<interface name="userdom_manage_user_tmp_symlinks" lineno="3256">
65520 <summary>
65521 Create, read, write, and delete user
65522 temporary symbolic links.
65523 @@ -125744,7 +126620,7 @@ Domain allowed access.
65524 </summary>
65525 </param>
65526 </interface>
65527 -<interface name="userdom_dontaudit_rw_user_tmp_pipes" lineno="3273">
65528 +<interface name="userdom_dontaudit_rw_user_tmp_pipes" lineno="3277">
65529 <summary>
65530 Do not audit attempts to read and write
65531 temporary pipes.
65532 @@ -125755,7 +126631,7 @@ Domain allowed access.
65533 </summary>
65534 </param>
65535 </interface>
65536 -<interface name="userdom_manage_user_tmp_pipes" lineno="3292">
65537 +<interface name="userdom_manage_user_tmp_pipes" lineno="3296">
65538 <summary>
65539 Create, read, write, and delete user
65540 temporary named pipes.
65541 @@ -125766,7 +126642,7 @@ Domain allowed access.
65542 </summary>
65543 </param>
65544 </interface>
65545 -<interface name="userdom_manage_user_tmp_sockets" lineno="3313">
65546 +<interface name="userdom_manage_user_tmp_sockets" lineno="3317">
65547 <summary>
65548 Create, read, write, and delete user
65549 temporary named sockets.
65550 @@ -125777,7 +126653,7 @@ Domain allowed access.
65551 </summary>
65552 </param>
65553 </interface>
65554 -<interface name="userdom_user_tmp_filetrans" lineno="3350">
65555 +<interface name="userdom_user_tmp_filetrans" lineno="3354">
65556 <summary>
65557 Create objects in a user temporary directory
65558 with an automatic type transition to
65559 @@ -125804,7 +126680,7 @@ The name of the object being created.
65560 </summary>
65561 </param>
65562 </interface>
65563 -<interface name="userdom_tmp_filetrans_user_tmp" lineno="3382">
65564 +<interface name="userdom_tmp_filetrans_user_tmp" lineno="3386">
65565 <summary>
65566 Create objects in the temporary directory
65567 with an automatic type transition to
65568 @@ -125826,7 +126702,7 @@ The name of the object being created.
65569 </summary>
65570 </param>
65571 </interface>
65572 -<interface name="userdom_map_user_tmpfs_files" lineno="3400">
65573 +<interface name="userdom_map_user_tmpfs_files" lineno="3404">
65574 <summary>
65575 Map user tmpfs files.
65576 </summary>
65577 @@ -125836,7 +126712,7 @@ Domain allowed access.
65578 </summary>
65579 </param>
65580 </interface>
65581 -<interface name="userdom_read_user_tmpfs_files" lineno="3418">
65582 +<interface name="userdom_read_user_tmpfs_files" lineno="3422">
65583 <summary>
65584 Read user tmpfs files.
65585 </summary>
65586 @@ -125846,7 +126722,7 @@ Domain allowed access.
65587 </summary>
65588 </param>
65589 </interface>
65590 -<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3438">
65591 +<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3442">
65592 <summary>
65593 dontaudit Read attempts of user tmpfs files.
65594 </summary>
65595 @@ -125856,7 +126732,7 @@ Domain allowed access.
65596 </summary>
65597 </param>
65598 </interface>
65599 -<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3457">
65600 +<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3461">
65601 <summary>
65602 relabel to/from user tmpfs dirs
65603 </summary>
65604 @@ -125866,7 +126742,7 @@ Domain allowed access.
65605 </summary>
65606 </param>
65607 </interface>
65608 -<interface name="userdom_relabel_user_tmpfs_files" lineno="3476">
65609 +<interface name="userdom_relabel_user_tmpfs_files" lineno="3480">
65610 <summary>
65611 relabel to/from user tmpfs files
65612 </summary>
65613 @@ -125876,7 +126752,7 @@ Domain allowed access.
65614 </summary>
65615 </param>
65616 </interface>
65617 -<interface name="userdom_user_runtime_content" lineno="3498">
65618 +<interface name="userdom_user_runtime_content" lineno="3502">
65619 <summary>
65620 Make the specified type usable in
65621 the directory /run/user/%{USERID}/.
65622 @@ -125888,7 +126764,7 @@ user_runtime_content_dir_t.
65623 </summary>
65624 </param>
65625 </interface>
65626 -<interface name="userdom_search_user_runtime" lineno="3518">
65627 +<interface name="userdom_search_user_runtime" lineno="3522">
65628 <summary>
65629 Search users runtime directories.
65630 </summary>
65631 @@ -125898,7 +126774,7 @@ Domain allowed access.
