diff --git a/policy/modules/system/authlogin.if b/policy/modules/system/authlogin.if
index 54b9826..7fddc24 100644
--- a/policy/modules/system/authlogin.if
+++ b/policy/modules/system/authlogin.if
@@ -162,7 +162,7 @@ interface(`auth_login_pgm_domain',`
##
##
##
-## The type of process using the login program as entry point.
+## Domain allowed access.
##
##
#
@@ -180,7 +180,7 @@ interface(`auth_login_entry_type',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -205,7 +205,7 @@ interface(`auth_domtrans_login_program',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -332,7 +332,7 @@ interface(`auth_var_filetrans_cache',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -381,7 +381,7 @@ interface(`auth_domtrans_chk_passwd',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -402,7 +402,7 @@ interface(`auth_domtrans_chkpwd',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -446,7 +446,7 @@ interface(`auth_domtrans_upd_passwd',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -582,7 +582,7 @@ interface(`auth_tunable_read_shadow',`
##
##
##
-## The type of the domain to not audit.
+## Domain to not audit.
##
##
#
@@ -800,7 +800,7 @@ interface(`auth_rw_lastlog',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -836,7 +836,7 @@ interface(`auth_signal_pam',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -978,7 +978,7 @@ interface(`auth_manage_pam_pid',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -1098,7 +1098,7 @@ interface(`auth_delete_pam_console_data',`
##
##
##
-## The type of the domain perfoming this action.
+## Domain allowed access.
##
##
##
@@ -1123,7 +1123,7 @@ interface(`auth_read_all_dirs_except_shadow',`
##
##
##
-## The type of the domain perfoming this action.
+## Domain allowed access.
##
##
##
@@ -1149,7 +1149,7 @@ interface(`auth_read_all_files_except_shadow',`
##
##
##
-## The type of the domain perfoming this action.
+## Domain allowed access.
##
##
##
@@ -1174,7 +1174,7 @@ interface(`auth_read_all_symlinks_except_shadow',`
##
##
##
-## The type of the domain perfoming this action.
+## Domain allowed access.
##
##
##
@@ -1200,7 +1200,7 @@ interface(`auth_relabel_all_files_except_shadow',`
##
##
##
-## The type of the domain perfoming this action.
+## Domain allowed access.
##
##
##
@@ -1226,7 +1226,7 @@ interface(`auth_rw_all_files_except_shadow',`
##
##
##
-## The type of the domain perfoming this action.
+## Domain allowed access.
##
##
##
@@ -1251,7 +1251,7 @@ interface(`auth_manage_all_files_except_shadow',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -1269,7 +1269,7 @@ interface(`auth_domtrans_utempter',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -1351,7 +1351,7 @@ interface(`auth_read_login_records',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
##
diff --git a/policy/modules/system/clock.if b/policy/modules/system/clock.if
index 7bef600..e2f6d93 100644
--- a/policy/modules/system/clock.if
+++ b/policy/modules/system/clock.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
#
@@ -25,7 +25,7 @@ interface(`clock_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
##
@@ -50,7 +50,7 @@ interface(`clock_run',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/system/daemontools.if b/policy/modules/system/daemontools.if
index feef778..89cc088 100644
--- a/policy/modules/system/daemontools.if
+++ b/policy/modules/system/daemontools.if
@@ -11,7 +11,7 @@
##
##
##
-## Domain allowed access to svc_start_t.
+## Domain allowed access.
