diff --git a/policy/modules/admin/acct.if b/policy/modules/admin/acct.if
index 9409a02..d73c515 100644
--- a/policy/modules/admin/acct.if
+++ b/policy/modules/admin/acct.if
@@ -25,7 +25,7 @@ interface(`acct_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -44,7 +44,7 @@ interface(`acct_exec',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -65,7 +65,7 @@ interface(`acct_exec_data',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/admin/amanda.if b/policy/modules/admin/amanda.if
index dab38fb..d99f058 100644
--- a/policy/modules/admin/amanda.if
+++ b/policy/modules/admin/amanda.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -25,7 +25,7 @@ interface(`amanda_domtrans_recover',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
@@ -50,7 +50,7 @@ interface(`amanda_run_recover',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -105,7 +105,7 @@ interface(`amanda_rw_dumpdates_files',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -142,7 +142,7 @@ interface(`amanda_append_log_files',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/admin/apt.if b/policy/modules/admin/apt.if
index dfe34fe..84668f1 100644
--- a/policy/modules/admin/apt.if
+++ b/policy/modules/admin/apt.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -26,7 +26,7 @@ interface(`apt_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
@@ -52,7 +52,7 @@ interface(`apt_run',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -90,7 +90,7 @@ interface(`apt_dontaudit_use_fds',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -109,7 +109,7 @@ interface(`apt_read_pipes',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -146,7 +146,7 @@ interface(`apt_use_ptys',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -167,7 +167,7 @@ interface(`apt_read_cache',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -188,7 +188,7 @@ interface(`apt_read_db',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/admin/backup.if b/policy/modules/admin/backup.if
index 29ed36e..c0b4205 100644
--- a/policy/modules/admin/backup.if
+++ b/policy/modules/admin/backup.if
@@ -25,7 +25,7 @@ interface(`backup_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
diff --git a/policy/modules/admin/bootloader.if b/policy/modules/admin/bootloader.if
index 0106920..da8b00b 100644
--- a/policy/modules/admin/bootloader.if
+++ b/policy/modules/admin/bootloader.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -25,7 +25,7 @@ interface(`bootloader_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
@@ -56,7 +56,7 @@ interface(`bootloader_run',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -75,7 +75,7 @@ interface(`bootloader_read_config',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
@@ -95,7 +95,7 @@ interface(`bootloader_rw_config',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -115,7 +115,7 @@ interface(`bootloader_rw_tmp_files',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/admin/certwatch.if b/policy/modules/admin/certwatch.if
index 1cbd014..3f45dfe 100644
--- a/policy/modules/admin/certwatch.if
+++ b/policy/modules/admin/certwatch.if
@@ -29,7 +29,7 @@ interface(`certwatch_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
@@ -57,7 +57,7 @@ interface(`certwatch_run',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
diff --git a/policy/modules/admin/consoletype.if b/policy/modules/admin/consoletype.if
index 52d7a7e..daa6eb3 100644
--- a/policy/modules/admin/consoletype.if
+++ b/policy/modules/admin/consoletype.if
@@ -8,7 +8,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -32,7 +32,7 @@ interface(`consoletype_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
@@ -56,7 +56,7 @@ interface(`consoletype_run',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
diff --git a/policy/modules/admin/ddcprobe.if b/policy/modules/admin/ddcprobe.if
index 898f54e..1a43194 100644
--- a/policy/modules/admin/ddcprobe.if
+++ b/policy/modules/admin/ddcprobe.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -25,7 +25,7 @@ interface(`ddcprobe_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
diff --git a/policy/modules/admin/dmesg.if b/policy/modules/admin/dmesg.if
index ba622b6..4035397 100644
--- a/policy/modules/admin/dmesg.if
+++ b/policy/modules/admin/dmesg.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -25,7 +25,7 @@ interface(`dmesg_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
diff --git a/policy/modules/admin/dmidecode.if b/policy/modules/admin/dmidecode.if
index 233e6d4..331ff4c 100644
--- a/policy/modules/admin/dmidecode.if
+++ b/policy/modules/admin/dmidecode.if
@@ -30,7 +30,7 @@ interface(`dmidecode_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
diff --git a/policy/modules/admin/dpkg.if b/policy/modules/admin/dpkg.if
index c9a03ff..633495b 100644
--- a/policy/modules/admin/dpkg.if
+++ b/policy/modules/admin/dpkg.if
@@ -8,7 +8,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -50,7 +50,7 @@ interface(`dpkg_domtrans_script',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