65632 </summary>
65633 </param>
65634 </interface>
65635 -<interface name="userdom_search_user_runtime_root" lineno="3537">
65636 +<interface name="userdom_search_user_runtime_root" lineno="3541">
65637 <summary>
65638 Search user runtime root directories.
65639 </summary>
65640 @@ -125908,7 +126784,7 @@ Domain allowed access.
65641 </summary>
65642 </param>
65643 </interface>
65644 -<interface name="userdom_dontaudit_search_user_runtime_root" lineno="3557">
65645 +<interface name="userdom_dontaudit_search_user_runtime_root" lineno="3561">
65646 <summary>
65647 Do not audit attempts to search
65648 user runtime root directories.
65649 @@ -125919,7 +126795,7 @@ Domain to not audit.
65650 </summary>
65651 </param>
65652 </interface>
65653 -<interface name="userdom_manage_user_runtime_root_dirs" lineno="3576">
65654 +<interface name="userdom_manage_user_runtime_root_dirs" lineno="3580">
65655 <summary>
65656 Create, read, write, and delete user
65657 runtime root dirs.
65658 @@ -125930,7 +126806,7 @@ Domain allowed access.
65659 </summary>
65660 </param>
65661 </interface>
65662 -<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3595">
65663 +<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3599">
65664 <summary>
65665 Relabel to and from user runtime root dirs.
65666 </summary>
65667 @@ -125940,7 +126816,7 @@ Domain allowed access.
65668 </summary>
65669 </param>
65670 </interface>
65671 -<interface name="userdom_manage_user_runtime_dirs" lineno="3614">
65672 +<interface name="userdom_manage_user_runtime_dirs" lineno="3618">
65673 <summary>
65674 Create, read, write, and delete user
65675 runtime dirs.
65676 @@ -125951,7 +126827,7 @@ Domain allowed access.
65677 </summary>
65678 </param>
65679 </interface>
65680 -<interface name="userdom_mounton_user_runtime_dirs" lineno="3634">
65681 +<interface name="userdom_mounton_user_runtime_dirs" lineno="3638">
65682 <summary>
65683 Mount a filesystem on user runtime dir
65684 directories.
65685 @@ -125962,7 +126838,7 @@ Domain allowed access.
65686 </summary>
65687 </param>
65688 </interface>
65689 -<interface name="userdom_relabelto_user_runtime_dirs" lineno="3652">
65690 +<interface name="userdom_relabelto_user_runtime_dirs" lineno="3656">
65691 <summary>
65692 Relabel to user runtime directories.
65693 </summary>
65694 @@ -125972,7 +126848,7 @@ Domain allowed access.
65695 </summary>
65696 </param>
65697 </interface>
65698 -<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3670">
65699 +<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3674">
65700 <summary>
65701 Relabel from user runtime directories.
65702 </summary>
65703 @@ -125982,7 +126858,7 @@ Domain allowed access.
65704 </summary>
65705 </param>
65706 </interface>
65707 -<interface name="userdom_delete_user_runtime_files" lineno="3688">
65708 +<interface name="userdom_delete_user_runtime_files" lineno="3692">
65709 <summary>
65710 delete user runtime files
65711 </summary>
65712 @@ -125992,7 +126868,7 @@ Domain allowed access.
65713 </summary>
65714 </param>
65715 </interface>
65716 -<interface name="userdom_search_all_user_runtime" lineno="3707">
65717 +<interface name="userdom_search_all_user_runtime" lineno="3711">
65718 <summary>
65719 Search users runtime directories.
65720 </summary>
65721 @@ -126002,7 +126878,7 @@ Domain allowed access.
65722 </summary>
65723 </param>
65724 </interface>
65725 -<interface name="userdom_list_all_user_runtime" lineno="3726">
65726 +<interface name="userdom_list_all_user_runtime" lineno="3730">
65727 <summary>
65728 List user runtime directories.
65729 </summary>
65730 @@ -126012,7 +126888,7 @@ Domain allowed access.
65731 </summary>
65732 </param>
65733 </interface>
65734 -<interface name="userdom_delete_all_user_runtime_dirs" lineno="3745">
65735 +<interface name="userdom_delete_all_user_runtime_dirs" lineno="3749">
65736 <summary>
65737 delete user runtime directories
65738 </summary>
65739 @@ -126022,7 +126898,7 @@ Domain allowed access.
