[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [PATCH] docs: various typos


  • To: xen-devel@xxxxxxxxxxxxx
  • From: Tim Deegan <tim@xxxxxxx>
  • Date: Thu, 28 Jun 2012 16:58:34 +0100
  • Delivery-date: Thu, 28 Jun 2012 15:59:02 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xen.org>

# HG changeset patch
# User Tim Deegan <tim@xxxxxxx>
# Date 1340899046 -3600
# Node ID b2481fe8a39516413d35494eb5a3cb96aebb7eef
# Parent  3ea92ea1490fbe4a174f0d4d8fc3c6acfecd1b97
docs: various typos

Signed-off-by: Tim Deegan <tim@xxxxxxx>

diff -r 3ea92ea1490f -r b2481fe8a395 docs/man/xl.cfg.pod.5
--- a/docs/man/xl.cfg.pod.5     Thu Jun 28 15:18:05 2012 +0100
+++ b/docs/man/xl.cfg.pod.5     Thu Jun 28 16:57:26 2012 +0100
@@ -202,7 +202,7 @@ configuration
         
 =item B<rename-restart>
 
-rename the domain which terminated, and thenimmediately create a new
+rename the domain which terminated, and then immediately create a new
 domain with the same configuration as the original
 
 =item B<preserve>
@@ -357,7 +357,7 @@ guest B<DDDD> and B<BB> are C<0000:00>. 
 
 =item B<KEY=VALUE>
 
-Posible B<KEY>s are:
+Possible B<KEY>s are:
 
 =over 4
 
@@ -387,7 +387,7 @@ enable this option only for trusted VMs 
 =item B<pci_permissive=BOOLEAN>
 
 (PV only) Changes the default value of 'permissive' for all PCI
-devices for this VM.  This can still be overriden on a per-device
+devices for this VM.  This can still be overridden on a per-device
 basis. This option should be enabled with caution: it gives the guest
 much more control over the device, which may have security or
 stability implications.  It is recommended to enable this option only
@@ -436,7 +436,7 @@ specific what meaning this has).
 =item B<e820_host=BOOLEAN>
 
 Selects whether to expose the host e820 (memory map) to the guest via
-the virtual e820. When this option is false the guest psuedo-physical
+the virtual e820. When this option is false the guest pseudo-physical
 address space consists of a single contiguous RAM region. When this
 option is specified the virtual e820 instead reflects the host e820
 and contains the same PCI holes. The total amount of RAM represented
@@ -446,10 +446,10 @@ it is layed out.
 Exposing the host e820 to the guest gives the guest kernel the
 opportunity to set aside the required part of its pseudo-physical
 address space in order to provide address space to map passedthrough
-PCI devices. It is guest Operaring System dependant whether this
+PCI devices. It is guest Operating System dependant whether this
 option is required, specifically it is required when using a mainline
 Linux ("pvops") kernel. This option defaults to true if any PCI
-passthrough devices are configued and false otherwise. If you do not
+passthrough devices are configured and false otherwise. If you do not
 configure any passthrough devices at domain creation time but expect
 to hotplug devices later then you should set this option. Conversely
 if your particular guest kernel does not require this behaviour then
@@ -580,7 +580,7 @@ has no effect on a guest with multiple v
 always include these tables. This option is enabled by default and you
 should usually omit it but it may be necessary to disable these
 firmware tables when using certain older guest Operating
-Systems. These tables have been superceded by newer constructs within
+Systems. These tables have been superseded by newer constructs within
 the ACPI tables. (X86 only)
 
 =item B<nx=BOOLEAN>
@@ -763,7 +763,7 @@ Simple DirectMedia Layer). The default i
 =item B<opengl=BOOLEAN>
 
 Enable OpenGL acceleration of the SDL display. Only effects machines
-using B<device_model_version="qemu-xen-traditonal"> and only if the
+using B<device_model_version="qemu-xen-traditional"> and only if the
 device-model was compiled with OpenGL support. Disabled by default.
 
 =item B<nographic=BOOLEAN>
@@ -903,7 +903,7 @@ device-model will become the default in 
 =back
 
 It is recommended to accept the default value for new guests.  If
-you have existing guests then, depeending on the nature of the guest
+you have existing guests then, depending on the nature of the guest
 Operating System, you may wish to force them to use the device
 model which they were installed with.
 