@@ -77,7 +77,7 @@ interface(`dpkg_run',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -95,7 +95,7 @@ interface(`dpkg_use_fds',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -113,7 +113,7 @@ interface(`dpkg_read_pipes',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -131,7 +131,7 @@ interface(`dpkg_rw_pipes',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -149,7 +149,7 @@ interface(`dpkg_use_script_fds',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -170,7 +170,7 @@ interface(`dpkg_read_db',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -211,7 +211,7 @@ interface(`dpkg_dontaudit_manage_db',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/admin/firstboot.if b/policy/modules/admin/firstboot.if
index 00415af..83512c9 100644
--- a/policy/modules/admin/firstboot.if
+++ b/policy/modules/admin/firstboot.if
@@ -9,7 +9,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -28,7 +28,7 @@ interface(`firstboot_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
@@ -52,7 +52,7 @@ interface(`firstboot_run',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -89,7 +89,7 @@ interface(`firstboot_dontaudit_use_fds',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -107,7 +107,7 @@ interface(`firstboot_write_pipes',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/admin/kudzu.if b/policy/modules/admin/kudzu.if
index 11c6f9e..1aeff55 100644
--- a/policy/modules/admin/kudzu.if
+++ b/policy/modules/admin/kudzu.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -25,7 +25,7 @@ interface(`kudzu_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
@@ -50,7 +50,7 @@ interface(`kudzu_run',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/admin/logrotate.if b/policy/modules/admin/logrotate.if
index f9af0e1..b3aa19e 100644
--- a/policy/modules/admin/logrotate.if
+++ b/policy/modules/admin/logrotate.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -25,7 +25,7 @@ interface(`logrotate_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
@@ -50,7 +50,7 @@ interface(`logrotate_run',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -86,7 +86,7 @@ interface(`logrotate_use_fds',`
##
##
##
-## The type of the process to not audit.
+## Domain to not audit
##
##
#
@@ -104,7 +104,7 @@ interface(`logrotate_dontaudit_use_fds',`
##
##
##
-## The type of the process to not audit.
+## Domain to not audit
##
##
#
diff --git a/policy/modules/admin/quota.if b/policy/modules/admin/quota.if
index 50ff52e..d50f2f5 100644
--- a/policy/modules/admin/quota.if
+++ b/policy/modules/admin/quota.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -25,7 +25,7 @@ interface(`quota_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
diff --git a/policy/modules/admin/rpm.if b/policy/modules/admin/rpm.if
index 44624fe..2514ed5 100644
--- a/policy/modules/admin/rpm.if
+++ b/policy/modules/admin/rpm.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -69,7 +69,7 @@ interface(`rpm_domtrans_script',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
@@ -135,7 +135,7 @@ interface(`rpm_signull',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -153,7 +153,7 @@ interface(`rpm_use_fds',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -171,7 +171,7 @@ interface(`rpm_read_pipes',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -252,7 +252,7 @@ interface(`rpm_script_dbus_chat',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -290,7 +290,7 @@ interface(`rpm_append_log',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -309,7 +309,7 @@ interface(`rpm_manage_log',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -448,7 +448,7 @@ interface(`rpm_manage_cache',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -487,7 +487,7 @@ interface(`rpm_delete_db',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/admin/tmpreaper.if b/policy/modules/admin/tmpreaper.if
index cf65849..8dfbd80 100644
--- a/policy/modules/admin/tmpreaper.if
+++ b/policy/modules/admin/tmpreaper.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/admin/updfstab.if b/policy/modules/admin/updfstab.if
index d98bb72..6a4f564 100644
--- a/policy/modules/admin/updfstab.if
+++ b/policy/modules/admin/updfstab.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/admin/usbmodules.if b/policy/modules/admin/usbmodules.if
index 9ac17f5..d673f10 100644
--- a/policy/modules/admin/usbmodules.if
+++ b/policy/modules/admin/usbmodules.if
@@ -26,7 +26,7 @@ interface(`usbmodules_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
diff --git a/policy/modules/admin/usermanage.if b/policy/modules/admin/usermanage.if
index 3a87501..8702699 100644
--- a/policy/modules/admin/usermanage.if
+++ b/policy/modules/admin/usermanage.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -31,7 +31,7 @@ interface(`usermanage_domtrans_chfn',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
@@ -55,7 +55,7 @@ interface(`usermanage_run_chfn',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -80,7 +80,7 @@ interface(`usermanage_domtrans_groupadd',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
@@ -109,7 +109,7 @@ interface(`usermanage_run_groupadd',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -152,7 +152,7 @@ interface(`usermanage_kill_passwd',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
@@ -200,7 +200,7 @@ interface(`usermanage_domtrans_admin_passwd',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
@@ -229,7 +229,7 @@ interface(`usermanage_run_admin_passwd',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -247,7 +247,7 @@ interface(`usermanage_dontaudit_use_useradd_fds',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -272,7 +272,7 @@ interface(`usermanage_domtrans_useradd',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
