Fix misspelling

Fix misspelling using  http://github.com/lyda/misspell-check

Signed-off-by: Elia Pinto <gitter.spiros@gmail.com>
This commit is contained in:
Elia Pinto 2014-06-06 01:04:25 -07:00 committed by Chris PeBenito
parent d580aae38f
commit a55da23db2
5 changed files with 12 additions and 12 deletions

View File

@ -71,7 +71,7 @@ typealias etc_t alias snmpd_etc_t;
# #
type etc_runtime_t; type etc_runtime_t;
files_type(etc_runtime_t) files_type(etc_runtime_t)
#Temporarily in policy until FC5 dissappears #Temporarily in policy until FC5 disappears
typealias etc_runtime_t alias firstboot_rw_t; typealias etc_runtime_t alias firstboot_rw_t;
# #

View File

@ -82,7 +82,7 @@ interface(`storage_dontaudit_setattr_fixed_disk_dev',`
######################################## ########################################
## <summary> ## <summary>
## Allow the caller to directly read from a fixed disk. ## Allow the caller to directly read from a fixed disk.
## This is extremly dangerous as it can bypass the ## This is extremely dangerous as it can bypass the
## SELinux protections for filesystem objects, and ## SELinux protections for filesystem objects, and
## should only be used by trusted domains. ## should only be used by trusted domains.
## </summary> ## </summary>
@ -128,7 +128,7 @@ interface(`storage_dontaudit_read_fixed_disk',`
######################################## ########################################
## <summary> ## <summary>
## Allow the caller to directly write to a fixed disk. ## Allow the caller to directly write to a fixed disk.
## This is extremly dangerous as it can bypass the ## This is extremely dangerous as it can bypass the
## SELinux protections for filesystem objects, and ## SELinux protections for filesystem objects, and
## should only be used by trusted domains. ## should only be used by trusted domains.
## </summary> ## </summary>
@ -173,7 +173,7 @@ interface(`storage_dontaudit_write_fixed_disk',`
######################################## ########################################
## <summary> ## <summary>
## Allow the caller to directly read and write to a fixed disk. ## Allow the caller to directly read and write to a fixed disk.
## This is extremly dangerous as it can bypass the ## This is extremely dangerous as it can bypass the
## SELinux protections for filesystem objects, and ## SELinux protections for filesystem objects, and
## should only be used by trusted domains. ## should only be used by trusted domains.
## </summary> ## </summary>
@ -432,7 +432,7 @@ interface(`storage_setattr_scsi_generic_dev',`
## <summary> ## <summary>
## Allow the caller to directly read, in a ## Allow the caller to directly read, in a
## generic fashion, from any SCSI device. ## generic fashion, from any SCSI device.
## This is extremly dangerous as it can bypass the ## This is extremely dangerous as it can bypass the
## SELinux protections for filesystem objects, and ## SELinux protections for filesystem objects, and
## should only be used by trusted domains. ## should only be used by trusted domains.
## </summary> ## </summary>
@ -457,7 +457,7 @@ interface(`storage_read_scsi_generic',`
## <summary> ## <summary>
## Allow the caller to directly write, in a ## Allow the caller to directly write, in a
## generic fashion, from any SCSI device. ## generic fashion, from any SCSI device.
## This is extremly dangerous as it can bypass the ## This is extremely dangerous as it can bypass the
## SELinux protections for filesystem objects, and ## SELinux protections for filesystem objects, and
## should only be used by trusted domains. ## should only be used by trusted domains.
## </summary> ## </summary>
@ -638,7 +638,7 @@ interface(`storage_dontaudit_setattr_removable_dev',`
## <summary> ## <summary>
## Allow the caller to directly read from ## Allow the caller to directly read from
## a removable device. ## a removable device.
## This is extremly dangerous as it can bypass the ## This is extremely dangerous as it can bypass the
## SELinux protections for filesystem objects, and ## SELinux protections for filesystem objects, and
## should only be used by trusted domains. ## should only be used by trusted domains.
## </summary> ## </summary>
@ -679,7 +679,7 @@ interface(`storage_dontaudit_raw_read_removable_device',`
## <summary> ## <summary>
## Allow the caller to directly write to ## Allow the caller to directly write to
## a removable device. ## a removable device.
## This is extremly dangerous as it can bypass the ## This is extremely dangerous as it can bypass the
## SELinux protections for filesystem objects, and ## SELinux protections for filesystem objects, and
## should only be used by trusted domains. ## should only be used by trusted domains.
## </summary> ## </summary>

View File

@ -1,4 +1,4 @@
## <summary>Miscelaneous files.</summary> ## <summary>Miscellaneous files.</summary>
######################################## ########################################
## <summary> ## <summary>

View File

@ -193,7 +193,7 @@ ifdef(`distro_debian',`
ifdef(`distro_gentoo',` ifdef(`distro_gentoo',`
# during boot, init scripts use /dev/.rcsysinit # during boot, init scripts use /dev/.rcsysinit
# existance to determine if we are in early booting # existence to determine if we are in early booting
init_getattr_script_status_files(udev_t) init_getattr_script_status_files(udev_t)
') ')

View File

@ -1521,7 +1521,7 @@ interface(`userdom_search_user_home_dirs',`
## <desc> ## <desc>
## <p> ## <p>
## Do not audit attempts to search user home directories. ## Do not audit attempts to search user home directories.
## This will supress SELinux denial messages when the specified ## This will suppress SELinux denial messages when the specified
## domain is denied the permission to search these directories. ## domain is denied the permission to search these directories.
## </p> ## </p>
## </desc> ## </desc>
@ -3200,7 +3200,7 @@ interface(`userdom_use_unpriv_users_fds',`
## <desc> ## <desc>
## <p> ## <p>
## Do not audit attempts to inherit the file descriptors ## Do not audit attempts to inherit the file descriptors
## from unprivileged user domains. This will supress ## from unprivileged user domains. This will suppress
## SELinux denial messages when the specified domain is denied ## SELinux denial messages when the specified domain is denied
## the permission to inherit these file descriptors. ## the permission to inherit these file descriptors.
## </p> ## </p>