@@ -926,19 +926,19 @@ Assign an XSM security label to the devi
 
 =item B<device_model_args=[ "ARG", "ARG", ...]>
 
-Pass additional arbitrary options on the devide-model command
+Pass additional arbitrary options on the device-model command
 line. Each element in the list is passed as an option to the
 device-model.
 
 =item B<device_model_args_pv=[ "ARG", "ARG", ...]>
 
-Pass additional arbitrary options on the devide-model command line for
+Pass additional arbitrary options on the device-model command line for
 a PV device model only. Each element in the list is passed as an
 option to the device-model.
 
 =item B<device_model_args_hvm=[ "ARG", "ARG", ...]>
 
-Pass additional arbitrary options on the devide-model command line for
+Pass additional arbitrary options on the device-model command line for
 an HVM device model only. Each element in the list is passed as an
 option to the device-model.
 
diff -r 3ea92ea1490f -r b2481fe8a395 docs/man/xl.pod.1
--- a/docs/man/xl.pod.1 Thu Jun 28 15:18:05 2012 +0100
+++ b/docs/man/xl.pod.1 Thu Jun 28 16:57:26 2012 +0100
@@ -50,7 +50,7 @@ setup the bridge.
 =item B<autoballoon>
 
 If you specify the amount of memory dom0 has, passing B<dom0_mem> to
-Xen, it is highly reccomended to disable B<autoballoon>. Edit
+Xen, it is highly recommended to disable B<autoballoon>. Edit
 B</etc/xen/xl.conf> and set it to 0.
 
 =item run xl as B<root>
@@ -808,7 +808,7 @@ the ratelimit (see below).
 
 Ratelimit attempts to limit the number of schedules per second.  It
 sets a minimum amount of time (in microseconds) a VM must run before
-we will allow a higher-prioirty VM to pre-empt it.  The default value
+we will allow a higher-priority VM to pre-empt it.  The default value
 is 1000 microseconds (1ms).  Valid range is 100 to 500000 (500ms).
 The ratelimit length must be lower than the timeslice length.
 
@@ -1233,7 +1233,7 @@ We need better documentation for:
 
 =item B<tmem>
 
-Trascendent Memory.
+Transcendent Memory.
 
 =back
 
diff -r 3ea92ea1490f -r b2481fe8a395 docs/man/xm.pod.1
--- a/docs/man/xm.pod.1 Thu Jun 28 15:18:05 2012 +0100
+++ b/docs/man/xm.pod.1 Thu Jun 28 16:57:26 2012 +0100
@@ -117,7 +117,7 @@ on the command line are replaced by the 
 
 =item B<-F=FILE>, B<--config=FILE>
 
-Use the given SXP formated configuration script.
+Use the given SXP formatted configuration script.
 SXP is the underlying configuration format used by Xen.
 SXP configuration scripts can be hand-written or generated
 from Python configuration scripts, using the -n
@@ -430,7 +430,7 @@ on the command line are replaced by the 
 
 =item B<-F=FILE>, B<--config=FILE>
 
-Use the given SXP formated configuration script.
+Use the given SXP formatted configuration script.
 SXP is the underlying configuration format used by Xen.
 SXP configuration scripts can be hand-written or generated
 from Python configuration scripts, using the -n
diff -r 3ea92ea1490f -r b2481fe8a395 docs/man/xmdomain.cfg.pod.5
--- a/docs/man/xmdomain.cfg.pod.5       Thu Jun 28 15:18:05 2012 +0100
+++ b/docs/man/xmdomain.cfg.pod.5       Thu Jun 28 16:57:26 2012 +0100
@@ -53,7 +53,7 @@ xen kernel.
 The amount of RAM, in megabytes, to allocate to the domain when it
 starts.  Allocating insufficient memory for a domain may produce
 extremely bizarre behavior.  If there isn't enough free memory left on
-the machine to fulfill this request, the domain will fail to start.
+the machine to fulfil this request, the domain will fail to start.
 
