* [PATCH for-9.0] Fix some typos in documentation (found by codespell)
@ 2024-03-31 16:15 Stefan Weil
2024-03-31 17:30 ` Michael Tokarev
2024-04-02 6:42 ` Luc Michel
0 siblings, 2 replies; 3+ messages in thread
From: Stefan Weil @ 2024-03-31 16:15 UTC (permalink / raw
To: Alex Bennée, Philippe Mathieu-Daudé, Thomas Huth,
Luc Michel, Eric Blake, Paolo Bonzini
Cc: kvm, qemu-devel, qemu-trivial, Stefan Weil
Signed-off-by: Stefan Weil <sw@weilnetz.de>
---
docs/devel/atomics.rst | 2 +-
docs/devel/ci-jobs.rst.inc | 2 +-
docs/devel/clocks.rst | 2 +-
docs/system/i386/sgx.rst | 2 +-
qapi/qom.json | 2 +-
5 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/docs/devel/atomics.rst b/docs/devel/atomics.rst
index ff9b5ee30c..b77c6e13e1 100644
--- a/docs/devel/atomics.rst
+++ b/docs/devel/atomics.rst
@@ -119,7 +119,7 @@ The only guarantees that you can rely upon in this case are:
ordinary accesses instead cause data races if they are concurrent with
other accesses of which at least one is a write. In order to ensure this,
the compiler will not optimize accesses out of existence, create unsolicited
- accesses, or perform other similar optimzations.
+ accesses, or perform other similar optimizations.
- acquire operations will appear to happen, with respect to the other
components of the system, before all the LOAD or STORE operations
diff --git a/docs/devel/ci-jobs.rst.inc b/docs/devel/ci-jobs.rst.inc
index ec33e6ee2b..be06322279 100644
--- a/docs/devel/ci-jobs.rst.inc
+++ b/docs/devel/ci-jobs.rst.inc
@@ -115,7 +115,7 @@ CI pipeline.
QEMU_JOB_SKIPPED
~~~~~~~~~~~~~~~~
-The job is not reliably successsful in general, so is not
+The job is not reliably successful in general, so is not
currently suitable to be run by default. Ideally this should
be a temporary marker until the problems can be addressed, or
the job permanently removed.
diff --git a/docs/devel/clocks.rst b/docs/devel/clocks.rst
index b2d1148cdb..177ee1c90d 100644
--- a/docs/devel/clocks.rst
+++ b/docs/devel/clocks.rst
@@ -279,7 +279,7 @@ You can change the multiplier and divider of a clock at runtime,
so you can use this to model clock controller devices which
have guest-programmable frequency multipliers or dividers.
-Similary to ``clock_set()``, ``clock_set_mul_div()`` returns ``true`` if
+Similarly to ``clock_set()``, ``clock_set_mul_div()`` returns ``true`` if
the clock state was modified; that is, if the multiplier or the diviser
or both were changed by the call.
diff --git a/docs/system/i386/sgx.rst b/docs/system/i386/sgx.rst
index 0f0a73f758..c293f7f44e 100644
--- a/docs/system/i386/sgx.rst
+++ b/docs/system/i386/sgx.rst
@@ -6,7 +6,7 @@ Overview
Intel Software Guard eXtensions (SGX) is a set of instructions and mechanisms
for memory accesses in order to provide security accesses for sensitive
-applications and data. SGX allows an application to use it's pariticular
+applications and data. SGX allows an application to use its particular
address space as an *enclave*, which is a protected area provides confidentiality
and integrity even in the presence of privileged malware. Accesses to the
enclave memory area from any software not resident in the enclave are prevented,
diff --git a/qapi/qom.json b/qapi/qom.json
index 8d4ca8ed92..85e6b4f84a 100644
--- a/qapi/qom.json
+++ b/qapi/qom.json
@@ -802,7 +802,7 @@
#
# @fd: file descriptor name previously passed via 'getfd' command,
# which represents a pre-opened /dev/iommu. This allows the
-# iommufd object to be shared accross several subsystems (VFIO,
+# iommufd object to be shared across several subsystems (VFIO,
# VDPA, ...), and the file descriptor to be shared with other
# process, e.g. DPDK. (default: QEMU opens /dev/iommu by itself)
#
--
2.39.2
^ permalink raw reply related [flat|nested] 3+ messages in thread
* Re: [PATCH for-9.0] Fix some typos in documentation (found by codespell)
2024-03-31 16:15 [PATCH for-9.0] Fix some typos in documentation (found by codespell) Stefan Weil
@ 2024-03-31 17:30 ` Michael Tokarev
2024-04-02 6:42 ` Luc Michel
1 sibling, 0 replies; 3+ messages in thread
From: Michael Tokarev @ 2024-03-31 17:30 UTC (permalink / raw
To: Stefan Weil, Alex Bennée, Philippe Mathieu-Daudé,
Thomas Huth, Luc Michel, Eric Blake, Paolo Bonzini
Cc: kvm, qemu-devel, qemu-trivial
31.03.2024 19:15, Stefan Weil via wrote:
> Signed-off-by: Stefan Weil <sw@weilnetz.de>
Reviewed-by: Michael Tokarev <mjt@tls.msk.ru>
Wonder if I should review qemu-trivial queue for 9.0, - I think there's nothing
in there by now..
