[selinux-policy: 2792/3172] Docs standardizing on the role portion of run interfaces. Additional docs cleanup.

Daniel J Walsh dwalsh at fedoraproject.org
Thu Oct 7 23:08:30 UTC 2010


commit a7ee7f819a7a4d8014d4707457e9f7e94e95889a
Author: Chris PeBenito <cpebenito at tresys.com>
Date:   Tue Aug 3 09:20:22 2010 -0400

    Docs standardizing on the role portion of run interfaces.  Additional docs cleanup.

 policy/modules/admin/amanda.if          |    2 +-
 policy/modules/admin/amtu.if            |    2 +-
 policy/modules/admin/backup.if          |    2 +-
 policy/modules/admin/bootloader.if      |    2 +-
 policy/modules/admin/certwatch.if       |    4 ++--
 policy/modules/admin/consoletype.if     |    2 +-
 policy/modules/admin/dmidecode.if       |    2 +-
 policy/modules/admin/firstboot.if       |    2 +-
 policy/modules/admin/kismet.if          |    2 +-
 policy/modules/admin/kudzu.if           |    2 +-
 policy/modules/admin/logrotate.if       |    6 +++---
 policy/modules/admin/netutils.if        |   10 +++++-----
 policy/modules/admin/quota.if           |    2 +-
 policy/modules/admin/shutdown.if        |    2 +-
 policy/modules/admin/tripwire.if        |    8 ++++----
 policy/modules/admin/usbmodules.if      |    2 +-
 policy/modules/admin/usermanage.if      |   14 +++++++-------
 policy/modules/admin/vbetool.if         |    2 +-
 policy/modules/admin/vpn.if             |    2 +-
 policy/modules/apps/ada.if              |    2 +-
 policy/modules/apps/java.if             |    2 +-
 policy/modules/apps/mono.if             |    2 +-
 policy/modules/apps/podsleuth.if        |    2 +-
 policy/modules/apps/ptchown.if          |    2 +-
 policy/modules/apps/pulseaudio.if       |    2 +-
 policy/modules/apps/usernetctl.if       |    2 +-
 policy/modules/apps/webalizer.if        |    2 +-
 policy/modules/apps/wine.if             |    2 +-
 policy/modules/apps/yam.if              |    2 +-
 policy/modules/kernel/corenetwork.if.in |    8 ++++----
 policy/modules/kernel/kernel.if         |    2 +-
 policy/modules/kernel/storage.if        |   14 +++++++-------
 policy/modules/kernel/terminal.if       |   16 ++++++++--------
 policy/modules/services/apache.if       |    2 +-
 policy/modules/services/bind.if         |    2 +-
 policy/modules/services/bluetooth.if    |    2 +-
 policy/modules/services/clockspeed.if   |    2 +-
 policy/modules/services/dcc.if          |    6 +++---
 policy/modules/services/gnomeclock.if   |    2 +-
 policy/modules/services/gpsd.if         |    2 +-
 policy/modules/services/hal.if          |    2 +-
 policy/modules/services/lpd.if          |    2 +-
 policy/modules/services/nis.if          |    2 +-
 policy/modules/services/nscd.if         |    2 +-
 policy/modules/services/oav.if          |    2 +-
 policy/modules/services/openvpn.if      |    2 +-
 policy/modules/services/policykit.if    |    4 ++--
 policy/modules/services/portmap.if      |    2 +-
 policy/modules/services/postfix.if      |    2 +-
 policy/modules/services/ricci.if        |    4 ++--
 policy/modules/services/samba.if        |    8 ++++----
 policy/modules/services/xserver.if      |   30 +++++++++++++++---------------
 policy/modules/services/zosremote.if    |    2 +-
 policy/modules/system/clock.if          |    2 +-
 policy/modules/system/fstools.if        |    2 +-
 policy/modules/system/hostname.if       |    2 +-
 policy/modules/system/ipsec.if          |    2 +-
 policy/modules/system/iptables.if       |    2 +-
 policy/modules/system/logging.if        |    4 ++--
 policy/modules/system/modutils.if       |    6 +++---
 policy/modules/system/mount.if          |    4 ++--
 policy/modules/system/netlabel.if       |    2 +-
 policy/modules/system/pcmcia.if         |    2 +-
 policy/modules/system/selinuxutil.if    |   16 ++++++++--------
 policy/modules/system/sysnetwork.if     |    4 ++--
 policy/modules/system/userdomain.if     |    4 ++--
 66 files changed, 132 insertions(+), 132 deletions(-)
---