##
##
#
@@ -59,7 +59,7 @@ interface(`daemontools_service_domain',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -77,7 +77,7 @@ interface(`daemontools_domtrans_start',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -95,7 +95,7 @@ interface(`daemontools_domtrans_run',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/system/fstools.if b/policy/modules/system/fstools.if
index 7f2eb65..016a770 100644
--- a/policy/modules/system/fstools.if
+++ b/policy/modules/system/fstools.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
#
@@ -26,7 +26,7 @@ interface(`fstools_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
##
@@ -51,7 +51,7 @@ interface(`fstools_run',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -106,7 +106,7 @@ interface(`fstools_read_pipes',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -125,7 +125,7 @@ interface(`fstools_relabelto_entry_files',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -143,7 +143,7 @@ interface(`fstools_manage_entry_files',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/system/getty.if b/policy/modules/system/getty.if
index b2b003d..e4376aa 100644
--- a/policy/modules/system/getty.if
+++ b/policy/modules/system/getty.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/system/hostname.if b/policy/modules/system/hostname.if
index 748af7d..187f04f 100644
--- a/policy/modules/system/hostname.if
+++ b/policy/modules/system/hostname.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -26,7 +26,7 @@ interface(`hostname_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
diff --git a/policy/modules/system/hotplug.if b/policy/modules/system/hotplug.if
index 321d2e6..40eb10c 100644
--- a/policy/modules/system/hotplug.if
+++ b/policy/modules/system/hotplug.if
@@ -9,7 +9,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -139,7 +139,7 @@ interface(`hotplug_search_config',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
diff --git a/policy/modules/system/init.if b/policy/modules/system/init.if
index 59f9068..f6aafe7 100644
--- a/policy/modules/system/init.if
+++ b/policy/modules/system/init.if
@@ -420,7 +420,7 @@ interface(`init_ranged_system_domain',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -571,7 +571,7 @@ interface(`init_use_fds',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -730,7 +730,7 @@ interface(`init_dontaudit_rw_initctl',`
##
##
##
-## The domain for which init scripts are an entrypoint.
+## Domain allowed access.
##
##
# cjp: added for gentoo integrated run_init
@@ -748,7 +748,7 @@ interface(`init_script_file_entry_type',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -775,7 +775,7 @@ interface(`init_spec_domtrans_script',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -812,7 +812,7 @@ interface(`init_domtrans_script',`
##
##
##
-## Domain to transition from.
+## Domain allowed to transition.
##
##
##
@@ -837,7 +837,7 @@ interface(`init_script_file_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -862,7 +862,7 @@ interface(`init_labeled_script_domtrans',`
##
##
##
-## Domain allowed access
+## Domain allowed to transition.
##
##
#
@@ -1064,7 +1064,7 @@ interface(`init_read_all_script_files',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -1144,7 +1144,7 @@ interface(`init_use_script_fds',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -1305,7 +1305,7 @@ interface(`init_rw_script_stream_sockets',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -1429,7 +1429,7 @@ interface(`init_getattr_script_status_files',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -1553,7 +1553,7 @@ interface(`init_read_utmp',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -1591,7 +1591,7 @@ interface(`init_write_utmp',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -1628,7 +1628,7 @@ interface(`init_rw_utmp',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -1646,7 +1646,7 @@ interface(`init_dontaudit_rw_utmp',`
##
##
##
-## Domain access allowed.
+## Domain allowed access.
##
##
#
@@ -1666,7 +1666,7 @@ interface(`init_manage_utmp',`
##
##
##
-## Domain access allowed.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/system/ipsec.if b/policy/modules/system/ipsec.if
index dbaf373..8232f91 100644
--- a/policy/modules/system/ipsec.if
+++ b/policy/modules/system/ipsec.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
#
@@ -24,7 +24,7 @@ interface(`ipsec_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -43,7 +43,7 @@ interface(`ipsec_stream_connect',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -62,7 +62,7 @@ interface(`ipsec_stream_connect_racoon',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -80,7 +80,7 @@ interface(`ipsec_getattr_key_sockets',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -98,7 +98,7 @@ interface(`ipsec_exec_mgmt',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
@@ -175,7 +175,7 @@ interface(`ipsec_write_pid',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -194,7 +194,7 @@ interface(`ipsec_manage_pid',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
#
@@ -212,7 +212,7 @@ interface(`ipsec_domtrans_racoon',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -237,7 +237,7 @@ interface(`ipsec_run_racoon',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
#
@@ -255,7 +255,7 @@ interface(`ipsec_domtrans_setkey',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
