public inbox for gentoo-commits@lists.gentoo.org
 help / color / mirror / Atom feed
From: "Kenton Groombridge" <concord@gentoo.org>
To: gentoo-commits@lists.gentoo.org
Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: doc/
Date: Fri, 20 Oct 2023 22:05:58 +0000 (UTC)	[thread overview]
Message-ID: <1697837405.8c8f4a31a3896a10963b987691b7c7b87ce18842.concord@gentoo> (raw)

commit:     8c8f4a31a3896a10963b987691b7c7b87ce18842
Author:     Kenton Groombridge <concord <AT> gentoo <DOT> org>
AuthorDate: Fri Oct 20 21:29:46 2023 +0000
Commit:     Kenton Groombridge <concord <AT> gentoo <DOT> org>
CommitDate: Fri Oct 20 21:30:05 2023 +0000
URL:        https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=8c8f4a31

Update generated policy and doc files

Signed-off-by: Kenton Groombridge <concord <AT> gentoo.org>

 doc/policy.xml | 670 ++++++++++++++++++++++++++++++---------------------------
 1 file changed, 350 insertions(+), 320 deletions(-)

diff --git a/doc/policy.xml b/doc/policy.xml
index e96f1ea28..8ae22432d 100644
--- a/doc/policy.xml
+++ b/doc/policy.xml
@@ -58392,7 +58392,17 @@ Domain allow access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_sysfs" lineno="4399">
+<interface name="dev_unmount_sysfs" lineno="4399">
+<summary>
+unmount a sysfs filesystem
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_dontaudit_getattr_sysfs" lineno="4417">
 <summary>
 Do not audit getting the attributes of sysfs filesystem
 </summary>
@@ -58402,7 +58412,7 @@ Domain to dontaudit access from
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_read_sysfs" lineno="4417">
+<interface name="dev_dontaudit_read_sysfs" lineno="4435">
 <summary>
 Dont audit attempts to read hardware state information
 </summary>
@@ -58412,7 +58422,7 @@ Domain for which the attempts do not need to be audited
 </summary>
 </param>
 </interface>
-<interface name="dev_mounton_sysfs_dirs" lineno="4437">
+<interface name="dev_mounton_sysfs_dirs" lineno="4455">
 <summary>
 Mount on sysfs directories.
 </summary>
@@ -58422,7 +58432,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_search_sysfs" lineno="4455">
+<interface name="dev_search_sysfs" lineno="4473">
 <summary>
 Search the sysfs directories.
 </summary>
@@ -58432,7 +58442,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_search_sysfs" lineno="4473">
+<interface name="dev_dontaudit_search_sysfs" lineno="4491">
 <summary>
 Do not audit attempts to search sysfs.
 </summary>
@@ -58442,7 +58452,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_list_sysfs" lineno="4491">
+<interface name="dev_list_sysfs" lineno="4509">
 <summary>
 List the contents of the sysfs directories.
 </summary>
@@ -58452,7 +58462,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_sysfs_dirs" lineno="4510">
+<interface name="dev_write_sysfs_dirs" lineno="4528">
 <summary>
 Write in a sysfs directories.
 </summary>
@@ -58462,7 +58472,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4528">
+<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4546">
 <summary>
 Do not audit attempts to write in a sysfs directory.
 </summary>
@@ -58472,7 +58482,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_write_sysfs_files" lineno="4546">
+<interface name="dev_dontaudit_write_sysfs_files" lineno="4564">
 <summary>
 Do not audit attempts to write to a sysfs file.
 </summary>
@@ -58482,7 +58492,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_manage_sysfs_dirs" lineno="4565">
+<interface name="dev_manage_sysfs_dirs" lineno="4583">
 <summary>
 Create, read, write, and delete sysfs
 directories.
@@ -58493,7 +58503,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_sysfs" lineno="4592">
+<interface name="dev_read_sysfs" lineno="4610">
 <summary>
 Read hardware state information.
 </summary>
@@ -58512,7 +58522,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="dev_write_sysfs" lineno="4620">
+<interface name="dev_write_sysfs" lineno="4638">
 <summary>
 Write to hardware state information.
 </summary>
@@ -58529,7 +58539,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="dev_rw_sysfs" lineno="4639">
+<interface name="dev_rw_sysfs" lineno="4657">
 <summary>
 Allow caller to modify hardware state information.
 </summary>
@@ -58539,7 +58549,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_create_sysfs_files" lineno="4660">
+<interface name="dev_create_sysfs_files" lineno="4678">
 <summary>
 Add a sysfs file
 </summary>
@@ -58549,7 +58559,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_relabel_sysfs_dirs" lineno="4678">
+<interface name="dev_relabel_sysfs_dirs" lineno="4696">
 <summary>
 Relabel hardware state directories.
 </summary>
@@ -58559,7 +58569,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_relabel_all_sysfs" lineno="4696">
+<interface name="dev_relabel_all_sysfs" lineno="4714">
 <summary>
 Relabel from/to all sysfs types.
 </summary>
@@ -58569,7 +58579,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_all_sysfs" lineno="4716">
+<interface name="dev_setattr_all_sysfs" lineno="4734">
 <summary>
 Set the attributes of sysfs files, directories and symlinks.
 </summary>
@@ -58579,7 +58589,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_tpm" lineno="4736">
+<interface name="dev_rw_tpm" lineno="4754">
 <summary>
 Read and write the TPM device.
 </summary>
@@ -58589,7 +58599,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_urand" lineno="4777">
+<interface name="dev_read_urand" lineno="4795">
 <summary>
 Read from pseudo random number generator devices (e.g., /dev/urandom).
 </summary>
@@ -58622,7 +58632,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="10"/>
 </interface>
-<interface name="dev_dontaudit_read_urand" lineno="4796">
+<interface name="dev_dontaudit_read_urand" lineno="4814">
 <summary>
 Do not audit attempts to read from pseudo
 random devices (e.g., /dev/urandom)
@@ -58633,7 +58643,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_urand" lineno="4815">
+<interface name="dev_write_urand" lineno="4833">
 <summary>
 Write to the pseudo random device (e.g., /dev/urandom). This
 sets the random number generator seed.
@@ -58644,7 +58654,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_create_urand_dev" lineno="4833">
+<interface name="dev_create_urand_dev" lineno="4851">
 <summary>
 Create the urandom device (/dev/urandom).
 </summary>
@@ -58654,7 +58664,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_urand_dev" lineno="4851">
+<interface name="dev_setattr_urand_dev" lineno="4869">
 <summary>
 Set attributes on the urandom device (/dev/urandom).
 </summary>
@@ -58664,7 +58674,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_generic_usb_dev" lineno="4869">
+<interface name="dev_getattr_generic_usb_dev" lineno="4887">
 <summary>
 Getattr generic the USB devices.
 </summary>
@@ -58674,7 +58684,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_generic_usb_dev" lineno="4887">
+<interface name="dev_setattr_generic_usb_dev" lineno="4905">
 <summary>
 Setattr generic the USB devices.
 </summary>
@@ -58684,7 +58694,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_generic_usb_dev" lineno="4905">
+<interface name="dev_read_generic_usb_dev" lineno="4923">
 <summary>
 Read generic the USB devices.
 </summary>
@@ -58694,7 +58704,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_generic_usb_dev" lineno="4923">
+<interface name="dev_rw_generic_usb_dev" lineno="4941">
 <summary>
 Read and write generic the USB devices.
 </summary>
@@ -58704,7 +58714,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_relabel_generic_usb_dev" lineno="4941">
+<interface name="dev_relabel_generic_usb_dev" lineno="4959">
 <summary>
 Relabel generic the USB devices.
 </summary>
@@ -58714,7 +58724,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_usbmon_dev" lineno="4959">
+<interface name="dev_read_usbmon_dev" lineno="4977">
 <summary>
 Read USB monitor devices.
 </summary>
@@ -58724,7 +58734,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_usbmon_dev" lineno="4977">
+<interface name="dev_write_usbmon_dev" lineno="4995">
 <summary>
 Write USB monitor devices.
 </summary>
@@ -58734,7 +58744,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_mount_usbfs" lineno="4995">
+<interface name="dev_mount_usbfs" lineno="5013">
 <summary>
 Mount a usbfs filesystem.
 </summary>
@@ -58744,7 +58754,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_associate_usbfs" lineno="5013">
+<interface name="dev_associate_usbfs" lineno="5031">
 <summary>
 Associate a file to a usbfs filesystem.
 </summary>
@@ -58754,7 +58764,7 @@ The type of the file to be associated to usbfs.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_usbfs_dirs" lineno="5031">
+<interface name="dev_getattr_usbfs_dirs" lineno="5049">
 <summary>
 Get the attributes of a directory in the usb filesystem.
 </summary>
@@ -58764,7 +58774,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="5050">
+<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="5068">
 <summary>
 Do not audit attempts to get the attributes
 of a directory in the usb filesystem.
@@ -58775,7 +58785,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_search_usbfs" lineno="5068">
+<interface name="dev_search_usbfs" lineno="5086">
 <summary>
 Search the directory containing USB hardware information.
 </summary>
@@ -58785,7 +58795,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_list_usbfs" lineno="5086">
+<interface name="dev_list_usbfs" lineno="5104">
 <summary>
 Allow caller to get a list of usb hardware.
