aboutsummaryrefslogtreecommitdiff
path: root/policy
diff options
context:
space:
mode:
authorChristian Göttsche <cgzones@googlemail.com>2024-10-30 15:15:20 +0100
committerJason Zaman <perfinion@gentoo.org>2024-12-14 16:19:19 -0800
commit76c68233e74634e043c157870296e7aaa5e45aa9 (patch)
treedcc21f325f5afc8584951de6536e661a9c0a958e /policy
parentbootloader: get scheduling information (diff)
downloadhardened-refpolicy-76c68233e74634e043c157870296e7aaa5e45aa9.tar.gz
hardened-refpolicy-76c68233e74634e043c157870296e7aaa5e45aa9.tar.bz2
hardened-refpolicy-76c68233e74634e043c157870296e7aaa5e45aa9.zip
Fix typos
Found by codespell(1). Signed-off-by: Christian Göttsche <cgzones@googlemail.com> Signed-off-by: Jason Zaman <perfinion@gentoo.org>
Diffstat (limited to 'policy')
-rw-r--r--policy/mls2
-rw-r--r--policy/modules/apps/uml.te2
-rw-r--r--policy/modules/kernel/corenetwork.if.in8
-rw-r--r--policy/modules/kernel/corenetwork.te.m42
-rw-r--r--policy/modules/kernel/devices.te2
-rw-r--r--policy/modules/kernel/domain.if2
-rw-r--r--policy/modules/kernel/files.if21
-rw-r--r--policy/modules/kernel/selinux.te2
-rw-r--r--policy/modules/services/cockpit.if2
-rw-r--r--policy/modules/services/corosync.te2
-rw-r--r--policy/modules/services/gssproxy.if2
-rw-r--r--policy/modules/services/iiosensorproxy.if2
-rw-r--r--policy/modules/services/iiosensorproxy.te2
-rw-r--r--policy/modules/services/lircd.if2
-rw-r--r--policy/modules/services/ppp.if4
-rw-r--r--policy/modules/services/tgtd.if2
-rw-r--r--policy/modules/services/virt.if4
-rw-r--r--policy/modules/system/iscsi.if2
-rw-r--r--policy/modules/system/systemd.te2
-rw-r--r--policy/modules/system/userdomain.if10
20 files changed, 47 insertions, 30 deletions
diff --git a/policy/mls b/policy/mls
index 3cf4110d..6a4e78cc 100644
--- a/policy/mls
+++ b/policy/mls
@@ -2,7 +2,7 @@ ifdef(`enable_mls',`
#
# Define sensitivities
#
-# Domination of sensitivities is in increasin
+# Domination of sensitivities is in increasing
# numerical order, with s0 being the lowest
gen_sens(mls_num_sens)
diff --git a/policy/modules/apps/uml.te b/policy/modules/apps/uml.te
index d48d6027..52c043df 100644
--- a/policy/modules/apps/uml.te
+++ b/policy/modules/apps/uml.te
@@ -32,7 +32,7 @@ type uml_switch_t;
type uml_switch_exec_t;
init_daemon_domain(uml_switch_t, uml_switch_exec_t)
-type uml_switch_runtime_t alias uml_swich_var_run_t;
+type uml_switch_runtime_t alias uml_switch_var_run_t;
files_runtime_file(uml_switch_runtime_t)
########################################
diff --git a/policy/modules/kernel/corenetwork.if.in b/policy/modules/kernel/corenetwork.if.in
index bc153546..1f0ad3df 100644
--- a/policy/modules/kernel/corenetwork.if.in
+++ b/policy/modules/kernel/corenetwork.if.in
@@ -1612,7 +1612,7 @@ interface(`corenet_tcp_bind_all_ports',`
########################################
## <summary>
-## Do not audit attepts to bind TCP sockets to any ports.
+## Do not audit attempts to bind TCP sockets to any ports.
## </summary>
## <param name="domain">
## <summary>
@@ -1667,7 +1667,7 @@ interface(`corenet_sctp_connect_generic_port',`
########################################
## <summary>
-## Do not audit attepts to bind UDP sockets to any ports.
+## Do not audit attempts to bind UDP sockets to any ports.
## </summary>
## <param name="domain">
## <summary>
@@ -2493,7 +2493,7 @@ interface(`corenet_tcp_recvfrom_netlabel',`
########################################
## <summary>
-## Receive TCP packets from an unlabled connection.
