From a72e42f4853b8b911024e98772ed39b0f211f7b1 Mon Sep 17 00:00:00 2001 From: Chris PeBenito Date: Mon, 2 Aug 2010 09:22:09 -0400 Subject: [PATCH] Interface documentation standardization patch from Dan Walsh. --- policy/modules/admin/acct.if | 6 +- policy/modules/admin/amanda.if | 10 +- policy/modules/admin/apt.if | 16 +-- policy/modules/admin/backup.if | 2 +- policy/modules/admin/bootloader.if | 12 +-- policy/modules/admin/certwatch.if | 4 +- policy/modules/admin/consoletype.if | 6 +- policy/modules/admin/ddcprobe.if | 4 +- policy/modules/admin/dmesg.if | 4 +- policy/modules/admin/dmidecode.if | 2 +- policy/modules/admin/dpkg.if | 18 ++-- policy/modules/admin/firstboot.if | 10 +- policy/modules/admin/kudzu.if | 6 +- policy/modules/admin/logrotate.if | 10 +- policy/modules/admin/quota.if | 4 +- policy/modules/admin/rpm.if | 20 ++-- policy/modules/admin/tmpreaper.if | 2 +- policy/modules/admin/updfstab.if | 2 +- policy/modules/admin/usbmodules.if | 2 +- policy/modules/admin/usermanage.if | 22 ++-- policy/modules/apps/java.if | 2 +- policy/modules/apps/loadkeys.if | 6 +- policy/modules/apps/mono.if | 4 +- policy/modules/apps/userhelper.if | 2 +- policy/modules/apps/webalizer.if | 4 +- policy/modules/apps/wine.if | 2 +- policy/modules/kernel/corenetwork.if.in | 128 ++++++++++++------------ policy/modules/kernel/devices.if | 16 +-- policy/modules/kernel/files.if | 4 +- policy/modules/kernel/kernel.if | 2 +- policy/modules/kernel/storage.if | 60 +++++------ policy/modules/kernel/terminal.if | 16 +-- policy/modules/services/abrt.if | 4 +- policy/modules/services/afs.if | 2 +- policy/modules/services/apm.if | 4 +- policy/modules/services/automount.if | 2 +- policy/modules/services/avahi.if | 4 +- policy/modules/services/bluetooth.if | 6 +- policy/modules/services/certmonger.if | 2 +- policy/modules/services/cobbler.if | 2 +- policy/modules/services/cron.if | 2 +- policy/modules/services/cups.if | 6 +- policy/modules/services/denyhosts.if | 2 +- policy/modules/services/dhcp.if | 2 +- policy/modules/services/dnsmasq.if | 4 +- policy/modules/services/finger.if | 2 +- policy/modules/services/inetd.if | 4 +- policy/modules/services/lircd.if | 2 +- policy/modules/services/nis.if | 2 +- policy/modules/services/nscd.if | 2 +- policy/modules/services/nslcd.if | 2 +- policy/modules/services/ntp.if | 8 +- policy/modules/services/perdition.if | 2 +- policy/modules/services/portmap.if | 4 +- policy/modules/services/postgresql.if | 2 +- policy/modules/services/ppp.if | 2 +- policy/modules/services/remotelogin.if | 4 +- policy/modules/services/rhgb.if | 12 +-- policy/modules/services/ricci.if | 4 +- policy/modules/services/rlogin.if | 2 +- policy/modules/services/rpc.if | 12 +-- policy/modules/services/rshd.if | 2 +- policy/modules/services/samba.if | 18 ++-- policy/modules/services/spamassassin.if | 4 +- policy/modules/services/squid.if | 4 +- policy/modules/services/tcpd.if | 2 +- policy/modules/services/tuned.if | 2 +- policy/modules/services/varnishd.if | 4 +- policy/modules/services/vhostmd.if | 2 +- 69 files changed, 277 insertions(+), 277 deletions(-) diff --git a/policy/modules/admin/acct.if b/policy/modules/admin/acct.if index 9409a02b..d73c5150 100644 --- a/policy/modules/admin/acct.if +++ b/policy/modules/admin/acct.if @@ -25,7 +25,7 @@ interface(`acct_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -44,7 +44,7 @@ interface(`acct_exec',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -65,7 +65,7 @@ interface(`acct_exec_data',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/admin/amanda.if b/policy/modules/admin/amanda.if index dab38fbf..d99f0586 100644 --- a/policy/modules/admin/amanda.if +++ b/policy/modules/admin/amanda.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -25,7 +25,7 @@ interface(`amanda_domtrans_recover',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## @@ -50,7 +50,7 @@ interface(`amanda_run_recover',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -105,7 +105,7 @@ interface(`amanda_rw_dumpdates_files',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -142,7 +142,7 @@ interface(`amanda_append_log_files',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/admin/apt.if b/policy/modules/admin/apt.if index dfe34fe5..84668f13 100644 --- a/policy/modules/admin/apt.if +++ b/policy/modules/admin/apt.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -26,7 +26,7 @@ interface(`apt_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## @@ -52,7 +52,7 @@ interface(`apt_run',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -90,7 +90,7 @@ interface(`apt_dontaudit_use_fds',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -109,7 +109,7 @@ interface(`apt_read_pipes',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -146,7 +146,7 @@ interface(`apt_use_ptys',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -167,7 +167,7 @@ interface(`apt_read_cache',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -188,7 +188,7 @@ interface(`apt_read_db',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/admin/backup.if b/policy/modules/admin/backup.if index 29ed36e6..c0b42053 100644 --- a/policy/modules/admin/backup.if +++ b/policy/modules/admin/backup.if @@ -25,7 +25,7 @@ interface(`backup_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## diff --git a/policy/modules/admin/bootloader.if b/policy/modules/admin/bootloader.if index 0106920f..da8b00bf 100644 --- a/policy/modules/admin/bootloader.if +++ b/policy/modules/admin/bootloader.