 </summary>
@@ -58795,7 +58805,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_usbfs_files" lineno="5107">
+<interface name="dev_setattr_usbfs_files" lineno="5125">
 <summary>
 Set the attributes of usbfs filesystem.
 </summary>
@@ -58805,7 +58815,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_usbfs" lineno="5127">
+<interface name="dev_read_usbfs" lineno="5145">
 <summary>
 Read USB hardware information using
 the usbfs filesystem interface.
@@ -58816,7 +58826,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_usbfs" lineno="5147">
+<interface name="dev_rw_usbfs" lineno="5165">
 <summary>
 Allow caller to modify usb hardware configuration files.
 </summary>
@@ -58826,7 +58836,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_video_dev" lineno="5167">
+<interface name="dev_getattr_video_dev" lineno="5185">
 <summary>
 Get the attributes of video4linux devices.
 </summary>
@@ -58836,7 +58846,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_userio_dev" lineno="5185">
+<interface name="dev_rw_userio_dev" lineno="5203">
 <summary>
 Read and write userio device.
 </summary>
@@ -58846,7 +58856,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_getattr_video_dev" lineno="5204">
+<interface name="dev_dontaudit_getattr_video_dev" lineno="5222">
 <summary>
 Do not audit attempts to get the attributes
 of video4linux device nodes.
@@ -58857,7 +58867,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_video_dev" lineno="5222">
+<interface name="dev_setattr_video_dev" lineno="5240">
 <summary>
 Set the attributes of video4linux device nodes.
 </summary>
@@ -58867,7 +58877,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_setattr_video_dev" lineno="5241">
+<interface name="dev_dontaudit_setattr_video_dev" lineno="5259">
 <summary>
 Do not audit attempts to set the attributes
 of video4linux device nodes.
@@ -58878,7 +58888,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_video_dev" lineno="5259">
+<interface name="dev_read_video_dev" lineno="5277">
 <summary>
 Read the video4linux devices.
 </summary>
@@ -58888,7 +58898,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_video_dev" lineno="5277">
+<interface name="dev_write_video_dev" lineno="5295">
 <summary>
 Write the video4linux devices.
 </summary>
@@ -58898,7 +58908,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_vfio_dev" lineno="5295">
+<interface name="dev_rw_vfio_dev" lineno="5313">
 <summary>
 Read and write vfio devices.
 </summary>
@@ -58908,7 +58918,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_relabelfrom_vfio_dev" lineno="5313">
+<interface name="dev_relabelfrom_vfio_dev" lineno="5331">
 <summary>
 Relabel vfio devices.
 </summary>
@@ -58918,7 +58928,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_vhost" lineno="5331">
+<interface name="dev_rw_vhost" lineno="5349">
 <summary>
 Allow read/write the vhost devices
 </summary>
@@ -58928,7 +58938,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_vmware" lineno="5349">
+<interface name="dev_rw_vmware" lineno="5367">
 <summary>
 Read and write VMWare devices.
 </summary>
@@ -58938,7 +58948,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rwx_vmware" lineno="5367">
+<interface name="dev_rwx_vmware" lineno="5385">
 <summary>
 Read, write, and mmap VMWare devices.
 </summary>
@@ -58948,7 +58958,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_watchdog" lineno="5386">
+<interface name="dev_read_watchdog" lineno="5404">
 <summary>
 Read from watchdog devices.
 </summary>
@@ -58958,7 +58968,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_write_watchdog" lineno="5404">
+<interface name="dev_write_watchdog" lineno="5422">
 <summary>
 Write to watchdog devices.
 </summary>
@@ -58968,7 +58978,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_wireless" lineno="5422">
+<interface name="dev_read_wireless" lineno="5440">
 <summary>
 Read the wireless device.
 </summary>
@@ -58978,7 +58988,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_wireless" lineno="5440">
+<interface name="dev_rw_wireless" lineno="5458">
 <summary>
 Read and write the the wireless device.
 </summary>
@@ -58988,7 +58998,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_manage_wireless" lineno="5458">
+<interface name="dev_manage_wireless" lineno="5476">
 <summary>
 manage the wireless device.
 </summary>
@@ -58998,7 +59008,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_xen" lineno="5476">
+<interface name="dev_rw_xen" lineno="5494">
 <summary>
 Read and write Xen devices.
 </summary>
@@ -59008,7 +59018,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_manage_xen" lineno="5495">
+<interface name="dev_manage_xen" lineno="5513">
 <summary>
 Create, read, write, and delete Xen devices.
 </summary>
@@ -59018,7 +59028,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_filetrans_xen" lineno="5519">
+<interface name="dev_filetrans_xen" lineno="5537">
 <summary>
 Automatic type transition to the type
 for xen device nodes when created in /dev.
@@ -59034,7 +59044,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="dev_getattr_xserver_misc_dev" lineno="5537">
+<interface name="dev_getattr_xserver_misc_dev" lineno="5555">
 <summary>
 Get the attributes of X server miscellaneous devices.
 </summary>
@@ -59044,7 +59054,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_setattr_xserver_misc_dev" lineno="5555">
+<interface name="dev_setattr_xserver_misc_dev" lineno="5573">
 <summary>
 Set the attributes of X server miscellaneous devices.
 </summary>
@@ -59054,7 +59064,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_xserver_misc" lineno="5573">
+<interface name="dev_rw_xserver_misc" lineno="5591">
 <summary>
 Read and write X server miscellaneous devices.
 </summary>
@@ -59064,7 +59074,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_map_xserver_misc" lineno="5591">
+<interface name="dev_map_xserver_misc" lineno="5609">
 <summary>
 Map X server miscellaneous devices.
 </summary>
@@ -59074,7 +59084,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_zero" lineno="5609">
+<interface name="dev_rw_zero" lineno="5627">
 <summary>
 Read and write to the zero device (/dev/zero).
 </summary>
@@ -59084,7 +59094,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rwx_zero" lineno="5627">
+<interface name="dev_rwx_zero" lineno="5645">
 <summary>
 Read, write, and execute the zero device (/dev/zero).
 </summary>
@@ -59094,7 +59104,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_execmod_zero" lineno="5646">
+<interface name="dev_execmod_zero" lineno="5664">
 <summary>
 Execmod the zero device (/dev/zero).
 </summary>
@@ -59104,7 +59114,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_create_zero_dev" lineno="5665">
+<interface name="dev_create_zero_dev" lineno="5683">
 <summary>
 Create the zero device (/dev/zero).
 </summary>
@@ -59114,7 +59124,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_read_cpu_online" lineno="5688">
+<interface name="dev_read_cpu_online" lineno="5706">
 <summary>
 Read cpu online hardware state information
 </summary>
@@ -59129,7 +59139,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_rw_gpiochip" lineno="5708">
+<interface name="dev_rw_gpiochip" lineno="5726">
 <summary>
 Read and write to the gpiochip device, /dev/gpiochip[0-9]
 </summary>
@@ -59139,7 +59149,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_unconfined" lineno="5726">
+<interface name="dev_unconfined" lineno="5744">
 <summary>
 Unconfined access to devices.
 </summary>
@@ -59149,7 +59159,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_relabel_cpu_online" lineno="5746">
+<interface name="dev_relabel_cpu_online" lineno="5764">
 <summary>
 Relabel cpu online hardware state information.
 </summary>
@@ -59159,7 +59169,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="dev_dontaudit_read_usbmon_dev" lineno="5765">
+<interface name="dev_dontaudit_read_usbmon_dev" lineno="5783">
 <summary>
 Dont audit attempts to read usbmon devices
 </summary>
@@ -63491,7 +63501,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_var" lineno="5763">
+<interface name="files_mounton_kernel_symbol_table" lineno="5763">
+<summary>
+Mount on a system.map in the /boot directory (for bind mounts).
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_search_var" lineno="5782">
 <summary>
 Search the contents of /var.
 </summary>
@@ -63501,7 +63521,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_var_dirs" lineno="5781">
+<interface name="files_dontaudit_write_var_dirs" lineno="5800">
 <summary>
 Do not audit attempts to write to /var.
 </summary>
@@ -63511,7 +63531,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_write_var_dirs" lineno="5799">
+<interface name="files_write_var_dirs" lineno="5818">
 <summary>
 Allow attempts to write to /var.dirs
 </summary>
@@ -63521,7 +63541,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_var" lineno="5818">
+<interface name="files_dontaudit_search_var" lineno="5837">
 <summary>
 Do not audit attempts to search
 the contents of /var.
@@ -63532,7 +63552,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_var" lineno="5836">
+<interface name="files_list_var" lineno="5855">
 <summary>
 List the contents of /var.
 </summary>
@@ -63542,7 +63562,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_list_var" lineno="5855">
+<interface name="files_dontaudit_list_var" lineno="5874">
 <summary>
 Do not audit attempts to list
 the contents of /var.
@@ -63553,7 +63573,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_var_dirs" lineno="5874">
+<interface name="files_manage_var_dirs" lineno="5893">
 <summary>
 Create, read, write, and delete directories
 in the /var directory.
@@ -63564,7 +63584,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_var_dirs" lineno="5892">
+<interface name="files_relabel_var_dirs" lineno="5911">
 <summary>
 relabelto/from var directories
 </summary>
@@ -63574,7 +63594,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_var_files" lineno="5910">
+<interface name="files_read_var_files" lineno="5929">
 <summary>
 Read files in the /var directory.
 </summary>
@@ -63584,7 +63604,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_append_var_files" lineno="5928">
+<interface name="files_append_var_files" lineno="5947">
 <summary>
 Append files in the /var directory.
