From 8449b7b05364af846eac9011bb2b12d10fbde04d Mon Sep 17 00:00:00 2001 From: Keir Fraser Date: Wed, 15 Jul 2009 10:30:59 +0100 Subject: [PATCH] Fix a couple of comment typos. Signed-off-by: Christoph Egger --- tools/examples/xend-config.sxp | 2 +- xen/arch/x86/hvm/svm/svm.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/tools/examples/xend-config.sxp b/tools/examples/xend-config.sxp index e33709ae95..283949e29c 100644 --- a/tools/examples/xend-config.sxp +++ b/tools/examples/xend-config.sxp @@ -213,7 +213,7 @@ # The VNC server can be told to negotiate a TLS session # to encryption all traffic, and provide x509 cert to -# clients enalbing them to verify server identity. The +# clients enabling them to verify server identity. The # GTK-VNC widget, virt-viewer, virt-manager and VeNCrypt # all support the VNC extension for TLS used in QEMU. The # TightVNC/RealVNC/UltraVNC clients do not. diff --git a/xen/arch/x86/hvm/svm/svm.c b/xen/arch/x86/hvm/svm/svm.c index b077f59499..1cef8be5cb 100644 --- a/xen/arch/x86/hvm/svm/svm.c +++ b/xen/arch/x86/hvm/svm/svm.c @@ -460,7 +460,7 @@ static void svm_update_guest_efer(struct vcpu *v) /* * In legacy mode (EFER.LMA=0) we natively support SYSENTER/SYSEXIT with - * no need for MSR intercepts. Ehen EFER.LMA=1 we must trap and emulate. + * no need for MSR intercepts. When EFER.LMA=1 we must trap and emulate. */ svm_intercept_msr(v, MSR_IA32_SYSENTER_CS, lma); svm_intercept_msr(v, MSR_IA32_SYSENTER_ESP, lma); -- 2.30.2