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -25,7 +25,7 @@ interface(`bootloader_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## @@ -56,7 +56,7 @@ interface(`bootloader_run',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -75,7 +75,7 @@ interface(`bootloader_read_config',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## @@ -95,7 +95,7 @@ interface(`bootloader_rw_config',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -115,7 +115,7 @@ interface(`bootloader_rw_tmp_files',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/admin/certwatch.if b/policy/modules/admin/certwatch.if index 1cbd0149..3f45dfe3 100644 --- a/policy/modules/admin/certwatch.if +++ b/policy/modules/admin/certwatch.if @@ -29,7 +29,7 @@ interface(`certwatch_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## @@ -57,7 +57,7 @@ interface(`certwatch_run',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## diff --git a/policy/modules/admin/consoletype.if b/policy/modules/admin/consoletype.if index 52d7a7e3..daa6eb3a 100644 --- a/policy/modules/admin/consoletype.if +++ b/policy/modules/admin/consoletype.if @@ -8,7 +8,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -32,7 +32,7 @@ interface(`consoletype_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## @@ -56,7 +56,7 @@ interface(`consoletype_run',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## diff --git a/policy/modules/admin/ddcprobe.if b/policy/modules/admin/ddcprobe.if index 898f54e2..1a43194a 100644 --- a/policy/modules/admin/ddcprobe.if +++ b/policy/modules/admin/ddcprobe.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -25,7 +25,7 @@ interface(`ddcprobe_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## diff --git a/policy/modules/admin/dmesg.if b/policy/modules/admin/dmesg.if index ba622b6a..4035397f 100644 --- a/policy/modules/admin/dmesg.if +++ b/policy/modules/admin/dmesg.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -25,7 +25,7 @@ interface(`dmesg_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## diff --git a/policy/modules/admin/dmidecode.if b/policy/modules/admin/dmidecode.if index 233e6d44..331ff4cc 100644 --- a/policy/modules/admin/dmidecode.if +++ b/policy/modules/admin/dmidecode.if @@ -30,7 +30,7 @@ interface(`dmidecode_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## diff --git a/policy/modules/admin/dpkg.if b/policy/modules/admin/dpkg.if index c9a03ffa..633495bb 100644 --- a/policy/modules/admin/dpkg.if +++ b/policy/modules/admin/dpkg.if @@ -8,7 +8,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -50,7 +50,7 @@ interface(`dpkg_domtrans_script',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## @@ -77,7 +77,7 @@ interface(`dpkg_run',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -95,7 +95,7 @@ interface(`dpkg_use_fds',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -113,7 +113,7 @@ interface(`dpkg_read_pipes',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -131,7 +131,7 @@ interface(`dpkg_rw_pipes',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -149,7 +149,7 @@ interface(`dpkg_use_script_fds',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -170,7 +170,7 @@ interface(`dpkg_read_db',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -211,7 +211,7 @@ interface(`dpkg_dontaudit_manage_db',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/admin/firstboot.if b/policy/modules/admin/firstboot.if index 00415af5..83512c93 100644 --- a/policy/modules/admin/firstboot.if +++ b/policy/modules/admin/firstboot.if @@ -9,7 +9,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -28,7 +28,7 @@ interface(`firstboot_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## @@ -52,7 +52,7 @@ interface(`firstboot_run',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -89,7 +89,7 @@ interface(`firstboot_dontaudit_use_fds',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -107,7 +107,7 @@ interface(`firstboot_write_pipes',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/admin/kudzu.if b/policy/modules/admin/kudzu.if index 11c6f9e2..1aeff556 100644 --- a/policy/modules/admin/kudzu.if +++ b/policy/modules/admin/kudzu.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -25,7 +25,7 @@ interface(`kudzu_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## @@ -50,7 +50,7 @@ interface(`kudzu_run',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/admin/logrotate.if b/policy/modules/admin/logrotate.if index f9af0e1d..b3aa19ed 100644 --- a/policy/modules/admin/logrotate.if +++ b/policy/modules/admin/logrotate.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -25,7 +25,7 @@ interface(`logrotate_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## @@ -50,7 +50,7 @@ interface(`logrotate_run',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -86,7 +86,7 @@ interface(`logrotate_use_fds',` ## ## ## -## The type of the process to not audit. +## Domain to not audit ## ## # @@ -104,7 +104,7 @@ interface(`logrotate_dontaudit_use_fds',` ## ## ## -## The type of the process to not audit. +## Domain to not audit ## ## # diff --git a/policy/modules/admin/quota.if b/policy/modules/admin/quota.if index 50ff52e6..d50f2f53 100644 --- a/policy/modules/admin/quota.if +++ b/policy/modules/admin/quota.