diff --git a/policy/modules/admin/amanda.if b/policy/modules/admin/amanda.if
index d99f058..90bef9e 100644
--- a/policy/modules/admin/amanda.if
+++ b/policy/modules/admin/amanda.if
@@ -30,7 +30,7 @@ interface(`amanda_domtrans_recover',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the amanda_recover domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/admin/amtu.if b/policy/modules/admin/amtu.if
index 18e3bc6..722175d 100644
--- a/policy/modules/admin/amtu.if
+++ b/policy/modules/admin/amtu.if
@@ -31,7 +31,7 @@ interface(`amtu_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the amtu domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/admin/backup.if b/policy/modules/admin/backup.if
index c0b4205..cb1bdb3 100644
--- a/policy/modules/admin/backup.if
+++ b/policy/modules/admin/backup.if
@@ -30,7 +30,7 @@ interface(`backup_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the backup domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/admin/bootloader.if b/policy/modules/admin/bootloader.if
index da8b00b..25ffe4d 100644
--- a/policy/modules/admin/bootloader.if
+++ b/policy/modules/admin/bootloader.if
@@ -30,7 +30,7 @@ interface(`bootloader_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the bootloader domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/admin/certwatch.if b/policy/modules/admin/certwatch.if
index 3f45dfe..563cae9 100644
--- a/policy/modules/admin/certwatch.if
+++ b/policy/modules/admin/certwatch.if
@@ -34,7 +34,7 @@ interface(`certwatch_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the certwatch domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -62,7 +62,7 @@ interface(`certwatch_run',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the certwatch domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <param name="terminal">
diff --git a/policy/modules/admin/consoletype.if b/policy/modules/admin/consoletype.if
index daa6eb3..2f75a75 100644
--- a/policy/modules/admin/consoletype.if
+++ b/policy/modules/admin/consoletype.if
@@ -37,7 +37,7 @@ interface(`consoletype_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the consoletype domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/admin/dmidecode.if b/policy/modules/admin/dmidecode.if
index 331ff4c..d9f6ff2 100644
--- a/policy/modules/admin/dmidecode.if
+++ b/policy/modules/admin/dmidecode.if
@@ -35,7 +35,7 @@ interface(`dmidecode_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the dmidecode domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/admin/firstboot.if b/policy/modules/admin/firstboot.if
index 83512c9..b65ebdb 100644
--- a/policy/modules/admin/firstboot.if
+++ b/policy/modules/admin/firstboot.if
@@ -33,7 +33,7 @@ interface(`firstboot_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the firstboot domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/admin/kismet.if b/policy/modules/admin/kismet.if
index b630279..52f2545 100644
--- a/policy/modules/admin/kismet.if
+++ b/policy/modules/admin/kismet.if
@@ -31,7 +31,7 @@ interface(`kismet_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the kismet domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/admin/kudzu.if b/policy/modules/admin/kudzu.if
index 1aeff55..585cd64 100644
--- a/policy/modules/admin/kudzu.if
+++ b/policy/modules/admin/kudzu.if
@@ -30,7 +30,7 @@ interface(`kudzu_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the kudzu domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/admin/logrotate.if b/policy/modules/admin/logrotate.if
index b3aa19e..fa1c236 100644
--- a/policy/modules/admin/logrotate.if
+++ b/policy/modules/admin/logrotate.if
@@ -30,7 +30,7 @@ interface(`logrotate_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the logrotate domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -86,7 +86,7 @@ interface(`logrotate_use_fds',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -104,7 +104,7 @@ interface(`logrotate_dontaudit_use_fds',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/admin/netutils.if b/policy/modules/admin/netutils.if