@@ -303,7 +303,7 @@ interface(`usermanage_run_useradd',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/apps/java.if b/policy/modules/apps/java.if
index fe12554..9bb8f31 100644
--- a/policy/modules/apps/java.if
+++ b/policy/modules/apps/java.if
@@ -120,7 +120,7 @@ template(`java_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
diff --git a/policy/modules/apps/loadkeys.if b/policy/modules/apps/loadkeys.if
index 215a7d3..c3beba5 100644
--- a/policy/modules/apps/loadkeys.if
+++ b/policy/modules/apps/loadkeys.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -29,7 +29,7 @@ interface(`loadkeys_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
@@ -54,7 +54,7 @@ interface(`loadkeys_run',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/apps/mono.if b/policy/modules/apps/mono.if
index f694843..a6af322 100644
--- a/policy/modules/apps/mono.if
+++ b/policy/modules/apps/mono.if
@@ -82,7 +82,7 @@ interface(`mono_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
@@ -125,7 +125,7 @@ interface(`mono_exec',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/apps/userhelper.if b/policy/modules/apps/userhelper.if
index 8df0db4..ced285a 100644
--- a/policy/modules/apps/userhelper.if
+++ b/policy/modules/apps/userhelper.if
@@ -245,7 +245,7 @@ interface(`userhelper_sigchld',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/apps/webalizer.if b/policy/modules/apps/webalizer.if
index 1d25688..dac920d 100644
--- a/policy/modules/apps/webalizer.if
+++ b/policy/modules/apps/webalizer.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -25,7 +25,7 @@ interface(`webalizer_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
diff --git a/policy/modules/apps/wine.if b/policy/modules/apps/wine.if
index 6db15ad..f5217b8 100644
--- a/policy/modules/apps/wine.if
+++ b/policy/modules/apps/wine.if
@@ -136,7 +136,7 @@ interface(`wine_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
diff --git a/policy/modules/kernel/corenetwork.if.in b/policy/modules/kernel/corenetwork.if.in
index a6a115d..bda5e34 100644
--- a/policy/modules/kernel/corenetwork.if.in
+++ b/policy/modules/kernel/corenetwork.if.in
@@ -190,7 +190,7 @@ interface(`corenet_tcp_sendrecv_generic_if',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -227,7 +227,7 @@ interface(`corenet_dontaudit_udp_send_generic_if',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -321,7 +321,7 @@ interface(`corenet_dontaudit_udp_sendrecv_generic_if',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -339,7 +339,7 @@ interface(`corenet_raw_send_generic_if',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -357,7 +357,7 @@ interface(`corenet_raw_receive_generic_if',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -426,7 +426,7 @@ interface(`corenet_inout_generic_if',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -444,7 +444,7 @@ interface(`corenet_tcp_sendrecv_all_if',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -462,7 +462,7 @@ interface(`corenet_udp_send_all_if',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -480,7 +480,7 @@ interface(`corenet_udp_receive_all_if',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -495,7 +495,7 @@ interface(`corenet_udp_sendrecv_all_if',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -513,7 +513,7 @@ interface(`corenet_raw_send_all_if',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -531,7 +531,7 @@ interface(`corenet_raw_receive_all_if',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -592,7 +592,7 @@ interface(`corenet_tcp_sendrecv_generic_node',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -610,7 +610,7 @@ interface(`corenet_udp_send_generic_node',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -669,7 +669,7 @@ interface(`corenet_udp_sendrecv_generic_node',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -687,7 +687,7 @@ interface(`corenet_raw_send_generic_node',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -705,7 +705,7 @@ interface(`corenet_raw_receive_generic_node',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -786,7 +786,7 @@ interface(`corenet_udp_bind_generic_node',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
# rawip_socket node_bind does not make much sense.
@@ -859,7 +859,7 @@ interface(`corenet_inout_generic_node',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -877,7 +877,7 @@ interface(`corenet_tcp_sendrecv_all_nodes',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -914,7 +914,7 @@ interface(`corenet_dontaudit_udp_send_all_nodes',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -951,7 +951,7 @@ interface(`corenet_dontaudit_udp_receive_all_nodes',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -982,7 +982,7 @@ interface(`corenet_dontaudit_udp_sendrecv_all_nodes',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1000,7 +1000,7 @@ interface(`corenet_raw_send_all_nodes',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1018,7 +1018,7 @@ interface(`corenet_raw_receive_all_nodes',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1033,7 +1033,7 @@ interface(`corenet_raw_sendrecv_all_nodes',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1051,7 +1051,7 @@ interface(`corenet_tcp_bind_all_nodes',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1069,7 +1069,7 @@ interface(`corenet_udp_bind_all_nodes',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
