From: cpebenito@tresys.com (Christopher J. PeBenito) Date: Thu, 05 Aug 2010 10:04:15 -0400 Subject: [refpolicy] [ services layer patch 1/1] Services layer xml files. In-Reply-To: <20100805130314.GA27453@localhost.localdomain> References: <20100805130314.GA27453@localhost.localdomain> Message-ID: <4C5AC4DF.2080204@tresys.com> To: refpolicy@oss.tresys.com List-Id: refpolicy.oss.tresys.com On 08/05/10 09:03, Dominick Grift wrote: > Signed-off-by: Dominick Grift Merged. > --- > :100644 100644 1adfe2f... 0b827c5... M policy/modules/services/abrt.if > :100644 100644 ada201c... 8559cdc... M policy/modules/services/afs.if > :100644 100644 23d7889... 838d25b... M policy/modules/services/aide.if > :100644 100644 4827f39... 0370dba... M policy/modules/services/aisexec.if > :100644 100644 15c6df1... adb3d5f... M policy/modules/services/amavis.if > :100644 100644 223bfc2... c9e1a44... M policy/modules/services/apache.if > :100644 100644 acd4956... e342775... M policy/modules/services/apcupsd.if > :100644 100644 77d31b9... 1ea99b2... M policy/modules/services/apm.if > :100644 100644 d41aee1... c804110... M policy/modules/services/arpwatch.if > :100644 100644 57d74bd... 8b8143e... M policy/modules/services/asterisk.if > :100644 100644 904f700... d80a16b... M policy/modules/services/automount.if > :100644 100644 a5e598e... 210ca0b... M policy/modules/services/avahi.if > :100644 100644 5d3c891... 44a1e3d... M policy/modules/services/bind.if > :100644 100644 d17e012... 3e45431... M policy/modules/services/bluetooth.if > :100644 100644 95a9290... a3728d4... M policy/modules/services/certmonger.if > :100644 100644 16e4342... 9a0da94... M policy/modules/services/chronyd.if > :100644 100644 ecb594c... 1f11572... M policy/modules/services/clamav.if > :100644 100644 9e3f911... 0797617... M policy/modules/services/clockspeed.if > :100644 100644 9f7dd57... 293e08d... M policy/modules/services/cobbler.if > :100644 100644 5318dce... 5220c9d... M policy/modules/services/corosync.if > :100644 100644 6192cc3... 37b03f6... M policy/modules/services/courier.if > :100644 100644 06ff274... 35241ed... M policy/modules/services/cron.if > :100644 100644 9a751a1... 305ddf4... M policy/modules/services/cups.if > :100644 100644 d76131b... 39e901a... M policy/modules/services/dbus.if > :100644 100644 ffce351... 784753e... M policy/modules/services/dcc.if > :100644 100644 ead762a... 0a1a61b... M policy/modules/services/ddclient.if > :100644 100644 de7e074... 567865f... M policy/modules/services/denyhosts.if > :100644 100644 0d9f10c... 5e2cea8... M policy/modules/services/dhcp.if > :100644 100644 a4840a7... 9bd812b... M policy/modules/services/dnsmasq.if > :100644 100644 eed4e6c... e1d7dc5... M policy/modules/services/dovecot.if > :100644 100644 88c5ede... 6bef7f8... M policy/modules/services/exim.if > :100644 100644 43dd962... f590a1f... M policy/modules/services/fail2ban.if > :100644 100644 cda687c... b5dd671... M policy/modules/services/finger.if > :100644 100644 dfa52fd... bc27421... M policy/modules/services/ftp.if > :100644 100644 3da830b... 671d8fd... M policy/modules/services/gnomeclock.if > :100644 100644 1fecb11... 7d97298... M policy/modules/services/gpm.if > :100644 100644 8fe31eb... c0ee676... M policy/modules/services/gpsd.if > :100644 100644 3707830... 7cf6763... M policy/modules/services/hal.if > :100644 100644 96ab892... ecab47a... M policy/modules/services/icecast.if > :100644 100644 59d9778... df48e5e... M policy/modules/services/inetd.if > :100644 100644 1240337... ebc9e0d... M policy/modules/services/inn.if > :100644 100644 29f8c16... 835b16b... M policy/modules/services/kerneloops.if > :100644 100644 67e9269... 6fd0b4c... M policy/modules/services/ksmtuned.if > :100644 100644 d29dfdf... a4f32f5... M policy/modules/services/lpd.if > :100644 100644 9ad4c4e... 67c7fdd... M policy/modules/services/mailman.if > :100644 100644 c57356a... 343cee3... M policy/modules/services/mta.if > :100644 100644 cb4832e... c358d8f... M policy/modules/services/munin.if > :100644 100644 1e4b4d5... e9c0982... M policy/modules/services/mysql.if > :100644 100644 b487ec9... 8581040... M policy/modules/services/nagios.if > :100644 100644 18f657e... 2324d9e... M policy/modules/services/networkmanager.if > :100644 100644 c7db858... abe3f7f... M policy/modules/services/nis.if > :100644 100644 a63a657... 85188dc... M policy/modules/services/nscd.if > :100644 100644 01d6be9... 23c769c... M policy/modules/services/nslcd.if > :100644 100644 c42c7ab... e80f8c0... M policy/modules/services/ntp.if > :100644 100644 ccc68c7... 79a225c... M policy/modules/services/nx.if > :100644 100644 d44783f... 7f0d644... M policy/modules/services/oav.if > :100644 100644 6433998... bd76ec2... M policy/modules/services/oddjob.if > :100644 100644 43bb38b... a8c1eef... M policy/modules/services/openca.if > :100644 100644 ae74460... d883214... M policy/modules/services/openvpn.if > :100644 100644 2ccacfa... 48ff1e8... M policy/modules/services/policykit.if > :100644 100644 af55ca0... 374afcf... M policy/modules/services/portmap.if > :100644 100644 378cee1... c48b45b... M policy/modules/services/postfix.if > :100644 100644 394031b... 539a7c9... M policy/modules/services/postgresql.if > :100644 100644 3927880... ad15fde... M policy/modules/services/postgrey.if > :100644 100644 4789268... b524673... M policy/modules/services/ppp.if > :100644 100644 737be4f... 2316653... M policy/modules/services/prelude.if > :100644 100644 f68e025... b64b02f... M policy/modules/services/procmail.if > :100644 100644 34946a2... 2855a44... M policy/modules/services/puppet.if > :100644 100644 3745b62... 494f7e2... M policy/modules/services/pyzor.if > :100644 100644 27fd19e... a55bf44... M policy/modules/services/qmail.if > :100644 100644 f4a355f... f04a595... M policy/modules/services/razor.if > :100644 100644 114f2c2... 31be971... M policy/modules/services/remotelogin.if > :100644 100644 4504355... 7dc38d1... M policy/modules/services/rgmanager.if > :100644 100644 6b7eb35... de37806... M policy/modules/services/rhcs.if > :100644 100644 46681c8... 96efae7... M policy/modules/services/rhgb.if > :100644 100644 ba3364d... 63e78c6... M policy/modules/services/rlogin.if > :100644 100644 005f516... cda37bb... M policy/modules/services/rpc.if > :100644 100644 92bcded... 2e87d76... M policy/modules/services/rshd.if > :100644 100644 6a2d345... 3386f29... M policy/modules/services/rsync.if > :100644 100644 6d974a7... 82cb169... M policy/modules/services/samba.if > :100644 100644 e4f4051... 7e94c7c... M policy/modules/services/sendmail.if > :100644 100644 c09053b... 22dfeb4... M policy/modules/services/setroubleshoot.if > :100644 100644 66a80b3... d7e8289... M policy/modules/services/slrnpull.if > :100644 100644 f3d8459... adea9f9... M policy/modules/services/smartmon.if > :100644 100644 6be6642... 