Skip to content

Commit 4b367bc

Browse files
authored
Merge pull request #585 from maoyangLiu/master
fix typo mistake
2 parents 33fe0eb + f8dd43c commit 4b367bc

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

kep/2-lightweight-coscheduling/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ When running a Tensorflow/MPI job, all tasks must start before they can do any w
4141
## Terms
4242

4343
- **pgPod**: pod belongs to some `PodGroup`.
44-
- **regularPod**: a regular `Pod` (which doesn't have `PodGropuName` set).
44+
- **regularPod**: a regular `Pod` (which doesn't have `PodGroupName` set).
4545

4646
## Proposal
4747

kep/399-sysched-scoring/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ While pod-centric security schemes such as seccomp are necessary, they alone are
5858
## User Stories
5959

6060
1. As a user of the cloud, I would like to be scheduled with neighbors who do not have, or less likely to have, the abilities to compromise my security via the shared kernel on the host.
61-
2. As a developer, I would like the users of my applications to be rewarded for my conscientious and judicious use of system calls by being scheduled on a node with neighboring applicaitons who are similarly limited in their system call usage, hence reducing the user's chance to being compromised by those neighbors via system call-based host exploits.
61+
2. As a developer, I would like the users of my applications to be rewarded for my conscientious and judicious use of system calls by being scheduled on a node with neighboring applications who are similarly limited in their system call usage, hence reducing the user's chance to being compromised by those neighbors via system call-based host exploits.
6262
3. As a cloud provider, we want to enable multitenancy but minimize the impact of a compromised or malicious pod on our users. Hence, we want to minimize the number of victim pods and victim nodes in a cluster from some pods exploiting system call-based host exploits.
6363

6464
### Notes/Constraints/Caveats

0 commit comments

Comments
 (0)