65740 </summary>
65741 </param>
65742 </interface>
65743 -<interface name="userdom_delete_all_user_runtime_files" lineno="3763">
65744 +<interface name="userdom_delete_all_user_runtime_files" lineno="3767">
65745 <summary>
65746 delete user runtime files
65747 </summary>
65748 @@ -126032,7 +126908,7 @@ Domain allowed access.
65749 </summary>
65750 </param>
65751 </interface>
65752 -<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3781">
65753 +<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3785">
65754 <summary>
65755 delete user runtime symlink files
65756 </summary>
65757 @@ -126042,7 +126918,7 @@ Domain allowed access.
65758 </summary>
65759 </param>
65760 </interface>
65761 -<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3799">
65762 +<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3803">
65763 <summary>
65764 delete user runtime fifo files
65765 </summary>
65766 @@ -126052,7 +126928,7 @@ Domain allowed access.
65767 </summary>
65768 </param>
65769 </interface>
65770 -<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3817">
65771 +<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3821">
65772 <summary>
65773 delete user runtime socket files
65774 </summary>
65775 @@ -126062,7 +126938,7 @@ Domain allowed access.
65776 </summary>
65777 </param>
65778 </interface>
65779 -<interface name="userdom_delete_all_user_runtime_blk_files" lineno="3835">
65780 +<interface name="userdom_delete_all_user_runtime_blk_files" lineno="3839">
65781 <summary>
65782 delete user runtime blk files
65783 </summary>
65784 @@ -126072,7 +126948,7 @@ Domain allowed access.
65785 </summary>
65786 </param>
65787 </interface>
65788 -<interface name="userdom_delete_all_user_runtime_chr_files" lineno="3853">
65789 +<interface name="userdom_delete_all_user_runtime_chr_files" lineno="3857">
65790 <summary>
65791 delete user runtime chr files
65792 </summary>
65793 @@ -126082,7 +126958,7 @@ Domain allowed access.
65794 </summary>
65795 </param>
65796 </interface>
65797 -<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3883">
65798 +<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3887">
65799 <summary>
65800 Create objects in the pid directory
65801 with an automatic type transition to
65802 @@ -126104,7 +126980,7 @@ The name of the object being created.
65803 </summary>
65804 </param>
65805 </interface>
65806 -<interface name="userdom_runtime_filetrans_user_runtime_root" lineno="3910">
65807 +<interface name="userdom_runtime_filetrans_user_runtime_root" lineno="3914">
65808 <summary>
65809 Create objects in the runtime directory
65810 with an automatic type transition to
65811 @@ -126126,7 +127002,7 @@ The name of the object being created.
65812 </summary>
65813 </param>
65814 </interface>
65815 -<interface name="userdom_user_runtime_filetrans" lineno="3946">
65816 +<interface name="userdom_user_runtime_filetrans" lineno="3950">
65817 <summary>
65818 Create objects in a user runtime
65819 directory with an automatic type
65820 @@ -126154,7 +127030,7 @@ The name of the object being created.
65821 </summary>
65822 </param>
65823 </interface>
65824 -<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3977">
65825 +<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3981">
65826 <summary>
65827 Create objects in the user runtime directory
65828 with an automatic type transition to
65829 @@ -126176,7 +127052,7 @@ The name of the object being created.
65830 </summary>
65831 </param>
65832 </interface>
65833 -<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="4007">
65834 +<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="4011">
65835 <summary>
65836 Create objects in the user runtime root
65837 directory with an automatic type transition
65838 @@ -126198,7 +127074,7 @@ The name of the object being created.
65839 </summary>
65840 </param>
65841 </interface>
65842 -<interface name="userdom_user_run_filetrans_user_runtime" lineno="4038">
65843 +<interface name="userdom_user_run_filetrans_user_runtime" lineno="4042">
65844 <summary>
65845 Create objects in the user runtime root
65846 directory with an automatic type transition
65847 @@ -126220,7 +127096,7 @@ The name of the object being created.
65848 </summary>
65849 </param>
65850 </interface>
65851 -<interface name="userdom_rw_user_tmpfs_files" lineno="4056">
65852 +<interface name="userdom_rw_user_tmpfs_files" lineno="4060">
65853 <summary>
65854 Read and write user tmpfs files.
65855 </summary>
65856 @@ -126230,7 +127106,7 @@ Domain allowed access.
65857 </summary>
65858 </param>
65859 </interface>
65860 -<interface name="userdom_delete_user_tmpfs_files" lineno="4077">
65861 +<interface name="userdom_delete_user_tmpfs_files" lineno="4081">
65862 <summary>
65863 Delete user tmpfs files.
65864 </summary>
65865 @@ -126240,7 +127116,7 @@ Domain allowed access.