diff --git a/policy/modules/system/iptables.if b/policy/modules/system/iptables.if
index b8acdd6..5c94dfe 100644
--- a/policy/modules/system/iptables.if
+++ b/policy/modules/system/iptables.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -26,7 +26,7 @@ interface(`iptables_domtrans',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -76,7 +76,7 @@ interface(`iptables_exec',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
#
@@ -134,7 +134,7 @@ interface(`iptables_read_config',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/system/iscsi.if b/policy/modules/system/iscsi.if
index 88e3b32..663a47b 100644
--- a/policy/modules/system/iscsi.if
+++ b/policy/modules/system/iscsi.if
@@ -24,7 +24,7 @@ interface(`iscsid_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/system/kdump.if b/policy/modules/system/kdump.if
index 19e65b8..4198ff5 100644
--- a/policy/modules/system/kdump.if
+++ b/policy/modules/system/kdump.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
#
@@ -25,7 +25,7 @@ interface(`kdump_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/system/libraries.if b/policy/modules/system/libraries.if
index 33ffdb6..d97d16d 100644
--- a/policy/modules/system/libraries.if
+++ b/policy/modules/system/libraries.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -25,7 +25,7 @@ interface(`libs_domtrans_ldconfig',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -201,7 +201,7 @@ interface(`libs_search_lib',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
diff --git a/policy/modules/system/locallogin.if b/policy/modules/system/locallogin.if
index 37292fd..0e3c2a9 100644
--- a/policy/modules/system/locallogin.if
+++ b/policy/modules/system/locallogin.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
#
@@ -28,7 +28,7 @@ interface(`locallogin_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -118,7 +118,7 @@ interface(`locallogin_link_keys',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/system/logging.if b/policy/modules/system/logging.if
index a1d5058..c7cfb62 100644
--- a/policy/modules/system/logging.if
+++ b/policy/modules/system/logging.if
@@ -70,7 +70,7 @@ interface(`logging_send_audit_msgs',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -150,7 +150,7 @@ interface(`logging_read_audit_log',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -169,7 +169,7 @@ interface(`logging_domtrans_auditctl',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -194,7 +194,7 @@ interface(`logging_run_auditctl',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -213,7 +213,7 @@ interface(`logging_domtrans_auditd',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -270,7 +270,7 @@ interface(`logging_domtrans_dispatcher',`
##
##
##
-## Domain allowed to transition.
+## Domain allowed access.
##
##
#
@@ -382,7 +382,7 @@ interface(`logging_manage_audit_log',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -421,7 +421,7 @@ interface(`logging_check_exec_syslog',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -570,7 +570,7 @@ interface(`logging_read_audit_config',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
##
@@ -686,7 +686,7 @@ interface(`logging_rw_generic_log_dirs',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -848,7 +848,7 @@ interface(`logging_write_generic_logs',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
diff --git a/policy/modules/system/lvm.if b/policy/modules/system/lvm.if
index 779cc29..58bc27f 100644
--- a/policy/modules/system/lvm.if
+++ b/policy/modules/system/lvm.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
#
@@ -25,7 +25,7 @@ interface(`lvm_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -44,7 +44,7 @@ interface(`lvm_exec',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
##
@@ -69,7 +69,7 @@ interface(`lvm_run',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
diff --git a/policy/modules/system/miscfiles.if b/policy/modules/system/miscfiles.if
index a70ed72..17de283 100644
--- a/policy/modules/system/miscfiles.if
+++ b/policy/modules/system/miscfiles.if
@@ -115,7 +115,7 @@ interface(`miscfiles_setattr_fonts_dirs',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
##
@@ -134,7 +134,7 @@ interface(`miscfiles_dontaudit_setattr_fonts_dirs',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
##
@@ -198,7 +198,7 @@ interface(`miscfiles_setattr_fonts_cache_dirs',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -374,7 +374,7 @@ interface(`miscfiles_legacy_read_localization',`
##
##
##
-## Domain to not audit.
+## Domain allowed access.
##
##
#
@@ -573,7 +573,7 @@ interface(`miscfiles_exec_tetex_data',`
##
##
##
-## Domain to be entered.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/system/modutils.if b/policy/modules/system/modutils.if
index 5e3e8b9..9c0faab 100644
--- a/policy/modules/system/modutils.if
+++ b/policy/modules/system/modutils.if
@@ -126,7 +126,7 @@ interface(`modutils_manage_module_config',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -147,7 +147,7 @@ interface(`modutils_domtrans_insmod_uncond',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -170,7 +170,7 @@ interface(`modutils_domtrans_insmod',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -214,7 +214,7 @@ interface(`modutils_exec_insmod',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -233,7 +233,7 @@ interface(`modutils_domtrans_depmod',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -277,7 +277,7 @@ interface(`modutils_exec_depmod',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -296,7 +296,7 @@ interface(`modutils_domtrans_update_mods',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