# rawip_socket node_bind does not make much sense.
@@ -1088,7 +1088,7 @@ interface(`corenet_raw_bind_all_nodes',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1106,7 +1106,7 @@ interface(`corenet_tcp_sendrecv_generic_port',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1124,7 +1124,7 @@ interface(`corenet_dontaudit_tcp_sendrecv_generic_port',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1142,7 +1142,7 @@ interface(`corenet_udp_send_generic_port',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1160,7 +1160,7 @@ interface(`corenet_udp_receive_generic_port',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1175,7 +1175,7 @@ interface(`corenet_udp_sendrecv_generic_port',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1213,7 +1213,7 @@ interface(`corenet_dontaudit_tcp_bind_generic_port',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1233,7 +1233,7 @@ interface(`corenet_udp_bind_generic_port',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1295,7 +1295,7 @@ interface(`corenet_tcp_sendrecv_all_ports',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1313,7 +1313,7 @@ interface(`corenet_udp_send_all_ports',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1370,7 +1370,7 @@ interface(`corenet_udp_sendrecv_all_ports',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1407,7 +1407,7 @@ interface(`corenet_dontaudit_tcp_bind_all_ports',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1509,7 +1509,7 @@ interface(`corenet_dontaudit_tcp_connect_all_ports',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1527,7 +1527,7 @@ interface(`corenet_tcp_sendrecv_reserved_port',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1545,7 +1545,7 @@ interface(`corenet_udp_send_reserved_port',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1563,7 +1563,7 @@ interface(`corenet_udp_receive_reserved_port',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1578,7 +1578,7 @@ interface(`corenet_udp_sendrecv_reserved_port',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1597,7 +1597,7 @@ interface(`corenet_tcp_bind_reserved_port',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1616,7 +1616,7 @@ interface(`corenet_udp_bind_reserved_port',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1634,7 +1634,7 @@ interface(`corenet_tcp_connect_reserved_port',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1652,7 +1652,7 @@ interface(`corenet_tcp_sendrecv_all_reserved_ports',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1670,7 +1670,7 @@ interface(`corenet_udp_send_all_reserved_ports',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1688,7 +1688,7 @@ interface(`corenet_udp_receive_all_reserved_ports',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1703,7 +1703,7 @@ interface(`corenet_udp_sendrecv_all_reserved_ports',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1722,7 +1722,7 @@ interface(`corenet_tcp_bind_all_reserved_ports',`
##
##
##
-## The type of the process to not audit.
+## Domain to not audit
##
##
#
@@ -1740,7 +1740,7 @@ interface(`corenet_dontaudit_tcp_bind_all_reserved_ports',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1759,7 +1759,7 @@ interface(`corenet_udp_bind_all_reserved_ports',`
##
##
##
-## The type of the process to not audit.
+## Domain to not audit
##
##
#
@@ -1777,7 +1777,7 @@ interface(`corenet_dontaudit_udp_bind_all_reserved_ports',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1795,7 +1795,7 @@ interface(`corenet_tcp_bind_all_unreserved_ports',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1813,7 +1813,7 @@ interface(`corenet_udp_bind_all_unreserved_ports',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1831,7 +1831,7 @@ interface(`corenet_tcp_connect_all_reserved_ports',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1868,7 +1868,7 @@ interface(`corenet_dontaudit_tcp_connect_all_reserved_ports',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1980,7 +1980,7 @@ interface(`corenet_rw_ppp_dev',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -1999,7 +1999,7 @@ interface(`corenet_tcp_bind_all_rpc_ports',`
##
##
##
-## The type of the process to not audit.
+## Domain to not audit
##
##
#
@@ -2017,7 +2017,7 @@ interface(`corenet_dontaudit_tcp_bind_all_rpc_ports',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -2036,7 +2036,7 @@ interface(`corenet_udp_bind_all_rpc_ports',`
##
##
##
-## The type of the process to not audit.