824d206... M policy/modules/services/smokeping.if > :100644 100644 d159ef3... c954f31... M policy/modules/services/spamassassin.if > :100644 100644 2fe24de... d2496bd... M policy/modules/services/squid.if > :100644 100644 567592d... 5437ffb... M policy/modules/services/ssh.if > :100644 100644 5eff513... 941380a... M policy/modules/services/sssd.if > :100644 100644 9de6298... 2075ebb... M policy/modules/services/tcpd.if > :100644 100644 d04b833... b078bf7... M policy/modules/services/ulogd.if > :100644 100644 36b936a... a4fbe31... M policy/modules/services/uucp.if > :100644 100644 4334b28... 8337684... M policy/modules/services/uwimap.if > :100644 100644 597679d... b4d90ac... M policy/modules/services/varnishd.if > :100644 100644 a10dc80... 1f872b5... M policy/modules/services/vhostmd.if > :100644 100644 7bb17f6... 7c5d8d8... M policy/modules/services/virt.if > :100644 100644 3b31efb... da2601a... M policy/modules/services/xserver.if > :100644 100644 6a5acd5... 702e768... M policy/modules/services/zosremote.if > policy/modules/services/abrt.if | 8 ++++---- > policy/modules/services/afs.if | 4 ++-- > policy/modules/services/aide.if | 4 ++-- > policy/modules/services/aisexec.if | 2 +- > policy/modules/services/amavis.if | 2 +- > policy/modules/services/apache.if | 26 +++++++++++++------------- > policy/modules/services/apcupsd.if | 4 ++-- > policy/modules/services/apm.if | 2 +- > policy/modules/services/arpwatch.if | 2 +- > policy/modules/services/asterisk.if | 2 +- > policy/modules/services/automount.if | 4 ++-- > policy/modules/services/avahi.if | 4 ++-- > policy/modules/services/bind.if | 8 ++++---- > policy/modules/services/bluetooth.if | 8 ++++---- > policy/modules/services/certmonger.if | 2 +- > policy/modules/services/chronyd.if | 2 +- > policy/modules/services/clamav.if | 4 ++-- > policy/modules/services/clockspeed.if | 4 ++-- > policy/modules/services/cobbler.if | 4 ++-- > policy/modules/services/corosync.if | 2 +- > policy/modules/services/courier.if | 6 +++--- > policy/modules/services/cron.if | 12 ++++++------ > policy/modules/services/cups.if | 4 ++-- > policy/modules/services/dbus.if | 6 +++--- > policy/modules/services/dcc.if | 12 ++++++------ > policy/modules/services/ddclient.if | 4 ++-- > policy/modules/services/denyhosts.if | 2 +- > policy/modules/services/dhcp.if | 4 ++-- > policy/modules/services/dnsmasq.if | 8 ++++---- > policy/modules/services/dovecot.if | 2 +- > policy/modules/services/exim.if | 4 ++-- > policy/modules/services/fail2ban.if | 2 +- > policy/modules/services/finger.if | 2 +- > policy/modules/services/ftp.if | 8 ++++---- > policy/modules/services/gnomeclock.if | 2 +- > policy/modules/services/gpm.if | 2 +- > policy/modules/services/gpsd.if | 2 +- > policy/modules/services/hal.if | 14 +++++++------- > policy/modules/services/icecast.if | 2 +- > policy/modules/services/inetd.if | 2 +- > policy/modules/services/inn.if | 2 +- > policy/modules/services/kerneloops.if | 4 ++-- > policy/modules/services/ksmtuned.if | 2 +- > policy/modules/services/lpd.if | 6 +++--- > policy/modules/services/mailman.if | 6 +++--- > policy/modules/services/mta.if | 10 +++++----- > policy/modules/services/munin.if | 2 +- > policy/modules/services/mysql.if | 4 ++-- > policy/modules/services/nagios.if | 2 +- > policy/modules/services/networkmanager.if | 4 ++-- > policy/modules/services/nis.if | 10 +++++----- > policy/modules/services/nscd.if | 8 ++++---- > policy/modules/services/nslcd.if | 4 ++-- > policy/modules/services/ntp.if | 8 ++++---- > policy/modules/services/nx.if | 2 +- > policy/modules/services/oav.if | 4 ++-- > policy/modules/services/oddjob.if | 2 +- > policy/modules/services/openca.if | 2 +- > policy/modules/services/openvpn.if | 4 ++-- > policy/modules/services/policykit.if | 4 ++-- > policy/modules/services/portmap.if | 4 ++-- > policy/modules/services/postfix.if | 16 ++++++++-------- > policy/modules/services/postgresql.if | 4 ++-- > policy/modules/services/postgrey.if | 4 ++-- > policy/modules/services/ppp.if | 8 ++++---- > policy/modules/services/prelude.if | 2 +- > policy/modules/services/procmail.if | 2 +- > policy/modules/services/puppet.if | 2 +- > policy/modules/services/pyzor.if | 2 +- > policy/modules/services/qmail.if | 4 ++-- > policy/modules/services/razor.if | 2 +- > policy/modules/services/remotelogin.if | 2 +- > policy/modules/services/rgmanager.if | 2 +- > policy/modules/services/rhcs.if | 8 ++++---- > policy/modules/services/rhgb.if | 4 ++-- > policy/modules/services/rlogin.if | 2 +- > policy/modules/services/rpc.if | 10 +++++----- > policy/modules/services/rshd.if | 2 +- > policy/modules/services/rsync.if | 8 ++++---- > policy/modules/services/samba.if | 22 +++++++++++----------- > policy/modules/services/sendmail.if | 12 ++++++------ > policy/modules/services/setroubleshoot.if | 2 +- > policy/modules/services/slrnpull.if | 4 ++-- > policy/modules/services/smartmon.if | 2 +- > policy/modules/services/smokeping.if | 2 +- > policy/modules/services/spamassassin.if | 4 ++-- > policy/modules/services/squid.if | 2 +- > policy/modules/services/ssh.if | 6 +++--- > policy/modules/services/sssd.if | 2 +- > policy/modules/services/tcpd.if | 2 +- > policy/modules/services/ulogd.if | 2 +- > policy/modules/services/uucp.if | 2 +- > policy/modules/services/uwimap.if | 2 +- > policy/modules/services/varnishd.if | 2 +- > policy/modules/services/vhostmd.if | 10 +++++----- > policy/modules/services/virt.if | 10 +++++----- > policy/modules/services/xserver.if | 8 ++++---- > policy/modules/services/zosremote.if | 2 +- > 98 files changed, 237 insertions(+), 237 deletions(-) > > diff --git a/policy/modules/services/abrt.if b/policy/modules/services/abrt.if > index 1adfe2f..0b827c5 100644 > --- a/policy/modules/services/abrt.if > +++ b/policy/modules/services/abrt.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -62,7 +62,7 @@ interface(`abrt_signull',` > ## > ## > ## > -## Domain to allow access. > +## Domain allowed access. > ## > ## > # > @@ -120,7 +120,7 @@ interface(`abrt_dbus_chat',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -139,7 +139,7 @@ interface(`abrt_domtrans_helper',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > diff --git a/policy/modules/services/afs.if b/policy/modules/services/afs.if > index ada201c..8559cdc 100644 > --- a/policy/modules/services/afs.if > +++ b/policy/modules/services/afs.if > @@ -44,7 +44,7 @@ interface(`afs_rw_udp_sockets',` > ## > ## > ## > -## Domain allowed to transition. > +## Domain allowed access. > ## > ## > # > @@ -63,7 +63,7 @@ interface(`afs_rw_cache',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/aide.if b/policy/modules/services/aide.if > index 23d7889..838d25b 100644 > --- a/policy/modules/services/aide.if > +++ b/policy/modules/services/aide.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -25,7 +25,7 @@ interface(`aide_domtrans',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > diff --git a/policy/modules/services/aisexec.if b/policy/modules/services/aisexec.if > index 4827f39..0370dba 100644 > --- a/policy/modules/services/aisexec.if > +++ b/policy/modules/services/aisexec.