index 0ab5f13..0bd526e 100644
--- a/policy/modules/admin/netutils.if
+++ b/policy/modules/admin/netutils.if
@@ -30,7 +30,7 @@ interface(`netutils_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the netutils domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -146,7 +146,7 @@ interface(`netutils_signal_ping',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the ping domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -172,7 +172,7 @@ interface(`netutils_run_ping',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the ping domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -238,7 +238,7 @@ interface(`netutils_domtrans_traceroute',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the traceroute domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -264,7 +264,7 @@ interface(`netutils_run_traceroute',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the traceroute domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/admin/quota.if b/policy/modules/admin/quota.if
index d50f2f5..fd8568e 100644
--- a/policy/modules/admin/quota.if
+++ b/policy/modules/admin/quota.if
@@ -30,7 +30,7 @@ interface(`quota_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the quota domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/admin/shutdown.if b/policy/modules/admin/shutdown.if
index efb18c0..d26bad6 100644
--- a/policy/modules/admin/shutdown.if
+++ b/policy/modules/admin/shutdown.if
@@ -35,7 +35,7 @@ interface(`shutdown_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the shutdown domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/admin/tripwire.if b/policy/modules/admin/tripwire.if
index d23d02a..f623209 100644
--- a/policy/modules/admin/tripwire.if
+++ b/policy/modules/admin/tripwire.if
@@ -43,7 +43,7 @@ interface(`tripwire_domtrans_tripwire',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the tripwire domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -87,7 +87,7 @@ interface(`tripwire_domtrans_twadmin',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the twadmin domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -131,7 +131,7 @@ interface(`tripwire_domtrans_twprint',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the twprint domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -175,7 +175,7 @@ interface(`tripwire_domtrans_siggen',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the siggen domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/admin/usbmodules.if b/policy/modules/admin/usbmodules.if
index d673f10..eba81e2 100644
--- a/policy/modules/admin/usbmodules.if
+++ b/policy/modules/admin/usbmodules.if
@@ -31,7 +31,7 @@ interface(`usbmodules_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the usbmodules domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/admin/usermanage.if b/policy/modules/admin/usermanage.if
index 8702699..dd6ab1b 100644
--- a/policy/modules/admin/usermanage.if
+++ b/policy/modules/admin/usermanage.if
@@ -36,7 +36,7 @@ interface(`usermanage_domtrans_chfn',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the chfn domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
@@ -85,7 +85,7 @@ interface(`usermanage_domtrans_groupadd',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the groupadd domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -157,7 +157,7 @@ interface(`usermanage_kill_passwd',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the passwd domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
@@ -205,7 +205,7 @@ interface(`usermanage_domtrans_admin_passwd',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the admin passwd domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -225,11 +225,11 @@ interface(`usermanage_run_admin_passwd',`
 
 ########################################
 ## <summary>
-##	Dontaudit attempts to use useradd fds
+##	Do not audit attempts to use useradd fds.
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain allowed access.
