##
## Execute a shell in the target domain. This
diff --git a/refpolicy/policy/modules/system/domain.if b/refpolicy/policy/modules/system/domain.if
index d8790b8..c8e2ac1 100644
--- a/refpolicy/policy/modules/system/domain.if
+++ b/refpolicy/policy/modules/system/domain.if
@@ -107,10 +107,10 @@ interface(`domain_dyntrans_type',`
')
########################################
-##
+##
## Makes caller an exception to the constraint preventing
## changing of user identity.
-##
+##
##
## The process type to make an exception to the constraint.
##
@@ -124,10 +124,10 @@ interface(`domain_subj_id_change_exempt',`
')
########################################
-##
+##
## Makes caller an exception to the constraint preventing
## changing of role.
-##
+##
##
## The process type to make an exception to the constraint.
##
@@ -141,10 +141,10 @@ interface(`domain_role_change_exempt',`
')
########################################
-##
+##
## Makes caller an exception to the constraint preventing
## changing the user identity in object contexts.
-##
+##
##
## The process type to make an exception to the constraint.
##
@@ -216,9 +216,9 @@ interface(`domain_setpriority_all_domains',`
')
########################################
-##
+##
## Send general signals to all domains.
-##
+##
##
## The type of the process performing this action.
##
@@ -233,9 +233,9 @@ interface(`domain_signal_all_domains',`
')
########################################
-##
+##
## Send a null signal to all domains.
-##
+##
##
## The type of the process performing this action.
##
@@ -250,9 +250,9 @@ interface(`domain_signull_all_domains',`
')
########################################
-##
+##
## Send a stop signal to all domains.
-##
+##
##
## The type of the process performing this action.
##
@@ -267,9 +267,9 @@ interface(`domain_sigstop_all_domains',`
')
########################################
-##
+##
## Send a child terminated signal to all domains.
-##
+##
##
## The type of the process performing this action.
##
@@ -284,9 +284,9 @@ interface(`domain_sigchld_all_domains',`
')
########################################
-##
+##
## Send a kill signal to all domains.
-##
+##
##
## The type of the process performing this action.
##
@@ -362,10 +362,10 @@ interface(`domain_dontaudit_read_all_domains_state',`
')
########################################
-##
+##
## Do not audit attempts to read the process state
## directories of all domains.
-##
+##
##
## The type of the process performing this action.
##
@@ -541,10 +541,10 @@ interface(`domain_dontaudit_rw_all_key_sockets',`
')
########################################
-##
+##
## Do not audit attempts to get the attributes
## of all domains unix datagram sockets.
-##
+##
##
## The type of the process performing this action.
##
@@ -559,10 +559,10 @@ interface(`domain_dontaudit_getattr_all_unix_dgram_sockets',`
')
########################################
-##
+##
## Do not audit attempts to get the attributes
## of all domains unnamed pipes.
-##
+##
##
## The type of the process performing this action.
##
diff --git a/refpolicy/policy/modules/system/fstools.if b/refpolicy/policy/modules/system/fstools.if
index bda311a..bb2f5fa 100644
--- a/refpolicy/policy/modules/system/fstools.if
+++ b/refpolicy/policy/modules/system/fstools.if
@@ -1,9 +1,9 @@
## Tools for filesystem management, such as mkfs and fsck.
########################################
-##
+##
## Execute fs tools in the fstools domain.
-##
+##
##
## The type of the process performing this action.
##
@@ -25,10 +25,10 @@ interface(`fstools_domtrans',`
')
########################################
-##
+##
## Execute fs tools in the fstools domain, and
## allow the specified role the fs tools domain.
-##
+##
##
## The type of the process performing this action.
##
@@ -51,12 +51,12 @@ interface(`fstools_run',`
')
########################################
-##
-## Execute fsadm in the caller domain.
-##
-##
-## The type of the process performing this action.
-##
+##
+## Execute fsadm in the caller domain.
+##
+##
+## The type of the process performing this action.
+##
#
interface(`fstools_exec',`
gen_require(`
diff --git a/refpolicy/policy/modules/system/getty.if b/refpolicy/policy/modules/system/getty.if
index dd1ec0e..93d8149 100644
--- a/refpolicy/policy/modules/system/getty.if
+++ b/refpolicy/policy/modules/system/getty.if
@@ -1,12 +1,12 @@
## Policy for getty.
########################################
-##
-## Execute gettys in the getty domain.
-##
-##
-## The type of the process performing this action.