65866 </summary>
65867 </param>
65868 </interface>
65869 -<interface name="userdom_manage_user_tmpfs_files" lineno="4096">
65870 +<interface name="userdom_manage_user_tmpfs_files" lineno="4100">
65871 <summary>
65872 Create, read, write, and delete user tmpfs files.
65873 </summary>
65874 @@ -126250,7 +127126,7 @@ Domain allowed access.
65875 </summary>
65876 </param>
65877 </interface>
65878 -<interface name="userdom_getattr_user_ttys" lineno="4116">
65879 +<interface name="userdom_getattr_user_ttys" lineno="4120">
65880 <summary>
65881 Get the attributes of a user domain tty.
65882 </summary>
65883 @@ -126260,7 +127136,7 @@ Domain allowed access.
65884 </summary>
65885 </param>
65886 </interface>
65887 -<interface name="userdom_dontaudit_getattr_user_ttys" lineno="4134">
65888 +<interface name="userdom_dontaudit_getattr_user_ttys" lineno="4138">
65889 <summary>
65890 Do not audit attempts to get the attributes of a user domain tty.
65891 </summary>
65892 @@ -126270,7 +127146,7 @@ Domain to not audit.
65893 </summary>
65894 </param>
65895 </interface>
65896 -<interface name="userdom_setattr_user_ttys" lineno="4152">
65897 +<interface name="userdom_setattr_user_ttys" lineno="4156">
65898 <summary>
65899 Set the attributes of a user domain tty.
65900 </summary>
65901 @@ -126280,7 +127156,7 @@ Domain allowed access.
65902 </summary>
65903 </param>
65904 </interface>
65905 -<interface name="userdom_dontaudit_setattr_user_ttys" lineno="4170">
65906 +<interface name="userdom_dontaudit_setattr_user_ttys" lineno="4174">
65907 <summary>
65908 Do not audit attempts to set the attributes of a user domain tty.
65909 </summary>
65910 @@ -126290,7 +127166,7 @@ Domain to not audit.
65911 </summary>
65912 </param>
65913 </interface>
65914 -<interface name="userdom_use_user_ttys" lineno="4188">
65915 +<interface name="userdom_use_user_ttys" lineno="4192">
65916 <summary>
65917 Read and write a user domain tty.
65918 </summary>
65919 @@ -126300,7 +127176,7 @@ Domain allowed access.
65920 </summary>
65921 </param>
65922 </interface>
65923 -<interface name="userdom_use_user_ptys" lineno="4206">
65924 +<interface name="userdom_use_user_ptys" lineno="4210">
65925 <summary>
65926 Read and write a user domain pty.
65927 </summary>
65928 @@ -126310,7 +127186,7 @@ Domain allowed access.
65929 </summary>
65930 </param>
65931 </interface>
65932 -<interface name="userdom_use_inherited_user_terminals" lineno="4241">
65933 +<interface name="userdom_use_inherited_user_terminals" lineno="4245">
65934 <summary>
65935 Read and write a user TTYs and PTYs.
65936 </summary>
65937 @@ -126336,7 +127212,7 @@ Domain allowed access.
65938 </param>
65939 <infoflow type="both" weight="10"/>
65940 </interface>
65941 -<interface name="userdom_use_user_terminals" lineno="4282">
65942 +<interface name="userdom_use_user_terminals" lineno="4286">
65943 <summary>
65944 Read, write and open a user TTYs and PTYs.
65945 </summary>
65946 @@ -126368,7 +127244,7 @@ Domain allowed access.
65947 </param>
65948 <infoflow type="both" weight="10"/>
65949 </interface>
65950 -<interface name="userdom_dontaudit_use_user_terminals" lineno="4298">
65951 +<interface name="userdom_dontaudit_use_user_terminals" lineno="4302">
65952 <summary>
65953 Do not audit attempts to read and write
65954 a user domain tty and pty.
65955 @@ -126379,7 +127255,7 @@ Domain to not audit.
65956 </summary>
65957 </param>
65958 </interface>
65959 -<interface name="userdom_spec_domtrans_all_users" lineno="4319">
65960 +<interface name="userdom_spec_domtrans_all_users" lineno="4323">
65961 <summary>
65962 Execute a shell in all user domains. This
65963 is an explicit transition, requiring the
65964 @@ -126391,7 +127267,7 @@ Domain allowed to transition.