 </summary>
@@ -63594,7 +63614,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_var_files" lineno="5946">
+<interface name="files_rw_var_files" lineno="5965">
 <summary>
 Read and write files in the /var directory.
 </summary>
@@ -63604,7 +63624,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_rw_var_files" lineno="5965">
+<interface name="files_dontaudit_rw_var_files" lineno="5984">
 <summary>
 Do not audit attempts to read and write
 files in the /var directory.
@@ -63615,7 +63635,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_var_files" lineno="5983">
+<interface name="files_manage_var_files" lineno="6002">
 <summary>
 Create, read, write, and delete files in the /var directory.
 </summary>
@@ -63625,7 +63645,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_var_symlinks" lineno="6001">
+<interface name="files_read_var_symlinks" lineno="6020">
 <summary>
 Read symbolic links in the /var directory.
 </summary>
@@ -63635,7 +63655,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_var_symlinks" lineno="6020">
+<interface name="files_manage_var_symlinks" lineno="6039">
 <summary>
 Create, read, write, and delete symbolic
 links in the /var directory.
@@ -63646,7 +63666,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_var_filetrans" lineno="6053">
+<interface name="files_var_filetrans" lineno="6072">
 <summary>
 Create objects in the /var directory
 </summary>
@@ -63671,7 +63691,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_getattr_var_lib_dirs" lineno="6071">
+<interface name="files_getattr_var_lib_dirs" lineno="6090">
 <summary>
 Get the attributes of the /var/lib directory.
 </summary>
@@ -63681,7 +63701,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_var_lib" lineno="6103">
+<interface name="files_search_var_lib" lineno="6122">
 <summary>
 Search the /var/lib directory.
 </summary>
@@ -63705,7 +63725,7 @@ Domain allowed access.
 </param>
 <infoflow type="read" weight="5"/>
 </interface>
-<interface name="files_dontaudit_search_var_lib" lineno="6123">
+<interface name="files_dontaudit_search_var_lib" lineno="6142">
 <summary>
 Do not audit attempts to search the
 contents of /var/lib.
@@ -63717,7 +63737,7 @@ Domain to not audit.
 </param>
 <infoflow type="read" weight="5"/>
 </interface>
-<interface name="files_list_var_lib" lineno="6141">
+<interface name="files_list_var_lib" lineno="6160">
 <summary>
 List the contents of the /var/lib directory.
 </summary>
@@ -63727,7 +63747,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_var_lib_dirs" lineno="6159">
+<interface name="files_rw_var_lib_dirs" lineno="6178">
 <summary>
 Read-write /var/lib directories
 </summary>
@@ -63737,7 +63757,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_var_lib_dirs" lineno="6177">
+<interface name="files_manage_var_lib_dirs" lineno="6196">
 <summary>
 manage var_lib_t dirs
 </summary>
@@ -63747,7 +63767,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_var_lib_dirs" lineno="6196">
+<interface name="files_relabel_var_lib_dirs" lineno="6215">
 <summary>
 relabel var_lib_t dirs
 </summary>
@@ -63757,7 +63777,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_var_lib_filetrans" lineno="6230">
+<interface name="files_var_lib_filetrans" lineno="6249">
 <summary>
 Create objects in the /var/lib directory
 </summary>
@@ -63782,7 +63802,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_read_var_lib_files" lineno="6249">
+<interface name="files_read_var_lib_files" lineno="6268">
 <summary>
 Read generic files in /var/lib.
 </summary>
@@ -63792,7 +63812,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_var_lib_symlinks" lineno="6268">
+<interface name="files_read_var_lib_symlinks" lineno="6287">
 <summary>
 Read generic symbolic links in /var/lib
 </summary>
@@ -63802,7 +63822,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_urandom_seed" lineno="6290">
+<interface name="files_manage_urandom_seed" lineno="6309">
 <summary>
 Create, read, write, and delete the
 pseudorandom number generator seed.
@@ -63813,7 +63833,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_mounttab" lineno="6309">
+<interface name="files_manage_mounttab" lineno="6328">
 <summary>
 Allow domain to manage mount tables
 necessary for rpcd, nfsd, etc.
@@ -63824,7 +63844,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_setattr_lock_dirs" lineno="6328">
+<interface name="files_setattr_lock_dirs" lineno="6347">
 <summary>
 Set the attributes of the generic lock directories.
 </summary>
@@ -63834,7 +63854,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_locks" lineno="6346">
+<interface name="files_search_locks" lineno="6365">
 <summary>
 Search the locks directory (/var/lock).
 </summary>
@@ -63844,7 +63864,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_locks" lineno="6366">
+<interface name="files_dontaudit_search_locks" lineno="6385">
 <summary>
 Do not audit attempts to search the
 locks directory (/var/lock).
@@ -63855,7 +63875,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_locks" lineno="6385">
+<interface name="files_list_locks" lineno="6404">
 <summary>
 List generic lock directories.
 </summary>
@@ -63865,7 +63885,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_check_write_lock_dirs" lineno="6404">
+<interface name="files_check_write_lock_dirs" lineno="6423">
 <summary>
 Test write access on lock directories.
 </summary>
@@ -63875,7 +63895,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_add_entry_lock_dirs" lineno="6423">
+<interface name="files_add_entry_lock_dirs" lineno="6442">
 <summary>
 Add entries in the /var/lock directories.
 </summary>
@@ -63885,7 +63905,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_lock_dirs" lineno="6443">
+<interface name="files_rw_lock_dirs" lineno="6462">
 <summary>
 Add and remove entries in the /var/lock
 directories.
@@ -63896,7 +63916,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_lock_dirs" lineno="6462">
+<interface name="files_create_lock_dirs" lineno="6481">
 <summary>
 Create lock directories
 </summary>
@@ -63906,7 +63926,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_lock_dirs" lineno="6483">
+<interface name="files_relabel_all_lock_dirs" lineno="6502">
 <summary>
 Relabel to and from all lock directory types.
 </summary>
@@ -63917,7 +63937,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_getattr_generic_locks" lineno="6504">
+<interface name="files_getattr_generic_locks" lineno="6523">
 <summary>
 Get the attributes of generic lock files.
 </summary>
@@ -63927,7 +63947,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_generic_locks" lineno="6525">
+<interface name="files_delete_generic_locks" lineno="6544">
 <summary>
 Delete generic lock files.
 </summary>
@@ -63937,7 +63957,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_generic_locks" lineno="6546">
+<interface name="files_manage_generic_locks" lineno="6565">
 <summary>
 Create, read, write, and delete generic
 lock files.
@@ -63948,7 +63968,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_locks" lineno="6568">
+<interface name="files_delete_all_locks" lineno="6587">
 <summary>
 Delete all lock files.
 </summary>
@@ -63959,7 +63979,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_read_all_locks" lineno="6589">
+<interface name="files_read_all_locks" lineno="6608">
 <summary>
 Read all lock files.
 </summary>
@@ -63969,7 +63989,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_all_locks" lineno="6612">
+<interface name="files_manage_all_locks" lineno="6631">
 <summary>
 manage all lock files.
 </summary>
@@ -63979,7 +63999,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_locks" lineno="6635">
+<interface name="files_relabel_all_locks" lineno="6654">
 <summary>
 Relabel from/to all lock files.
 </summary>
@@ -63989,7 +64009,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_lock_filetrans" lineno="6674">
+<interface name="files_lock_filetrans" lineno="6693">
 <summary>
 Create an object in the locks directory, with a private
 type using a type transition.
@@ -64015,7 +64035,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6695">
+<interface name="files_dontaudit_getattr_runtime_dirs" lineno="6714">
 <summary>
 Do not audit attempts to get the attributes
 of the /var/run directory.
@@ -64026,7 +64046,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_runtime_dirs" lineno="6714">
+<interface name="files_mounton_runtime_dirs" lineno="6733">
 <summary>
 mounton a /var/run directory.
 </summary>
@@ -64036,7 +64056,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_setattr_runtime_dirs" lineno="6732">
+<interface name="files_setattr_runtime_dirs" lineno="6751">
 <summary>
 Set the attributes of the /var/run directory.
 </summary>
@@ -64046,7 +64066,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_runtime" lineno="6752">
+<interface name="files_search_runtime" lineno="6771">
 <summary>
 Search the contents of runtime process
 ID directories (/var/run).
@@ -64057,7 +64077,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_runtime" lineno="6772">
+<interface name="files_dontaudit_search_runtime" lineno="6791">
 <summary>
 Do not audit attempts to search
 the /var/run directory.
@@ -64068,7 +64088,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_runtime" lineno="6792">
+<interface name="files_list_runtime" lineno="6811">
 <summary>
 List the contents of the runtime process
 ID directories (/var/run).
@@ -64079,7 +64099,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_check_write_runtime_dirs" lineno="6811">
+<interface name="files_check_write_runtime_dirs" lineno="6830">
 <summary>
 Check write access on /var/run directories.
 </summary>
@@ -64089,7 +64109,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_runtime_dirs" lineno="6829">
+<interface name="files_create_runtime_dirs" lineno="6848">
 <summary>
 Create a /var/run directory.
 </summary>
@@ -64099,7 +64119,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_runtime_dirs" lineno="6847">
+<interface name="files_rw_runtime_dirs" lineno="6866">
 <summary>
 Read and write a /var/run directory.
