From cae2991534463fd9ddbd608a7775af741397697a Mon Sep 17 00:00:00 2001 From: "W. Trevor King" Date: Fri, 28 Jul 2017 07:53:31 -0700 Subject: [PATCH] config: Fix "procfs_2" -> "proc_2" link label Catching up with 56eb6a1 (modify procfs to proc, 2017-07-28, #905), because it's strange to change one link label from "procfs" -> "proc" but leave the other. This will also make it marginally easier to collapse these to a single link label once we convert the spec to a single Markdown file [1]. [1]: https://groups.google.com/a/opencontainers.org/d/msg/dev/1Wwd_MEzSjI/DsCkR-UwAgAJ Subject: [runtime-spec] Hosting 1.0 HTML on opencontainers.org and timing for transition to single-page Markdown Date: Thu, 27 Jul 2017 16:23:40 -0700 Message-ID: <20170727232340.GA24408@valgrind.tremily.us> Signed-off-by: W. Trevor King --- config.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/config.md b/config.md index bee008f09..40434e361 100644 --- a/config.md +++ b/config.md @@ -198,7 +198,7 @@ For Linux-based systems, the `process` object supports the following process-spe * **`ambient`** (array of strings, OPTIONAL) the `ambient` field is an array of ambient capabilities that are kept for the process. * **`noNewPrivileges`** (bool, OPTIONAL) setting `noNewPrivileges` to true prevents the process from gaining additional privileges. As an example, the [`no_new_privs`][no-new-privs] article in the kernel documentation has information on how this is achieved using a `prctl` system call on Linux. -* **`oomScoreAdj`** *(int, OPTIONAL)* adjusts the oom-killer score in `[pid]/oom_score_adj` for the process's `[pid]` in a [proc pseudo-filesystem][procfs]. +* **`oomScoreAdj`** *(int, OPTIONAL)* adjusts the oom-killer score in `[pid]/oom_score_adj` for the process's `[pid]` in a [proc pseudo-filesystem][proc_2]. If `oomScoreAdj` is set, the runtime MUST set `oom_score_adj` to the given value. If `oomScoreAdj` is not set, the runtime MUST NOT change the value of `oom_score_adj`. @@ -842,7 +842,7 @@ Here is a full example `config.json` for reference. [cgroup-v1-memory_2]: https://www.kernel.org/doc/Documentation/cgroup-v1/memory.txt [selinux]:http://selinuxproject.org/page/Main_Page [no-new-privs]: https://www.kernel.org/doc/Documentation/prctl/no_new_privs.txt -[procfs_2]: https://www.kernel.org/doc/Documentation/filesystems/proc.txt +[proc_2]: https://www.kernel.org/doc/Documentation/filesystems/proc.txt [semver-v2.0.0]: http://semver.org/spec/v2.0.0.html [ieee-1003.1-2008-xbd-c8.1]: http://pubs.opengroup.org/onlinepubs/9699919799/basedefs/V1_chap08.html#tag_08_01 [ieee-1003.1-2008-xsh-exec]: http://pubs.opengroup.org/onlinepubs/9699919799/functions/exec.html