 Xen does not support overcommit of memory, so the total memory of all
 guests (+ 64 MB needed for Xen) must be less than or equal to the
diff -r 3ea92ea1490f -r b2481fe8a395 docs/misc/distro_mapping.txt
--- a/docs/misc/distro_mapping.txt      Thu Jun 28 15:18:05 2012 +0100
+++ b/docs/misc/distro_mapping.txt      Thu Jun 28 16:57:26 2012 +0100
@@ -22,6 +22,6 @@ one must grep for the above elements and
 
 For example if a new distro uses /etc/bork as its config dir, it's not
 sufficient to set CONFIG_LEAF_DIR=bork; one must also add tests for the
-existance of the bork dir in every context where config files are read.
+existence of the bork dir in every context where config files are read.
 
 
diff -r 3ea92ea1490f -r b2481fe8a395 docs/misc/kexec_and_kdump.txt
--- a/docs/misc/kexec_and_kdump.txt     Thu Jun 28 15:18:05 2012 +0100
+++ b/docs/misc/kexec_and_kdump.txt     Thu Jun 28 16:57:26 2012 +0100
@@ -3,8 +3,8 @@
 Kexec and Kdump for Xen
 =======================
 
-This is a breif guide to using Kexec and Kdump in conjunction with Xen.
-This functionaly works at the level of the hypervisor and dom0 kernel.
+This is a brief guide to using Kexec and Kdump in conjunction with Xen.
+This functionally works at the level of the hypervisor and dom0 kernel.
 And will thus affect all guests running on a machine.
 
 At this stage it does not work in conjunction with domU kernels.
@@ -33,7 +33,7 @@ Linux -> Xen   | first kernel       | se
 ---------------+--------------------+--------------------
 Linux -> Linux | first kernel       | second kernel
 
-If you are kexecing to Xen then you will also need to preapare the second
+If you are kexecing to Xen then you will also need to prepare the second
 hypervisor and dom0 kernel that will run after kexec. These may be the same
 as the first hypervisor and dom0 kernel that are used before kexec if you
 are kexecing from Xen to Xen.
@@ -176,7 +176,7 @@ running kernel.
 On x86 systems the crash kernel may be either
 - A uncompressed vmlinux image if the kernel is not relocatable
 - A compressed bzImage or vmlinuz image if the kernel is relocatable
-- Relocatability is crontroled by the CONFIG_RELOCATABLE kernel
+- Relocatability is controlled by the CONFIG_RELOCATABLE kernel
   compile configuration parameter. This option may not be available
   depending on the kernel version
 On ia64
diff -r 3ea92ea1490f -r b2481fe8a395 docs/misc/tscmode.txt
--- a/docs/misc/tscmode.txt     Thu Jun 28 15:18:05 2012 +0100
+++ b/docs/misc/tscmode.txt     Thu Jun 28 16:57:26 2012 +0100
@@ -121,7 +121,7 @@ may not remain) synchronized as "TSC-uns
 
 As a result of TSC's sordid history, two classes of applications use
 TSC: old applications designed for single processors, and the most recent
-enteprise applications which require high-frequency high-precision
+enterprise applications which require high-frequency high-precision
 timestamping.
 
 We will refer to apps that might break if running on a TSC-unsafe
@@ -151,13 +151,13 @@ instructions to trap.  This trap can be 
 then transparently "emulate" the results of the rdtsc instruction and
 return control to the code following the rdtsc instruction.
 
-To provide a "safe" TSC, i.e. to ensure both TSC monontonicity and a
+To provide a "safe" TSC, i.e. to ensure both TSC monotonicity and a
 fixed rate, Xen provides rdtsc emulation whenever necessary or when
 explicitly specified by a per-VM configuration option.  TSC emulation is
 relatively slow -- roughly 15-20 times slower than the rdtsc instruction
 when executed natively.  However, except when an OS or application uses
 the rdtsc instruction at a high frequency (e.g. more than about 10,000 times
-per second per processor), this performance degradation is not noticable
+per second per processor), this performance degradation is not noticeable
 (i.e. <0.3%).  And, TSC emulation is nearly always faster than
 OS-provided alternatives (e.g. Linux's gettimeofday).  For environments
 where it is certain that all apps are TSC-resilient (e.g.
@@ -196,7 +196,7 @@ all apps running in this virtual machine
 apps must either be TSC-resilient or pvrdtscp-modified.  Second,
 highest performance is only obtained on TSC-safe machines that
 support the rdtscp instruction; when running on older machines,
-rdtscp is emulated and thus slower.  For more information on PVRTSCP,
+rdtscp is emulated and thus slower.  For more information on PVRDTSCP,
 see below.
 