 </summary>
@@ -64109,7 +64129,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_watch_runtime_dirs" lineno="6865">
+<interface name="files_watch_runtime_dirs" lineno="6884">
 <summary>
 Watch /var/run directories.
 </summary>
@@ -64119,7 +64139,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_runtime_files" lineno="6883">
+<interface name="files_read_runtime_files" lineno="6902">
 <summary>
 Read generic runtime files.
 </summary>
@@ -64129,7 +64149,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_exec_runtime" lineno="6903">
+<interface name="files_exec_runtime" lineno="6922">
 <summary>
 Execute generic programs in /var/run in the caller domain.
 </summary>
@@ -64139,7 +64159,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_rw_runtime_files" lineno="6921">
+<interface name="files_rw_runtime_files" lineno="6940">
 <summary>
 Read and write generic runtime files.
 </summary>
@@ -64149,7 +64169,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_runtime_symlinks" lineno="6941">
+<interface name="files_delete_runtime_symlinks" lineno="6960">
 <summary>
 Delete generic runtime symlinks.
 </summary>
@@ -64159,7 +64179,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_write_runtime_pipes" lineno="6959">
+<interface name="files_write_runtime_pipes" lineno="6978">
 <summary>
 Write named generic runtime pipes.
 </summary>
@@ -64169,7 +64189,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_runtime_dirs" lineno="6979">
+<interface name="files_delete_all_runtime_dirs" lineno="6998">
 <summary>
 Delete all runtime dirs.
 </summary>
@@ -64180,7 +64200,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_all_runtime_dirs" lineno="6997">
+<interface name="files_manage_all_runtime_dirs" lineno="7016">
 <summary>
 Create, read, write, and delete all runtime directories.
 </summary>
@@ -64190,7 +64210,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_runtime_dirs" lineno="7015">
+<interface name="files_relabel_all_runtime_dirs" lineno="7034">
 <summary>
 Relabel all runtime directories.
 </summary>
@@ -64200,7 +64220,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_getattr_all_runtime_files" lineno="7034">
+<interface name="files_dontaudit_getattr_all_runtime_files" lineno="7053">
 <summary>
 Do not audit attempts to get the attributes of
 all runtime data files.
@@ -64211,7 +64231,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_read_all_runtime_files" lineno="7055">
+<interface name="files_read_all_runtime_files" lineno="7074">
 <summary>
 Read all runtime files.
 </summary>
@@ -64222,7 +64242,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7076">
+<interface name="files_dontaudit_ioctl_all_runtime_files" lineno="7095">
 <summary>
 Do not audit attempts to ioctl all runtime files.
 </summary>
@@ -64232,7 +64252,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_write_all_runtime_files" lineno="7096">
+<interface name="files_dontaudit_write_all_runtime_files" lineno="7115">
 <summary>
 Do not audit attempts to write to all runtime files.
 </summary>
@@ -64242,7 +64262,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_runtime_files" lineno="7117">
+<interface name="files_delete_all_runtime_files" lineno="7136">
 <summary>
 Delete all runtime files.
 </summary>
@@ -64253,7 +64273,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_all_runtime_files" lineno="7136">
+<interface name="files_manage_all_runtime_files" lineno="7155">
 <summary>
 Create, read, write and delete all
 var_run (pid) files
@@ -64264,7 +64284,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_runtime_files" lineno="7154">
+<interface name="files_relabel_all_runtime_files" lineno="7173">
 <summary>
 Relabel all runtime files.
 </summary>
@@ -64274,7 +64294,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_runtime_symlinks" lineno="7173">
+<interface name="files_delete_all_runtime_symlinks" lineno="7192">
 <summary>
 Delete all runtime symlinks.
 </summary>
@@ -64285,7 +64305,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_all_runtime_symlinks" lineno="7192">
+<interface name="files_manage_all_runtime_symlinks" lineno="7211">
 <summary>
 Create, read, write and delete all
 var_run (pid) symbolic links.
@@ -64296,7 +64316,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_runtime_symlinks" lineno="7210">
+<interface name="files_relabel_all_runtime_symlinks" lineno="7229">
 <summary>
 Relabel all runtime symbolic links.
 </summary>
@@ -64306,7 +64326,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_all_runtime_pipes" lineno="7228">
+<interface name="files_create_all_runtime_pipes" lineno="7247">
 <summary>
 Create all runtime named pipes
 </summary>
@@ -64316,7 +64336,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_runtime_pipes" lineno="7247">
+<interface name="files_delete_all_runtime_pipes" lineno="7266">
 <summary>
 Delete all runtime named pipes
 </summary>
@@ -64326,7 +64346,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_create_all_runtime_sockets" lineno="7266">
+<interface name="files_create_all_runtime_sockets" lineno="7285">
 <summary>
 Create all runtime sockets.
 </summary>
@@ -64336,7 +64356,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_runtime_sockets" lineno="7284">
+<interface name="files_delete_all_runtime_sockets" lineno="7303">
 <summary>
 Delete all runtime sockets.
 </summary>
@@ -64346,7 +64366,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_runtime_sockets" lineno="7302">
+<interface name="files_relabel_all_runtime_sockets" lineno="7321">
 <summary>
 Relabel all runtime named sockets.
 </summary>
@@ -64356,7 +64376,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_runtime_filetrans" lineno="7362">
+<interface name="files_runtime_filetrans" lineno="7381">
 <summary>
 Create an object in the /run directory, with a private type.
 </summary>
@@ -64408,7 +64428,7 @@ The name of the object being created.
 </param>
 <infoflow type="write" weight="10"/>
 </interface>
-<interface name="files_runtime_filetrans_lock_dir" lineno="7387">
+<interface name="files_runtime_filetrans_lock_dir" lineno="7406">
 <summary>
 Create a generic lock directory within the run directories.
 </summary>
@@ -64423,7 +64443,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_create_all_spool_sockets" lineno="7405">
+<interface name="files_create_all_spool_sockets" lineno="7424">
 <summary>
 Create all spool sockets
 </summary>
@@ -64433,7 +64453,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_delete_all_spool_sockets" lineno="7423">
+<interface name="files_delete_all_spool_sockets" lineno="7442">
 <summary>
 Delete all spool sockets
 </summary>
@@ -64443,7 +64463,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_mounton_all_poly_members" lineno="7442">
+<interface name="files_mounton_all_poly_members" lineno="7461">
 <summary>
 Mount filesystems on all polyinstantiation
 member directories.
@@ -64454,7 +64474,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_search_spool" lineno="7461">
+<interface name="files_search_spool" lineno="7480">
 <summary>
 Search the contents of generic spool
 directories (/var/spool).
@@ -64465,7 +64485,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_dontaudit_search_spool" lineno="7480">
+<interface name="files_dontaudit_search_spool" lineno="7499">
 <summary>
 Do not audit attempts to search generic
 spool directories.
@@ -64476,7 +64496,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="files_list_spool" lineno="7499">
+<interface name="files_list_spool" lineno="7518">
 <summary>
 List the contents of generic spool
 (/var/spool) directories.
@@ -64487,7 +64507,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_generic_spool_dirs" lineno="7518">
+<interface name="files_manage_generic_spool_dirs" lineno="7537">
 <summary>
 Create, read, write, and delete generic
 spool directories (/var/spool).
@@ -64498,7 +64518,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_read_generic_spool" lineno="7537">
+<interface name="files_read_generic_spool" lineno="7556">
 <summary>
 Read generic spool files.
 </summary>
@@ -64508,7 +64528,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_generic_spool" lineno="7557">
+<interface name="files_manage_generic_spool" lineno="7576">
 <summary>
 Create, read, write, and delete generic
 spool files.
@@ -64519,7 +64539,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_spool_filetrans" lineno="7593">
+<interface name="files_spool_filetrans" lineno="7612">
 <summary>
 Create objects in the spool directory
 with a private type with a type transition.
@@ -64546,7 +64566,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="files_polyinstantiate_all" lineno="7613">
+<interface name="files_polyinstantiate_all" lineno="7632">
 <summary>
 Allow access to manage all polyinstantiated
 directories on the system.
@@ -64557,7 +64577,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_unconfined" lineno="7667">
+<interface name="files_unconfined" lineno="7686">
 <summary>
 Unconfined access to files.
 </summary>
@@ -64567,7 +64587,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_manage_etc_runtime_lnk_files" lineno="7689">
+<interface name="files_manage_etc_runtime_lnk_files" lineno="7708">
 <summary>
 Create, read, write, and delete symbolic links in
 /etc that are dynamically created on boot.