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -277,7 +277,7 @@ interface(`usermanage_domtrans_useradd',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the useradd domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/admin/vbetool.if b/policy/modules/admin/vbetool.if
index 2dc9f53..273d01d 100644
--- a/policy/modules/admin/vbetool.if
+++ b/policy/modules/admin/vbetool.if
@@ -31,7 +31,7 @@ interface(`vbetool_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the vbetool domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/admin/vpn.if b/policy/modules/admin/vpn.if
index ccda6e4..7ed042a 100644
--- a/policy/modules/admin/vpn.if
+++ b/policy/modules/admin/vpn.if
@@ -30,7 +30,7 @@ interface(`vpn_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the vpnc domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/apps/ada.if b/policy/modules/apps/ada.if
index 3f3bbe0..1baf39f 100644
--- a/policy/modules/apps/ada.if
+++ b/policy/modules/apps/ada.if
@@ -31,7 +31,7 @@ interface(`ada_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the ada domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/apps/java.if b/policy/modules/apps/java.if
index 9bb8f31..88fd48a 100644
--- a/policy/modules/apps/java.if
+++ b/policy/modules/apps/java.if
@@ -125,7 +125,7 @@ template(`java_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the java domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/apps/mono.if b/policy/modules/apps/mono.if
index a6af322..f78a370 100644
--- a/policy/modules/apps/mono.if
+++ b/policy/modules/apps/mono.if
@@ -87,7 +87,7 @@ interface(`mono_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the mono domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/apps/podsleuth.if b/policy/modules/apps/podsleuth.if
index 60b8bc2..b3acdea 100644
--- a/policy/modules/apps/podsleuth.if
+++ b/policy/modules/apps/podsleuth.if
@@ -31,7 +31,7 @@ interface(`podsleuth_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the podsleuth domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/apps/ptchown.if b/policy/modules/apps/ptchown.if
index f1c2698..2265537 100644
--- a/policy/modules/apps/ptchown.if
+++ b/policy/modules/apps/ptchown.if
@@ -30,7 +30,7 @@ interface(`ptchown_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the ptchown domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/apps/pulseaudio.if b/policy/modules/apps/pulseaudio.if
index 9ebb373..c78c530 100644
--- a/policy/modules/apps/pulseaudio.if
+++ b/policy/modules/apps/pulseaudio.if
@@ -69,7 +69,7 @@ interface(`pulseaudio_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the pulseaudio domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/apps/usernetctl.if b/policy/modules/apps/usernetctl.if
index cc4609c..e1771fa 100644
--- a/policy/modules/apps/usernetctl.if
+++ b/policy/modules/apps/usernetctl.if
@@ -30,7 +30,7 @@ interface(`usernetctl_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the usernetctl domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/apps/webalizer.if b/policy/modules/apps/webalizer.if
index dac920d..a79f537 100644
--- a/policy/modules/apps/webalizer.if
+++ b/policy/modules/apps/webalizer.if
@@ -30,7 +30,7 @@ interface(`webalizer_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the webalizer domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/apps/wine.if b/policy/modules/apps/wine.if
index f5217b8..4e6386f 100644
--- a/policy/modules/apps/wine.if
+++ b/policy/modules/apps/wine.if
@@ -141,7 +141,7 @@ interface(`wine_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the wine domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/apps/yam.if b/policy/modules/apps/yam.if
index 5fb7790..5cc2de6 100644
--- a/policy/modules/apps/yam.if
+++ b/policy/modules/apps/yam.if
@@ -31,7 +31,7 @@ interface(`yam_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the yam domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/kernel/corenetwork.if.in b/policy/modules/kernel/corenetwork.if.in
index bda5e34..b06df19 100644
--- a/policy/modules/kernel/corenetwork.if.in
+++ b/policy/modules/kernel/corenetwork.if.in
@@ -1722,7 +1722,7 @@ interface(`corenet_tcp_bind_all_reserved_ports',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -1759,7 +1759,7 @@ interface(`corenet_udp_bind_all_reserved_ports',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -1999,7 +1999,7 @@ interface(`corenet_tcp_bind_all_rpc_ports',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -2036,7 +2036,7 @@ interface(`corenet_udp_bind_all_rpc_ports',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/kernel/kernel.if b/policy/modules/kernel/kernel.if
index 547fcf4..b46db36 100644
--- a/policy/modules/kernel/kernel.if
+++ b/policy/modules/kernel/kernel.if
