diff --git a/policy/modules/admin/amanda.if b/policy/modules/admin/amanda.if index d99f058..90bef9e 100644 --- a/policy/modules/admin/amanda.if +++ b/policy/modules/admin/amanda.if @@ -30,7 +30,7 @@ interface(`amanda_domtrans_recover',` ## ## ## -## The role to be allowed the amanda_recover domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/admin/amtu.if b/policy/modules/admin/amtu.if index 18e3bc6..722175d 100644 --- a/policy/modules/admin/amtu.if +++ b/policy/modules/admin/amtu.if @@ -31,7 +31,7 @@ interface(`amtu_domtrans',` ## ## ## -## The role to be allowed the amtu domain. +## Role allowed access. ## ## # diff --git a/policy/modules/admin/backup.if b/policy/modules/admin/backup.if index c0b4205..cb1bdb3 100644 --- a/policy/modules/admin/backup.if +++ b/policy/modules/admin/backup.if @@ -30,7 +30,7 @@ interface(`backup_domtrans',` ## ## ## -## The role to be allowed the backup domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/admin/bootloader.if b/policy/modules/admin/bootloader.if index da8b00b..25ffe4d 100644 --- a/policy/modules/admin/bootloader.if +++ b/policy/modules/admin/bootloader.if @@ -30,7 +30,7 @@ interface(`bootloader_domtrans',` ## ## ## -## The role to be allowed the bootloader domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/admin/certwatch.if b/policy/modules/admin/certwatch.if index 3f45dfe..563cae9 100644 --- a/policy/modules/admin/certwatch.if +++ b/policy/modules/admin/certwatch.if @@ -34,7 +34,7 @@ interface(`certwatch_domtrans',` ## ## ## -## The role to be allowed the certwatch domain. +## Role allowed access. ## ## ## @@ -62,7 +62,7 @@ interface(`certwatch_run',` ## ## ## -## The role to be allowed the certwatch domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/admin/consoletype.if b/policy/modules/admin/consoletype.if index daa6eb3..2f75a75 100644 --- a/policy/modules/admin/consoletype.if +++ b/policy/modules/admin/consoletype.if @@ -37,7 +37,7 @@ interface(`consoletype_domtrans',` ## ## ## -## The role to be allowed the consoletype domain. +## Role allowed access. ## ## # diff --git a/policy/modules/admin/dmidecode.if b/policy/modules/admin/dmidecode.if index 331ff4c..d9f6ff2 100644 --- a/policy/modules/admin/dmidecode.if +++ b/policy/modules/admin/dmidecode.if @@ -35,7 +35,7 @@ interface(`dmidecode_domtrans',` ## ## ## -## The role to be allowed the dmidecode domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/admin/firstboot.if b/policy/modules/admin/firstboot.if index 83512c9..b65ebdb 100644 --- a/policy/modules/admin/firstboot.if +++ b/policy/modules/admin/firstboot.if @@ -33,7 +33,7 @@ interface(`firstboot_domtrans',` ## ## ## -## The role to be allowed the firstboot domain. +## Role allowed access. ## ## # diff --git a/policy/modules/admin/kismet.if b/policy/modules/admin/kismet.if index b630279..52f2545 100644 --- a/policy/modules/admin/kismet.if +++ b/policy/modules/admin/kismet.if @@ -31,7 +31,7 @@ interface(`kismet_domtrans',` ## ## ## -## The role to be allowed the kismet domain. +## Role allowed access. ## ## # diff --git a/policy/modules/admin/kudzu.if b/policy/modules/admin/kudzu.if index 1aeff55..585cd64 100644 --- a/policy/modules/admin/kudzu.if +++ b/policy/modules/admin/kudzu.if @@ -30,7 +30,7 @@ interface(`kudzu_domtrans',` ## ## ## -## The role to be allowed the kudzu domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/admin/logrotate.if b/policy/modules/admin/logrotate.if index b3aa19e..fa1c236 100644 --- a/policy/modules/admin/logrotate.if +++ b/policy/modules/admin/logrotate.if @@ -30,7 +30,7 @@ interface(`logrotate_domtrans',` ## ## ## -## The role to be allowed the logrotate domain. +## Role allowed access. ## ## ## @@ -86,7 +86,7 @@ interface(`logrotate_use_fds',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -104,7 +104,7 @@ interface(`logrotate_dontaudit_use_fds',` ## ## ## -## Domain to not audit +## Domain allowed access. ## ## # diff --git a/policy/modules/admin/netutils.if b/policy/modules/admin/netutils.if index 0ab5f13..0bd526e 100644 --- a/policy/modules/admin/netutils.if +++ b/policy/modules/admin/netutils.if @@ -30,7 +30,7 @@ interface(`netutils_domtrans',` ## ## ## -## The role to be allowed the netutils domain. +## Role allowed access. ## ## ## @@ -146,7 +146,7 @@ interface(`netutils_signal_ping',` ## ## ## -## The role to be allowed the ping domain. +## Role allowed access. ## ## ## @@ -172,7 +172,7 @@ interface(`netutils_run_ping',` ## ## ## -## The role to be allowed the ping domain. +## Role allowed access. ## ## ## @@ -238,7 +238,7 @@ interface(`netutils_domtrans_traceroute',` ## ## ## -## The role to be allowed the traceroute domain. +## Role allowed access. ## ## ## @@ -264,7 +264,7 @@ interface(`netutils_run_traceroute',` ## ## ## -## The role to be allowed the traceroute domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/admin/quota.if b/policy/modules/admin/quota.if index d50f2f5..fd8568e 100644 --- a/policy/modules/admin/quota.if +++ b/policy/modules/admin/quota.if @@ -30,7 +30,7 @@ interface(`quota_domtrans',` ## ## ## -## The role to be allowed the quota domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/admin/shutdown.if b/policy/modules/admin/shutdown.if index efb18c0..d26bad6 100644 --- a/policy/modules/admin/shutdown.if +++ b/policy/modules/admin/shutdown.if @@ -35,7 +35,7 @@ interface(`shutdown_domtrans',` ## ## ## -## The role to be allowed the shutdown domain. +## Role allowed access. ## ## # diff --git a/policy/modules/admin/tripwire.if b/policy/modules/admin/tripwire.if index d23d02a..f623209 100644 --- a/policy/modules/admin/tripwire.if +++ b/policy/modules/admin/tripwire.if @@ -43,7 +43,7 @@ interface(`tripwire_domtrans_tripwire',` ## ## ## -## The role to be allowed the tripwire domain. +## Role allowed access. ## ## ## @@ -87,7 +87,7 @@ interface(`tripwire_domtrans_twadmin',` ## ## ## -## The role to be allowed the twadmin domain. +## Role allowed access. ## ## ## @@ -131,7 +131,7 @@ interface(`tripwire_domtrans_twprint',` ## ## ## -## The role to be allowed the twprint domain. +## Role allowed access. ## ## ## @@ -175,7 +175,7 @@ interface(`tripwire_domtrans_siggen',` ## ## ## -## The role to be allowed the siggen domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/admin/usbmodules.if b/policy/modules/admin/usbmodules.if index d673f10..eba81e2 100644 --- a/policy/modules/admin/usbmodules.if +++ b/policy/modules/admin/usbmodules.if @@ -31,7 +31,7 @@ interface(`usbmodules_domtrans',` ## ## ## -## The role to be allowed the usbmodules domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/admin/usermanage.if b/policy/modules/admin/usermanage.if index 8702699..dd6ab1b 100644 --- a/policy/modules/admin/usermanage.if +++ b/policy/modules/admin/usermanage.if @@ -36,7 +36,7 @@ interface(`usermanage_domtrans_chfn',` ## ## ## -## The role to be allowed the chfn domain. +## Role allowed access. ## ## # @@ -85,7 +85,7 @@ interface(`usermanage_domtrans_groupadd',` ## ## ## -## The role to be allowed the groupadd domain. +## Role allowed access. ## ## ## @@ -157,7 +157,7 @@ interface(`usermanage_kill_passwd',` ## ## ## -## The role to be allowed the passwd domain. +## Role allowed access. ## ## # @@ -205,7 +205,7 @@ interface(`usermanage_domtrans_admin_passwd',` ## ## ## -## The role to be allowed the admin passwd domain. +## Role allowed access. ## ## ## @@ -225,11 +225,11 @@ interface(`usermanage_run_admin_passwd',` ######################################## ## -## Dontaudit attempts to use useradd fds +## Do not audit attempts to use useradd fds. ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -277,7 +277,7 @@ interface(`usermanage_domtrans_useradd',` ## ## ## -## The role to be allowed the useradd domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/admin/vbetool.if b/policy/modules/admin/vbetool.if index 2dc9f53..273d01d 100644 --- a/policy/modules/admin/vbetool.if +++ b/policy/modules/admin/vbetool.if @@ -31,7 +31,7 @@ interface(`vbetool_domtrans',` ## ## ## -## The role to be allowed the vbetool domain. +## Role allowed access. ## ## # diff --git a/policy/modules/admin/vpn.if b/policy/modules/admin/vpn.if index ccda6e4..7ed042a 100644 --- a/policy/modules/admin/vpn.if +++ b/policy/modules/admin/vpn.if @@ -30,7 +30,7 @@ interface(`vpn_domtrans',` ## ## ## -## The role to be allowed the vpnc domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/apps/ada.if b/policy/modules/apps/ada.if index 3f3bbe0..1baf39f 100644 --- a/policy/modules/apps/ada.if +++ b/policy/modules/apps/ada.if @@ -31,7 +31,7 @@ interface(`ada_domtrans',` ## ## ## -## The role to be allowed the ada domain. +## Role allowed access. ## ## # diff --git a/policy/modules/apps/java.if b/policy/modules/apps/java.if index 9bb8f31..88fd48a 100644 --- a/policy/modules/apps/java.if +++ b/policy/modules/apps/java.if @@ -125,7 +125,7 @@ template(`java_domtrans',` ## ## ## -## The role to be allowed the java domain. +## Role allowed access. ## ## # diff --git a/policy/modules/apps/mono.if b/policy/modules/apps/mono.if index a6af322..f78a370 100644 --- a/policy/modules/apps/mono.if +++ b/policy/modules/apps/mono.if @@ -87,7 +87,7 @@ interface(`mono_domtrans',` ## ## ## -## The role to be allowed the mono domain. +## Role allowed access. ## ## # diff --git a/policy/modules/apps/podsleuth.if b/policy/modules/apps/podsleuth.if index 60b8bc2..b3acdea 100644 --- a/policy/modules/apps/podsleuth.if +++ b/policy/modules/apps/podsleuth.if @@ -31,7 +31,7 @@ interface(`podsleuth_domtrans',` ## ## ## -## The role to be allowed the podsleuth domain. +## Role allowed access. ## ## # diff --git a/policy/modules/apps/ptchown.if b/policy/modules/apps/ptchown.if index f1c2698..2265537 100644 --- a/policy/modules/apps/ptchown.if +++ b/policy/modules/apps/ptchown.if @@ -30,7 +30,7 @@ interface(`ptchown_domtrans',` ## ## ## -## The role to be allowed the ptchown domain. +## Role allowed access. ## ## # diff --git a/policy/modules/apps/pulseaudio.if b/policy/modules/apps/pulseaudio.if index 9ebb373..c78c530 100644 --- a/policy/modules/apps/pulseaudio.if +++ b/policy/modules/apps/pulseaudio.if @@ -69,7 +69,7 @@ interface(`pulseaudio_domtrans',` ## ## ## -## The role to be allowed the pulseaudio domain. +## Role allowed access. ## ## # diff --git a/policy/modules/apps/usernetctl.if b/policy/modules/apps/usernetctl.if index cc4609c..e1771fa 100644 --- a/policy/modules/apps/usernetctl.if +++ b/policy/modules/apps/usernetctl.if @@ -30,7 +30,7 @@ interface(`usernetctl_domtrans',` ## ## ## -## The role to be allowed the usernetctl domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/apps/webalizer.if b/policy/modules/apps/webalizer.if index dac920d..a79f537 100644 --- a/policy/modules/apps/webalizer.if +++ b/policy/modules/apps/webalizer.if @@ -30,7 +30,7 @@ interface(`webalizer_domtrans',` ## ## ## -## The role to be allowed the webalizer domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/apps/wine.if b/policy/modules/apps/wine.if index f5217b8..4e6386f 100644 --- a/policy/modules/apps/wine.if +++ b/policy/modules/apps/wine.if @@ -141,7 +141,7 @@ interface(`wine_domtrans',` ## ## ## -## The role to be allowed the wine domain. +## Role