@@ -64579,7 +64599,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_dontaudit_read_etc_runtime" lineno="7707">
+<interface name="files_dontaudit_read_etc_runtime" lineno="7726">
 <summary>
 Do not audit attempts to read etc_runtime resources
 </summary>
@@ -64589,7 +64609,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="files_list_src" lineno="7725">
+<interface name="files_list_src" lineno="7744">
 <summary>
 List usr/src files
 </summary>
@@ -64599,7 +64619,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="files_read_src_files" lineno="7743">
+<interface name="files_read_src_files" lineno="7762">
 <summary>
 Read usr/src files
 </summary>
@@ -64609,7 +64629,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="files_manage_src_files" lineno="7761">
+<interface name="files_manage_src_files" lineno="7780">
 <summary>
 Manage /usr/src files
 </summary>
@@ -64619,7 +64639,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="files_lib_filetrans_kernel_modules" lineno="7792">
+<interface name="files_lib_filetrans_kernel_modules" lineno="7811">
 <summary>
 Create a resource in the generic lib location
 with an automatic type transition towards the kernel modules
@@ -64641,7 +64661,7 @@ Optional name of the resource
 </summary>
 </param>
 </interface>
-<interface name="files_read_etc_runtime" lineno="7810">
+<interface name="files_read_etc_runtime" lineno="7829">
 <summary>
 Read etc runtime resources
 </summary>
@@ -64651,7 +64671,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="files_relabel_all_non_security_file_types" lineno="7832">
+<interface name="files_relabel_all_non_security_file_types" lineno="7851">
 <summary>
 Allow relabel from and to non-security types
 </summary>
@@ -64662,7 +64682,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_manage_all_non_security_file_types" lineno="7862">
+<interface name="files_manage_all_non_security_file_types" lineno="7881">
 <summary>
 Manage non-security-sensitive resource types
 </summary>
@@ -64673,7 +64693,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="files_relabel_all_pidfiles" lineno="7884">
+<interface name="files_relabel_all_pidfiles" lineno="7903">
 <summary>
 Allow relabeling from and to any pidfile associated type
 </summary>
@@ -71602,7 +71622,17 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="selinux_getattr_fs" lineno="170">
+<interface name="selinux_mounton_fs" lineno="170">
+<summary>
+Mount on the selinuxfs filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="selinux_getattr_fs" lineno="188">
 <summary>
 Get the attributes of the selinuxfs filesystem
 </summary>
@@ -71612,7 +71642,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="selinux_dontaudit_getattr_fs" lineno="192">
+<interface name="selinux_dontaudit_getattr_fs" lineno="210">
 <summary>
 Do not audit attempts to get the
 attributes of the selinuxfs filesystem
@@ -71623,7 +71653,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="selinux_getattr_dirs" lineno="214">
+<interface name="selinux_getattr_dirs" lineno="232">
 <summary>
 Get the attributes of the selinuxfs
 directory.
@@ -71634,7 +71664,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="selinux_dontaudit_getattr_dir" lineno="233">
+<interface name="selinux_dontaudit_getattr_dir" lineno="251">
 <summary>
 Do not audit attempts to get the
 attributes of the selinuxfs directory.
@@ -71645,7 +71675,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="selinux_search_fs" lineno="251">
+<interface name="selinux_search_fs" lineno="269">
 <summary>
 Search selinuxfs.
 </summary>
@@ -71655,7 +71685,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="selinux_dontaudit_search_fs" lineno="270">
+<interface name="selinux_dontaudit_search_fs" lineno="288">
 <summary>
 Do not audit attempts to search selinuxfs.
 </summary>
@@ -71665,7 +71695,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="selinux_dontaudit_read_fs" lineno="289">
+<interface name="selinux_dontaudit_read_fs" lineno="307">
 <summary>
 Do not audit attempts to read
 generic selinuxfs entries
@@ -71676,7 +71706,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="selinux_mounton_dirs" lineno="308">
+<interface name="selinux_mounton_dirs" lineno="326">
 <summary>
 Mount on the selinuxfs directory.
 </summary>
@@ -71686,7 +71716,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="selinux_get_enforce_mode" lineno="328">
+<interface name="selinux_get_enforce_mode" lineno="346">
 <summary>
 Allows the caller to get the mode of policy enforcement
 (enforcing or permissive mode).
@@ -71698,7 +71728,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="selinux_set_enforce_mode" lineno="360">
+<interface name="selinux_set_enforce_mode" lineno="378">
 <summary>
 Allow caller to set the mode of policy enforcement
 (enforcing or permissive mode).
@@ -71720,7 +71750,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="selinux_load_policy" lineno="378">
+<interface name="selinux_load_policy" lineno="396">
 <summary>
 Allow caller to load the policy into the kernel.
 </summary>
@@ -71730,7 +71760,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="selinux_read_policy" lineno="396">
+<interface name="selinux_read_policy" lineno="414">
 <summary>
 Allow caller to read the policy from the kernel.
 </summary>
@@ -71740,7 +71770,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="selinux_set_generic_booleans" lineno="429">
+<interface name="selinux_set_generic_booleans" lineno="447">
 <summary>
 Allow caller to set the state of generic Booleans to
 enable or disable conditional portions of the policy.
@@ -71762,7 +71792,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="selinux_set_all_booleans" lineno="471">
+<interface name="selinux_set_all_booleans" lineno="489">
 <summary>
 Allow caller to set the state of all Booleans to
 enable or disable conditional portions of the policy.
@@ -71784,7 +71814,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="selinux_get_all_booleans" lineno="513">
+<interface name="selinux_get_all_booleans" lineno="531">
 <summary>
 Allow caller to get the state of all Booleans to
 view conditional portions of the policy.
@@ -71796,7 +71826,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="selinux_set_parameters" lineno="547">
+<interface name="selinux_set_parameters" lineno="565">
 <summary>
 Allow caller to set SELinux access vector cache parameters.
 </summary>
@@ -71818,7 +71848,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="selinux_validate_context" lineno="566">
+<interface name="selinux_validate_context" lineno="584">
 <summary>
 Allows caller to validate security contexts.
 </summary>
@@ -71829,7 +71859,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="selinux_dontaudit_validate_context" lineno="588">
+<interface name="selinux_dontaudit_validate_context" lineno="606">
 <summary>
 Do not audit attempts to validate security contexts.
 </summary>
@@ -71840,7 +71870,7 @@ Domain to not audit.
 </param>
 <rolecap/>
 </interface>
-<interface name="selinux_compute_access_vector" lineno="609">
+<interface name="selinux_compute_access_vector" lineno="627">
 <summary>
 Allows caller to compute an access vector.
 </summary>
@@ -71851,7 +71881,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="selinux_compute_create_context" lineno="632">
+<interface name="selinux_compute_create_context" lineno="650">
 <summary>
 Calculate the default type for object creation.
 </summary>
@@ -71862,7 +71892,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="selinux_compute_member" lineno="654">
+<interface name="selinux_compute_member" lineno="672">
 <summary>
 Allows caller to compute polyinstatntiated
 directory members.
@@ -71873,7 +71903,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="selinux_compute_relabel_context" lineno="684">
+<interface name="selinux_compute_relabel_context" lineno="702">
 <summary>
 Calculate the context for relabeling objects.
 </summary>
@@ -71892,7 +71922,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="selinux_compute_user_contexts" lineno="705">
+<interface name="selinux_compute_user_contexts" lineno="723">
 <summary>
 Allows caller to compute possible contexts for a user.
 </summary>
@@ -71902,7 +71932,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="selinux_use_status_page" lineno="727">
+<interface name="selinux_use_status_page" lineno="745">
 <summary>
 Allows the caller to use the SELinux status page.
 </summary>
@@ -71913,7 +71943,7 @@ Domain allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="selinux_unconfined" lineno="747">
+<interface name="selinux_unconfined" lineno="765">
 <summary>
 Unconfined access to the SELinux kernel security server.
 </summary>
@@ -106810,7 +106840,7 @@ The user domain for the role.
 </summary>
 </param>
 </template>
-<template name="systemd_user_daemon_domain" lineno="225">
+<template name="systemd_user_daemon_domain" lineno="223">
 <summary>
 Allow the specified domain to be started as a daemon by the
 specified systemd user instance.
@@ -106831,7 +106861,7 @@ Domain to allow the systemd user domain to run.
 </summary>
 </param>
 </template>
-<interface name="systemd_user_activated_sock_file" lineno="246">
+<interface name="systemd_user_activated_sock_file" lineno="244">
 <summary>
 Associate the specified file type to be a type whose sock files
 can be managed by systemd user instances for socket activation.
@@ -106842,7 +106872,7 @@ File type to be associated.
 </summary>
 </param>
 </interface>
-<interface name="systemd_user_unix_stream_activated_socket" lineno="271">
+<interface name="systemd_user_unix_stream_activated_socket" lineno="269">
 <summary>
 Associate the specified domain to be a domain whose unix stream
 sockets and sock files can be managed by systemd user instances
@@ -106859,7 +106889,7 @@ File type of the domain's sock files to be associated.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_notify_socket" lineno="291">
+<interface name="systemd_write_notify_socket" lineno="289">
 <summary>
 Allow the specified domain to write to
 systemd-notify socket
@@ -106870,7 +106900,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<template name="systemd_user_send_systemd_notify" lineno="318">
+<template name="systemd_user_send_systemd_notify" lineno="316">
 <summary>
 Allow the target domain the permissions necessary
 to use systemd notify when started by the specified
@@ -106887,7 +106917,7 @@ Domain to be allowed systemd notify permissions.
 </summary>
 </param>
 </template>
-<template name="systemd_user_app_status" lineno="346">
+<template name="systemd_user_app_status" lineno="344">
 <summary>
 Allow the target domain to be monitored and have its output
 captured by the specified systemd user instance domain.
@@ -106903,7 +106933,7 @@ Domain to allow the systemd user instance to monitor.
 </summary>
 </param>
 </template>
-<template name="systemd_read_user_manager_state" lineno="386">
+<template name="systemd_read_user_manager_state" lineno="384">
 <summary>
 Read the process state (/proc/pid) of
 the specified systemd user instance.
@@ -106919,7 +106949,7 @@ Domain allowed access.