@@ -222,7 +222,7 @@ interface(`kernel_use_fds',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/kernel/storage.if b/policy/modules/kernel/storage.if
index 7b8a19c..d7ca7b2 100644
--- a/policy/modules/kernel/storage.if
+++ b/policy/modules/kernel/storage.if
@@ -27,7 +27,7 @@ interface(`storage_getattr_fixed_disk_dev',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -67,7 +67,7 @@ interface(`storage_setattr_fixed_disk_dev',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -111,7 +111,7 @@ interface(`storage_raw_read_fixed_disk',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -538,7 +538,7 @@ interface(`storage_getattr_removable_dev',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -557,7 +557,7 @@ interface(`storage_dontaudit_getattr_removable_dev',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -577,7 +577,7 @@ interface(`storage_dontaudit_read_removable_device',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -616,7 +616,7 @@ interface(`storage_setattr_removable_dev',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/kernel/terminal.if b/policy/modules/kernel/terminal.if
index f623b72..4d9d592 100644
--- a/policy/modules/kernel/terminal.if
+++ b/policy/modules/kernel/terminal.if
@@ -382,7 +382,7 @@ interface(`term_getattr_pty_fs',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -460,7 +460,7 @@ interface(`term_list_ptys',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -479,7 +479,7 @@ interface(`term_dontaudit_list_ptys',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -498,7 +498,7 @@ interface(`term_dontaudit_manage_pty_dirs',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -600,7 +600,7 @@ interface(`term_use_generic_ptys',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -696,7 +696,7 @@ interface(`term_use_ptmx',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -975,7 +975,7 @@ interface(`term_use_all_user_ptys',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -1206,7 +1206,7 @@ interface(`term_use_unallocated_ttys',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/services/apache.if b/policy/modules/services/apache.if
index 57feb5a..223bfc2 100644
--- a/policy/modules/services/apache.if
+++ b/policy/modules/services/apache.if
@@ -916,7 +916,7 @@ interface(`apache_domtrans_all_scripts',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the script domains.
+##	Role allowed access..
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/services/bind.if b/policy/modules/services/bind.if
index ec677f6..5d3c891 100644
--- a/policy/modules/services/bind.if
+++ b/policy/modules/services/bind.if
@@ -102,7 +102,7 @@ interface(`bind_kill',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the bind domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/services/bluetooth.if b/policy/modules/services/bluetooth.if
index fa38f57..d17e012 100644
--- a/policy/modules/services/bluetooth.if
+++ b/policy/modules/services/bluetooth.if
@@ -141,7 +141,7 @@ interface(`bluetooth_domtrans_helper',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the bluetooth_helper domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <param name="terminal">
diff --git a/policy/modules/services/clockspeed.if b/policy/modules/services/clockspeed.if
index 7762be6..9e3f911 100644
--- a/policy/modules/services/clockspeed.if
+++ b/policy/modules/services/clockspeed.if
@@ -29,7 +29,7 @@ interface(`clockspeed_domtrans_cli',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the clockspeed_cli domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/services/dcc.if b/policy/modules/services/dcc.if
index 7073379..ffce351 100644
--- a/policy/modules/services/dcc.if
+++ b/policy/modules/services/dcc.if
@@ -31,7 +31,7 @@ interface(`dcc_domtrans_cdcc',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the cdcc domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -94,7 +94,7 @@ interface(`dcc_signal_client',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the dcc_client domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -139,7 +139,7 @@ interface(`dcc_domtrans_dbclean',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the dcc_dbclean domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/services/gnomeclock.if b/policy/modules/services/gnomeclock.if
index 716006b..3da830b 100644
--- a/policy/modules/services/gnomeclock.if
+++ b/policy/modules/services/gnomeclock.if
@@ -30,7 +30,7 @@ interface(`gnomeclock_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the gnomeclock domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/services/gpsd.if b/policy/modules/services/gpsd.if
index 39fc12f..8fe31eb 100644
--- a/policy/modules/services/gpsd.if
+++ b/policy/modules/services/gpsd.if
@@ -30,7 +30,7 @@ interface(`gpsd_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the gpsd domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/services/hal.if b/policy/modules/services/hal.if
