diff --git a/private/access_vectors b/private/access_vectors
index 26286b238a62e9eaa0ac7673b710c40b982e18e5..6393c166d995348191ad8dd70115120593f50de7 100644
--- a/private/access_vectors
+++ b/private/access_vectors
@@ -24,7 +24,6 @@ common file
 	link
 	rename
 	execute
-	swapon
 	quotaon
 	mounton
 }
@@ -57,8 +56,6 @@ common socket
 	shutdown
 	recvfrom
 	sendto
-	recv_msg
-	send_msg
 	name_bind
 }
 
@@ -97,7 +94,6 @@ class filesystem
 	getattr
 	relabelfrom
 	relabelto
-	transition
 	associate
 	quotamod
 	quotaget
@@ -184,9 +180,6 @@ inherits socket
 class tcp_socket
 inherits socket
 {
-	connectto
-	newconn
-	acceptfrom
 	node_bind
 	name_connect
 }
@@ -205,29 +198,12 @@ inherits socket
 
 class node
 {
-	tcp_recv
-	tcp_send
-	udp_recv
-	udp_send
-	rawip_recv
-	rawip_send
-	enforce_dest
-	dccp_recv
-	dccp_send
 	recvfrom
 	sendto
 }
 
 class netif
 {
-	tcp_recv
-	tcp_send
-	udp_recv
-	udp_send
-	rawip_recv
-	rawip_send
-	dccp_recv
-	dccp_send
 	ingress
 	egress
 }
@@ -245,8 +221,6 @@ class unix_stream_socket
 inherits socket
 {
 	connectto
-	newconn
-	acceptfrom
 }
 
 class unix_dgram_socket
diff --git a/public/te_macros b/public/te_macros
index a826e968303b24a9e78dc673f0c4f8ee12cdf1f6..df171f010002daffe3e17c0390b7c3163b8f4277 100644
--- a/public/te_macros
+++ b/public/te_macros
@@ -237,7 +237,7 @@ define(`selinux_check_access', `
 r_dir_file($1, selinuxfs)
 allow $1 selinuxfs:file w_file_perms;
 allow $1 kernel:security compute_av;
-allow $1 self:netlink_selinux_socket { read write create getattr setattr lock relabelfrom relabelto append bind connect listen accept getopt setopt shutdown recvfrom sendto recv_msg send_msg name_bind };
+allow $1 self:netlink_selinux_socket { read write create getattr setattr lock relabelfrom relabelto append bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind };
 ')
 
 #####################################