+## Domain to not audit
##
##
#
diff --git a/policy/modules/kernel/devices.if b/policy/modules/kernel/devices.if
index b0d558e..f13a505 100644
--- a/policy/modules/kernel/devices.if
+++ b/policy/modules/kernel/devices.if
@@ -3544,7 +3544,7 @@ interface(`dev_manage_smartcard',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -3562,7 +3562,7 @@ interface(`dev_getattr_sysfs_dirs',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -3580,7 +3580,7 @@ interface(`dev_search_sysfs',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -3598,7 +3598,7 @@ interface(`dev_dontaudit_search_sysfs',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -3616,7 +3616,7 @@ interface(`dev_list_sysfs',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -3855,7 +3855,7 @@ interface(`dev_read_usbmon_dev',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -3928,7 +3928,7 @@ interface(`dev_dontaudit_getattr_usbfs_dirs',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -3987,7 +3987,7 @@ interface(`dev_setattr_usbfs_files',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if
index 425d176..28cb589 100644
--- a/policy/modules/kernel/files.if
+++ b/policy/modules/kernel/files.if
@@ -3882,7 +3882,7 @@ interface(`files_read_generic_tmp_files',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -3900,7 +3900,7 @@ interface(`files_manage_generic_tmp_dirs',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/kernel/kernel.if b/policy/modules/kernel/kernel.if
index 814da80..547fcf4 100644
--- a/policy/modules/kernel/kernel.if
+++ b/policy/modules/kernel/kernel.if
@@ -222,7 +222,7 @@ interface(`kernel_use_fds',`
##
##
##
-## The type of process not to audit.
+## Domain to not audit
##
##
#
diff --git a/policy/modules/kernel/storage.if b/policy/modules/kernel/storage.if
index bb0effd..7b8a19c 100644
--- a/policy/modules/kernel/storage.if
+++ b/policy/modules/kernel/storage.if
@@ -7,7 +7,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -27,7 +27,7 @@ interface(`storage_getattr_fixed_disk_dev',`
##
##
##
-## The type of the process to not audit.
+## Domain to not audit
##
##
#
@@ -47,7 +47,7 @@ interface(`storage_dontaudit_getattr_fixed_disk_dev',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -67,7 +67,7 @@ interface(`storage_setattr_fixed_disk_dev',`
##
##
##
-## The type of the process to not audit.
+## Domain to not audit
##
##
#
@@ -88,7 +88,7 @@ interface(`storage_dontaudit_setattr_fixed_disk_dev',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -111,7 +111,7 @@ interface(`storage_raw_read_fixed_disk',`
##
##
##
-## The type of the process to not audit.
+## Domain to not audit
##
##
#
@@ -134,7 +134,7 @@ interface(`storage_dontaudit_read_fixed_disk',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -232,7 +232,7 @@ interface(`storage_delete_fixed_disk_dev',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -256,7 +256,7 @@ interface(`storage_manage_fixed_disk',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -275,7 +275,7 @@ interface(`storage_dev_filetrans_fixed_disk',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -293,7 +293,7 @@ interface(`storage_tmpfs_filetrans_fixed_disk',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -312,7 +312,7 @@ interface(`storage_relabel_fixed_disk',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -332,7 +332,7 @@ interface(`storage_swapon_fixed_disk',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -389,7 +389,7 @@ interface(`storage_dontaudit_rw_fuse',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -409,7 +409,7 @@ interface(`storage_getattr_scsi_generic_dev',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -432,7 +432,7 @@ interface(`storage_setattr_scsi_generic_dev',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -457,7 +457,7 @@ interface(`storage_read_scsi_generic',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -479,7 +479,7 @@ interface(`storage_write_scsi_generic',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -518,7 +518,7 @@ interface(`storage_dontaudit_rw_scsi_generic',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -538,7 +538,7 @@ interface(`storage_getattr_removable_dev',`
##
##
##
-## The type of the process to not audit.
+## Domain to not audit
##
##
#
@@ -557,7 +557,7 @@ interface(`storage_dontaudit_getattr_removable_dev',`
##
##
##
-## The type of the process to not audit.
+## Domain to not audit
##
##
#
@@ -577,7 +577,7 @@ interface(`storage_dontaudit_read_removable_device',`
##
##
##
-## The type of the process to not audit.
+## Domain to not audit
##
##
#
@@ -596,7 +596,7 @@ interface(`storage_dontaudit_write_removable_device',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -616,7 +616,7 @@ interface(`storage_setattr_removable_dev',`
##
##
##
-## The type of the process to not audit.
