commit:     0a8aa1bfe479e36ab9fa014dccccbec5b3c59b0b
Author:     Nicolas Iooss <nicolas.iooss <AT> m4x <DOT> org>
AuthorDate: Mon Jan 18 23:01:10 2016 +0000
Commit:     Jason Zaman <perfinion <AT> gentoo <DOT> org>
CommitDate: Sat Jan 30 17:16:57 2016 +0000
URL:        
https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=0a8aa1bf

Fix interface descriptions when duplicate ones are found

Distinct interfaces should have different comments

 policy/modules/admin/bootloader.if      |  4 ++--
 policy/modules/kernel/corecommands.if   |  4 ++--
 policy/modules/kernel/corenetwork.if.in |  6 +++---
 policy/modules/kernel/devices.if        |  4 ++--
 policy/modules/kernel/domain.if         |  2 +-
 policy/modules/kernel/files.if          |  2 +-
 policy/modules/kernel/filesystem.if     |  9 +++++----
 policy/modules/kernel/kernel.if         |  2 +-
 policy/modules/kernel/storage.if        |  4 ++--
 policy/modules/system/iptables.if       |  3 ++-
 policy/modules/system/locallogin.if     |  2 +-
 policy/modules/system/miscfiles.if      |  3 ++-
 policy/modules/system/modutils.if       |  2 +-
 policy/modules/system/selinuxutil.if    |  2 +-
 policy/modules/system/userdomain.if     | 13 +++++++------
 15 files changed, 33 insertions(+), 29 deletions(-)

diff --git a/policy/modules/admin/bootloader.if 
b/policy/modules/admin/bootloader.if
index cc8df9d..185f749 100644
--- a/policy/modules/admin/bootloader.if
+++ b/policy/modules/admin/bootloader.if
@@ -124,8 +124,8 @@ interface(`bootloader_rw_tmp_files',`
 
 ########################################
 ## <summary>
-##     Read and write the bootloader
-##     temporary data in /tmp.
+##     Create, read and write the bootloader
+##     runtime data.
 ## </summary>
 ## <param name="domain">
 ##     <summary>

diff --git a/policy/modules/kernel/corecommands.if 
b/policy/modules/kernel/corecommands.if
index 917b160..60c1feb 100644
--- a/policy/modules/kernel/corecommands.if
+++ b/policy/modules/kernel/corecommands.if
@@ -199,11 +199,11 @@ interface(`corecmd_getattr_bin_files',`
 
 ########################################
 ## <summary>
-##     Get the attributes of files in bin directories.
+##     Do not audit attempts to get the attributes of files in bin directories.
 ## </summary>
 ## <param name="domain">
 ##     <summary>
-##     Domain allowed access.
+##     Domain to not audit.
 ##     </summary>
 ## </param>
 #

diff --git a/policy/modules/kernel/corenetwork.if.in 
b/policy/modules/kernel/corenetwork.if.in
index 6e0bb9f..4babd24 100644
--- a/policy/modules/kernel/corenetwork.if.in
+++ b/policy/modules/kernel/corenetwork.if.in
@@ -2753,12 +2753,12 @@ interface(`corenet_all_recvfrom_labeled',`
 
 ########################################
 ## <summary>
-##     Make the specified type usable
-##     for labeled ipsec.
+##     Allow specified type to set the context of
+##     a SPD entry for labeled ipsec associations.
 ## </summary>
 ## <param name="domain">
 ##     <summary>
-##     Type to be used for labeled ipsec.
+##     Domain allowed access.
 ##     </summary>
 ## </param>
 #

diff --git a/policy/modules/kernel/devices.if b/policy/modules/kernel/devices.if
index 591b932..9615efd 100644
--- a/policy/modules/kernel/devices.if
+++ b/policy/modules/kernel/devices.if
@@ -227,7 +227,7 @@ interface(`dev_add_entry_generic_dirs',`
 
 ########################################
 ## <summary>
-##     Add entries to directories in /dev.
+##     Remove entries from directories in /dev.
 ## </summary>
 ## <param name="domain">
 ##     <summary>
@@ -2023,7 +2023,7 @@ interface(`dev_read_input',`
 