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/amavis.if b/policy/modules/services/amavis.if > index 15c6df1..adb3d5f 100644 > --- a/policy/modules/services/amavis.if > +++ b/policy/modules/services/amavis.if > @@ -28,7 +28,7 @@ interface(`amavis_domtrans',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/apache.if b/policy/modules/services/apache.if > index 223bfc2..c9e1a44 100644 > --- a/policy/modules/services/apache.if > +++ b/policy/modules/services/apache.if > @@ -299,7 +299,7 @@ interface(`apache_read_user_content',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -391,7 +391,7 @@ interface(`apache_use_fds',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > @@ -410,7 +410,7 @@ interface(`apache_dontaudit_rw_fifo_file',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > @@ -429,7 +429,7 @@ interface(`apache_dontaudit_rw_stream_sockets',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > @@ -615,7 +615,7 @@ interface(`apache_domtrans_helper',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > @@ -785,7 +785,7 @@ interface(`apache_exec_modules',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -848,7 +848,7 @@ interface(`apache_manage_sys_content',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -872,7 +872,7 @@ interface(`apache_domtrans_sys_script',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > @@ -891,7 +891,7 @@ interface(`apache_dontaudit_rw_sys_script_stream_sockets',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -911,7 +911,7 @@ interface(`apache_domtrans_all_scripts',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > @@ -991,7 +991,7 @@ interface(`apache_search_sys_content',` > ## > ## > ## > -## Domain to not audit. > +## Domain allowed access. > ## > ## > # > @@ -1054,7 +1054,7 @@ interface(`apache_manage_all_user_content',` > ## > ## > ## > -## Domain to not audit. > +## Domain allowed access. > ## > ## > # > @@ -1093,7 +1093,7 @@ interface(`apache_read_tmp_files',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > diff --git a/policy/modules/services/apcupsd.if b/policy/modules/services/apcupsd.if > index acd4956..e342775 100644 > --- a/policy/modules/services/apcupsd.if > +++ b/policy/modules/services/apcupsd.if > @@ -25,7 +25,7 @@ interface(`apcupsd_domtrans',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -84,7 +84,7 @@ interface(`apcupsd_read_log',` > ## > ## > ## > -## Domain allowed to transition. > +## Domain allowed access. > ## > ## > # > diff --git a/policy/modules/services/apm.if b/policy/modules/services/apm.if > index 77d31b9..1ea99b2 100644 > --- a/policy/modules/services/apm.if > +++ b/policy/modules/services/apm.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/arpwatch.if b/policy/modules/services/arpwatch.if > index d41aee1..c804110 100644 > --- a/policy/modules/services/arpwatch.if > +++ b/policy/modules/services/arpwatch.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/asterisk.if b/policy/modules/services/asterisk.if > index 57d74bd..8b8143e 100644 > --- a/policy/modules/services/asterisk.if > +++ b/policy/modules/services/asterisk.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/automount.if b/policy/modules/services/automount.if > index 904f700..d80a16b 100644 > --- a/policy/modules/services/automount.if > +++ b/policy/modules/services/automount.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -95,7 +95,7 @@ interface(`automount_dontaudit_use_fds',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > diff --git a/policy/modules/services/avahi.if b/policy/modules/services/avahi.if > index a5e598e..210ca0b 100644 > --- a/policy/modules/services/avahi.if > +++ b/policy/modules/services/avahi.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -119,7 +119,7 @@ interface(`avahi_stream_connect',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > diff --git a/policy/modules/services/bind.if b/policy/modules/services/bind.if > index 5d3c891..44a1e3d 100644 > --- a/policy/modules/services/bind.if > +++ b/policy/modules/services/bind.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -24,7 +24,7 @@ interface(`bind_initrc_domtrans',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -97,7 +97,7 @@ interface(`bind_kill',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > @@ -122,7 +122,7 @@ interface(`bind_run_ndc',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/bluetooth.if b/policy/modules/services/bluetooth.if > index d17e012..3e45431 100644 > --- a/policy/modules/services/bluetooth.if > +++ b/policy/modules/services/bluetooth.if > @@ -64,7 +64,7 @@ interface(`bluetooth_stream_connect',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -121,7 +121,7 @@ interface(`bluetooth_dbus_chat',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -136,7 +136,7 @@ interface(`bluetooth_domtrans_helper',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > @@ -161,7 +161,7 @@ interface(`bluetooth_run_helper',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > diff --git a/policy/modules/services/certmonger.if b/policy/modules/services/certmonger.if > index 95a9290..a3728d4 100644 > --- a/policy/modules/services/certmonger.if > +++ b/policy/modules/services/certmonger.if > @@ -45,7 +45,7 @@ interface(`certmonger_dbus_chat',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/chronyd.if b/policy/modules/services/chronyd.if > index 16e4342..9a0da94 100644 > --- a/policy/modules/services/chronyd.if > +++ b/policy/modules/services/chronyd.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/clamav.if b/policy/modules/services/clamav.if > index ecb594c..1f11572 100644 > --- a/policy/modules/services/clamav.if > +++ b/policy/modules/services/clamav.if > @@ -24,7 +24,7 @@ interface(`clamav_domtrans',` > ## > ## > ## > -## Domain allowed to connect. > +## Domain allowed access. > ## > ## > # > @@ -101,7 +101,7 @@ interface(`clamav_search_lib',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/clockspeed.if b/policy/modules/services/clockspeed.if > index 9e3f911..0797617 100644 > --- a/policy/modules/services/clockspeed.if > +++ b/policy/modules/services/clockspeed.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -24,7 +24,7 @@ interface(`clockspeed_domtrans_cli',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > diff --git a/policy/modules/services/cobbler.if b/policy/modules/services/cobbler.if > index 9f7dd57..293e08d 100644 > --- a/policy/modules/services/cobbler.if > +++ b/policy/modules/services/cobbler.if > @@ -34,7 +34,7 @@ interface(`cobblerd_domtrans',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -72,7 +72,7 @@ interface(`cobbler_read_config',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > diff --git a/policy/modules/services/corosync.if b/policy/modules/services/corosync.if > index 5318dce..5220c9d 100644 > --- a/policy/modules/services/corosync.if > +++ b/policy/modules/services/corosync.