+## Domain to not audit
##
##
#
@@ -638,7 +638,7 @@ interface(`storage_dontaudit_setattr_removable_dev',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -679,7 +679,7 @@ interface(`storage_dontaudit_raw_read_removable_device',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -717,7 +717,7 @@ interface(`storage_dontaudit_raw_write_removable_device',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -737,7 +737,7 @@ interface(`storage_read_tape',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -757,7 +757,7 @@ interface(`storage_write_tape',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -777,7 +777,7 @@ interface(`storage_getattr_tape_dev',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/kernel/terminal.if b/policy/modules/kernel/terminal.if
index a905c0a..f623b72 100644
--- a/policy/modules/kernel/terminal.if
+++ b/policy/modules/kernel/terminal.if
@@ -382,7 +382,7 @@ interface(`term_getattr_pty_fs',`
##
##
##
-## The type of the process to not audit.
+## Domain to not audit
##
##
#
@@ -460,7 +460,7 @@ interface(`term_list_ptys',`
##
##
##
-## The type of the process to not audit.
+## Domain to not audit
##
##
#
@@ -479,7 +479,7 @@ interface(`term_dontaudit_list_ptys',`
##
##
##
-## The type of the process to not audit.
+## Domain to not audit
##
##
#
@@ -498,7 +498,7 @@ interface(`term_dontaudit_manage_pty_dirs',`
##
##
##
-## The type of the process to not audit.
+## Domain to not audit
##
##
#
@@ -600,7 +600,7 @@ interface(`term_use_generic_ptys',`
##
##
##
-## The type of the process to not audit.
+## Domain to not audit
##
##
#
@@ -696,7 +696,7 @@ interface(`term_use_ptmx',`
##
##
##
-## The type of the process to not audit.
+## Domain to not audit
##
##
#
@@ -975,7 +975,7 @@ interface(`term_use_all_user_ptys',`
##
##
##
-## The type of the process to not audit.
+## Domain to not audit
##
##
#
@@ -1206,7 +1206,7 @@ interface(`term_use_unallocated_ttys',`
##
##
##
-## The type of the process to not audit.
+## Domain to not audit
##
##
#
diff --git a/policy/modules/services/abrt.if b/policy/modules/services/abrt.if
index b0b7d0f..1adfe2f 100644
--- a/policy/modules/services/abrt.if
+++ b/policy/modules/services/abrt.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -25,7 +25,7 @@ interface(`abrt_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/afs.if b/policy/modules/services/afs.if
index 28ad29c..ada201c 100644
--- a/policy/modules/services/afs.if
+++ b/policy/modules/services/afs.if
@@ -63,7 +63,7 @@ interface(`afs_rw_cache',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/apm.if b/policy/modules/services/apm.if
index 3e8778e..77d31b9 100644
--- a/policy/modules/services/apm.if
+++ b/policy/modules/services/apm.if
@@ -25,7 +25,7 @@ interface(`apm_domtrans_client',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -43,7 +43,7 @@ interface(`apm_use_fds',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/automount.if b/policy/modules/services/automount.if
index 4ff1bdf..904f700 100644
--- a/policy/modules/services/automount.if
+++ b/policy/modules/services/automount.if
@@ -25,7 +25,7 @@ interface(`automount_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/avahi.if b/policy/modules/services/avahi.if
index a8ecaf3..a5e598e 100644
--- a/policy/modules/services/avahi.if
+++ b/policy/modules/services/avahi.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -25,7 +25,7 @@ interface(`avahi_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/bluetooth.if b/policy/modules/services/bluetooth.if
index fb7b782..fa38f57 100644
--- a/policy/modules/services/bluetooth.if
+++ b/policy/modules/services/bluetooth.if
@@ -64,7 +64,7 @@ interface(`bluetooth_stream_connect',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -121,7 +121,7 @@ interface(`bluetooth_dbus_chat',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -136,7 +136,7 @@ interface(`bluetooth_domtrans_helper',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
diff --git a/policy/modules/services/certmonger.if b/policy/modules/services/certmonger.if
index 4881860..95a9290 100644
--- a/policy/modules/services/certmonger.if
+++ b/policy/modules/services/certmonger.if
@@ -45,7 +45,7 @@ interface(`certmonger_dbus_chat',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/cobbler.if b/policy/modules/services/cobbler.if
index 828a001..9f7dd57 100644
--- a/policy/modules/services/cobbler.if
+++ b/policy/modules/services/cobbler.if
@@ -34,7 +34,7 @@ interface(`cobblerd_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/cron.if b/policy/modules/services/cron.if
index 44caccc..06ff274 100644
--- a/policy/modules/services/cron.if
+++ b/policy/modules/services/cron.if
@@ -308,7 +308,7 @@ interface(`cron_exec',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/cups.if b/policy/modules/services/cups.if
index 24d60a2..9a751a1 100644
--- a/policy/modules/services/cups.if
+++ b/policy/modules/services/cups.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -33,7 +33,7 @@ interface(`cups_backend',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -124,7 +124,7 @@ interface(`cups_read_pid_files',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/denyhosts.if b/policy/modules/services/denyhosts.if
index a8cb6eb..de7e074 100644