 </summary>
 </param>
 </template>
-<template name="systemd_user_manager_system_start" lineno="410">
+<template name="systemd_user_manager_system_start" lineno="408">
 <summary>
 Send a start request to the specified
 systemd user instance system object.
@@ -106935,7 +106965,7 @@ Domain allowed access.
 </summary>
 </param>
 </template>
-<template name="systemd_user_manager_system_stop" lineno="434">
+<template name="systemd_user_manager_system_stop" lineno="432">
 <summary>
 Send a stop request to the specified
 systemd user instance system object.
@@ -106951,7 +106981,7 @@ Domain allowed access.
 </summary>
 </param>
 </template>
-<template name="systemd_user_manager_system_status" lineno="458">
+<template name="systemd_user_manager_system_status" lineno="456">
 <summary>
 Get the status of the specified
 systemd user instance system object.
@@ -106967,7 +106997,7 @@ Domain allowed access.
 </summary>
 </param>
 </template>
-<template name="systemd_user_manager_dbus_chat" lineno="482">
+<template name="systemd_user_manager_dbus_chat" lineno="480">
 <summary>
 Send and receive messages from the
 specified systemd user instance over dbus.
@@ -106983,7 +107013,7 @@ Domain allowed access.
 </summary>
 </param>
 </template>
-<interface name="systemd_search_conf_home_content" lineno="503">
+<interface name="systemd_search_conf_home_content" lineno="501">
 <summary>
 Allow the specified domain to search systemd config home
 content.
@@ -106994,7 +107024,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_conf_home_content" lineno="522">
+<interface name="systemd_manage_conf_home_content" lineno="520">
 <summary>
 Allow the specified domain to manage systemd config home
 content.
@@ -107005,7 +107035,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabel_conf_home_content" lineno="543">
+<interface name="systemd_relabel_conf_home_content" lineno="541">
 <summary>
 Allow the specified domain to relabel systemd config home
 content.
@@ -107016,7 +107046,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_search_data_home_content" lineno="564">
+<interface name="systemd_search_data_home_content" lineno="562">
 <summary>
 Allow the specified domain to search systemd data home
 content.
@@ -107027,7 +107057,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_data_home_content" lineno="583">
+<interface name="systemd_manage_data_home_content" lineno="581">
 <summary>
 Allow the specified domain to manage systemd data home
 content.
@@ -107038,7 +107068,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabel_data_home_content" lineno="604">
+<interface name="systemd_relabel_data_home_content" lineno="602">
 <summary>
 Allow the specified domain to relabel systemd data home
 content.
@@ -107049,7 +107079,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_search_user_runtime" lineno="625">
+<interface name="systemd_search_user_runtime" lineno="623">
 <summary>
 Allow the specified domain to search systemd user runtime
 content.
@@ -107060,7 +107090,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_user_runtime_files" lineno="643">
+<interface name="systemd_read_user_runtime_files" lineno="641">
 <summary>
 Allow the specified domain to read systemd user runtime files.
 </summary>
@@ -107070,7 +107100,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_user_runtime_lnk_files" lineno="661">
+<interface name="systemd_read_user_runtime_lnk_files" lineno="659">
 <summary>
 Allow the specified domain to read systemd user runtime lnk files.
 </summary>
@@ -107080,7 +107110,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_user_runtime_socket" lineno="680">
+<interface name="systemd_write_user_runtime_socket" lineno="678">
 <summary>
 Allow the specified domain to write to
 the systemd user runtime named socket.
@@ -107091,7 +107121,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_user_unit_files" lineno="699">
+<interface name="systemd_read_user_unit_files" lineno="697">
 <summary>
 Allow the specified domain to read system-wide systemd
 user unit files.  (Deprecated)
@@ -107102,7 +107132,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_user_units_files" lineno="715">
+<interface name="systemd_read_user_units_files" lineno="713">
 <summary>
 Allow the specified domain to read system-wide systemd
 user unit files.
@@ -107113,7 +107143,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_user_runtime_units" lineno="735">
+<interface name="systemd_read_user_runtime_units" lineno="733">
 <summary>
 Allow the specified domain to read systemd user runtime unit files.  (Deprecated)
 </summary>
@@ -107123,7 +107153,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_user_runtime_units_files" lineno="750">
+<interface name="systemd_read_user_runtime_units_files" lineno="748">
 <summary>
 Allow the specified domain to read systemd user runtime unit files.
 </summary>
@@ -107133,7 +107163,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_search_user_runtime_unit_dirs" lineno="770">
+<interface name="systemd_search_user_runtime_unit_dirs" lineno="768">
 <summary>
 Allow the specified domain to search systemd user runtime unit
 directories.
@@ -107144,7 +107174,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_list_user_runtime_unit_dirs" lineno="789">
+<interface name="systemd_list_user_runtime_unit_dirs" lineno="787">
 <summary>
 Allow the specified domain to list the contents of systemd
 user runtime unit directories.
@@ -107155,7 +107185,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_status_user_runtime_units" lineno="807">
+<interface name="systemd_status_user_runtime_units" lineno="805">
 <summary>
 Allow the specified domain to get the status of systemd user runtime units.  (Deprecated)
 </summary>
@@ -107165,7 +107195,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_get_user_runtime_units_status" lineno="822">
+<interface name="systemd_get_user_runtime_units_status" lineno="820">
 <summary>
 Allow the specified domain to get the status of systemd user runtime units.
 </summary>
@@ -107175,7 +107205,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_start_user_runtime_units" lineno="841">
+<interface name="systemd_start_user_runtime_units" lineno="839">
 <summary>
 Allow the specified domain to start systemd user runtime units.
 </summary>
@@ -107185,7 +107215,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_stop_user_runtime_units" lineno="860">
+<interface name="systemd_stop_user_runtime_units" lineno="858">
 <summary>
 Allow the specified domain to stop systemd user runtime units.
 </summary>
@@ -107195,7 +107225,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_reload_user_runtime_units" lineno="879">
+<interface name="systemd_reload_user_runtime_units" lineno="877">
 <summary>
 Allow the specified domain to reload systemd user runtime units.
 </summary>
@@ -107205,7 +107235,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_user_transient_units_files" lineno="898">
+<interface name="systemd_read_user_transient_units_files" lineno="896">
 <summary>
 Allow the specified domain to read systemd user transient unit files.
 </summary>
@@ -107215,7 +107245,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_search_user_transient_unit_dirs" lineno="918">
+<interface name="systemd_search_user_transient_unit_dirs" lineno="916">
 <summary>
 Allow the specified domain to search systemd user transient unit
 directories.
@@ -107226,7 +107256,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_list_user_transient_unit_dirs" lineno="937">
+<interface name="systemd_list_user_transient_unit_dirs" lineno="935">
 <summary>
 Allow the specified domain to list the contents of systemd
 user transient unit directories.
@@ -107237,7 +107267,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_get_user_transient_units_status" lineno="955">
+<interface name="systemd_get_user_transient_units_status" lineno="953">
 <summary>
 Allow the specified domain to get the status of systemd user transient units.
 </summary>
@@ -107247,7 +107277,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_start_user_transient_units" lineno="974">
+<interface name="systemd_start_user_transient_units" lineno="972">
 <summary>
 Allow the specified domain to start systemd user transient units.
 </summary>
@@ -107257,7 +107287,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_stop_user_transient_units" lineno="993">
+<interface name="systemd_stop_user_transient_units" lineno="991">
 <summary>
 Allow the specified domain to stop systemd user transient units.
 </summary>
@@ -107267,7 +107297,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_reload_user_transient_units" lineno="1012">
+<interface name="systemd_reload_user_transient_units" lineno="1010">
 <summary>
 Allow the specified domain to reload systemd user transient units.
 </summary>
@@ -107277,7 +107307,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_log_parse_environment" lineno="1032">
+<interface name="systemd_log_parse_environment" lineno="1030">
 <summary>
 Make the specified type usable as an
 log parse environment type.
@@ -107288,7 +107318,7 @@ Type to be used as a log parse environment type.
 </summary>
 </param>
 </interface>
-<interface name="systemd_use_nss" lineno="1052">
+<interface name="systemd_use_nss" lineno="1050">
 <summary>
 Allow domain to use systemd's Name Service Switch (NSS) module.
 This module provides UNIX user and group name resolution for dynamic users
@@ -107300,7 +107330,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_PrivateDevices" lineno="1079">
+<interface name="systemd_PrivateDevices" lineno="1077">
 <summary>
 Allow domain to be used as a systemd service with a unit
 that uses PrivateDevices=yes in section [Service].
@@ -107311,7 +107341,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_rw_homework_semaphores" lineno="1096">
+<interface name="systemd_rw_homework_semaphores" lineno="1094">
 <summary>
 Read and write systemd-homework semaphores.
 </summary>
@@ -107321,7 +107351,7 @@ Domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_hwdb" lineno="1114">
+<interface name="systemd_read_hwdb" lineno="1112">
 <summary>
 Allow domain to read udev hwdb file
 </summary>
@@ -107331,7 +107361,7 @@ domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_map_hwdb" lineno="1132">
+<interface name="systemd_map_hwdb" lineno="1130">
 <summary>
 Allow domain to map udev hwdb file
 </summary>
@@ -107341,7 +107371,7 @@ domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_watch_logind_runtime_dirs" lineno="1150">
+<interface name="systemd_watch_logind_runtime_dirs" lineno="1148">
 <summary>
 Watch systemd-logind runtime dirs.