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/courier.if b/policy/modules/services/courier.if > index 6192cc3..37b03f6 100644 > --- a/policy/modules/services/courier.if > +++ b/policy/modules/services/courier.if > @@ -90,7 +90,7 @@ template(`courier_domain_template',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -109,7 +109,7 @@ interface(`courier_domtrans_authdaemon',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -201,7 +201,7 @@ interface(`courier_read_spool',` > ## > ## > ## > -## Domain to not audit. > +## Domain allowed access. > ## > ## > # > diff --git a/policy/modules/services/cron.if b/policy/modules/services/cron.if > index 06ff274..35241ed 100644 > --- a/policy/modules/services/cron.if > +++ b/policy/modules/services/cron.if > @@ -272,7 +272,7 @@ interface(`cron_system_entry',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -308,7 +308,7 @@ interface(`cron_exec',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -381,7 +381,7 @@ interface(`cron_read_pipes',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > @@ -435,7 +435,7 @@ interface(`cron_rw_tcp_sockets',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > @@ -453,7 +453,7 @@ interface(`cron_dontaudit_rw_tcp_sockets',` > ## > ## > ## > -## The type of the process to performing this action. > +## Domain allowed access. > ## > ## > # > @@ -490,7 +490,7 @@ interface(`cron_manage_pid_files',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/cups.if b/policy/modules/services/cups.if > index 9a751a1..305ddf4 100644 > --- a/policy/modules/services/cups.if > +++ b/policy/modules/services/cups.if > @@ -33,7 +33,7 @@ interface(`cups_backend',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -124,7 +124,7 @@ interface(`cups_read_pid_files',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/dbus.if b/policy/modules/services/dbus.if > index d76131b..39e901a 100644 > --- a/policy/modules/services/dbus.if > +++ b/policy/modules/services/dbus.if > @@ -172,7 +172,7 @@ template(`dbus_role_template',` > ## > ## > ## > -## The type of the domain. > +## Domain allowed access. > ## > ## > # > @@ -202,7 +202,7 @@ interface(`dbus_system_bus_client',` > ## > ## > ## > -## The type of the domain. > +## Domain allowed access. > ## > ## > # > @@ -449,7 +449,7 @@ interface(`dbus_system_domain',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > diff --git a/policy/modules/services/dcc.if b/policy/modules/services/dcc.if > index ffce351..784753e 100644 > --- a/policy/modules/services/dcc.if > +++ b/policy/modules/services/dcc.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -26,7 +26,7 @@ interface(`dcc_domtrans_cdcc',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > @@ -51,7 +51,7 @@ interface(`dcc_run_cdcc',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -89,7 +89,7 @@ interface(`dcc_signal_client',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > @@ -114,7 +114,7 @@ interface(`dcc_run_client',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -134,7 +134,7 @@ interface(`dcc_domtrans_dbclean',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > diff --git a/policy/modules/services/ddclient.if b/policy/modules/services/ddclient.if > index ead762a..0a1a61b 100644 > --- a/policy/modules/services/ddclient.if > +++ b/policy/modules/services/ddclient.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -25,7 +25,7 @@ interface(`ddclient_domtrans',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > diff --git a/policy/modules/services/denyhosts.if b/policy/modules/services/denyhosts.if > index de7e074..567865f 100644 > --- a/policy/modules/services/denyhosts.if > +++ b/policy/modules/services/denyhosts.if > @@ -32,7 +32,7 @@ interface(`denyhosts_domtrans', ` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/dhcp.if b/policy/modules/services/dhcp.if > index 0d9f10c..5e2cea8 100644 > --- a/policy/modules/services/dhcp.if > +++ b/policy/modules/services/dhcp.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -45,7 +45,7 @@ interface(`dhcpd_setattr_state_files',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/dnsmasq.if b/policy/modules/services/dnsmasq.if > index a4840a7..9bd812b 100644 > --- a/policy/modules/services/dnsmasq.if > +++ b/policy/modules/services/dnsmasq.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -26,7 +26,7 @@ interface(`dnsmasq_domtrans',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -102,7 +102,7 @@ interface(`dnsmasq_kill',` > ## > ## > ## > -## Domain allowed. > +## Domain allowed access. > ## > ## > # > @@ -121,7 +121,7 @@ interface(`dnsmasq_read_config',` > ## > ## > ## > -## Domain allowed. > +## Domain allowed access. > ## > ## > # > diff --git a/policy/modules/services/dovecot.if b/policy/modules/services/dovecot.if > index eed4e6c..e1d7dc5 100644 > --- a/policy/modules/services/dovecot.if > +++ b/policy/modules/services/dovecot.if > @@ -25,7 +25,7 @@ interface(`dovecot_stream_connect_auth',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/exim.if b/policy/modules/services/exim.if > index 88c5ede..6bef7f8 100644 > --- a/policy/modules/services/exim.if > +++ b/policy/modules/services/exim.if > @@ -43,7 +43,7 @@ interface(`exim_dontaudit_read_tmp_files',` > ## > ## > ## > -## Domain to not audit. > +## Domain allowed access. > ## > ## > # > @@ -102,7 +102,7 @@ interface(`exim_read_log',` > ## > ## > ## > -## Domain allowed to transition. > +## Domain allowed access. > ## > ## > # > diff --git a/policy/modules/services/fail2ban.if b/policy/modules/services/fail2ban.if > index 43dd962..f590a1f 100644 > --- a/policy/modules/services/fail2ban.if > +++ b/policy/modules/services/fail2ban.if > @@ -103,7 +103,7 @@ interface(`fail2ban_read_log',` > ## > ## > ## > -## Domain allowed to transition. > +## Domain allowed access. > ## > ## > # > diff --git a/policy/modules/services/finger.if b/policy/modules/services/finger.if > index cda687c..b5dd671 100644 > --- a/policy/modules/services/finger.if > +++ b/policy/modules/services/finger.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/ftp.if b/policy/modules/services/ftp.if > index dfa52fd..bc27421 100644 > --- a/policy/modules/services/ftp.if > +++ b/policy/modules/services/ftp.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -95,7 +95,7 @@ interface(`ftp_read_log',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -114,7 +114,7 @@ interface(`ftp_domtrans_ftpdctl',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > @@ -139,7 +139,7 @@ interface(`ftp_run_ftpdctl',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/gnomeclock.if b/policy/modules/services/gnomeclock.if > index 3da830b..671d8fd 100644 > --- a/policy/modules/services/gnomeclock.if > +++ b/policy/modules/services/gnomeclock.if > @@ -25,7 +25,7 @@ interface(`gnomeclock_domtrans',` > ## > ## > ## > -## Domain allowed access > +## Domain allowed to transition. > ## > ## > ## > diff --git a/policy/modules/services/gpm.if b/policy/modules/services/gpm.if > index 1fecb11..7d97298 100644 > --- a/policy/modules/services/gpm.if > +++ b/policy/modules/services/gpm.if > @@ -48,7 +48,7 @@ interface(`gpm_getattr_gpmctl',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > diff --git a/policy/modules/services/gpsd.if b/policy/modules/services/gpsd.if > index 8fe31eb..c0ee676 100644 > --- a/policy/modules/services/gpsd.if > +++ b/policy/modules/services/gpsd.if > @@ -25,7 +25,7 @@ interface(`gpsd_domtrans',` > ## > ## > ## > -## Domain allowed access > +## Domain allowed to transition. > ## > ## > ## > diff --git a/policy/modules/services/hal.if b/policy/modules/services/hal.if > index 3707830..7cf6763 100644 > --- a/policy/modules/services/hal.if > +++ b/policy/modules/services/hal.