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -25,7 +25,7 @@ interface(`quota_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## diff --git a/policy/modules/admin/rpm.if b/policy/modules/admin/rpm.if index 44624fe9..2514ed5d 100644 --- a/policy/modules/admin/rpm.if +++ b/policy/modules/admin/rpm.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -69,7 +69,7 @@ interface(`rpm_domtrans_script',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## @@ -135,7 +135,7 @@ interface(`rpm_signull',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -153,7 +153,7 @@ interface(`rpm_use_fds',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -171,7 +171,7 @@ interface(`rpm_read_pipes',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -252,7 +252,7 @@ interface(`rpm_script_dbus_chat',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -290,7 +290,7 @@ interface(`rpm_append_log',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -309,7 +309,7 @@ interface(`rpm_manage_log',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -448,7 +448,7 @@ interface(`rpm_manage_cache',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -487,7 +487,7 @@ interface(`rpm_delete_db',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/admin/tmpreaper.if b/policy/modules/admin/tmpreaper.if index cf658494..8dfbd809 100644 --- a/policy/modules/admin/tmpreaper.if +++ b/policy/modules/admin/tmpreaper.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/admin/updfstab.if b/policy/modules/admin/updfstab.if index d98bb72a..6a4f564e 100644 --- a/policy/modules/admin/updfstab.if +++ b/policy/modules/admin/updfstab.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/admin/usbmodules.if b/policy/modules/admin/usbmodules.if index 9ac17f50..d673f10e 100644 --- a/policy/modules/admin/usbmodules.if +++ b/policy/modules/admin/usbmodules.if @@ -26,7 +26,7 @@ interface(`usbmodules_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## diff --git a/policy/modules/admin/usermanage.if b/policy/modules/admin/usermanage.if index 3a87501d..87026993 100644 --- a/policy/modules/admin/usermanage.if +++ b/policy/modules/admin/usermanage.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -31,7 +31,7 @@ interface(`usermanage_domtrans_chfn',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## @@ -55,7 +55,7 @@ interface(`usermanage_run_chfn',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -80,7 +80,7 @@ interface(`usermanage_domtrans_groupadd',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## @@ -109,7 +109,7 @@ interface(`usermanage_run_groupadd',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -152,7 +152,7 @@ interface(`usermanage_kill_passwd',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## @@ -200,7 +200,7 @@ interface(`usermanage_domtrans_admin_passwd',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## @@ -229,7 +229,7 @@ interface(`usermanage_run_admin_passwd',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -247,7 +247,7 @@ interface(`usermanage_dontaudit_use_useradd_fds',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -272,7 +272,7 @@ interface(`usermanage_domtrans_useradd',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## @@ -303,7 +303,7 @@ interface(`usermanage_run_useradd',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/apps/java.if b/policy/modules/apps/java.if index fe125543..9bb8f310 100644 --- a/policy/modules/apps/java.if +++ b/policy/modules/apps/java.if @@ -120,7 +120,7 @@ template(`java_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## diff --git a/policy/modules/apps/loadkeys.if b/policy/modules/apps/loadkeys.if index 215a7d35..c3beba52 100644 --- a/policy/modules/apps/loadkeys.if +++ b/policy/modules/apps/loadkeys.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -29,7 +29,7 @@ interface(`loadkeys_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## @@ -54,7 +54,7 @@ interface(`loadkeys_run',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/apps/mono.if b/policy/modules/apps/mono.if index f6948432..a6af3228 100644 --- a/policy/modules/apps/mono.if +++ b/policy/modules/apps/mono.if @@ -82,7 +82,7 @@ interface(`mono_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## @@ -125,7 +125,7 @@ interface(`mono_exec',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/apps/userhelper.if b/policy/modules/apps/userhelper.if index 8df0db48..ced285aa 100644 --- a/policy/modules/apps/userhelper.if +++ b/policy/modules/apps/userhelper.if @@ -245,7 +245,7 @@ interface(`userhelper_sigchld',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/apps/webalizer.if b/policy/modules/apps/webalizer.if index 1d256886..dac920dd 100644 --- a/policy/modules/apps/webalizer.if +++ b/policy/modules/apps/webalizer.