Message ID | 20240331161526.1746598-1-sw@weilnetz.de (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
Series | [for-9.0] Fix some typos in documentation (found by codespell) | expand |
31.03.2024 19:15, Stefan Weil via wrote: > Signed-off-by: Stefan Weil <sw@weilnetz.de> Reviewed-by: Michael Tokarev <mjt@tls.msk.ru> Wonder if I should review qemu-trivial queue for 9.0, - I think there's nothing in there by now.. /mjt
On 18:15 Sun 31 Mar , Stefan Weil wrote: > Signed-off-by: Stefan Weil <sw@weilnetz.de> Reviewed-by: Luc Michel <luc@lmichel.fr> > --- > docs/devel/atomics.rst | 2 +- > docs/devel/ci-jobs.rst.inc | 2 +- > docs/devel/clocks.rst | 2 +- > docs/system/i386/sgx.rst | 2 +- > qapi/qom.json | 2 +- > 5 files changed, 5 insertions(+), 5 deletions(-) > > diff --git a/docs/devel/atomics.rst b/docs/devel/atomics.rst > index ff9b5ee30c..b77c6e13e1 100644 > --- a/docs/devel/atomics.rst > +++ b/docs/devel/atomics.rst > @@ -119,7 +119,7 @@ The only guarantees that you can rely upon in this case are: > ordinary accesses instead cause data races if they are concurrent with > other accesses of which at least one is a write. In order to ensure this, > the compiler will not optimize accesses out of existence, create unsolicited > - accesses, or perform other similar optimzations. > + accesses, or perform other similar optimizations. > > - acquire operations will appear to happen, with respect to the other > components of the system, before all the LOAD or STORE operations > diff --git a/docs/devel/ci-jobs.rst.inc b/docs/devel/ci-jobs.rst.inc > index ec33e6ee2b..be06322279 100644 > --- a/docs/devel/ci-jobs.rst.inc > +++ b/docs/devel/ci-jobs.rst.inc > @@ -115,7 +115,7 @@ CI pipeline. > QEMU_JOB_SKIPPED > ~~~~~~~~~~~~~~~~ > > -The job is not reliably successsful in general, so is not > +The job is not reliably successful in general, so is not > currently suitable to be run by default. Ideally this should > be a temporary marker until the problems can be addressed, or > the job permanently removed. > diff --git a/docs/devel/clocks.rst b/docs/devel/clocks.rst > index b2d1148cdb..177ee1c90d 100644 > --- a/docs/devel/clocks.rst > +++ b/docs/devel/clocks.rst > @@ -279,7 +279,7 @@ You can change the multiplier and divider of a clock at runtime, > so you can use this to model clock controller devices which > have guest-programmable frequency multipliers or dividers. > > -Similary to ``clock_set()``, ``clock_set_mul_div()`` returns ``true`` if > +Similarly to ``clock_set()``, ``clock_set_mul_div()`` returns ``true`` if > the clock state was modified; that is, if the multiplier or the diviser > or both were changed by the call. > > diff --git a/docs/system/i386/sgx.rst b/docs/system/i386/sgx.rst > index 0f0a73f758..c293f7f44e 100644 > --- a/docs/system/i386/sgx.rst > +++ b/docs/system/i386/sgx.rst > @@ -6,7 +6,7 @@ Overview > > Intel Software Guard eXtensions (SGX) is a set of instructions and mechanisms > for memory accesses in order to provide security accesses for sensitive > -applications and data. SGX allows an application to use it's pariticular > +applications and data. SGX allows an application to use its particular > address space as an *enclave*, which is a protected area provides confidentiality > and integrity even in the presence of privileged malware. Accesses to the > enclave memory area from any software not resident in the enclave are prevented, > diff --git a/qapi/qom.json b/qapi/qom.json > index 8d4ca8ed92..85e6b4f84a 100644 > --- a/qapi/qom.json > +++ b/qapi/qom.json > @@ -802,7 +802,7 @@ > # > # @fd: file descriptor name previously passed via 'getfd' command, > # which represents a pre-opened /dev/iommu. This allows the > -# iommufd object to be shared accross several subsystems (VFIO, > +# iommufd object to be shared across several subsystems (VFIO, > # VDPA, ...), and the file descriptor to be shared with other > # process, e.g. DPDK. (default: QEMU opens /dev/iommu by itself) > # > -- > 2.39.2 > --
diff --git a/docs/devel/atomics.rst b/docs/devel/atomics.rst index ff9b5ee30c..b77c6e13e1 100644 --- a/docs/devel/atomics.rst +++ b/docs/devel/atomics.rst @@ -119,7 +119,7 @@ The only guarantees that you can rely upon in this case are: ordinary accesses instead cause data races if they are concurrent with other accesses of which at least one is a write. In order to ensure this, the compiler will not optimize accesses out of existence, create unsolicited - accesses, or perform other similar optimzations. + accesses, or perform other similar optimizations. - acquire operations will appear to happen, with respect to the other components of the system, before all the LOAD or STORE operations diff --git a/docs/devel/ci-jobs.rst.inc b/docs/devel/ci-jobs.rst.inc index ec33e6ee2b..be06322279 100644 --- a/docs/devel/ci-jobs.rst.inc +++ b/docs/devel/ci-jobs.rst.inc @@ -115,7 +115,7 @@ CI pipeline. QEMU_JOB_SKIPPED ~~~~~~~~~~~~~~~~ -The job is not reliably successsful in general, so is not +The job is not reliably successful in general, so is not currently suitable to be run by default. Ideally this should be a temporary marker until the problems can be addressed, or the job permanently removed. diff --git a/docs/devel/clocks.rst b/docs/devel/clocks.rst index b2d1148cdb..177ee1c90d 100644 --- a/docs/devel/clocks.rst +++ b/docs/devel/clocks.rst @@ -279,7 +279,7 @@ You can change the multiplier and divider of a clock at runtime, so you can use this to model clock controller devices which have guest-programmable frequency multipliers or dividers. -Similary to ``clock_set()``, ``clock_set_mul_div()`` returns ``true`` if +Similarly to ``clock_set()``, ``clock_set_mul_div()`` returns ``true`` if the clock state was modified; that is, if the multiplier or the diviser or both were changed by the call. diff --git a/docs/system/i386/sgx.rst b/docs/system/i386/sgx.rst index 0f0a73f758..c293f7f44e 100644 --- a/docs/system/i386/sgx.rst +++ b/docs/system/i386/sgx.rst @@ -6,7 +6,7 @@ Overview Intel Software Guard eXtensions (SGX) is a set of instructions and mechanisms for memory accesses in order to provide security accesses for sensitive -applications and data. SGX allows an application to use it's pariticular +applications and data. SGX allows an application to use its particular address space as an *enclave*, which is a protected area provides confidentiality and integrity even in the presence of privileged malware. Accesses to the enclave memory area from any software not resident in the enclave are prevented, diff --git a/qapi/qom.json b/qapi/qom.json index 8d4ca8ed92..85e6b4f84a 100644 --- a/qapi/qom.json +++ b/qapi/qom.json @@ -802,7 +802,7 @@ # # @fd: file descriptor name previously passed via 'getfd' command, # which represents a pre-opened /dev/iommu. This allows the -# iommufd object to be shared accross several subsystems (VFIO, +# iommufd object to be shared across several subsystems (VFIO, # VDPA, ...), and the file descriptor to be shared with other # process, e.g. DPDK. (default: QEMU opens /dev/iommu by itself) #
Signed-off-by: Stefan Weil <sw@weilnetz.de> --- docs/devel/atomics.rst | 2 +- docs/devel/ci-jobs.rst.inc | 2 +- docs/devel/clocks.rst | 2 +- docs/system/i386/sgx.rst | 2 +- qapi/qom.json | 2 +- 5 files changed, 5 insertions(+), 5 deletions(-)