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -42,7 +42,7 @@ interface(`hal_getattr',` > ## > ## > ## > -## Domain to not audit. > +## Domain allowed access. > ## > ## > # > @@ -78,7 +78,7 @@ interface(`hal_ptrace',` > ## > ## > ## > -## Domain to not audit. > +## Domain allowed access. > ## > ## > # > @@ -115,7 +115,7 @@ interface(`hal_dontaudit_use_fds',` > ## > ## > ## > -## Domain to not audit. > +## Domain allowed access. > ## > ## > # > @@ -190,7 +190,7 @@ interface(`hal_stream_connect',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > @@ -248,7 +248,7 @@ interface(`hal_dbus_chat',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -344,7 +344,7 @@ interface(`hal_read_tmp_files',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > diff --git a/policy/modules/services/icecast.if b/policy/modules/services/icecast.if > index 96ab892..ecab47a 100644 > --- a/policy/modules/services/icecast.if > +++ b/policy/modules/services/icecast.if > @@ -42,7 +42,7 @@ interface(`icecast_signal',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/inetd.if b/policy/modules/services/inetd.if > index 59d9778..df48e5e 100644 > --- a/policy/modules/services/inetd.if > +++ b/policy/modules/services/inetd.if > @@ -159,7 +159,7 @@ interface(`inetd_tcp_connect',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/inn.if b/policy/modules/services/inn.if > index 1240337..ebc9e0d 100644 > --- a/policy/modules/services/inn.if > +++ b/policy/modules/services/inn.if > @@ -162,7 +162,7 @@ interface(`inn_dgram_send',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/kerneloops.if b/policy/modules/services/kerneloops.if > index 29f8c16..835b16b 100644 > --- a/policy/modules/services/kerneloops.if > +++ b/policy/modules/services/kerneloops.if > @@ -47,7 +47,7 @@ interface(`kerneloops_dbus_chat',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > @@ -67,7 +67,7 @@ interface(`kerneloops_dontaudit_dbus_chat',` > ## > ## > ## > -## Domain to not audit. > +## Domain allowed access. > ## > ## > # > diff --git a/policy/modules/services/ksmtuned.if b/policy/modules/services/ksmtuned.if > index 67e9269..6fd0b4c 100644 > --- a/policy/modules/services/ksmtuned.if > +++ b/policy/modules/services/ksmtuned.if > @@ -24,7 +24,7 @@ interface(`ksmtuned_domtrans',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/lpd.if b/policy/modules/services/lpd.if > index d29dfdf..a4f32f5 100644 > --- a/policy/modules/services/lpd.if > +++ b/policy/modules/services/lpd.if > @@ -40,7 +40,7 @@ interface(`lpd_role',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -59,7 +59,7 @@ interface(`lpd_domtrans_checkpc',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > @@ -182,7 +182,7 @@ interface(`lpd_read_config',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/mailman.if b/policy/modules/services/mailman.if > index 9ad4c4e..67c7fdd 100644 > --- a/policy/modules/services/mailman.if > +++ b/policy/modules/services/mailman.if > @@ -96,7 +96,7 @@ template(`mailman_domain_template', ` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -115,7 +115,7 @@ interface(`mailman_domtrans',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -339,7 +339,7 @@ interface(`mailman_read_archive',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/mta.if b/policy/modules/services/mta.if > index c57356a..343cee3 100644 > --- a/policy/modules/services/mta.if > +++ b/policy/modules/services/mta.if > @@ -344,7 +344,7 @@ interface(`mta_mailserver_user_agent',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -380,7 +380,7 @@ interface(`mta_send_mail',` > ## > ## > ## > -## Domain to transition from. > +## Domain allowed to transition. > ## > ## > ## > @@ -562,7 +562,7 @@ interface(`mta_rw_aliases',` > ## > ## > ## > -## Mail server domain. > +## Domain to not audit. > ## > ## > # > @@ -580,7 +580,7 @@ interface(`mta_dontaudit_rw_delivery_tcp_sockets',` > ## > ## > ## > -## Mail server domain. > +## Domain allowed access. > ## > ## > # > @@ -595,7 +595,7 @@ interface(`mta_tcp_connect_all_mailservers',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > diff --git a/policy/modules/services/munin.if b/policy/modules/services/munin.if > index cb4832e..c358d8f 100644 > --- a/policy/modules/services/munin.if > +++ b/policy/modules/services/munin.if > @@ -139,7 +139,7 @@ interface(`munin_search_lib',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > diff --git a/policy/modules/services/mysql.if b/policy/modules/services/mysql.if > index 1e4b4d5..e9c0982 100644 > --- a/policy/modules/services/mysql.if > +++ b/policy/modules/services/mysql.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -261,7 +261,7 @@ interface(`mysql_write_log',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/nagios.if b/policy/modules/services/nagios.if > index b487ec9..8581040 100644 > --- a/policy/modules/services/nagios.if > +++ b/policy/modules/services/nagios.if > @@ -164,7 +164,7 @@ interface(`nagios_read_tmp_files',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/networkmanager.if b/policy/modules/services/networkmanager.if > index 18f657e..2324d9e 100644 > --- a/policy/modules/services/networkmanager.if > +++ b/policy/modules/services/networkmanager.if > @@ -83,7 +83,7 @@ interface(`networkmanager_rw_routing_sockets',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -102,7 +102,7 @@ interface(`networkmanager_domtrans',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/nis.if b/policy/modules/services/nis.if > index c7db858..abe3f7f 100644 > --- a/policy/modules/services/nis.if > +++ b/policy/modules/services/nis.if > @@ -118,7 +118,7 @@ interface(`nis_authenticate',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -138,7 +138,7 @@ interface(`nis_domtrans_ypbind',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > @@ -285,7 +285,7 @@ interface(`nis_read_ypserv_config',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -304,7 +304,7 @@ interface(`nis_domtrans_ypxfr',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -323,7 +323,7 @@ interface(`nis_initrc_domtrans',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/nscd.if b/policy/modules/services/nscd.if > index a63a657..85188dc 100644 > --- a/policy/modules/services/nscd.if > +++ b/policy/modules/services/nscd.if > @@ -60,7 +60,7 @@ interface(`nscd_signull',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -159,7 +159,7 @@ interface(`nscd_shm_use',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > @@ -216,7 +216,7 @@ interface(`nscd_unconfined',` > ## > ## > ## > -## Domain allowed access > +## Domain allowed to transition. > ## > ## > ## > @@ -240,7 +240,7 @@ interface(`nscd_run',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/nslcd.if b/policy/modules/services/nslcd.if > index 01d6be9..23c769c 100644 > --- a/policy/modules/services/nslcd.if > +++ b/policy/modules/services/nslcd.if > @@ -24,7 +24,7 @@ interface(`nslcd_domtrans',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -61,7 +61,7 @@ interface(`nslcd_read_pid_files',` > ## > ## > ## > -## Domain allowed to connect. > +## Domain allowed access. > ## > ## > # > diff --git a/policy/modules/services/ntp.if b/policy/modules/services/ntp.if > index c42c7ab..e80f8c0 100644 > --- a/policy/modules/services/ntp.if > +++ b/policy/modules/services/ntp.if > @@ -22,7 +22,7 @@ interface(`ntp_stub',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -42,7 +42,7 @@ interface(`ntp_domtrans',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > @@ -67,7 +67,7 @@ interface(`ntp_run',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -86,7 +86,7 @@ interface(`ntp_domtrans_ntpdate',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/nx.if b/policy/modules/services/nx.if > index ccc68c7..79a225c 100644 > --- a/policy/modules/services/nx.if > +++ b/policy/modules/services/nx.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/oav.if b/policy/modules/services/oav.if > index d44783f..7f0d644 100644 > --- a/policy/modules/services/oav.if > +++ b/policy/modules/services/oav.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -26,7 +26,7 @@ interface(`oav_domtrans_update',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > diff --git a/policy/modules/services/oddjob.if b/policy/modules/services/oddjob.if > index 6433998..bd76ec2 100644 > --- a/policy/modules/services/oddjob.if > +++ b/policy/modules/services/oddjob.if > @@ -91,7 +91,7 @@ interface(`oddjob_domtrans_mkhomedir',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > diff --git a/policy/modules/services/openca.if b/policy/modules/services/openca.if > index 43bb38b..a8c1eef 100644 > --- a/policy/modules/services/openca.if > +++ b/policy/modules/services/openca.if > @@ -7,7 +7,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/openvpn.if b/policy/modules/services/openvpn.if > index ae74460..d883214 100644 > --- a/policy/modules/services/openvpn.if > +++ b/policy/modules/services/openvpn.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -25,7 +25,7 @@ interface(`openvpn_domtrans',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > diff --git a/policy/modules/services/policykit.if b/policy/modules/services/policykit.if > index 2ccacfa..48ff1e8 100644 > --- a/policy/modules/services/policykit.if > +++ b/policy/modules/services/policykit.if > @@ -46,7 +46,7 @@ interface(`policykit_domtrans_auth',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > @@ -89,7 +89,7 @@ interface(`policykit_domtrans_grant',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > diff --git a/policy/modules/services/portmap.if b/policy/modules/services/portmap.if > index af55ca0..374afcf 100644 > --- a/policy/modules/services/portmap.if > +++ b/policy/modules/services/portmap.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -27,7 +27,7 @@ interface(`portmap_domtrans_helper',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > diff --git a/policy/modules/services/postfix.if b/policy/modules/services/postfix.if > index 378cee1..c48b45b 100644 > --- a/policy/modules/services/postfix.if > +++ b/policy/modules/services/postfix.if > @@ -263,7 +263,7 @@ interface(`postfix_rw_local_pipes',` > ## > ## > ## > -## Domain to not audit. > +## Domain allowed access. > ## > ## > # > @@ -281,7 +281,7 @@ interface(`postfix_read_local_state',` > ## > ## > ## > -## Domain to not audit. > +## Domain allowed access. > ## > ## > # > @@ -319,7 +319,7 @@ interface(`postfix_dontaudit_use_fds',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -338,7 +338,7 @@ interface(`postfix_domtrans_map',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > @@ -364,7 +364,7 @@ interface(`postfix_run_map',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -421,7 +421,7 @@ interface(`postfix_stream_connect_master',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -440,7 +440,7 @@ interface(`postfix_domtrans_postdrop',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -515,7 +515,7 @@ interface(`postfix_manage_private_sockets',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/postgresql.if b/policy/modules/services/postgresql.if > index 394031b..539a7c9 100644 > --- a/policy/modules/services/postgresql.if > +++ b/policy/modules/services/postgresql.if > @@ -223,7 +223,7 @@ interface(`postgresql_manage_db',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -241,7 +241,7 @@ interface(`postgresql_domtrans',` > ## > ## > ## > -## Domain to not audit. > +## Domain allowed access. > ## > ## > # > diff --git a/policy/modules/services/postgrey.if b/policy/modules/services/postgrey.if > index 3927880..ad15fde 100644 > --- a/policy/modules/services/postgrey.if > +++ b/policy/modules/services/postgrey.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed to talk to postgrey > +## Domain allowed access. > ## > ## > # > @@ -26,7 +26,7 @@ interface(`postgrey_stream_connect',` > ## > ## > ## > -## Domain allowed access > +## Domain allowed access. > ## > ## > # > diff --git a/policy/modules/services/ppp.if b/policy/modules/services/ppp.if > index 4789268..b524673 100644 > --- a/policy/modules/services/ppp.if > +++ b/policy/modules/services/ppp.if > @@ -117,7 +117,7 @@ interface(`ppp_signull',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -136,7 +136,7 @@ interface(`ppp_domtrans',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > @@ -164,7 +164,7 @@ interface(`ppp_run_cond',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > @@ -326,7 +326,7 @@ interface(`ppp_pid_filetrans',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/prelude.if b/policy/modules/services/prelude.if > index 737be4f..2316653 100644 > --- a/policy/modules/services/prelude.if > +++ b/policy/modules/services/prelude.if > @@ -79,7 +79,7 @@ interface(`prelude_read_spool',` > ## > ## > ## > -## Domain allowed to transition. > +## Domain allowed access. > ## > ## > # > diff --git a/policy/modules/services/procmail.if b/policy/modules/services/procmail.if > index f68e025..b64b02f 100644 > --- a/policy/modules/services/procmail.if > +++ b/policy/modules/services/procmail.