65965 </summary>
65966 </param>
65967 </interface>
65968 -<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4342">
65969 +<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4346">
65970 <summary>
65971 Execute an Xserver session in all user domains. This
65972 is an explicit transition, requiring the
65973 @@ -126403,7 +127279,7 @@ Domain allowed to transition.
65974 </summary>
65975 </param>
65976 </interface>
65977 -<interface name="userdom_spec_domtrans_unpriv_users" lineno="4365">
65978 +<interface name="userdom_spec_domtrans_unpriv_users" lineno="4369">
65979 <summary>
65980 Execute a shell in all unprivileged user domains. This
65981 is an explicit transition, requiring the
65982 @@ -126415,7 +127291,7 @@ Domain allowed to transition.
65983 </summary>
65984 </param>
65985 </interface>
65986 -<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4388">
65987 +<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4392">
65988 <summary>
65989 Execute an Xserver session in all unprivileged user domains. This
65990 is an explicit transition, requiring the
65991 @@ -126427,7 +127303,7 @@ Domain allowed to transition.
65992 </summary>
65993 </param>
65994 </interface>
65995 -<interface name="userdom_rw_unpriv_user_semaphores" lineno="4409">
65996 +<interface name="userdom_rw_unpriv_user_semaphores" lineno="4413">
65997 <summary>
65998 Read and write unpriviledged user SysV sempaphores.
65999 </summary>
66000 @@ -126437,7 +127313,7 @@ Domain allowed access.
66001 </summary>
66002 </param>
66003 </interface>
66004 -<interface name="userdom_manage_unpriv_user_semaphores" lineno="4427">
66005 +<interface name="userdom_manage_unpriv_user_semaphores" lineno="4431">
66006 <summary>
66007 Manage unpriviledged user SysV sempaphores.
66008 </summary>
66009 @@ -126447,7 +127323,7 @@ Domain allowed access.
66010 </summary>
66011 </param>
66012 </interface>
66013 -<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4446">
66014 +<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4450">
66015 <summary>
66016 Read and write unpriviledged user SysV shared
66017 memory segments.
66018 @@ -126458,7 +127334,7 @@ Domain allowed access.
66019 </summary>
66020 </param>
66021 </interface>
66022 -<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4465">
66023 +<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4469">
66024 <summary>
66025 Manage unpriviledged user SysV shared
66026 memory segments.
66027 @@ -126469,7 +127345,7 @@ Domain allowed access.
66028 </summary>
66029 </param>
66030 </interface>
66031 -<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4485">
66032 +<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4489">
66033 <summary>
66034 Execute bin_t in the unprivileged user domains. This
66035 is an explicit transition, requiring the
66036 @@ -126481,7 +127357,7 @@ Domain allowed to transition.
66037 </summary>
66038 </param>
66039 </interface>
66040 -<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4508">
66041 +<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4512">
66042 <summary>
66043 Execute all entrypoint files in unprivileged user
66044 domains. This is an explicit transition, requiring the
66045 @@ -126493,7 +127369,7 @@ Domain allowed access.
66046 </summary>
66047 </param>
66048 </interface>
66049 -<interface name="userdom_search_user_home_content" lineno="4529">
66050 +<interface name="userdom_search_user_home_content" lineno="4533">
66051 <summary>
66052 Search users home directories.
66053 </summary>
66054 @@ -126503,7 +127379,7 @@ Domain allowed access.
66055 </summary>
66056 </param>
66057 </interface>
66058 -<interface name="userdom_signull_unpriv_users" lineno="4548">
66059 +<interface name="userdom_signull_unpriv_users" lineno="4552">
66060 <summary>
66061 Send signull to unprivileged user domains.
66062 </summary>
66063 @@ -126513,7 +127389,7 @@ Domain allowed access.
66064 </summary>
66065 </param>
66066 </interface>
66067 -<interface name="userdom_signal_unpriv_users" lineno="4566">
66068 +<interface name="userdom_signal_unpriv_users" lineno="4570">
66069 <summary>
66070 Send general signals to unprivileged user domains.
66071 </summary>
66072 @@ -126523,7 +127399,7 @@ Domain allowed access.
66073 </summary>
66074 </param>
66075 </interface>
66076 -<interface name="userdom_use_unpriv_users_fds" lineno="4584">
66077 +<interface name="userdom_use_unpriv_users_fds" lineno="4588">
66078 <summary>
66079 Inherit the file descriptors from unprivileged user domains.
66080 </summary>
66081 @@ -126533,7 +127409,7 @@ Domain allowed access.
