@@ -90,5 +90,5 @@ char *xenstore_read_str(const char *base, const char *node)
if (str != NULL) {
/* move to qemu-allocated memory to make sure
- * callers can savely g_free() stuff. */
+ * callers can safely g_free() stuff. */
ret = g_strdup(str);
free(str);
@@ -107,5 +107,5 @@
* RING2 -> RING3 kernel mode.
* RING3 -> RING3 user mode.
- * However RING0 indicates that the guest kernel should return to iteself
+ * However RING0 indicates that the guest kernel should return to itself
* directly with
* orb $3,1*8(%rsp)
@@ -140,5 +140,5 @@ typedef unsigned long xen_ulong_t;
* interrupt. On x86/64, since rings 1 and 2 are unavailable, we allocate
* privilege levels as follows:
- * Level == 0: Noone may enter
+ * Level == 0: No one may enter
* Level == 1: Kernel may enter
* Level == 2: Kernel may enter
@@ -320,5 +320,5 @@ typedef struct evtchn_set_priority evtchn_set_priority_t;
* ` HYPERVISOR_event_channel_op_compat(struct evtchn_op *op)
* `
- * Superceded by new event_channel_op() hypercall since 0x00030202.
+ * Superseded by new event_channel_op() hypercall since 0x00030202.
*/
struct evtchn_op {
@@ -625,5 +625,5 @@ DEFINE_XEN_GUEST_HANDLE(gnttab_cache_flush_t);
* GNTMAP_contains_pte subflag:
* 0 => This map request contains a host virtual address.
- * 1 => This map request contains the machine addess of the PTE to update.
+ * 1 => This map request contains the machine address of the PTE to update.
*/
#define _GNTMAP_contains_pte (4)
@@ -355,5 +355,5 @@ struct xen_hvm_altp2m_op {
/* Get the active vcpu p2m index */
#define HVMOP_altp2m_get_p2m_idx 14
-/* Set the "Supress #VE" bit for a range of pages */
+/* Set the "Suppress #VE" bit for a range of pages */
#define HVMOP_altp2m_set_suppress_ve_multi 15
/* Set visibility for a given altp2m view */
@@ -60,5 +60,5 @@
* values are encoded in decimal. Integer value ranges listed below are
* expressed as fixed sized integer types capable of storing the conversion
- * of a properly formated node string, without loss of information.
+ * of a properly formatted node string, without loss of information.
*
* Any specified default value is in effect if the corresponding XenBus node
@@ -259,5 +259,5 @@
*
* NOTE: Because of implementation bugs in some frontends this must be
- * set to 512, unless the frontend advertizes a non-zero value
+ * set to 512, unless the frontend advertises a non-zero value
* in its "feature-large-sector-size" xenbus node. (See below).
*
@@ -416,5 +416,5 @@
* (9) Linux implementation doesn't have a limit on the maximum number of
* grants that can be persistently mapped in the frontend driver, but
- * due to the frontent driver implementation it should never be bigger
+ * due to the frontend driver implementation it should never be bigger
* than RING_SIZE * BLKIF_MAX_SEGMENTS_PER_REQUEST.
*(10) The discard-secure property may be present and will be set to 1 if the
@@ -90,5 +90,5 @@ union xenfb_out_event
* refresh the framebuffer (and send an update notification event if
* those have been requested), then use the update frequency to guide
- * their periodical refreshs.
+ * their periodical refreshes.
*/
#define XENFB_TYPE_REFRESH_PERIOD 1
@@ -40,5 +40,5 @@
* values are encoded in decimal. Integer value ranges listed below are
* expressed as fixed sized integer types capable of storing the conversion
- * of a properly formated node string, without loss of information.
+ * of a properly formatted node string, without loss of information.
*
*****************************************************************************
@@ -185,5 +185,5 @@ struct xen_machphys_mfn_list {
/*
* Pointer to buffer to fill with list of extent starts. If there are
- * any large discontiguities in the machine address space, 2MB gaps in
+ * any large discontinuities in the machine address space, 2MB gaps in
* the machphys table will be represented by an MFN base of zero.
*/
@@ -224,5 +224,5 @@ DEFINE_XEN_GUEST_HANDLE(physdev_manage_pci_ext_t);
/*
- * Argument to physdev_op_compat() hypercall. Superceded by new physdev_op()
+ * Argument to physdev_op_compat() hypercall. Superseded by new physdev_op()
* hypercall since 0x00030202.
*/
@@ -350,5 +350,5 @@ DEFINE_XEN_GUEST_HANDLE(physdev_dbgp_op_t);
#if __XEN_INTERFACE_VERSION__ < 0x00040600
/*
- * These all-capitals physdev operation names are superceded by the new names
+ * These all-capitals physdev operation names are superseded by the new names
* (defined above) since interface version 0x00030202. The guard above was
* added post-4.5 only though and hence shouldn't check for 0x00030202.
@@ -607,5 +607,5 @@ DEFINE_XEN_GUEST_HANDLE(mmuext_op_t);
/*
- * DOMID_COW is used as the owner of sharable pages */
+ * DOMID_COW is used as the owner of shareable pages */
#define DOMID_COW xen_mk_uint(0x7FF3)
@@ -751,5 +751,5 @@ struct shared_info {
* 1. Bi-directional inter- and intra-domain connections. Domains must
* arrange out-of-band to set up a connection (usually by allocating
- * an unbound 'listener' port and avertising that via a storage service
+ * an unbound 'listener' port and advertising that via a storage service
* such as xenstore).
* 2. Physical interrupts. A domain with suitable hardware-access
Signed-off-by: Michael Tokarev <mjt@tls.msk.ru> --- hw/xen/xen_pvdev.c | 2 +- include/hw/xen/interface/arch-x86/xen-x86_64.h | 2 +- include/hw/xen/interface/arch-x86/xen.h | 2 +- include/hw/xen/interface/event_channel.h | 2 +- include/hw/xen/interface/grant_table.h | 2 +- include/hw/xen/interface/hvm/hvm_op.h | 2 +- include/hw/xen/interface/io/blkif.h | 6 +++--- include/hw/xen/interface/io/fbif.h | 2 +- include/hw/xen/interface/io/kbdif.h | 2 +- include/hw/xen/interface/memory.h | 2 +- include/hw/xen/interface/physdev.h | 4 ++-- include/hw/xen/interface/xen.h | 4 ++-- 12 files changed, 16 insertions(+), 16 deletions(-)