--- a/policy/modules/services/denyhosts.if
+++ b/policy/modules/services/denyhosts.if
@@ -32,7 +32,7 @@ interface(`denyhosts_domtrans', `
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/dhcp.if b/policy/modules/services/dhcp.if
index 8e4d1be..0d9f10c 100644
--- a/policy/modules/services/dhcp.if
+++ b/policy/modules/services/dhcp.if
@@ -45,7 +45,7 @@ interface(`dhcpd_setattr_state_files',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/dnsmasq.if b/policy/modules/services/dnsmasq.if
index a5c426b..a4840a7 100644
--- a/policy/modules/services/dnsmasq.if
+++ b/policy/modules/services/dnsmasq.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -45,7 +45,7 @@ interface(`dnsmasq_initrc_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/finger.if b/policy/modules/services/finger.if
index c8d9798..cda687c 100644
--- a/policy/modules/services/finger.if
+++ b/policy/modules/services/finger.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/inetd.if b/policy/modules/services/inetd.if
index 40eeebe..59d9778 100644
--- a/policy/modules/services/inetd.if
+++ b/policy/modules/services/inetd.if
@@ -178,7 +178,7 @@ interface(`inetd_domtrans_child',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -192,7 +192,7 @@ interface(`inetd_udp_send',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/lircd.if b/policy/modules/services/lircd.if
index d394f17..418cc81 100644
--- a/policy/modules/services/lircd.if
+++ b/policy/modules/services/lircd.if
@@ -45,7 +45,7 @@ interface(`lircd_stream_connect',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/nis.if b/policy/modules/services/nis.if
index 724fd98..b9e7d40 100644
--- a/policy/modules/services/nis.if
+++ b/policy/modules/services/nis.if
@@ -19,7 +19,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/nscd.if b/policy/modules/services/nscd.if
index beed4c5..429bd9f 100644
--- a/policy/modules/services/nscd.if
+++ b/policy/modules/services/nscd.if
@@ -60,7 +60,7 @@ interface(`nscd_signull',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/nslcd.if b/policy/modules/services/nslcd.if
index 3563980..01d6be9 100644
--- a/policy/modules/services/nslcd.if
+++ b/policy/modules/services/nslcd.if
@@ -24,7 +24,7 @@ interface(`nslcd_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/ntp.if b/policy/modules/services/ntp.if
index a09a9ae..c42c7ab 100644
--- a/policy/modules/services/ntp.if
+++ b/policy/modules/services/ntp.if
@@ -22,7 +22,7 @@ interface(`ntp_stub',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -67,7 +67,7 @@ interface(`ntp_run',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -86,7 +86,7 @@ interface(`ntp_domtrans_ntpdate',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -104,7 +104,7 @@ interface(`ntp_initrc_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/perdition.if b/policy/modules/services/perdition.if
index e7891a8..2b0bd64 100644
--- a/policy/modules/services/perdition.if
+++ b/policy/modules/services/perdition.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/portmap.if b/policy/modules/services/portmap.if
index 19d9f8a..9901e89 100644
--- a/policy/modules/services/portmap.if
+++ b/policy/modules/services/portmap.if
@@ -52,7 +52,7 @@ interface(`portmap_run_helper',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -80,7 +80,7 @@ interface(`portmap_udp_chat',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/postgresql.if b/policy/modules/services/postgresql.if
index 28d6d68..394031b 100644
--- a/policy/modules/services/postgresql.if
+++ b/policy/modules/services/postgresql.if
@@ -223,7 +223,7 @@ interface(`postgresql_manage_db',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/ppp.if b/policy/modules/services/ppp.if
index 3657795..4789268 100644
--- a/policy/modules/services/ppp.if
+++ b/policy/modules/services/ppp.if
@@ -326,7 +326,7 @@ interface(`ppp_pid_filetrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/remotelogin.if b/policy/modules/services/remotelogin.if
index 6ff8060..114f2c2 100644
--- a/policy/modules/services/remotelogin.if
+++ b/policy/modules/services/remotelogin.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -24,7 +24,7 @@ interface(`remotelogin_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/rhgb.if b/policy/modules/services/rhgb.if
index d7d282a..46681c8 100644
--- a/policy/modules/services/rhgb.if
+++ b/policy/modules/services/rhgb.if
@@ -22,7 +22,7 @@ interface(`rhgb_stub',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -76,7 +76,7 @@ interface(`rhgb_signal',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -95,7 +95,7 @@ interface(`rhgb_rw_stream_sockets',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -113,7 +113,7 @@ interface(`rhgb_dontaudit_rw_stream_sockets',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -131,7 +131,7 @@ interface(`rhgb_stream_connect',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -185,7 +185,7 @@ interface(`rhgb_dontaudit_use_ptys',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/ricci.if b/policy/modules/services/ricci.if
index c291ce3..700467c 100644
--- a/policy/modules/services/ricci.if
+++ b/policy/modules/services/ricci.if
@@ -43,7 +43,7 @@ interface(`ricci_domtrans_modcluster',`
##
##
##
-## The type of process not to audit.