-##
+##
+## Execute gettys in the getty domain.
+##
+##
+## The type of the process performing this action.
+##
#
interface(`getty_domtrans',`
gen_require(`
@@ -26,12 +26,12 @@ interface(`getty_domtrans',`
')
########################################
-##
-## Allow process to read getty log file.
-##
-##
-## The type of the process performing this action.
-##
+##
+## Allow process to read getty log file.
+##
+##
+## The type of the process performing this action.
+##
#
interface(`getty_read_log',`
gen_require(`
@@ -44,12 +44,12 @@ interface(`getty_read_log',`
')
########################################
-##
-## Allow process to read getty config file.
-##
-##
-## The type of the process performing this action.
-##
+##
+## Allow process to read getty config file.
+##
+##
+## The type of the process performing this action.
+##
#
interface(`getty_read_config',`
gen_require(`
@@ -62,12 +62,12 @@ interface(`getty_read_config',`
')
########################################
-##
-## Allow process to edit getty config file.
-##
-##
-## The type of the process performing this action.
-##
+##
+## Allow process to edit getty config file.
+##
+##
+## The type of the process performing this action.
+##
#
interface(`getty_modify_config',`
gen_require(`
@@ -78,4 +78,3 @@ interface(`getty_modify_config',`
files_search_etc($1)
allow $1 getty_etc_t:file rw_file_perms;
')
-
diff --git a/refpolicy/policy/modules/system/init.if b/refpolicy/policy/modules/system/init.if
index 4383272..d9c14e9 100644
--- a/refpolicy/policy/modules/system/init.if
+++ b/refpolicy/policy/modules/system/init.if
@@ -298,9 +298,9 @@ interface(`init_domtrans_script',`
')
########################################
-##
+##
## Start and stop daemon programs directly.
-##
+##
##
## The type of the process performing this action.
##
diff --git a/refpolicy/policy/modules/system/iptables.if b/refpolicy/policy/modules/system/iptables.if
index 23d55fa..eeed12f 100644
--- a/refpolicy/policy/modules/system/iptables.if
+++ b/refpolicy/policy/modules/system/iptables.if
@@ -1,9 +1,9 @@
## Policy for iptables.
########################################
-##
+##
## Execute iptables in the iptables domain.
-##
+##
##
## The type of the process performing this action.
##
@@ -26,10 +26,10 @@ interface(`iptables_domtrans',`
')
########################################
-##
+##
## Execute iptables in the iptables domain, and
## allow the specified role the iptables domain.
-##
+##
##
## The type of the process performing this action.
##
@@ -52,9 +52,9 @@ interface(`iptables_run',`
')
########################################
-##
+##
## Execute iptables in the caller domain.
-##
+##
##
## The type of the process performing this action.
##
diff --git a/refpolicy/policy/modules/system/logging.if b/refpolicy/policy/modules/system/logging.if
index 925d35e..a592aae 100644
--- a/refpolicy/policy/modules/system/logging.if
+++ b/refpolicy/policy/modules/system/logging.if
@@ -84,11 +84,11 @@ interface(`logging_send_syslog_msg',`
')
########################################
-##
+##
## Allows the domain to open a file in the
## log directory, but does not allow the listing
## of the contents of the log directory.
-##
+##
##
## The type of the process performing this action.
##
diff --git a/refpolicy/policy/modules/system/lvm.if b/refpolicy/policy/modules/system/lvm.if
index 1f1ee77..c960b6c 100644
--- a/refpolicy/policy/modules/system/lvm.if
+++ b/refpolicy/policy/modules/system/lvm.if
@@ -1,9 +1,9 @@
## Policy for logical volume management programs.
########################################
-##
+##
## Execute lvm programs in the lvm domain.
-##
+##
##
## The type of the process performing this action.
##
@@ -26,9 +26,9 @@ interface(`lvm_domtrans',`
')
########################################
-##
+##
## Execute lvm programs in the lvm domain.
-##
+##
##
## The type of the process performing this action.
##
@@ -51,9 +51,9 @@ interface(`lvm_run',`
')
########################################
-##
+##
## Read LVM configuration files.
-##
+##
##
## The type of the process performing this action.
##
diff --git a/refpolicy/policy/modules/system/modutils.if b/refpolicy/policy/modules/system/modutils.if
