diff --git a/docs/macro_conversion_guide b/docs/macro_conversion_guide
index ba0601a..a5122ec 100644
--- a/docs/macro_conversion_guide
+++ b/docs/macro_conversion_guide
@@ -40,6 +40,11 @@ storage_raw_read_fixed_disk($1)
 storage_raw_write_fixed_disk($1)
 
 #
+# nscd_client_domain: complete
+#
+nscd_use_socket($1)
+
+#
 # privfd: complete
 #
 domain_wide_inherit_fd($1)
@@ -78,6 +83,21 @@ domain_role_change_exempt($1)
 #
 domain_subj_id_change_exempt($1)
 
+#
+# userspace_objmgr: complete
+#
+allow $1 self:process getattr;
+# Receive notifications of policy reloads and enforcing status changes.
+allow $1 self:netlink_selinux_socket { create bind read };
+selinux_get_fs_mount($1)
+selinux_validate_context($1)
+selinux_compute_access_vector($1)
+selinux_compute_create_context($1)
+selinux_compute_relabel_context($1)
+selinux_compute_user_contexts($1)
+seutil_read_config($1)
+seutil_read_default_contexts($1)
+
 ########################################
 #
 # Access macros
@@ -157,10 +177,13 @@ allow $1 sbin_t:dir r_dir_perms;
 allow $1 sbin_t:notdevfile_class_set r_file_perms;
 kernel_read_kernel_sysctl($1)
 seutil_read_config($1)
-if (read_default_t) {
-allow $1 default_t:dir r_dir_perms;
-allow $1 default_t:notdevfile_class_set r_file_perms;
-}
+tunable_policy(`read_default_t',`
+	files_list_default($1)
+	files_read_default_files($1)
+	files_read_default_symlinks($1)
+	files_read_default_sockets($1)
+	files_read_default_pipes($1)
+')
 
 #
 # base_pty_perms():
@@ -219,7 +242,7 @@ libs_exec_ld_so($1)
 libs_exec_lib_files($1)
 
 #
-# can_getcon():
+# can_getcon(): complete
 #
 allow $1 self:process getattr;
 kernel_read_system_state($1)
@@ -509,6 +532,8 @@ dontaudit $1_t self:capability sys_tty_config;
 allow $1_t $1_var_run_t:file { getattr create read write append setattr unlink };
 files_create_pid($1_t,$1_var_run_t)
 kernel_read_kernel_sysctl($1_t)
+kernel_list_proc($1_t)
+kernel_read_proc_symlink($1_t)
 dev_read_sysfs($1_t)
 fs_getattr_all_fs($1_t)
 fs_search_auto_mountpoints($1_t)
@@ -521,6 +546,7 @@ libs_use_shared_libs($1_t)
 logging_send_syslog_msg($1_t)
 miscfiles_read_localization($1_t)
 userdom_dontaudit_use_unpriv_user_fd($1_t)
+userdom_dontaudit_search_sysadm_home_dir($1_t)
 ifdef(`targeted_policy', `
 	term_dontaudit_use_unallocated_tty($1_t)
 	term_dontaudit_use_generic_pty($1_t)
@@ -529,15 +555,12 @@ ifdef(`targeted_policy', `
 optional_policy(`rhgb.te',`
 	rhgb_domain($1_t)
 ')
-optional_policy(`selinux.te',`
-	seutil_newrole_sigchld($1_t)
+optional_policy(`selinuxutils.te',`
+	seutil_sigchld_newrole($1_t)
 ')
 optional_policy(`udev.te', `
 	udev_read_db($1_t)
 ')
-allow $1_t proc_t:dir r_dir_perms;
-allow $1_t proc_t:lnk_file read;
-dontaudit $1_t sysadm_home_dir_t:dir search;
 
 #
 # daemon_sub_domain():