lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 25 Apr 2016 01:24:01 +0100
From:	Eric Engestrom <eric@...estrom.ch>
To:	linux-kernel@...r.kernel.org
Cc:	Eric Engestrom <eric@...estrom.ch>,
	Jonathan Corbet <corbet@....net>, linux-doc@...r.kernel.org
Subject: [PATCH 04/41] Documentation: cgroup: fix spelling mistakes

Signed-off-by: Eric Engestrom <eric@...estrom.ch>
---
 Documentation/cgroup-v2.txt | 16 ++++++++--------
 1 file changed, 8 insertions(+), 8 deletions(-)

diff --git a/Documentation/cgroup-v2.txt b/Documentation/cgroup-v2.txt
index 4cc07ce..c836b69 100644
--- a/Documentation/cgroup-v2.txt
+++ b/Documentation/cgroup-v2.txt
@@ -422,7 +422,7 @@ and is an example of this type.
 
 3-2. Limits
 
-A child can only consume upto the configured amount of the resource.
+A child can only consume up to the configured amount of the resource.
 Limits can be over-committed - the sum of the limits of children can
 exceed the amount of resource available to the parent.
 
@@ -438,11 +438,11 @@ on an IO device and is an example of this type.
 
 3-3. Protections
 
-A cgroup is protected to be allocated upto the configured amount of
+A cgroup is protected to be allocated up to the configured amount of
 the resource if the usages of all its ancestors are under their
 protected levels.  Protections can be hard guarantees or best effort
 soft boundaries.  Protections can also be over-committed in which case
-only upto the amount available to the parent is protected among
+only up to the amount available to the parent is protected among
 children.
 
 Protections are in the range [0, max] and defaults to 0, which is
@@ -694,7 +694,7 @@ All time durations are in microseconds.
 
 	  $MAX $PERIOD
 
-	which indicates that the group may consume upto $MAX in each
+	which indicates that the group may consume up to $MAX in each
 	$PERIOD duration.  "max" for $MAX indicates no limit.  If only
 	one number is written, $MAX is updated.
 
@@ -713,7 +713,7 @@ All time durations are in microseconds.
 
 	  $MAX $PERIOD
 
-	which indicates that the group may consume upto $MAX in each
+	which indicates that the group may consume up to $MAX in each
 	$PERIOD duration.  If only one number is written, $MAX is
 	updated.
 
@@ -923,7 +923,7 @@ PAGE_SIZE multiple when read back.
 	cgroups.  The default is "max".
 
 	Swap usage hard limit.  If a cgroup's swap usage reaches this
-	limit, anonymous meomry of the cgroup will not be swapped out.
+	limit, anonymous memory of the cgroup will not be swapped out.
 
 
 5-2-2. Usage Guidelines
@@ -1123,7 +1123,7 @@ writeback as follows.
 
 6-1. Basics
 
-cgroup namespace provides a mechanism to virtualize the view of the
+cgroup namespace provides a mechanism to virtualise the view of the
 "/proc/$PID/cgroup" file and cgroup mounts.  The CLONE_NEWCGROUP clone
 flag can be used with clone(2) and unshare(2) to create a new cgroup
 namespace.  The process running inside the cgroup namespace will have
@@ -1256,7 +1256,7 @@ This will mount the unified cgroup hierarchy with cgroupns root as the
 filesystem root.  The process needs CAP_SYS_ADMIN against its user and
 mount namespaces.
 
-The virtualization of /proc/self/cgroup file combined with restricting
+The virtualisation of /proc/self/cgroup file combined with restricting
 the view of cgroup hierarchy by namespace-private cgroupfs mount
 provides a properly isolated cgroup view inside the container.
 
-- 
2.8.0

Powered by blists - more mailing lists