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -25,7 +25,7 @@ interface(`webalizer_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## diff --git a/policy/modules/apps/wine.if b/policy/modules/apps/wine.if index 6db15ad9..f5217b83 100644 --- a/policy/modules/apps/wine.if +++ b/policy/modules/apps/wine.if @@ -136,7 +136,7 @@ interface(`wine_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## diff --git a/policy/modules/kernel/corenetwork.if.in b/policy/modules/kernel/corenetwork.if.in index a6a115d0..bda5e34b 100644 --- a/policy/modules/kernel/corenetwork.if.in +++ b/policy/modules/kernel/corenetwork.if.in @@ -190,7 +190,7 @@ interface(`corenet_tcp_sendrecv_generic_if',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -227,7 +227,7 @@ interface(`corenet_dontaudit_udp_send_generic_if',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -321,7 +321,7 @@ interface(`corenet_dontaudit_udp_sendrecv_generic_if',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -339,7 +339,7 @@ interface(`corenet_raw_send_generic_if',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -357,7 +357,7 @@ interface(`corenet_raw_receive_generic_if',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -426,7 +426,7 @@ interface(`corenet_inout_generic_if',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -444,7 +444,7 @@ interface(`corenet_tcp_sendrecv_all_if',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -462,7 +462,7 @@ interface(`corenet_udp_send_all_if',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -480,7 +480,7 @@ interface(`corenet_udp_receive_all_if',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -495,7 +495,7 @@ interface(`corenet_udp_sendrecv_all_if',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -513,7 +513,7 @@ interface(`corenet_raw_send_all_if',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -531,7 +531,7 @@ interface(`corenet_raw_receive_all_if',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -592,7 +592,7 @@ interface(`corenet_tcp_sendrecv_generic_node',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -610,7 +610,7 @@ interface(`corenet_udp_send_generic_node',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -669,7 +669,7 @@ interface(`corenet_udp_sendrecv_generic_node',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -687,7 +687,7 @@ interface(`corenet_raw_send_generic_node',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -705,7 +705,7 @@ interface(`corenet_raw_receive_generic_node',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -786,7 +786,7 @@ interface(`corenet_udp_bind_generic_node',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # rawip_socket node_bind does not make much sense. @@ -859,7 +859,7 @@ interface(`corenet_inout_generic_node',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -877,7 +877,7 @@ interface(`corenet_tcp_sendrecv_all_nodes',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -914,7 +914,7 @@ interface(`corenet_dontaudit_udp_send_all_nodes',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -951,7 +951,7 @@ interface(`corenet_dontaudit_udp_receive_all_nodes',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -982,7 +982,7 @@ interface(`corenet_dontaudit_udp_sendrecv_all_nodes',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1000,7 +1000,7 @@ interface(`corenet_raw_send_all_nodes',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1018,7 +1018,7 @@ interface(`corenet_raw_receive_all_nodes',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1033,7 +1033,7 @@ interface(`corenet_raw_sendrecv_all_nodes',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1051,7 +1051,7 @@ interface(`corenet_tcp_bind_all_nodes',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1069,7 +1069,7 @@ interface(`corenet_udp_bind_all_nodes',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # rawip_socket node_bind does not make much sense. @@ -1088,7 +1088,7 @@ interface(`corenet_raw_bind_all_nodes',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1106,7 +1106,7 @@ interface(`corenet_tcp_sendrecv_generic_port',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1124,7 +1124,7 @@ interface(`corenet_dontaudit_tcp_sendrecv_generic_port',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1142,7 +1142,7 @@ interface(`corenet_udp_send_generic_port',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1160,7 +1160,7 @@ interface(`corenet_udp_receive_generic_port',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1175,7 +1175,7 @@ interface(`corenet_udp_sendrecv_generic_port',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1213,7 +1213,7 @@ interface(`corenet_dontaudit_tcp_bind_generic_port',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1233,7 +1233,7 @@ interface(`corenet_udp_bind_generic_port',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1295,7 +1295,7 @@ interface(`corenet_tcp_sendrecv_all_ports',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1313,7 +1313,7 @@ interface(`corenet_udp_send_all_ports',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1370,7 +1370,7 @@ interface(`corenet_udp_sendrecv_all_ports',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1407,7 +1407,7 @@ interface(`corenet_dontaudit_tcp_bind_all_ports',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1509,7 +1509,7 @@ interface(`corenet_dontaudit_tcp_connect_all_ports',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1527,7 +1527,7 @@ interface(`corenet_tcp_sendrecv_reserved_port',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1545,7 +1545,7 @@ interface(`corenet_udp_send_reserved_port',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1563,7 +1563,7 @@ interface(`corenet_udp_receive_reserved_port',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1578,7 +1578,7 @@ interface(`corenet_udp_sendrecv_reserved_port',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1597,7 +1597,7 @@ interface(`corenet_tcp_bind_reserved_port',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1616,7 +1616,7 @@ interface(`corenet_udp_bind_reserved_port',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1634,7 +1634,7 @@ interface(`corenet_tcp_connect_reserved_port',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1652,7 +1652,7 @@ interface(`corenet_tcp_sendrecv_all_reserved_ports',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1670,7 +1670,7 @@ interface(`corenet_udp_send_all_reserved_ports',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1688,7 +1688,7 @@ interface(`corenet_udp_receive_all_reserved_ports',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1703,7 +1703,7 @@ interface(`corenet_udp_sendrecv_all_reserved_ports',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1722,7 +1722,7 @@ interface(`corenet_tcp_bind_all_reserved_ports',` ## ## ## -## The type of the process to not audit. +## Domain to not audit ## ## # @@ -1740,7 +1740,7 @@ interface(`corenet_dontaudit_tcp_bind_all_reserved_ports',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1759,7 +1759,7 @@ interface(`corenet_udp_bind_all_reserved_ports',` ## ## ## -## The type of the process to not audit. +## Domain to not audit ## ## # @@ -1777,7 +1777,7 @@ interface(`corenet_dontaudit_udp_bind_all_reserved_ports',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1795,7 +1795,7 @@ interface(`corenet_tcp_bind_all_unreserved_ports',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1813,7 +1813,7 @@ interface(`corenet_udp_bind_all_unreserved_ports',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1831,7 +1831,7 @@ interface(`corenet_tcp_connect_all_reserved_ports',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1868,7 +1868,7 @@ interface(`corenet_dontaudit_tcp_connect_all_reserved_ports',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1980,7 +1980,7 @@ interface(`corenet_rw_ppp_dev',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -1999,7 +1999,7 @@ interface(`corenet_tcp_bind_all_rpc_ports',` ## ## ## -## The type of the process to not audit. +## Domain to not audit ## ## # @@ -2017,7 +2017,7 @@ interface(`corenet_dontaudit_tcp_bind_all_rpc_ports',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -2036,7 +2036,7 @@ interface(`corenet_udp_bind_all_rpc_ports',` ## ## ## -## The type of the process to not audit. +## Domain to not audit ## ## # diff --git a/policy/modules/kernel/devices.if b/policy/modules/kernel/devices.if index b0d558e6..f13a505f 100644 --- a/policy/modules/kernel/devices.if +++ b/policy/modules/kernel/devices.if @@ -3544,7 +3544,7 @@ interface(`dev_manage_smartcard',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -3562,7 +3562,7 @@ interface(`dev_getattr_sysfs_dirs',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -3580,7 +3580,7 @@ interface(`dev_search_sysfs',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -3598,7 +3598,7 @@ interface(`dev_dontaudit_search_sysfs',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -3616,7 +3616,7 @@ interface(`dev_list_sysfs',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -3855,7 +3855,7 @@ interface(`dev_read_usbmon_dev',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -3928,7 +3928,7 @@ interface(`dev_dontaudit_getattr_usbfs_dirs',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -3987,7 +3987,7 @@ interface(`dev_setattr_usbfs_files',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if index 425d176a..28cb589c 100644 --- a/policy/modules/kernel/files.if +++ b/policy/modules/kernel/files.if @@ -3882,7 +3882,7 @@ interface(`files_read_generic_tmp_files',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -3900,7 +3900,7 @@ interface(`files_manage_generic_tmp_dirs',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/kernel/kernel.if b/policy/modules/kernel/kernel.if index 814da805..547fcf4d 100644 --- a/policy/modules/kernel/kernel.if +++ b/policy/modules/kernel/kernel.if @@ -222,7 +222,7 @@ interface(`kernel_use_fds',` ## ## ## -## The type of process not to audit. +## Domain to not audit ## ## # diff --git a/policy/modules/kernel/storage.if b/policy/modules/kernel/storage.if index bb0effdd..7b8a19ca 100644 --- a/policy/modules/kernel/storage.if +++ b/policy/modules/kernel/storage.if @@ -7,7 +7,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -27,7 +27,7 @@ interface(`storage_getattr_fixed_disk_dev',` ## ## ## -## The type of the process to not audit. +## Domain to not audit ## ## # @@ -47,7 +47,7 @@ interface(`storage_dontaudit_getattr_fixed_disk_dev',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -67,7 +67,7 @@ interface(`storage_setattr_fixed_disk_dev',` ## ## ## -## The type of the process to not audit. +## Domain to not audit ## ## # @@ -88,7 +88,7 @@ interface(`storage_dontaudit_setattr_fixed_disk_dev',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -111,7 +111,7 @@ interface(`storage_raw_read_fixed_disk',` ## ## ## -## The type of the process to not audit. +## Domain to not audit ## ## # @@ -134,7 +134,7 @@ interface(`storage_dontaudit_read_fixed_disk',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -232,7 +232,7 @@ interface(`storage_delete_fixed_disk_dev',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -256,7 +256,7 @@ interface(`storage_manage_fixed_disk',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -275,7 +275,7 @@ interface(`storage_dev_filetrans_fixed_disk',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -293,7 +293,7 @@ interface(`storage_tmpfs_filetrans_fixed_disk',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -312,7 +312,7 @@ interface(`storage_relabel_fixed_disk',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -332,7 +332,7 @@ interface(`storage_swapon_fixed_disk',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -389,7 +389,7 @@ interface(`storage_dontaudit_rw_fuse',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -409,7 +409,7 @@ interface(`storage_getattr_scsi_generic_dev',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -432,7 +432,7 @@ interface(`storage_setattr_scsi_generic_dev',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -457,7 +457,7 @@ interface(`storage_read_scsi_generic',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -479,7 +479,7 @@ interface(`storage_write_scsi_generic',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -518,7 +518,7 @@ interface(`storage_dontaudit_rw_scsi_generic',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -538,7 +538,7 @@ interface(`storage_getattr_removable_dev',` ## ## ## -## The type of the process to not audit. +## Domain to not audit ## ## # @@ -557,7 +557,7 @@ interface(`storage_dontaudit_getattr_removable_dev',` ## ## ## -## The type of the process to not audit. +## Domain to not audit ## ## # @@ -577,7 +577,7 @@ interface(`storage_dontaudit_read_removable_device',` ## ## ## -## The type of the process to not audit. +## Domain to not audit ## ## # @@ -596,7 +596,7 @@ interface(`storage_dontaudit_write_removable_device',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -616,7 +616,7 @@ interface(`storage_setattr_removable_dev',` ## ## ## -## The type of the process to not audit. +## Domain to not audit ## ## # @@ -638,7 +638,7 @@ interface(`storage_dontaudit_setattr_removable_dev',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -679,7 +679,7 @@ interface(`storage_dontaudit_raw_read_removable_device',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -717,7 +717,7 @@ interface(`storage_dontaudit_raw_write_removable_device',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -737,7 +737,7 @@ interface(`storage_read_tape',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -757,7 +757,7 @@ interface(`storage_write_tape',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -777,7 +777,7 @@ interface(`storage_getattr_tape_dev',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/kernel/terminal.if b/policy/modules/kernel/terminal.if index a905c0af..f623b726 100644 --- a/policy/modules/kernel/terminal.if +++ b/policy/modules/kernel/terminal.if @@ -382,7 +382,7 @@ interface(`term_getattr_pty_fs',` ## ## ## -## The type of the process to not audit. +## Domain to not audit ## ## # @@ -460,7 +460,7 @@ interface(`term_list_ptys',` ## ## ## -## The type of the process to not audit. +## Domain to not audit ## ## # @@ -479,7 +479,7 @@ interface(`term_dontaudit_list_ptys',` ## ## ## -## The type of the process to not audit. +## Domain to not audit ## ## # @@ -498,7 +498,7 @@ interface(`term_dontaudit_manage_pty_dirs',` ## ## ## -## The type of the process to not audit. +## Domain to not audit ## ## # @@ -600,7 +600,7 @@ interface(`term_use_generic_ptys',` ## ## ## -## The type of the process to not audit. +## Domain to not audit ## ## # @@ -696,7 +696,7 @@ interface(`term_use_ptmx',` ## ## ## -## The type of the process to not audit. +## Domain to not audit ## ## # @@ -975,7 +975,7 @@ interface(`term_use_all_user_ptys',` ## ## ## -## The type of the process to not audit. +## Domain to not audit ## ## # @@ -1206,7 +1206,7 @@ interface(`term_use_unallocated_ttys',` ## ## ## -## The type of the process to not audit. +## Domain to not audit ## ## # diff --git a/policy/modules/services/abrt.if b/policy/modules/services/abrt.if index b0b7d0f5..1adfe2f7 100644 --- a/policy/modules/services/abrt.if +++ b/policy/modules/services/abrt.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -25,7 +25,7 @@ interface(`abrt_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/afs.if b/policy/modules/services/afs.if index 28ad29c1..ada201c6 100644 --- a/policy/modules/services/afs.if +++ b/policy/modules/services/afs.if @@ -63,7 +63,7 @@ interface(`afs_rw_cache',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/apm.if b/policy/modules/services/apm.if index 3e8778e9..77d31b94 100644 --- a/policy/modules/services/apm.if +++ b/policy/modules/services/apm.if @@ -25,7 +25,7 @@ interface(`apm_domtrans_client',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -43,7 +43,7 @@ interface(`apm_use_fds',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/automount.if b/policy/modules/services/automount.if index 4ff1bdf8..904f7007 100644 --- a/policy/modules/services/automount.if +++ b/policy/modules/services/automount.if @@ -25,7 +25,7 @@ interface(`automount_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/avahi.if b/policy/modules/services/avahi.if index a8ecaf3a..a5e598e9 100644 --- a/policy/modules/services/avahi.if +++ b/policy/modules/services/avahi.