+## Receive TCP packets from an unlabeled connection.
## </summary>
## <param name="domain">
## <summary>
@@ -3344,7 +3344,7 @@ interface(`corenet_relabelto_all_server_packets',`
########################################
## <summary>
-## Receive SCTP packets from an unlabled connection.
+## Receive SCTP packets from an unlabeled connection.
## </summary>
## <param name="domain">
## <summary>
diff --git a/policy/modules/kernel/corenetwork.te.m4 b/policy/modules/kernel/corenetwork.te.m4
index e512750a..5c1d69f7 100644
--- a/policy/modules/kernel/corenetwork.te.m4
+++ b/policy/modules/kernel/corenetwork.te.m4
@@ -125,7 +125,7 @@ ifelse(`$5',`',`',`declare_ibpkeycons($1,shiftn(4,$*))')dnl
')
#
-# ib_pkey(nam, subnet_prefix, pkey_num, mls_sensitivity [,subnet_prefix, pkey_num, mls_sensitivity[,...]])
+# ib_pkey(name, subnet_prefix, pkey_num, mls_sensitivity [,subnet_prefix, pkey_num, mls_sensitivity[,...]])
#
define(`ib_pkey',`
type $1_ibpkey_t, ibpkey_type;
diff --git a/policy/modules/kernel/devices.te b/policy/modules/kernel/devices.te
index a3eeba4a..84c0069a 100644
--- a/policy/modules/kernel/devices.te
+++ b/policy/modules/kernel/devices.te
@@ -86,7 +86,7 @@ genfscon sysfs /devices/system/cpu/online gen_context(system_u:object_r:cpu_onli
type crash_device_t;
dev_node(crash_device_t)
-# for the IBM zSeries z90crypt hardware ssl accelorator
+# for the IBM zSeries z90crypt hardware ssl accelerator
type crypt_device_t;
dev_node(crypt_device_t)
diff --git a/policy/modules/kernel/domain.if b/policy/modules/kernel/domain.if
index fdd32fb3..3f1388e3 100644
--- a/policy/modules/kernel/domain.if
+++ b/policy/modules/kernel/domain.if
@@ -417,7 +417,7 @@ interface(`domain_dontaudit_use_interactive_fds',`
########################################
## <summary>
## Send a SIGCHLD signal to domains whose file
-## discriptors are widely inheritable.
+## descriptors are widely inheritable.
## </summary>
## <param name="domain">
## <summary>
diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if
index 778e8271..b9aaeba0 100644
--- a/policy/modules/kernel/files.if
+++ b/policy/modules/kernel/files.if
@@ -3840,7 +3840,7 @@ interface(`files_dontaudit_read_etc_runtime_files',`
########################################
## <summary>
-## Do not audit attempts to execuite files
+## Do not audit attempts to execute files
## in /etc that are dynamically
## created on boot, such as mtab.
## </summary>
@@ -3850,7 +3850,7 @@ interface(`files_dontaudit_read_etc_runtime_files',`
## </summary>
## </param>
#
-interface(`files_dontaudit_execuite_etc_runtime_files',`
+interface(`files_dontaudit_exec_etc_runtime_files',`
gen_require(`
type etc_runtime_t;
')
@@ -3860,6 +3860,23 @@ interface(`files_dontaudit_execuite_etc_runtime_files',`
########################################
## <summary>
+## Do not audit attempts to execute files
+## in /etc that are dynamically
+## created on boot, such as mtab.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+#
+interface(`files_dontaudit_execuite_etc_runtime_files',`
+ refpolicywarn(`$0($*) has been deprecated, please use files_dontaudit_exec_etc_runtime_files() instead.')
+ files_dontaudit_exec_etc_runtime_files($1)
+')
+
+########################################
+## <summary>
## Do not audit attempts to read files
## in /etc
## </summary>
diff --git a/policy/modules/kernel/selinux.te b/policy/modules/kernel/selinux.te
index c249eaab..e76bf0b3 100644
--- a/policy/modules/kernel/selinux.te
+++ b/policy/modules/kernel/selinux.te
@@ -15,7 +15,7 @@ gen_bool(secure_mode_policyload,false)
## <desc>
## <p>
-## Boolean to determine whether the system permits setting Booelan values.
+## Boolean to determine whether the system permits setting Boolean values.
## </p>
## </desc>
gen_bool(secure_mode_setbool,false)
diff --git a/policy/modules/services/cockpit.if b/policy/modules/services/cockpit.if
index b7985437..325672d2 100644
--- a/policy/modules/services/cockpit.if
+++ b/policy/modules/services/cockpit.if
@@ -54,7 +54,7 @@ template(`cockpit_role_template',`
dev_dontaudit_execute_dev_nodes($2)
files_dontaudit_execute_default_files($2)
- files_dontaudit_execuite_etc_runtime_files($2)
+ files_dontaudit_exec_etc_runtime_files($2)
files_dontaudit_exec_runtime($2)
files_watch_etc_files($2)
files_watch_root_dirs($2)
diff --git a/policy/modules/services/corosync.te b/policy/modules/services/corosync.te
index 3ed8ef43..3e0a8014 100644
--- a/policy/modules/services/corosync.te
+++ b/policy/modules/services/corosync.te
@@ -37,7 +37,7 @@ logging_log_file(corosync_var_log_t)
#
allow corosync_t self:capability { dac_override fowner ipc_lock setgid setuid sys_admin sys_nice sys_resource };
-# for hearbeat
+# for heartbeat
allow corosync_t self:capability { chown net_raw };
allow corosync_t self:process { setpgid setrlimit setsched signal signull };
allow corosync_t self:fifo_file rw_fifo_file_perms;
diff --git a/policy/modules/services/gssproxy.if b/policy/modules/services/gssproxy.if
index 693d5228..34c9631b 100644
--- a/policy/modules/services/gssproxy.if
+++ b/policy/modules/services/gssproxy.if
@@ -2,7 +2,7 @@
########################################
## <summary>
-## Execute gssproxy in the gssproxy domin.
+## Execute gssproxy in the gssproxy domain.
## </summary>
## <param name="domain">
## <summary>
diff --git a/policy/modules/services/iiosensorproxy.if b/policy/modules/services/iiosensorproxy.if
index 0dc70034..f991edf0 100644
--- a/policy/modules/services/iiosensorproxy.if
+++ b/policy/modules/services/iiosensorproxy.if
@@ -2,7 +2,7 @@
##
## <desc>
## Industrial I/O subsystem is intended to provide support for devices
-## that in some sense are analog to digital or digital to analog convertors
+## that in some sense are analog to digital or digital to analog converters
## .
## Devices that fall into this category are:
## * ADCs
diff --git a/policy/modules/services/iiosensorproxy.te b/policy/modules/services/iiosensorproxy.te
index a820877f..348c2839 100644
--- a/policy/modules/services/iiosensorproxy.te
+++ b/policy/modules/services/iiosensorproxy.te
@@ -5,7 +5,7 @@ policy_module(iiosensorproxy)
# iio-sensor-proxy (Debian package iio-sensor-proxy)
# IIO sensors to D-Bus proxy
# Industrial I/O subsystem is intended to provide support for devices
-# that in some sense are analog to digital or digital to analog convertors
+# that in some sense are analog to digital or digital to analog converters
# .
# Devices that fall into this category are:
# * ADCs
diff --git a/policy/modules/services/lircd.if b/policy/modules/services/lircd.if
index d7cbf4dd..4394dd3f 100644
--- a/policy/modules/services/lircd.if
+++ b/policy/modules/services/lircd.if
@@ -1,4 +1,4 @@
-## <summary>Linux infared remote control daemon.</summary>
+## <summary>Linux infrared remote control daemon.</summary>
########################################
## <summary>
diff --git a/policy/modules/services/ppp.if b/policy/modules/services/ppp.if
index cf7f567d..610e4bff 100644
--- a/policy/modules/services/ppp.if
+++ b/policy/modules/services/ppp.if
@@ -90,7 +90,7 @@ interface(`ppp_home_filetrans_ppp_home',`
########################################
## <summary>
-## Inherit and use ppp file discriptors.
+## Inherit and use ppp file descriptors.
## </summary>
## <param name="domain">
## <summary>
@@ -109,7 +109,7 @@ interface(`ppp_use_fds',`
########################################
## <summary>
## Do not audit attempts to inherit
-## and use ppp file discriptors.
+## and use ppp file descriptors.
## </summary>
## <param name="domain">
## <summary>
diff --git a/policy/modules/services/tgtd.if b/policy/modules/services/tgtd.if
index 3fb94581..998e5ee0 100644
--- a/policy/modules/services/tgtd.if
+++ b/policy/modules/services/tgtd.if
@@ -21,7 +21,7 @@ interface(`tgtd_rw_semaphores',`
######################################
## <summary>
## Create, read, write, and delete
-## tgtd sempaphores.
+## tgtd semaphores.
## </summary>
## <param name="domain">
## <summary>
diff --git a/policy/modules/services/virt.if b/policy/modules/services/virt.if
index 01e8a125..9b28d670 100644
--- a/policy/modules/services/virt.if
+++ b/policy/modules/services/virt.if
@@ -1083,7 +1083,7 @@ interface(`virt_lxc_sigchld',`
########################################
## <summary>
-## Read and write virtd lxc unamed pipes.
+## Read and write virtd lxc unnamed pipes.
## </summary>
## <param name="domain">
## <summary>
@@ -1195,7 +1195,7 @@ interface(`virt_virsh_sigchld',`
########################################
## <summary>
-## Read and write virsh unamed pipes.
+## Read and write virsh unnamed pipes.
## </summary>
## <param name="domain">
## <summary>
diff --git a/policy/modules/system/iscsi.if b/policy/modules/system/iscsi.if
index 8268483e..971a36ed 100644
--- a/policy/modules/system/iscsi.if
+++ b/policy/modules/system/iscsi.if
@@ -22,7 +22,7 @@ interface(`iscsid_domtrans',`
########################################
## <summary>
## Create, read, write, and delete
-## iscsid sempaphores.
+## iscsid semaphores.
## </summary>
## <param name="domain">
## <summary>
diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te
index 7acc3834..87b03c0a 100644
--- a/policy/modules/system/systemd.te
+++ b/policy/modules/system/systemd.te
@@ -589,7 +589,7 @@ kernel_use_fds(systemd_generator_t)
kernel_read_system_state(systemd_generator_t)
kernel_read_kernel_sysctls(systemd_generator_t)
kernel_dontaudit_getattr_proc(systemd_generator_t)
-# Where an unlabeled mountpoint is encounted:
+# Where an unlabeled mountpoint is encountered:
kernel_dontaudit_search_unlabeled(systemd_generator_t)
# vmware_vsock
kernel_request_load_module(systemd_generator_t)
diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if
index 3b63399e..bb293dc6 100644
--- a/policy/modules/system/userdomain.if
+++ b/policy/modules/system/userdomain.if
@@ -109,7 +109,7 @@ template(`userdom_base_user_template',`
files_read_world_readable_symlinks($1_t)
files_read_world_readable_pipes($1_t)
files_read_world_readable_sockets($1_t)
- # old broswer_domain():
+ # old browser_domain():
files_dontaudit_list_non_security($1_t)
files_dontaudit_getattr_non_security_files($1_t)
files_dontaudit_getattr_non_security_symlinks($1_t)
@@ -4488,7 +4488,7 @@ interface(`userdom_xsession_spec_domtrans_unpriv_users',`
#######################################
## <summary>
-## Read and write unpriviledged user SysV sempaphores.
+## Read and write unprivileged user SysV semaphores.
## </summary>
## <param name="domain">
## <summary>
@@ -4506,7 +4506,7 @@ interface(`userdom_rw_unpriv_user_semaphores',`
########################################
## <summary>
-## Manage unpriviledged user SysV sempaphores.
+## Manage unprivileged user SysV semaphores.
## </summary>
## <param name="domain">
## <summary>
@@ -4524,7 +4524,7 @@ interface(`userdom_manage_unpriv_user_semaphores',`
#######################################
## <summary>
-## Read and write unpriviledged user SysV shared
+## Read and write unprivileged user SysV shared
## memory segments.
## </summary>
## <param name="domain">
@@ -4543,7 +4543,7 @@ interface(`userdom_rw_unpriv_user_shared_mem',`
########################################
## <summary>
-## Manage unpriviledged user SysV shared
+## Manage unprivileged user SysV shared
## memory segments.
## </summary>
## <param name="domain">