Fix a spell miss of document. 51/27051/2 12.91.0 marlin/12.91.0 marlin_12.91.0
authorQiu Tingting <qiutt@fujitsu.com>
Tue, 21 Dec 2021 07:23:11 +0000 (15:23 +0800)
committerJan-Simon Moeller <jsmoeller@linuxfoundation.org>
Wed, 22 Dec 2021 09:25:35 +0000 (09:25 +0000)
Bug-AGL:SPEC-4188

Signed-off-by: Qiu Tingting <qiutt@fujitsu.com>
Change-Id: I25be4702acb64be59b9d79cf5a46354c8302ea8e
Reviewed-on: https://gerrit.automotivelinux.org/gerrit/c/AGL/documentation/+/27051
Reviewed-by: Jan-Simon Moeller <jsmoeller@linuxfoundation.org>
Tested-by: Jan-Simon Moeller <jsmoeller@linuxfoundation.org>
docs/2_Architecture_Guides/2_Security_Blueprint/5_Platform.md

index 917404b..2112fdc 100644 (file)
@@ -653,7 +653,7 @@ vulnerable to attack. For example, if the kernel is stopped and restarted with
 the *security=none* flag, then SMACK is not enabled. Furthermore, `systemd`
 starts the loading of **SMACK** rules during start-up. If this start-up process
 is interfered with, then **SMACK** will not run. Alternatively, new policies can
-be added with `smackload` allowing unforseen privileges to alternative
+be added with `smackload` allowing unforeseen privileges to alternative
 applications/executables.
 
 Another intrusion on the kernel level is to rebuild the kernel (as it is
@@ -918,4 +918,4 @@ a capability. These capabilities are divided into three groups:
 - e: Effective: This means the capability is “activated”.
 - p: Permitted: This means the capability can be used/is allowed.
 - i: Inherited: The capability is kept by child/subprocesses upon execve() for
-  example.
\ No newline at end of file
+  example.