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -25,7 +25,7 @@ interface(`avahi_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/bluetooth.if b/policy/modules/services/bluetooth.if index fb7b7823..fa38f575 100644 --- a/policy/modules/services/bluetooth.if +++ b/policy/modules/services/bluetooth.if @@ -64,7 +64,7 @@ interface(`bluetooth_stream_connect',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -121,7 +121,7 @@ interface(`bluetooth_dbus_chat',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -136,7 +136,7 @@ interface(`bluetooth_domtrans_helper',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## diff --git a/policy/modules/services/certmonger.if b/policy/modules/services/certmonger.if index 4881860a..95a9290c 100644 --- a/policy/modules/services/certmonger.if +++ b/policy/modules/services/certmonger.if @@ -45,7 +45,7 @@ interface(`certmonger_dbus_chat',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/cobbler.if b/policy/modules/services/cobbler.if index 828a0013..9f7dd571 100644 --- a/policy/modules/services/cobbler.if +++ b/policy/modules/services/cobbler.if @@ -34,7 +34,7 @@ interface(`cobblerd_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/cron.if b/policy/modules/services/cron.if index 44caccc3..06ff2746 100644 --- a/policy/modules/services/cron.if +++ b/policy/modules/services/cron.if @@ -308,7 +308,7 @@ interface(`cron_exec',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/cups.if b/policy/modules/services/cups.if index 24d60a2e..9a751a13 100644 --- a/policy/modules/services/cups.if +++ b/policy/modules/services/cups.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -33,7 +33,7 @@ interface(`cups_backend',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -124,7 +124,7 @@ interface(`cups_read_pid_files',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/denyhosts.if b/policy/modules/services/denyhosts.if index a8cb6ebd..de7e074e 100644 --- a/policy/modules/services/denyhosts.if +++ b/policy/modules/services/denyhosts.if @@ -32,7 +32,7 @@ interface(`denyhosts_domtrans', ` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/dhcp.if b/policy/modules/services/dhcp.if index 8e4d1be0..0d9f10c4 100644 --- a/policy/modules/services/dhcp.if +++ b/policy/modules/services/dhcp.if @@ -45,7 +45,7 @@ interface(`dhcpd_setattr_state_files',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/dnsmasq.if b/policy/modules/services/dnsmasq.if index a5c426b1..a4840a7a 100644 --- a/policy/modules/services/dnsmasq.if +++ b/policy/modules/services/dnsmasq.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -45,7 +45,7 @@ interface(`dnsmasq_initrc_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/finger.if b/policy/modules/services/finger.if index c8d97985..cda687c7 100644 --- a/policy/modules/services/finger.if +++ b/policy/modules/services/finger.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/inetd.if b/policy/modules/services/inetd.if index 40eeebe7..59d9778f 100644 --- a/policy/modules/services/inetd.if +++ b/policy/modules/services/inetd.if @@ -178,7 +178,7 @@ interface(`inetd_domtrans_child',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -192,7 +192,7 @@ interface(`inetd_udp_send',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/lircd.if b/policy/modules/services/lircd.if index d394f17c..418cc811 100644 --- a/policy/modules/services/lircd.if +++ b/policy/modules/services/lircd.if @@ -45,7 +45,7 @@ interface(`lircd_stream_connect',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/nis.if b/policy/modules/services/nis.if index 724fd982..b9e7d401 100644 --- a/policy/modules/services/nis.if +++ b/policy/modules/services/nis.if @@ -19,7 +19,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/nscd.if b/policy/modules/services/nscd.if index beed4c56..429bd9fb 100644 --- a/policy/modules/services/nscd.if +++ b/policy/modules/services/nscd.if @@ -60,7 +60,7 @@ interface(`nscd_signull',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/nslcd.if b/policy/modules/services/nslcd.if index 3563980f..01d6be99 100644 --- a/policy/modules/services/nslcd.if +++ b/policy/modules/services/nslcd.if @@ -24,7 +24,7 @@ interface(`nslcd_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/ntp.if b/policy/modules/services/ntp.if index a09a9ae3..c42c7ab9 100644 --- a/policy/modules/services/ntp.if +++ b/policy/modules/services/ntp.if @@ -22,7 +22,7 @@ interface(`ntp_stub',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -67,7 +67,7 @@ interface(`ntp_run',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -86,7 +86,7 @@ interface(`ntp_domtrans_ntpdate',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -104,7 +104,7 @@ interface(`ntp_initrc_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/perdition.if b/policy/modules/services/perdition.if index e7891a87..2b0bd641 100644 --- a/policy/modules/services/perdition.if +++ b/policy/modules/services/perdition.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/portmap.if b/policy/modules/services/portmap.if index 19d9f8ab..9901e899 100644 --- a/policy/modules/services/portmap.if +++ b/policy/modules/services/portmap.if @@ -52,7 +52,7 @@ interface(`portmap_run_helper',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -80,7 +80,7 @@ interface(`portmap_udp_chat',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/postgresql.if b/policy/modules/services/postgresql.if index 28d6d685..394031b7 100644 --- a/policy/modules/services/postgresql.if +++ b/policy/modules/services/postgresql.if @@ -223,7 +223,7 @@ interface(`postgresql_manage_db',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/ppp.if b/policy/modules/services/ppp.if index 36577959..47892680 100644 --- a/policy/modules/services/ppp.if +++ b/policy/modules/services/ppp.if @@ -326,7 +326,7 @@ interface(`ppp_pid_filetrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/remotelogin.if b/policy/modules/services/remotelogin.if index 6ff80608..114f2c2a 100644 --- a/policy/modules/services/remotelogin.if +++ b/policy/modules/services/remotelogin.