66082 </summary>
66083 </param>
66084 </interface>
66085 -<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4612">
66086 +<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4616">
66087 <summary>
66088 Do not audit attempts to inherit the file descriptors
66089 from unprivileged user domains.
66090 @@ -126553,7 +127429,7 @@ Domain to not audit.
66091 </param>
66092 <infoflow type="none"/>
66093 </interface>
66094 -<interface name="userdom_dontaudit_use_user_ptys" lineno="4630">
66095 +<interface name="userdom_dontaudit_use_user_ptys" lineno="4634">
66096 <summary>
66097 Do not audit attempts to use user ptys.
66098 </summary>
66099 @@ -126563,7 +127439,7 @@ Domain to not audit.
66100 </summary>
66101 </param>
66102 </interface>
66103 -<interface name="userdom_relabelto_user_ptys" lineno="4648">
66104 +<interface name="userdom_relabelto_user_ptys" lineno="4652">
66105 <summary>
66106 Relabel files to unprivileged user pty types.
66107 </summary>
66108 @@ -126573,7 +127449,7 @@ Domain allowed access.
66109 </summary>
66110 </param>
66111 </interface>
66112 -<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4667">
66113 +<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4671">
66114 <summary>
66115 Do not audit attempts to relabel files from
66116 user pty types.
66117 @@ -126584,7 +127460,7 @@ Domain to not audit.
66118 </summary>
66119 </param>
66120 </interface>
66121 -<interface name="userdom_write_user_tmp_files" lineno="4685">
66122 +<interface name="userdom_write_user_tmp_files" lineno="4689">
66123 <summary>
66124 Write all users files in /tmp
66125 </summary>
66126 @@ -126594,7 +127470,7 @@ Domain allowed access.
66127 </summary>
66128 </param>
66129 </interface>
66130 -<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4704">
66131 +<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4708">
66132 <summary>
66133 Do not audit attempts to write users
66134 temporary files.
66135 @@ -126605,7 +127481,7 @@ Domain to not audit.
66136 </summary>
66137 </param>
66138 </interface>
66139 -<interface name="userdom_dontaudit_use_user_ttys" lineno="4722">
66140 +<interface name="userdom_dontaudit_use_user_ttys" lineno="4726">
66141 <summary>
66142 Do not audit attempts to use user ttys.
66143 </summary>
66144 @@ -126615,7 +127491,7 @@ Domain to not audit.
66145 </summary>
66146 </param>
66147 </interface>
66148 -<interface name="userdom_read_all_users_state" lineno="4740">
66149 +<interface name="userdom_read_all_users_state" lineno="4744">
66150 <summary>
66151 Read the process state of all user domains.
66152 </summary>
66153 @@ -126625,7 +127501,7 @@ Domain allowed access.
66154 </summary>
66155 </param>
66156 </interface>
66157 -<interface name="userdom_getattr_all_users" lineno="4760">
66158 +<interface name="userdom_getattr_all_users" lineno="4764">
66159 <summary>
66160 Get the attributes of all user domains.
66161 </summary>
66162 @@ -126635,7 +127511,7 @@ Domain allowed access.
66163 </summary>
66164 </param>
66165 </interface>
66166 -<interface name="userdom_use_all_users_fds" lineno="4778">
66167 +<interface name="userdom_use_all_users_fds" lineno="4782">
66168 <summary>
66169 Inherit the file descriptors from all user domains
66170 </summary>
66171 @@ -126645,7 +127521,7 @@ Domain allowed access.
66172 </summary>
66173 </param>
66174 </interface>
66175 -<interface name="userdom_dontaudit_use_all_users_fds" lineno="4797">
66176 +<interface name="userdom_dontaudit_use_all_users_fds" lineno="4801">
66177 <summary>
66178 Do not audit attempts to inherit the file
66179 descriptors from any user domains.
66180 @@ -126656,7 +127532,7 @@ Domain to not audit.
66181 </summary>
66182 </param>
66183 </interface>
66184 -<interface name="userdom_signal_all_users" lineno="4815">
66185 +<interface name="userdom_signal_all_users" lineno="4819">
66186 <summary>
66187 Send general signals to all user domains.
66188 </summary>
66189 @@ -126666,7 +127542,7 @@ Domain allowed access.
66190 </summary>
66191 </param>
66192 </interface>
66193 -<interface name="userdom_sigchld_all_users" lineno="4833">
66194 +<interface name="userdom_sigchld_all_users" lineno="4837">
66195 <summary>
66196 Send a SIGCHLD signal to all user domains.
66197 </summary>
66198 @@ -126676,7 +127552,7 @@ Domain allowed access.