diff --git a/policy/modules/system/mount.if b/policy/modules/system/mount.if
index 2dda55d..8b5c196 100644
--- a/policy/modules/system/mount.if
+++ b/policy/modules/system/mount.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
#
@@ -26,7 +26,7 @@ interface(`mount_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
##
@@ -55,7 +55,7 @@ interface(`mount_run',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -139,7 +139,7 @@ interface(`mount_send_nfs_client_request',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -159,7 +159,7 @@ interface(`mount_domtrans_unconfined',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
diff --git a/policy/modules/system/netlabel.if b/policy/modules/system/netlabel.if
index c0668b6..8cfaa75 100644
--- a/policy/modules/system/netlabel.if
+++ b/policy/modules/system/netlabel.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -26,7 +26,7 @@ interface(`netlabel_domtrans_mgmt',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
diff --git a/policy/modules/system/pcmcia.if b/policy/modules/system/pcmcia.if
index fffe97b..aef445d 100644
--- a/policy/modules/system/pcmcia.if
+++ b/policy/modules/system/pcmcia.if
@@ -22,7 +22,7 @@ interface(`pcmcia_stub',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
#
@@ -58,7 +58,7 @@ interface(`pcmcia_use_cardmgr_fds',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
#
@@ -77,7 +77,7 @@ interface(`pcmcia_domtrans_cardctl',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
##
diff --git a/policy/modules/system/raid.if b/policy/modules/system/raid.if
index b3c7bfb..c817fda 100644
--- a/policy/modules/system/raid.if
+++ b/policy/modules/system/raid.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
#
@@ -33,7 +33,7 @@ interface(`raid_domtrans_mdadm',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/system/selinuxutil.if b/policy/modules/system/selinuxutil.if
index 95772b0..170e2c7 100644
--- a/policy/modules/system/selinuxutil.if
+++ b/policy/modules/system/selinuxutil.if
@@ -6,7 +6,7 @@
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -28,7 +28,7 @@ interface(`seutil_domtrans_checkpolicy',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -74,7 +74,7 @@ interface(`seutil_exec_checkpolicy',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -95,7 +95,7 @@ interface(`seutil_domtrans_loadpolicy',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -158,7 +158,7 @@ interface(`seutil_read_loadpolicy',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -180,7 +180,7 @@ interface(`seutil_domtrans_newrole',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -228,7 +228,7 @@ interface(`seutil_exec_newrole',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -311,7 +311,7 @@ interface(`seutil_dontaudit_use_newrole_fds',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -328,7 +328,7 @@ interface(`seutil_domtrans_restorecon',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -365,7 +365,7 @@ interface(`seutil_exec_restorecon',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -391,7 +391,7 @@ interface(`seutil_domtrans_runinit',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -415,7 +415,7 @@ interface(`seutil_init_script_domtrans_runinit',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -456,7 +456,7 @@ interface(`seutil_run_runinit',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -502,7 +502,7 @@ interface(`seutil_use_runinit_fds',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -524,7 +524,7 @@ interface(`seutil_domtrans_setfiles',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -803,7 +803,7 @@ interface(`seutil_read_file_contexts',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
##
@@ -1015,7 +1015,7 @@ interface(`seutil_domtrans_semanage',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -1141,7 +1141,7 @@ interface(`seutil_libselinux_linked',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
diff --git a/policy/modules/system/setrans.if b/policy/modules/system/setrans.if
index 8de660e..efa9c27 100644
--- a/policy/modules/system/setrans.if
+++ b/policy/modules/system/setrans.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
#
diff --git a/policy/modules/system/sysnetwork.if b/policy/modules/system/sysnetwork.if
index 3c2e445..8e71fb7 100644
--- a/policy/modules/system/sysnetwork.if
+++ b/policy/modules/system/sysnetwork.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
#
@@ -26,7 +26,7 @@ interface(`sysnet_domtrans_dhcpc',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
##
@@ -69,7 +69,7 @@ interface(`sysnet_run_dhcpc',`
##
##
##
-## The domain sending the SIGCHLD.
+## Domain to not audit.
##
##
#
@@ -87,7 +87,7 @@ interface(`sysnet_dontaudit_use_dhcpc_fds',`
##
##
##
-## The domain sending the SIGCHLD.
+## Domain allowed access.
##
##
#
@@ -105,7 +105,7 @@ interface(`sysnet_sigchld_dhcpc',`
##
##
##
-## The domain sending the SIGKILL.
+## Domain allowed access.
##
##
##
@@ -124,7 +124,7 @@ interface(`sysnet_kill_dhcpc',`
##
##
##
-## The domain sending the SIGSTOP.
+## Domain allowed access.
##
##
#
@@ -142,7 +142,7 @@ interface(`sysnet_sigstop_dhcpc',`
##
##
##
-## The domain sending the null signal.
+## Domain allowed access.
