commit: a7acfa6001b742d245b462b31fe8581625d4a431 Author: Elia Pinto <gitter.spiros <AT> gmail <DOT> com> AuthorDate: Fri Jun 6 08:04:25 2014 +0000 Commit: Sven Vermeulen <swift <AT> gentoo <DOT> org> CommitDate: Tue Jun 10 18:14:33 2014 +0000 URL: http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=a7acfa60
Fix misspelling Fix misspelling using http://github.com/lyda/misspell-check Signed-off-by: Elia Pinto <gitter.spiros <AT> gmail.com> --- policy/modules/kernel/files.te | 2 +- policy/modules/kernel/storage.if | 14 +++++++------- policy/modules/system/miscfiles.if | 2 +- policy/modules/system/udev.te | 2 +- policy/modules/system/userdomain.if | 4 ++-- 5 files changed, 12 insertions(+), 12 deletions(-) diff --git a/policy/modules/kernel/files.te b/policy/modules/kernel/files.te index cdc1801..852bd46 100644 --- a/policy/modules/kernel/files.te +++ b/policy/modules/kernel/files.te @@ -71,7 +71,7 @@ typealias etc_t alias snmpd_etc_t; # type etc_runtime_t; files_type(etc_runtime_t) -#Temporarily in policy until FC5 dissappears +#Temporarily in policy until FC5 disappears typealias etc_runtime_t alias firstboot_rw_t; # diff --git a/policy/modules/kernel/storage.if b/policy/modules/kernel/storage.if index 64c4cd0..5c1be6b 100644 --- a/policy/modules/kernel/storage.if +++ b/policy/modules/kernel/storage.if @@ -82,7 +82,7 @@ interface(`storage_dontaudit_setattr_fixed_disk_dev',` ######################################## ## <summary> ## Allow the caller to directly read from a fixed disk. -## This is extremly dangerous as it can bypass the +## This is extremely dangerous as it can bypass the ## SELinux protections for filesystem objects, and ## should only be used by trusted domains. ## </summary> @@ -128,7 +128,7 @@ interface(`storage_dontaudit_read_fixed_disk',` ######################################## ## <summary> ## Allow the caller to directly write to a fixed disk. -## This is extremly dangerous as it can bypass the +## This is extremely dangerous as it can bypass the ## SELinux protections for filesystem objects, and ## should only be used by trusted domains. ## </summary> @@ -173,7 +173,7 @@ interface(`storage_dontaudit_write_fixed_disk',` ######################################## ## <summary> ## Allow the caller to directly read and write to a fixed disk. -## This is extremly dangerous as it can bypass the +## This is extremely dangerous as it can bypass the ## SELinux protections for filesystem objects, and ## should only be used by trusted domains. ## </summary> @@ -432,7 +432,7 @@ interface(`storage_setattr_scsi_generic_dev',` ## <summary> ## Allow the caller to directly read, in a ## generic fashion, from any SCSI device. -## This is extremly dangerous as it can bypass the +## This is extremely dangerous as it can bypass the ## SELinux protections for filesystem objects, and ## should only be used by trusted domains. ## </summary> @@ -457,7 +457,7 @@ interface(`storage_read_scsi_generic',` ## <summary> ## Allow the caller to directly write, in a ## generic fashion, from any SCSI device. -## This is extremly dangerous as it can bypass the +## This is extremely dangerous as it can bypass the ## SELinux protections for filesystem objects, and ## should only be used by trusted domains. ## </summary> @@ -638,7 +638,7 @@ interface(`storage_dontaudit_setattr_removable_dev',` ## <summary> ## Allow the caller to directly read from ## a removable device. -## This is extremly dangerous as it can bypass the +## This is extremely dangerous as it can bypass the ## SELinux protections for filesystem objects, and ## should only be used by trusted domains. ## </summary> @@ -679,7 +679,7 @@ interface(`storage_dontaudit_raw_read_removable_device',` ## <summary> ## Allow the caller to directly write to ## a removable device. -## This is extremly dangerous as it can bypass the +## This is extremely dangerous as it can bypass the ## SELinux protections for filesystem objects, and ## should only be used by trusted domains. ## </summary> diff --git a/policy/modules/system/miscfiles.if b/policy/modules/system/miscfiles.if index 8b9072c..d9220f7 100644 --- a/policy/modules/system/miscfiles.if +++ b/policy/modules/system/miscfiles.if @@ -1,4 +1,4 @@ -## <summary>Miscelaneous files.</summary> +## <summary>Miscellaneous files.</summary> ######################################## ## <summary> diff --git a/policy/modules/system/udev.te b/policy/modules/system/udev.te index 78652da..95de10c 100644 --- a/policy/modules/system/udev.te +++ b/policy/modules/system/udev.te @@ -193,7 +193,7 @@ ifdef(`distro_debian',` ifdef(`distro_gentoo',` # during boot, init scripts use /dev/.rcsysinit - # existance to determine if we are in early booting + # existence to determine if we are in early booting init_getattr_script_status_files(udev_t) ') diff --git a/policy/modules/system/userdomain.if b/policy/modules/system/userdomain.if index 3cec4f1..7ad8e5b 100644 --- a/policy/modules/system/userdomain.if +++ b/policy/modules/system/userdomain.if @@ -1548,7 +1548,7 @@ interface(`userdom_search_user_home_dirs',` ## <desc> ## <p> ## Do not audit attempts to search user home directories. -## This will supress SELinux denial messages when the specified +## This will suppress SELinux denial messages when the specified ## domain is denied the permission to search these directories. ## </p> ## </desc> @@ -3227,7 +3227,7 @@ interface(`userdom_use_unpriv_users_fds',` ## <desc> ## <p> ## Do not audit attempts to inherit the file descriptors -## from unprivileged user domains. This will supress +## from unprivileged user domains. This will suppress ## SELinux denial messages when the specified domain is denied ## the permission to inherit these file descriptors. ## </p>