Fix some typos in documentation (found by codespell)
Signed-off-by: Stefan Weil <sw@weilnetz.de> Reviewed-by: Michael Tokarev <mjt@tls.msk.ru> Signed-off-by: Michael Tokarev <mjt@tls.msk.ru>
This commit is contained in:
parent
9988c7b50e
commit
f6822fee96
@ -119,7 +119,7 @@ The only guarantees that you can rely upon in this case are:
|
||||
ordinary accesses instead cause data races if they are concurrent with
|
||||
other accesses of which at least one is a write. In order to ensure this,
|
||||
the compiler will not optimize accesses out of existence, create unsolicited
|
||||
accesses, or perform other similar optimzations.
|
||||
accesses, or perform other similar optimizations.
|
||||
|
||||
- acquire operations will appear to happen, with respect to the other
|
||||
components of the system, before all the LOAD or STORE operations
|
||||
|
@ -115,7 +115,7 @@ CI pipeline.
|
||||
QEMU_JOB_SKIPPED
|
||||
~~~~~~~~~~~~~~~~
|
||||
|
||||
The job is not reliably successsful in general, so is not
|
||||
The job is not reliably successful in general, so is not
|
||||
currently suitable to be run by default. Ideally this should
|
||||
be a temporary marker until the problems can be addressed, or
|
||||
the job permanently removed.
|
||||
|
@ -279,7 +279,7 @@ You can change the multiplier and divider of a clock at runtime,
|
||||
so you can use this to model clock controller devices which
|
||||
have guest-programmable frequency multipliers or dividers.
|
||||
|
||||
Similary to ``clock_set()``, ``clock_set_mul_div()`` returns ``true`` if
|
||||
Similarly to ``clock_set()``, ``clock_set_mul_div()`` returns ``true`` if
|
||||
the clock state was modified; that is, if the multiplier or the diviser
|
||||
or both were changed by the call.
|
||||
|
||||
|
@ -6,7 +6,7 @@ Overview
|
||||
|
||||
Intel Software Guard eXtensions (SGX) is a set of instructions and mechanisms
|
||||
for memory accesses in order to provide security accesses for sensitive
|
||||
applications and data. SGX allows an application to use it's pariticular
|
||||
applications and data. SGX allows an application to use its particular
|
||||
address space as an *enclave*, which is a protected area provides confidentiality
|
||||
and integrity even in the presence of privileged malware. Accesses to the
|
||||
enclave memory area from any software not resident in the enclave are prevented,
|
||||
|
@ -802,7 +802,7 @@
|
||||
#
|
||||
# @fd: file descriptor name previously passed via 'getfd' command,
|
||||
# which represents a pre-opened /dev/iommu. This allows the
|
||||
# iommufd object to be shared accross several subsystems (VFIO,
|
||||
# iommufd object to be shared across several subsystems (VFIO,
|
||||
# VDPA, ...), and the file descriptor to be shared with other
|
||||
# process, e.g. DPDK. (default: QEMU opens /dev/iommu by itself)
|
||||
#
|
||||
|
Loading…
Reference in New Issue
Block a user