Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753440AbcDYA0S (ORCPT ); Sun, 24 Apr 2016 20:26:18 -0400 Received: from mail-wm0-f65.google.com ([74.125.82.65]:35728 "EHLO mail-wm0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753390AbcDYA0O (ORCPT ); Sun, 24 Apr 2016 20:26:14 -0400 From: Eric Engestrom To: linux-kernel@vger.kernel.org Cc: Eric Engestrom , Jonathan Corbet , linux-doc@vger.kernel.org Subject: [PATCH 04/41] Documentation: cgroup: fix spelling mistakes Date: Mon, 25 Apr 2016 01:24:01 +0100 Message-Id: <1461543878-3639-5-git-send-email-eric@engestrom.ch> X-Mailer: git-send-email 2.8.0 In-Reply-To: <1461543878-3639-1-git-send-email-eric@engestrom.ch> References: <1461543878-3639-1-git-send-email-eric@engestrom.ch> Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3107 Lines: 79 Signed-off-by: Eric Engestrom --- Documentation/cgroup-v2.txt | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/Documentation/cgroup-v2.txt b/Documentation/cgroup-v2.txt index 4cc07ce..c836b69 100644 --- a/Documentation/cgroup-v2.txt +++ b/Documentation/cgroup-v2.txt @@ -422,7 +422,7 @@ and is an example of this type. 3-2. Limits -A child can only consume upto the configured amount of the resource. +A child can only consume up to the configured amount of the resource. Limits can be over-committed - the sum of the limits of children can exceed the amount of resource available to the parent. @@ -438,11 +438,11 @@ on an IO device and is an example of this type. 3-3. Protections -A cgroup is protected to be allocated upto the configured amount of +A cgroup is protected to be allocated up to the configured amount of the resource if the usages of all its ancestors are under their protected levels. Protections can be hard guarantees or best effort soft boundaries. Protections can also be over-committed in which case -only upto the amount available to the parent is protected among +only up to the amount available to the parent is protected among children. Protections are in the range [0, max] and defaults to 0, which is @@ -694,7 +694,7 @@ All time durations are in microseconds. $MAX $PERIOD - which indicates that the group may consume upto $MAX in each + which indicates that the group may consume up to $MAX in each $PERIOD duration. "max" for $MAX indicates no limit. If only one number is written, $MAX is updated. @@ -713,7 +713,7 @@ All time durations are in microseconds. $MAX $PERIOD - which indicates that the group may consume upto $MAX in each + which indicates that the group may consume up to $MAX in each $PERIOD duration. If only one number is written, $MAX is updated. @@ -923,7 +923,7 @@ PAGE_SIZE multiple when read back. cgroups. The default is "max". Swap usage hard limit. If a cgroup's swap usage reaches this - limit, anonymous meomry of the cgroup will not be swapped out. + limit, anonymous memory of the cgroup will not be swapped out. 5-2-2. Usage Guidelines @@ -1123,7 +1123,7 @@ writeback as follows. 6-1. Basics -cgroup namespace provides a mechanism to virtualize the view of the +cgroup namespace provides a mechanism to virtualise the view of the "/proc/$PID/cgroup" file and cgroup mounts. The CLONE_NEWCGROUP clone flag can be used with clone(2) and unshare(2) to create a new cgroup namespace. The process running inside the cgroup namespace will have @@ -1256,7 +1256,7 @@ This will mount the unified cgroup hierarchy with cgroupns root as the filesystem root. The process needs CAP_SYS_ADMIN against its user and mount namespaces. -The virtualization of /proc/self/cgroup file combined with restricting +The virtualisation of /proc/self/cgroup file combined with restricting the view of cgroup hierarchy by namespace-private cgroupfs mount provides a properly isolated cgroup view inside the container. -- 2.8.0