allowed access. ## ## # diff --git a/policy/modules/apps/yam.if b/policy/modules/apps/yam.if index 5fb7790..5cc2de6 100644 --- a/policy/modules/apps/yam.if +++ b/policy/modules/apps/yam.if @@ -31,7 +31,7 @@ interface(`yam_domtrans',` ## ## ## -## The role to be allowed the yam domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/kernel/corenetwork.if.in b/policy/modules/kernel/corenetwork.if.in index bda5e34..b06df19 100644 --- a/policy/modules/kernel/corenetwork.if.in +++ b/policy/modules/kernel/corenetwork.if.in @@ -1722,7 +1722,7 @@ interface(`corenet_tcp_bind_all_reserved_ports',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -1759,7 +1759,7 @@ interface(`corenet_udp_bind_all_reserved_ports',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -1999,7 +1999,7 @@ interface(`corenet_tcp_bind_all_rpc_ports',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -2036,7 +2036,7 @@ interface(`corenet_udp_bind_all_rpc_ports',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # diff --git a/policy/modules/kernel/kernel.if b/policy/modules/kernel/kernel.if index 547fcf4..b46db36 100644 --- a/policy/modules/kernel/kernel.if +++ b/policy/modules/kernel/kernel.if @@ -222,7 +222,7 @@ interface(`kernel_use_fds',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # diff --git a/policy/modules/kernel/storage.if b/policy/modules/kernel/storage.if index 7b8a19c..d7ca7b2 100644 --- a/policy/modules/kernel/storage.if +++ b/policy/modules/kernel/storage.if @@ -27,7 +27,7 @@ interface(`storage_getattr_fixed_disk_dev',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -67,7 +67,7 @@ interface(`storage_setattr_fixed_disk_dev',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -111,7 +111,7 @@ interface(`storage_raw_read_fixed_disk',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -538,7 +538,7 @@ interface(`storage_getattr_removable_dev',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -557,7 +557,7 @@ interface(`storage_dontaudit_getattr_removable_dev',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -577,7 +577,7 @@ interface(`storage_dontaudit_read_removable_device',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -616,7 +616,7 @@ interface(`storage_setattr_removable_dev',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # diff --git a/policy/modules/kernel/terminal.if b/policy/modules/kernel/terminal.if index f623b72..4d9d592 100644 --- a/policy/modules/kernel/terminal.if +++ b/policy/modules/kernel/terminal.if @@ -382,7 +382,7 @@ interface(`term_getattr_pty_fs',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -460,7 +460,7 @@ interface(`term_list_ptys',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -479,7 +479,7 @@ interface(`term_dontaudit_list_ptys',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -498,7 +498,7 @@ interface(`term_dontaudit_manage_pty_dirs',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -600,7 +600,7 @@ interface(`term_use_generic_ptys',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -696,7 +696,7 @@ interface(`term_use_ptmx',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -975,7 +975,7 @@ interface(`term_use_all_user_ptys',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -1206,7 +1206,7 @@ interface(`term_use_unallocated_ttys',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # diff --git a/policy/modules/services/apache.if b/policy/modules/services/apache.if index 57feb5a..223bfc2 100644 --- a/policy/modules/services/apache.if +++ b/policy/modules/services/apache.if @@ -916,7 +916,7 @@ interface(`apache_domtrans_all_scripts',` ## ## ## -## The role to be allowed the script domains. +## Role allowed access.. ## ## # diff --git a/policy/modules/services/bind.if