/mjt
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [PATCH for-9.0] Fix some typos in documentation (found by codespell)
2024-03-31 16:15 [PATCH for-9.0] Fix some typos in documentation (found by codespell) Stefan Weil
2024-03-31 17:30 ` Michael Tokarev
@ 2024-04-02 6:42 ` Luc Michel
1 sibling, 0 replies; 3+ messages in thread
From: Luc Michel @ 2024-04-02 6:42 UTC (permalink / raw
To: Stefan Weil
Cc: Alex Bennée, Philippe Mathieu-Daudé, Thomas Huth,
Eric Blake, Paolo Bonzini, kvm, qemu-devel, qemu-trivial
On 18:15 Sun 31 Mar , Stefan Weil wrote:
> Signed-off-by: Stefan Weil <sw@weilnetz.de>
Reviewed-by: Luc Michel <luc@lmichel.fr>
> ---
> docs/devel/atomics.rst | 2 +-
> docs/devel/ci-jobs.rst.inc | 2 +-
> docs/devel/clocks.rst | 2 +-
> docs/system/i386/sgx.rst | 2 +-
> qapi/qom.json | 2 +-
> 5 files changed, 5 insertions(+), 5 deletions(-)
>
> diff --git a/docs/devel/atomics.rst b/docs/devel/atomics.rst
> index ff9b5ee30c..b77c6e13e1 100644
> --- a/docs/devel/atomics.rst
> +++ b/docs/devel/atomics.rst
> @@ -119,7 +119,7 @@ The only guarantees that you can rely upon in this case are:
> ordinary accesses instead cause data races if they are concurrent with
> other accesses of which at least one is a write. In order to ensure this,
> the compiler will not optimize accesses out of existence, create unsolicited
> - accesses, or perform other similar optimzations.
> + accesses, or perform other similar optimizations.
>
> - acquire operations will appear to happen, with respect to the other
> components of the system, before all the LOAD or STORE operations
> diff --git a/docs/devel/ci-jobs.rst.inc b/docs/devel/ci-jobs.rst.inc
> index ec33e6ee2b..be06322279 100644
> --- a/docs/devel/ci-jobs.rst.inc
> +++ b/docs/devel/ci-jobs.rst.inc
> @@ -115,7 +115,7 @@ CI pipeline.
> QEMU_JOB_SKIPPED
> ~~~~~~~~~~~~~~~~
>
> -The job is not reliably successsful in general, so is not
> +The job is not reliably successful in general, so is not
> currently suitable to be run by default. Ideally this should
> be a temporary marker until the problems can be addressed, or
> the job permanently removed.
> diff --git a/docs/devel/clocks.rst b/docs/devel/clocks.rst
> index b2d1148cdb..177ee1c90d 100644
> --- a/docs/devel/clocks.rst
> +++ b/docs/devel/clocks.rst
> @@ -279,7 +279,7 @@ You can change the multiplier and divider of a clock at runtime,
> so you can use this to model clock controller devices which
> have guest-programmable frequency multipliers or dividers.
>
> -Similary to ``clock_set()``, ``clock_set_mul_div()`` returns ``true`` if
> +Similarly to ``clock_set()``, ``clock_set_mul_div()`` returns ``true`` if
> the clock state was modified; that is, if the multiplier or the diviser
> or both were changed by the call.
>
> diff --git a/docs/system/i386/sgx.rst b/docs/system/i386/sgx.rst
> index 0f0a73f758..c293f7f44e 100644
> --- a/docs/system/i386/sgx.rst
> +++ b/docs/system/i386/sgx.rst
> @@ -6,7 +6,7 @@ Overview
>
> Intel Software Guard eXtensions (SGX) is a set of instructions and mechanisms
> for memory accesses in order to provide security accesses for sensitive
> -applications and data. SGX allows an application to use it's pariticular
> +applications and data. SGX allows an application to use its particular
> address space as an *enclave*, which is a protected area provides confidentiality
> and integrity even in the presence of privileged malware. Accesses to the
> enclave memory area from any software not resident in the enclave are prevented,
> diff --git a/qapi/qom.json b/qapi/qom.json
> index 8d4ca8ed92..85e6b4f84a 100644
> --- a/qapi/qom.json
> +++ b/qapi/qom.json
> @@ -802,7 +802,7 @@
> #
> # @fd: file descriptor name previously passed via 'getfd' command,
> # which represents a pre-opened /dev/iommu. This allows the
> -# iommufd object to be shared accross several subsystems (VFIO,
> +# iommufd object to be shared across several subsystems (VFIO,
> # VDPA, ...), and the file descriptor to be shared with other
> # process, e.g. DPDK. (default: QEMU opens /dev/iommu by itself)
> #
> --
> 2.39.2
>
--
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2024-04-02 6:49 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-03-31 16:15 [PATCH for-9.0] Fix some typos in documentation (found by codespell) Stefan Weil
2024-03-31 17:30 ` Michael Tokarev
2024-04-02 6:42 ` Luc Michel
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).