index 199619d..fbe4514 100644
--- a/refpolicy/policy/modules/system/modutils.if
+++ b/refpolicy/policy/modules/system/modutils.if
@@ -1,9 +1,9 @@
## Policy for kernel module utilities
########################################
-##
+##
## Read the dependencies of kernel modules.
-##
+##
##
## The type of the process performing this action.
##
@@ -19,10 +19,10 @@ interface(`modutils_read_mods_deps',`
')
########################################
-##
+##
## Read the configuration options used when
## loading modules.
-##
+##
##
## The type of the process performing this action.
##
@@ -42,9 +42,9 @@ interface(`modutils_read_module_conf',`
')
########################################
-##
+##
## Execute insmod in the insmod domain.
-##
+##
##
## The type of the process performing this action.
##
@@ -67,12 +67,12 @@ interface(`modutils_domtrans_insmod',`
')
########################################
-##
+##
## Execute insmod in the insmod domain, and
## allow the specified role the insmod domain,
## and use the caller's terminal. Has a sigchld
## backchannel.
-##
+##
##
## The type of the process performing this action.
##
@@ -108,9 +108,9 @@ interface(`modutils_exec_insmod',`
')
########################################
-##
+##
## Execute depmod in the depmod domain.
-##
+##
##
## The type of the process performing this action.
##
@@ -133,9 +133,9 @@ interface(`modutils_domtrans_depmod',`
')
########################################
-##
+##
## Execute depmod in the depmod domain.
-##
+##
##
## The type of the process performing this action.
##
@@ -171,9 +171,9 @@ interface(`modutils_exec_depmod',`
')
########################################
-##
+##
## Execute depmod in the depmod domain.
-##
+##
##
## The type of the process performing this action.
##
@@ -196,9 +196,9 @@ interface(`modutils_domtrans_update_mods',`
')
########################################
-##
+##
## Execute update_modules in the update_modules domain.
-##
+##
##
## The type of the process performing this action.
##
diff --git a/refpolicy/policy/modules/system/mount.if b/refpolicy/policy/modules/system/mount.if
index 03f6d50..569f616 100644
--- a/refpolicy/policy/modules/system/mount.if
+++ b/refpolicy/policy/modules/system/mount.if
@@ -1,9 +1,9 @@
## Policy for mount.
########################################
-##
+##
## Execute mount in the mount domain.
-##
+##
##
## The type of the process performing this action.
##
@@ -25,11 +25,11 @@ interface(`mount_domtrans',`
')
########################################
-##
+##
## Execute mount in the mount domain, and
## allow the specified role the mount domain,
## and use the caller's terminal.
-##
+##
##
## The type of the process performing this action.
##
@@ -52,12 +52,12 @@ interface(`mount_run',`
')
########################################
-##
-## Use file descriptors for mount.
-##
-##
-## The type of the process performing this action.
-##
+##
+## Use file descriptors for mount.
+##
+##
+## The type of the process performing this action.
+##
#
interface(`mount_use_fd',`
gen_require(`
@@ -69,13 +69,13 @@ interface(`mount_use_fd',`
')
########################################
-##
-## Allow the mount domain to send nfs requests for mounting
-## network drives
-##
-##
-## The type of the process performing this action.
-##
+##
+## Allow the mount domain to send nfs requests for mounting
+## network drives
+##
+##
+## The type of the process performing this action.
+##
#
interface(`mount_send_nfs_client_request',`
gen_require(`
diff --git a/refpolicy/policy/modules/system/selinuxutil.if b/refpolicy/policy/modules/system/selinuxutil.if
index 3591f09..6119e4b 100644
--- a/refpolicy/policy/modules/system/selinuxutil.if
+++ b/refpolicy/policy/modules/system/selinuxutil.if
@@ -1,9 +1,9 @@
## Policy for SELinux policy and userland applications.
#######################################
-##
+##
## Execute checkpolicy in the checkpolicy domain.
-##
+##
##
## The type of the process performing this action.
##
@@ -27,12 +27,12 @@ interface(`seutil_domtrans_checkpol',`
')
########################################
-##
+##
## Execute checkpolicy in the checkpolicy domain, and
## allow the specified role the checkpolicy domain,
## and use the caller's terminal.
## Has a SIGCHLD signal backchannel.
-##
+##
##
## The type of the process performing this action.
##
@@ -69,9 +69,9 @@ interface(`seutil_exec_checkpol',`
')
#######################################
-##
+##
## Execute load_policy in the load_policy domain.
-##
+##
##
## The type of the process performing this action.
##
@@ -94,12 +94,12 @@ interface(`seutil_domtrans_loadpol',`
')