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/puppet.if b/policy/modules/services/puppet.if > index 34946a2..2855a44 100644 > --- a/policy/modules/services/puppet.if > +++ b/policy/modules/services/puppet.if > @@ -17,7 +17,7 @@ > ## > ## > ## > -## Domain allowed access > +## Domain allowed access. > ## > ## > # > diff --git a/policy/modules/services/pyzor.if b/policy/modules/services/pyzor.if > index 3745b62..494f7e2 100644 > --- a/policy/modules/services/pyzor.if > +++ b/policy/modules/services/pyzor.if > @@ -55,7 +55,7 @@ interface(`pyzor_signal',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/qmail.if b/policy/modules/services/qmail.if > index 27fd19e..a55bf44 100644 > --- a/policy/modules/services/qmail.if > +++ b/policy/modules/services/qmail.if > @@ -53,7 +53,7 @@ template(`qmail_child_domain_template',` > ## > ## > ## > -## Domain allowed access > +## Domain allowed to transition. > ## > ## > # > @@ -79,7 +79,7 @@ interface(`qmail_domtrans_inject',` > ## > ## > ## > -## Domain allowed access > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/razor.if b/policy/modules/services/razor.if > index f4a355f..f04a595 100644 > --- a/policy/modules/services/razor.if > +++ b/policy/modules/services/razor.if > @@ -146,7 +146,7 @@ interface(`razor_role',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/remotelogin.if b/policy/modules/services/remotelogin.if > index 114f2c2..31be971 100644 > --- a/policy/modules/services/remotelogin.if > +++ b/policy/modules/services/remotelogin.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/rgmanager.if b/policy/modules/services/rgmanager.if > index 4504355..7dc38d1 100644 > --- a/policy/modules/services/rgmanager.if > +++ b/policy/modules/services/rgmanager.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/rhcs.if b/policy/modules/services/rhcs.if > index 6b7eb35..de37806 100644 > --- a/policy/modules/services/rhcs.if > +++ b/policy/modules/services/rhcs.if > @@ -120,7 +120,7 @@ interface(`rhcs_rw_dlm_controld_semaphores',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -180,7 +180,7 @@ interface(`rhcs_stream_connect_fenced',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -260,7 +260,7 @@ interface(`rhcs_stream_connect_gfs_controld',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -341,7 +341,7 @@ interface(`rhcs_rw_groupd_shm',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/rhgb.if b/policy/modules/services/rhgb.if > index 46681c8..96efae7 100644 > --- a/policy/modules/services/rhgb.if > +++ b/policy/modules/services/rhgb.if > @@ -95,7 +95,7 @@ interface(`rhgb_rw_stream_sockets',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > @@ -167,7 +167,7 @@ interface(`rhgb_use_ptys',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > diff --git a/policy/modules/services/rlogin.if b/policy/modules/services/rlogin.if > index ba3364d..63e78c6 100644 > --- a/policy/modules/services/rlogin.if > +++ b/policy/modules/services/rlogin.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/rpc.if b/policy/modules/services/rpc.if > index 005f516..cda37bb 100644 > --- a/policy/modules/services/rpc.if > +++ b/policy/modules/services/rpc.if > @@ -143,7 +143,7 @@ interface(`rpc_udp_send',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > @@ -197,7 +197,7 @@ interface(`rpc_write_exports',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -215,7 +215,7 @@ interface(`rpc_domtrans_nfsd',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -233,7 +233,7 @@ interface(`rpc_initrc_domtrans_nfsd',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -252,7 +252,7 @@ interface(`rpc_domtrans_rpcd',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/rshd.if b/policy/modules/services/rshd.if > index 92bcded..2e87d76 100644 > --- a/policy/modules/services/rshd.if > +++ b/policy/modules/services/rshd.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/rsync.if b/policy/modules/services/rsync.if > index 6a2d345..3386f29 100644 > --- a/policy/modules/services/rsync.if > +++ b/policy/modules/services/rsync.if > @@ -35,7 +35,7 @@ interface(`rsync_entry_type',` > ## > ## > ## > -## Domain to transition from. > +## Domain allowed to transition. > ## > ## > ## > @@ -68,7 +68,7 @@ interface(`rsync_entry_spec_domtrans',` > ## > ## > ## > -## Domain to transition from. > +## Domain allowed to transition. > ## > ## > ## > @@ -110,7 +110,7 @@ interface(`rsync_exec',` > ## > ## > ## > -## Domain allowed. > +## Domain allowed access. > ## > ## > # > @@ -129,7 +129,7 @@ interface(`rsync_read_config',` > ## > ## > ## > -## Domain allowed. > +## Domain allowed access. > ## > ## > # > diff --git a/policy/modules/services/samba.if b/policy/modules/services/samba.if > index 6d974a7..82cb169 100644 > --- a/policy/modules/services/samba.if > +++ b/policy/modules/services/samba.if > @@ -10,7 +10,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -46,7 +46,7 @@ interface(`samba_signal_nmbd',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -64,7 +64,7 @@ interface(`samba_initrc_domtrans',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -84,7 +84,7 @@ interface(`samba_domtrans_net',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > @@ -109,7 +109,7 @@ interface(`samba_run_net',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -129,7 +129,7 @@ interface(`samba_domtrans_smbmount',` > ## > ## > ## > -## Domain allowed acces. > +## Domain allowed to transition. > ## > ## > ## > @@ -360,7 +360,7 @@ interface(`samba_read_var_files',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > @@ -440,7 +440,7 @@ interface(`samba_domtrans_smbcontrol',` > ## > ## > ## > -## Domain allowed access > +## Domain allowed to transition. > ## > ## > ## > @@ -464,7 +464,7 @@ interface(`samba_run_smbcontrol',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -554,7 +554,7 @@ interface(`samba_rw_smbmount_tcp_sockets',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -573,7 +573,7 @@ interface(`samba_domtrans_winbind_helper',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > diff --git a/policy/modules/services/sendmail.if b/policy/modules/services/sendmail.if > index e4f4051..7e94c7c 100644 > --- a/policy/modules/services/sendmail.if > +++ b/policy/modules/services/sendmail.if > @@ -23,7 +23,7 @@ interface(`sendmail_stub',` > ## > ## > ## > -## Domain to not audit. > +## Domain allowed access. > ## > ## > # > @@ -41,7 +41,7 @@ interface(`sendmail_rw_pipes',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -63,7 +63,7 @@ interface(`sendmail_domtrans',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > @@ -162,7 +162,7 @@ interface(`sendmail_rw_unix_stream_sockets',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > @@ -257,7 +257,7 @@ interface(`sendmail_manage_tmp_files',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -277,7 +277,7 @@ interface(`sendmail_domtrans_unconfined',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > diff --git a/policy/modules/services/setroubleshoot.if b/policy/modules/services/setroubleshoot.if > index c09053b..22dfeb4 100644 > --- a/policy/modules/services/setroubleshoot.if > +++ b/policy/modules/services/setroubleshoot.if > @@ -27,7 +27,7 @@ interface(`setroubleshoot_stream_connect',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > diff --git a/policy/modules/services/slrnpull.if b/policy/modules/services/slrnpull.if > index 66a80b3..d7e8289 100644 > --- a/policy/modules/services/slrnpull.if > +++ b/policy/modules/services/slrnpull.