From cae2991534463fd9ddbd608a7775af741397697a Mon Sep 17 00:00:00 2001
From: "W. Trevor King"
Date: Fri, 28 Jul 2017 07:53:31 -0700
Subject: [PATCH] config: Fix "procfs_2" -> "proc_2" link label
Catching up with 56eb6a1 (modify procfs to proc, 2017-07-28, #905),
because it's strange to change one link label from "procfs" -> "proc"
but leave the other. This will also make it marginally easier to
collapse these to a single link label once we convert the spec to a
single Markdown file [1].
[1]: https://groups.google.com/a/opencontainers.org/d/msg/dev/1Wwd_MEzSjI/DsCkR-UwAgAJ
Subject: [runtime-spec] Hosting 1.0 HTML on opencontainers.org and
timing for transition to single-page Markdown
Date: Thu, 27 Jul 2017 16:23:40 -0700
Message-ID: <20170727232340.GA24408@valgrind.tremily.us>
Signed-off-by: W. Trevor King
---
config.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/config.md b/config.md
index bee008f09..40434e361 100644
--- a/config.md
+++ b/config.md
@@ -198,7 +198,7 @@ For Linux-based systems, the `process` object supports the following process-spe
* **`ambient`** (array of strings, OPTIONAL) the `ambient` field is an array of ambient capabilities that are kept for the process.
* **`noNewPrivileges`** (bool, OPTIONAL) setting `noNewPrivileges` to true prevents the process from gaining additional privileges.
As an example, the [`no_new_privs`][no-new-privs] article in the kernel documentation has information on how this is achieved using a `prctl` system call on Linux.
-* **`oomScoreAdj`** *(int, OPTIONAL)* adjusts the oom-killer score in `[pid]/oom_score_adj` for the process's `[pid]` in a [proc pseudo-filesystem][procfs].
+* **`oomScoreAdj`** *(int, OPTIONAL)* adjusts the oom-killer score in `[pid]/oom_score_adj` for the process's `[pid]` in a [proc pseudo-filesystem][proc_2].
If `oomScoreAdj` is set, the runtime MUST set `oom_score_adj` to the given value.
If `oomScoreAdj` is not set, the runtime MUST NOT change the value of `oom_score_adj`.
@@ -842,7 +842,7 @@ Here is a full example `config.json` for reference.
[cgroup-v1-memory_2]: https://www.kernel.org/doc/Documentation/cgroup-v1/memory.txt
[selinux]:http://selinuxproject.org/page/Main_Page
[no-new-privs]: https://www.kernel.org/doc/Documentation/prctl/no_new_privs.txt
-[procfs_2]: https://www.kernel.org/doc/Documentation/filesystems/proc.txt
+[proc_2]: https://www.kernel.org/doc/Documentation/filesystems/proc.txt
[semver-v2.0.0]: http://semver.org/spec/v2.0.0.html
[ieee-1003.1-2008-xbd-c8.1]: http://pubs.opengroup.org/onlinepubs/9699919799/basedefs/V1_chap08.html#tag_08_01
[ieee-1003.1-2008-xsh-exec]: http://pubs.opengroup.org/onlinepubs/9699919799/functions/exec.html