index 2aa3808..3707830 100644
--- a/policy/modules/services/hal.if
+++ b/policy/modules/services/hal.if
@@ -287,7 +287,7 @@ interface(`hal_write_log',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/services/lpd.if b/policy/modules/services/lpd.if
index c358cd7..d29dfdf 100644
--- a/policy/modules/services/lpd.if
+++ b/policy/modules/services/lpd.if
@@ -64,7 +64,7 @@ interface(`lpd_domtrans_checkpc',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the lpd domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/services/nis.if b/policy/modules/services/nis.if
index b9e7d40..c7db858 100644
--- a/policy/modules/services/nis.if
+++ b/policy/modules/services/nis.if
@@ -143,7 +143,7 @@ interface(`nis_domtrans_ypbind',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the ypbind domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/services/nscd.if b/policy/modules/services/nscd.if
index 429bd9f..a63a657 100644
--- a/policy/modules/services/nscd.if
+++ b/policy/modules/services/nscd.if
@@ -221,7 +221,7 @@ interface(`nscd_unconfined',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the nscd domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/services/oav.if b/policy/modules/services/oav.if
index 2102b0b..d44783f 100644
--- a/policy/modules/services/oav.if
+++ b/policy/modules/services/oav.if
@@ -31,7 +31,7 @@ interface(`oav_domtrans_update',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the oav_update domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/services/openvpn.if b/policy/modules/services/openvpn.if
index aab6297..ae74460 100644
--- a/policy/modules/services/openvpn.if
+++ b/policy/modules/services/openvpn.if
@@ -30,7 +30,7 @@ interface(`openvpn_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the openvpn domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/services/policykit.if b/policy/modules/services/policykit.if
index 4dbbc70..2ccacfa 100644
--- a/policy/modules/services/policykit.if
+++ b/policy/modules/services/policykit.if
@@ -51,7 +51,7 @@ interface(`policykit_domtrans_auth',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the load_policy domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
@@ -94,7 +94,7 @@ interface(`policykit_domtrans_grant',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the load_policy domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/services/portmap.if b/policy/modules/services/portmap.if
index 9901e89..af55ca0 100644
--- a/policy/modules/services/portmap.if
+++ b/policy/modules/services/portmap.if
@@ -32,7 +32,7 @@ interface(`portmap_domtrans_helper',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the portmap domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/services/postfix.if b/policy/modules/services/postfix.if
index ec895ee..378cee1 100644
--- a/policy/modules/services/postfix.if
+++ b/policy/modules/services/postfix.if
@@ -343,7 +343,7 @@ interface(`postfix_domtrans_map',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the postfix_map domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/services/ricci.if b/policy/modules/services/ricci.if
index 700467c..f7826f9 100644
--- a/policy/modules/services/ricci.if
+++ b/policy/modules/services/ricci.if
@@ -43,7 +43,7 @@ interface(`ricci_domtrans_modcluster',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -62,7 +62,7 @@ interface(`ricci_dontaudit_use_modcluster_fds',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/services/samba.if b/policy/modules/services/samba.if
index 086c9b5..6d974a7 100644
--- a/policy/modules/services/samba.if
+++ b/policy/modules/services/samba.if
@@ -89,7 +89,7 @@ interface(`samba_domtrans_net',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the samba_net domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -134,7 +134,7 @@ interface(`samba_domtrans_smbmount',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the smbmount domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -445,7 +445,7 @@ interface(`samba_domtrans_smbcontrol',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the smbcontrol domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
@@ -578,7 +578,7 @@ interface(`samba_domtrans_winbind_helper',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the winbind_helper domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/services/xserver.if b/policy/modules/services/xserver.if
index 8633a6a..3b31efb 100644
--- a/policy/modules/services/xserver.if
+++ b/policy/modules/services/xserver.if
@@ -907,7 +907,7 @@ interface(`xserver_getattr_log',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -921,12 +921,11 @@ interface(`xserver_dontaudit_write_log',`
 
 ########################################
 ## <summary>
-##	Do not audit attempts to write the X server
-##	log files.