 ########################################
 ## <summary>
-##     Read input event devices (/dev/input).
+##     Read and write input event devices (/dev/input).
 ## </summary>
 ## <param name="domain">
 ##     <summary>

diff --git a/policy/modules/kernel/domain.if b/policy/modules/kernel/domain.if
index 3420b3a..92cc408 100644
--- a/policy/modules/kernel/domain.if
+++ b/policy/modules/kernel/domain.if
@@ -1155,7 +1155,7 @@ interface(`domain_getattr_all_stream_sockets',`
 ########################################
 ## <summary>
 ##     Do not audit attempts to get the attributes
-##     of all domains unix datagram sockets.
+##     of all domains unix stream sockets.
 ## </summary>
 ## <param name="domain">
 ##     <summary>

diff --git a/policy/modules/kernel/files.if b/policy/modules/kernel/files.if
index 20acc0e..dc13e31 100644
--- a/policy/modules/kernel/files.if
+++ b/policy/modules/kernel/files.if
@@ -1317,7 +1317,7 @@ interface(`files_relabelto_all_file_type_fs',`
 
 ########################################
 ## <summary>
-##     Relabel a filesystem to the type of a file.
+##     Relabel a filesystem to and from the type of a file.
 ## </summary>
 ## <param name="domain">
 ##     <summary>

diff --git a/policy/modules/kernel/filesystem.if 
b/policy/modules/kernel/filesystem.if
index b9b30da..c5a1ad1 100644
--- a/policy/modules/kernel/filesystem.if
+++ b/policy/modules/kernel/filesystem.if
@@ -1399,7 +1399,7 @@ interface(`fs_read_cifs_named_pipes',`
 
 ########################################
 ## <summary>
-##     Read named pipes
+##     Read named sockets
 ##     on a CIFS or SMB network filesystem.
 ## </summary>
 ## <param name="domain">
@@ -2360,8 +2360,8 @@ interface(`fs_getattr_iso9660_fs',`
 
 ########################################
 ## <summary>
-##     Read files on an iso9660 filesystem, which
-##     is usually used on CDs.
+##     Get the attributes of files on an iso9660
+##     filesystem, which is usually used on CDs.
 ## </summary>
 ## <param name="domain">
 ##     <summary>
@@ -2759,7 +2759,8 @@ interface(`fs_read_nfs_named_pipes',`
 
 ########################################
 ## <summary>
-##     Read directories of RPC file system pipes.
+##     Get the attributes of directories of RPC
+##     file system pipes.
 ## </summary>
 ## <param name="domain">
 ##     <summary>

diff --git a/policy/modules/kernel/kernel.if b/policy/modules/kernel/kernel.if
index 5f2f78e..5af202c 100644
--- a/policy/modules/kernel/kernel.if
+++ b/policy/modules/kernel/kernel.if
@@ -1087,7 +1087,7 @@ interface(`kernel_dontaudit_read_system_state',`
 ########################################
 ## <summary>
 ##     Do not audit attempts by caller to
-##     read system state information in proc.
+##     read symbolic links in proc.
 ## </summary>
 ## <param name="domain">
 ##     <summary>

diff --git a/policy/modules/kernel/storage.if b/policy/modules/kernel/storage.if
index 5c1be6b..0292eee 100644
--- a/policy/modules/kernel/storage.if
+++ b/policy/modules/kernel/storage.if
@@ -210,7 +210,7 @@ interface(`storage_create_fixed_disk_dev',`
 
 ########################################
 ## <summary>
-##     Allow the caller to create fixed disk device nodes.
+##     Allow the caller to delete fixed disk device nodes.
 ## </summary>
 ## <param name="domain">
 ##     <summary>
@@ -738,7 +738,7 @@ interface(`storage_read_tape',`
 
 ########################################
 ## <summary>
-##     Allow the caller to directly read
+##     Allow the caller to directly write
 ##     a tape device.
 ## </summary>
 ## <param name="domain">

diff --git a/policy/modules/system/iptables.if 
b/policy/modules/system/iptables.if
index 5d2b406..00c49c6 100644
--- a/policy/modules/system/iptables.if
+++ b/policy/modules/system/iptables.if
@@ -70,7 +70,8 @@ interface(`iptables_exec',`
 