b/policy/modules/services/bind.if index ec677f6..5d3c891 100644 --- a/policy/modules/services/bind.if +++ b/policy/modules/services/bind.if @@ -102,7 +102,7 @@ interface(`bind_kill',` ## ## ## -## The role to be allowed the bind domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/services/bluetooth.if b/policy/modules/services/bluetooth.if index fa38f57..d17e012 100644 --- a/policy/modules/services/bluetooth.if +++ b/policy/modules/services/bluetooth.if @@ -141,7 +141,7 @@ interface(`bluetooth_domtrans_helper',` ## ## ## -## The role to be allowed the bluetooth_helper domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/services/clockspeed.if b/policy/modules/services/clockspeed.if index 7762be6..9e3f911 100644 --- a/policy/modules/services/clockspeed.if +++ b/policy/modules/services/clockspeed.if @@ -29,7 +29,7 @@ interface(`clockspeed_domtrans_cli',` ## ## ## -## The role to be allowed the clockspeed_cli domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/services/dcc.if b/policy/modules/services/dcc.if index 7073379..ffce351 100644 --- a/policy/modules/services/dcc.if +++ b/policy/modules/services/dcc.if @@ -31,7 +31,7 @@ interface(`dcc_domtrans_cdcc',` ## ## ## -## The role to be allowed the cdcc domain. +## Role allowed access. ## ## ## @@ -94,7 +94,7 @@ interface(`dcc_signal_client',` ## ## ## -## The role to be allowed the dcc_client domain. +## Role allowed access. ## ## ## @@ -139,7 +139,7 @@ interface(`dcc_domtrans_dbclean',` ## ## ## -## The role to be allowed the dcc_dbclean domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/services/gnomeclock.if b/policy/modules/services/gnomeclock.if index 716006b..3da830b 100644 --- a/policy/modules/services/gnomeclock.if +++ b/policy/modules/services/gnomeclock.if @@ -30,7 +30,7 @@ interface(`gnomeclock_domtrans',` ## ## ## -## The role to be allowed the gnomeclock domain. +## Role allowed access. ## ## # diff --git a/policy/modules/services/gpsd.if b/policy/modules/services/gpsd.if index 39fc12f..8fe31eb 100644 --- a/policy/modules/services/gpsd.if +++ b/policy/modules/services/gpsd.if @@ -30,7 +30,7 @@ interface(`gpsd_domtrans',` ## ## ## -## The role to be allowed the gpsd domain. +## Role allowed access. ## ## # diff --git a/policy/modules/services/hal.if b/policy/modules/services/hal.if index 2aa3808..3707830 100644 --- a/policy/modules/services/hal.if +++ b/policy/modules/services/hal.if @@ -287,7 +287,7 @@ interface(`hal_write_log',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # diff --git a/policy/modules/services/lpd.if b/policy/modules/services/lpd.if index c358cd7..d29dfdf 100644 --- a/policy/modules/services/lpd.if +++ b/policy/modules/services/lpd.if @@ -64,7 +64,7 @@ interface(`lpd_domtrans_checkpc',` ## ## ## -## The role to be allowed the lpd domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/services/nis.if b/policy/modules/services/nis.if index b9e7d40..c7db858 100644 --- a/policy/modules/services/nis.if +++ b/policy/modules/services/nis.if @@ -143,7 +143,7 @@ interface(`nis_domtrans_ypbind',` ## ## ## -## The role to be allowed the ypbind domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/services/nscd.if b/policy/modules/services/nscd.if index 429bd9f..a63a657 100644 --- a/policy/modules/services/nscd.if +++ b/policy/modules/services/nscd.if @@ -221,7 +221,7 @@ interface(`nscd_unconfined',` ## ## ## -## The role to be allowed the nscd domain. +## Role allowed access. ## ## # diff --git a/policy/modules/services/oav.if b/policy/modules/services/oav.if index 2102b0b..d44783f 100644 --- a/policy/modules/services/oav.if +++ b/policy/modules/services/oav.if @@ -31,7 +31,7 @@ interface(`oav_domtrans_update',` ## ## ## -## The role to be allowed the