debuggers.hg

changeset 19981:d09113020033

Fix a couple of comment typos.

Signed-off-by: Christoph Egger <Christoph.Egger@amd.com>
author Keir Fraser <keir.fraser@citrix.com>
date Wed Jul 15 10:30:59 2009 +0100 (2009-07-15)
parents 323ae92f774b
children 034e015088ac
files tools/examples/xend-config.sxp xen/arch/x86/hvm/svm/svm.c
line diff
     1.1 --- a/tools/examples/xend-config.sxp	Wed Jul 15 09:14:19 2009 +0100
     1.2 +++ b/tools/examples/xend-config.sxp	Wed Jul 15 10:30:59 2009 +0100
     1.3 @@ -213,7 +213,7 @@
     1.4  
     1.5  # The VNC server can be told to negotiate a TLS session
     1.6  # to encryption all traffic, and provide x509 cert to
     1.7 -# clients enalbing them to verify server identity. The
     1.8 +# clients enabling them to verify server identity. The
     1.9  # GTK-VNC widget, virt-viewer, virt-manager and VeNCrypt
    1.10  # all support the VNC extension for TLS used in QEMU. The
    1.11  # TightVNC/RealVNC/UltraVNC clients do not.
     2.1 --- a/xen/arch/x86/hvm/svm/svm.c	Wed Jul 15 09:14:19 2009 +0100
     2.2 +++ b/xen/arch/x86/hvm/svm/svm.c	Wed Jul 15 10:30:59 2009 +0100
     2.3 @@ -460,7 +460,7 @@ static void svm_update_guest_efer(struct
     2.4  
     2.5      /*
     2.6       * In legacy mode (EFER.LMA=0) we natively support SYSENTER/SYSEXIT with
     2.7 -     * no need for MSR intercepts. Ehen EFER.LMA=1 we must trap and emulate.
     2.8 +     * no need for MSR intercepts. When EFER.LMA=1 we must trap and emulate.
     2.9       */
    2.10      svm_intercept_msr(v, MSR_IA32_SYSENTER_CS, lma);
    2.11      svm_intercept_msr(v, MSR_IA32_SYSENTER_ESP, lma);