 </summary>
@@ -107351,7 +107381,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_logind_runtime_files" lineno="1169">
+<interface name="systemd_read_logind_runtime_files" lineno="1167">
 <summary>
 Read systemd-logind runtime files.
 </summary>
@@ -107361,7 +107391,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_logind_runtime_pipes" lineno="1189">
+<interface name="systemd_manage_logind_runtime_pipes" lineno="1187">
 <summary>
 Manage systemd-logind runtime pipes.
 </summary>
@@ -107371,7 +107401,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_logind_runtime_pipes" lineno="1208">
+<interface name="systemd_write_logind_runtime_pipes" lineno="1206">
 <summary>
 Write systemd-logind runtime named pipe.
 </summary>
@@ -107381,7 +107411,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_use_logind_fds" lineno="1229">
+<interface name="systemd_use_logind_fds" lineno="1227">
 <summary>
 Use inherited systemd
 logind file descriptors.
@@ -107392,7 +107422,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_watch_logind_sessions_dirs" lineno="1247">
+<interface name="systemd_watch_logind_sessions_dirs" lineno="1245">
 <summary>
 Watch logind sessions dirs.
 </summary>
@@ -107402,7 +107432,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_logind_sessions_files" lineno="1266">
+<interface name="systemd_read_logind_sessions_files" lineno="1264">
 <summary>
 Read logind sessions files.
 </summary>
@@ -107412,7 +107442,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="1287">
+<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="1285">
 <summary>
 Write inherited logind sessions pipes.
 </summary>
@@ -107422,7 +107452,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="1307">
+<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="1305">
 <summary>
 Write inherited logind inhibit pipes.
 </summary>
@@ -107432,7 +107462,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_dbus_chat_logind" lineno="1328">
+<interface name="systemd_dbus_chat_logind" lineno="1326">
 <summary>
 Send and receive messages from
 systemd logind over dbus.
@@ -107443,7 +107473,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_status_logind" lineno="1348">
+<interface name="systemd_status_logind" lineno="1346">
 <summary>
 Get the system status information from systemd_login
 </summary>
@@ -107453,7 +107483,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_signull_logind" lineno="1367">
+<interface name="systemd_signull_logind" lineno="1365">
 <summary>
 Send systemd_login a null signal.
 </summary>
@@ -107463,7 +107493,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_list_userdb_runtime_dirs" lineno="1385">
+<interface name="systemd_list_userdb_runtime_dirs" lineno="1383">
 <summary>
 List the contents of systemd userdb runtime directories.
 </summary>
@@ -107473,7 +107503,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_userdb_runtime_dirs" lineno="1403">
+<interface name="systemd_manage_userdb_runtime_dirs" lineno="1401">
 <summary>
 Manage systemd userdb runtime directories.
 </summary>
@@ -107483,7 +107513,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_userdb_runtime_files" lineno="1421">
+<interface name="systemd_read_userdb_runtime_files" lineno="1419">
 <summary>
 Read systemd userdb runtime files.
 </summary>
@@ -107493,7 +107523,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_userdb_runtime_symlinks" lineno="1439">
+<interface name="systemd_manage_userdb_runtime_symlinks" lineno="1437">
 <summary>
 Manage symbolic links under /run/systemd/userdb.
 </summary>
@@ -107503,7 +107533,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_userdb_runtime_sock_files" lineno="1457">
+<interface name="systemd_manage_userdb_runtime_sock_files" lineno="1455">
 <summary>
 Manage socket files under /run/systemd/userdb .
 </summary>
@@ -107513,7 +107543,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_stream_connect_userdb" lineno="1475">
+<interface name="systemd_stream_connect_userdb" lineno="1473">
 <summary>
 Connect to /run/systemd/userdb/io.systemd.DynamicUser .
 </summary>
@@ -107523,7 +107553,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_machines" lineno="1497">
+<interface name="systemd_read_machines" lineno="1495">
 <summary>
 Allow reading /run/systemd/machines
 </summary>
@@ -107533,7 +107563,7 @@ Domain that can access the machines files
 </summary>
 </param>
 </interface>
-<interface name="systemd_watch_machines_dirs" lineno="1516">
+<interface name="systemd_watch_machines_dirs" lineno="1514">
 <summary>
 Allow watching /run/systemd/machines
 </summary>
@@ -107543,7 +107573,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_connect_machined" lineno="1534">
+<interface name="systemd_connect_machined" lineno="1532">
 <summary>
 Allow connecting to /run/systemd/userdb/io.systemd.Machine socket
 </summary>
@@ -107553,7 +107583,7 @@ Domain that can access the socket
 </summary>
 </param>
 </interface>
-<interface name="systemd_dontaudit_connect_machined" lineno="1552">
+<interface name="systemd_dontaudit_connect_machined" lineno="1550">
 <summary>
 dontaudit connecting to /run/systemd/userdb/io.systemd.Machine socket
 </summary>
@@ -107563,7 +107593,7 @@ Domain that can access the socket
 </summary>
 </param>
 </interface>
-<interface name="systemd_dbus_chat_machined" lineno="1571">
+<interface name="systemd_dbus_chat_machined" lineno="1569">
 <summary>
 Send and receive messages from
 systemd machined over dbus.
@@ -107574,7 +107604,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_dbus_chat_hostnamed" lineno="1592">
+<interface name="systemd_dbus_chat_hostnamed" lineno="1590">
 <summary>
 Send and receive messages from
 systemd hostnamed over dbus.
@@ -107585,7 +107615,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_use_passwd_agent_fds" lineno="1612">
+<interface name="systemd_use_passwd_agent_fds" lineno="1610">
 <summary>
 allow systemd_passwd_agent to inherit fds
 </summary>
@@ -107595,7 +107625,7 @@ Domain that owns the fds
 </summary>
 </param>
 </interface>
-<interface name="systemd_run_passwd_agent" lineno="1635">
+<interface name="systemd_run_passwd_agent" lineno="1633">
 <summary>
 allow systemd_passwd_agent to be run by admin
 </summary>
@@ -107610,7 +107640,7 @@ role that it runs in
 </summary>
 </param>
 </interface>
-<interface name="systemd_use_passwd_agent" lineno="1656">
+<interface name="systemd_use_passwd_agent" lineno="1654">
 <summary>
 Allow a systemd_passwd_agent_t process to interact with a daemon
 that needs a password from the sysadmin.
@@ -107621,7 +107651,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="1680">
+<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="1678">
 <summary>
 Transition to systemd_passwd_runtime_t when creating dirs
 </summary>
@@ -107631,7 +107661,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="1701">
+<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="1699">
 <summary>
 Transition to systemd_userdbd_runtime_t when
 creating the userdb directory inside an init runtime
@@ -107643,7 +107673,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_passwd_runtime_symlinks" lineno="1719">
+<interface name="systemd_manage_passwd_runtime_symlinks" lineno="1717">
 <summary>
 Allow to domain to create systemd-passwd symlink
 </summary>
@@ -107653,7 +107683,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_watch_passwd_runtime_dirs" lineno="1737">
+<interface name="systemd_watch_passwd_runtime_dirs" lineno="1735">
 <summary>
 Allow a domain to watch systemd-passwd runtime dirs.
 </summary>
@@ -107663,7 +107693,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_list_journal_dirs" lineno="1755">
+<interface name="systemd_list_journal_dirs" lineno="1753">
 <summary>
 Allow domain to list the contents of systemd_journal_t dirs
 </summary>
@@ -107673,7 +107703,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_journal_files" lineno="1773">
+<interface name="systemd_read_journal_files" lineno="1771">
 <summary>
 Allow domain to read systemd_journal_t files
 </summary>
@@ -107683,7 +107713,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_journal_files" lineno="1792">
+<interface name="systemd_manage_journal_files" lineno="1790">
 <summary>
 Allow domain to create/manage systemd_journal_t files
 </summary>
@@ -107693,7 +107723,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_watch_journal_dirs" lineno="1812">
+<interface name="systemd_watch_journal_dirs" lineno="1810">
 <summary>
 Allow domain to add a watch on systemd_journal_t directories
 </summary>
@@ -107703,7 +107733,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabelfrom_journal_files" lineno="1830">
+<interface name="systemd_relabelfrom_journal_files" lineno="1828">
 <summary>
 Relabel from systemd-journald file type.
 </summary>
@@ -107713,7 +107743,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabelto_journal_dirs" lineno="1848">
+<interface name="systemd_relabelto_journal_dirs" lineno="1846">
 <summary>
 Relabel to systemd-journald directory type.
 </summary>
@@ -107723,7 +107753,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabelto_journal_files" lineno="1867">
+<interface name="systemd_relabelto_journal_files" lineno="1865">
 <summary>
 Relabel to systemd-journald file type.
 </summary>
@@ -107733,7 +107763,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_networkd_units" lineno="1887">
+<interface name="systemd_read_networkd_units" lineno="1885">
 <summary>
 Allow domain to read systemd_networkd_t unit files
 </summary>
@@ -107743,7 +107773,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_manage_networkd_units" lineno="1907">
+<interface name="systemd_manage_networkd_units" lineno="1905">
 <summary>
 Allow domain to create/manage systemd_networkd_t unit files
 </summary>
@@ -107753,7 +107783,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_enabledisable_networkd" lineno="1927">
+<interface name="systemd_enabledisable_networkd" lineno="1925">
 <summary>
 Allow specified domain to enable systemd-networkd units
 </summary>
@@ -107763,7 +107793,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_startstop_networkd" lineno="1946">
+<interface name="systemd_startstop_networkd" lineno="1944">
 <summary>
 Allow specified domain to start systemd-networkd units
 </summary>
@@ -107773,7 +107803,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_dbus_chat_networkd" lineno="1966">
+<interface name="systemd_dbus_chat_networkd" lineno="1964">
 <summary>
 Send and receive messages from
 systemd networkd over dbus.