oav_update domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/services/openvpn.if b/policy/modules/services/openvpn.if index aab6297..ae74460 100644 --- a/policy/modules/services/openvpn.if +++ b/policy/modules/services/openvpn.if @@ -30,7 +30,7 @@ interface(`openvpn_domtrans',` ## ## ## -## The role to be allowed the openvpn domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/services/policykit.if b/policy/modules/services/policykit.if index 4dbbc70..2ccacfa 100644 --- a/policy/modules/services/policykit.if +++ b/policy/modules/services/policykit.if @@ -51,7 +51,7 @@ interface(`policykit_domtrans_auth',` ## ## ## -## The role to be allowed the load_policy domain. +## Role allowed access. ## ## # @@ -94,7 +94,7 @@ interface(`policykit_domtrans_grant',` ## ## ## -## The role to be allowed the load_policy domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/services/portmap.if b/policy/modules/services/portmap.if index 9901e89..af55ca0 100644 --- a/policy/modules/services/portmap.if +++ b/policy/modules/services/portmap.if @@ -32,7 +32,7 @@ interface(`portmap_domtrans_helper',` ## ## ## -## The role to be allowed the portmap domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/services/postfix.if b/policy/modules/services/postfix.if index ec895ee..378cee1 100644 --- a/policy/modules/services/postfix.if +++ b/policy/modules/services/postfix.if @@ -343,7 +343,7 @@ interface(`postfix_domtrans_map',` ## ## ## -## The role to be allowed the postfix_map domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/services/ricci.if b/policy/modules/services/ricci.if index 700467c..f7826f9 100644 --- a/policy/modules/services/ricci.if +++ b/policy/modules/services/ricci.if @@ -43,7 +43,7 @@ interface(`ricci_domtrans_modcluster',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -62,7 +62,7 @@ interface(`ricci_dontaudit_use_modcluster_fds',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # diff --git a/policy/modules/services/samba.if b/policy/modules/services/samba.if index 086c9b5..6d974a7 100644 --- a/policy/modules/services/samba.if +++ b/policy/modules/services/samba.if @@ -89,7 +89,7 @@ interface(`samba_domtrans_net',` ## ## ## -## The role to be allowed the samba_net domain. +## Role allowed access. ## ## ## @@ -134,7 +134,7 @@ interface(`samba_domtrans_smbmount',` ## ## ## -## The role to be allowed the smbmount domain. +## Role allowed access. ## ## ## @@ -445,7 +445,7 @@ interface(`samba_domtrans_smbcontrol',` ## ## ## -## The role to be allowed the smbcontrol domain. +## Role allowed access. ## ## # @@ -578,7 +578,7 @@ interface(`samba_domtrans_winbind_helper',` ## ## ## -## The role to be allowed the winbind_helper domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/services/xserver.if b/policy/modules/services/xserver.if index 8633a6a..3b31efb 100644 --- a/policy/modules/services/xserver.if +++ b/policy/modules/services/xserver.if @@ -907,7 +907,7 @@ interface(`xserver_getattr_log',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -921,12 +921,11 @@ interface(`xserver_dontaudit_write_log',` ######################################## ## -## Do not audit attempts to write the X server -## log files. +## Delete X server log files. ## ## ## -## Domain to not audit +## Domain allowed access. ## ## # @@ -947,7 +946,7 @@ interface(`xserver_delete_log',` ## ## ## -## Domain to not audit +## Domain allowed access. ## ## # @@ -968,7 +967,7 @@ interface(`xserver_read_xkb_libs',` ## ## ## -## Domain to not audit +## Domain allowed access. ## ## # @@ -987,7 +986,7 @@ interface(`xserver_read_xdm_tmp_files',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -1006,7 +1005,7 @@ interface(`xserver_dontaudit_read_xdm_tmp_files',` ## ## ## -## Domain to not audit +## Domain allowed access. ## ## # @@ -1025,7 +1024,7 @@ interface(`xserver_rw_xdm_tmp_files',` ## ## ## -## Domain to not audit +## Domain allowed access. ## ## # @@ -1039,11 +1038,12 @@ interface(`xserver_manage_xdm_tmp_files',` ######################################## ## -## dontaudit getattr xdm temporary named sockets. +## Do not audit attempts to get the attributes of +## xdm temporary named sockets. ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -1080,7 +1080,7 @@ interface(`xserver_domtrans',` ## ## ## -## Domain to not audit +## Domain allowed access. ## ## # @@ -1098,7 +1098,7 @@ interface(`xserver_signal',` ## ## ## -## Domain to not audit +## Domain allowed access. ## ## # @@ -1136,7 +1136,7 @@ interface(`xserver_rw_shm',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -1193,7 +1193,7 @@ interface(`xserver_stream_connect',` ## ## ## -## Domain to not audit +## Domain allowed access. ## ## # diff --git a/policy/modules/services/zosremote.if b/policy/modules/services/zosremote.if index f2f2389..6a5acd5 100644 --- a/policy/modules/services/zosremote.if +++ b/policy/modules/services/zosremote.if @@ -31,7 +31,7 @@ interface(`zosremote_domtrans',` ## ## ## -## The role to be allowed the zos_remote domain. +## Role allowed access. ## ## # diff --git a/policy/modules/system/clock.if b/policy/modules/system/clock.if index 4cf09f6..7bef600 100644 --- a/policy/modules/system/clock.if +++ b/policy/modules/system/clock.if @@ -30,7 +30,7 @@ interface(`clock_domtrans',` ## ## ## -## The role to be allowed the clock domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/system/fstools.if b/policy/modules/system/fstools.if index 1c51b4b..7f2eb65 100644 --- a/policy/modules/system/fstools.if +++ b/policy/modules/system/fstools.if @@ -31,7 +31,7 @@ interface(`fstools_domtrans',` ## ## ## -## The role to be allowed the fs tools domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/system/hostname.if b/policy/modules/system/hostname.if index 8fdea3b..748af7d 100644 --- a/policy/modules/system/hostname.if +++ b/policy/modules/system/hostname.if @@ -31,7 +31,7 @@ interface(`hostname_domtrans',` ## ## ## -## The role to be allowed the hostname domain. +## Role allowed access. ## ## # diff --git a/policy/modules/system/ipsec.if b/policy/modules/system/ipsec.if index e0f0224..dbaf373 100644 --- a/policy/modules/system/ipsec.if +++ b/policy/modules/system/ipsec.if @@ -260,7 +260,7 @@ interface(`ipsec_domtrans_setkey',` ## ## ## -## The role to be allowed the racoon and setkey domains. +## Role allowed access.. ## ## ## diff --git a/policy/modules/system/iptables.if b/policy/modules/system/iptables.if index 6aca04d..b8acdd6 100644 --- a/policy/modules/system/iptables.if +++ b/policy/modules/system/iptables.if @@ -31,7 +31,7 @@ interface(`iptables_domtrans',` ## ## ## -## The role to be allowed the iptables domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/system/logging.if b/policy/modules/system/logging.if index fa5684a..a1d5058 100644 --- a/policy/modules/system/logging.if +++ b/policy/modules/system/logging.if @@ -174,7 +174,7 @@ interface(`logging_domtrans_auditctl',` ## ## ## -## The role to be allowed the auditctl domain. +## Role allowed access. ## ## ## @@ -218,7 +218,7 @@ interface(`logging_domtrans_auditd',` ## ## ## -## The role to be allowed the auditd domain. +## Role allowed access. ## ## # diff --git a/policy/modules/system/modutils.if b/policy/modules/system/modutils.if index e1057e3..5e3e8b9 100644 --- a/policy/modules/system/modutils.if +++ b/policy/modules/system/modutils.if @@ -175,7 +175,7 @@ interface(`modutils_domtrans_insmod',` ## ## ## -## The role to be allowed the insmod domain. +## Role