##
##
#
@@ -160,7 +160,7 @@ interface(`sysnet_signull_dhcpc',`
##
##
##
-## The domain sending the signal.
+## Domain allowed access.
##
##
##
@@ -200,7 +200,7 @@ interface(`sysnet_dbus_chat_dhcpc',`
##
##
##
-## The domain allowed access.
+## Domain allowed access.
##
##
#
@@ -219,7 +219,7 @@ interface(`sysnet_rw_dhcp_config',`
##
##
##
-## The domain allowed access.
+## Domain allowed access.
##
##
#
@@ -376,7 +376,7 @@ interface(`sysnet_create_config',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -394,7 +394,7 @@ interface(`sysnet_etc_filetrans_config',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -416,7 +416,7 @@ interface(`sysnet_manage_config',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -435,7 +435,7 @@ interface(`sysnet_read_dhcpc_pid',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -453,7 +453,7 @@ interface(`sysnet_delete_dhcpc_pid',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
#
@@ -474,7 +474,7 @@ interface(`sysnet_domtrans_ifconfig',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
##
diff --git a/policy/modules/system/udev.if b/policy/modules/system/udev.if
index bfc4c75..025348a 100644
--- a/policy/modules/system/udev.if
+++ b/policy/modules/system/udev.if
@@ -24,7 +24,7 @@ interface(`udev_signal',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
#
@@ -60,7 +60,7 @@ interface(`udev_exec',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
#
@@ -199,7 +199,7 @@ interface(`udev_read_db',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/system/unconfined.if b/policy/modules/system/unconfined.if
index c11cb30..416e668 100644
--- a/policy/modules/system/unconfined.if
+++ b/policy/modules/system/unconfined.if
@@ -185,7 +185,7 @@ interface(`unconfined_execmem_alias_program',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -203,7 +203,7 @@ interface(`unconfined_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed to transition.
##
##
##
@@ -227,7 +227,7 @@ interface(`unconfined_run',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -413,7 +413,7 @@ interface(`unconfined_read_pipes',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
index 4a50357..8b4f6d8 100644
--- a/policy/modules/system/userdomain.if
+++ b/policy/modules/system/userdomain.if
@@ -1356,7 +1356,7 @@ interface(`userdom_getattr_user_home_dirs',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -1543,7 +1543,7 @@ interface(`userdom_home_filetrans_user_home_dir',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
##
@@ -1643,7 +1643,7 @@ interface(`userdom_delete_user_home_content_dirs',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -1837,7 +1837,7 @@ interface(`userdom_exec_user_home_content_files',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -1877,7 +1877,7 @@ interface(`userdom_manage_user_home_content_files',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -2493,7 +2493,7 @@ interface(`userdom_getattr_user_ttys',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -2529,7 +2529,7 @@ interface(`userdom_setattr_user_ttys',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -2620,7 +2620,7 @@ interface(`userdom_use_user_terminals',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -2641,7 +2641,7 @@ interface(`userdom_dontaudit_use_user_terminals',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -2664,7 +2664,7 @@ interface(`userdom_spec_domtrans_all_users',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -2687,7 +2687,7 @@ interface(`userdom_xsession_spec_domtrans_all_users',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -2710,7 +2710,7 @@ interface(`userdom_spec_domtrans_unpriv_users',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -2770,7 +2770,7 @@ interface(`userdom_manage_unpriv_user_shared_mem',`
##
##
##
-## Domain allowed access.
+## Domain allowed to transition.
##
##
#
@@ -2934,7 +2934,7 @@ interface(`userdom_relabelto_user_ptys',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
@@ -2970,7 +2970,7 @@ interface(`userdom_write_user_tmp_files',`
##
##
##
-## Domain allowed access.
+## Domain to not audit.
##
##
#
diff --git a/policy/modules/system/xen.if b/policy/modules/system/xen.if
index 086e8c6..77d41b6 100644
--- a/policy/modules/system/xen.if
+++ b/policy/modules/system/xen.if
@@ -24,7 +24,7 @@ interface(`xen_domtrans',`
##
##
##
-## Domain to not audit.
+## Domain allowed access.
##
##
#
@@ -83,7 +83,7 @@ interface(`xen_read_image_files',`
##
##
##
-## Domain allowed to transition.
+## Domain allowed access.
##
##
#
@@ -104,7 +104,7 @@ interface(`xen_rw_image_files',`
##
##
##
-## Domain allowed to transition.
+## Domain allowed access.
##
##
#