@@ -107784,7 +107814,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_status_networkd" lineno="1986">
+<interface name="systemd_status_networkd" lineno="1984">
 <summary>
 Allow specified domain to get status of systemd-networkd
 </summary>
@@ -107794,7 +107824,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="2005">
+<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="2003">
 <summary>
 Relabel systemd_networkd tun socket.
 </summary>
@@ -107804,7 +107834,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="2023">
+<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="2021">
 <summary>
 Read/Write from systemd_networkd netlink route socket.
 </summary>
@@ -107814,7 +107844,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_list_networkd_runtime" lineno="2041">
+<interface name="systemd_list_networkd_runtime" lineno="2039">
 <summary>
 Allow domain to list dirs under /run/systemd/netif
 </summary>
@@ -107824,7 +107854,7 @@ domain permitted the access
 </summary>
 </param>
 </interface>
-<interface name="systemd_watch_networkd_runtime_dirs" lineno="2060">
+<interface name="systemd_watch_networkd_runtime_dirs" lineno="2058">
 <summary>
 Watch directories under /run/systemd/netif
 </summary>
@@ -107834,7 +107864,7 @@ Domain permitted the access
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_networkd_runtime" lineno="2079">
+<interface name="systemd_read_networkd_runtime" lineno="2077">
 <summary>
 Allow domain to read files generated by systemd_networkd
 </summary>
@@ -107844,7 +107874,7 @@ domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_logind_state" lineno="2098">
+<interface name="systemd_read_logind_state" lineno="2096">
 <summary>
 Allow systemd_logind_t to read process state for cgroup file
 </summary>
@@ -107854,7 +107884,7 @@ Domain systemd_logind_t may access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_create_logind_linger_dir" lineno="2119">
+<interface name="systemd_create_logind_linger_dir" lineno="2117">
 <summary>
 Allow the specified domain to create
 the systemd-logind linger directory with
@@ -107866,7 +107896,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_start_user_manager_units" lineno="2139">
+<interface name="systemd_start_user_manager_units" lineno="2137">
 <summary>
 Allow the specified domain to start systemd
 user manager units (systemd --user).
@@ -107877,7 +107907,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_stop_user_manager_units" lineno="2159">
+<interface name="systemd_stop_user_manager_units" lineno="2157">
 <summary>
 Allow the specified domain to stop systemd
 user manager units (systemd --user).
@@ -107888,7 +107918,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_reload_user_manager_units" lineno="2179">
+<interface name="systemd_reload_user_manager_units" lineno="2177">
 <summary>
 Allow the specified domain to reload systemd
 user manager units (systemd --user).
@@ -107899,7 +107929,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_get_user_manager_units_status" lineno="2199">
+<interface name="systemd_get_user_manager_units_status" lineno="2197">
 <summary>
 Get the status of systemd user manager
 units (systemd --user).
@@ -107910,7 +107940,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_start_power_units" lineno="2218">
+<interface name="systemd_start_power_units" lineno="2216">
 <summary>
 Allow specified domain to start power units
 </summary>
@@ -107920,7 +107950,7 @@ Domain to not audit.
 </summary>
 </param>
 </interface>
-<interface name="systemd_status_power_units" lineno="2237">
+<interface name="systemd_status_power_units" lineno="2235">
 <summary>
 Get the system status information about power units
 </summary>
@@ -107930,7 +107960,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_stream_connect_socket_proxyd" lineno="2256">
+<interface name="systemd_stream_connect_socket_proxyd" lineno="2254">
 <summary>
 Allows connections to the systemd-socket-proxyd's socket.
 </summary>
@@ -107940,7 +107970,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_tmpfiles_conf_file" lineno="2275">
+<interface name="systemd_tmpfiles_conf_file" lineno="2273">
 <summary>
 Make the specified type usable for
 systemd tmpfiles config files.
@@ -107951,7 +107981,7 @@ Type to be used for systemd tmpfiles config files.
 </summary>
 </param>
 </interface>
-<interface name="systemd_tmpfiles_creator" lineno="2296">
+<interface name="systemd_tmpfiles_creator" lineno="2294">
 <summary>
 Allow the specified domain to create
 the tmpfiles config directory with
@@ -107963,7 +107993,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_tmpfiles_conf_filetrans" lineno="2332">
+<interface name="systemd_tmpfiles_conf_filetrans" lineno="2330">
 <summary>
 Create an object in the systemd tmpfiles config
 directory, with a private type
@@ -107990,7 +108020,7 @@ The name of the object being created.
 </summary>
 </param>
 </interface>
-<interface name="systemd_list_tmpfiles_conf" lineno="2351">
+<interface name="systemd_list_tmpfiles_conf" lineno="2349">
 <summary>
 Allow domain to list systemd tmpfiles config directory
 </summary>
@@ -108000,7 +108030,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="2369">
+<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="2367">
 <summary>
 Allow domain to relabel to systemd tmpfiles config directory
 </summary>
@@ -108010,7 +108040,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="2387">
+<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="2385">
 <summary>
 Allow domain to relabel to systemd tmpfiles config files
 </summary>
@@ -108020,7 +108050,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_tmpfilesd_managed" lineno="2405">
+<interface name="systemd_tmpfilesd_managed" lineno="2403">
 <summary>
 Allow systemd_tmpfiles_t to manage filesystem objects
 </summary>
@@ -108030,7 +108060,7 @@ Type of object to manage
 </summary>
 </param>
 </interface>
-<interface name="systemd_stream_connect_resolved" lineno="2432">
+<interface name="systemd_stream_connect_resolved" lineno="2430">
 <summary>
 Connect to systemd resolved over
 /run/systemd/resolve/io.systemd.Resolve .
@@ -108041,7 +108071,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_dbus_chat_resolved" lineno="2453">
+<interface name="systemd_dbus_chat_resolved" lineno="2451">
 <summary>
 Send and receive messages from
 systemd resolved over dbus.
@@ -108052,7 +108082,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_read_resolved_runtime" lineno="2473">
+<interface name="systemd_read_resolved_runtime" lineno="2471">
 <summary>
 Allow domain to read resolv.conf file generated by systemd_resolved
 </summary>
@@ -108062,7 +108092,7 @@ domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_exec_systemctl" lineno="2495">
+<interface name="systemd_exec_systemctl" lineno="2493">
 <summary>
 Execute the systemctl program.
 </summary>
@@ -108072,7 +108102,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_getattr_updated_runtime" lineno="2526">
+<interface name="systemd_getattr_updated_runtime" lineno="2524">
 <summary>
 Allow domain to getattr on .updated file (generated by systemd-update-done
 </summary>
@@ -108082,7 +108112,7 @@ domain allowed access
 </summary>
 </param>
 </interface>
-<interface name="systemd_search_all_user_keys" lineno="2544">
+<interface name="systemd_search_all_user_keys" lineno="2542">
 <summary>
 Search keys for the all systemd --user domains.
 </summary>
@@ -108092,7 +108122,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_create_all_user_keys" lineno="2562">
+<interface name="systemd_create_all_user_keys" lineno="2560">
 <summary>
 Create keys for the all systemd --user domains.
 </summary>
@@ -108102,7 +108132,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_write_all_user_keys" lineno="2580">
+<interface name="systemd_write_all_user_keys" lineno="2578">
 <summary>
 Write keys for the all systemd --user domains.
 </summary>
@@ -108112,7 +108142,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_domtrans_sysusers" lineno="2599">
+<interface name="systemd_domtrans_sysusers" lineno="2597">
 <summary>
 Execute systemd-sysusers in the
 systemd sysusers domain.
@@ -108123,7 +108153,7 @@ Domain allowed access.
 </summary>
 </param>
 </interface>
-<interface name="systemd_run_sysusers" lineno="2624">
+<interface name="systemd_run_sysusers" lineno="2622">
 <summary>
 Run systemd-sysusers with a domain transition.
 </summary>
@@ -108139,7 +108169,7 @@ Role allowed access.
 </param>
 <rolecap/>
 </interface>
-<interface name="systemd_use_inherited_machined_ptys" lineno="2644">
+<interface name="systemd_use_inherited_machined_ptys" lineno="2642">
 <summary>
 receive and use a systemd_machined_devpts_t file handle
 </summary>


             reply	other threads:[~2023-10-20 22:06 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-10-20 22:05 Kenton Groombridge [this message]
  -- strict thread matches above, loose matches on Subject: below --
2023-03-31 23:07 [gentoo-commits] proj/hardened-refpolicy:master commit in: doc/ Kenton Groombridge
2022-03-31  3:31 Jason Zaman
2014-08-10 13:59 Sven Vermeulen
2013-04-19 18:01 Sven Vermeulen

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1697837405.8c8f4a31a3896a10963b987691b7c7b87ce18842.concord@gentoo \
    --to=concord@gentoo.org \
    --cc=gentoo-commits@lists.gentoo.org \
    --cc=gentoo-dev@lists.gentoo.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox