diff options
author | 2024-10-30 15:15:20 +0100 | |
---|---|---|
committer | 2024-12-14 16:19:19 -0800 | |
commit | 76c68233e74634e043c157870296e7aaa5e45aa9 (patch) | |
tree | dcc21f325f5afc8584951de6536e661a9c0a958e /policy | |
parent | bootloader: get scheduling information (diff) | |
download | hardened-refpolicy-76c68233e74634e043c157870296e7aaa5e45aa9.tar.gz hardened-refpolicy-76c68233e74634e043c157870296e7aaa5e45aa9.tar.bz2 hardened-refpolicy-76c68233e74634e043c157870296e7aaa5e45aa9.zip |
Fix typos
Found by codespell(1).
Signed-off-by: Christian Göttsche <cgzones@googlemail.com>
Signed-off-by: Jason Zaman <perfinion@gentoo.org>
Diffstat (limited to 'policy')
-rw-r--r-- | policy/mls | 2 | ||||
-rw-r--r-- | policy/modules/apps/uml.te | 2 | ||||
-rw-r--r-- | policy/modules/kernel/corenetwork.if.in | 8 | ||||
-rw-r--r-- | policy/modules/kernel/corenetwork.te.m4 | 2 | ||||
-rw-r--r-- | policy/modules/kernel/devices.te | 2 | ||||
-rw-r--r-- | policy/modules/kernel/domain.if | 2 | ||||
-rw-r--r-- | policy/modules/kernel/files.if | 21 | ||||
-rw-r--r-- | policy/modules/kernel/selinux.te | 2 | ||||
-rw-r--r-- | policy/modules/services/cockpit.if | 2 | ||||
-rw-r--r-- | policy/modules/services/corosync.te | 2 | ||||
-rw-r--r-- | policy/modules/services/gssproxy.if | 2 | ||||
-rw-r--r-- | policy/modules/services/iiosensorproxy.if | 2 | ||||
-rw-r--r-- | policy/modules/services/iiosensorproxy.te | 2 | ||||
-rw-r--r-- | policy/modules/services/lircd.if | 2 | ||||
-rw-r--r-- | policy/modules/services/ppp.if | 4 | ||||
-rw-r--r-- | policy/modules/services/tgtd.if | 2 | ||||
-rw-r--r-- | policy/modules/services/virt.if | 4 | ||||
-rw-r--r-- | policy/modules/system/iscsi.if | 2 | ||||
-rw-r--r-- | policy/modules/system/systemd.te | 2 | ||||
-rw-r--r-- | policy/modules/system/userdomain.if | 10 |
20 files changed, 47 insertions, 30 deletions
@@ -2,7 +2,7 @@ ifdef(`enable_mls',` # # Define sensitivities # -# Domination of sensitivities is in increasin +# Domination of sensitivities is in increasing # numerical order, with s0 being the lowest gen_sens(mls_num_sens) diff --git a/policy/modules/apps/uml.te b/policy/modules/apps/uml.te index d48d6027..52c043df 100644 --- a/policy/modules/apps/uml.te +++ b/policy/modules/apps/uml.te @@ -32,7 +32,7 @@ type uml_switch_t; type uml_switch_exec_t; init_daemon_domain(uml_switch_t, uml_switch_exec_t) -type uml_switch_runtime_t alias uml_swich_var_run_t; +type uml_switch_runtime_t alias uml_switch_var_run_t; files_runtime_file(uml_switch_runtime_t) ######################################## diff --git a/policy/modules/kernel/corenetwork.if.in b/policy/modules/kernel/corenetwork.if.in index bc153546..1f0ad3df 100644 --- a/policy/modules/kernel/corenetwork.if.in +++ b/policy/modules/kernel/corenetwork.if.in @@ -1612,7 +1612,7 @@ interface(`corenet_tcp_bind_all_ports',` ######################################## ## <summary> -## Do not audit attepts to bind TCP sockets to any ports. +## Do not audit attempts to bind TCP sockets to any ports. ## </summary> ## <param name="domain"> ## <summary> @@ -1667,7 +1667,7 @@ interface(`corenet_sctp_connect_generic_port',` ######################################## ## <summary> -## Do not audit attepts to bind UDP sockets to any ports. +## Do not audit attempts to bind UDP sockets to any ports. ## </summary> ## <param name="domain"> ## <summary> @@ -2493,7 +2493,7 @@ interface(`corenet_tcp_recvfrom_netlabel',` ######################################## ## <summary> -## Receive TCP packets from an unlabled connection. +## Receive TCP packets from an unlabeled connection. ## </summary> ## <param name="domain"> ## <summary> @@ -3344,7 +3344,7 @@ interface(`corenet_relabelto_all_server_packets',` ######################################## ## <summary> -## Receive SCTP packets from an unlabled connection. +## Receive SCTP packets from an unlabeled connection. ## </summary> ## <param name="domain"> ## <summary> diff --git a/policy/modules/kernel/corenetwork.te.m4 b/policy/modules/kernel/corenetwork.te.m4 index e512750a..5c1d69f7 100644 --- a/policy/modules/kernel/corenetwork.te.m4 +++ b/policy/modules/kernel/corenetwork.te.m4 @@ -125,7 +125,7 @@ ifelse(`$5',`',`',`declare_ibpkeycons($1,shiftn(4,$*))')dnl ') # -# ib_pkey(nam, subnet_prefix, pkey_num, mls_sensitivity [,subnet_prefix, pkey_num, mls_sensitivity[,...]]) +# ib_pkey(name, subnet_prefix, pkey_num, mls_sensitivity [,subnet_prefix, pkey_num, mls_sensitivity[,...]]) # define(`ib_pkey',` type $1_ibpkey_t, ibpkey_type; diff --git a/policy/modules/kernel/devices.te b/policy/modules/kernel/devices.te index a3eeba4a..84c0069a 100644 --- a/policy/modules/kernel/devices.te +++ b/policy/modules/kernel/devices.te @@ -86,7 +86,7 @@ genfscon sysfs /devices/system/cpu/online gen_context(system_u:object_r:cpu_onli type crash_device_t; dev_node(crash_device_t) -# for the IBM zSeries z90crypt hardware ssl accelorator +# for the IBM zSeries z90crypt hardware ssl accelerator type crypt_device_t; dev_node(crypt_device_t) diff --git a/policy/modules/kernel/domain.if b/policy/modules/kernel/domain.if index fdd32fb3..3f1388e3 100644 --- a/policy/modules/kernel/domain.if +++ b/policy/modules/kernel/domain.if @@ -417,7 +417,7 @@ interface(`domain_dontaudit_use_interactive_fds',` ######################################## ## <summary> ## Send a SIGCHLD signal to domains whose file -## discriptors are widely inheritable. +## descriptors are widely inheritable. ## </summary> ## <param name="domain"> ## <summary> diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if index 778e8271..b9aaeba0 100644 --- a/policy/modules/kernel/files.if +++ b/policy/modules/kernel/files.if @@ -3840,7 +3840,7 @@ interface(`files_dontaudit_read_etc_runtime_files',` ######################################## ## <summary> -## Do not audit attempts to execuite files +## Do not audit attempts to execute files ## in /etc that are dynamically ## created on boot, such as mtab. ## </summary> @@ -3850,7 +3850,7 @@ interface(`files_dontaudit_read_etc_runtime_files',` ## </summary> ## </param> # -interface(`files_dontaudit_execuite_etc_runtime_files',` +interface(`files_dontaudit_exec_etc_runtime_files',` gen_require(` type etc_runtime_t; ') @@ -3860,6 +3860,23 @@ interface(`files_dontaudit_execuite_etc_runtime_files',` ######################################## ## <summary> +## Do not audit attempts to execute files +## in /etc that are dynamically +## created on boot, such as mtab. +## </summary> +## <param name="domain"> +## <summary> +## Domain to not audit. +## </summary> +## </param> +# +interface(`files_dontaudit_execuite_etc_runtime_files',` + refpolicywarn(`$0($*) has been deprecated, please use files_dontaudit_exec_etc_runtime_files() instead.') + files_dontaudit_exec_etc_runtime_files($1) +') + +######################################## +## <summary> ## Do not audit attempts to read files ## in /etc ## </summary> diff --git a/policy/modules/kernel/selinux.te b/policy/modules/kernel/selinux.te index c249eaab..e76bf0b3 100644 --- a/policy/modules/kernel/selinux.te +++ b/policy/modules/kernel/selinux.te @@ -15,7 +15,7 @@ gen_bool(secure_mode_policyload,false) ## <desc> ## <p> -## Boolean to determine whether the system permits setting Booelan values. +## Boolean to determine whether the system permits setting Boolean values. ## </p> ## </desc> gen_bool(secure_mode_setbool,false) diff --git a/policy/modules/services/cockpit.if b/policy/modules/services/cockpit.if index b7985437..325672d2 100644 --- a/policy/modules/services/cockpit.if +++ b/policy/modules/services/cockpit.if @@ -54,7 +54,7 @@ template(`cockpit_role_template',` dev_dontaudit_execute_dev_nodes($2) files_dontaudit_execute_default_files($2) - files_dontaudit_execuite_etc_runtime_files($2) + files_dontaudit_exec_etc_runtime_files($2) files_dontaudit_exec_runtime($2) files_watch_etc_files($2) files_watch_root_dirs($2) diff --git a/policy/modules/services/corosync.te b/policy/modules/services/corosync.te index 3ed8ef43..3e0a8014 100644 --- a/policy/modules/services/corosync.te +++ b/policy/modules/services/corosync.te @@ -37,7 +37,7 @@ logging_log_file(corosync_var_log_t) # allow corosync_t self:capability { dac_override fowner ipc_lock setgid setuid sys_admin sys_nice sys_resource }; -# for hearbeat +# for heartbeat allow corosync_t self:capability { chown net_raw }; allow corosync_t self:process { setpgid setrlimit setsched signal signull }; allow corosync_t self:fifo_file rw_fifo_file_perms; diff --git a/policy/modules/services/gssproxy.if b/policy/modules/services/gssproxy.if index 693d5228..34c9631b 100644 --- a/policy/modules/services/gssproxy.if +++ b/policy/modules/services/gssproxy.if @@ -2,7 +2,7 @@ ######################################## ## <summary> -## Execute gssproxy in the gssproxy domin. +## Execute gssproxy in the gssproxy domain. ## </summary> ## <param name="domain"> ## <summary> diff --git a/policy/modules/services/iiosensorproxy.if b/policy/modules/services/iiosensorproxy.if index 0dc70034..f991edf0 100644 --- a/policy/modules/services/iiosensorproxy.if +++ b/policy/modules/services/iiosensorproxy.if @@ -2,7 +2,7 @@ ## ## <desc> ## Industrial I/O subsystem is intended to provide support for devices -## that in some sense are analog to digital or digital to analog convertors +## that in some sense are analog to digital or digital to analog converters ## . ## Devices that fall into this category are: ## * ADCs diff --git a/policy/modules/services/iiosensorproxy.te b/policy/modules/services/iiosensorproxy.te index a820877f..348c2839 100644 --- a/policy/modules/services/iiosensorproxy.te +++ b/policy/modules/services/iiosensorproxy.te @@ -5,7 +5,7 @@ policy_module(iiosensorproxy) # iio-sensor-proxy (Debian package iio-sensor-proxy) # IIO sensors to D-Bus proxy # Industrial I/O subsystem is intended to provide support for devices -# that in some sense are analog to digital or digital to analog convertors +# that in some sense are analog to digital or digital to analog converters # . # Devices that fall into this category are: # * ADCs diff --git a/policy/modules/services/lircd.if b/policy/modules/services/lircd.if index d7cbf4dd..4394dd3f 100644 --- a/policy/modules/services/lircd.if +++ b/policy/modules/services/lircd.if @@ -1,4 +1,4 @@ -## <summary>Linux infared remote control daemon.</summary> +## <summary>Linux infrared remote control daemon.</summary> ######################################## ## <summary> diff --git a/policy/modules/services/ppp.if b/policy/modules/services/ppp.if index cf7f567d..610e4bff 100644 --- a/policy/modules/services/ppp.if +++ b/policy/modules/services/ppp.if @@ -90,7 +90,7 @@ interface(`ppp_home_filetrans_ppp_home',` ######################################## ## <summary> -## Inherit and use ppp file discriptors. +## Inherit and use ppp file descriptors. ## </summary> ## <param name="domain"> ## <summary> @@ -109,7 +109,7 @@ interface(`ppp_use_fds',` ######################################## ## <summary> ## Do not audit attempts to inherit -## and use ppp file discriptors. +## and use ppp file descriptors. ## </summary> ## <param name="domain"> ## <summary> diff --git a/policy/modules/services/tgtd.if