diff --git a/policy/modules/services/ajaxterm.if b/policy/modules/services/ajaxterm.if index 2eee297..8e6e2c3 100644 --- a/policy/modules/services/ajaxterm.if +++ b/policy/modules/services/ajaxterm.if @@ -24,7 +24,7 @@ interface(`ajaxterm_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/apache.if b/policy/modules/services/apache.if index 854d78d..9668cde 100644 --- a/policy/modules/services/apache.if +++ b/policy/modules/services/apache.if @@ -1046,7 +1046,7 @@ interface(`apache_domtrans_all_scripts',` ## ## ## -## Role allowed access.. +## Role allowed access. ## ## ## @@ -1224,7 +1224,7 @@ interface(`apache_read_tmp_files',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # @@ -1375,7 +1375,7 @@ ifdef(`TODO',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/automount.if b/policy/modules/services/automount.if index f384848..617eead 100644 --- a/policy/modules/services/automount.if +++ b/policy/modules/services/automount.if @@ -29,7 +29,6 @@ interface(`automount_domtrans',` ## ## # -# interface(`automount_signal',` gen_require(` type automount_t; diff --git a/policy/modules/services/bluetooth.if b/policy/modules/services/bluetooth.if index 7c5d8c9..a01ce9f 100644 --- a/policy/modules/services/bluetooth.if +++ b/policy/modules/services/bluetooth.if @@ -179,7 +179,7 @@ interface(`bluetooth_run_helper',` ######################################## ## -## Read bluetooth helper state files. +## Do not audit attempts to read bluetooth helper state files. ## ## ## diff --git a/policy/modules/services/certmaster.if b/policy/modules/services/certmaster.if index 2704e81..ffd0da5 100644 --- a/policy/modules/services/certmaster.if +++ b/policy/modules/services/certmaster.if @@ -108,7 +108,7 @@ interface(`certmaster_manage_log',` ## ## ## -## The role to be allowed to manage the syslog domain. +## Role allowed access. ## ## ## diff --git a/policy/modules/services/chronyd.if b/policy/modules/services/chronyd.if index 49b5829..9811f7f 100644 --- a/policy/modules/services/chronyd.if +++ b/policy/modules/services/chronyd.if @@ -25,7 +25,7 @@ interface(`chronyd_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## # diff --git a/policy/modules/services/cobbler.if b/policy/modules/services/cobbler.if index 7fcf2fb..a4c26ff 100644 --- a/policy/modules/services/cobbler.if +++ b/policy/modules/services/cobbler.if @@ -153,7 +153,7 @@ interface(`cobbler_manage_lib_files',` ## ## ## -## Domain allowed access. +## Domain to not audit. ## ## # diff --git a/policy/modules/services/corosync.if b/policy/modules/services/corosync.if index 7614a00..a2e6830 100644 --- a/policy/modules/services/corosync.if +++ b/policy/modules/services/corosync.if @@ -24,7 +24,7 @@ interface(`corosync_domtrans',` ## ## ## -## Domain allowed to transition. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/cron.if b/policy/modules/services/cron.if index 3089b83..ffd5436 100644 --- a/policy/modules/services/cron.if +++ b/policy/modules/services/cron.if @@ -311,7 +311,7 @@ interface(`cron_exec',` ######################################## ## -## Execute crond server in the nscd domain. +## Execute crond server in the crond domain. ## ## ## diff --git a/policy/modules/services/devicekit.if b/policy/modules/services/devicekit.if index 70cf018..e20390f 100644 --- a/policy/modules/services/devicekit.if +++ b/policy/modules/services/devicekit.if @@ -147,16 +147,6 @@ interface(`devicekit_read_pid_files',` ## Domain allowed access. ## ## -## -## -## The role to be allowed to manage the devicekit domain. -## -## -## -## -## The type of the user terminal. -## -## ## # interface(`devicekit_admin',` diff --git a/policy/modules/services/dnsmasq.if b/policy/modules/services/dnsmasq.if index 42cc08f..f5149c8 100644 --- a/policy/modules/services/dnsmasq.if +++ b/policy/modules/services/dnsmasq.if @@ -144,7 +144,6 @@ interface(`dnsmasq_write_config',` ## ## # -# interface(`dnsmasq_delete_pid_files',` gen_require(` type dnsmasq_var_run_t; diff --git a/policy/modules/services/exim.if b/policy/modules/services/exim.if index 1685c5d..91f751d 100644 --- a/policy/modules/services/exim.if +++ b/policy/modules/services/exim.if @@ -24,7 +24,7 @@ interface(`exim_domtrans',` ## ## ## -## Domain allowed access. +## Domain allowed to transition. ## ## #