allowed access. ## ## ## @@ -238,7 +238,7 @@ interface(`modutils_domtrans_depmod',` ## ## ## -## The role to be allowed the depmod domain. +## Role allowed access. ## ## ## @@ -301,7 +301,7 @@ interface(`modutils_domtrans_update_mods',` ## ## ## -## The role to be allowed the update_modules domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/system/mount.if b/policy/modules/system/mount.if index d7e78ad..2dda55d 100644 --- a/policy/modules/system/mount.if +++ b/policy/modules/system/mount.if @@ -31,7 +31,7 @@ interface(`mount_domtrans',` ## ## ## -## The role to be allowed the mount domain. +## Role allowed access. ## ## ## @@ -164,7 +164,7 @@ interface(`mount_domtrans_unconfined',` ## ## ## -## The role to be allowed the unconfined mount domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/system/netlabel.if b/policy/modules/system/netlabel.if index b37cd5b..c0668b6 100644 --- a/policy/modules/system/netlabel.if +++ b/policy/modules/system/netlabel.if @@ -31,7 +31,7 @@ interface(`netlabel_domtrans_mgmt',` ## ## ## -## The role to be allowed the netlabel_mgmt domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/system/pcmcia.if b/policy/modules/system/pcmcia.if index ac2b18b..fffe97b 100644 --- a/policy/modules/system/pcmcia.if +++ b/policy/modules/system/pcmcia.if @@ -82,7 +82,7 @@ interface(`pcmcia_domtrans_cardctl',` ## ## ## -## The role to be allowed the cardmgr domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/system/selinuxutil.if b/policy/modules/system/selinuxutil.if index d37974c..95772b0 100644 --- a/policy/modules/system/selinuxutil.if +++ b/policy/modules/system/selinuxutil.if @@ -33,7 +33,7 @@ interface(`seutil_domtrans_checkpolicy',` ## ## ## -## The role to be allowed the checkpolicy domain. +## Role allowed access. ## ## ## @@ -100,7 +100,7 @@ interface(`seutil_domtrans_loadpolicy',` ## ## ## -## The role to be allowed the load_policy domain. +## Role allowed access. ## ## ## @@ -185,7 +185,7 @@ interface(`seutil_domtrans_newrole',` ## ## ## -## The role to be allowed the newrole domain. +## Role allowed access. ## ## ## @@ -333,7 +333,7 @@ interface(`seutil_domtrans_restorecon',` ## ## ## -## The role to be allowed the restorecon domain. +## Role allowed access. ## ## ## @@ -420,7 +420,7 @@ interface(`seutil_init_script_domtrans_runinit',` ## ## ## -## The role to be allowed the run_init domain. +## Role allowed access. ## ## ## @@ -461,7 +461,7 @@ interface(`seutil_run_runinit',` ## ## ## -## The role to be allowed the run_init domain. +## Role allowed access. ## ## # @@ -529,7 +529,7 @@ interface(`seutil_domtrans_setfiles',` ## ## ## -## The role to be allowed the setfiles domain. +## Role allowed access. ## ## ## @@ -1020,7 +1020,7 @@ interface(`seutil_domtrans_semanage',` ## ## ## -## The role to be allowed the checkpolicy domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/system/sysnetwork.if b/policy/modules/system/sysnetwork.if index 938f800..3c2e445 100644 --- a/policy/modules/system/sysnetwork.if +++ b/policy/modules/system/sysnetwork.if @@ -31,7 +31,7 @@ interface(`sysnet_domtrans_dhcpc',` ## ## ## -## The role to be allowed the clock domain. +## Role allowed access. ## ## ## @@ -479,7 +479,7 @@ interface(`sysnet_domtrans_ifconfig',` ## ## ## -## The role to be allowed the ifconfig domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if index fafdd3d..4a50357 100644 --- a/policy/modules/system/userdomain.if +++ b/policy/modules/system/userdomain.if @@ -1438,7 +1438,7 @@ interface(`userdom_list_user_home_dirs',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## # @@ -1568,7 +1568,7 @@ interface(`userdom_user_home_domtrans',` ## ## ## -## Domain to not audit +## Domain to not audit. ## ## #