+## Domain to not audit
##
##
#
@@ -62,7 +62,7 @@ interface(`ricci_dontaudit_use_modcluster_fds',`
##
##
##
-## The type of process not to audit.
+## Domain to not audit
##
##
#
diff --git a/policy/modules/services/rlogin.if b/policy/modules/services/rlogin.if
index 0e272a4..ba3364d 100644
--- a/policy/modules/services/rlogin.if
+++ b/policy/modules/services/rlogin.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/rpc.if b/policy/modules/services/rpc.if
index 7b82ea3..005f516 100644
--- a/policy/modules/services/rpc.if
+++ b/policy/modules/services/rpc.if
@@ -128,7 +128,7 @@ template(`rpc_domain_template', `
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -143,7 +143,7 @@ interface(`rpc_udp_send',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -161,7 +161,7 @@ interface(`rpc_dontaudit_getattr_exports',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -179,7 +179,7 @@ interface(`rpc_read_exports',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -197,7 +197,7 @@ interface(`rpc_write_exports',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -233,7 +233,7 @@ interface(`rpc_initrc_domtrans_nfsd',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/rshd.if b/policy/modules/services/rshd.if
index e422af6..92bcded 100644
--- a/policy/modules/services/rshd.if
+++ b/policy/modules/services/rshd.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/samba.if b/policy/modules/services/samba.if
index 8fdb98a..086c9b5 100644
--- a/policy/modules/services/samba.if
+++ b/policy/modules/services/samba.if
@@ -10,7 +10,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -46,7 +46,7 @@ interface(`samba_signal_nmbd',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -64,7 +64,7 @@ interface(`samba_initrc_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -84,7 +84,7 @@ interface(`samba_domtrans_net',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
@@ -109,7 +109,7 @@ interface(`samba_run_net',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -260,7 +260,7 @@ interface(`samba_append_log',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -464,7 +464,7 @@ interface(`samba_run_smbcontrol',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -554,7 +554,7 @@ interface(`samba_rw_smbmount_tcp_sockets',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -573,7 +573,7 @@ interface(`samba_domtrans_winbind_helper',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
##
diff --git a/policy/modules/services/spamassassin.if b/policy/modules/services/spamassassin.if
index 3945628..d159ef3 100644
--- a/policy/modules/services/spamassassin.if
+++ b/policy/modules/services/spamassassin.if
@@ -64,7 +64,7 @@ interface(`spamassassin_exec',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -195,7 +195,7 @@ interface(`spamassassin_manage_lib_files',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/squid.if b/policy/modules/services/squid.if
index 0ae57d7..2fe24de 100644
--- a/policy/modules/services/squid.if
+++ b/policy/modules/services/squid.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -25,7 +25,7 @@ interface(`squid_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/tcpd.if b/policy/modules/services/tcpd.if
index 98dc24b..9de6298 100644
--- a/policy/modules/services/tcpd.if
+++ b/policy/modules/services/tcpd.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/tuned.if b/policy/modules/services/tuned.if
index 25b2435..54b8605 100644
--- a/policy/modules/services/tuned.if
+++ b/policy/modules/services/tuned.if
@@ -81,7 +81,7 @@ interface(`tuned_manage_pid_files',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/varnishd.if b/policy/modules/services/varnishd.if
index d569af4..597679d 100644
--- a/policy/modules/services/varnishd.if
+++ b/policy/modules/services/varnishd.if
@@ -6,7 +6,7 @@
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
@@ -25,7 +25,7 @@ interface(`varnishd_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#
diff --git a/policy/modules/services/vhostmd.if b/policy/modules/services/vhostmd.if
index 55e332f..a10dc80 100644
--- a/policy/modules/services/vhostmd.if
+++ b/policy/modules/services/vhostmd.if
@@ -24,7 +24,7 @@ interface(`vhostmd_domtrans',`
##
##
##
-## The type of the process performing this action.
+## Domain allowed access.
##
##
#