##
-## Boolean to determine whether the system permits setting Booelan values.
+## Boolean to determine whether the system permits setting Boolean values.
##
##
gen_bool(secure_mode_setbool,false)
diff --git a/policy/modules/services/cockpit.if b/policy/modules/services/cockpit.if
index b79854374c..325672d2f5 100644
--- a/policy/modules/services/cockpit.if
+++ b/policy/modules/services/cockpit.if
@@ -54,7 +54,7 @@ template(`cockpit_role_template',`
dev_dontaudit_execute_dev_nodes($2)
files_dontaudit_execute_default_files($2)
- files_dontaudit_execuite_etc_runtime_files($2)
+ files_dontaudit_exec_etc_runtime_files($2)
files_dontaudit_exec_runtime($2)
files_watch_etc_files($2)
files_watch_root_dirs($2)
diff --git a/policy/modules/services/container.te b/policy/modules/services/container.te
index 1c88308369..c71ae54f47 100644
--- a/policy/modules/services/container.te
+++ b/policy/modules/services/container.te
@@ -1009,7 +1009,7 @@ allow spc_t self:process { getcap setexec setrlimit };
# Normally triggered when rook-ceph executes lvm tools which creates noise.
# This can be allowed if actually needed.
dontaudit spc_t self:process setfscreate;
-allow spc_t self:capability { audit_write chown dac_override dac_read_search fowner fsetid ipc_lock kill mknod net_admin net_raw setgid setuid setpcap sys_admin sys_chroot sys_nice sys_ptrace sys_rawio sys_resource };
+allow spc_t self:capability { audit_write chown dac_override dac_read_search fowner fsetid ipc_lock kill mknod net_admin net_raw setgid setpcap setuid sys_admin sys_chroot sys_nice sys_ptrace sys_rawio sys_resource };
allow spc_t self:capability2 { bpf perfmon };
allow spc_t self:bpf { map_create map_read map_write prog_load prog_run };
allow spc_t self:key manage_key_perms;
diff --git a/policy/modules/services/corosync.te b/policy/modules/services/corosync.te
index 3ed8ef4390..3e0a8014f3 100644
--- a/policy/modules/services/corosync.te
+++ b/policy/modules/services/corosync.te
@@ -37,7 +37,7 @@ logging_log_file(corosync_var_log_t)
#
allow corosync_t self:capability { dac_override fowner ipc_lock setgid setuid sys_admin sys_nice sys_resource };
-# for hearbeat
+# for heartbeat
allow corosync_t self:capability { chown net_raw };
allow corosync_t self:process { setpgid setrlimit setsched signal signull };
allow corosync_t self:fifo_file rw_fifo_file_perms;
diff --git a/policy/modules/services/gssproxy.if b/policy/modules/services/gssproxy.if
index 693d5228e3..34c9631bec 100644
--- a/policy/modules/services/gssproxy.if
+++ b/policy/modules/services/gssproxy.if
@@ -2,7 +2,7 @@
########################################
##