Fix misspelling
Fix misspelling using http://github.com/lyda/misspell-check Signed-off-by: Elia Pinto <gitter.spiros@gmail.com>
This commit is contained in:
parent
d580aae38f
commit
a55da23db2
|
@ -71,7 +71,7 @@ typealias etc_t alias snmpd_etc_t;
|
|||
#
|
||||
type etc_runtime_t;
|
||||
files_type(etc_runtime_t)
|
||||
#Temporarily in policy until FC5 dissappears
|
||||
#Temporarily in policy until FC5 disappears
|
||||
typealias etc_runtime_t alias firstboot_rw_t;
|
||||
|
||||
#
|
||||
|
|
|
@ -82,7 +82,7 @@ interface(`storage_dontaudit_setattr_fixed_disk_dev',`
|
|||
########################################
|
||||
## <summary>
|
||||
## Allow the caller to directly read from a fixed disk.
|
||||
## This is extremly dangerous as it can bypass the
|
||||
## This is extremely dangerous as it can bypass the
|
||||
## SELinux protections for filesystem objects, and
|
||||
## should only be used by trusted domains.
|
||||
## </summary>
|
||||
|
@ -128,7 +128,7 @@ interface(`storage_dontaudit_read_fixed_disk',`
|
|||
########################################
|
||||
## <summary>
|
||||
## Allow the caller to directly write to a fixed disk.
|
||||
## This is extremly dangerous as it can bypass the
|
||||
## This is extremely dangerous as it can bypass the
|
||||
## SELinux protections for filesystem objects, and
|
||||
## should only be used by trusted domains.
|
||||
## </summary>
|
||||
|
@ -173,7 +173,7 @@ interface(`storage_dontaudit_write_fixed_disk',`
|
|||
########################################
|
||||
## <summary>
|
||||
## Allow the caller to directly read and write to a fixed disk.
|
||||
## This is extremly dangerous as it can bypass the
|
||||
## This is extremely dangerous as it can bypass the
|
||||
## SELinux protections for filesystem objects, and
|
||||
## should only be used by trusted domains.
|
||||
## </summary>
|
||||
|
@ -432,7 +432,7 @@ interface(`storage_setattr_scsi_generic_dev',`
|
|||
## <summary>
|
||||
## Allow the caller to directly read, in a
|
||||
## generic fashion, from any SCSI device.
|
||||
## This is extremly dangerous as it can bypass the
|
||||
## This is extremely dangerous as it can bypass the
|
||||
## SELinux protections for filesystem objects, and
|
||||
## should only be used by trusted domains.
|
||||
## </summary>
|
||||
|
@ -457,7 +457,7 @@ interface(`storage_read_scsi_generic',`
|
|||
## <summary>
|
||||
## Allow the caller to directly write, in a
|
||||
## generic fashion, from any SCSI device.
|
||||
## This is extremly dangerous as it can bypass the
|
||||
## This is extremely dangerous as it can bypass the
|
||||
## SELinux protections for filesystem objects, and
|
||||
## should only be used by trusted domains.
|
||||
## </summary>
|
||||
|
@ -638,7 +638,7 @@ interface(`storage_dontaudit_setattr_removable_dev',`
|
|||
## <summary>
|
||||
## Allow the caller to directly read from
|
||||
## a removable device.
|
||||
## This is extremly dangerous as it can bypass the
|
||||
## This is extremely dangerous as it can bypass the
|
||||
## SELinux protections for filesystem objects, and
|
||||
## should only be used by trusted domains.
|
||||
## </summary>
|
||||
|
@ -679,7 +679,7 @@ interface(`storage_dontaudit_raw_read_removable_device',`
|
|||
## <summary>
|
||||
## Allow the caller to directly write to
|
||||
## a removable device.
|
||||
## This is extremly dangerous as it can bypass the
|
||||
## This is extremely dangerous as it can bypass the
|
||||
## SELinux protections for filesystem objects, and
|
||||
## should only be used by trusted domains.
|
||||
## </summary>
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
## <summary>Miscelaneous files.</summary>
|
||||
## <summary>Miscellaneous files.</summary>
|
||||
|
||||
########################################
|
||||
## <summary>
|
||||
|
|
|
@ -193,7 +193,7 @@ ifdef(`distro_debian',`
|
|||
|
||||
ifdef(`distro_gentoo',`
|
||||
# during boot, init scripts use /dev/.rcsysinit
|
||||
# existance to determine if we are in early booting
|
||||
# existence to determine if we are in early booting
|
||||
init_getattr_script_status_files(udev_t)
|
||||
')
|
||||
|
||||
|
|
|
@ -1521,7 +1521,7 @@ interface(`userdom_search_user_home_dirs',`
|
|||
## <desc>
|
||||
## <p>
|
||||
## Do not audit attempts to search user home directories.
|
||||
## This will supress SELinux denial messages when the specified
|
||||
## This will suppress SELinux denial messages when the specified
|
||||
## domain is denied the permission to search these directories.
|
||||
## </p>
|
||||
## </desc>
|
||||
|
@ -3200,7 +3200,7 @@ interface(`userdom_use_unpriv_users_fds',`
|
|||
## <desc>
|
||||
## <p>
|
||||
## Do not audit attempts to inherit the file descriptors
|
||||
## from unprivileged user domains. This will supress
|
||||
## from unprivileged user domains. This will suppress
|
||||
## SELinux denial messages when the specified domain is denied
|
||||
## the permission to inherit these file descriptors.
|
||||
## </p>
|
||||
|
|
Loading…
Reference in New Issue