66199 </summary>
66200 </param>
66201 </interface>
66202 -<interface name="userdom_read_all_users_keys" lineno="4851">
66203 +<interface name="userdom_read_all_users_keys" lineno="4855">
66204 <summary>
66205 Read keys for all user domains.
66206 </summary>
66207 @@ -126686,7 +127562,7 @@ Domain allowed access.
66208 </summary>
66209 </param>
66210 </interface>
66211 -<interface name="userdom_write_all_users_keys" lineno="4869">
66212 +<interface name="userdom_write_all_users_keys" lineno="4873">
66213 <summary>
66214 Write keys for all user domains.
66215 </summary>
66216 @@ -126696,7 +127572,7 @@ Domain allowed access.
66217 </summary>
66218 </param>
66219 </interface>
66220 -<interface name="userdom_rw_all_users_keys" lineno="4887">
66221 +<interface name="userdom_rw_all_users_keys" lineno="4891">
66222 <summary>
66223 Read and write keys for all user domains.
66224 </summary>
66225 @@ -126706,7 +127582,7 @@ Domain allowed access.
66226 </summary>
66227 </param>
66228 </interface>
66229 -<interface name="userdom_create_all_users_keys" lineno="4905">
66230 +<interface name="userdom_create_all_users_keys" lineno="4909">
66231 <summary>
66232 Create keys for all user domains.
66233 </summary>
66234 @@ -126716,7 +127592,7 @@ Domain allowed access.
66235 </summary>
66236 </param>
66237 </interface>
66238 -<interface name="userdom_manage_all_users_keys" lineno="4923">
66239 +<interface name="userdom_manage_all_users_keys" lineno="4927">
66240 <summary>
66241 Manage keys for all user domains.
66242 </summary>
66243 @@ -126726,7 +127602,7 @@ Domain allowed access.
66244 </summary>
66245 </param>
66246 </interface>
66247 -<interface name="userdom_dbus_send_all_users" lineno="4941">
66248 +<interface name="userdom_dbus_send_all_users" lineno="4945">
66249 <summary>
66250 Send a dbus message to all user domains.
66251 </summary>
66252 @@ -126736,7 +127612,7 @@ Domain allowed access.
66253 </summary>
66254 </param>
66255 </interface>
66256 -<interface name="userdom_manage_user_tmp_chr_files" lineno="4963">
66257 +<interface name="userdom_manage_user_tmp_chr_files" lineno="4967">
66258 <summary>
66259 Create, read, write, and delete user
66260 temporary character files.
66261 @@ -126747,7 +127623,7 @@ Domain allowed access.
66262 </summary>
66263 </param>
66264 </interface>
66265 -<interface name="userdom_relabel_user_certs" lineno="4984">
66266 +<interface name="userdom_relabel_user_certs" lineno="4988">
66267 <summary>
66268 Allow relabeling resources to user_cert_t
66269 </summary>
66270 @@ -126757,7 +127633,7 @@ Domain allowed access
66271 </summary>
66272 </param>
66273 </interface>
66274 -<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="5007">
66275 +<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="5011">
66276 <summary>
66277 Do not audit attempts to read and write
66278 unserdomain stream.
66279
66280 diff --git a/policy/booleans.conf b/policy/booleans.conf
66281 index 900fa523..d2fac33a 100644
66282 --- a/policy/booleans.conf
66283 +++ b/policy/booleans.conf
66284 @@ -1193,6 +1193,21 @@ container_manage_cgroup = false
66285 #
66286 container_mounton_non_security = false
66287
66288 +#
66289 +# Allow containers to manage all read-writable public content.
66290 +#
66291 +container_manage_public_content = false
66292 +
66293 +#
66294 +# Allow containers to read all public content.
66295 +#
66296 +container_read_public_content = false
66297 +
66298 +#
66299 +# Allow containers to use eCryptfs filesystems.
66300 +#
66301 +container_use_ecryptfs = false
66302 +
66303 #
66304 # Allow containers to use NFS filesystems.
66305 #
66306 @@ -1264,6 +1279,19 @@ allow_httpd_cvs_script_anon_write = false
66307 #
66308 dbus_pass_tuntap_fd = false
66309
66310 +#
66311 +# Allow dbus-daemon system bus to to run systemd transient
66312 +# units. This is used by dbus-broker for dbus-activated
66313 +# services when the unit file for the service does not exist.
66314 +#
66315 +dbus_broker_run_transient_units = false
66316 +
66317 +#
66318 +# Enable additional rules to support using dbus-broker
66319 +# as the dbus-daemon system bus.
