diff --git a/policy/modules/services/aisexec.if b/policy/modules/services/aisexec.if
index 7fb41c2..4827f39 100644
--- a/policy/modules/services/aisexec.if
+++ b/policy/modules/services/aisexec.if
@@ -60,7 +60,7 @@ interface(`aisexec_read_log',`
######################################
##
-## All of the rules required to administrate
+## All of the rules required to administrate
## an aisexec environment
##
##
diff --git a/policy/modules/services/aisexec.te b/policy/modules/services/aisexec.te
index 22f2004..c9cbdcf 100644
--- a/policy/modules/services/aisexec.te
+++ b/policy/modules/services/aisexec.te
@@ -56,7 +56,7 @@ files_var_lib_filetrans(aisexec_t, aisexec_var_lib_t, { file dir sock_file })
manage_files_pattern(aisexec_t, aisexec_var_log_t, aisexec_var_log_t)
manage_sock_files_pattern(aisexec_t, aisexec_var_log_t, aisexec_var_log_t)
-logging_log_filetrans(aisexec_t,aisexec_var_log_t,{ sock_file file })
+logging_log_filetrans(aisexec_t, aisexec_var_log_t, { sock_file file })
manage_files_pattern(aisexec_t, aisexec_var_run_t, aisexec_var_run_t)
manage_sock_files_pattern(aisexec_t, aisexec_var_run_t, aisexec_var_run_t)
diff --git a/policy/modules/services/corosync.if b/policy/modules/services/corosync.if
index 3626db1..5318dce 100644
--- a/policy/modules/services/corosync.if
+++ b/policy/modules/services/corosync.if
@@ -60,7 +60,7 @@ interface(`corosync_stream_connect',`
######################################
##
-## All of the rules required to administrate
+## All of the rules required to administrate
## an corosync environment
##
##
diff --git a/policy/modules/services/corosync.te b/policy/modules/services/corosync.te
index ad8d017..726e98b 100644
--- a/policy/modules/services/corosync.te
+++ b/policy/modules/services/corosync.te
@@ -48,7 +48,7 @@ files_tmp_filetrans(corosync_t, corosync_tmp_t, { file dir })
manage_dirs_pattern(corosync_t, corosync_tmpfs_t, corosync_tmpfs_t)
manage_files_pattern(corosync_t, corosync_tmpfs_t, corosync_tmpfs_t)
-fs_tmpfs_filetrans(corosync_t, corosync_tmpfs_t,{ dir file })
+fs_tmpfs_filetrans(corosync_t, corosync_tmpfs_t, { dir file })
manage_files_pattern(corosync_t, corosync_var_lib_t, corosync_var_lib_t)
manage_dirs_pattern(corosync_t, corosync_var_lib_t, corosync_var_lib_t)
diff --git a/policy/modules/services/rgmanager.te b/policy/modules/services/rgmanager.te
index 4bba0fb..00b4caf 100644
--- a/policy/modules/services/rgmanager.te
+++ b/policy/modules/services/rgmanager.te
@@ -51,7 +51,7 @@ files_tmp_filetrans(rgmanager_t, rgmanager_tmp_t, { file dir })
manage_dirs_pattern(rgmanager_t, rgmanager_tmpfs_t, rgmanager_tmpfs_t)
manage_files_pattern(rgmanager_t, rgmanager_tmpfs_t, rgmanager_tmpfs_t)
-fs_tmpfs_filetrans(rgmanager_t, rgmanager_tmpfs_t,{ dir file })
+fs_tmpfs_filetrans(rgmanager_t, rgmanager_tmpfs_t, { dir file })
manage_files_pattern(rgmanager_t, rgmanager_var_log_t, rgmanager_var_log_t)
logging_log_filetrans(rgmanager_t, rgmanager_var_log_t, { file })
diff --git a/policy/modules/services/rhcs.if b/policy/modules/services/rhcs.if
index c9ce9ab..6b7eb35 100644
--- a/policy/modules/services/rhcs.if
+++ b/policy/modules/services/rhcs.if
@@ -51,7 +51,7 @@ template(`rhcs_domain_template',`
manage_fifo_files_pattern($1_t, $1_var_run_t, $1_var_run_t)
manage_sock_files_pattern($1_t, $1_var_run_t, $1_var_run_t)
files_pid_filetrans($1_t, $1_var_run_t, { file fifo_file })
-
+
')
######################################
@@ -226,7 +226,7 @@ interface(`rhcs_rw_gfs_controld_semaphores',`
#
interface(`rhcs_rw_gfs_controld_shm',`
gen_require(`
- type gfs_controld_t, gfs_controld_tmpfs_t;
+ type gfs_controld_t, gfs_controld_tmpfs_t;
')
allow $1 gfs_controld_t:shm { rw_shm_perms destroy };