Commit caa790ba authored by Chris Samuel's avatar Chris Samuel Committed by Jiri Kosina

trivial: cgroups: documentation typo and spelling corrections

Minor typo and spelling corrections fixed whilst reading
to learn about cgroups capabilities.
Signed-off-by: default avatarChris Samuel <chris@csamuel.org>
Acked-by: default avatarPaul Menage <menage@google.com>
Signed-off-by: default avatarJiri Kosina <jkosina@suse.cz>
parent c0496f4e
...@@ -56,7 +56,7 @@ hierarchy, and a set of subsystems; each subsystem has system-specific ...@@ -56,7 +56,7 @@ hierarchy, and a set of subsystems; each subsystem has system-specific
state attached to each cgroup in the hierarchy. Each hierarchy has state attached to each cgroup in the hierarchy. Each hierarchy has
an instance of the cgroup virtual filesystem associated with it. an instance of the cgroup virtual filesystem associated with it.
At any one time there may be multiple active hierachies of task At any one time there may be multiple active hierarchies of task
cgroups. Each hierarchy is a partition of all tasks in the system. cgroups. Each hierarchy is a partition of all tasks in the system.
User level code may create and destroy cgroups by name in an User level code may create and destroy cgroups by name in an
...@@ -124,10 +124,10 @@ following lines: ...@@ -124,10 +124,10 @@ following lines:
/ \ / \
Prof (15%) students (5%) Prof (15%) students (5%)
Browsers like firefox/lynx go into the WWW network class, while (k)nfsd go Browsers like Firefox/Lynx go into the WWW network class, while (k)nfsd go
into NFS network class. into NFS network class.
At the same time firefox/lynx will share an appropriate CPU/Memory class At the same time Firefox/Lynx will share an appropriate CPU/Memory class
depending on who launched it (prof/student). depending on who launched it (prof/student).
With the ability to classify tasks differently for different resources With the ability to classify tasks differently for different resources
...@@ -325,7 +325,7 @@ and then start a subshell 'sh' in that cgroup: ...@@ -325,7 +325,7 @@ and then start a subshell 'sh' in that cgroup:
Creating, modifying, using the cgroups can be done through the cgroup Creating, modifying, using the cgroups can be done through the cgroup
virtual filesystem. virtual filesystem.
To mount a cgroup hierarchy will all available subsystems, type: To mount a cgroup hierarchy with all available subsystems, type:
# mount -t cgroup xxx /dev/cgroup # mount -t cgroup xxx /dev/cgroup
The "xxx" is not interpreted by the cgroup code, but will appear in The "xxx" is not interpreted by the cgroup code, but will appear in
...@@ -521,7 +521,7 @@ always handled well. ...@@ -521,7 +521,7 @@ always handled well.
void post_clone(struct cgroup_subsys *ss, struct cgroup *cgrp) void post_clone(struct cgroup_subsys *ss, struct cgroup *cgrp)
(cgroup_mutex held by caller) (cgroup_mutex held by caller)
Called at the end of cgroup_clone() to do any paramater Called at the end of cgroup_clone() to do any parameter
initialization which might be required before a task could attach. For initialization which might be required before a task could attach. For
example in cpusets, no task may attach before 'cpus' and 'mems' are set example in cpusets, no task may attach before 'cpus' and 'mems' are set
up. up.
......
...@@ -131,7 +131,7 @@ Cpusets extends these two mechanisms as follows: ...@@ -131,7 +131,7 @@ Cpusets extends these two mechanisms as follows:
- The hierarchy of cpusets can be mounted at /dev/cpuset, for - The hierarchy of cpusets can be mounted at /dev/cpuset, for
browsing and manipulation from user space. browsing and manipulation from user space.
- A cpuset may be marked exclusive, which ensures that no other - A cpuset may be marked exclusive, which ensures that no other
cpuset (except direct ancestors and descendents) may contain cpuset (except direct ancestors and descendants) may contain
any overlapping CPUs or Memory Nodes. any overlapping CPUs or Memory Nodes.
- You can list all the tasks (by pid) attached to any cpuset. - You can list all the tasks (by pid) attached to any cpuset.
...@@ -226,7 +226,7 @@ nodes with memory--using the cpuset_track_online_nodes() hook. ...@@ -226,7 +226,7 @@ nodes with memory--using the cpuset_track_online_nodes() hook.
-------------------------------- --------------------------------
If a cpuset is cpu or mem exclusive, no other cpuset, other than If a cpuset is cpu or mem exclusive, no other cpuset, other than
a direct ancestor or descendent, may share any of the same CPUs or a direct ancestor or descendant, may share any of the same CPUs or
Memory Nodes. Memory Nodes.
