On 04/24/16 17:24, Eric Engestrom wrote: > @@ -1123,7 +1123,7 @@ writeback as follows. > > 6-1. Basics > > -cgroup namespace provides a mechanism to virtualize the view of the > +cgroup namespace provides a mechanism to virtualise the view of the > "/proc/$PID/cgroup" file and cgroup mounts. The CLONE_NEWCGROUP clone > flag can be used with clone(2) and unshare(2) to create a new cgroup > namespace. The process running inside the cgroup namespace will have > @@ -1256,7 +1256,7 @@ This will mount the unified cgroup hierarchy with cgroupns root as the > filesystem root. The process needs CAP_SYS_ADMIN against its user and > mount namespaces. > > -The virtualization of /proc/self/cgroup file combined with restricting > +The virtualisation of /proc/self/cgroup file combined with restricting > the view of cgroup hierarchy by namespace-private cgroupfs mount > provides a properly isolated cgroup view inside the container. We generally accept British or American spellings, so these changes are not needed. -- ~Randy -- To unsubscribe from this list: send the line "unsubscribe linux-doc" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html