aboutsummaryrefslogtreecommitdiffstats
path: root/docs
diff options
context:
space:
mode:
authorQiu Tingting <qiutt@fujitsu.com>2021-12-21 15:23:11 +0800
committerJan-Simon Moeller <jsmoeller@linuxfoundation.org>2021-12-22 09:25:35 +0000
commit835363f430c5dee0b53b7c415572cdfdcc02ad18 (patch)
treed923c0966ec15507520419340df81d10f98bb1c6 /docs
parent8bba2503735252906c8ebfb60669ec821d64c8a0 (diff)
Fix a spell miss of document.marlin_12.91.0marlin/12.91.012.91.0
Bug-AGL:SPEC-4188 Signed-off-by: Qiu Tingting <qiutt@fujitsu.com> Change-Id: I25be4702acb64be59b9d79cf5a46354c8302ea8e Reviewed-on: https://gerrit.automotivelinux.org/gerrit/c/AGL/documentation/+/27051 Reviewed-by: Jan-Simon Moeller <jsmoeller@linuxfoundation.org> Tested-by: Jan-Simon Moeller <jsmoeller@linuxfoundation.org>
Diffstat (limited to 'docs')
-rw-r--r--docs/2_Architecture_Guides/2_Security_Blueprint/5_Platform.md4
1 files changed, 2 insertions, 2 deletions
diff --git a/docs/2_Architecture_Guides/2_Security_Blueprint/5_Platform.md b/docs/2_Architecture_Guides/2_Security_Blueprint/5_Platform.md
index 917404b..2112fdc 100644
--- a/docs/2_Architecture_Guides/2_Security_Blueprint/5_Platform.md
+++ b/docs/2_Architecture_Guides/2_Security_Blueprint/5_Platform.md
@@ -653,7 +653,7 @@ vulnerable to attack. For example, if the kernel is stopped and restarted with
the *security=none* flag, then SMACK is not enabled. Furthermore, `systemd`
starts the loading of **SMACK** rules during start-up. If this start-up process
is interfered with, then **SMACK** will not run. Alternatively, new policies can
-be added with `smackload` allowing unforseen privileges to alternative
+be added with `smackload` allowing unforeseen privileges to alternative
applications/executables.
Another intrusion on the kernel level is to rebuild the kernel (as it is
@@ -918,4 +918,4 @@ a capability. These capabilities are divided into three groups:
- e: Effective: This means the capability is “activated”.
- p: Permitted: This means the capability can be used/is allowed.
- i: Inherited: The capability is kept by child/subprocesses upon execve() for
- example. \ No newline at end of file
+ example.