 #####################################
 ## <summary>
-##     Execute iptables in the iptables domain.
+##     Execute iptables init scripts in
+##     the init script domain.
 ## </summary>
 ## <param name="domain">
 ##     <summary>

diff --git a/policy/modules/system/locallogin.if 
b/policy/modules/system/locallogin.if
index 4305a86..d99475c 100644
--- a/policy/modules/system/locallogin.if
+++ b/policy/modules/system/locallogin.if
@@ -135,7 +135,7 @@ interface(`locallogin_link_keys',`
 
 ########################################
 ## <summary>
-##     Execute local logins in the local login domain.
+##     Execute single-user logins in the single-user login domain.
 ## </summary>
 ## <param name="domain">
 ##     <summary>

diff --git a/policy/modules/system/miscfiles.if 
b/policy/modules/system/miscfiles.if
index d9220f7..63ed47f 100644
--- a/policy/modules/system/miscfiles.if
+++ b/policy/modules/system/miscfiles.if
@@ -823,7 +823,8 @@ interface(`miscfiles_read_test_files',`
 
 ########################################
 ## <summary>
-##     Execute test files.
+##     Create files in etc directories
+##     with localization file type.
 ## </summary>
 ## <param name="domain">
 ##     <summary>

diff --git a/policy/modules/system/modutils.if 
b/policy/modules/system/modutils.if
index c1b049c..a5222e2 100644
--- a/policy/modules/system/modutils.if
+++ b/policy/modules/system/modutils.if
@@ -253,7 +253,7 @@ interface(`modutils_domtrans_depmod',`
 
 ########################################
 ## <summary>
-##     Execute depmod in the depmod domain.
+##     Execute update_modules in the update_modules domain.
 ## </summary>
 ## <param name="domain">
 ##     <summary>

diff --git a/policy/modules/system/selinuxutil.if 
b/policy/modules/system/selinuxutil.if
index bcb4330..55d2429 100644
--- a/policy/modules/system/selinuxutil.if
+++ b/policy/modules/system/selinuxutil.if
@@ -762,7 +762,7 @@ interface(`seutil_manage_config',`
 #######################################
 ## <summary>
 ##     Create, read, write, and delete
-##     the general selinux configuration files.
+##     the general selinux configuration directories.
 ## </summary>
 ## <param name="domain">
 ##     <summary>

diff --git a/policy/modules/system/userdomain.if 
b/policy/modules/system/userdomain.if
index ea03e86..e341a1c 100644
--- a/policy/modules/system/userdomain.if
+++ b/policy/modules/system/userdomain.if
@@ -1625,7 +1625,7 @@ interface(`userdom_dontaudit_list_user_home_dirs',`
 
 ########################################
 ## <summary>
-##     Create user home directories.
+##     Manage user home directories.
 ## </summary>
 ## <param name="domain">
 ##     <summary>
@@ -1968,7 +1968,7 @@ 
interface(`userdom_dontaudit_append_user_home_content_files',`
 
 ########################################
 ## <summary>
-##     Do not audit attempts to write user home files.
+##     Do not audit attempts to relabel user home files.
 ## </summary>
 ## <param name="domain">
 ##     <summary>
@@ -2248,8 +2248,9 @@ interface(`userdom_manage_user_home_content_sockets',`
 
 ########################################
 ## <summary>
-##     Create objects in a user home directory
-##     with an automatic type transition to
+##     Create objects in a directory located
+##     in a user home directory with an
+##     automatic type transition to
 ##     a specified private type.
 ## </summary>
 ## <param name="domain">
@@ -2711,7 +2712,7 @@ interface(`userdom_tmp_filetrans_user_tmp',`
 
 ########################################
 ## <summary>
-##     Read user tmpfs files.
+##     Read and write user tmpfs files.
 ## </summary>
 ## <param name="domain">
 ##     <summary>
@@ -2978,7 +2979,7 @@ interface(`userdom_spec_domtrans_all_users',`
 
 ########################################
 ## <summary>
-##     Execute an Xserver session in all unprivileged user domains.  This
+##     Execute an Xserver session in all user domains.  This
 ##     is an explicit transition, requiring the
 ##     caller to use setexeccon().
 ## </summary>

Reply via email to