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -24,7 +24,7 @@ interface(`remotelogin_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/rhgb.if b/policy/modules/services/rhgb.if index d7d282aa..46681c89 100644 --- a/policy/modules/services/rhgb.if +++ b/policy/modules/services/rhgb.if @@ -22,7 +22,7 @@ interface(`rhgb_stub',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -76,7 +76,7 @@ interface(`rhgb_signal',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -95,7 +95,7 @@ interface(`rhgb_rw_stream_sockets',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -113,7 +113,7 @@ interface(`rhgb_dontaudit_rw_stream_sockets',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -131,7 +131,7 @@ interface(`rhgb_stream_connect',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -185,7 +185,7 @@ interface(`rhgb_dontaudit_use_ptys',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/ricci.if b/policy/modules/services/ricci.if index c291ce3e..700467cf 100644 --- a/policy/modules/services/ricci.if +++ b/policy/modules/services/ricci.if @@ -43,7 +43,7 @@ interface(`ricci_domtrans_modcluster',` ## ## ## -## The type of process not to audit. +## Domain to not audit ## ## # @@ -62,7 +62,7 @@ interface(`ricci_dontaudit_use_modcluster_fds',` ## ## ## -## The type of process not to audit. +## Domain to not audit ## ## # diff --git a/policy/modules/services/rlogin.if b/policy/modules/services/rlogin.if index 0e272a4d..ba3364d1 100644 --- a/policy/modules/services/rlogin.if +++ b/policy/modules/services/rlogin.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/rpc.if b/policy/modules/services/rpc.if index 7b82ea33..005f5160 100644 --- a/policy/modules/services/rpc.if +++ b/policy/modules/services/rpc.if @@ -128,7 +128,7 @@ template(`rpc_domain_template', ` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -143,7 +143,7 @@ interface(`rpc_udp_send',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -161,7 +161,7 @@ interface(`rpc_dontaudit_getattr_exports',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -179,7 +179,7 @@ interface(`rpc_read_exports',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -197,7 +197,7 @@ interface(`rpc_write_exports',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -233,7 +233,7 @@ interface(`rpc_initrc_domtrans_nfsd',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/rshd.if b/policy/modules/services/rshd.if index e422af6f..92bcdedb 100644 --- a/policy/modules/services/rshd.if +++ b/policy/modules/services/rshd.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/samba.if b/policy/modules/services/samba.if index 8fdb98af..086c9b53 100644 --- a/policy/modules/services/samba.if +++ b/policy/modules/services/samba.if @@ -10,7 +10,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -46,7 +46,7 @@ interface(`samba_signal_nmbd',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -64,7 +64,7 @@ interface(`samba_initrc_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -84,7 +84,7 @@ interface(`samba_domtrans_net',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## @@ -109,7 +109,7 @@ interface(`samba_run_net',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -260,7 +260,7 @@ interface(`samba_append_log',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -464,7 +464,7 @@ interface(`samba_run_smbcontrol',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -554,7 +554,7 @@ interface(`samba_rw_smbmount_tcp_sockets',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -573,7 +573,7 @@ interface(`samba_domtrans_winbind_helper',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## ## diff --git a/policy/modules/services/spamassassin.if b/policy/modules/services/spamassassin.if index 39456281..d159ef39 100644 --- a/policy/modules/services/spamassassin.if +++ b/policy/modules/services/spamassassin.if @@ -64,7 +64,7 @@ interface(`spamassassin_exec',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -195,7 +195,7 @@ interface(`spamassassin_manage_lib_files',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/squid.if b/policy/modules/services/squid.if index 0ae57d73..2fe24de7 100644 --- a/policy/modules/services/squid.if +++ b/policy/modules/services/squid.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -25,7 +25,7 @@ interface(`squid_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/tcpd.if b/policy/modules/services/tcpd.if index 98dc24b0..9de6298a 100644 --- a/policy/modules/services/tcpd.if +++ b/policy/modules/services/tcpd.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/tuned.if b/policy/modules/services/tuned.if index 25b24353..54b86059 100644 --- a/policy/modules/services/tuned.if +++ b/policy/modules/services/tuned.if @@ -81,7 +81,7 @@ interface(`tuned_manage_pid_files',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/varnishd.if b/policy/modules/services/varnishd.if index d569af40..597679d7 100644 --- a/policy/modules/services/varnishd.if +++ b/policy/modules/services/varnishd.if @@ -6,7 +6,7 @@ ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # @@ -25,7 +25,7 @@ interface(`varnishd_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## # diff --git a/policy/modules/services/vhostmd.if b/policy/modules/services/vhostmd.if index 55e332f9..a10dc806 100644 --- a/policy/modules/services/vhostmd.if +++ b/policy/modules/services/vhostmd.if @@ -24,7 +24,7 @@ interface(`vhostmd_domtrans',` ## ## ## -## The type of the process performing this action. +## Domain allowed access. ## ## #