66320 +#
66321 +dbus_broker_system_bus = false
66322 +
66323 #
66324 # Determine whether DHCP daemon
66325 # can use LDAP backends.
66326 @@ -1472,6 +1500,17 @@ allow_kerberos = false
66327 #
66328 use_lpd_server = false
66329
66330 +#
66331 +# Determine whether Matrixd is allowed to federate
66332 +# (bind all UDP ports and connect to all TCP ports).
66333 +#
66334 +matrix_allow_federation = true
66335 +
66336 +#
66337 +# Determine whether Matrixd can connect to the Postgres database.
66338 +#
66339 +matrix_postgresql_connect = false
66340 +
66341 #
66342 # Determine whether the script domain can
66343 # modify public files used for public file
66344 @@ -2038,6 +2077,11 @@ dhcpc_manage_samba = false
66345 #
66346 systemd_tmpfiles_manage_all = false
66347
66348 +#
66349 +# Allow systemd-networkd to run its DHCPd server component
66350 +#
66351 +systemd_networkd_dhcp_server = false
66352 +
66353 #
66354 # Allow systemd-nspawn to create a labelled namespace with the same types
66355 # as parent environment
66356
66357 diff --git a/policy/modules.conf b/policy/modules.conf
66358 index f94f6cc4..2487c0f7 100644
66359 --- a/policy/modules.conf
66360 +++ b/policy/modules.conf
66361 @@ -214,6 +214,13 @@ cfengine = module
66362 #
66363 chkrootkit = module
66364
66365 +# Layer: admin
66366 +# Module: cloudinit
66367 +#
66368 +# Init scripts for cloud VMs
66369 +#
66370 +cloudinit = module
66371 +
66372 # Layer: admin
66373 # Module: consoletype
66374 #
66375 @@ -1811,6 +1818,13 @@ lsm = module
66376 #
66377 mailman = module
66378
66379 +# Layer: services
66380 +# Module: matrixd
66381 +#
66382 +# matrix.org synapse reference server.
66383 +#
66384 +matrixd = module
66385 +
66386 # Layer: services
66387 # Module: mediawiki
66388 #
66389 @@ -1951,6 +1965,13 @@ networkmanager = module
66390 #
66391 nis = module
66392
66393 +# Layer: services
66394 +# Module: node_exporter
66395 +#
66396 +# Prometheus Node Exporter
66397 +#
66398 +node_exporter = module
66399 +
66400 # Layer: services
66401 # Module: nscd
66402 #
66403
66404 diff --git a/policy/modules/kernel/corenetwork.if b/policy/modules/kernel/corenetwork.if
66405 index a0cb0bed..5d3edc20 100644
66406 --- a/policy/modules/kernel/corenetwork.if
66407 +++ b/policy/modules/kernel/corenetwork.if
66408 @@ -914,6 +914,24 @@ interface(`corenet_tcp_bind_generic_node',`
66409 allow $1 node_t:tcp_socket node_bind;
66410 ')
66411
66412 +########################################
66413 +## <summary>
66414 +## Do not audit denials on binding TCP sockets to generic nodes.
66415 +## </summary>
66416 +## <param name="domain">
66417 +## <summary>
66418 +## Domain to not audit.
66419 +## </summary>
66420 +## </param>
66421 +#
66422 +interface(`corenet_dontaudit_tcp_bind_generic_node',`
66423 + gen_require(`
66424 + type node_t;
66425 + ')
66426 +
66427 + dontaudit $1 node_t:tcp_socket node_bind;
66428 +')
66429 +
66430 ########################################
66431 ## <summary>
66432 ## Bind UDP sockets to generic nodes.
66433
66434 diff --git a/policy/modules/kernel/corenetwork.te b/policy/modules/kernel/corenetwork.te
66435 index 7632e589..e2c7dc6c 100644
66436 --- a/policy/modules/kernel/corenetwork.te
66437 +++ b/policy/modules/kernel/corenetwork.te
66438 @@ -684,6 +684,7 @@ portcon tcp 488 gen_context(system_u:object_r:http_port_t,s0)
66439 portcon tcp 8008 gen_context(system_u:object_r:http_port_t,s0)
66440 portcon tcp 8009 gen_context(system_u:object_r:http_port_t,s0)
66441 portcon tcp 8443 gen_context(system_u:object_r:http_port_t,s0)
66442 +portcon tcp 8448 gen_context(system_u:object_r:http_port_t,s0)
66443 #8443 is mod_nss default port
66444
66445 type http_cache_port_t, port_type, defined_port_type;