 Finally, tsc_mode==1 always enables TSC emulation, regardless of
@@ -243,7 +243,7 @@ saved, restore this domain will fail.
 There is another cpuid-related complication: The x86 cpuid instruction is
 non-privileged.  HVM domains are configured to always trap this instruction
 to Xen, where Xen can "filter" the result.  In a PV OS, all cpuid instructions
-have been replaced by a parvirtualized equivalent of the cpuid instruction
+have been replaced by a paravirtualized equivalent of the cpuid instruction
 ("pvcpuid") and also trap to Xen.  But apps in a PV guest that use a
 cpuid instruction execute it directly, without a trap to Xen.  As a result,
 an app may directly examine the physical TSC Invariant cpuid bit and make
diff -r 3ea92ea1490f -r b2481fe8a395 docs/misc/vtpm.txt
--- a/docs/misc/vtpm.txt        Thu Jun 28 15:18:05 2012 +0100
+++ b/docs/misc/vtpm.txt        Thu Jun 28 16:57:26 2012 +0100
@@ -78,7 +78,7 @@ ramdisk = "/xen/initrd_domU/U1_ramdisk.i
 memory = 32
 name = "TPMUserDomain0"
 vtpm = ['instance=1,backend=0']
-root = "/dev/ram0 cosole=tty ro"
+root = "/dev/ram0 console=tty ro"
 vif = ['backend=0']
 
 In the above configuration file the line 'vtpm = ...' provides
diff -r 3ea92ea1490f -r b2481fe8a395 docs/misc/xen-command-line.markdown
--- a/docs/misc/xen-command-line.markdown       Thu Jun 28 15:18:05 2012 +0100
+++ b/docs/misc/xen-command-line.markdown       Thu Jun 28 16:57:26 2012 +0100
@@ -89,7 +89,7 @@ common, and only has an effect if your s
 
 The `acpi=noirq` option causes Xen to not parse the ACPI MADT table
 looking for IO-APIC entries.  This is also not common, and any system
-which requries this option to function should be blacklisted.
+which requires this option to function should be blacklisted.
 Additionally, this will not prevent Xen from finding IO-APIC entries
 from the MP tables.
 
diff -r 3ea92ea1490f -r b2481fe8a395 docs/misc/xenstore.txt
--- a/docs/misc/xenstore.txt    Thu Jun 28 15:18:05 2012 +0100
+++ b/docs/misc/xenstore.txt    Thu Jun 28 16:57:26 2012 +0100
@@ -202,7 +202,7 @@ WATCH                       <wpath>|<token>|?
        readable, some notifications may have been lost).
 
 WATCH_EVENT                                    <epath>|<token>|
-       Unsolicited `reply' generated for matching modfication events
+       Unsolicited `reply' generated for matching modification events
        as described above.  req_id and tx_id are both 0.
 
        <epath> is the event's path, ie the actual path that was
diff -r 3ea92ea1490f -r b2481fe8a395 docs/misc/xl-disk-configuration.txt
--- a/docs/misc/xl-disk-configuration.txt       Thu Jun 28 15:18:05 2012 +0100
+++ b/docs/misc/xl-disk-configuration.txt       Thu Jun 28 16:57:26 2012 +0100
@@ -72,7 +72,7 @@ Special syntax:
    syntax in the configuration file, it consumes the whole rest of the
    <diskspec>.  Therefore in that case it must come last.  This is
    permissible even if an empty value for the target was already
-   specifed as a positional parameter.  This is the only way to
+   specified as a positional parameter.  This is the only way to
    specify a target string containing metacharacters such as commas
    and (in some cases) colons, which would otherwise be
    misinterpreted.
diff -r 3ea92ea1490f -r b2481fe8a395 docs/misc/xl-network-configuration.markdown
--- a/docs/misc/xl-network-configuration.markdown       Thu Jun 28 15:18:05 
2012 +0100
+++ b/docs/misc/xl-network-configuration.markdown       Thu Jun 28 16:57:26 
2012 +0100
@@ -89,7 +89,7 @@ are:
 
   * `rtl8139` (default) -- Realtek RTL8139
   * `e1000` -- Intel E1000 
-  * in principal any device supported by your device model
+  * in principle any device supported by your device model
 
 ### vifname
 
diff -r 3ea92ea1490f -r b2481fe8a395 docs/misc/xsm-flask.txt
--- a/docs/misc/xsm-flask.txt   Thu Jun 28 15:18:05 2012 +0100
+++ b/docs/misc/xsm-flask.txt   Thu Jun 28 16:57:26 2012 +0100
@@ -226,7 +226,7 @@ 1) xen command line parameters
        To boot the platform into enforcing mode, which means that the policy is
        loaded and enforced, append 'flask_enforcing=1' on the grub line.
        
-       This parameter may also be changed through the flask hyercall.
+       This parameter may also be changed through the flask hypercall.
        
        b) flask_enabled
        

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.