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## domain allowed access > +## Domain allowed access. > ## > ## > # > @@ -26,7 +26,7 @@ interface(`slrnpull_search_spool',` > ## > ## > ## > -## domain allowed access > +## Domain allowed access. > ## > ## > # > diff --git a/policy/modules/services/smartmon.if b/policy/modules/services/smartmon.if > index f3d8459..adea9f9 100644 > --- a/policy/modules/services/smartmon.if > +++ b/policy/modules/services/smartmon.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## The process type reading the temporary files. > +## Domain allowed access. > ## > ## > # > diff --git a/policy/modules/services/smokeping.if b/policy/modules/services/smokeping.if > index 6be6642..824d206 100644 > --- a/policy/modules/services/smokeping.if > +++ b/policy/modules/services/smokeping.if > @@ -24,7 +24,7 @@ interface(`smokeping_domtrans',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/spamassassin.if b/policy/modules/services/spamassassin.if > index d159ef3..c954f31 100644 > --- a/policy/modules/services/spamassassin.if > +++ b/policy/modules/services/spamassassin.if > @@ -101,7 +101,7 @@ interface(`spamassassin_exec_spamd',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -138,7 +138,7 @@ interface(`spamassassin_exec_client',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/squid.if b/policy/modules/services/squid.if > index 2fe24de..d2496bd 100644 > --- a/policy/modules/services/squid.if > +++ b/policy/modules/services/squid.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/ssh.if b/policy/modules/services/ssh.if > index 567592d..5437ffb 100644 > --- a/policy/modules/services/ssh.if > +++ b/policy/modules/services/ssh.if > @@ -572,7 +572,7 @@ interface(`ssh_tcp_connect',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -668,7 +668,7 @@ interface(`ssh_read_user_home_files',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -686,7 +686,7 @@ interface(`ssh_domtrans_keygen',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > diff --git a/policy/modules/services/sssd.if b/policy/modules/services/sssd.if > index 5eff513..941380a 100644 > --- a/policy/modules/services/sssd.if > +++ b/policy/modules/services/sssd.if > @@ -24,7 +24,7 @@ interface(`sssd_domtrans',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/tcpd.if b/policy/modules/services/tcpd.if > index 9de6298..2075ebb 100644 > --- a/policy/modules/services/tcpd.if > +++ b/policy/modules/services/tcpd.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/ulogd.if b/policy/modules/services/ulogd.if > index d04b833..b078bf7 100644 > --- a/policy/modules/services/ulogd.if > +++ b/policy/modules/services/ulogd.if > @@ -66,7 +66,7 @@ interface(`ulogd_read_log',` > ## > ## > ## > -## Domain allowed to transition. > +## Domain allowed access. > ## > ## > # > diff --git a/policy/modules/services/uucp.if b/policy/modules/services/uucp.if > index 36b936a..a4fbe31 100644 > --- a/policy/modules/services/uucp.if > +++ b/policy/modules/services/uucp.if > @@ -49,7 +49,7 @@ interface(`uucp_manage_spool',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/uwimap.if b/policy/modules/services/uwimap.if > index 4334b28..8337684 100644 > --- a/policy/modules/services/uwimap.if > +++ b/policy/modules/services/uwimap.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/varnishd.if b/policy/modules/services/varnishd.if > index 597679d..b4d90ac 100644 > --- a/policy/modules/services/varnishd.if > +++ b/policy/modules/services/varnishd.if > @@ -6,7 +6,7 @@ > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > diff --git a/policy/modules/services/vhostmd.if b/policy/modules/services/vhostmd.if > index a10dc80..1f872b5 100644 > --- a/policy/modules/services/vhostmd.if > +++ b/policy/modules/services/vhostmd.if > @@ -24,7 +24,7 @@ interface(`vhostmd_domtrans',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -42,7 +42,7 @@ interface(`vhostmd_initrc_domtrans',` > ## > ## > ## > -## Domain to not audit. > +## Domain allowed access. > ## > ## > # > @@ -80,7 +80,7 @@ interface(`vhostmd_dontaudit_read_tmpfs_files',` > ## > ## > ## > -## Domain to not audit. > +## Domain allowed access. > ## > ## > # > @@ -99,7 +99,7 @@ interface(`vhostmd_rw_tmpfs_files',` > ## > ## > ## > -## Domain to not audit. > +## Domain allowed access. > ## > ## > # > @@ -175,7 +175,7 @@ interface(`vhostmd_stream_connect',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > diff --git a/policy/modules/services/virt.if b/policy/modules/services/virt.if > index 7bb17f6..7c5d8d8 100644 > --- a/policy/modules/services/virt.if > +++ b/policy/modules/services/virt.if > @@ -200,7 +200,7 @@ interface(`virt_manage_config',` > ## > ## > ## > -## Domain to not audit. > +## Domain allowed access. > ## > ## > # > @@ -353,7 +353,7 @@ interface(`virt_read_log',` > ## > ## > ## > -## Domain allowed to transition. > +## Domain allowed access. > ## > ## > # > @@ -372,7 +372,7 @@ interface(`virt_append_log',` > ## > ## > ## > -## Domain to not audit. > +## Domain allowed access. > ## > ## > # > @@ -392,7 +392,7 @@ interface(`virt_manage_log',` > ## > ## > ## > -## Domain to not audit. > +## Domain allowed access. > ## > ## > # > @@ -450,7 +450,7 @@ interface(`virt_manage_svirt_cache',` > ## > ## > ## > -## Domain to not audit. > +## Domain allowed access. > ## > ## > # > diff --git a/policy/modules/services/xserver.if b/policy/modules/services/xserver.if > index 3b31efb..da2601a 100644 > --- a/policy/modules/services/xserver.if > +++ b/policy/modules/services/xserver.if > @@ -535,7 +535,7 @@ interface(`xserver_use_user_fonts',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -864,7 +864,7 @@ interface(`xserver_xsession_entry_type',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > ## > @@ -1061,7 +1061,7 @@ interface(`xserver_dontaudit_getattr_xdm_tmp_sockets',` > ## > ## > ## > -## Domain allowed access. > +## Domain allowed to transition. > ## > ## > # > @@ -1155,7 +1155,7 @@ interface(`xserver_dontaudit_rw_tcp_sockets',` > ## > ## > ## > -## Domain allowed access. > +## Domain to not audit. > ## > ## > # > diff --git a/policy/modules/services/zosremote.if b/policy/modules/services/zosremote.if > index 6a5acd5..702e768 100644 > --- a/policy/modules/services/zosremote.if > +++ b/policy/modules/services/zosremote.if > @@ -26,7 +26,7 @@ interface(`zosremote_domtrans',` > ## > ## > ## > -## Domain allowed access > +## Domain allowed to transition. > ## > ## > ## > > > > _______________________________________________ > refpolicy mailing list > refpolicy at oss.tresys.com > http://oss.tresys.com/mailman/listinfo/refpolicy -- Chris PeBenito Tresys Technology, LLC www.tresys.com | oss.tresys.com