@@ -18,7 +18,7 @@ strong integrity guarantees over both the executable code, and specific
1818*data files * on the system, that were critical to its function. These
1919specific data files would not be readable unless they passed integrity
2020policy. A mandatory access control system would be present, and
21- as a result, xattrs would have to be protected. This lead to a selection
21+ as a result, xattrs would have to be protected. This led to a selection
2222of what would provide the integrity claims. At the time, there were two
2323main mechanisms considered that could guarantee integrity for the system
2424with these requirements:
@@ -195,7 +195,7 @@ of the policy to apply the minute usermode starts. Generally, that storage
195195can be handled in one of three ways:
196196
197197 1. The policy file(s) live on disk and the kernel loads the policy prior
198- to an code path that would result in an enforcement decision.
198+ to a code path that would result in an enforcement decision.
199199 2. The policy file(s) are passed by the bootloader to the kernel, who
200200 parses the policy.
201201 3. There is a policy file that is compiled into the kernel that is
@@ -235,8 +235,8 @@ Updatable, Rebootless Policy
235235~~~~~~~~~~~~~~~~~~~~~~~~~~~~
236236
237237As requirements change over time (vulnerabilities are found in previously
238- trusted applications, keys roll, etcetera). Updating a kernel to change the
239- meet those security goals is not always a suitable option, as updates are not
238+ trusted applications, keys roll, etcetera), updating a kernel to meet
239+ those security goals is not always a suitable option, as updates are not
240240always risk-free, and blocking a security update leaves systems vulnerable.
241241This means IPE requires a policy that can be completely updated (allowing
242242revocations of existing policy) from a source external to the kernel (allowing
@@ -370,7 +370,7 @@ Simplified Policy:
370370Finally, IPE's policy is designed for sysadmins, not kernel developers. Instead
371371of covering individual LSM hooks (or syscalls), IPE covers operations. This means
372372instead of sysadmins needing to know that the syscalls ``mmap ``, ``mprotect ``,
373- ``execve ``, and ``uselib `` must have rules protecting them, they must simple know
373+ ``execve ``, and ``uselib `` must have rules protecting them, they must simply know
374374that they want to restrict code execution. This limits the amount of bypasses that
375375could occur due to a lack of knowledge of the underlying system; whereas the
376376maintainers of IPE, being kernel developers can make the correct choice to determine
0 commit comments