Fix misspelling
Fix misspelling using http://github.com/lyda/misspell-check Signed-off-by: Elia Pinto <gitter.spiros@gmail.com>
This commit is contained in:
parent
d580aae38f
commit
a55da23db2
|
@ -71,7 +71,7 @@ typealias etc_t alias snmpd_etc_t;
|
||||||
#
|
#
|
||||||
type etc_runtime_t;
|
type etc_runtime_t;
|
||||||
files_type(etc_runtime_t)
|
files_type(etc_runtime_t)
|
||||||
#Temporarily in policy until FC5 dissappears
|
#Temporarily in policy until FC5 disappears
|
||||||
typealias etc_runtime_t alias firstboot_rw_t;
|
typealias etc_runtime_t alias firstboot_rw_t;
|
||||||
|
|
||||||
#
|
#
|
||||||
|
|
|
@ -82,7 +82,7 @@ interface(`storage_dontaudit_setattr_fixed_disk_dev',`
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Allow the caller to directly read from a fixed disk.
|
## Allow the caller to directly read from a fixed disk.
|
||||||
## This is extremly dangerous as it can bypass the
|
## This is extremely dangerous as it can bypass the
|
||||||
## SELinux protections for filesystem objects, and
|
## SELinux protections for filesystem objects, and
|
||||||
## should only be used by trusted domains.
|
## should only be used by trusted domains.
|
||||||
## </summary>
|
## </summary>
|
||||||
|
@ -128,7 +128,7 @@ interface(`storage_dontaudit_read_fixed_disk',`
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Allow the caller to directly write to a fixed disk.
|
## Allow the caller to directly write to a fixed disk.
|
||||||
## This is extremly dangerous as it can bypass the
|
## This is extremely dangerous as it can bypass the
|
||||||
## SELinux protections for filesystem objects, and
|
## SELinux protections for filesystem objects, and
|
||||||
## should only be used by trusted domains.
|
## should only be used by trusted domains.
|
||||||
## </summary>
|
## </summary>
|
||||||
|
@ -173,7 +173,7 @@ interface(`storage_dontaudit_write_fixed_disk',`
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
## Allow the caller to directly read and write to a fixed disk.
|
## Allow the caller to directly read and write to a fixed disk.
|
||||||
## This is extremly dangerous as it can bypass the
|
## This is extremely dangerous as it can bypass the
|
||||||
## SELinux protections for filesystem objects, and
|
## SELinux protections for filesystem objects, and
|
||||||
## should only be used by trusted domains.
|
## should only be used by trusted domains.
|
||||||
## </summary>
|
## </summary>
|
||||||
|
@ -432,7 +432,7 @@ interface(`storage_setattr_scsi_generic_dev',`
|
||||||
## <summary>
|
## <summary>
|
||||||
## Allow the caller to directly read, in a
|
## Allow the caller to directly read, in a
|
||||||
## generic fashion, from any SCSI device.
|
## generic fashion, from any SCSI device.
|
||||||
## This is extremly dangerous as it can bypass the
|
## This is extremely dangerous as it can bypass the
|
||||||
## SELinux protections for filesystem objects, and
|
## SELinux protections for filesystem objects, and
|
||||||
## should only be used by trusted domains.
|
## should only be used by trusted domains.
|
||||||
## </summary>
|
## </summary>
|
||||||
|
@ -457,7 +457,7 @@ interface(`storage_read_scsi_generic',`
|
||||||
## <summary>
|
## <summary>
|
||||||
## Allow the caller to directly write, in a
|
## Allow the caller to directly write, in a
|
||||||
## generic fashion, from any SCSI device.
|
## generic fashion, from any SCSI device.
|
||||||
## This is extremly dangerous as it can bypass the
|
## This is extremely dangerous as it can bypass the
|
||||||
## SELinux protections for filesystem objects, and
|
## SELinux protections for filesystem objects, and
|
||||||
## should only be used by trusted domains.
|
## should only be used by trusted domains.
|
||||||
## </summary>
|
## </summary>
|
||||||
|
@ -638,7 +638,7 @@ interface(`storage_dontaudit_setattr_removable_dev',`
|
||||||
## <summary>
|
## <summary>
|
||||||
## Allow the caller to directly read from
|
## Allow the caller to directly read from
|
||||||
## a removable device.
|
## a removable device.
|
||||||
## This is extremly dangerous as it can bypass the
|
## This is extremely dangerous as it can bypass the
|
||||||
## SELinux protections for filesystem objects, and
|
## SELinux protections for filesystem objects, and
|
||||||
## should only be used by trusted domains.
|
## should only be used by trusted domains.
|
||||||
## </summary>
|
## </summary>
|
||||||
|
@ -679,7 +679,7 @@ interface(`storage_dontaudit_raw_read_removable_device',`
|
||||||
## <summary>
|
## <summary>
|
||||||
## Allow the caller to directly write to
|
## Allow the caller to directly write to
|
||||||
## a removable device.
|
## a removable device.
|
||||||
## This is extremly dangerous as it can bypass the
|
## This is extremely dangerous as it can bypass the
|
||||||
## SELinux protections for filesystem objects, and
|
## SELinux protections for filesystem objects, and
|
||||||
## should only be used by trusted domains.
|
## should only be used by trusted domains.
|
||||||
## </summary>
|
## </summary>
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
## <summary>Miscelaneous files.</summary>
|
## <summary>Miscellaneous files.</summary>
|
||||||
|
|
||||||
########################################
|
########################################
|
||||||
## <summary>
|
## <summary>
|
||||||
|
|
|
@ -193,7 +193,7 @@ ifdef(`distro_debian',`
|
||||||
|
|
||||||
ifdef(`distro_gentoo',`
|
ifdef(`distro_gentoo',`
|
||||||
# during boot, init scripts use /dev/.rcsysinit
|
# during boot, init scripts use /dev/.rcsysinit
|
||||||
# existance to determine if we are in early booting
|
# existence to determine if we are in early booting
|
||||||
init_getattr_script_status_files(udev_t)
|
init_getattr_script_status_files(udev_t)
|
||||||
')
|
')
|
||||||
|
|
||||||
|
|
|
@ -1521,7 +1521,7 @@ interface(`userdom_search_user_home_dirs',`
|
||||||
## <desc>
|
## <desc>
|
||||||
## <p>
|
## <p>
|
||||||
## Do not audit attempts to search user home directories.
|
## Do not audit attempts to search user home directories.
|
||||||
## This will supress SELinux denial messages when the specified
|
## This will suppress SELinux denial messages when the specified
|
||||||
## domain is denied the permission to search these directories.
|
## domain is denied the permission to search these directories.
|
||||||
## </p>
|
## </p>
|
||||||
## </desc>
|
## </desc>
|
||||||
|
@ -3200,7 +3200,7 @@ interface(`userdom_use_unpriv_users_fds',`
|
||||||
## <desc>
|
## <desc>
|
||||||
## <p>
|
## <p>
|
||||||
## Do not audit attempts to inherit the file descriptors
|
## Do not audit attempts to inherit the file descriptors
|
||||||
## from unprivileged user domains. This will supress
|
## from unprivileged user domains. This will suppress
|
||||||
## SELinux denial messages when the specified domain is denied
|
## SELinux denial messages when the specified domain is denied
|
||||||
## the permission to inherit these file descriptors.
|
## the permission to inherit these file descriptors.
|
||||||
## </p>
|
## </p>
|
||||||
|
|
Loading…
Reference in New Issue