A cpuset that is mem_exclusive *or* mem_hardwall is "hardwalled", A cpuset that is mem_exclusive *or* mem_hardwall is "hardwalled",
...@@ -427,7 +427,7 @@ child cpusets have this flag enabled. ...@@ -427,7 +427,7 @@ child cpusets have this flag enabled.
When doing this, you don't usually want to leave any unpinned tasks in When doing this, you don't usually want to leave any unpinned tasks in
the top cpuset that might use non-trivial amounts of CPU, as such tasks the top cpuset that might use non-trivial amounts of CPU, as such tasks
may be artificially constrained to some subset of CPUs, depending on may be artificially constrained to some subset of CPUs, depending on
the particulars of this flag setting in descendent cpusets. Even if the particulars of this flag setting in descendant cpusets. Even if
such a task could use spare CPU cycles in some other CPUs, the kernel such a task could use spare CPU cycles in some other CPUs, the kernel
scheduler might not consider the possibility of load balancing that scheduler might not consider the possibility of load balancing that
task to that underused CPU. task to that underused CPU.
...@@ -531,9 +531,9 @@ be idle. ...@@ -531,9 +531,9 @@ be idle.
Of course it takes some searching cost to find movable tasks and/or Of course it takes some searching cost to find movable tasks and/or
idle CPUs, the scheduler might not search all CPUs in the domain idle CPUs, the scheduler might not search all CPUs in the domain
everytime. In fact, in some architectures, the searching ranges on every time. In fact, in some architectures, the searching ranges on
events are limited in the same socket or node where the CPU locates, events are limited in the same socket or node where the CPU locates,
while the load balance on tick searchs all. while the load balance on tick searches all.
For example, assume CPU Z is relatively far from CPU X. Even if CPU Z For example, assume CPU Z is relatively far from CPU X. Even if CPU Z
is idle while CPU X and the siblings are busy, scheduler can't migrate is idle while CPU X and the siblings are busy, scheduler can't migrate
...@@ -601,7 +601,7 @@ its new cpuset, then the task will continue to use whatever subset ...@@ -601,7 +601,7 @@ its new cpuset, then the task will continue to use whatever subset
of MPOL_BIND nodes are still allowed in the new cpuset. If the task of MPOL_BIND nodes are still allowed in the new cpuset. If the task
was using MPOL_BIND and now none of its MPOL_BIND nodes are allowed was using MPOL_BIND and now none of its MPOL_BIND nodes are allowed
in the new cpuset, then the task will be essentially treated as if it in the new cpuset, then the task will be essentially treated as if it
was MPOL_BIND bound to the new cpuset (even though its numa placement, was MPOL_BIND bound to the new cpuset (even though its NUMA placement,
as queried by get_mempolicy(), doesn't change). If a task is moved as queried by get_mempolicy(), doesn't change). If a task is moved
from one cpuset to another, then the kernel will adjust the tasks from one cpuset to another, then the kernel will adjust the tasks
memory placement, as above, the next time that the kernel attempts memory placement, as above, the next time that the kernel attempts
......
...@@ -42,7 +42,7 @@ suffice, but we can decide the best way to adequately restrict ...@@ -42,7 +42,7 @@ suffice, but we can decide the best way to adequately restrict
movement as people get some experience with this. We may just want movement as people get some experience with this. We may just want
to require CAP_SYS_ADMIN, which at least is a separate bit from to require CAP_SYS_ADMIN, which at least is a separate bit from
CAP_MKNOD. We may want to just refuse moving to a cgroup which CAP_MKNOD. We may want to just refuse moving to a cgroup which
isn't a descendent of the current one. Or we may want to use isn't a descendant of the current one. Or we may want to use
CAP_MAC_ADMIN, since we really are trying to lock down root. CAP_MAC_ADMIN, since we really are trying to lock down root.
CAP_SYS_ADMIN is needed to modify the whitelist or move another CAP_SYS_ADMIN is needed to modify the whitelist or move another
......
...@@ -302,7 +302,7 @@ will be charged as a new owner of it. ...@@ -302,7 +302,7 @@ will be charged as a new owner of it.
unevictable - # of pages cannot be reclaimed.(mlocked etc) unevictable - # of pages cannot be reclaimed.(mlocked etc)
Below is depend on CONFIG_DEBUG_VM. Below is depend on CONFIG_DEBUG_VM.
inactive_ratio - VM inernal parameter. (see mm/page_alloc.c) inactive_ratio - VM internal parameter. (see mm/page_alloc.c)
recent_rotated_anon - VM internal parameter. (see mm/vmscan.c) recent_rotated_anon - VM internal parameter. (see mm/vmscan.c)
recent_rotated_file - VM internal parameter. (see mm/vmscan.c) recent_rotated_file - VM internal parameter. (see mm/vmscan.c)
recent_scanned_anon - VM internal parameter. (see mm/vmscan.c) recent_scanned_anon - VM internal parameter. (see mm/vmscan.c)
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment