diff --git a/refpolicy/policy/modules/kernel/selinux.if b/refpolicy/policy/modules/kernel/selinux.if
index daf8e84..837a94a 100644
--- a/refpolicy/policy/modules/kernel/selinux.if
+++ b/refpolicy/policy/modules/kernel/selinux.if
@@ -1,5 +1,5 @@
 ## <summary>
-## Policy for kernel security interface, in particular, selinuxfs.
+##	Policy for kernel security interface, in particular, selinuxfs.
 ## </summary>
 ## <required val="true">
 ##	Contains the policy for the kernel SELinux security interface.
@@ -61,6 +61,16 @@ interface(`selinux_get_enforce_mode',`
 ##	Allow caller to set the mode of policy enforcement
 ##	(enforcing or permissive mode).
 ## </summary>
+## <desc>
+##	<p>
+##	Allow caller to set the mode of policy enforcement
+##	(enforcing or permissive mode).
+##	</p>
+##	<p>
+##	Since this is a security event, this action is
+##	always audited.
+##	</p>
+## </desc>
 ## <param name="domain">
 ##	The process type to allow to set the enforcement mode.
 ## </param>
@@ -110,6 +120,16 @@ interface(`selinux_load_policy',`
 ##	Allow caller to set the state of Booleans to
 ##	enable or disable conditional portions of the policy.
 ## </summary>
+## <desc>
+##	<p>
+##	Allow caller to set the state of Booleans to
+##	enable or disable conditional portions of the policy.
+##	</p>
+##	<p>
+##	Since this is a security event, this action is
+##	always audited.
+##	</p>
+## </desc>
 ## <param name="domain">
 ##	The process type allowed to set the Boolean.
 ## </param>
@@ -140,8 +160,19 @@ interface(`selinux_set_boolean',`
 
 ########################################
 ## <summary>
-##	Allow caller to set selinux security parameters.
+##	Allow caller to set SELinux access vector cache parameters.
 ## </summary>
+## <desc>
+##	<p>
+##	Allow caller to set SELinux access vector cache parameters.
+##	The allows the domain to set performance related parameters
+##	of the AVC, such as cache threshold.
+##	</p>
+##	<p>
+##	Since this is a security event, this action is
+##	always audited.
+##	</p>
+## </desc>
 ## <param name="domain">
 ##	The process type to allow to set security parameters.
 ## </param>
@@ -206,10 +237,10 @@ interface(`selinux_compute_access_vector',`
 
 ########################################
 ## <summary>
-##	
+##	Calculate the default type for object creation.
 ## </summary>
 ## <param name="domain">
-##	
+##	Domain allowed access.
 ## </param>
 #
 interface(`selinux_compute_create_context',`
@@ -227,10 +258,19 @@ interface(`selinux_compute_create_context',`
 
 ########################################
 ## <summary>
-##	
+##	Calculate the context for relabeling objects.
 ## </summary>
+## <desc>
+##	<p>
+##	Calculate the context for relabeling objects.
+##	This is determined by using the type_change
+##	rules in the policy, and is generally used
+##	for determining the context for relabeling
+##	a terminal when a user logs in.
+##	</p>
+## </desc>
 ## <param name="domain">
-##	The process type to
+##	Domain allowed access.
 ## </param>
 #
 interface(`selinux_compute_relabel_context',`
@@ -269,7 +309,7 @@ interface(`selinux_compute_user_contexts',`
 
 ########################################
 ## <summary>
-##	Unconfined access to the SELinux security server.
+##	Unconfined access to the SELinux kernel security server.
 ## </summary>
 ## <param name="domain">
 ##	Domain allowed access.