+##	Delete X server log files.
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain allowed access.
 ##	</summary>
 ## </param>
 #
@@ -947,7 +946,7 @@ interface(`xserver_delete_log',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain allowed access.
 ##	</summary>
 ## </param>
 #
@@ -968,7 +967,7 @@ interface(`xserver_read_xkb_libs',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain allowed access.
 ##	</summary>
 ## </param>
 #
@@ -987,7 +986,7 @@ interface(`xserver_read_xdm_tmp_files',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -1006,7 +1005,7 @@ interface(`xserver_dontaudit_read_xdm_tmp_files',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain allowed access.
 ##	</summary>
 ## </param>
 #
@@ -1025,7 +1024,7 @@ interface(`xserver_rw_xdm_tmp_files',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain allowed access.
 ##	</summary>
 ## </param>
 #
@@ -1039,11 +1038,12 @@ interface(`xserver_manage_xdm_tmp_files',`
 
 ########################################
 ## <summary>
-##	dontaudit getattr xdm temporary named sockets.
+##	Do not audit attempts to get the attributes of
+##	xdm temporary named sockets.
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -1080,7 +1080,7 @@ interface(`xserver_domtrans',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain allowed access.
 ##	</summary>
 ## </param>
 #
@@ -1098,7 +1098,7 @@ interface(`xserver_signal',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain allowed access.
 ##	</summary>
 ## </param>
 #
@@ -1136,7 +1136,7 @@ interface(`xserver_rw_shm',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -1193,7 +1193,7 @@ interface(`xserver_stream_connect',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/services/zosremote.if b/policy/modules/services/zosremote.if
index f2f2389..6a5acd5 100644
--- a/policy/modules/services/zosremote.if
+++ b/policy/modules/services/zosremote.if
@@ -31,7 +31,7 @@ interface(`zosremote_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the zos_remote domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/system/clock.if b/policy/modules/system/clock.if
index 4cf09f6..7bef600 100644
--- a/policy/modules/system/clock.if
+++ b/policy/modules/system/clock.if
@@ -30,7 +30,7 @@ interface(`clock_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the clock domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/system/fstools.if b/policy/modules/system/fstools.if
index 1c51b4b..7f2eb65 100644
--- a/policy/modules/system/fstools.if
+++ b/policy/modules/system/fstools.if
@@ -31,7 +31,7 @@ interface(`fstools_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the fs tools domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/system/hostname.if b/policy/modules/system/hostname.if
index 8fdea3b..748af7d 100644
--- a/policy/modules/system/hostname.if
+++ b/policy/modules/system/hostname.if
@@ -31,7 +31,7 @@ interface(`hostname_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the hostname domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/system/ipsec.if b/policy/modules/system/ipsec.if
index e0f0224..dbaf373 100644
--- a/policy/modules/system/ipsec.if
+++ b/policy/modules/system/ipsec.if
@@ -260,7 +260,7 @@ interface(`ipsec_domtrans_setkey',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the racoon and setkey domains.
+##	Role allowed access..