########################################
-##
+##
## Execute load_policy in the load_policy domain, and
## allow the specified role the load_policy domain,
## and use the caller's terminal.
## Has a SIGCHLD signal backchannel.
-##
+##
##
## The type of the process performing this action.
##
@@ -149,9 +149,9 @@ interface(`seutil_read_loadpol',`
')
#######################################
-##
+##
## Execute newrole in the load_policy domain.
-##
+##
##
## The type of the process performing this action.
##
@@ -175,11 +175,11 @@ interface(`seutil_domtrans_newrole',`
')
########################################
-##
+##
## Execute newrole in the newrole domain, and
## allow the specified role the newrole domain,
## and use the caller's terminal.
-##
+##
##
## The type of the process performing this action.
##
@@ -216,10 +216,10 @@ interface(`seutil_exec_newrole',`
')
########################################
-##
+##
## Do not audit the caller attempts to send
## a signal to newrole.
-##
+##
##
## The type of the process performing this action.
##
@@ -260,9 +260,9 @@ interface(`seutil_use_newrole_fd',`
')
#######################################
-##
+##
## Execute restorecon in the restorecon domain.
-##
+##
##
## The type of the process performing this action.
##
@@ -285,11 +285,11 @@ interface(`seutil_domtrans_restorecon',`
')
########################################
-##
+##
## Execute restorecon in the restorecon domain, and
## allow the specified role the restorecon domain,
## and use the caller's terminal.
-##
+##
##
## The type of the process performing this action.
##
@@ -325,9 +325,9 @@ interface(`seutil_exec_restorecon',`
')
########################################
-##
+##
## Execute run_init in the run_init domain.
-##
+##
##
## The type of the process performing this action.
##
@@ -351,11 +351,11 @@ interface(`seutil_domtrans_runinit',`
')
########################################
-##
+##
## Execute run_init in the run_init domain, and
## allow the specified role the run_init domain,
## and use the caller's terminal.
-##
+##
##
## The type of the process performing this action.
##
@@ -391,9 +391,9 @@ interface(`seutil_use_runinit_fd',`
')
########################################
-##
+##
## Execute setfiles in the setfiles domain.
-##
+##
##
## The type of the process performing this action.
##
@@ -417,11 +417,11 @@ interface(`seutil_domtrans_setfiles',`
')
########################################
-##
+##
## Execute setfiles in the setfiles domain, and
## allow the specified role the setfiles domain,
## and use the caller's terminal.
-##
+##
##
## The type of the process performing this action.
##
@@ -581,9 +581,9 @@ interface(`seutil_create_binary_pol',`
')
########################################
-##
+##
## Allow the caller to relabel a file to the binary policy type.
-##
+##
##
## The type of the process performing this action.
##
diff --git a/refpolicy/policy/modules/system/sysnetwork.if b/refpolicy/policy/modules/system/sysnetwork.if
index 4008974..fc7109b 100644
--- a/refpolicy/policy/modules/system/sysnetwork.if
+++ b/refpolicy/policy/modules/system/sysnetwork.if
@@ -1,12 +1,12 @@
## Policy for network configuration: ifconfig and dhcp client.
#######################################
-##
-## Execute dhcp client in dhcpc domain.
-##
-##
-## The type of the process performing this action.
-##
+##
+## Execute dhcp client in dhcpc domain.
+##
+##
+## The type of the process performing this action.
+##
#
interface(`sysnet_domtrans_dhcpc',`
gen_require(`
@@ -200,9 +200,9 @@ interface(`sysnet_read_dhcpc_pid',`
')
#######################################
-##
+##
## Execute ifconfig in the ifconfig domain.
-##
+##
##
## The type of the process performing this action.
##
@@ -225,11 +225,11 @@ interface(`sysnet_domtrans_ifconfig',`
')
########################################
-##
+##
## Execute ifconfig in the ifconfig domain, and
## allow the specified role the ifconfig domain,
## and use the caller's terminal.
-##
+##
##
## The type of the process performing this action.
##
diff --git a/refpolicy/policy/modules/system/unconfined.if b/refpolicy/policy/modules/system/unconfined.if
index 9da3a48..97d701d 100644
--- a/refpolicy/policy/modules/system/unconfined.if
+++ b/refpolicy/policy/modules/system/unconfined.if
@@ -98,9 +98,9 @@ interface(`unconfined_domtrans',`
')
########################################
-##
+##
## Execute specified programs in the unconfined domain.
-##
+##
##
## The type of the process performing this action.
##