b/policy/modules/services/tgtd.if index 3fb94581..998e5ee0 100644 --- a/policy/modules/services/tgtd.if +++ b/policy/modules/services/tgtd.if @@ -21,7 +21,7 @@ interface(`tgtd_rw_semaphores',` ###################################### ## <summary> ## Create, read, write, and delete -## tgtd sempaphores. +## tgtd semaphores. ## </summary> ## <param name="domain"> ## <summary> diff --git a/policy/modules/services/virt.if b/policy/modules/services/virt.if index 01e8a125..9b28d670 100644 --- a/policy/modules/services/virt.if +++ b/policy/modules/services/virt.if @@ -1083,7 +1083,7 @@ interface(`virt_lxc_sigchld',` ######################################## ## <summary> -## Read and write virtd lxc unamed pipes. +## Read and write virtd lxc unnamed pipes. ## </summary> ## <param name="domain"> ## <summary> @@ -1195,7 +1195,7 @@ interface(`virt_virsh_sigchld',` ######################################## ## <summary> -## Read and write virsh unamed pipes. +## Read and write virsh unnamed pipes. ## </summary> ## <param name="domain"> ## <summary> diff --git a/policy/modules/system/iscsi.if b/policy/modules/system/iscsi.if index 8268483e..971a36ed 100644 --- a/policy/modules/system/iscsi.if +++ b/policy/modules/system/iscsi.if @@ -22,7 +22,7 @@ interface(`iscsid_domtrans',` ######################################## ## <summary> ## Create, read, write, and delete -## iscsid sempaphores. +## iscsid semaphores. ## </summary> ## <param name="domain"> ## <summary> diff --git a/policy/modules/system/systemd.te b/policy/modules/system/systemd.te index 7acc3834..87b03c0a 100644 --- a/policy/modules/system/systemd.te +++ b/policy/modules/system/systemd.te @@ -589,7 +589,7 @@ kernel_use_fds(systemd_generator_t) kernel_read_system_state(systemd_generator_t) kernel_read_kernel_sysctls(systemd_generator_t) kernel_dontaudit_getattr_proc(systemd_generator_t) -# Where an unlabeled mountpoint is encounted: +# Where an unlabeled mountpoint is encountered: kernel_dontaudit_search_unlabeled(systemd_generator_t) # vmware_vsock kernel_request_load_module(systemd_generator_t) diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if index 3b63399e..bb293dc6 100644 --- a/policy/modules/system/userdomain.if +++ b/policy/modules/system/userdomain.if @@ -109,7 +109,7 @@ template(`userdom_base_user_template',` files_read_world_readable_symlinks($1_t) files_read_world_readable_pipes($1_t) files_read_world_readable_sockets($1_t) - # old broswer_domain(): + # old browser_domain(): files_dontaudit_list_non_security($1_t) files_dontaudit_getattr_non_security_files($1_t) files_dontaudit_getattr_non_security_symlinks($1_t) @@ -4488,7 +4488,7 @@ interface(`userdom_xsession_spec_domtrans_unpriv_users',` ####################################### ## <summary> -## Read and write unpriviledged user SysV sempaphores. +## Read and write unprivileged user SysV semaphores. ## </summary> ## <param name="domain"> ## <summary> @@ -4506,7 +4506,7 @@ interface(`userdom_rw_unpriv_user_semaphores',` ######################################## ## <summary> -## Manage unpriviledged user SysV sempaphores. +## Manage unprivileged user SysV semaphores. ## </summary> ## <param name="domain"> ## <summary> @@ -4524,7 +4524,7 @@ interface(`userdom_manage_unpriv_user_semaphores',` ####################################### ## <summary> -## Read and write unpriviledged user SysV shared +## Read and write unprivileged user SysV shared ## memory segments. ## </summary> ## <param name="domain"> @@ -4543,7 +4543,7 @@ interface(`userdom_rw_unpriv_user_shared_mem',` ######################################## ## <summary> -## Manage unpriviledged user SysV shared +## Manage unprivileged user SysV shared ## memory segments. ## </summary> ## <param name="domain"> |