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/system/iptables.if b/policy/modules/system/iptables.if
index 6aca04d..b8acdd6 100644
--- a/policy/modules/system/iptables.if
+++ b/policy/modules/system/iptables.if
@@ -31,7 +31,7 @@ interface(`iptables_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the iptables domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/system/logging.if b/policy/modules/system/logging.if
index fa5684a..a1d5058 100644
--- a/policy/modules/system/logging.if
+++ b/policy/modules/system/logging.if
@@ -174,7 +174,7 @@ interface(`logging_domtrans_auditctl',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the auditctl domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -218,7 +218,7 @@ interface(`logging_domtrans_auditd',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the auditd domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
diff --git a/policy/modules/system/modutils.if b/policy/modules/system/modutils.if
index e1057e3..5e3e8b9 100644
--- a/policy/modules/system/modutils.if
+++ b/policy/modules/system/modutils.if
@@ -175,7 +175,7 @@ interface(`modutils_domtrans_insmod',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the insmod domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -238,7 +238,7 @@ interface(`modutils_domtrans_depmod',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the depmod domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -301,7 +301,7 @@ interface(`modutils_domtrans_update_mods',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the update_modules domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/system/mount.if b/policy/modules/system/mount.if
index d7e78ad..2dda55d 100644
--- a/policy/modules/system/mount.if
+++ b/policy/modules/system/mount.if
@@ -31,7 +31,7 @@ interface(`mount_domtrans',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the mount domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -164,7 +164,7 @@ interface(`mount_domtrans_unconfined',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the unconfined mount domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/system/netlabel.if b/policy/modules/system/netlabel.if
index b37cd5b..c0668b6 100644
--- a/policy/modules/system/netlabel.if
+++ b/policy/modules/system/netlabel.if
@@ -31,7 +31,7 @@ interface(`netlabel_domtrans_mgmt',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the netlabel_mgmt domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/system/pcmcia.if b/policy/modules/system/pcmcia.if
index ac2b18b..fffe97b 100644
--- a/policy/modules/system/pcmcia.if
+++ b/policy/modules/system/pcmcia.if
@@ -82,7 +82,7 @@ interface(`pcmcia_domtrans_cardctl',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the cardmgr domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/system/selinuxutil.if b/policy/modules/system/selinuxutil.if
index d37974c..95772b0 100644
--- a/policy/modules/system/selinuxutil.if
+++ b/policy/modules/system/selinuxutil.if
@@ -33,7 +33,7 @@ interface(`seutil_domtrans_checkpolicy',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the checkpolicy domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -100,7 +100,7 @@ interface(`seutil_domtrans_loadpolicy',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the load_policy domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -185,7 +185,7 @@ interface(`seutil_domtrans_newrole',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the newrole domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -333,7 +333,7 @@ interface(`seutil_domtrans_restorecon',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the restorecon domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -420,7 +420,7 @@ interface(`seutil_init_script_domtrans_runinit',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the run_init domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -461,7 +461,7 @@ interface(`seutil_run_runinit',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the run_init domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 #
@@ -529,7 +529,7 @@ interface(`seutil_domtrans_setfiles',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the setfiles domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -1020,7 +1020,7 @@ interface(`seutil_domtrans_semanage',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the checkpolicy domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/system/sysnetwork.if b/policy/modules/system/sysnetwork.if
index 938f800..3c2e445 100644
--- a/policy/modules/system/sysnetwork.if
+++ b/policy/modules/system/sysnetwork.if
@@ -31,7 +31,7 @@ interface(`sysnet_domtrans_dhcpc',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the clock domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
@@ -479,7 +479,7 @@ interface(`sysnet_domtrans_ifconfig',`
 ## </param>
 ## <param name="role">
 ##	<summary>
-##	The role to be allowed the ifconfig domain.
+##	Role allowed access.
 ##	</summary>
 ## </param>
 ## <rolecap/>
diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
index fafdd3d..4a50357 100644
--- a/policy/modules/system/userdomain.if
+++ b/policy/modules/system/userdomain.if
@@ -1438,7 +1438,7 @@ interface(`userdom_list_user_home_dirs',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #
@@ -1568,7 +1568,7 @@ interface(`userdom_user_home_domtrans',`
 ## </summary>
 ## <param name="domain">
 ##	<summary>
-##	Domain to not audit
+##	Domain to not audit.
 ##	</summary>
 ## </param>
 #


More information about the scm-commits mailing list